<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 671 to 685.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/indian-express-december-2-2016-fake-narendra-modi-apps-aplenty-but-it-is-up-to-users-to-protect-themselves"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hrbdt-and-cis-august-31-2021-facial-recognition-technology-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-aug-1-2013-kim-arora-facebook-limiting-access-to-social-media-can-restrict-freedom-of-speech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/geetika-mantri-june-14-2019-the-news-minute-facebook-to-pay-indians-to-give-up-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/facebook-data-for-good-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/facebook-data-for-good-in-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-march-20-2018-surabhi-agarwal-devina-sengupta-facebook-breach-privacy-advocates-in-india-seek-stronger-data-laws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/mumbai-mirror-tariq-engineer-october-2-2016-eye-on-mumbai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-august-23-2016-seetha-extending-aadhaar-to-more-areas-is-a-hare-brained-idea-it-should-be-dropped"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-june-8-2017-shaikh-zoaib-saleem-explore-money-apps-but-watch-your-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/dna-india-october-19-2012-saikat-datta-experts-committee-moots-law-to-protect-privacy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/indian-express-december-2-2016-fake-narendra-modi-apps-aplenty-but-it-is-up-to-users-to-protect-themselves">
    <title>Fake Narendra Modi apps aplenty, but it’s up to users to protect themselves</title>
    <link>https://cis-india.org/internet-governance/news/indian-express-december-2-2016-fake-narendra-modi-apps-aplenty-but-it-is-up-to-users-to-protect-themselves</link>
    <description>
        &lt;b&gt;The app, hosted on Google Play store, automatically gets excessive permission including full network access and ability to take pictures and videos once downloaded.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/india/this-fake-narendra-modi-app-can-secretly-take-pictures-shoot-videos-using-your-phone-4407400/"&gt;published by Indian Express&lt;/a&gt; on December 2, 2016. Pranesh Prakash was quoted. Also see Nandini Yadav's blog post in &lt;a class="external-link" href="http://www.bgr.in/news/beware-of-the-fake-narendra-modi-app-on-google-play-store/"&gt;BGR&lt;/a&gt; on December 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="modi3" class="size-full wp-image-4407413" src="http://images.indianexpress.com/2016/12/modi3.jpeg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The app, hosted on Google Play store, automatically gets excessive permission including full network access and ability to take pictures and videos once downloaded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A “&lt;a href="http://indianexpress.com/about/narendra-modi"&gt;Narendra Modi&lt;/a&gt;”  app, purportedly offered by the Government of India, caught the  attention of Internet expert Pranesh Prakash on Thursday as the app  developer was found to be using a Bangladesh-based web host and e-mail  address. Suggesting that this could be the work of a con-artist, Prakash  underlined that granting access to fake apps could lead to security  breach. The app, hosted on &lt;a href="http://indianexpress.com/about/google/"&gt;Google&lt;/a&gt; Play store, automatically gets excessive permission including full  network access and ability to take pictures and videos once downloaded.  The original NaMo, however, only gets access to read, modify and delete  the user’s media files. The “fake” app was downloaded more than 1 lakh  times and has an average rating of 4.4 from over 2,000 reviews. A simple  search on the play store throws up dozens of Narendra Modi apps, some  even calling themselves fake apps. The original app was published by  Narendramodi.in and Government Of India. But there are scores of other  apps trying to imitate the original.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/NMApp.png" alt="Narendra Modi App" class="image-inline" title="Narendra Modi App" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/NMApp.png" alt="Narendra Modi App" class="image-inline" title="Narendra Modi App" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh, who is Policy Director at The Centre for Internet and Society, also questioned how users can differentiate between fake and genuine apps when even the official app was registered using a gmail address. While the Government of India Narendra Modi app has been published using info@narendramodi.press, the one by Narendramodi.in has been published using a simple Gmail app. He also highlighted how the play store was flooded with fake banking apps, with one such “SBI app” gaining full access to the user’s files. Incidentally, the fake Modi Ki Note app which has been in the limelight since the demonetisation on high value notes and issue of new ones itself has many duplicates.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the last two days, the Congress and its vice-president Rahul Gandhi fell victim to hacking as their verified Twitter accounts were compromised. Profane content was shared from both accounts, targeting the Gandhi and his family. This lead to the Congress questioning Prime Minister Narendra Modi’s digital India push as security remains a huge concern.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/indian-express-december-2-2016-fake-narendra-modi-apps-aplenty-but-it-is-up-to-users-to-protect-themselves'&gt;https://cis-india.org/internet-governance/news/indian-express-december-2-2016-fake-narendra-modi-apps-aplenty-but-it-is-up-to-users-to-protect-themselves&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-10T04:24:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hrbdt-and-cis-august-31-2021-facial-recognition-technology-in-india">
    <title>Facial Recognition Technology in India </title>
    <link>https://cis-india.org/internet-governance/blog/hrbdt-and-cis-august-31-2021-facial-recognition-technology-in-india</link>
    <description>
        &lt;b&gt;The Human Rights, Big Data and Technology Project, University of Essex, UK and the Centre for Internet &amp; Society (CIS) have jointly published a research paper on facial recognition technology. Authors, Elonnai Hickok, Pallavi Bedi, Aman Nair and Amber Sinha, examine technological tools such as CCTV and FRT which are increasingly being deployed by the government.&lt;/b&gt;
        &lt;h3&gt;Executive Summary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Over the past two decades there has been a sustained effort at digitising India’s governance structure in order to foster development and innovation. The field of law enforcement and safety has seen significant change in that direction, with technological tools such as Closed Circuit Television (CCTV) and Facial Recognition Technology (FRT) increasingly being deployed by the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet for all its increased use, there is still a lack of a coherent legal and regulatory framework governing FRT in India. Towards informing such a framework, this paper seeks to document present uses of FRT in India, specifically by  law enforcement agencies and central and state governments, understand the applicability of existing legal frameworks to the use of FRT, and define key areas that need to be addressed when using the technology in India. We also briefly look at how the coverage of FRT has increased beyond law enforcement; it now covers educational institutions, employment purposes, and it is now being used for providing Covid-19 vaccines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We begin by examining use cases of FRT systems by various divisions of central and state governments. In doing so, it becomes apparent that there is a lack of uniform standards or guidelines at either the state or central level - leading to different FRT systems having differing standards of applicability and scope of use.  And while the use of such systems seems to be growing at a rapid rate, questions around their legality persist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unclear whether the use of FRT is compliant with the fundamental right to privacy as affirmed by the Supreme Court in 2017 in &lt;i&gt;Puttaswamy&lt;/i&gt;. While the right to privacy is not an absolute right, for the state to curtail this right, the restrictions will have to comply with a three-fold requirement— first, being the need for explicit legislative mandate in instances where the government looks to curtail the right. However, the FRT systems we have analysed do not have such a mandate and are often the result of administrative or executive decisions with no legislative blessing or judicial oversight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We further locate the use of FRT technology within the country’s wider legislative, judicial and constitutional frameworks governing surveillance. We also briefly articulate comparative perspectives on the use of  FRT in other jurisdictions. We further analyse the impact of the proposed Personal Data Protection Bill on the deployment of FRT. Finally, we propose a set of recommendations to develop a path forward for the technology’s use which include the need for a comprehensive legal and regulatory framework that governs the use of FRT. Such a framework must take into consideration the necessity of use, proportionality, consent, security, retention, redressal mechanisms, purpose limitation, and other such principles. Since the use of FRT in India is also at a nascent stage, it is imperative that there is greater public research and dialogue into its development and use to ensure that any harms that may arise in the field are mitigated.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click to download the entire &lt;a href="https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf" class="external-link"&gt;research paper here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hrbdt-and-cis-august-31-2021-facial-recognition-technology-in-india'&gt;https://cis-india.org/internet-governance/blog/hrbdt-and-cis-august-31-2021-facial-recognition-technology-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Pallavi Bedi, Aman Nair and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facial Recognition</dc:subject>
    

   <dc:date>2021-09-02T16:21:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf">
    <title>Facial Recognition Technology in India</title>
    <link>https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf'&gt;https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Pallavi Bedi, Aman Nair and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facial Recognition</dc:subject>
    

   <dc:date>2021-09-02T16:17:44Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-aug-1-2013-kim-arora-facebook-limiting-access-to-social-media-can-restrict-freedom-of-speech">
    <title>Facebook: Limiting access to social media can restrict freedom of speech</title>
    <link>https://cis-india.org/news/the-times-of-india-aug-1-2013-kim-arora-facebook-limiting-access-to-social-media-can-restrict-freedom-of-speech</link>
