<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 61 to 75.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/global-civil-society-coalition-launches-website-to-promote-access-to-knowledge"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/data-lives-of-humanities-text"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/understanding-the-data-gaps-on-wikidata-concerning-heritage-structures-of-west-bengal"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis_odr-report_11-11-20"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wolf-in-sheeps-clothing-demanding-your-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/reports/annual-programmatic-report-2018-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/investigating-encrypted-dns-blocking-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/mapping-glam-in-maharashtra"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft-pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-state-of-secure-messaging"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/response-to-the-2018call-for-submissions2019-on-the-santa-clara-principles-on-transparency-and-accountability"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-4"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-3"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/brindaalakshmi-k-gendering-development-data-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/a2k/blogs/global-civil-society-coalition-launches-website-to-promote-access-to-knowledge">
    <title>Global Civil Society Coalition launches website to promote Access to Knowledge  </title>
    <link>https://cis-india.org/a2k/blogs/global-civil-society-coalition-launches-website-to-promote-access-to-knowledge</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;CIS is a part of a global civil society coalition that is working to promote access to, and use of, knowledge - the Access to Knowledge or A2K coalition. &lt;br /&gt;&lt;br /&gt;Earlier this week, the coalition launched a &lt;a class="external-link" href="https://www.a2k-coalition.org/"&gt;website&lt;/a&gt; articulating its mission and recommendations to reform copyright systems for the benefit of education, research, and cultural heritage. &lt;br /&gt;&lt;br /&gt;Copyright systems pose serious obstacles to quality teaching and learning, researchers’ ability to receive and impart information and to share in scientific advancement and its benefits, and preservation and access of cultural and scientific heritage. The website presents evidence and legal solutions, with a focus on the digital and online dimension to the issues. Three global maps also show the (limited) extent to which copyright limitations and exceptions across the world support online education, text and data mining, and preservation, highlighting the need for global legal eform. &lt;br /&gt;&lt;br /&gt;The &lt;a class="external-link" href="https://www.a2k-coalition.org/about/"&gt;members of the A2K coalition&lt;/a&gt; represent a diverse set of voices such as educators, researchers, students, libraries, archives, museums, other knowledge users and creative communities around the globe. In Asia-pacific, we have ourselves and Open Access India as members presently. &lt;strong&gt;We invite organizations who share a similar vision of a fair and balanced copyright system to join the coalition.&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/global-civil-society-coalition-launches-website-to-promote-access-to-knowledge'&gt;https://cis-india.org/a2k/blogs/global-civil-society-coalition-launches-website-to-promote-access-to-knowledge&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Limitations &amp; Exceptions</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>movements</dc:subject>
    

   <dc:date>2022-10-12T12:05:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/data-lives-of-humanities-text">
    <title>Data Lives of Humanities Text</title>
    <link>https://cis-india.org/raw/data-lives-of-humanities-text</link>
    <description>
        &lt;b&gt;The ‘computational turn’ in the humanities has brought with it several questions and challenges for traditional ways of engaging with the ‘text’ as an object of enquiry.  The prevalence of data-driven scholarship in the humanities offers several challenges to traditional forms of work and practice, with regard to theory, tools, and methods. In the context of the digital, ‘text’ acquires new forms and meanings, especially with practices such as distant reading. Drawing upon excerpts from an earlier study on digital humanities in India, this essay discusses how data in the humanities is not a new phenomenon; concerns about the ‘datafication’ of humanities, now seen prominently in digital humanities and related fields is actually reflective of a longer conflict about the inherited separation between humanities and technology. It looks at how ‘data’ in the humanities has become a new object of enquiry as a result of several changes in the media landscape in the past few decades. These include large-scale digitalization and availability of  corpora of materials (digitized and born-digital) in an array of formats and across varied platforms, thus leading to also a steady prevalence of the use of computational methods in working with and studying cultural artifacts today. This essay also explores how reading ‘text as data’ helps understand the role of data in the making of humanities texts and redefines traditional ideas of textuality, reading, and the reader.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;This essay by Puthiya Purayil Sneha was published in &lt;em&gt;Lives of Data: Essays on Computational Cultures from India&lt;/em&gt; (2020) edited by Sandeep Mertia, with a Foreword by Ravi Sundaram as part of the Series on Theory on Demand by Institute of Network Cultures, Amsterdam.&lt;/h4&gt;
&lt;h4&gt;Read the open access book &lt;a href="https://networkcultures.org/blog/publication/lives-of-data-essays-on-computational-cultures-from-india/" target="_blank"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/data-lives-of-humanities-text'&gt;https://cis-india.org/raw/data-lives-of-humanities-text&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2020-12-23T13:07:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/understanding-the-data-gaps-on-wikidata-concerning-heritage-structures-of-west-bengal">
    <title>Understanding the Data Gaps on Wikidata Concerning Heritage Structures of West Bengal </title>
    <link>https://cis-india.org/a2k/blogs/understanding-the-data-gaps-on-wikidata-concerning-heritage-structures-of-west-bengal</link>
    <description>
        &lt;b&gt;This is a short study on identifying the data gaps related to heritage structures in West Bengal on Wikidata, and potential strategies to address the same. The report is authored by Bodhisattwa Mandal, with editorial oversight and support by Puthiya Purayil Sneha and external review by Sumandro Chattapadhyay. This is part of a series of short-term studies undertaken by the CIS-A2K team in 2019-2020.
&lt;/b&gt;
        
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Wikidata is a free and open repository of structured and linked data, hosted by the Wikimedia Foundation, built collaboratively[1] by human volunteers and robots from all over the world[2]. This platform, with an initial intention to be used within Wikimedia projects as a high quality secondary database [3], first started by centrally linking Wikipedia articles about the same topics in different languages[4][5][6][7][8], but soon it started linking with external databases.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong id="docs-internal-guid-82468dc9-7fff-a2c3-263c-a0aebac3c1a7"&gt;&lt;br /&gt;&lt;span style="text-align: justify;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong id="docs-internal-guid-82468dc9-7fff-a2c3-263c-a0aebac3c1a7"&gt;Introduction to Wikidata&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;span style="text-align: justify;"&gt;Wikidata is designed to be structured as a Resource Description Framework or RDF model which describes statements in the form of triplets of subject–predicate–object. In Wikidata, subject–predicate–object is termed as item–property–value. Items on Wikidata can represent every possible object, concept or topic in human knowledge which passes a certain threshold of defined &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link"&gt;notability&lt;/a&gt;&lt;span style="text-align: justify;"&gt; and are represented by unique Q numbers. The actual data of an item is called value, which is pre-defined by the data type, be it strings, numbers, dates, url links, coordinates, musical notations etc. or even other items. Properties, represented by unique P numbers, describe the data value of items. The items, properties and values are language independent and thus totally machine-readable, although for human comfort and understanding, one can describe &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://www.wikidata.org/wiki/Help:Items"&gt;items&lt;/a&gt;&lt;span style="text-align: justify;"&gt; in their own languages by adding or translating&lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://www.wikidata.org/wiki/Help:Statements"&gt; labels, descriptions or aliases&lt;/a&gt;&lt;span style="text-align: justify;"&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;Due to the machine-readable triplet structure of Wikidata, the database can be easily queried to find answers, which might not be otherwise possible from a list of unstructured contents such as Wikipedia articles. To retrieve and manipulate RDF data formats in triplets, we require a semantic query language for RDF databases named &lt;a class="external-link" href="https://www.w3.org/TR/rdf-sparql-query/"&gt;SPARQL&lt;/a&gt;. Through &lt;a class="external-link" href="https://query.wikidata.org/"&gt;Wikidata query service&lt;/a&gt;, one can use SPARQL and retrieve data and the prevailing gaps on Wikidata and visualize in different ways.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;Wikidata in West Bengal, India&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&lt;img src="https://cis-india.org/a2k/blogs/Wikidata_items_map_with_difference_India_October_2018_to_May_2019.png/image_preview" alt="Wikidata_items_map_with_difference,_India,_October_2018_to_May_2019" class="image-inline image-inline" title="Wikidata_items_map_with_difference,_India,_October_2018_to_May_2019" /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&lt;span style="text-align: left;"&gt;&lt;em&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/File:Wikidata_items_map_with_difference,_India,_October_2018_to_May_2019.png"&gt;Massive imports of coordinates for places in West Bengal happened between October 2018 and May 2019 on Wikidata as reflected by the map generated using Resemble.js&lt;/a&gt;&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;Wikidata activities around India have been organized around India for almost 4 years under the &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link"&gt;WikiProject India &lt;/a&gt;&lt;span style="text-align: justify;"&gt;umbrella. Targeted approaches to fill data gaps on different topics have been pursued through data-thons and campaigns in these years and community strength has been aimed to increase through workshops and skill sharing initiatives.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;Being part of that initiative, the Indian state of West Bengal has seen a lot of activities around Wikidata in recent years.&amp;nbsp; Under the &lt;a class="external-link"&gt;WikiProject umbrella&lt;/a&gt;, Wikidata volunteers have been working together to build data on different topics related to the state, its demographics, culture, heritage, education, health, politics, language etc. As heritage has been the prime focus of the Wikimedia community members of West Bengal, in this essay, we will identify the data gaps related to the topic through SPARQL query and explore reasons for the same, if any, through interviews of active volunteers who have been working on this area for years.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;Wikimedia community members have been working on documenting different forms of heritage since 2011, when they organized &lt;a class="external-link" href="https://en.wikipedia.org/wiki/Wikipedia:Wikipedia_Takes_Kolkata"&gt;Wikipedia Takes Kolkata photo-walk&lt;/a&gt;&amp;nbsp;for the first time. Since then, they have organized eight more Wikipedia Takes Kolkata photo-walks, &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Template:Wiki_Exploration"&gt;11 Wiki Exploration projects in 9 districts of the state&lt;/a&gt;, 2 editions of prestigious Wiki Loves Monuments in India&amp;nbsp; &lt;a class="external-link" href="https://commons.wikimedia.org/wiki/Commons:Wiki_Loves_Monuments_2018_in_India"&gt;2018 &lt;/a&gt;and &lt;a class="external-link" href="https://commons.wikimedia.org/wiki/Commons:Wiki_Loves_Monuments_2019_in_India"&gt;2019&lt;/a&gt; and several other documentation projects organized organically or single-handedly and by doing so they have uploaded several thousands of photographs related to heritage structures and GLAM collections on Wikimedia Commons.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;In this essay, we will focus on the photo-walks and explorations which were conducted to document heritage structures of West Bengal. We will focus on two basic types of data which should be there in every dataset on heritage structures, i.e. a) location, and b) image,&amp;nbsp; and we will find out if there is any significant gap there using SPARQL queries.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Photo-walks and Wiki Explorations in West Bengal&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&lt;img src="https://cis-india.org/a2k/blogs/Map_of_KMC_graded_heritage_buildings_generated_by_Wikidata_SPARQL_query.png/image_preview" alt="Map of KMC" class="image-inline image-inline" title="Map of KMC" /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&lt;em&gt;Map of KMC heritage buildings generated from Wikidata query&amp;nbsp;&lt;a class="external-link" href="https://w.wiki/Tir" rel="nofollow"&gt;https://w.wiki/Tir&lt;/a&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;Let’s start with the nine consecutive series of Wikipedia takes Kolkata photo-walks which aims to photo-document heritage buildings and structures of Kolkata. To understand the data gap related to the heritage buildings, we will examine the presence of graded heritage buildings and structures enlisted by &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://www.kmcgov.in/KMCPortal/downloads/Graded_List_of_Heritage_Buildings_Grade_I_IIA_IIB.pdf"&gt;Kolkata Municipal Corporation&lt;/a&gt;&lt;span style="text-align: justify;"&gt;&amp;nbsp;(KMC) on Wikidata through different SPARQL queries. Wikidata now contains &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://w.wiki/Tit"&gt;923 heritage buildings and structures listed by KMC&lt;/a&gt;&lt;span style="text-align: justify;"&gt;, but out of them 26.65% have &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://w.wiki/Tin"&gt;images&lt;/a&gt;&lt;span style="text-align: justify;"&gt;&amp;nbsp;and only 18.53% have &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://w.wiki/Tir"&gt;coordinates&lt;/a&gt;&lt;span style="text-align: justify;"&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;Although 81.47% of the items of the heritage structures were missing coordinates, but they gave fairly good idea about their location, all of the items had municipal wards and streets connected with them, utilizing which, photographers and travellers are expected to explore the sites easily. However, while testing the items of the wards, it was noticed that however all the 144 wards contain coordinates, but they all lack a crucial property which can denote their area of location i.e. the &lt;a class="external-link" href="https://w.wiki/Tix"&gt;geoshape data&lt;/a&gt;. While coordinates can denote the exact location of certain parts of an area, it is misleading when it comes to a larger area, which requires geoshape to better describe the location. While testing the street data, it was found that both geoshape and coordinate data are lacking for the streets, which makes them extremely difficult to &lt;a class="external-link" href="https://w.wiki/V6v"&gt;locate&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: center;"&gt;&lt;span style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/a2k/blogs/Map_of_temples_in_West_Bengal_generated_by_Wikidata_SPARQL_query.png/image_preview" alt="Map_of_temples_in_West_Bengal_generated_by_Wikidata_SPARQL_query" class="image-inline image-inline" title="Map_of_temples_in_West_Bengal_generated_by_Wikidata_SPARQL_query" /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: center;"&gt;&lt;em&gt;&lt;span style="text-align: left;"&gt;Map of temples in West Bengal generated from Wikidata query&amp;nbsp;&lt;/span&gt;&lt;a style="text-align: left;" class="external free" href="https://w.wiki/Tj7" rel="nofollow"&gt;https://w.wiki/Tj7&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;span style="text-align: justify;"&gt;For the last 3 years, Wikimedia volunteers from West Bengal have also been involved in Wiki Exploration projects to remote parts of the state documenting temples, mosques, sculptures etc., many of which have not been documented online before. Few hundreds of heritage structures in 9 districts of the state were documented and thousands of photographs under this project have been uploaded to &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://commons.wikimedia.org/wiki/Category:Wiki_Exploration_Program"&gt;Wikimedia Commons&lt;/a&gt;&lt;span style="text-align: justify;"&gt;. Now, if we test the Wikidata presence of the temples situated in West Bengal, it can be noticed that &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://w.wiki/V6w"&gt;435 temples have items&lt;/a&gt;&lt;span style="text-align: justify;"&gt;, out of which only 196 items have &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://w.wiki/Tj8"&gt;images&lt;/a&gt;&lt;span style="text-align: justify;"&gt;&amp;nbsp;and only 79 have &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://w.wiki/Tj7"&gt;coordinates&lt;/a&gt;&lt;span style="text-align: justify;"&gt;. however 302 of them have their location pin-pointed to the village, ward, town or city level. Similar to the previous case, although there are 40,359 items for villages located in West Bengal, only 0.017% have coordinates while none have &lt;/span&gt;&lt;a style="text-align: justify;" class="external-link" href="https://w.wiki/TjR"&gt;geoshape data.