    <description>
        &lt;b&gt;In its counter-affidavit to the PIL in the Delhi high court, Facebook has argued that limiting access to social media can limit an individual's freedom of speech and expression.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Kim Arora's article was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-08-01/social-media/40960807_1_the-pil-social-media-other-social-networking-sites"&gt;published in the Times of India&lt;/a&gt; on August 1, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The PIL, among other things, deals with the issue of minors  accessing Facebook services, arguing that under the Indian Contract Act  1872, minors can't enter into a contract. The PIL will be heard next on  Friday.&lt;/span&gt;&lt;/p&gt;
&lt;div class="mod-articletext mod-timesofindiaarticletext mod-timesofindiaarticletextwithadcpc" id="mod-a-body-after-first-para" style="text-align: justify; "&gt;
&lt;p&gt;Last year, the UN Human Rights Council had passed a &lt;a href="http://timesofindia.indiatimes.com/topic/Resolution"&gt;resolution&lt;/a&gt; declaring access to Internet as a human right. Facebook has argued  making a similar point for access to social media. "The Internet is  increasingly becoming a platform for citizens including minors to  interact and voice their opinions and, therefore, a meaningful  interpretation of the right to freedom of speech and expression would  include the freedom to access social media," the counter-affidavit says.&lt;/p&gt;
&lt;p&gt;"It can be argued that in a technologically mediated society, social  media and communication infrastructure is essential to exercise freedom  of expression," says Sunil Abraham, director, Bangalore-based Center for  Internet and Society.&lt;/p&gt;
&lt;p&gt;Cyber lawyer Pavan Duggal sees it as  "hyperbole". "The issue still remains that a minor doesn't have the  capacity to act under the Contract Act," he says. Lawyers say that if a  contract is entered into for free service in exchange of personal  information, it is a "consideration" (like cash or kind) under the  Indian Contract Act 1872. The Act says, "All agreements are contracts if  they are made by the free consent of parties competent to contract, for  a lawful consideration and with a lawful object, and are not hereby  expressly declared to be void." It then lists minors as incompetent to  contract, and says, "The agreement, if any party is minor, is void ab  initio." However, Abraham points out that "It is not an offence to enter  a void contract."&lt;/p&gt;
&lt;p&gt;To weed out fake profiles and children's  profiles, the PIL, filed by former RSS ideologue K N Govindacharya,  argues that "obligation is cast upon Facebook and other social  networking sites to verify the authenticity of each and every  subscribers (sic) which is mandatory for Mobile companies in  telecommunication sector.&lt;/p&gt;
&lt;p&gt;Mumbai-based professor of law Saurav  Datta feels this sort of authentication could have serious privacy  implications. "There is no way they can verify users without impinging  on their privacy. The goal of the PIL is wrong. We need to protect  children, not keep people out," says Datta.&lt;/p&gt;
&lt;p&gt;Abraham says that a possible way to deal with this can be on the lines of Canadian privacy law where a &lt;a href="http://timesofindia.indiatimes.com/topic/Privacy-Commissioner"&gt;privacy commissioner&lt;/a&gt; can raise such concerns with the service provider directly.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-aug-1-2013-kim-arora-facebook-limiting-access-to-social-media-can-restrict-freedom-of-speech'&gt;https://cis-india.org/news/the-times-of-india-aug-1-2013-kim-arora-facebook-limiting-access-to-social-media-can-restrict-freedom-of-speech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-08T04:07:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access">
    <title>Facebook, Google deny spying access</title>
    <link>https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access</link>
    <description>
        &lt;b&gt;The CEOs of Facebook and Google on Saturday categorically denied that the US National Security Agency had "direct access" to their company servers for snooping on Gmail and Facebook users. But both acknowledged that the companies complied with the 'lawful' requests made by the US government and shared user data with sleuths.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Javed Anwer was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-06-09/internet/39849496_1_facebook-ceo-mark-zuckerberg-user-data-ceo-larry-page"&gt;published in the Times of India&lt;/a&gt; on June 9, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a post titled "What the ...?" Google's official blog, CEO &lt;a href="http://timesofindia.indiatimes.com/topic/Larry-Page"&gt;Larry Page&lt;/a&gt; wrote, "We have not joined any program that would give the US  governmentâ€”or any other governmentâ€”direct access to our servers. We  had not heard of a program called PRISM until yesterday."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few hours later, Facebook CEO &lt;a href="http://timesofindia.indiatimes.com/topic/Mark-Zuckerberg"&gt;Mark Zuckerberg&lt;/a&gt; responded. "Facebook is not and has never been part of any program to  give the US or any other government direct access to our servers... We  hadn't even heard of PRISM before yesterday," he wrote on his page at  the social media site.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a few PowerPoint slides  allegedly leaked by an NSA official, nine technology companies - Google,  AOL, Apple, Yahoo, Microsoft, Skype, Facebook, YouTube and PalTalk -  are providing the US government easy access to user data. While all  companies have denied being part anything called PRISM, Facebook and  Google have been most vocal about it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few hours after Facebook  and Google statements, the New York Times said in a report that  technology companies had "opened discussions with national security  officials about developing technical methods to more efficiently and  securely share the personal data of foreign users".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"In some cases, they (companies) changed their computer systems to do so," noted the NYT report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The statements by the CEOs have done little to allay privacy fears.  "The denials from the companies look highly coordinated, including  similar phrases in all their responses. I don't think they are lying  outright, though the NYT report suggests that they are telling a  half-truth. They may not provide the US government 'direct access' to  all their servers, but may be providing indirect access, or may just be  responding to very broad FISA orders," said Pranesh Prakash, a policy  director with Centre for Internet and Society in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Friday US president &lt;a href="http://timesofindia.indiatimes.com/topic/Barack-Obama"&gt;Barack Obama&lt;/a&gt; had tacitly acknowledged NSA surveillance programmes aimed at non-US  citizens. "You can't have a hundred per cent security and also then have  a hundred per cent privacy and zero inconvenience. You know, we're  going to have to make some choices as a society," he told reporters in  the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Page and Zuckerberg also called on the governments to be  more open about surveillance programmes. "The level of secrecy around  the current legal procedures undermines the freedoms we all cherish,"  wrote Page.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Added Zuckerberg, "We strongly encourage all  governments to be much more transparent about all programs aimed at  keeping the public safe. It's the only way to protect everyone's civil  liberties and create the safe and free society we all want over the long  term."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access'&gt;https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-07-02T10:18:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/geetika-mantri-june-14-2019-the-news-minute-facebook-to-pay-indians-to-give-up-privacy">
    <title>Facebook to pay Indians to give up privacy: Experts raise questions</title>
    <link>https://cis-india.org/internet-governance/news/geetika-mantri-june-14-2019-the-news-minute-facebook-to-pay-indians-to-give-up-privacy</link>
    <description>
        &lt;b&gt;Facebook has launched a voluntary, opt-in program, which monetarily compensates users in exchange for their data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Geetika Mantri was published in the &lt;a class="external-link" href="https://www.thenewsminute.com/article/facebook-pay-indians-give-privacy-experts-raise-questions-103632"&gt;Newsminute&lt;/a&gt; on June 14, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;On June 11, 2019, Facebook announced ‘Study,’ its market research app for Android users in US and India, which pays users who allow it to monitor how they use the applications on their phone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Study app will collect data on the apps installed on a participant’s phone, the amount of time spent using those apps, the participant’s country, device and network type and app activity names, which may show Facebook the names of app features the participants are using. It promises not to collect user IDs, passwords, or any of the participant’s content, such as photos, videos or messages and has assured that the information will neither be sold to third parties nor used to target ads. Facebook says it also won’t add the data collected to the user’s Facebook account if they have one. Read more about it &lt;a href="https://newsroom.fb.com/news/2019/06/study-from-facebook/" target="_blank"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s clear that this is a voluntary, opt-in program, which monetarily compensates users in exchange for them giving up some of their privacy. A Facebook spokesperson told TNM that the payments will be made on a monthly basis through PayPal, but the amount and the rate were not disclosed. “Our partner, Applause, will handle all compensation,” Facebook said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And while experts point out that Facebook is certainly not the first company that wants to do market research by collecting user data, the new proposal raises some pertinent questions about privacy and consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Not illegal, but what’s the end goal?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is clear that market research apps invade people’s privacy,” states Pranesh Prakash, a fellow at the Centre for Internet and Society. “However, asking people to opt-in for market research is not uncommon. And if consent is given, it is legal. There is nothing wrong with people participating in this as long as they are aware.