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;From the above two scenarios, it can be easily concluded from the SPARQL queries, that there has been a significant amount of data gap. Both the datasets contain significant lack of location data and images. The second scenario even lacks data on the temples itself.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Challenges of Contributing to Wikidata in/from West Bengal&lt;/h2&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;Now, to understand why there are huge gaps in the data, we have interviewed four volunteers from West Bengal who are involved in these two kinds of projects, three of them are Wikimedia contributors for five-ten years and one of them is relatively new to the movement. They all upload heritage photographs to Wikimedia Commons and 2 of them contribute to Wikidata. All of them agreed that due to lack of suitable hardware, they could not document the exact coordinate data while photo-documenting heritage structures. GPS devices or full-frame cameras with built-in GPS are expensive and are not affordable to many. Interviewees have also pointed out that due to lack of proper training on how to document heritage structures properly, photographers and amaetur researchers miss out vital points of documentation and thus increase data gaps. Restricted access to private heritage structures like&amp;nbsp; temples maintained by families or private heritage buildings and their documents, lack of proper existing documentation along with analogue and digital metadata, and rapid destruction of built heritage due to lack of maintenance or improper restoration procedures etc. are also the reasons for data gaps. While answering the question about why photographs are not converted fully into data, they point out that it might be a burden for photographers to learn about data entry in Wikidata, as this is out of their area of interest and workflow. As noted by an interviewee, ‘the nature of work for Wikidata does not match with photographers' workflow.’ However, they also stressed on the need to conduct training programmes on Wikidata for photographers and interested people involved in documentation to let them know the importance of structured data in the area of heritage documentation.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Recommendations&lt;/h2&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;From the observations of this short study, it is recommended that volunteers working on heritage documentation in West Bengal should be supported with suitable hardware to document coordinates. Frequent training programs should be conducted, preferably by experts, for volunteers on how to document heritage structures in a professional way, so that data gaps remain minimal. Training on Wikidata should be conducted for photographers to let them understand the importance of structured data in the field of heritage documentation. It is also recommended to increase interaction among the Wikidata and Wikimedia Commons volunteers, to understand each other's work flow and strategically modify those to provide optimal results.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;span id="docs-internal-guid-6cb506ac-7fff-3519-c2a4-4b192e13b68b"&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;References&amp;nbsp;&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[1] Vrandečić, Denny (2012).&lt;a href="http://dl.acm.org/citation.cfm?doid=2187980.2188242"&gt; "Wikidata: a new platform for collaborative data collection"&lt;/a&gt;. Proceedings of the 21st international conference companion on World Wide Web - WWW '12 Companion. Lyon, France: ACM Press: 1063.&lt;a href="https://en.wikipedia.org/wiki/Digital_object_identifier"&gt; doi&lt;/a&gt;:&lt;a href="https://doi.org/10.1145%2F2187980.2188242"&gt;10.1145/2187980.2188242&lt;/a&gt;.&lt;a href="https://en.wikipedia.org/wiki/International_Standard_Book_Number"&gt; ISBN&lt;/a&gt; &lt;a href="https://en.wikipedia.org/wiki/Special:BookSources/978-1-4503-1230-1"&gt;978-1-4503-1230-1&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[2] Vrandečić, Denny; Krötzsch, Markus (2014-09-23).&lt;a href="http://dl.acm.org/citation.cfm?doid=2661061.2629489"&gt; "Wikidata: a free collaborative knowledgebase"&lt;/a&gt;. Communications of the ACM. 57 (10): 78–85.&lt;a href="https://en.wikipedia.org/wiki/Digital_object_identifier"&gt; doi&lt;/a&gt;:&lt;a href="https://doi.org/10.1145%2F2629489"&gt;10.1145/2629489&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[3]&amp;nbsp;&amp;nbsp;Vrandečić, Denny (2012).&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[4] Roth, Mathew (30 March 2012). &lt;a href="https://blog.wikimedia.org/2012/03/30/the-wikipedia-data-revolution/"&gt;"The Wikipedia data revolution"&lt;/a&gt;. Wikimedia Foundation Blog.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[5] Pintscher, Lydia (14 January 2013).&lt;a href="http://blog.wikimedia.de/2013/01/14/first-steps-of-wikidata-in-the-hungarian-wikipedia/"&gt; "First steps of Wikidata in the Hungarian Wikipedia"&lt;/a&gt;. Wikimedia Deutschland Blog.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[6] Pintscher, Lydia (30 January 2013).&lt;a href="https://blog.wikimedia.de/2013/01/30/wikidata-coming-to-the-next-two-wikipedias/"&gt;"Wikidata coming to the next two Wikipedias"&lt;/a&gt;. Wikimedia Deutschland Blog.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[7] Pintscher, Lydia (15 February 2013).&amp;nbsp;&lt;a href="https://blog.wikimedia.de/2013/02/13/wikidata-live-on-the-english-wikipedia/"&gt;"Wikidata live on the English Wikipedia"&lt;/a&gt;. Wikimedia Deutschland Blog.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[8] Pintscher, Lydia (6 March 2013). &lt;a href="https://blog.wikimedia.de/2013/03/06/wikidata-now-live-on-all-wikipedias/"&gt;"Wikidata now live on all Wikipedias"&lt;/a&gt;. Wikimedia Deutschland Blog.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[1] The query results were generated during early 2020. The results may vary at the time of publication of this article.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[2] See&lt;a href="https://cis-india.org/A2K-Wikidata-Annexure" class="external-link"&gt; Annexure I&lt;/a&gt; for the interview questionnaire.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;[3] Read this report on Wikimedia Meta-Wiki &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Research:Understanding_the_data_gaps_on_Wikidata_concerning_heritage_structures_of_West_Bengal"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/span&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/understanding-the-data-gaps-on-wikidata-concerning-heritage-structures-of-west-bengal'&gt;https://cis-india.org/a2k/blogs/understanding-the-data-gaps-on-wikidata-concerning-heritage-structures-of-west-bengal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Bodhisattwa Mandal</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>A2K Research</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2021-05-15T12:31:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis_odr-report_11-11-20">
    <title>CIS_ODR Report_11/11/20</title>
    <link>https://cis-india.org/internet-governance/cis_odr-report_11-11-20</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis_odr-report_11-11-20'&gt;https://cis-india.org/internet-governance/cis_odr-report_11-11-20&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>aman</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2021-03-22T05:22:55Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wolf-in-sheeps-clothing-demanding-your-data">
    <title>The Wolf in Sheep's Clothing: Demanding your Data</title>
    <link>https://cis-india.org/internet-governance/blog/the-wolf-in-sheeps-clothing-demanding-your-data</link>
    <description>
        &lt;b&gt;The increasing digitalization of the economy and ubiquity of the Internet, coupled with developments in Artificial Intelligence (AI) and Machine Learning (ML) has given rise to transformational business models across several sectors.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This piece was originally published in &lt;a class="external-link" href="https://telecom.economictimes.indiatimes.com/tele-talk/the-wolf-in-sheep-s-clothing-demanding-your-data/4497"&gt;The Economic Times Telecom&lt;/a&gt;, on 8 September, 2020.&lt;span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0"&gt;&lt;/span&gt;&lt;/p&gt;
&amp;nbsp;
&lt;p&gt;The increasing digitalization of the economy and ubiquity of the &lt;a href="https://telecom.economictimes.indiatimes.com/tag/internet"&gt;Internet&lt;/a&gt;, coupled with developments in &lt;a href="https://telecom.economictimes.indiatimes.com/tag/artificial+intelligence"&gt;Artificial Intelligence&lt;/a&gt;
 (AI) and Machine Learning (ML) has given rise to transformational 
business models across several sectors. These developments have changed 
the very structure of existing sectors, with a few dominant firms 
straddling across many sectors. The position of these firms is 
entrenched due to the large amounts of data they have, and usage of 
sophisticated algorithms that deliver very targeted service/content and 
their global nature.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Such data based network businesses 
are generally multi-sided platforms subject to network effects and 
winner takes all phenomena, often, making traditional competition 
regulation inappropriate. In addition, there has been concern that such 
companies hurt competition as they are owners of large amounts of data 
collected globally, the very basis on which new services are predicated.
 Also since users have an inertia to share their data on multiple 
platforms, new companies find it very challenging to emerge. Several of 
the large companies are of US origin. Several regions/countries such as 
EU, UK, India are concerned that while these companies benefit from the 
data of their citizens or their &lt;a href="https://telecom.economictimes.indiatimes.com/tag/devices"&gt;devices&lt;/a&gt;,
 SMEs and other companies in their own countries find it increasingly 
difficult to remain viable or achieve scale. With the objective of 
supporting enterprises, including SMEs in their own countries, Europe, 
UK India are in different stages of data regulation initiatives.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;In India, the &lt;a href="https://telecom.economictimes.indiatimes.com/tag/personal+data+protection"&gt;Personal Data Protection&lt;/a&gt;
 (PDP) Bill, 2019 deals with the framework for collecting, managing and 
transferring of Personal Data of Indian citizens, including mandating 
sharing of anonymized data of individuals and non-personal data for 
better targeting of services or policy making. In addition, the Report 
by the Committee of Experts (CoE) on Non Personal Data (NPD) came up 
with a Framework for Regulating NPD. Since the NPD Report is a more 
recent phenomenon, this articles analyzes some aspects of it.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;According
 to CoE, non-personal data could be of two types. First, data or 
information which was never about an individual (e.g. weather data). 
Second, data or information that once was related to an individual (e.g.
 mobile number) but has now ceased to be identifiable due to the removal
 of certain identifiers through the process of ‘anonymisation’. However,
 it may be possible to recover the personal data from such anonymized 
data and therefore, the distinction between personal and non-personal is
 not clean. In any case, the PDP bill 2019 deals with personal data. If 
the CoE felt that some aspect of personal data (including anonymized 
data) were not adequately dealt with, it should work to strengthen it. 
The current approach of the CoE is bound to create confusion and 
overlapping jurisdiction. Since anonymized data is required to be 
shared, there are disincentives to anonymization, causing greater risk 
to individual privacy.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;A new class of business based on a “&lt;em&gt;horizontal classification cutting across different industry sectors&lt;/em&gt;” is defined. This refers to any business that derives “&lt;em&gt;new or additional economic value from data, by collecting, storing, processing, and managing data&lt;/em&gt;”
 based on a certain threshold of data collected/processed that will be 
defined by the regulatory authority that is outlined in the report. The 
CoE also recommends that “&lt;em&gt;Data Businesses will provide, within India, open access to meta-data and regulated access to the underlying data&lt;/em&gt;” without any remuneration. Further, “&lt;em&gt;By
 looking at the meta-data, potential users may identify opportunities 
for combining data from multiple Data Businesses and/or governments to 
develop innovative solutions, products and services. Subsequently, data 
requests may be made for the detailed underlying data&lt;/em&gt;”.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;With
 increasing digitalization, today almost every business is a data 
business. The problem in such categorization will be with the definition
 of thresholds. It is likely that even a small video sharing app or an 
AR/VR app would store/collect/process/transmit more data than say a 
mid-sized bank in terms of data volumes. Further, with increasing 
embedding of &lt;a href="https://telecom.economictimes.indiatimes.com/tag/iot"&gt;IoT&lt;/a&gt;
 in various aspects of our lives and businesses (smart manufacturing, 
logistics, banking etc), the amount of data that is captured by even 
small entities can be huge.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;The private sector, driven by
 profitability, identifies innovative business models, risks capital and
 finds unique ways of capturing and melding different data sets. In 
order to sustain economic growth, such innovation is necessary. The 
private sector would also like legal protection over these aspects of 
its businesses, including the unique IPR that may be embedded in the 
processing of data or its business processes. But mandating such onerous
 requirements on sharing by the CoE is going to kill any private 
initiative. Any regulatory regime must balance between the need to 
provide a secure environment for protecting data of incumbents and 
making it available to SMEs/businesses.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Meta data 
provides insights to the company’s databases and processes. These are 
source of competitive advantage for any company. Meta data is not 
without a context. The basis of demanding such disclosure is mandated 
with the proposed NPD Regulator who would evaluate such a purpose. In 
practice, purposes are open to interpretation and the structure of 
appeal mechanism etc is going to stall any such sharing. Would such 
mandates of sharing not interfere with the existing Intellectual 
Property Rights? Or the freedom to contract? Any innovation could easily
 be made available to a competitor that front-ends itself with a 
start-up. To mandate making such data available would not be fair. 
Further, how would the NPD regulator even ensure that such data is used 
for the purpose (which the proposed regulator is supposed to evaluate) 
that it is sought for? In Europe, where such &lt;a href="https://telecom.economictimes.indiatimes.com/tag/data+sharing"&gt;data sharing&lt;/a&gt;
 mandates are being considered, the focus is on public data. For private
 entities, the sharing is largely based on voluntary contributions. 
Compulsory sharing is mandated only under restricted situations where 
market failure situations are not addressed through Competition Act and 
provided legitimate interest of the data holder and existing legal 
provisions are taken into account.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Further, the 
compliance requirements for such Data Businesses is very onerous and 
makes a mockery of “minimum government” framework of the government. The
 CoE recommends that all Data Businesses, whether government NGO, or 
private “&lt;em&gt;to disclose data elements collected, stored and processed, and data-based services offered&lt;/em&gt;”. As if this was not enough, the CoE further recommends that “&lt;em&gt;Every
 Data Business must declare what they do and what data they collect, 
process and use, in which manner, and for what purposes (like disclosure
 of data elements collected, where data is stored, standards adopted to 
store and secure data, nature of data processing and data services 
provided). This is similar to disclosures required by pharma industry 
and in food products&lt;/em&gt;”. Such disclosures are necessary in these 
industries as the companies in this sector deal with critical aspects of
 human life. But are such requirements necessary for all activities and 
businesses? As long as organizations collect and process data, in a 
legal manner, within the sectoral regulation, why should such 
information have to be “reported”? Further, such bureaucratic processes 
and reporting requirements are only going to be a burden to existing 
legitimate businesses and give rise to a thriving regulatory license 
raj.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Further questions that arise are: How is any 
compliance agency going to make sure that all the underlying metadata is
 made available in a timely manner? As companies respond to a dynamic 
environment, their analysis and analytical tools change and so does the 
metadata. This inherent aspect of businesses raises the question: At 
what point in time should companies make their meta-data available? How 
will the compliance be monitored?&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Conclusion: The CoE 
needs to create an enabling and facilitating an environment for data 
sharing. The incentives for different types of entities to participate 
and contribute must be recognized. Adequate provisions for risks and 
liabilities arising out data sharing need to be thought through. 
National initiatives on data sharing should not create an onerous 
reporting regime, as envisaged by the CoE, even if digital.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p class="article-disclaimer"&gt;&lt;em&gt;DISCLAIMER:
 The views expressed are solely of the author and ETTelecom.com does not
 necessarily subscribe to it. ETTelecom.com shall not be responsible for
 any damage caused to any person/organisation directly or indirectly.&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wolf-in-sheeps-clothing-demanding-your-data'&gt;https://cis-india.org/internet-governance/blog/the-wolf-in-sheeps-clothing-demanding-your-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rekha Jain</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2020-11-10T17:44:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/reports/annual-programmatic-report-2018-2019">
    <title>Annual Programmatic Report 2018-2019</title>
    <link>https://cis-india.org/about/reports/annual-programmatic-report-2018-2019</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/reports/annual-programmatic-report-2018-2019'&gt;https://cis-india.org/about/reports/annual-programmatic-report-2018-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-11-10T10:56:33Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/investigating-encrypted-dns-blocking-in-india">
    <title>Investigating Encrypted DNS Blocking in India</title>
    <link>https://cis-india.org/internet-governance/blog/investigating-encrypted-dns-blocking-in-india</link>
    <description>
        &lt;b&gt;We find that encrypted DNS protocols are not blocked in India and share our test methodology.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;This report was edited and reviewed by Gurshabad Grover and Simone Basso.&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The Domain Name System (DNS) translates human-readable web addresses, like ‘cis-india.org’, into machine-readable IP addresses, such as ‘172.67.211.18’, that the routers that comprise the internet can understand and direct traffic to. This basic function of the web has historically operated unencrypted — allowing intermediaries that facilitate access to the internet, like coffee shop Wi-Fi operators and internet service providers (ISPs), to view what websites we visit. This gap in privacy is being exploited by both public and private entities to &lt;a href="https://arxiv.org/abs/1912.08590"&gt;censor&lt;/a&gt; access to the web and &lt;a href="https://bits.blogs.nytimes.com/2015/02/18/atts-offer-share-your-data-for-personalized-ads-or-pay-more/?_r=0"&gt;surveil&lt;/a&gt; our browsing habits.&lt;/p&gt;
&lt;p&gt;New &lt;a href="https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+-+The+Solutions"&gt;internet protocols&lt;/a&gt; are being deployed that attempt to encrypt connections to DNS providers. Through the use of these methods, the contents of DNS queries are hidden from network intermediaries and eavesdroppers and are only visible to the DNS provider chosen by an individual or a default one assigned to them by their ISP or web browser. While there are &lt;a href="https://cis-india.org/internet-governance/blog/reliance-jio-is-using-sni-inspection-to-block-websites"&gt;other ways&lt;/a&gt; of censoring web traffic, encrypted DNS protocols prevent censors from using their older DNS-based methods. In response to these new protocols, states like Iran are trying to &lt;a href="https://ooni.org/post/2020-iran-dot/"&gt;block&lt;/a&gt; them entirely, to maintain the status quo.&lt;/p&gt;
&lt;p&gt;In this report, we investigate and find that encrypted DNS protocols, specifically the &lt;a href="https://tools.ietf.org/html/rfc8484"&gt;DNS over HTTPS&lt;/a&gt; (DoH) and &lt;a href="https://tools.ietf.org/html/rfc8310"&gt;DNS over TLS&lt;/a&gt; (DoT) standards, are accessible through major Indian ISPs, and describe the technical details of our testing methodology.&lt;/p&gt;
&lt;h4 dir="ltr"&gt;Test Setup&lt;/h4&gt;
&lt;p dir="ltr"&gt;We compiled a &lt;a href="https://gist.github.com/d1vyank/5f03302fdf961f0260175acc807d4942"&gt;list&lt;/a&gt; of publicly accessible DNS resolvers that support the encrypted DoH and DoT protocols and tested access to them from four popular Indian ISPs, namely Airtel, Atria Convergence Technologies (ACT), Reliance Jio, and Vodafone. Together, these cover a large majority (roughly 95%, as &lt;a href="https://web.archive.org/web/20200803100152/https://trai.gov.in/sites/default/files/PIR_30062020.pdf"&gt;reported&lt;/a&gt; by TRAI) of the Indian internet subscriber base.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;To test connectivity, we used the Open Observatory for Network Interference (OONI) &lt;a href="https://github.com/ooni/probe-engine"&gt;probe engine&lt;/a&gt; (version &lt;a href="https://github.com/ooni/probe-engine/releases/tag/v0.18.0"&gt;0.18.0&lt;/a&gt;). Specifically, the ‘miniooni’ command-line interface tool bundled with it. Instructions on how to install this can be found &lt;a href="https://github.com/ooni/probe-engine#building-miniooni"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h4&gt;Test methodology&lt;/h4&gt;
&lt;p dir="ltr"&gt;To test whether DNS providers are reachable over encrypted communication protocols, the tool performs a DNS query using the specified one (either DoH or DoT). If the connection is successful and we receive a response from the DNS server, we conclude that the protocol is not blocked. Failing to query a specific DNS server over DoT or DoH does not necessarily mean that it has been censored. To understand whether a failure could be censorship, rather than a transient error, we would correlate measurements from many users within the same ISP and country and use an alternate network, such as a VPN, to access the possibly blocked service from another country.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In Iran, where DNS over TLS is &lt;a href="https://ooni.org/post/2020-iran-dot/"&gt;reported&lt;/a&gt; to be blocked, it was found that censorship occurs by interfering with the TLS handshake. Traffic corresponding to DNS over TLS is easier to identify and block as it communicates over a unique port and a distinctive ALPN, while DNS over HTTPS traffic is harder to block effectively as the HTTPS standard is widely used on the web and interference would lead to &lt;a href="https://en.wikipedia.org/wiki/Collateral_freedom"&gt;collateral censorship&lt;/a&gt;.&lt;/p&gt;
&lt;h4&gt;Results&lt;/h4&gt;
&lt;p dir="ltr"&gt;The tests were run on each ISP in early October 2020 using the following command:&lt;/p&gt;
&lt;div&gt;&lt;code&gt;$ ./miniooni --file=./resolvers.txt dnscheck&lt;/code&gt;&lt;/div&gt;
&lt;div&gt;&lt;code&gt;&lt;br /&gt;&lt;/code&gt;&lt;/div&gt;
&lt;p dir="ltr"&gt;The raw results in the OONI &lt;a href="https://github.com/ooni/spec/tree/master/data-formats"&gt;data format&lt;/a&gt; can be found &lt;a href="https://gist.github.com/d1vyank/be47bbcb90c1964c9279c9170b1c2ce0"&gt;here&lt;/a&gt;. A summary of the observations are as follows:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;All DNS resolvers tested were accessible over both DoH and DoT protocols from all ISPs tested.&lt;/li&gt;&lt;li&gt;IPv6 addresses were not reachable through ACT broadband. This limitation was independently confirmed using the &lt;a href="https://test-ipv6.com/"&gt;Test-IPv6 tool&lt;/a&gt; and has also been discussed on &lt;a href="https://www.reddit.com/r/bangalore/comments/gs2ibd/act_fibernet_ipv6/"&gt;Reddit&lt;/a&gt;.
&lt;/li&gt;&lt;/ul&gt;
&lt;h4&gt;Limitations&lt;/h4&gt;
&lt;p dir="ltr"&gt;As our &lt;a href="https://cis-india.org/internet-governance/blog/how-india-censors-the-web"&gt;previous research&lt;/a&gt; by the Centre for Internet and Society indicates, censorship practices vary across ISPs. While we find no evidence of encrypted DNS protocols being blocked on these four major ISPs, there may be others implementing such blocking.&lt;/p&gt;
&lt;p&gt;The second limitation is that these tests were run on a handful of connections from a couple of locations (Delhi and Bangalore). Web censorship mechanisms may vary by location within the country.&lt;/p&gt;
&lt;p&gt;Finally, the results only indicate the accessibility of encrypted DNS resolvers at a particular point in time. We have not put in place any continuous monitoring of the censorship of encrypted DNS protocols.&lt;/p&gt;
&lt;h4 dir="ltr"&gt;Conclusion&lt;/h4&gt;
&lt;p dir="ltr"&gt;Broadly, the legal framework of web censorship in India allows the Government and courts to ask ISPs to block access to online resources. The precise technical details of how to implement the censorship are left to the ISPs.&lt;/p&gt;
&lt;p&gt;Because of net neutrality obligations, ISPs are not supposed to arbitrarily block resources. Coupled with the fact that the use of encrypted DNS protocols is not related to any particular content/website deemed unlawful, it might be expected that ISPs are not blocking encrypted DNS protocols. However, previous evidence of arbitrary blocking by ISPs motivated us to study whether any major ISP was blocking the use of these protocols or preventing access to any third-party DNS server.&lt;/p&gt;
&lt;p&gt;As part of this exercise, we also contributed code to the OONI probe engine, making it easier for other researchers to test connectivity to multiple DNS providers.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/investigating-encrypted-dns-blocking-in-india'&gt;https://cis-india.org/internet-governance/blog/investigating-encrypted-dns-blocking-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-10-27T11:21:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/mapping-glam-in-maharashtra">
    <title>Mapping GLAM in Maharashtra</title>
    <link>https://cis-india.org/a2k/blogs/mapping-glam-in-maharashtra</link>
    <description>
        &lt;b&gt;This is a short study on mapping the digital transition in selected Galleries, Libraries, Archives and Museums (GLAM) institutions in Maharashtra, India, and exploring possibilities and challenges for collaborations with Wikimedia projects. Research was undertaken by Aaryaa Joshi, Dnyanada Gadre-Phadke, Kalyani Kotkar and Subodh Kulkarni; the report has been authored by Subodh Kulkarni with editorial oversight and support by Puthiya Purayil Sneha, and external review by Sumandro Chattapadhyay. This is part of a series of short-term studies undertaken by the CIS-A2K team in 2019–2020. &lt;/b&gt;
        
&lt;h2 dir="ltr"&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The digital turn has been an important development for the cultural heritage sector in India, especially in the last decade, where access to internet and multimedia technologies has led to several advancements in the Galleries, Libraries, Archives and Museums (GLAM) space. This has also encouraged a multiplicity of uses of cultural content in diverse contexts. Several efforts have been undertaken in this space over the last decade, including state initiatives like the&amp;nbsp;&lt;a class="external-link" href="http://museumsofindia.gov.in/repository/"&gt;National Museum Collections digital repository&lt;/a&gt;, archival efforts at universities such as &lt;a href="http://www.jaduniv.edu.in/"&gt;Jadavpur University&lt;/a&gt; and private and individual initiatives such as the &lt;a href="https://ruralindiaonline.org/"&gt;People’s Archive of Rural India (PARI)&lt;/a&gt; and &lt;a href="https://indiancine.ma/"&gt;Indiancine.ma&lt;/a&gt;. Apart from developments in preservation, curation and content sharing there remain continued concerns related to access, infrastructure and linguistic barriers in this sector. Intellectual property rights, open access and privacy issues have also emerged as important issues for cultural institutions looking to open up their collections to a wider public.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Collaboration with open knowledge production spaces like &lt;a href="https://wikimediafoundation.org/"&gt;Wikimedia&lt;/a&gt; and &lt;a href="https://openglam.org/"&gt;OpenGLAM&lt;/a&gt; then offer important insights into possibilities now available with the digital turn for better public access to cultural content, but also in terms of the development of collaborative&amp;nbsp; archival efforts. Efforts such as &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:GLAM"&gt;GLAM-Wiki&lt;/a&gt; have been crucial in bridging the gap between cultural institutions and initiatives in the free knowledge movement. There is still however lack of documentation and research on the various kinds of existing collections and archival efforts afoot in India, and how they may benefit from better access through platforms like Wikimedia. This study maps a few of such GLAM institutions in Maharashtra, India, and reviews their collections, challenges and limitations to explore possibilities for better collaboration between cultural and public memory institutions through GLAM-Wiki initiatives.&lt;/p&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;Research Questions and Method&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The study was framed by the following questions:&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;How has the digital transition in the GLAM sector in Maharashtra, India, impacted the process of creation and access to cultural content?&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;What are possible collaborations with open knowledge efforts like GLAM-Wiki?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The mapping of GLAM institutions was undertaken through questionnaires/surveys conducted with six GLAM institutions working in Pune district and one in Kolhapur district of Maharashtra state. The institutions were identified through existing networks established by &lt;a href="https://meta.wikimedia.org/wiki/User:Subodh_(CIS-A2K)"&gt;Subodh Kulkarni&lt;/a&gt;, &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K"&gt;CIS-A2K&lt;/a&gt; Programme Officer associated with Wikimedia projects working in this area and snowball sampling. The questionnaires were focused on the nature, objective and scope of the collections, funding, provenance, offline and online workflows (including acquiring, preservation, accessioning, digitisation and metadata standards), human resources, infrastructure, IPR policies and public outreach efforts. The questionnaires were administered with the help of the Programme Officer and volunteers working in this language community. The questionnaire with Marathi translation is given in &lt;a href="https://cis-india.org/GLAM-Mapping-Report-A2K" class="external-link"&gt;Annexure I.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The mapping helped to produce a set of recommendations for possible GLAM-Wiki collaborations in the Indian context. This was done through field visits to these institutions, review of the material, and interviews with key resource persons (administrators, faculty and students, archivists, librarians, developers etc.) who manage the collections of cultural content.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The following seven GLAM institutions were visited during the period November 2019 to February 2020. Further visits were cancelled due to the COVID-19 pandemic situation. Three Wikimedians — &lt;a href="https://mr.wikipedia.org/wiki/User:%E0%A4%9C%E0%A5%8D%E0%A4%9E%E0%A4%BE%E0%A4%A8%E0%A4%A6%E0%A4%BE_%E0%A4%97%E0%A4%A6%E0%A5%8D%E0%A4%B0%E0%A5%87-%E0%A4%AB%E0%A4%A1%E0%A4%95%E0%A5%87"&gt;User:ज्ञानदा गद्रे-फडके&lt;/a&gt;, &lt;a href="https://mr.wikipedia.org/wiki/User:%E0%A4%86%E0%A4%B0%E0%A5%8D%E0%A4%AF%E0%A4%BE_%E0%A4%9C%E0%A5%8B%E0%A4%B6%E0%A5%80"&gt;User:आर्या जोशी&lt;/a&gt; &amp;amp; &lt;a href="https://mr.wikipedia.org/wiki/User:%E0%A4%95%E0%A4%B2%E0%A5%8D%E0%A4%AF%E0%A4%BE%E0%A4%A3%E0%A5%80_%E0%A4%95%E0%A5%8B%E0%A4%A4%E0%A4%95%E0%A4%B0"&gt;User:कल्याणी कोतकर&lt;/a&gt; uploaded&amp;nbsp; images of these collections on &lt;a href="https://commons.wikimedia.org/wiki/Category:GLAM_Mapping_in_Maharashtra"&gt;Wikimedia Commons&lt;/a&gt;, and added/expanded five related articles on Marathi Wikipedia — &lt;a href="https://mr.wikipedia.org/wiki/%E0%A4%B0%E0%A4%BE%E0%A4%9C%E0%A4%BE_%E0%A4%A6%E0%A4%BF%E0%A4%A8%E0%A4%95%E0%A4%B0_%E0%A4%95%E0%A5%87%E0%A4%B3%E0%A4%95%E0%A4%B0_%E0%A4%B8%E0%A4%82%E0%A4%97%E0%A5%8D%E0%A4%B0%E0%A4%B9%E0%A4%BE%E0%A4%B2%E0%A4%AF"&gt;राजा दिनकर केळकर संग्रहालय&lt;/a&gt;, &lt;a href="https://mr.wikipedia.org/wiki/%E0%A4%AA%E0%A5%81%E0%A4%A3%E0%A5%87_%E0%A4%A8%E0%A4%97%E0%A4%B0_%E0%A4%B5%E0%A4%BE%E0%A4%9A%E0%A4%A8_%E0%A4%AE%E0%A4%82%E0%A4%A6%E0%A4%BF%E0%A4%B0"&gt;पुणे नगर वाचन मंदिर&lt;/a&gt;, &lt;a href="https://mr.wikipedia.org/wiki/%E0%A4%B8%E0%A4%BE%E0%A4%B0%E0%A5%8D%E0%A4%B5%E0%A4%9C%E0%A4%A8%E0%A4%BF%E0%A4%95_%E0%A4%B5%E0%A4%BE%E0%A4%9A%E0%A4%A8%E0%A4%BE%E0%A4%B2%E0%A4%AF,_%E0%A4%B0%E0%A4%BE%E0%A4%9C%E0%A4%97%E0%A5%81%E0%A4%B0%E0%A5%81%E0%A4%A8%E0%A4%97%E0%A4%B0"&gt;सार्वजनिक वाचनालय, राजगुरुनगर&lt;/a&gt;, and &lt;a href="https://mr.wikipedia.org/wiki/%E0%A4%86%E0%A4%AA%E0%A4%9F%E0%A5%87_%E0%A4%B5%E0%A4%BE%E0%A4%9A%E0%A4%A8_%E0%A4%AE%E0%A4%82%E0%A4%A6%E0%A4%BF%E0%A4%B0"&gt;आपटे वाचन मंदिर&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;Observations about Research Method&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The study was done with the help of three active Wikimedians, Aaryaa Joshi (Username:आर्या जोशी), Dnyanada Gadre-Phadke (Username:ज्ञानदा गद्रे-फडके) &amp;amp; Kalyani Kotkar (Username:कल्याणी कोतकर) interested in GLAM related activities. The questionnaire was developed with their participation. Orientation sessions were conducted to discuss the research design, process and outputs. The potential areas for bringing content into various Wikimedia projects were explained. While these Wikimedians conducted the visits for this mapping voluntarily, the actual expenses on travel, refreshments etc. were reimbursed. These volunteers had to carve out time slots from their regular jobs to complete the task. The timings at institutions and availability of key persons also needed to be considered while planning the visits. Sometimes the volunteers had to take leave from their regular work, which also led to some difficulties.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The first visit was to establish an association with the institution and the persons. The meeting with the authorities at the institution was essential to get the consent forms signed and complete other such formalities, including permissions to conduct interviews. This process delayed the work slightly, but is an important learning in terms of the need to establish a rapport with institutions for such research. The questionnaire was translated into Marathi (the local language) to facilitate the discussions. It was felt that to cover the basic aspects of the collections at an institution, at least 4–5 visits are required with a little gap between visits. This regular frequency will help to build relationships as well as maintain the work flow. The sample size for the present study was small due to some unforeseen constraints such as getting enough number of interested volunteer Wikimedians to undertake some of the research, multiple visits required for each institution which extended the duration of fieldwork, lack of positive responses from the GLAM institutions as well as eventual restrictions due to the COVID-19 pandemic.&lt;/p&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;Survey of GLAM in Maharashtra&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;To identify the major institutions in Maharashtra and prepare the list of major GLAM institutions in the state, various government and private official websites as well as publications were studied. It was realised that no website or publication has created a comprehensive district or statewide list of&amp;nbsp; institutions. Information about a few institutions is available online, but these are helpful largely from a tourism point of view. There is no proper selection or thematic categorisation which considers researchers, students, or other communities of interest. The popular tourist routes are given importance. Therefore, there is a need to document all the GLAMs category-wise on platforms freely accessible to the public. Some of the websites are listed in &lt;a href="https://cis-india.org/GLAM%20Mapping%20Report%20A2K" class="external-link"&gt;Annexure II&lt;/a&gt;&lt;a href="https://cis-india.org/GLAM%20Mapping%20Report%20A2K" class="external-link"&gt;.&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;Description of Surveyed Institutions&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;strong style="text-align: justify;"&gt;Apte Vachan Mandir, Ichalkaranji&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&lt;img src="https://cis-india.org/a2k/blogs/Art_gallery_at_Apte_vachan_mandir_Ichalkaranji.jpg/image_preview" title="Art_gallery_at_Apte_vachan_mandir,_Ichalkaranji" align="middle" height="300" width="550" alt="Art_gallery_at_Apte_vachan_mandir,_Ichalkaranji" /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp; &lt;em&gt;&amp;nbsp;Art Gallery at Apte Vachan Mandir, Ichalkaranji. By&amp;nbsp;&lt;a href="https://commons.wikimedia.org/wiki/User:%E0%A4%9C%E0%A5%8D%E0%A4%9E%E0%A4%BE%E0%A4%A8%E0%A4%A6%E0%A4%BE_%E0%A4%97%E0%A4%A6%E0%A5%8D%E0%A4%B0%E0%A5%87-%E0%A4%AB%E0%A4%A1%E0%A4%95%E0%A5%87"&gt;ज्ञानदा गद्रे-फडके&lt;/a&gt;,&amp;nbsp;&lt;a href="https://commons.wikimedia.org/wiki/File:Art_gallery_at_Apte_vachan_mandir,_Ichalkaranji.jpg"&gt;Art gallery at Apte vachan mandir, Ichalkaranji&lt;/a&gt;,&amp;nbsp;&lt;a href="https://creativecommons.org/licenses/by-sa/4.0/legalcode"&gt;CC BY-SA 4.0&lt;/a&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;
&lt;a href="http://www.aptewachan.org/"&gt;Apte Vachan Mandir&lt;/a&gt; is a 150 year old library in a small city named Ichalkaranji in Kolhapur district of Maharashtra. The authorities are very cooperative and eager to start digitization of the old/rare books and art gallery. They also need help regarding digitisation and preservation of the century old paintings. The institute is ready to scan the books if equipment and training is provided to their staff. The officials have given the list of 400+ rare books which they are planning to digitise. The official communication has&amp;nbsp; started with the secretary of the institution. The further process stalled due to the COVID-19 pandemic.&lt;/p&gt;