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That being said, Pranesh also points out that in many cases, market research such as this has led to useful insights about user behaviour and can contribute to public policy as well. However, in Facebook’s case, it is likely that the findings will be used internally and will not be made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When asked about the purpose of this data collection, Facebook said it was to make better products.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Like many companies, we use market research to help us understand trends and build better products. This information is incredibly important to us because knowing how people use apps helps us prioritise and build better experiences for people,” a Facebook spokesperson said, adding that they are maintaining complete transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;No strong data privacy laws in India&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there is a requirement for participants to consent to share data with Study app, what makes Indian users vulnerable is that the country does not strong data privacy laws. The Data Privacy Bill 2018, modelled on the General Data Protection Regulations (GDPR) of the European Union, is yet to become a law and is &lt;a href="https://www.thenewsminute.com/article/few-limits-govt-use-personal-info-data-protection-bill-has-experts-worried-85610" target="_blank"&gt;riddled with loopholes&lt;/a&gt; in its present form.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nitish Chandan, a cyber-security specialist, points out that though the Supreme Court deemed privacy a fundamental right of Indian citizens last year, the jurisprudence itself has not evolved – no major company or entity has been punished so far for a data breach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Had the Data Protection Bill been passed, there would have been a clear mandate for companies who want to process personal data as well as purpose limitation, meaning they can only process data for certain purposes and not others,” Nitish says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://www.thenewsminute.com/sites/all/var/www/images/Study-screenshot2.jpg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And while the data collection is legal because consent is obtained, Nitish points out a strong data protection law would have barred from it being used for unethical purposes such as mass profiling. The Data Protection Bill for instance, under section 33 (1), bars large-scale profiling or any processing which carries the risk of “significant harm to data principles” unless the data fiduciary undertakes a data protection impact assessment in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, while purpose limitation breaches can be picked up by watchdogs, common people are unlikely to realise this and read the fine print, Nitish adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;What conditions is consent being sought in?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nayantara R, Programme Manager–Freedom of Expression at the Internet Democracy Project, tells TNM that Facebook’s decision to launch Study raises some very important questions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"With calls for informed consent while giving away data, something like Study seems to satisfy many requirements. The app will clearly state what data is collected when a user opens it, etc. But the problem is approaching consent in an individualised manner, without questioning if there are structural conditions that enable giving consent. A useful parallel to draw is conversations on consent in the context of sexual relations. We question the power dynamics and surrounding circumstances in the giving of consent there. The Study app is a good case to confront what is the kind of consent we are after," she explains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nayantara argues that consent has to be situated in the larger ecosystem of power play. The situation is made complex by the monetary incentive. If a person needs the money and therefore consents to give up their privacy to a large company – how freely is that consent given? And is it a fair trade?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“These questions don’t have easy answers but are the conversations that we need to start having,” Nayantara states. “This is not so much about whether Facebook's motives are bad. The more important question it raises is about the demands that civil society has been making: consent, compensation in exchange for the labour on platforms etc,” she observes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Facebook spokesperson’s response indicated that the company has been aware of these debates and demands: “We’ve learned that what people expect when they sign up to participate in market research has changed and we’ve built this app to match those expectations.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Not Facebook’s first time collecting data&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not the first time that Facebook has launched an app for market research – its now-defunct Research app, launched in 2016, was rolled back after an investigation by &lt;a href="https://techcrunch.com/2019/02/01/facebook-google-scandal/" target="_blank"&gt;Tech Crunch&lt;/a&gt; that revealed the app had violated Apple’s policies. The app had asked users to download a VPN onto their devices, ‘trust’ it (requiring users to give it permission), and could, if it wanted, access personal information of users, including private messages on social media apps, chats from instant messaging apps (inclusive of photos and videos), emails, web browsing history and even the present location of the person, by tapping into another app using the location feature.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This app – that also paid users up to $20 per month in gift cards to share their data – came under even more fire because it didn’t just target adults. People from age 13 to age 35 were eligible to download this app. Investigations also revealed that Facebook had ended up &lt;a href="https://techcrunch.com/2019/06/12/facebook-project-atlas-research-apple-banned/" target="_blank"&gt;collecting&lt;/a&gt; some non-targeted data as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, it also bought the Onavo Protect app in 2014, which projected itself as a privacy app providing free VPN to users and allowing them to minimise their data plan usage. However, the app was collecting information on users, providing Facebook with deep analytics about which apps the users were using. The app was eventually discontinued after the data snooping was discovered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook seems to have learnt from these experiences. “We’re offering transparency, compensating all participants and keeping people’s information safe and secure,” a company spokesperson said. However, Tech Crunch &lt;a href="https://techcrunch.com/2019/06/11/study-from-facebook/" target="_blank"&gt;reported&lt;/a&gt;that Study – which is only for users above the age of 18 – too could give Facebook crucial insights into competitors and features it could invest in on its own platforms based on what was popular on other apps users are using.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/geetika-mantri-june-14-2019-the-news-minute-facebook-to-pay-indians-to-give-up-privacy'&gt;https://cis-india.org/internet-governance/news/geetika-mantri-june-14-2019-the-news-minute-facebook-to-pay-indians-to-give-up-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Geetika Mantri</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-06-22T04:01:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint">
    <title>Facebook Privacy Design Sprint</title>
    <link>https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint</link>
    <description>
        &lt;b&gt;Pranav Bidare and Saumyaa Naidu participated in the Facebook Privacy Design Sprint on Friday, November 30, 2018.&lt;/b&gt;
        &lt;p&gt;&lt;img src="https://cis-india.org/home-images/FacebookPrivacyDesignSprintInvitation30thNovember.png/@@images/a737a9d8-6924-405e-a31b-45310d2d2a9b.png" alt="Facebook Privacy Design " class="image-inline" title="Facebook Privacy Design " /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint'&gt;https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-04T16:28:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/facebook-data-for-good-delhi">
    <title>Facebook Data for Good in New Delhi</title>
    <link>https://cis-india.org/internet-governance/news/facebook-data-for-good-delhi</link>
    <description>
        &lt;b&gt;When data is shared responsibly with the communities that need it, it can improve well being and save lives. Anubha Sinha participated in a session organized by Facebook on 29 July 2019 at University of Chicago Center in New Delhi.&lt;/b&gt;
        &lt;p&gt;&lt;img src="https://cis-india.org/home-images/DataGood.png/@@images/64cac895-bc00-4b9b-93ce-deb7691a08cb.png" alt="Data for Good" class="image-inline" title="Data for Good" /&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click to &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/data-for-good"&gt;download the brochure&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/facebook-data-for-good-delhi'&gt;https://cis-india.org/internet-governance/news/facebook-data-for-good-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-07-31T02:10:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/facebook-data-for-good-in-bangalore">
    <title>Facebook Data for Good in Bangalore</title>
    <link>https://cis-india.org/internet-governance/news/facebook-data-for-good-in-bangalore</link>
    <description>
        &lt;b&gt;When data is shared responsibly with the communities that need it, it can improve well being and save lives. Shweta Mohandas participated in a session organized by Facebook on 25 July 2019 at Indian Institute of Science in Bangalore.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/DataGoodBangalore.png" alt="Data for Good Bangalore" class="image-inline" title="Data for Good Bangalore" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/facebook-data-for-good-in-bangalore'&gt;https://cis-india.org/internet-governance/news/facebook-data-for-good-in-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-07-31T02:14:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-march-20-2018-surabhi-agarwal-devina-sengupta-facebook-breach-privacy-advocates-in-india-seek-stronger-data-laws">
    <title>Facebook breach: Privacy advocates in India seek stronger data laws </title>
    <link>https://cis-india.org/internet-governance/news/economic-times-march-20-2018-surabhi-agarwal-devina-sengupta-facebook-breach-privacy-advocates-in-india-seek-stronger-data-laws</link>
    <description>