&lt;p&gt;&lt;strong style="text-align: justify;"&gt;Iravati Karve Anthropological Museum, Pune&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.unipune.ac.in/dept/mental_moral_and_social_science/anthropology/antropology_webfiles/Musium.htm"&gt;Iravati Karve Anthropological Museum&lt;/a&gt;&lt;span style="text-align: justify;"&gt; is located in the Savitribai Phule Pune University campus, Pune. The initial visit was conducted and permission was sought for further documentation. The curator and authorities have extended all possible cooperation regarding open knowledge access to the museum collections urther visits could not be undertaken due to the restrictions as a result of the COVID-19 pandemic.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;span style="text-align: justify;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Joshi’s Museum of Miniature Railways&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;a href="https://www.minirailways.com/"&gt;Joshi’s Museum of Miniature Railways&lt;/a&gt; was founded in 1998 by B. S. Joshi in Pune city. It houses different models of trains, railway stations, tracks with signals, bridges, streets in the cities, circus etc. Light and sound shows are also arranged here. This is a unique collection in India. One can get an experience of scientific concepts, handicraft, technology, history, amusement related artifacts at one place. The authorities of this museum do not feel the need of digitization as it is a live show which gives the best experience. However the documentation of the development process regarding railway models present in the museum is important. They wish to increase the outreach through publicity of the museum on free knowledge platforms to attract visitors to increase the footfall. As it is a privately owned museum, it is getting difficult to maintain it or add new things to it. So, there is scope for some kind of engagement with this museum.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Museum in College of Military Engineering, Pune&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;a href="https://www.irfca.org/gallery/Heritage/CME-Museum/"&gt;College of Military Engineering&lt;/a&gt; is a premier institute for army training in India established in 1943. The museum houses vintage engineering equipment from the pre-World War I era, which is displayed over a large landscape. The archives of the corps are also maintained in the library section. Permission for an initial visit was received late due to administrative procedures. Further visits for interviews with the key officials were planned but cancelled due to the lockdown following the COVID-19 pandemic. But there is scope to document the rare machinery, engineering structures, military vehicles etc. as it is openly accessible to the public. The institute is also keen to spread this knowledge to young generations.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Pune Nagar Vachan Mandir&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: center;" dir="ltr"&gt;&lt;strong&gt;&lt;img src="https://cis-india.org/a2k/blogs/copy_of______4.jpg/image_preview" title="Pune nagar  vachan" height="300" width="550" alt="Pune nagar  vachan" class="image-inline image-inline" /&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: center;" dir="ltr"&gt;&lt;span id="docs-internal-guid-ce138273-7fff-3e8c-3337-8f071744d5e6"&gt;&lt;em&gt;Pune Nagar Vachan Mandir Library. By &lt;a href="https://commons.wikimedia.org/wiki/User:%E0%A4%A6%E0%A4%BF%E0%A4%AA%E0%A4%95_%E0%A4%95%E0%A5%8B%E0%A4%A4%E0%A4%95%E0%A4%B0"&gt;दिपक कोतकर&lt;/a&gt;, &lt;a href="https://commons.wikimedia.org/wiki/File:%E0%A4%AA%E0%A5%81%E0%A4%A3%E0%A5%87%20%E0%A4%A8%E0%A4%97%E0%A4%B0%20%E0%A4%B5%E0%A4%BE%E0%A4%9A%E0%A4%A8%20%E0%A4%AE%E0%A4%82%E0%A4%A6%E0%A4%BF%E0%A4%B0%20%E0%A4%97%E0%A5%8D%E0%A4%B0%E0%A4%82%E0%A4%A5%E0%A4%BE%E0%A4%B2%E0%A4%AF%204.jpg"&gt;पुणे नगर वाचन मंदिर ग्रंथालय 4&lt;/a&gt;, &lt;a href="https://creativecommons.org/licenses/by-sa/4.0/legalcode"&gt;CC BY-SA 4.0&lt;/a&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;a href="http://www.punenagarvachan.org/"&gt;Pune Nagar Vachan Mandir&lt;/a&gt; is a historic library in Pune founded in 1848. The library houses a rich collection with rare books in various languages from the 17th century. It also possesses historical manuscripts and valuable diaries. The library management is very up to date on new developments in the field&amp;nbsp; and has already adopted web technologies for catering to members. The catalogues are made available online in &lt;a href="https://koha-community.org/"&gt;Koha&lt;/a&gt;. They have started digitisation efforts to some extent but need inputs and support. The authorities are eager to collaborate on larger projects to make their resources freely available. The authorities are ready to give the database of books for further integration with Wikimedia projects.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong id="docs-internal-guid-313b0f93-7fff-7fc2-0133-57e2a7f9c8df"&gt;Raja Dinkar Kelkar Museum&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;a href="http://rajakelkarmuseum.org/about.html"&gt;Raja Dinkar Kelkar Museum&lt;/a&gt; was founded in 1920 by Dinkar Kelkar in Pune city. This museum houses 22,000 rare artifacts from different historical times. The thematic galleries have been developed thoughtfully. The museum has published 8 catalogues on these themes. More details of this museum can be seen on the official website.&lt;/p&gt;
&lt;p style="text-align: center;" dir="ltr"&gt;&lt;img src="https://cis-india.org/a2k/blogs/copy_of__.jpg/image_preview" title="Mastani mahal" height="300" width="550" alt="Mastani mahal" class="image-inline image-inline" /&gt;&lt;/p&gt;
&lt;p style="text-align: center;" dir="ltr"&gt;&lt;span id="docs-internal-guid-c7c43d70-7fff-a710-c0ff-28420cb2098f"&gt;&lt;em&gt;Mastani Mahal restored at Raja Dinkar Kelkar Museum,Pune. By &lt;a href="https://commons.wikimedia.org/wiki/User:%E0%A4%86%E0%A4%B0%E0%A5%8D%E0%A4%AF%E0%A4%BE_%E0%A4%9C%E0%A5%8B%E0%A4%B6%E0%A5%80"&gt;आर्या जोशी&lt;/a&gt;, &lt;a href="https://commons.wikimedia.org/wiki/File:%E0%A4%AE%E0%A4%B8%E0%A5%8D%E0%A4%A4%E0%A4%BE%E0%A4%A8%E0%A5%80%20%E0%A4%AE%E0%A4%B9%E0%A4%BE%E0%A4%B2.jpg"&gt;मस्तानी महाल&lt;/a&gt;, &lt;a href="https://creativecommons.org/licenses/by-sa/4.0/legalcode"&gt;CC BY-SA 4.0&lt;/a&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;span id="docs-internal-guid-89a616fd-7fff-dc9d-d9c3-37b139766c1d"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;This museum is partially funded by the State Government for some regular maintenance. The funds for development, upgradation, conservation and promotion are to be raised by the institution. A digitisation project has been&amp;nbsp; planned by the museum authorities, and it is progressing as the resources are being arranged. The museum officials are open to share information digitally in the public domain. They believe that they can reach interested masses through Wikimedia Projects. They have given permission to photograph the objects and the various conservation practices in their laboratory. They have expressed their readiness to give free access to libraries and museums for Wikimedians visiting the institution for purposes of research.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Rajgurunagar Public Library, Rajgurunagar&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Rajgurunagar Public Library is a 150 plus year old Public access library with a competitive examination center. The special features are rare books from the 19th century and manuscripts. The management was not aware of Wikimedia projects, Open source cataloging, Unicode data entry systems etc. But after the visit, the officials responded very positively to start digitisation of 25 rare books in collaboration with the Access to Knowledge programme, Centre for Internet and Society and &lt;a href="http://vigyanashram.com/"&gt;Vigyan Ashram, Pabal&lt;/a&gt;. The task was completed and these books were digitised and uploaded on Wikimedia Commons by creating a &lt;a href="https://commons.wikimedia.org/wiki/Category:Books_with_Public_Library,_Rajgurunagar_published_before_1900"&gt;separate category&lt;/a&gt;. As the manuscripts and other material is getting degenerated, this collection&amp;nbsp; needs to be digitised at the earliest.&lt;/p&gt;
&lt;h2&gt;Observations&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;strong style="text-align: justify;"&gt;Target audience&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The GLAM institutions, especially&amp;nbsp; museums and libraries&amp;nbsp; are facing a decrease in footfall in recent times. The officials feel that uploading material on the web under free licenses will further aid this trend. At the same time they also express their interest and ideas to attract a new generation to engage with these collections through promotional mobile apps. There are however persistent anxieties about public access to these materials on the web. Some institutions possess unique or rare material such as antiquities, manuscripts, live models or books. The officials fear that the institutions will lose their points of attraction if they are projected on the web with descriptions. On the other hand, the researchers and interested communities are unaware of such treasures with these institutions.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span style="text-align: justify;"&gt;&lt;strong&gt;Sustainability&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Sustenance of the institutions is another important point and obstacle in digitisation of collections. The publications of the museums are a source of revenue for them. As the entry fees or subscription charges need to be kept minimal for the visitors, the priced material sold at the counters is the only income source for these institutions. Hence, there is a limitation of online availability and&amp;nbsp; promotion of this material. Finding a sustainable model which also allows for open access to content is a difficult task for a large number of organisations. The financial support to these institutions is not a priority area for Government agencies or philanthropic organisations. Some institutions have successfully attempted for corporate social responsibility (CSR) funding. They need professional inputs for fundraising campaigns.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Technical challenges&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;There are also technical challenges with the digitisation process itself. Some of the libraries have not adopted a universal cataloging system. Therefore it is difficult to analyse the data of books according to copyright status and physical conditions. The authorities are eager to dispose of decaying material after digitisation. Some of them have approached State Government departments for funds but got no response. This may be because standard digitisation policies are not in place at a national level, and a lot of institutions are unaware of existing benchmarks and policies. Another hindrance is that the books will not be permitted to be taken outside the institution for scanning because of the physical condition. Awareness and training in archival and records management is a key requirement in these conditions.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Capacity building&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The awareness and capacity building of the personnel at the institutions in the area of free knowledge and digitisation skills is to be enhanced before starting any project. The terminologies and case studies of some projects in local languages are necessary for better understanding of concepts as well as best practices. Some of the good archive projects in Marathi completed by various organisations include digitisation of the complete works of &lt;a href="http://www.vinoba.in/#/books"&gt;Vinoba Bhave&lt;/a&gt;, &lt;a href="http://prabodhankar.org/samagra-sahitya"&gt;Prabodhankar Thakeray&lt;/a&gt; and &lt;a href="https://www.savarkarsmarak.com/downloadbooks.php"&gt;Vinayak Savarkar&lt;/a&gt;. The language department of the State Government of Maharashtra has also digitised and uploaded 129 old books and 555 old magazines on their &lt;a href="https://rmvs.marathi.gov.in/books"&gt;website&lt;/a&gt;. The other &lt;a href="https://sahitya.marathi.gov.in/%E0%A4%87-%E0%A4%AC%E0%A5%81%E0%A4%95-%E0%A4%A1%E0%A4%BE%E0%A4%8A%E0%A4%A8%E0%A4%B2%E0%A5%8B%E0%A4%A1"&gt;website of the literature &amp;amp; culture department&lt;/a&gt; has made available 434 books in PDF, epub and mobi format.&lt;/p&gt;
&lt;br /&gt;
&lt;h2&gt;Recommendations&lt;/h2&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;These recommendations are based on the interactions with the Wikimedians involved in the process, the interviews with key persons from seven GLAM institutions and previous experiences of working with such institutions. The important learnings from this research study are captured in the observations stated above. As the focus of the discussions remained limited to the access to cultural content and possible collaborations regarding Wikimedia Projects, the content creation aspect was not touched upon in detail. The recommendations emerging&amp;nbsp; from this study provide some guidelines for action points for the&amp;nbsp; near future. However, for designing broader strategies for the GLAM sector,&amp;nbsp; a sizable number of institutions in different regions of the state need to be mapped to provide a more comprehensive picture of the sector and its possibilities&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The recommendations regarding various stakeholders in the mapping process are stipulated below -&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;For Wikimedians&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Orientation sessions for Wikimedians visiting the institute regarding GLAM related Wikimedia projects, copyright issues, Creative commons licenses and basics of library science should be conducted. The availability of resource material on these topics in local languages will be useful in the interview process.&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;For replicating this mapping&amp;nbsp; activity across one state or several states, the selection of Wikimedia volunteers is crucial. The provision for reasonable honorarium per visit should be made for time bound as well as qualitative execution of tasks.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;For GLAM institutions&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;It was observed that the GLAM institutions are not well aware about the free knowledge platforms like &lt;a href="https://wikimediafoundation.org/our-work/wikimedia-projects/"&gt;Wikimedia projects&lt;/a&gt; or &lt;a href="https://archive.org/"&gt;Internet archive&lt;/a&gt;. They are aware about copyright and intellectual property rights, but not about &lt;a href="https://creativecommons.org/"&gt;Creative Commons&lt;/a&gt; or other licenses available. They wish to make their resources available across the world but are not clear about the methods. The collaboration regarding these aspects is highly appreciated.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Old libraries have a good collection of rare old books. They are finding difficulties in preservation of books as well as facing space constraints. Also for these books, readership is also negligible. Hence there is a need to digitise this valuable reference material before it degenerates.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;For CIS (or other implementing agency)&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A comprehensive list of GLAM institutions in the state, with further categorisation into geographical &amp;amp; thematic aspects is to be developed and be made freely accessible for the public at large.&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Training in universal metadata structures and unicode systems like Koha is to be arranged for the staff and management members at these institutions. At least the cataloging in universal format should be done on priority to analyse the metadata for copyright free status. A central repository is needed to avoid duplication in scanning. CIS-A2K needs to design strategic plan for this activity.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;For in-depth case studies of potential GLAM-Wiki institutions, &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Wikimedian_in_residence"&gt;Wikimedian in Residence (WiR)&lt;/a&gt;&amp;nbsp;programme should be adopted.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Interactions with concerned State and Central Government departments would facilitate the research activity and further collaborations. The findings of the research could be shared with such agencies along with concrete project proposals designed in collaboration with concerned institutions.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;As illustrated by the observations of this study, the digital turn has brought about significant changes in the cultural heritage sector, but a large part of these still pertain to concerns around access to cultural content. The role of digital technologies and free knowledge platforms like Wikipedia in addressing these issues of access and outreach, and importantly in content creation therefore remains to be explored, through a more comprehensive study of the sector. Further, the study has also been indicative of the potential of collaborative work, and efforts needed towards the same, which may be helpful in also contributing towards a broader strategy for GLAM work with Wikimedia projects in Indian languages.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Read this report on Wikimedia Meta-Wiki &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Research:Mapping_GLAM_in_Maharashtra,_India"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/mapping-glam-in-maharashtra'&gt;https://cis-india.org/a2k/blogs/mapping-glam-in-maharashtra&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Subodh Kulkarni</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>A2K Research</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2021-05-15T12:30:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft-pdf">
    <title>Artificial Intelligence: A Full-Spectrum Regulatory Challenge (Working Draft) PDF</title>
    <link>https://cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft-pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft-pdf'&gt;https://cis-india.org/internet-governance/artificial-intelligence-a-full-spectrum-regulatory-challenge-working-draft-pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-08-04T06:07:47Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-state-of-secure-messaging">
    <title>The State of Secure Messaging</title>
    <link>https://cis-india.org/internet-governance/blog/the-state-of-secure-messaging</link>
    <description>
        &lt;b&gt;A look at the protections provided by and threats posed to secure communication online.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;This blogpost was edited by Gurshabad Grover and Amber Sinha.&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The current benchmark for secure communication online is 
end-to-end encrypted messaging. It refers to a method of encryption 
wherein the contents of a message are only readable by the devices of 
the individuals, or endpoints, participating in the communication. All 
other Internet intermediaries such as internet service providers, 
internet exchange points, undersea cable operators, data centre 
operators, and even the messaging service providers themselves cannot 
read them. This is achieved through cryptographic &lt;a href="https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange"&gt;mechanisms&lt;/a&gt;
 that allow independent devices to establish a shared secret key over an
 insecure communication channel, which they then use to encrypt and 
decrypt messages. Common examples of end-to-end encrypted messaging are 
applications like Signal and WhatsApp.&lt;/p&gt;
&lt;p dir="ltr"&gt;This post attempts to give at-risk individuals, concerned 
citizens, and civil society at large a more nuanced understanding of the
 protections provided and threats posed to the security and privacy of 
their communications online.&lt;/p&gt;
&lt;h4 dir="ltr"&gt;Threat Model&lt;/h4&gt;
&lt;p dir="ltr"&gt;The first step to assessing security and privacy is to 
identify and understand actors and risks. End-to-end encrypted messaging
 applications consider the following threat model:&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Device compromise: Can happen physically through loss or 
theft, or remotely. Access to an individual’s device could be gained 
through technical flaws or coercion (&lt;a href="https://www.eff.org/wp/digital-privacy-us-border-2017"&gt;legal&lt;/a&gt;, or &lt;a href="https://xkcd.com/538/"&gt;otherwise&lt;/a&gt;). It can be temporary or be made persistent by installing &lt;a href="https://citizenlab.ca/2019/10/nso-q-cyber-technologies-100-new-abuse-cases/"&gt;malware&lt;/a&gt; on the device.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Network monitoring and interference: Implies access to data
 in transit over a network. All Internet intermediaries have such 
access. They may either actively interfere with the communication or 
passively &lt;a href="https://www.theatlantic.com/international/archive/2013/07/the-creepy-long-standing-practice-of-undersea-cable-tapping/277855/"&gt;observe&lt;/a&gt; traffic.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Server compromise: Implies access to the web server hosting
 the application. This could be achieved through technical flaws, 
insider access such as an employee, or through coercion (&lt;a href="https://en.wikipedia.org/wiki/Investigatory_Powers_Act_2016"&gt;legal&lt;/a&gt;, or otherwise).&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p dir="ltr"&gt;End-to-end encrypted messaging aims to offer complete 
message confidentiality and integrity in the face of server and network 
compromise, and some protections against device compromise. These are 
detailed below.&lt;/p&gt;
&lt;h4 dir="ltr"&gt;Protections Provided&lt;/h4&gt;
&lt;p dir="ltr"&gt;Secure messaging services guarantee certain properties. For
 mature services that have received adequate study from researchers, we 
can assume them to be sound, barring implementation flaws which are 
described later.&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Confidentiality: The contents of a message are kept private and the ciphers used are &lt;a href="https://pthree.org/2016/06/19/the-physics-of-brute-force/"&gt;practically&lt;/a&gt; unbreakable by adversaries.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Integrity: The contents of a message cannot be modified in transit.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Deniability: Aims to mimic unrecorded real-world 
conversations where an individual can deny having said something. 
Someone in possession of the chat transcript cannot &lt;em&gt;cryptographically&lt;/em&gt;
 prove that an individual authored a particular message. While some 
applications feature such off-the-record messaging capabilities, the 
legal applicability of such mechanisms is &lt;a href="https://debian-administration.org/users/dkg/weblog/104"&gt;debatable&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Forward and Future Secrecy: These properties aim to limit 
the effects of a temporary compromise of credentials on a device. 
Forward secrecy ensures messages collected over the network, which were 
sent before the compromise, cannot be decrypted. Future secrecy ensures 
messages sent post-compromise are protected. These mechanisms are easily
 circumvented in practice as past messages are usually stored on the 
device being compromised, and future messages can be obtained by gaining
 persistent access during compromise. These properties are meant to 
protect individuals &lt;a href="https://hal.inria.fr/hal-01966560/document"&gt;aware&lt;/a&gt; of these limitations in exceptional situations such as a journalist crossing a border.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h4 dir="ltr"&gt;Shortcomings&lt;/h4&gt;
&lt;p dir="ltr"&gt;While secure messaging services offer useful protections 
they also have some shortcomings. It is useful to understand these and 
their mitigations to minimise risk.&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Metadata: Information about a communication such as &lt;strong&gt;who&lt;/strong&gt; the participants are, &lt;strong&gt;when&lt;/strong&gt; the messages are sent, &lt;strong&gt;where&lt;/strong&gt; the participants are located, and &lt;strong&gt;what&lt;/strong&gt;
 the size of a message is can offer important contextual information 
about a conversation. While some popular messaging services &lt;a href="https://signal.org/blog/sealed-sender/"&gt;attempt&lt;/a&gt;
 to minimize metadata generation, metadata leakage, in general, is still
 considered an open problem because such information can be gleaned by 
network monitoring as well as from server compromise. Application 
policies around whether such data is stored and for how long it is 
retained can improve privacy. There are also &lt;a href="https://ricochet.im/"&gt;experimental&lt;/a&gt; approaches that use techniques like onion routing to hide metadata.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Authentication: This is the process of asserting whether an
 individual sending or receiving a message is who they are thought to 
be. Current messaging services trust application servers and cell 
service providers for authentication, which means that they have the 
ability to replace and impersonate individuals in conversations. 
Messaging services offer advanced features to mitigate this risk, such 
as notifications when a participant’s identity changes, and manual 
verification of participants’ security keys through other communication 
channels (in-person, mail, etc.).&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Availability: An individual’s access to a messaging service
 can be impeded. Intermediaries may delay or drop messages resulting in 
what is called a denial of service attack. While messaging services are 
quite resilient to such attacks, governments may censor or completely 
shut down Internet access.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Application-level gaps: Capabilities offered by services in
 addition to messaging, such as contact discovery, online status, and 
location sharing are often &lt;a href="https://www.forbes.com/sites/thomasbrewster/2017/01/22/whatsapp-facebook-backdoor-government-data-request/"&gt;not covered&lt;/a&gt;
 by end-to-end encryption and may be stored by the application server. 
Application policies around how such information is gathered and 
retained affect privacy.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Implementation flaws and backdoors: Software or hardware 
flaws (accidental or intentional) on an individual’s device could be 
exploited to circumvent the protections provided by end-to-end 
encryption. For mature applications and platforms, accidental flaws are 
difficult and &lt;a href="https://arstechnica.com/information-technology/2019/09/for-the-first-time-ever-android-0days-cost-more-than-ios-exploits/"&gt;expensive&lt;/a&gt; to exploit, and as such are only accessible to Government or other 
powerful actors who typically use them to surveil individuals of 
interest (and not for mass surveillance). Intentional flaws or backdoors
 introduced by manufacturers may also be present. The only defence 
against these is security researchers who rely on manual inspection to 
examine software and network interactions to detect them.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h4 dir="ltr"&gt;Messaging Protocols and Standards&lt;/h4&gt;
&lt;p dir="ltr"&gt;In the face of demands for exceptional access to encrypted 
communication from governments, and risks of mass surveillance from both
 governments and corporations, end-to-end encryption is important to 
enable secure and private communication online. The signal protocol, 
which is open and adopted by popular applications like WhatsApp and 
Signal, is considered a success story as it brought end-to-end 
encryption to over a billion users and has become a de-facto standard.&lt;/p&gt;
&lt;p dir="ltr"&gt;However, it is unilaterally developed and controlled by a single organisation. Messaging Layer Security (or &lt;a href="https://datatracker.ietf.org/wg/mls/about/"&gt;MLS&lt;/a&gt;)
 is a working group within the Internet Engineering Task Force (IETF) 
that is attempting to standardise end-to-end encryption through 
participation of individuals from corporations, academia, and civil 
society. The draft protocol offers the standard security properties 
mentioned above, except for deniability which is still being considered.
 It incorporates novel research that allows it to scale efficiently for 
large groups up to thousands of participants, which is an improvement 
over the signal protocol. MLS aims to increase adoption further by 
creating open standards and implementations, similar to the Transport 
Layer Security (TLS) protocol used to encrypt much of the web today. 
There is also a need to look beyond end-to-end encryption to address its
 shortcomings, particularly around authentication and metadata leakage.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-state-of-secure-messaging'&gt;https://cis-india.org/internet-governance/blog/the-state-of-secure-messaging&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>IETF</dc:subject>
    

   <dc:date>2020-07-17T08:12:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/response-to-the-2018call-for-submissions2019-on-the-santa-clara-principles-on-transparency-and-accountability">
    <title>Response to the ‘Call for Comments’ on The Santa Clara Principles on Transparency and Accountability</title>
    <link>https://cis-india.org/internet-governance/blog/response-to-the-2018call-for-submissions2019-on-the-santa-clara-principles-on-transparency-and-accountability</link>
    <description>
        &lt;b&gt;The Santa Clara Principles on Transparency and Accountability, proposed in 2018, provided a robust framework of transparency reporting for online companies dealing with user-generated content. In 2020, the framework underwent a period of consultation "to determine whether the Santa Clara Principles should be updated for the ever-changing content moderation landscape." 

In lieu of this, we presented our responses, which are in-line with our previous research and findings on transparency reporting of online companies, especially in context of the Indian digital space.&lt;/b&gt;
        
&lt;p dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;The authors would like to thank Gurshabad Grover for his editorial suggestions. A PDF version of the responses is also available &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/Submissions-SCP"&gt;here&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;-------&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;1. Currently the Santa Clara Principles focus on the need for numbers, notice, and appeals around content moderation. This set of questions will address whether these categories should be expanded, fleshed out further, or revisited.&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;a. The first category sets the standard that companies should publish the numbers of posts removed and accounts permanently or temporarily suspended due to violations of their content guidelines. Please indicate any specific recommendations or components of this category that should be revisited or expanded.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;While the Principles provide a robust framework for content moderation practices carried out by the companies itself, we believe that the framework could be expanded significantly to include more detailed metrics on government requests for content takedown, as well as for third-party requests. For government requests, this information should include the number of takedown requests received, the number of requests granted (and the nature of compliance - including full, partial or none), the number of items identified in these requests for takedown, and the branch of the government that the request originated from (either from an executive agency or court-sanctioned).&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Information regarding account restrictions, with similar levels of granularity, must also form a part of this vertical. These numbers must be backed with further details on the reasons ascertained by the government for demanding takedowns, i.e.&amp;nbsp; the broad category under which content was flagged. For third party requests, similar metrics should be applied wherever appropriate.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Additionally, for companies owning multiple platforms, information regarding both internal content moderation and moderation at the behest of external requests (either by the state or third-parties), must be broken down platform-wise. Alternatively, they should publish separate transparency reports for each platform they own.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;b. The second category sets the standard that companies should provide notice to each user whose content is taken down or account is suspended about the reason for the removal or suspension. Please indicate any specific recommendations or components of this category that should be revisited or expanded.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;While this category envisages companies to provide notice to its users across removals related to all categories of content, additional research reveals that oftentimes, &lt;a href="https://help.twitter.com/en/rules-and-policies/twitter-legal-faqs"&gt;companies&lt;/a&gt; create further categorization of ‘exceptional circumstances’, where it may hold the discretion for not sending a notice, including for CSAM or threats to life. While the intent behind such categorization might be understandable, we believe that any list of exceptional circumstances should not be ideally left to company discretions, and must be prepared in a collaborative fashion. Accordingly, we recommend that the Principles be expanded to identify a limited set of exceptional circumstances, where not sending a notice to a user would be permissible, and would not count as a violation of the Principles.&lt;/p&gt;
&lt;p dir="ltr"&gt;Additionally, while the current framework provides requirements for granular details in the notice in case of content flagged by the company’s internal moderation standards, we believe a similar model should also be emulated for content removals at the behest of the state. When a piece of content has been identified as illegal by a government takedown request, then the notice issued by the company to the user should be as granular as possible, within the permissible limits of the law under which the takedown request was issued in the first place. Such granularity must include, among other things, the exact legal provision under which the content has been flagged, and the reasons that the government has given in implementing this flagging.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;c. The third category sets the standard that companies should provide a meaningful opportunity for timely appeal of any content removal or account suspension. Please indicate any specific recommendations or components of this category that should be revisited or expanded.&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Currently, the category of ‘appeals’ in the Santa Clara Principles is focussed on having accountability processes in places, and emphasize on the need of having meaningful review. The framework of the Principles also currently envisage only internal review processes carried out by the company. However, in light of Facebook unveiling its plans for an &lt;a href="https://www.nytimes.com/2020/05/06/opinion/facebook-oversight-board.html"&gt;Oversight&lt;/a&gt; &lt;a href="https://about.fb.com/wp-content/uploads/2020/01/Bylaws_v6.pdf"&gt;Board&lt;/a&gt;, a structurally independent body, which would arbitrate select appeal cases of content moderation, these pre-existing principles might need revisiting.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;While the Oversight Board is a relatively novel concept, given the important precedence it sets, setting certain fundamental principles of transparent disclosures and accountable conduct around it, might allow researchers and regulators alike to gauge the efficacy of this initiative. Accordingly, the Principles should consider some base-level disclosures that the company must make when it is referring a select category of cases for independent external review. This might include a statement of reasons explaining why certain cases were prioritized for independent review, and in the instance that the decision hinges on a public interest question, then the proceedings of the independent review might also be required to be made public (with due recourse paid to security issues and the confidentiality of the parties involved).&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;2. Do you think the Santa Clara Principles should be expanded or amended to include specific recommendations for transparency around the use of automated tools and decision-making (including, for example, the context in which such tools are used, and the extent to which decisions are made with or without a human in the loop), in any of the following areas:&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Content moderation (the use of artificial intelligence to review content and accounts and determine whether to remove the content or accounts; processes used to conduct reviews when content is flagged by users or others)&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Companies have begun to rely on a variety of automated tools to aid their content removal processes, across a variety of content, including &lt;a href="https://www.theverge.com/2019/3/15/18266974/facebook-instagram-revenge-porn-ai-filter"&gt;revenge porn&lt;/a&gt;, &lt;a href="https://www.facebook.com/notes/mark-zuckerberg/a-blueprint-for-content-governance-and-enforcement/10156443129621634/"&gt;terrorist content&lt;/a&gt; and &lt;a href="https://www.newamerica.org/oti/reports/everything-moderation-analysis-how-internet-platforms-are-using-artificial-intelligence-moderate-user-generated-content/the-limitations-of-automated-tools-in-content-moderation/"&gt;CSAM&lt;/a&gt;. Research however, has shown that the tools deployed often have their limitations, which include &lt;a href="https://juliareda.eu/2017/09/when-filters-fail/"&gt;over-removal&lt;/a&gt;, and &lt;a href="https://reclaimthenet.org/instagram-fact-checks-ruining-memes/"&gt;censorship&lt;/a&gt; of perfectly &lt;a href="https://edri.org/trilogues-on-terrorist-content-upload-or-re-upload-filters-eachy-peachy/"&gt;legitimate&lt;/a&gt; &lt;a href="https://www.eff.org/tossedout/tumblr-ban-adult-content"&gt;speech&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;We recommend that the Principles should accordingly be expanded to &lt;a href="https://www.ivir.nl/publicaties/download/Transparency_MacCarthy_Feb_2020.pdf"&gt;include&lt;/a&gt; content removed by automatic flagging, the error rates encountered by the tools, and the rate at which wrongly taken down content is being reinstated. There should also be a qualitative aspect to the information presented by these companies, and therefore, there should be a clearer disclosure of the kind of automated tools they use. Such disclosure must, of course, be &lt;a href="https://www.ivir.nl/publicaties/download/Transparency_MacCarthy_Feb_2020.pdf"&gt;balanced&lt;/a&gt; against interests of&amp;nbsp; the security of the platform and the necessity to ensure that information disclosed is not used by malicious third-party actors to circumvent legitimate moderation.&lt;/p&gt;
&lt;p dir="ltr"&gt;Additionally, with specific reference to ‘extremist content’, several online companies have collaborated to form the Global Internet Forum to Counter Terrorism (GIFCT), with the intent of facilitating better moderation. The GIFCT uses a hash-based technology of a shared database of ‘terrorist’ content for filtering content on their platforms. However, as it has already been &lt;a href="https://www.eff.org/wp/caught-net-impact-extremist-speech-regulations-human-rights-content"&gt;noted&lt;/a&gt;, this initiative provides very little information regarding how it functions, and operates without any collaboration with civil society or human rights groups, and without any law enforcement oversight.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Such similar collaborative measures going forward, for deployment of varied forms of automated tools to filter out various forms of content, without any transparency or accountability, can be problematic, since it makes information regarding the efficacy of these tools scarce, research into the processes difficult, and ultimately, any reformative suggestions impossible.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Accordingly, the Principles must emphasize that collaborative efforts to the effect of using automated tools in content moderation must be done with sufficient consideration to the basic principles of transparency and accountability. This might include sharing information about processes with a select list of civil society and human rights groups, and in the transparency reports, separately presenting information about the accuracy rates of the tools.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Content ranking and downranking (the use of artificial intelligence to promote certain content over others such as in search result rankings, and to downrank certain content such as misinformation or clickbait)&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Ranking and downranking algorithms have been deployed by companies for various purposes and across different services they offer. For the purposes of our discussion, we would restrict ourselves to two chief use-cases of these processes: search engines and internet platforms.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Search engines&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The algorithms that have been developed to find accurate results for query are oftentimes not perfect, and they have been accused of being &lt;a href="https://www.vox.com/recode/2020/2/18/21121286/algorithms-bias-discrimination-facial-recognition-transparency"&gt;biased&lt;/a&gt;, including being politically non-partisan and &lt;a href="https://www.wired.com/story/free-speech-is-not-the-same-as-free-reach/"&gt;burying&lt;/a&gt; certain ideologies. Similarly, in the case of automated systems to downrank misinformation, accuracy is not guaranteed as such systems can identify accurate information as misinformation. Since the algorithm is constantly learning and &lt;a href="https://www.newamerica.org/oti/reports/rising-through-ranks/search-ranking"&gt;updating&lt;/a&gt;, it becomes difficult to know exactly why certain content may be made less visible.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;As case-studies of several search engines &lt;a href="https://www.newamerica.org/oti/reports/rising-through-ranks/search-ranking/"&gt;indicate&lt;/a&gt;, a company’s ranking processes often use a combination of algorithms and human moderators. Requirement for transparency therefore, can mandate disclosure of the training materials for these human moderators. For instance, Google has a scheme of ‘&lt;a href="https://support.google.com/websearch/answer/9281931?hl=en"&gt;Search Quality Raters&lt;/a&gt;’, which comprises a group of third-party individuals responsible for giving feedback regarding search results. The guidelines on which their feedback is based on, are &lt;a href="https://static.googleusercontent.com/media/guidelines.raterhub.com/en//searchqualityevaluatorguidelines.pdf"&gt;publicly available&lt;/a&gt;. The Principles can therefore call for similar disclosure of other companies that deploy human help for their ranking processes.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Internet platforms&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;For social media platforms, ranking algorithms are utilized for &lt;a href="https://www.newamerica.org/oti/reports/rising-through-ranks/news-feed-ranking"&gt;curation&lt;/a&gt; of news-feeds: dashboards showing content to the user that the algorithm thinks are relevant. The algorithm makes these decisions based on different signals that it is trained with. Information around these algorithms is hard to come by, and even if it is, the algorithms are often blackboxes, with their decisions not &lt;a href="https://eandt.theiet.org/content/articles/2020/03/google-faces-challenge-of-brittle-and-opaque-ai-says-internet-pioneer/"&gt;explainable&lt;/a&gt;.&lt;/p&gt;