        &lt;b&gt;Privacy advocates in India underlined the urgent need for stronger data privacy laws in India with the debate coming under focus after reports alleged that British data analysis firm Cambridge Analytica had tapped into the profiles of more than 50 million Facebook users, without their permission, during the last US elections. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal and Devina Sengupta was &lt;a class="external-link" href="https://economictimes.indiatimes.com/tech/internet/facebook-breach-privacy-advocates-in-india-seek-stronger-data-laws/articleshow/63374930.cms"&gt;published in the Economic Times&lt;/a&gt; on March 20, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Advocates of data privacy told ET that even in India — where issues around data privacy have been on the boil — voter opinion may be targeted by using their personal information without their approval. “The government has not moved with necessary pace on data protection,” said advocate Apar Gupta.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Election commission (EC) has not taken up this issue of data protection for regulatory scrutiny. EC has in the past issued guidelines to protect election integrity and restrained exit polls and also required candidates to disclose social media handles. However, much more needs to be done,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His concerns around India’s voting process being potentially vulnerable to similar influence like in the US come amid a “case study” on the Cambridge Analytica website said the company had worked for Indian political parties as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It said that the British firm was “contracted to undertake an indepth electorate analysis for the Bihar Assembly Election in 2010…Our client achieved a landslide victory, with over 90% of total seats targeted by CA being won”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Media reports quoted sources at Cambridge Analytica, and its Indian partner, Oveleno Business Intelligence, as saying that the local company was in talks with leading Indian political parties for a pact for their 2019 parliamentary poll campaigns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This shows integrity of elections and voter trust may be undermined through data analytics and target voters on the basis of their personal data,” said Gupta Pranesh Prakash, policy director at Center for Internet and Society, said India urgently needs a strong data protection regulation, that require companies to have oversight and pin liabilities on them if they fail to have oversight over data they transact with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“So, in this case for instance, the companies that provided Cambridge Analytica DATA are seriously culpable and Facebook --right now it is unclear if under any current law it is culpable --there are some discussions in the US etc. Regardless of it, they should be required to exercise greater diligence when it comes to personable data that they have taken consent for,” said Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Protecting people’s information is at the heart of everything we do, and we require the same from people who operate apps on Facebook. If these reports are true, it's a serious abuse of our rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All parties involved — including the SCL Group/Cambridge Analytica, Christopher Wylie and Aleksandr Kogan — certified to us that they destroyed the data in question. In light of new reports that the data was not destroyed, we are suspending these three parties from Facebook, pending further information. We will take whatever steps are required to see that the data in question is deleted once and for all —and take action against all offending parties.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a statement to ET, Facebook said there was no breach of its data base and that protecting people’s information was core to the company. “Like all app developers, Aleksandr Kogan requested and gained access to information from users who chose to sign up to his app, and everyone involved gave their consent. People knowingly provided their information, no systems were infiltrated, and no passwords or sensitive pieces of information were stolen or hacked,” Paul Grewal, VP &amp;amp; Deputy General Counsel, Facebook said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-march-20-2018-surabhi-agarwal-devina-sengupta-facebook-breach-privacy-advocates-in-india-seek-stronger-data-laws'&gt;https://cis-india.org/internet-governance/news/economic-times-march-20-2018-surabhi-agarwal-devina-sengupta-facebook-breach-privacy-advocates-in-india-seek-stronger-data-laws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-03-20T23:37:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech">
    <title>Facebook and its Aversion to Anonymous and Pseudonymous Speech</title>
    <link>https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech</link>
    <description>
        &lt;b&gt;Jessamine Mathew explores Facebook's "real name" policy and its implications for the right to free speech. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The power to be unidentifiable on the internet has been a major reason for its sheer number of users. Most of the internet can now be freely used by anybody under a pseudonym without the fear of being recognised by anybody else. These conditions allow for the furtherance of free expression and protection of privacy on the internet, which is particularly important for those who use the internet as a medium to communicate political dissent or engage in any other activity which would be deemed controversial in a society yet not illegal. For example, an internet forum for homosexuals in India, discussing various issues which surround homosexuality may prove far more fruitful if contributors are given the option of being undetectable, considering the stigma that surrounds homosexuality in India, and the recent setting-aside of the Delhi High Court decision reading down Section 377 of the Indian Penal Code. The possibility of being anonymous or pseudonymous exists on many internet fora but on Facebook, the world’s greatest internet space for building connections and free expression, there is no sanction given to pseudonymous accounts as Facebook follows a real name policy. And as the &lt;a href="http://www.nytimes.com/2014/06/27/technology/facebook-battles-manhattan-da-over-warrants-for-user-data.html?_r=0"&gt;recent decision&lt;/a&gt; of a New York judge, disallowing Facebook from contesting warrants on private information of over 300 of its users, shows, there are clear threats to freedom of expression and privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the subject of using real names, Facebook’s Community Standards states, “Facebook is a community where people use their real identities. We require everyone to provide their real names, so you always know who you're connecting with. This helps keep our community safe.” Facebook’s Marketing Director, Randi Zuckerberg, &lt;a href="http://www.dailymail.co.uk/news/article-2019544/Facebook-director-Randi-Zuckerberg-calls-end-internet-anonymity.html"&gt;bluntly dismissed&lt;/a&gt; the idea of online anonymity as one that “has to go away” and that people would “behave much better” if they are made to use their real names. Apart from being a narrow-minded statement, she fails to realise that there are many different kinds of expression on the internet, from stories of sexual abuse victims to the views of political commentators, or indeed, whistleblowers, many of whom may prefer to use the platform without being identified. It has been decided in many cases that humans have a right to anonymity as it provides for the furtherance of free speech without the fear of retaliation or humiliation (&lt;i&gt;see &lt;/i&gt;Talley v. California).&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Facebook’s rationale behind wanting users to register for accounts with their own names is based on the goal of maintaining the security of other users, it is still a serious infraction on users’ freedom of expression, particularly when anonymous speech has been protected by various countries. Facebook has evolved from a private space for college students to connect with each other to a very public platform where not just social connections but also discussions take place, often with a heavily political theme. Facebook has been described as &lt;a href="http://www.thenational.ae/news/uae-news/facebook-and-twitter-key-to-arab-spring-uprisings-report"&gt;instrumental&lt;/a&gt; in the facilitation of communication during the Arab Spring, providing a space for citizens to effectively communicate with each other and organise movements. Connections on Facebook are no longer of a purely social nature but have extended to political and legal as well, with it being used to promote movements all through the country. Even in India, Facebook was the &lt;a href="http://timesofindia.indiatimes.com/home/news/Facebook-Twitter-Google-change-face-of-Indian-elections/articleshow/34721829.cms"&gt;most widely adopted medium&lt;/a&gt;, along with Twitter and Facebook, for discourse on the political future of the country during, before and after the 2014 elections. Earlier in 2011, Facebook was &lt;a href="https://cis-india.org/news/web2.0-responds-to-hazare"&gt;used intensively&lt;/a&gt; during the India Against Corruption movement. There were pages created, pictures and videos uploaded, comments posted by an approximate of 1.5 million people in India. In 2012, Facebook was also used to &lt;a href="http://timesofindia.indiatimes.com/tech/social-media/Delhi-gang-rape-case-FacebookTwitter-fuels-rally-at-India-Gate/articleshow/17741529.cms"&gt;protest against the Delhi gang rape&lt;/a&gt; with many coming forward with their own stories of sexual assault, providing support to the victim, organising rallies and marches and protesting about the poor level of safety of women in Delhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much like its content policy, Facebook exhibits a number of discrepancies in the implementation of the anonymity ban. Salman Rushdie found that his Facebook account had been &lt;a href="http://www.nytimes.com/2011/11/15/technology/hiding-or-using-your-name-online-and-who-decides.html?pagewanted=all&amp;amp;_r=0"&gt;suspended&lt;/a&gt; and when it was reinstated after he sent them proof of identity, Facebook changed his name to the name on his passport, Ahmed Rushdie instead of the name he popularly goes by. Through a series of tweets, he criticised this move by Facebook, forcing him to display his birth name. Eventually Facebook changed his name back to Salman Rushdie but not before serious questions were raised regarding Facebook’s policies. The Moroccan activist Najat Kessler’s account was also &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=5&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0CD8QFjAE&amp;amp;url=http%3A%2F%2Fjilliancyork.com%2F2010%2F04%2F08%2Fon-facebook-deactivations%2F&amp;amp;ei=O1KxU-fwH8meugSZ74HgAg&amp;amp;usg=AFQjCNE7oUt2dyrSjpTskK7Oz3Q1OYXudg&amp;amp;sig2=bsOu46nmABTUhArhdjDCVw&amp;amp;bvm=bv.69837884,d.c2E"&gt;suspended&lt;/a&gt; as it was suspected that she was using a fake name. Facebook has also not just stopped at suspending individual user accounts but has also removed pages and groups because the creators used pseudonyms to create and operate the pages in question. This was seen in the case of Wael Ghonim who created a group which helped in mobilizing citizens in Egypt in 2011. Ghonim was a Google executive who did not