&lt;p dir="ltr"&gt;There are however, ways by which transparency around these algorithms can be improved without compromising the security and integrity of the platform. This might include companies &lt;a href="https://www.ivir.nl/publicaties/download/Transparency_MacCarthy_Feb_2020.pdf"&gt;informing&lt;/a&gt; users, in an accessible manner, “(i) how they rank, organize and present user generated content.”, and &lt;a href="https://www.ivir.nl/publicaties/download/Transparency_MacCarthy_Feb_2020.pdf"&gt;updating&lt;/a&gt; the data in a timely manner, allowing researchers and regulators the appropriate opportunity to utilize this information while it is still relevant.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Companies should also have an easy-to-access policy that &lt;a href="https://rankingdigitalrights.org/wp-content/uploads/2019/07/Best-Practices_-Algorithms-machine-learning-and-automated-decision-making.pdf"&gt;outlines&lt;/a&gt; how it plans to manage the human rights risks arising out of the system(s) it deploys. The human rights impacts assessment must additionally consider the broad social contexts within which the algorithm system is used.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Ad targeting and delivery (the use of artificial intelligence to segment and target specific groups of users and deliver ads to them)&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Companies such as Facebook and Google collect a wide variety of data from its audience, using a variety of data points (including age, location, race) which is used to deliver personalised advertisements by the advertisers affiliated with the company. Methods like &lt;a href="https://www.eff.org/wp/behind-the-one-way-mirror"&gt;activity tracking and browser-fingerprinting&lt;/a&gt; are employed to track users, with or without explicit notice. Since a user’s &lt;a href="https://www.makeuseof.com/tag/targeted-ads-threat-privacy/"&gt;privacy&lt;/a&gt; is greatly affected by such tracking, more transparency is needed where user data is collected by companies and where they are processed using the company’s algorithms to target and deliver ads. Additionally, targeted advertising, especially in the context of political advertising, result in segmenting groups of people and subjecting them to advertising campaigns. This, in turn may have drastic &lt;a href="https://apnews.com/eef44be313efdefa959ec7d7200474cc"&gt;consequences&lt;/a&gt;, since they seem to deepen divisiveness over critical issues.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Notice&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The Principles should identify metrics of a meaningful notice that companies must give users when their data is collected for delivering advertisements. Among others, such notice should specify all kinds of data the company is collecting regarding the user, and the categories across which they have been segmented or categorized for advertising.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Disclosure&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Companies should also strive to disclose how data is collected and processed, specifically to segment users and deliver advertisements, in detail. This might include disclosing all the &lt;a href="https://www.propublica.org/datastore/dataset/facebook-ad-categories"&gt;categories&lt;/a&gt; made available to advertisers by the company, and the names and identities of third parties (both advertisers and data-brokers) with whom such data is shared. CNBC, for instance, in 2019 &lt;a href="https://www.nbcnews.com/tech/social-media/mark-zuckerberg-leveraged-facebook-user-data-fight-rivals-help-friends-n994706"&gt;reported &lt;/a&gt;that Facebook selectively shared user data with select partners while denying rival companies from accessing the data. Additionally, companies that allow users to opt out of their data being wholly or partly should disclose this option and make it easy to access. For Example, Facebook lets users turn off data being used for advertising in &lt;a href="https://www.digitaltrends.com/social-media/turned-off-facebook-ad-tracking-personalized-privacy/"&gt;three different categories&lt;/a&gt;. Facebook Ad Preferences menu hidden in a user’s settings is detailed. However, barring a &lt;a href="https://about.fb.com/news/2019/07/understand-why-youre-seeing-ads/"&gt;public post&lt;/a&gt; that attempts to explain how and why users see certain ads on Facebook, which has one line at the end that directs users to their Ad Preference settings to “View and use” their controls, the company does not have any public document explaining users their choices. Amazon, on the other hand allows users to turn off personalized ads completely and has a dedicated &lt;a href="https://www.amazon.com/gp/help/customer/display.html?nodeId=202075050"&gt;page&lt;/a&gt; that explains how a user’s data is used for personalizing advertisements and options to disable it.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;Content recommendations and auto-complete (the use of artificial intelligence to recommend content such as videos, posts, and keywords to users based on their user profiles and past behavior)&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Algorithms and recommendation systems are designed to suggest content that a user is likely to interact with, on the basis of their browsing behaviour and interaction on the platform. These algorithms are constantly updated to be more accurate. Popular examples include &lt;a href="https://instagram-engineering.com/powered-by-ai-instagrams-explore-recommender-system-7ca901d2a882?gi=fb3d603e81a2"&gt;Instagram&lt;/a&gt; and &lt;a href="https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/45530.pdf"&gt;YouTube&lt;/a&gt;. It is interesting to note that these systems have been documented to often suggest &lt;a href="https://www.nytimes.com/interactive/2019/06/08/technology/youtube-radical.html"&gt;radical content&lt;/a&gt; to users, and upon user-interaction with such content, continuously amplify them. YouTube’s algorithm, for instance, has been previously accused of pushing users towards &lt;a href="https://www.nytimes.com/2018/03/10/opinion/sunday/youtube-politics-radical.html"&gt;extremist or inflammatory&lt;/a&gt; ideologies.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Studying how recommendation algorithms function however, and &lt;a href="https://www.wired.com/story/creating-ethical-recommendation-engines/"&gt;why&lt;/a&gt; certain extremist content are being recommended to users, have been difficult, due to one, the complexity of the current &lt;a href="https://www.ivir.nl/publicaties/download/AI-Llanso-Van-Hoboken-Feb-2020.pdf"&gt;information ecosystem&lt;/a&gt;, and two, because of the lack of information around these algorithms. The Santa Clara Principles can, by way of an expansion of scope, look to address the second difficulty, by urging companies to be more transparent with their internal processes.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Sharing of data or open-sourcing algorithms&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;With due recourse paid to the security and integrity of the platform, we recommend that the code for the algorithm used for recommendations should be open-source and publicly available online. &lt;a href="https://www.newamerica.org/oti/reports/rising-through-ranks/news-feed-ranking"&gt;Reddit&lt;/a&gt;, for instance, publishes its code for curation of news feeds in an open-source format.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Another way of doing this, as has been &lt;a href="https://www.ivir.nl/publicaties/download/AI-Llanso-Van-Hoboken-Feb-2020.pdf"&gt;studied&lt;/a&gt;, is to consider a two-pronged method of sharing data. In the first count, datasets identified as ‘sensitive’, are shared in partnerships with certain institutions, under non-disclosure agreements. In the second count, more non-sensitive data is shared in an anonymized format publicly, and made available for any researcher to access.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;This idea, however, must be taken with a few caveats. One, sharing of datasets may not always fulfill the public-facing model of transparency and accountability that the Santa Clara Principles envisage. Two, this might be a particularly onerous obligation for smaller and medium enterprises, and without sufficient economic data, it might be difficult to implement this. And three, any framework adopting this must consider the privacy aspect of such sharing. At this juncture, therefore, we do not recommend this as a compulsory binding obligation that any company adopting the Principles must abide by. Rather, we hope and encourage for more conversations to be held around this concept, so that the aforementioned competing interests are accommodated optimally.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Qualitative transparency&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The other mode of ensuring more clarity into the recommendation system should be by asking companies to publish user-facing, clearly accessible policies and explainers that outline how the company uses algorithms to recommend content to users. This can also include &lt;a href="https://www.wired.com/story/creating-ethical-recommendation-engines/"&gt;creation&lt;/a&gt; of a visible list of topics, which the company has chosen ‘not to amplify’ (for instance, topics such as self-harm, eating disorders), and updated regularly.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;3. Do you feel that the current Santa Clara Principles provide the correct framework for or could be applied to intermediate restrictions (such as age-gating, adding warnings to content, and adding qualifying information to content). If not, should we seek to include these categories in a revision of the principles or would a separate set of principles to cover these issues be better?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The Santa Clara Principles, as they had been originally envisaged, adhered to the commonly adopted binary of take down/leave up in content moderation, where a piece of unlawful, or problematic content (or an account), was either censored from public view or allowed to continue. However, since then, platforms dealing with user-generated content have resorted to a variety of novel and intermediate techniques to moderate and regulate speech which fall outside the aforementioned binary. With adoption of such steps therefore, it is also important for the Principles to evolve and take into consideration the expanded scope of content moderation. In light of that, we recommend the following steps to be taken in the intermediate areas of regulation:&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Adding warnings, qualifying information to content&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;As mentioned above, in recent past, online intermediaries have resorted to more intermediate restrictions to deal with ‘harmful’ content online. These measures have seen an added boost in light of the Covid-19 outbreak, where there has been a massive &lt;a href="https://www.who.int/docs/default-source/coronaviruse/situation-reports/20200202-sitrep-13-ncov-v3.pdf"&gt;increase&lt;/a&gt; in misleading information and conspiracy theories online. These measures have included, among others, &lt;a href="https://about.fb.com/news/2020/04/covid-19-misinfo-update/"&gt;connecting&lt;/a&gt; users who have interacted with misinformation to verified, debunked information and introducing a &lt;a href="https://blog.twitter.com/en_us/topics/product/2020/updating-our-approach-to-misleading-information.html"&gt;spectrum&lt;/a&gt; of actions based on the degree of harm posed by the content, which includes adding labels, warning, and finally, removal. Such intermediate measures currently are not accommodated within the framework of the Santa Clara Principles, for reasons enumerated above, and going forward, it may become important for the Principles to look at the learnings from these measures and adopt them, wherever appropriate, into the framework.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Additionally, as conversations around the instance of Twitter adding a fact-check to Donald Trump’s tweet show, the application of these intermediate measures are often &lt;a href="https://www.theatlantic.com/ideas/archive/2020/05/twitter-cant-change-who-the-president-is/612133/"&gt;ad-hoc&lt;/a&gt;, since there is often no explanation why certain items receive the moderation treatment, while other, similarly misleading content from same &lt;a href="https://www.nytimes.com/2020/06/03/us/politics/trump-twitter-fact-check.html"&gt;sources&lt;/a&gt;, continue to stay online. Accordingly, it is difficult to ascertain the exact reasoning process behind these steps. Therefore, adoption of principles related to measures of adding labels or warnings to information online must also require companies to be transparent with their decision-making processes.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Fact-checking&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;In recent years, with the proliferation of misinformation on online platforms, several companies have either begun to &lt;a href="https://www.facebook.com/journalismproject/programs/third-party-fact-checking/selecting-partners"&gt;collaborate&lt;/a&gt; with fact-checkers, or deploy their own in-house &lt;a href="https://www.reuters.com/article/us-twitter-factcheck/with-fact-checks-twitter-takes-on-a-new-kind-of-task-idUSKBN2360U0"&gt;teams&lt;/a&gt;. While these initiatives should be appreciated, it should also be noted that the term ‘fact checking’ assumes a partisan meaning in certain circumstances, including when sources of &lt;a href="https://newscentral24x7.com/opindia-international-fact-checking-network-fake-news/"&gt;misinformation&lt;/a&gt; themselves offer this service. Accordingly, it becomes important that the fact-checking initiatives adopted by companies adhere to some standards of international best practices, and the decisions made are not riddled with biases, either political or ideological.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;The Santa Clara Principles are useful to ascertain the transparency of any fact-checking initiatives, and can be applied across both collaborations between companies and fact-checkers, as well as for in-house fact checking initiatives.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;For any manner of collaborations, companies must disclose, in clear terms, the names and identities of the fact-checking organizations that they are teaming up with (this &lt;a href="https://en-gb.facebook.com/business/help/182222309230722"&gt;example&lt;/a&gt; from Facebook divides this list of names country-wise) and the nature of this collaboration, which must include details of whether the organization stands to any monetary gains, and what is the level of access to the platform and its dashboards given by the company to the fact-checking organization.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;For in-house initiatives, the Santa Clara Principles must require companies to disclose information regarding any training programs carried out and the background of the fact-checkers, and this might also include a statement regarding the objectivity and non-partisanship of the initiative.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Lastly, comprehensive information about fact-checking must be presented in a clearly accessible format in the company’s regular transparency reports, which should include data on how many pieces of content got fact-checked in the reporting period, the nature of the content (text, photos, videos, multimedia), the nature of misinformation that was being perpetuated (health, communal etc.), and the number of times the said piece of content was shared before it could be fact-checked.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Age-gating&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The Digital Economy Act of 2017, proposed by the UK Government (and since dropped in 2019) serves as an early model of the legislature around the world to regulate the process of putting in place age-restrictions. By the application of that &lt;a href="https://www.wired.co.uk/article/porn-block-uk-wired-explains"&gt;law&lt;/a&gt;, any websites offering pornography would have to show a landing page to any user with an UK IP address, which would not go away till the user is able to show that they are over the age of eighteen years. However, the government had left the exact technical method of implementing the age-gate upto the website, which meant that websites were free to adopt any methods they deem fit for verifying age, which might also include &lt;a href="https://arstechnica.com/tech-policy/2019/10/australia-wants-to-use-face-recognition-for-porn-age-verification/"&gt;facial recognition&lt;/a&gt;.&lt;/p&gt;