want his online activism to affect his professional life and hence operated under a pseudonym. Facebook temporarily &lt;a href="http://www.newsweek.com/how-wael-ghonim-sparked-egypts-uprising-68727"&gt;removed&lt;/a&gt; the group due to his pseudonymity but later reinstated it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Facebook performs its due diligence when it comes to some accounts, it has still done nothing about the overwhelmingly large number of obviously fake accounts, ranging from Santa Claus to Jack the Ripper. On my own Facebook friend list, there are people who have entered names of fictional characters as their own, clearly violating the real name policy. I once reported a pseudonymous account that used the real name of another person. Facebook thanked me for reporting the account but also said that I will “probably not hear back” from them. The account still exists with the same name. The redundancy of the requirement lies in the fact that Facebook does not request users to upload some form identification when they register with the site but only when they suspect them to be using a pseudonym. Since Facebook also implements its policies largely only on the basis of complaints by other users or the government, the real name policy makes many political dissidents and social activists the target of abuse on the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, Articles 21 and 22 of the ICCPR grant all humans the right to free and peaceful assembly. As governments increasingly crack down on physical assemblies of people fighting for democracy or against legislation or conditions in a country, the internet has proved to be an extremely useful tool for facilitating this assembly without forcing people to endure the wrath of governmental authorities. A large factor which has promoted the popularity of internet gatherings is the way in which powerful opinions can be voice without the fear of immediate detection. Facebook has become the coveted online space for this kind of assembly but their policies and more particularly, faulty implementation of the policies, lead to reduced flows of communication on the site.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, Facebook’s fears of cyberbullying and harassment are likely to materialise if there is absolutely no check on the identity of users.  A possible solution to the conflict between requiring real names to keep the community safe and still allowing individuals to be present on the network without the fear of identification by anybody would be to ask users to register with their own names but still allowing them to create a fictional name which would be the name that other Facebook users can see. Under this model, Facebook can also deal with the issue of safety through their system of reporting against other users. If a pseudonymous user has been reported by a substantial number of people for harassment or any other cause, then Facebook may either suspend the account or remove the content that is offensive. If the victim of harassment chooses to approach a judicial body, then Facebook may reveal the real name of the user so that due process may be followed. At the same time, users who utilise the website to present their views and participate in the online process of protest or contribute to free expression in any other way can do so without the fear of being detected or targeted.  Safety on the site can be maintained even without forcing users to reveal their real names to the world. The system that Facebook follows currently does not help curb the presence of fake accounts and neither does it promote completely free expression on the site.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech'&gt;https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Jessamine Mathew</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Anonymity</dc:subject>
    
    
        <dc:subject>Pseudonimity</dc:subject>
    
    
        <dc:subject>Article 19(1)(a)</dc:subject>
    

   <dc:date>2014-07-04T07:53:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/mumbai-mirror-tariq-engineer-october-2-2016-eye-on-mumbai">
    <title>Eye on Mumbai</title>
    <link>https://cis-india.org/internet-governance/news/mumbai-mirror-tariq-engineer-october-2-2016-eye-on-mumbai</link>
    <description>
        &lt;b&gt;The feeds will be beamed to a video wall that stretches 21 feet across at the police’s command and control room.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Tariq Engineer was &lt;a href="http://www.mumbaimirror.indiatimes.com/mumbai/cover-story/Eye-on-Mumbai/articleshow/54634572.cms"&gt;published           in Mumbai Mirror&lt;/a&gt; today. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;When seven bombs exploded on local trains between Khar and         Borivali killing 209 people and injuring 714 in 2006, the         Maharashtra police looked for CCTV footage but couldn’t find any         because no cameras existed at railway stations back then.&lt;br /&gt; &lt;br /&gt; When terrorists landed near Machimar colony in Cuffe Parade in         2008 and proceeded to slaughter hundreds of people in the city,         CCTV footage was found only at the Taj and Trident hotels,         Chhatrapati Shivaji Terminus and near the Times of India         building. Places like Cama Hospital, Nariman House and Leopold         Café were simply off the grid.&lt;br /&gt; &lt;br /&gt; When Mumbai journalist J Dey was gunned down in Powai in 2011,         the police obtained CCTV footage from a shopping centre nearby         but it was so blurry, it was useless.&lt;br /&gt; &lt;br /&gt; In each of these situations, a fully functioning high-definition         CCTV system could have altered the outcome or aided the         investigation in critical ways. That glaring gap in Mumbai’s         security has now been filled by the Mumbai City Surveillance         Project, which officially goes live today.&lt;br /&gt; &lt;br /&gt; Over the last 20 months, a total of 4697 cameras have been         installed at 1510 locations around Mumbai city. In addition to         these, another 146 will survey the Bandra Kurla Complex. The         tender for the project was issued in 2015 and won by a         consortium led by construction major Larsen &amp;amp; Toubro with         MTNL, CMS Computers and Infinova, which supplied the cameras, as         partners.&lt;br /&gt; &lt;br /&gt; The project is actually an outcome of the 26/11 attacks, having         been recommended by the Ram Pradhan Committee, which was         appointed to evaluate the city administration’s responses to the         terror strike. According to Additional Chief Secretary (Home) KP         Bakshi these cameras will ensure roughly 80 per cent of Mumbsi         will be watched 24 hours a day, seven days a week. The city’s         inhabitants will now have to be on their best behaviour.&lt;br /&gt; &lt;br /&gt; “It was the police’s call to decide what they want to observe,”         Bakshi said. “Do they want to look at the traffic or at a place         where people gamble or do a lot of drinking?” The policeman in         charge of selection of spots for installation of cameras was         former additional commissioner of police Vasant Dhoble. Calling         him a “game-changer”, one of the project managers said it was         thanks to Dhoble that all the locations were surveyed in just         twoand-a-half months. Dhoble was also instrumental in ensuring         that the cameras were installed at the appropriate angles.&lt;br /&gt; &lt;br /&gt; While the initial estimate was for 6,000 cameras, it was         eventually determined that 4,697 were sufficient at this stage.         The cameras have been placed on poles similar to street lights —         2290 of them — some with multiple cameras. “Let’s say there is a         pole at Haji Ali Juice Center,” Bakshi said. “It may have three         cameras — one looking towards Heera Panna, the other looking         towards Mahalaxmi, the third looking towards Worli.”&lt;br /&gt; &lt;br /&gt; The vast majority of the cameras — roughly 4200 — will be fixed         and stare unblinkingly in one direction. The other 500 will be         PTZ, or pan/tilt/zoom cameras, so those watching can scan an         area or take a closer look at something that seems suspicious.         All of the cameras can see in high definition, with visibility         ranging from 50m to 120m. Some of them also have thermal imaging         and night vision.&lt;br /&gt; &lt;br /&gt; According to those involved in the project, the cameras have         been built to withstand the rigours of Mumbai’s weather —         specifically the heat and rain. Larsen &amp;amp; Toubro and CMS         Computers are responsible for the maintenance of the system.         Once the system is fully operational, the target is to have 99%         of the cameras live at all times barring accidents. The         responsibility for this lies with the service providers.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;A           smart system&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; The software that runs the cameras includes a Picture         Intelligence Unit (PIU) that will conduct facial recognition         analysis. If there is an image of a wanted person in the         database, the program will scan the footage for matches and send         a signal if it finds any. It will also send an alert if it         notices a suspicious object, say one that has been left         unattended for a pre-specified amount of time, so the cops can         check it out. Tracking police vehicles — like you can follow the         path of an Uber or Ola — is yet another feature, so if there is         trouble, the nearest vehicle can be dispatched.&lt;br /&gt; &lt;br /&gt; By Bakshi’s reckoning, if it is a small crime, then the police         should be on the scene in five to ten minutes. If it is         something like a bomb blast, then a Quick Response Team will be         deployed, which will take a little longer – say 10 to 15         minutes.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Who           will be watching you?&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; The feeds from these cameras will be fed to a video wall that         stretches 21 feet across in a control room that has been set up         in the Commissioner of Police Headquarters at Crawford Market.         The footage will be monitored by about 20 observers who have         been specially trained for the job.&lt;br /&gt; &lt;br /&gt; However, a project manager said, watching the wall for more than         eight minutes “would make anyone mad” because it is so chaotic.         Therefore, each observer has his own workstation with three         computer screens where he can only watch the feeds he has been         assigned.&lt;br /&gt; &lt;br /&gt; Entry to the control room is also strictly monitored. It         requires five fingerprint access just to get in the room and a         thumb print to turn individual workstations on. Mobile phones         and personal effects are banned and the computers have no USB         ports, so data can’t be copied.