&lt;p dir="ltr"&gt;However, learnings from the UK Model, and several other models of attempted age-gating have shown that there are often easy &lt;a href="https://web.archive.org/web/20110606044855/http://www.newstatesman.com/200607310047"&gt;methods&lt;/a&gt; of &lt;a href="https://www.theguardian.com/society/2019/apr/19/uks-porn-age-verification-rules-can-be-circumvented-in-minutes"&gt;circumvention&lt;/a&gt; and the information collected in lieu of implementation of these methods goes on to raise &lt;a href="https://www.theguardian.com/culture/2019/oct/16/uk-drops-plans-for-online-pornography-age-verification-system"&gt;privacy concerns&lt;/a&gt;. It is our understanding that the regulation of age-restrictions is currently in a flux, and setting principled guidelines at this stage may not be completely evidence-based. In such light, it is our recommendation that the Santa Clara Principles should not be expanded to include age-gates. Separate consultations and discussions on the merits of the various forms of age-gating should precede any principles in this subject.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;4. How have you used the Santa Clara Principles as an advocacy tool or resource in the past? In what ways? If you are comfortable with sharing, please include links to any resources or examples you may have.&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;In 2019, we developed specific methodologies to analyse information relating to government requests for content takedown and user information, from transparency reports made available by online companies for India. For creating our methodology for government requests for content takedown, we relied significantly on some of the metrics of the Santa Clara Principles, and utilized them to expand our scope of analysis. Our methodology comprised of the following metrics adopted from the Principles:&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Numbers: We utilized this metric, and further clarified that the numbers should include a numerical breakdown of the requests received under different laws on content takedown.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Sources: The Santa Clara Principles recommend that the intermediary identify the source of the flagging. Under the intermediary liability regime in India, content takedown requests can be sent by the executive, the courts, or third parties. We accordingly argued that transparency reports must classify the received requests into these three categories.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Notice: We also utilized this metric for our methodology.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p dir="ltr"&gt;The full version of our methodology and the results from our analysis can be found &lt;a href="https://cis-india.org/internet-governance/files/A%20collation%20and%20analysis%20of%20government%20requests%20for%20user%20data%20%20and%20content%20removal%20from%20non-Indian%20intermediaries%20.pdf"&gt;here&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;5. How can the Santa Clara Principles be more useful in your advocacy around these issues going forward?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;We intend to apply this methodology for future editions of the report as well, and build up a considerable body of work on transparency reporting practices in the Indian context.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;6. Do you think that the Santa Clara Principles should apply to the moderation of advertisements, in addition to the moderation of unpaid user-generated content? If so, do you think that all or only some of them should apply?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Moderation of advertisements in the recent years have become an interesting point of contention, be it advertisements that &lt;a href="https://play.google.com/about/monetization-ads/ads/#!?zippy_activeEl=disruptive#disruptive"&gt;violate&lt;/a&gt; the companies policies on disruptive ads policies, or advertisements with more nefarious undertones, including &lt;a href="https://www.theverge.com/platform/amp/2020/6/16/21293285/google-ads-bans-the-federalist-zero-hedge-racist-content-discrimination-demonetization?utm_campaign=theverge&amp;amp;utm_content=chorus&amp;amp;utm_medium=social&amp;amp;utm_source=twitter&amp;amp;__twitter_impression=true"&gt;racist language&lt;/a&gt; and associations to &lt;a href="https://www.nbcnews.com/tech/tech-news/facebook-removes-trump-ads-violating-organized-hate-policy-n1231468"&gt;Nazi symbols&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Several companies already have various &lt;a href="https://business.twitter.com/en/help/ads-policies.html"&gt;moderation&lt;/a&gt; &lt;a href="https://www.blog.google/technology/ads/upcoming-update-housing-employment-and-credit-advertising-policies/"&gt;policies&lt;/a&gt; for these kinds of harmful advertisements and other content that advertisers can promote, and these are often public. Based on this, we think that the Santa Clara Principles can be expanded to include the moderation of advertisements, and the metrics contained within would be applicable across this vertical, wherever appropriate.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;7. Is there any part of the Santa Clara Principles which you find unclear or hard to understand?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;N/A.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;8. Are there any specific risks to human rights which the Santa Clara Principles could better help mitigate by encouraging companies to provide specific additional types of data? (For example, is there a particular type of malicious flagging campaign which would not be visible in the data currently called for by the SCPs, but would be visible were the data to include an additional column.)&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;N/A.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;9. Are there any regional, national, or cultural considerations that are not currently reflected in the Santa Clara Principles, but should be?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;While utilizing the Principles for the purposes of our research, we found that the nature of information that some of these online companies make available for users residing in the USA, is very different from the information they make available for users residing in other countries, including in India. For instance, Amazon’s transparency reports regarding government requests for content removal, till the first half of &lt;a href="https://d1.awsstatic.com/certifications/Information_Request_Report_June_2018.pdf"&gt;2018&lt;/a&gt;, was restricted only to the US, despite the company having a considerably large presence in India (during our &lt;a href="https://cis-india.org/internet-governance/files/A%20collation%20and%20analysis%20of%20government%20requests%20for%20user%20data%20%20and%20content%20removal%20from%20non-Indian%20intermediaries%20.pdf"&gt;research&lt;/a&gt;, Alexa Rank showed Amazon.com to be the 14th most visited website in India).&lt;/p&gt;
&lt;p dir="ltr"&gt;A public commitment to uphold Santa Clara Principles (as several companies have undertaken, see EFF’s recent Who Has Your Back? &lt;a href="https://www.eff.org/wp/who-has-your-back-2019#santa-clara-principles"&gt;report&lt;/a&gt;) would mean nothing if these commitments do not extend to all the markets in which the company is operating. Accordingly, we believe that it must be emphasized that the adoption of these Principles into the transparency reporting practices of the company must be consistent across markets, and the information made available should be as uniform as it is legally permissible.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;10. Are there considerations for small and medium enterprises that are not currently reflected in the Santa Clara Principles, but should be?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Our understanding at this current juncture is that not enough data exists around the economic costs of setting up the transparency and accountability structures. Accordingly, at the end of this Consultation period, should the Principles be expanded to include more intermediate restrictions and develop accountability structures around algorithmic use, we recommend that a separate consultation be held with small and medium enterprises to identify a) whether or not there would be any economic costs of adoption and how best the Principles can accommodate them, and b) what are the basic minimum guidelines that these enterprises would be able to adopt as a starting point.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;11. What recommendations do you have to ensure that the Santa Clara Principles remain viable, feasible, and relevant in the long term?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Given the dynamic nature of developments in the realm of content moderation, periodical consultations, in the vein of the current one, would ensure that the stakeholders are able to raise novel issues at the end of each period, allow the Principles to take stock of the same, and incorporate changes to that effect. We believe that this would allow for the Principles to continue to be aware of the realities of content moderation, and allow for evidence-based policy-making.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;12. Who would you recommend to take part in further consultation about the Santa Clara Principles? If possible, please share their names and email addresses.&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;N/A.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;13. If the Santa Clara Principles were to call for a disclosure about the training or cultural background of the content moderators employed by a platform, what would you want the platforms to say in that disclosure? (For example: Disclosing what percentage of the moderators had passed a language test for the language(s) they were moderating or disclosing that all moderators had gone through a specific type of training.)&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;By now, there have been well documented &lt;a href="https://www.vice.com/en_in/article/43z7gj/how-facebook-trains-content-moderators"&gt;accounts of&lt;/a&gt; human moderators, by independent investigations or admissions by companies. For instance, this &lt;a href="https://www.facebook.com/notes/mark-zuckerberg/a-blueprint-for-content-governance-and-enforcement/10156443129621634/"&gt;blogpost&lt;/a&gt; authored in 2018 by Mark Zuckerberg documented the percentage of human moderators who were trained in the Burmese language, in reference to moderating content on the platform in Myanmar. Comprehensive information about linguistic and cultural backgrounds of human moderators is a useful tool to contextualize the decisions made by the platform, and also useful in pushing more effective reforms.&lt;/p&gt;
&lt;p dir="ltr"&gt;Additionally, it has also been seen that a company’s public facing moderation norms often differ from its internal guidelines, which are shared with its team of human moderators. For instance, TikTok’s internal norms had &lt;a href="https://theintercept.com/2020/03/16/tiktok-app-moderators-users-discrimination/"&gt;asked&lt;/a&gt; its moderators to ‘suppress’ content from users perceived to be ‘poor’ and ‘ugly’. The gaps in these norms means that there are surreptitious forms of censorship behind-the-scenes, and it is difficult to ascertain the reasonableness and appropriateness of these decisions.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;We would also like to emphasize more stringent disclosure requirements from companies regarding the nature of engagement with which they employ their human moderators. As &lt;a href="https://www.theverge.com/2019/2/25/18229714/cognizant-facebook-content-moderator-interviews-trauma-working-conditions-arizona"&gt;investigations&lt;/a&gt; have &lt;a href="https://www.livemint.com/news/india/inside-the-world-of-india-s-content-mods-11584543074609.html"&gt;revealed&lt;/a&gt;, the task of human moderation is often outsourced by these companies to third-party firms, and the working conditions in which the moderators make their decisions are inhospitable. Additionally, more often than not, there are no publicly available methods to ascertain whether the company in question is doing enough to ensure the well-being and safety of these moderators.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Therefore, alongside disclosure regarding the nature of training given to the human moderators and their internal moderation norms, we also recommend that the Principles recognize certain fundamental ethical guidelines with relation to their human moderators that companies must adopt. This might include providing identifying information of the third-party firms to which the company outsources its moderation and assurances of sufficient number of counsellors for the moderators.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;14. Do you have any additional suggestions?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;While the Santa Clara Principles provide a granular and robust framework of reporting, currently it stands to only cover aspects of quantitative transparency - concerning numbers and items. As we have indicated throughout this submission, and in our previous research, there are also need for companies to adhere to more norms focussing on qualitative transparency - in the form of material disclosure of the policies, processes and structures they associate with, or make use of. Aside from the suggestions in the previous sections, in this section we highlight two additional recommendations that we think can help achieve this.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Material regarding local laws&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;One of our preliminary findings regarding the way these intermediaries report data for other regions (including India) has been that most of the time, the information is incomplete, especially with regards to material regarding the local laws. Compared to the US, for which most of these companies dedicate separate sections, other regions feature relatively fewer times in their reports. Each country in which the company functions, there would be various laws governing content removal, different authorities empowered to issue orders, and varied procedural and substantive requirements of a valid request. For the empowerment of users, we believe that the exact metrics and requirements of these laws must be presented by the intermediaries, in a clear and readable format.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Accessibility of policies&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;On the topic of empowerment of users, we also believe that the basic information and policies regarding these requests should be placed at one place, for maximum accessibility by users. During our research, we discovered that the disclosures made in lieu of the Principles were spread over different policies, some of which were not easily accessible. While it is not possible at this juncture to predict a comprehensively objective way of making all this information accessible, we believe it would be a useful step if the basic information regarding the intermediary's transparency reporting policies were presented in the same manner as the company's Terms and Services and Privacy Policy. Additionally, we believe that these disclosures should be translated into major languages in which the company operates, for further accessibility.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;15. Have current events like COVID-19 increased your awareness of specific transparency and accountability needs, or of shortcomings of the Santa Clara Principles?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The Covid-19 pandemic proves to be a watershed moment for the history of the internet, inasmuch in the manner of proliferation of various forms of misinformation and conspiracy theories, as well as the way in which companies have stepped up to remove said content from their platforms. This has included companies like &lt;a href="https://gadgets.ndtv.com/internet/news/google-india-announces-steps-to-help-combat-covid-19-misinformation-2211357"&gt;Google&lt;/a&gt;, &lt;a href="https://blog.twitter.com/en_us/topics/company/2020/An-update-on-our-continuity-strategy-during-COVID-19.html"&gt;Twitter&lt;/a&gt; and &lt;a href="https://about.fb.com/news/2020/03/combating-covid-19-misinformation/"&gt;Facebook&lt;/a&gt;, who have sought to increasingly rely on automated tools for rapid moderation of harmful content&amp;nbsp; related to the pandemic.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;These practices reaffirm the need for having strong requirements for transparency disclosures, both qualitative and quantitative, especially around the use of automated tools for content takedown. This is because of two main reasons.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;One, the speed of removal would never tell us &lt;a href="https://cis-india.org/internet-governance/blog/torsha-sarkar-november-30-2019-a-deep-dive-into-content-takedown-timeframes"&gt;anything&lt;/a&gt; about the accuracy of the measure. A platform can say that in one reporting period, it took down 1000 pieces of content; this would not mean that its actions were always accurate, or fair or reasonable, since there is no publicly available information to ascertain so. This phenomenon, aggregated with the heightened &lt;a href="https://meity.gov.in/writereaddata/files/advisory_to_curb_false_news-misinformation_on_corona_virus.pdf"&gt;pressure&lt;/a&gt; to remove misinformation related to the pandemic, may contribute to firstly, erroneous removals (as YouTube has &lt;a href="https://youtube-creators.googleblog.com/2020/03/protecting-our-extended-workforce-and.html"&gt;warned&lt;/a&gt; in blogs), and secondly, towards deepening the information asymmetry regarding accurate data around removals.&lt;/p&gt;
&lt;p dir="ltr"&gt;Two, given the novel and diverse forms of misleading information related to the pandemic, this offers a critical time to &lt;a href="https://cdt.org/insights/covid-19-content-moderation-research-letter/"&gt;study&lt;/a&gt; the relation between online information and the outcomes of a public health crisis. However, these efforts would be thwarted if reliable information around removals relating to the pandemic continue to be unavailable.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/response-to-the-2018call-for-submissions2019-on-the-santa-clara-principles-on-transparency-and-accountability'&gt;https://cis-india.org/internet-governance/blog/response-to-the-2018call-for-submissions2019-on-the-santa-clara-principles-on-transparency-and-accountability&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Torsha Sarkar and Suhan S</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-07-01T05:56:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-4">
    <title>Brindaalakshmi.K - Gendering of Development Data in India - Beyond the Binary #4</title>
    <link>https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-4</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-4'&gt;https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-4&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-06-30T10:34:03Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-3">
    <title>Brindaalakshmi.K - Gendering of Development Data in India - Beyond the Binary #3</title>
    <link>https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-3</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-3'&gt;https://cis-india.org/raw/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-3&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-06-30T09:48:48Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/brindaalakshmi-k-gendering-development-data-india">
    <title>Brindaalakshmi.K - Gendering of Development Data in India: Beyond the Binary</title>
    <link>https://cis-india.org/raw/brindaalakshmi-k-gendering-development-data-india</link>
    <description>
        &lt;b&gt;This report by Brindaalakshmi.K seeks to understand the gendering of development data in India: collection of data and issuance of government (foundational and functional) identity documents to persons identifying outside the cis/binary genders of female and male, and the data misrepresentations, barriers to accessing public and private services, and
informational exclusions that still remain. Sumandro Chattapadhyay edited the report and Puthiya Purayil Sneha offered additional editorial support. This work was undertaken as part of the Big Data for Development network supported by International Development Research Centre (IDRC), Canada.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Part 1 - Introduction, Research Method, and Summary of Findings: &lt;a href="https://cis-india.org/raw/files/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-1" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;Part 2 - Legal Rights and Enumeration Process: &lt;a href="https://cis-india.org/raw/files/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-2" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;Part 3 - Identity Documents and Access to Welfare: &lt;a href="https://cis-india.org/raw/files/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-3" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;Part 4 - Digital Services and Data Challenges: &lt;a href="https://cis-india.org/raw/files/brindaalakshmi-k-gendering-of-development-data-in-india-beyond-the-binary-4" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;India has been under a national lockdown due to the global outbreak of the COVID-19 pandemic since late March 2020. Although transgender persons or individuals who do not identify with the gender of their assigned sex at birth, fall into the eligibility category for the relief measures announced by the State, the implementation of the relief measures has seen to be inefficient in different states [1] of the country [2]. Many transgender persons still do not have proper identification documents in their preferred name and gender that can help them with claiming any welfare that is available [3].&lt;/p&gt;
&lt;p&gt;Historically, the situation of transgender persons in India has been so, even prior to the present pandemic. A qualitative research study titled &lt;em&gt;Gendering of Development Data in India: Beyond the Binary&lt;/em&gt; was undertaken during October 2018 - December 2019, to understand the gendering of development data in India, collection of data and issuance of government (foundational and functional) identity documents to persons identifying outside the cis/binary genders of female and male, and the data misrepresentations, barriers to accessing public and private services, and informational exclusions that still remain.&lt;/p&gt;