&lt;br /&gt; &lt;br /&gt; In addition, there are viewing screens in each of the additional         commissioner’s zonal offices and in all 23 police stations and         roughly 200 observers will eventually be required to operate         them. A project manager said he hoped to have a 60-40 or 50-50         split between male and female observers. The observers are         monitored by the police, who will decide what actions to take         depending on what alerts are generated.&lt;br /&gt; &lt;br /&gt; The manpower is being provided by CMS Computers, with applicants         having their resumes verified by the police. Observers will         spend anywhere from four to six weeks in training before they         get on the job, one of the project managers said.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Keeping           the data secure&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; The images from the standard cameras will be stored for 90 days,         while those taken with PTZ cameras will be stored for 30 days.         “If you store for longer periods, it involves more cost,” Bakshi         said. “We feel that if something has to be reported to us, it         will be reported within 90 days.”&lt;br /&gt; &lt;br /&gt; MTNL has set up a data centre in Worli and a disaster recovery         centre in Belapur. If something goes wrong in Worli, there will         still be connectivity via Belapur. Both centres have been         “tied-up” to make the data as safe as possible. At the test lab         at Larsen &amp;amp; Toubro’s project headquarters in Mallet Bunder,         they even have a rodent detection device that broadcasts an         ultrasonic frequency to drive away rats and stop them from         chewing up the wires.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;False           starts&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; The project took some time to get off the ground because getting         the details worked out was a painstaking elaborate process,         former Maharashtra chief secretary ( home) Amitabh Rajan, told         Mumbai Mirror. The committee wanted to make sure everything was         transparent and that there were no allegations against the         project. Control and security were also zealously guarded. “No         compromise on security, not even cost,” Rajan said. “Like         titration in chemistry, we eventually got the right         concentration.”&lt;br /&gt; &lt;br /&gt; There was also a battle between a lobby that wanted the system         to be set up using dedicated fibre optic cables, and a lobby of         technology providers that wanted to use wireless technology. The         cops backed cables, which are not only safer but make it easy to         add additional bandwidth, whereas wireless networks have limited         bandwidth. It was a battle the cops would eventually win but at         the cost of time.&lt;br /&gt; &lt;br /&gt; The tender process didn’t go smoothly either. Larsen and Toubro         were actually the winners of the fourth tender the Maharashtra         government put forward. The first tender had to be cancelled         because the winning consortium had not properly disclosed its         ownership structure — one of the companies turned out to be         controlled by a subsidiary of Reliance Industries. The second         was cancelled when the vendor’s bank guarantee cheque of Rs 2         crore bounced and the owner disappeared. He was eventually found         and arrested two years later.&lt;br /&gt; &lt;br /&gt; The third tender received no bidders because it did not offer         up-front payment for capital expenditure, according to then IT         secretary Rajesh Aggarwal, who was part of the committee. It was         finally on the fourth occasion, when the committee decided to         offer a certain percentage of the project cost at the start and         the rest over the remaining five years as maintenance fees, that         a deal could be sealed.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Coordination           headache&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; The next hurdle was coordinating the work between all the         different organisations that populate Mumbai. The final total         was around 35 or 40 bodies, including the Municipal Corporation         of Greater Mumbai (MCGM), BEST and Reliance Power, the police,         MMRDA, the Government of India and the High Court. “To explain         to everyone that it is a security project and please don’t go by         normal rules, you have to give concessions for all these things,         all this co-ordination was a big job,” Bakshi said.&lt;br /&gt; &lt;br /&gt; It led to delays, which is why the project had to take the         extraordinary step of getting permission from the MCGM to dig up         roads during the monsoon to lay the fibre-optic cables. It was         the only way the project could make its deadline.&lt;br /&gt; &lt;br /&gt; “If we had done it like a normal project, it would have taken         five years,” an engineer said.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;A           question of privacy&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; Two experts in privacy issues that Mirror spoke to said that         such a system is in the public interest, but safeguards must be         built to prevent abuse. “If the data falls into the wrong hands,         it can create havoc,” said Pavan Duggal, an expert in the field         of cyber law. “Large scale surveillance of the public should not         be the norm, it should be the exemption to the norm.” he said.         “It can create unease and lessen the enjoyment of living in a         democratic society.”&lt;br /&gt; &lt;br /&gt; According to Sunil Abraham, director of the Centre for Internet         and Society, the biggest problem is that India does not have an         “omnibus privacy law”.&lt;br /&gt; &lt;br /&gt; Instead, it has about 50 different laws across sectors and         therefore privacy regulations are not consistent, which has         created a legal thicket. “110 countries have passed privacy laws         to European Union standards. India is really far behind,” he         said.&lt;br /&gt; &lt;br /&gt; He also listed a number of principles that he hoped the project         would abide by, such as the principles of notice (CCTV cameras         should be advertised as such), of openness (details of the         system should be made public), security (“if you don’t have         security, you can’t ensure privacy”) and of access (“we should         have a right to get the footage of ourselves”). He also warned         against the footage being shared between different security         agencies without due process.&lt;br /&gt; &lt;br /&gt; Additional Chief Secretary (Home) Bakshi said most of these         principles were part of the system. There would be boards         demarcating the CCTV cameras, the system would be publicly         launched, it was being made as secure as possible and footage         could be handed over depending on the circumstances. “If it is         your own, then no problem,” Bakshi said. “If it is someone         else’s then there are privacy issues. Is it because of criminal         intent or you want to track your girlfriend’s other boyfriend to         see if he is following her? These are issues. If you want yours,         on merit we can give. No issue.”&lt;br /&gt; &lt;br /&gt; Another concern Abraham raised is unique to India and the         Aadhaar card, which uses biometric data as passwords, not         identification. Since the CCTV cameras are high resolution, it         raises the risk of someone recreating your iris or finger prints         from a captured image and then “somebody could empty your         Aadhaarlinked bank accounts,” Abraham said.&lt;br /&gt; &lt;br /&gt; This is not as far-fetched as it sounds. Abraham pointed out         that in 2014 a member of the Chaos Collective Club, the largest         association of hackers in Europe, recreated the finger print of         a German minister from a photograph they took of her hand.&lt;br /&gt; &lt;br /&gt; “Other risks are smaller, a revealing photograph or someone         trying to blackmail you,” Abraham said.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Not           just for crime&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; The camera feed has other applications too, beginning with         traffic management. An automatic number plate recognition system         will be installed as well. If you look around the corner, don’t         see a cop and jump a light, you could still get in trouble.         “6000 [sic] police in the sky are watching you and you will get         a challan sitting at home,” Aggarwal said. Other uses include         tracking of encroachments by the Municipal Corporation of         Greater Mumbai which will have an additional viewing centre.         Also garbage disposal and other civic issues such as water         logging and a subject dear to Mumbai citizens — potholes.         “Somebody complains that this road has a pothole, immediately         you can zoom in and see that yes, there is a pothole on this         road,” Bakshi said.&lt;br /&gt; &lt;br /&gt; There is also a provision to allow a further 103 locations to         plug-in and play. For example, if the Taj Mahal Hotel wants the         police to survey the hotel for a period of time, the hotel’s         CCTV system can be hooked up to the main control room within 48         hours. The same goes for the airport or the railway stations.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Effect           of CCTV surveillance&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; Worldwide the academic literature on CCTV surveillance suggests         its effectiveness, especially on crime prevention, is uncertain         or limited. “Post crime it really, really helps,” Aggarwal said,         “but for prevention, we have to wait and watch. If it reduces         sexual harassment for example, then that is priceless. Time will         tell how people try to beat the system and how the system tries         to catch up.”&lt;br /&gt; &lt;br /&gt; Joint Commissioner of Police, Law and Order, Deven Bharti said         he was already seeing an improvement in traffic management and         in prevention and detection of crimes thanks to the 3000-plus         cameras that were live when Mirror spoke to him two days ago,         though he said he could not provide details. “The system is         working to our satisfaction,” Bharti said.&lt;br /&gt; &lt;br /&gt; Bakshi said the effects of the system should start showing         roughly a month after the project is fully operational. “In         Pune, results started being seen within a month. Once all 4700         [cameras] are live, you will start seeing the results on traffic         violations, street crimes, and at general discipline level.         [First] Let the people know they are under surveillance, that         they are completely covered in Mumbai by CCTV.”&lt;br /&gt; &lt;br /&gt; The total cost of the project is Rs 1008 crore. Out of this,         about Rs 400 crore has already been spent. The balance will be         paid out in regular installments until October 2021. At that         point the Maharashtra government and Mumbai police will take         complete control of the project. “We presume that in five years’         time, we will have enough trained people to run it ourselves,”         Bakshi said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/mumbai-mirror-tariq-engineer-october-2-2016-eye-on-mumbai'&gt;https://cis-india.org/internet-governance/news/mumbai-mirror-tariq-engineer-october-2-2016-eye-on-mumbai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-02T10:22:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-august-23-2016-seetha-extending-aadhaar-to-more-areas-is-a-hare-brained-idea-it-should-be-dropped">
    <title>Extending Aadhaar to more areas is a hare-brained idea, it should be dropped</title>
    <link>https://cis-india.org/internet-governance/news/first-post-august-23-2016-seetha-extending-aadhaar-to-more-areas-is-a-hare-brained-idea-it-should-be-dropped</link>
    <description>
        &lt;b&gt;News reports that the mandatory use of Aadhaar could be extended to a host of new areas are extremely disturbing. According to these reports, the Unique Identification Authority of India (UIDAI) has identified 20 new areas for which Aadhaar can be made mandatory. This includes registration of companies and NGOs, insurance, competitive examinations and property and vehicle registration.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Seetha was published in &lt;a class="external-link" href="http://www.firstpost.com/business/extending-aadhaar-to-more-areas-is-a-hare-brained-idea-it-should-be-dropped-2972182.html"&gt;First Post&lt;/a&gt; on August 23, 2016. CIS article by Pranesh Prakash and Amber Sinha was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;If this happens, then it confirms the worst suspicions of all those who are opposed to Aadhaar – and this spans ideological divides – that it can be used to seriously compromise individual privacy.&lt;/p&gt;
&lt;div class="alignleft wp-caption" id="attachment_2972214" style="float: left; text-align: justify; "&gt;&lt;a href="http://s2.firstpost.in/wp-content/uploads/2016/08/Aadhaar-380.jpg"&gt;&lt;img alt="A villager scanning fingerprint for Aadhaar. Reuters file photo" class="wp-image-2972214 size-full" height="285" src="http://s2.firstpost.in/wp-content/uploads/2016/08/Aadhaar-380.jpg" width="380" /&gt;&lt;/a&gt;
&lt;p class="wp-caption-text"&gt;A villager scanning fingerprint for Aadhaar. Reuters file photo&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The defenders of Aadhaar – mainly the previous and current governments, the UIDAI and Nandan Nilekani, the father of the Aadhaar – have always argued that these concerns are exaggerated. They have pointed out that Aadhaar does not take any details that are not already in the public domain – name, date of birth and permanent address – and that the biometric data is not shared with any of the authorities that seek verification by Aadhaar. That data remains with the UIDAI and it only confirms that a person with a particular Aadhaar number is who he claims he is.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Aadhaar’s opponents have argued that the extensive use of Aadhaar allows disparate bits of information to be linked and this could become a genuine concern if this hare-brained idea gets official approval.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now, there is certainly no doubt that Aadhaar is, in the absence of anything better, the best technological tool for establishing identity. It is not entirely fool-proof – there are issues relating to the fingerprints of manual labourers and iris scan of aged people or those with cataract – a solution needs to be found for this. According to&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/blog/hindustan-times-amber-sinha-pranesh-prakash-march-12-2016-privacy-concerns-overshadow-monetary-benefits-of-aadhaar-scheme" rel="nofollow" target="_blank"&gt;this report&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;by the Centre for Internet and Society, there was fingerprint authentication failure in 290 of 790 ration card holders in Andhra Pradesh who did not lift rations, and there was an ID mismatch in 93 instances. These problems notwithstanding, there is no denying that Aadhaar has helped in significantly containing (perhaps not entirely eliminating) the problem of identity theft for diversion of government doles and other benefits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So making Aadhaar compulsory for such cases is perfectly justifiable. Indeed, the Act giving legal status to Aadhaar is called Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mandatory quoting of Aadhaar can even be justified in the cases where duplication or falsification of identity can be used by criminals or those who fall foul of the law. Passports, for example, can be brought under the ambit of Aadhaar. Or even driving licences. A person whose licence has been suspended for repeated traffic violations should not be allowed to get another one under the same name or an assumed name.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But why should it be mandatory for bank accounts, if an individual is not interested in getting government doles? The quoting of Aadhaar for property transactions also does not make sense. If the idea is to prevent fraudulent transactions, it will not be foolproof. A person intending to sell an already sold property or one he does not own can do so even with an Aadhaar number, since people are allowed to own more than one piece of property. What will prevent this from happening is compulsory registration and digitisation of records as well as mandatory property titling; there has been little progress on both.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When filing of income tax returns is not possible without a PAN, there is little rationale for making Aadhaar mandatory for filing returns and even for PAN. It is not clear how quoting of Aadhaar is going to help in ensuring that fly-by-night companies and NGOs do not get established.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The insistence of Aadhaar on purchase of vehicles, landline and mobile phone connections and demat accounts is seriously violative of individual privacy and has enormous potential for misuse. The Act does give the government unbridled power to access data in the name of national security. This itself is worrying, since it can allow security agencies to go an random fishing expeditions to access personal financial transactions. Making it mandatory for even buying cars and phone connections (even though it is not illegal to own more than one vehicle or telephone connection) makes it even riskier – private agencies get access to one’s Aadhaar number. Forget security agencies, even unscrupulous private persons can track an individual’s personal activities, especially financial transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As it is, investigating agencies want to tap Aadhaar and biometric data at the drop of a hat. The UIDAI had to approach the Supreme Court in 2014 against a Goa High Court order ordering it to share biometric details of everyone enrolled in the state for solving a gang rape case. Even after the Supreme Court ruled in favour of UIDAI, a Kerala special investigation team wanted it to share biometric details to solve another rape case. If Aadhaar now becomes mandatory for a host of financial and other transactions, the points of potential privacy breaches only increase.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move to extend the mandatory use of Aadhaar has to be stopped in its tracks. The mandatory use should be limited to delivery of government welfare benefits and doles (after ensuring that glitches are eliminated) and security-related services like passports. For everything else, it should be purely voluntary. There can be no compromise on this.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-august-23-2016-seetha-extending-aadhaar-to-more-areas-is-a-hare-brained-idea-it-should-be-dropped'&gt;https://cis-india.org/internet-governance/news/first-post-august-23-2016-seetha-extending-aadhaar-to-more-areas-is-a-hare-brained-idea-it-should-be-dropped&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-08-24T03:05:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-june-8-2017-shaikh-zoaib-saleem-explore-money-apps-but-watch-your-data">
    <title>Explore money apps but watch your data</title>
    <link>https://cis-india.org/internet-governance/news/livemint-june-8-2017-shaikh-zoaib-saleem-explore-money-apps-but-watch-your-data</link>
    <description>
        &lt;b&gt;Financial apps may appear to be free but before you install them, read their privacy policies to know what you may be signing away.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shaikh Zoaib Saleem was published in &lt;a class="external-link" href="http://www.livemint.com/Money/qjtm4qje8GP4c9ENPKjP6M/Explore-money-apps-but-watch-your-data.html"&gt;Livemint&lt;/a&gt; on June 8, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="A5l" style="text-align: justify; "&gt;With  the increasing usage of smartphones and other smart devices, our use of  and dependence on mobile applications also increases. These apps, while  being installed on your device, ask for a lot of permissions. Most users  do not take a detailed look at all the permissions being granted to any  particular app’s publisher. Moreover, even fewer users look at the  privacy policies and terms of use of apps, which detail how the  publisher intends to utilize the data you share.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In most cases, the data collected is analysed and used for targeted  marketing campaigns by the apps’ publishers, based on the users’  profiles and habits. Read more about it here: &lt;i&gt;&lt;a href="http://bit.ly/2q3ByA3"&gt;bit.ly/2q3ByA3. &lt;/a&gt;&lt;/i&gt;While  this phenomena is spread across the board for all categories of apps,  we take a look at the privacy policies and terms of use of the top 10  Android financial apps in India (top 10 as of June 1, according to App  Annie, a mobile apps market research company based in California). The  10 apps are: PhonePe, BHIM, SBI Anywhere Personal, Kotak – 811 and  Mobile Banking, JioMoney Wallet, Money View Money Manager, State Bank  Buddy, Bank Balance Check, All Bank Balance Enquiry, iMobile by ICICI  Bank.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Collecting information&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The common  theme across privacy policies of these apps is that the information is  collected to enhance customer experience while using an app, respond to  customer complaints and resolve disputes. Another theme is tracking  consumer behaviour. For instance, PhonePe, in its privacy policy states,  “We may automatically track certain information about you based upon  your behaviour on our app. We use this information to do internal  research on our users’ demographics, interests, and behaviour to better  understand, protect and serve our users. This information is compiled  and analysed on an aggregated basis.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the privacy  policy of BHIM app says, “…once you give us your personal information,  you are not anonymous to us. We may automatically track certain  information about you based upon your behaviour on our app to the extent  we deem fit.” It further adds that if you choose to transact on the  app, then “we collect information about your transaction behaviour.” All  the apps collect some or the other information like device IDs and  location.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Sharing Information&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The  information gathered by the apps is not just used by these companies  themselves, but also shared with third parties, subsidiaries, parent  companies and agents of the companies. iMobile by ICICI Bank, for  instance, in its privacy policy states that the bank will limit the  collection and use of customer information only on a need-to-know basis  to deliver better service to the customers. “ICICI Bank may use and  share the information provided by the customers with its affiliates and  third parties for providing services and any service-related activities  such as collecting subscription fees for such services, and notifying or  contacting the customers regarding any problem with, or the expiration  of, such services. In this regard, it may be necessary to disclose the  customer information to one or more agents and contractors of ICICI Bank  and their sub-contractors, but such agents, contractors, and  sub-contractors will be required to agree to use the information  obtained from ICICI Bank only for these purposes,” the policy reads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly,  PhonePe in its privacy policy has said that the company may share  personal information with its other corporate entities and affiliates.  “We and our affiliates will share/sell some or all of your personal  information with another business entity should we (or our assets) plan  to merge with, or be acquired by that business entity, or  re-organization, amalgamation, restructuring of business. Should such a  transaction occur that other business entity (or the new combined  entity) will be required to follow this privacy policy with respect to  your personal information,” it reads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While installing, the Kotak  app seeks your “irrevocable consent” to its privacy policy, which, among  others things, states: “We may disclose the customer information to  third parties for following, among other purposes, and will make  reasonable efforts to bind them to obligation to keep the same secure  and confidential and an obligation to use the information for the  purpose for which the same is disclosed, and you hereby give your  irrevocable consent for the same.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;JioMoney Wallet, while  disclosing upfront that the publishing company and its affiliates do not  sell or rent personal information to any third-party entities, also  adds that the company “engages a number of vendors, consultants,  contractors and takes support of our group companies or affiliates. We  may provide our partners access to or share your personal information to  enable them to provide the services subscribed by you.” Terms and  conditions of the BHIM app state: “For the protection of both the  parties, and as a tool to correct misunderstandings, the user  understands, agrees and authorises NPCI, at its discretion, and without  further prior notice to the user, to monitor and record any or all  telephone conversations between the user(s) and NPCI only.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is  imperative to note that most of these apps announce it upfront in their  privacy policies that the policy could change anytime without prior  information to the users. At the same time, it should be noted that  sharing of some data is required for proper functioning of many apps.  While most app publishers may not misuse the data being gathered, you  should know exactly what data is being used.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash,  policy director at the Centre for Internet and Society said that their  research outputs show that laws to deal with misuse of personal data are  very weak in India. “We need a strong privacy law to address these  issues, of which we have proposed a citizens’ draft. Clearly, the  prevailing situation shows that the industry is not taking enough  initiative on self-regulation. At the same time, even the government  isn’t taking much interest in consumer protection.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-june-8-2017-shaikh-zoaib-saleem-explore-money-apps-but-watch-your-data'&gt;https://cis-india.org/internet-governance/news/livemint-june-8-2017-shaikh-zoaib-saleem-explore-money-apps-but-watch-your-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-08T12:46:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/dna-india-october-19-2012-saikat-datta-experts-committee-moots-law-to-protect-privacy">
    <title>Experts' committee moots law to protect privacy</title>
    <link>https://cis-india.org/news/dna-india-october-19-2012-saikat-datta-experts-committee-moots-law-to-protect-privacy</link>
    <description>
        &lt;b&gt;In its report submitted to the Planning Commission on Thursday, the first ever experts’ group to identify the privacy issues and prepare a report to facilitate authoring of the privacy bill, has said that existing laws have created an ‘unclear regulatory regime’ which allows a state to be intrusive.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Saikat Datta's article was &lt;a class="external-link" href="http://www.dnaindia.com/india/report_experts-committee-moots-law-to-protect-privacy_1753827"&gt;published&lt;/a&gt; in DNA on October 19, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The report has been prepared by experts led by justice AP Shah, former chief justice of the Delhi high court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its exceptions to the proposed law on privacy, the experts’ group has recommended that national security, public order and disclosures made in ‘public interest’ will be exempted from the limitations of privacy. Several members of the group unsuccessfully argued to bring in the Intelligence agencies which are empowered to legally tap phones, intercept emails and conduct surveillance on citizens under the ambit of the Privacy Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report, a copy of which is available with &lt;i&gt;DNA&lt;/i&gt;, recognises that there are major differences in the existing laws that permit intrusive phone-tapping or surveillance of private citizens by the government.The group feels that “these differences have created an unclear regulatory regime that is inconsistent, non-transparent, and prone to misuse and does not provide remedy or compensation to aggrieved individuals.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore, the group has recommended that when the government conducts any intrusive surveillance like phone tapping, it must adhere to the principles of proportionality, legality and remain within the boundaries of a democratic state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The limitation (on tapping phones, etc) should be in proportion to the harm that has been caused or will be caused,” the report states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, the report also exempts the disclosure of personal or private information for journalistic or historical and scientific purposes from being curbed under the proposed Privacy Act. Interestingly, this will give journalists a legal cover from being hauled up under the proposed privacy laws when they file stories.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government is keen to enact a privacy law quickly because of two major issues. The fallout of the leakage of the tapes of Niira Radia speaking to industry heads like Ratan Tata which led to a renewed clamour for a comprehensive Privacy Act. Ironically, anything related to phone-tapping has now been left out of the provisions of such an Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other reason was the pressure from the industry that is keen to get business from abroad that deals with sensitive personal data. In the absence of any personal data protection laws, Indian companies were not getting any business from European or American firms. With this law, India can look forward to getting substantial business that involves personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With this framework in mind the experts’ group has recommended that notice be given to any individual from whom personal information will be sought. With intrusive government projects like the UID or the NATGRID, the group was worried that this kind of massive data in the hands of the government could turn this into a police state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has also mandated that the choice and consent of the individual must be taken before collecting this information. Also, there has to be a limitation on collecting this information and anything that has been collected will use the data for only a limited purpose. A data controller should be appointed to collect, maintain and use the data under strict stipulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore, the data controller will be made accountable for any lapse in handling or disclosure of the data. To ensure that this kind of control can be exercised, the group has suggested the appointment of privacy commissioners who will adjudicate on any matter of illegal disclosures and mete out server punishment.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Recommendations&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;National security, public order and disclosures      made in ‘public interest’ will be exempted from the limitations of privacy&lt;/li&gt;
&lt;li&gt;The limitation (on tapping phones, etc) should be      in proportion to the harm caused or will be caused&lt;/li&gt;
&lt;li&gt;Disclosure of personal or private information for      journalistic or historical and scientific purposes should be exempted from      being curbed under the proposed Act&lt;/li&gt;
&lt;li&gt;Notice be given to individual from whom      information has to be sought&lt;/li&gt;
&lt;li&gt;A data controller should be appointed to collect,      maintain and use the data &lt;/li&gt;
&lt;li&gt;Privacy commissioners who will adjudicate on any      matter of illegal disclosures be appointed&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;The Centre for Internet &amp;amp; Society was part of the expert committee even though not explicitly mentioned&lt;/i&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/dna-india-october-19-2012-saikat-datta-experts-committee-moots-law-to-protect-privacy'&gt;https://cis-india.org/news/dna-india-october-19-2012-saikat-datta-experts-committee-moots-law-to-protect-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-22T10:18:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