&lt;p&gt;The interviews for this study were conducted in late 2018 and this report was completed in the beginning of 2020, after India went through an extended national debate on and finally enactment of the Transgender Persons (Protection of Rights) Act during 2019.  Three key observations from this study are presented in this blog post. Although these observations were made prior to the release of the draft rules of the new law, it is important to note that the law along with the draft rules in its present version will likely aggrevate the data and social exclusions faced by the transgender community in India.&lt;/p&gt;
&lt;h4&gt;Observation 1: The need for data has sidestepped the state’s responsibility to address the human rights of its people&lt;/h4&gt;
&lt;p&gt;The present global development agenda is to &lt;em&gt;leave no one behind&lt;/em&gt; [4]. The effort to leave no one behind has shifted the focus of the state towards collecting data on different population groups. The design of and access to welfare programmes relies heavily on the availability of data. The impact of these programmes are again measured and understood as reflected by data. This shift in focus to data has led to further exclusion of already disenfranchised groups including the transgender community [5]. The problem with this lies in the framing of the development discourse as one that demands data as the prerequisite to access welfare benefits.&lt;/p&gt;
&lt;p&gt;However, there are significant issues with the data on transgender persons that has been fed into different national and state-level databases, beginning with the census of 2011. For the first time, census of 2011 attempted to enumerate transgender persons. However, the enumeration of transgender persons for the census of 2011 has been severely criticised by the transgender community due to lack of&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Clear distinction between sex and gender in the census data collection process,&lt;/li&gt;
&lt;li&gt;Community consultation in designing the enumeration process, and&lt;/li&gt;
&lt;li&gt;Inclusion of all transgender identities, among others.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;However, this flawed data set is being used as the primary data for fund allocation across different states for transgender people’s inclusion, note respondents. Further, any person identifying outside the gender of their assigned sex at birth faces the additional burden of proving their gender identity to access any welfare benefit. However, cisgendered men or women are never asked to prove their gender identity. The need for data from a marginalised population group without addressing the structural problems has only led to further exclusion of this already invisible group of individuals, note respondents. Further, the  Transgender Persons (Protection of Rights) Act, 2019 was passed despite the severe criticisms from the transgender community, human rights activist groups [6] and even opposition political parties [7] in India for several reasons [8].&lt;/p&gt;
&lt;h4&gt;Observation 2: Replication of existing offline challenges by digital systems in multiple data sources, continues to keep transgender persons excluded&lt;/h4&gt;
&lt;p&gt;Digitisation was supposed to remove existing offline challenges and enable more people centric systems [9]. However, digital systems seem to have replicated the existing offline challenges. In several cases, digitisation has added to the complexities involved.&lt;/p&gt;
&lt;p&gt;The replication of challenges begins with the assumption that digital processes are the best way to collect data on transgender persons. Both level of literacy and digital literacy are low among transgender persons in India. According to a report by the National Human Rights Commission [10], nearly 50% of transgender persons have studied less than Class X. This has a significant effect on their access to different rights.&lt;/p&gt;
&lt;p&gt;Access to mobile phones is assumed to bridge this access gap to online systems and services. However, observations from different respondents suggest otherwise. Additionally, due to their gender identity, transgender individuals face different set of challenges in procuring valid identification documents required to enter data systems, note respondents. This includes but not limited to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Lack of standardised online or offline processes to aid in changing their documents and vary within each state in different documents.&lt;/li&gt;
&lt;li&gt;Procuring any identification document in preferred name and gender requires existing identification documents in given name and assigned gender, in both online and offline processes.  However, due to the stigma with their gender identity, transgender persons often run away from home with no identification document in their assigned name and gender.&lt;/li&gt;
&lt;li&gt;With or without an existing ID document, individuals have to go through a tedious offline legal process to change their name and gender on different documents.&lt;/li&gt;
&lt;li&gt;Information on such processes, digital or otherwise are usually available only to individuals who are educated or associated with a non-profit organisation working with the community. The challenges are higher for individuals with neither.&lt;/li&gt;&lt;/ul&gt;
&lt;h4&gt;Observation 3: Private big data is not good enough as an alternative source of evidence for designing welfare services for transgender persons&lt;/h4&gt;
&lt;p&gt;Globally, public private partnerships for big data are being pushed through different initiatives like Data Collaboratives [11] and UN Global Pulse [12], among others. These private partnerships are being seen as key to using big data for official statistics, which can then aid in making welfare decisions [13]. However, the respondents note that the different private big data sources are not good enough to make welfare decisions for various reasons including but not limited to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Dependency on government documents:&lt;/strong&gt; Access to any private service system like banking, healthcare, housing or education by any individual requires verification using some proof of identity. The discrimination and challenges in procuring government issued identification documents impacts the ability of transgender persons to enter private data systems. This in turn impacts their access to services.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Misrepresentation in data:&lt;/strong&gt; The dependency of private services on government issued documents / government recorded data, and hierarchy among such documents/data and the continued misrepresentation of transgender people, impacts the big data generated by private service providers. Due to the stigma faced, many transgender persons avoid using public healthcare systems for other medical conditions. The heavy dependency on private health care and lower usage of public health systems, results in insufficient big data  on transgender persons, created by both public and private medical care and hence cannot be used to design health related welfare services.
&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Social media data issues:&lt;/strong&gt; Different websites and apps also use social media login as the ID verification mechanism. Since not all transgender persons are out to their family and friends about their gender identity, they often tend to have multiple social media accounts with different names and gender to protect their identity. When open about their gender identity, harassment and bullying of transgender persons with violent threats or sexually lucid remarks are quite common on social media platforms. Online privacy therefore continues to be a serious concern for them. Disclosing their transgender status also enables the system to predict user patterns of a vulnerable group with potential for abuse, note respondents.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;In conclusion, the present global pandemic has further amplified the inherent flaws in the present data-driven welfare system in the country and its impacts on a marginalised population group like transgender persons in the country. Globally, gender in development data is seen in binary genders of male and female, leaving behind transgender individuals or those who do not identify with the gender of their assigned sex at birth. So the dominant binary gender data conversation is in fact leaving people behind. With the regressive Transgender Persons (Protection of Rights) Act of 2019 and its rules, this inadequacy in the global development agenda related to gender equality is felt at an amplified scale.&lt;/p&gt;
&lt;p&gt;Building on the work of Dr. Usha Ramanathan, a renowned human rights activist, I say that data collection and monitoring systems that tag, track, and profile transgender persons placing them under surveillance, have consequences beyond the denial of services, and enter into the arena of criminalising for being beyond the binary [14]. The vulnerabilities of their gender identity exacerbates the threat to freedom. With their freedom threatened, expecting people to be forthcoming about self-identifying themselves in their preferred name and gender, so as to ensure that they are counted in data-driven development interventions and can thus access their constitutionally guaranteed rights, goes against the very idea of sustainable development and human rights.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;References&lt;/h4&gt;
&lt;p&gt;[1] Kumar. V (2020, May 13). In Jharkhand, a Mockery of 'Right to Food' as Lockdown Relief Measures Fail to Deliver. The Wire. Retrieved from: &lt;a href="https://thewire.in/food/lockdown-jharkhand-hunger-deaths-corruption-food" target="_blank"&gt;https://thewire.in/food/lockdown-jharkhand-hunger-deaths-corruption-food&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[2] Manoj. C.K. (2020, April 24). COVID-19: Thousands pushed to starvation due to faulty biometric system in Bihar. DownToEarth. Retrieved from: &lt;a href="https://www.downtoearth.org.in/news/food/covid-19-thousands-pushed-to-starvation-due-to-faulty-biometric-system-in-bihar-70681" target="_blank"&gt;https://www.downtoearth.org.in/news/food/covid-19-thousands-pushed-to-starvation-due-to-faulty-biometric-system-in-bihar-70681&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[3] G. Ram Mohan. (2020, May 01). Eviction Fear Heightens as Lockdown Signals Loss of Livelihood for Transgender People. The Wire. Retrieved from: &lt;a href="https://thewire.in/rights/transgender-people-lockdown-coronavirus" target="_blank"&gt;https://thewire.in/rights/transgender-people-lockdown-coronavirus &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[4] UN Statistics (2016). The Sustainable Development Goals Report 2016. United Nations Statistics. Retrieved from: &lt;a href="https://unstats.un.org/sdgs/report/2016/leaving-no-one-behind" target="_blank"&gt;https://unstats.un.org/sdgs/report/2016/leaving-no-one-behind&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[5] Chakrabarti. A (2020, April 25). Visibly Invisible: The Plight Of Transgender Community Due To India's COVID-19 Lockdown. Outlook. Retrieved from: &lt;a href="https://www.outlookindia.com/website/story/opinion-visibly-invisible-the-plight-of-transgender-community-due-to-indias-covid-19-lockdown/351468" target="_blank"&gt;https://www.outlookindia.com/website/story/opinion-visibly-invisible-the-plight-of-transgender-community-due-to-indias-covid-19-lockdown/351468&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[6] Knight Kyle. (2019, December 05). India’s Transgender Rights Law Isn’t Worth Celebrating. Human Rights Watch. Retrieved from: &lt;a href="https://www.hrw.org/news/2019/12/06/indias-transgender-rights-law-isnt-worth-celebrating" target="_blank"&gt;https://www.hrw.org/news/2019/12/06/indias-transgender-rights-law-isnt-worth-celebrating&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[7] Dharmadhikari Sanyukta. (2019). Trans Bill 2019 passed in Lok Sabha: Why the trans community in India is rejecting it. The News Minute. August 05. Retrieved from: &lt;a href="https://www.thenewsminute.com/article/trans-bill-2019-passed-lok-sabha-why-trans-community-india-rejecting-it-106695" target="_blank"&gt;https://www.thenewsminute.com/article/trans-bill-2019-passed-lok-sabha-why-trans-community-india-rejecting-it-106695&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[8] Editorial. (2018, December 20). Rights, revised: on the Transgender Persons Bill, 2018. The Hindu. Retrieved from: &lt;a href="https://www.thehindu.com/opinion/editorial/rights-revised/article25783926.ece" target="_blank"&gt;https://www.thehindu.com/opinion/editorial/rights-revised/article25783926.ece&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[9] Ministry of Electronics and Information Technology, Government of India. (2018). National e-Governance Plan. Retrieved from: &lt;a href="https://meity.gov.in/divisions/national-e-governance-plan" target="_blank"&gt;https://meity.gov.in/divisions/national-e-governance-plan&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[10] Kerala Development Society. (2017, February). &lt;em&gt;Study on Human Rights of Transgender as a Third Gender&lt;/em&gt;. Retrieved from: &lt;a href="https://nhrc.nic.in/sites/default/files/Study_HR_transgender_03082018.pdf" target="_blank"&gt;https://nhrc.nic.in/sites/default/files/Study_HR_transgender_03082018.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[11] Verhulst, S. G., Young, A., Winowatan, M., &amp;amp; Zahuranec, A. J. (2019, October). &lt;em&gt;Leveraging Private Data for Public Good: A Descriptive Analysis and Typology of Existing Practices&lt;/em&gt;. GovLab, Tandon School of Engineering, New York University. Retrieved from: &lt;a href="https://datacollaboratives.org/static/files/existing-practices-report.pdf" target="_blank"&gt;https://datacollaboratives.org/static/files/existing-practices-report.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[12]  Kirkpatrick, R., &amp;amp; Vacarelu, F. (2018, December). A Decade of Leveraging Big Data for Sustainable Development. UN Chronicle, Vol. LV, Nos. 3 &amp;amp; 4. Retrieved from: &lt;a href="https://unchronicle.un.org/article/decade-leveraging-big-data-sustainable-development" target="_blank"&gt;https://unchronicle.un.org/article/decade-leveraging-big-data-sustainable-development&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[13] See [11].&lt;/p&gt;
&lt;p&gt;[14] Ramanathan. U. (2014, May 02). Biometrics Use for Social Protection Programmes in India Risk Violating Human Rights of the Poor. UNRISD. Retrieved from: &lt;a href="http://www.unrisd.org/sp-hr-ramanathan" target="_blank"&gt;http://www.unrisd.org/sp-hr-ramanathan&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/brindaalakshmi-k-gendering-development-data-india'&gt;https://cis-india.org/raw/brindaalakshmi-k-gendering-development-data-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Brindaalakshmi.K</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Gender, Welfare, and Privacy</dc:subject>
    
    
        <dc:subject>Transgender</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2020-06-30T10:26:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu">
    <title>Guest Report: Bridging the Concerns with Recommending Aarogya Setu</title>
    <link>https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu</link>
    <description>
        &lt;b&gt;Keywords: Aarogya Setu, Constitutionality, Digital Contact Tracing, Location Data, Personal Data Protection Bill, 2019, Exemptions, Personal Data, Sensitive Personal Data, Mosaic Theory, Surveillance, Privacy, Governing Law, Necessity, Intensity of Review, disparate Impact, Proportionality

&lt;/b&gt;
        
&lt;p id="docs-internal-guid-8cd22a8f-7fff-cd1f-19b3-539a748e971f" style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;This report was edited and reviewed by Arindrajit Basu, Mira Swaminathan, and Aman Nair.Read the full report &lt;a class="external-link" href="http://cis-india.org/aarogya setu privacy"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;EXECUTIVE SUMMARY&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;Aarogya Setu collects real-time location data of users every fifteen minutes to facilitate digital contact tracing during the Pandemic. It inter alia color-codes users indicating the extent of risk they pose based on their health status and predicts hotspots which are more susceptible to COVID-19. Its forecasts have reportedly facilitated the identification of 650 clusters of COVID-19 hotspots and predicting 300 emerging hotspots which may have been otherwise missed. In a welcome move, the source code of the application was recently made public. The initially-introduced mandate to use the application was reportedly diluted and a Protocol supplementing the privacy policy with additional safeguards was released. Despite these steps in the right direction, some key concerns continue to require alleviation through engagement. This Report seeks to constructively engage with these concerns towards making privacy safeguards governing its operability more consistent with international best practices.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;First, the Report maps situations in which Aarogya Setu in fact remains mandatory (in Table 1) In these situations, there exists no restriction against private parties (e.g. employers, airlines, etc.) from indirectly making its use mandatory. Consequently, there is no real choice in determining the use of the application. Even where there exists a choice to opt-out (e.g. in contexts where there is only an advisory but no indirect mandate), the choice is not meaningful due to the inability to examine the potential consequences of using the apn remains mandatory for practical purposes since there still exists an obligation to undertake due diligence towards making sure that every employee uses the application. In other words, this part of the report explains why it remains indirectly mandatory to use the application. This indirect mandate impedes the exercise of meaningful consent. This could be addressed through a notification directing that no one should be indirectly compelled to use the application. This part also acknowledges that even where a choice to opt-out (e.g. in contexts where there is only an advisory but no indirect mandate), the choice is not meaningful due to the inability to examine the potential consequences of using the application.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;Second, the report explains why the mandate to use the Application raises concerns in the first place: i.e. in the absence of transparency beyond the publication of the source code. The open-source code may not necessarily result in meaningful algorithmic transparency (since the processing in the models at the Government of India server continues to remain a black box) in respect of predictions made to determine appropriate health responses. Based on the source code per se, people are unable to verify the wherever there exists operability of the Application more meaningfully. Algorithmic transparency enables people to make an informed decision in using the Application by choice. The ability to make an informed decision is critical to the right to privacy. The right to privacy does not just mean drawing boundaries or creating limitations against any external interference. The right also includes the public’s right to know how an algorithm affects their lives. Given the centrality of transparency in the ability of the user to exercise their privacy better, beyond releasing the source code of Aarogya Setu, publicizing information about how predictions are made is important. This part acknowledges the limitations of transparency in that it can only facilitate identification of privacy harms and not really solve them by itself. Yet, it goes ahead and re-emphasises the inter-relationship of transparency and privacy, highlighting how it became a basis recently in striking down a government-used algorithm, which indicates incentive to increase transparency.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Third, the report reviews whether based on the already-available information from the combined reading of the privacy policy and the protocol, the operability of the application seems consistent with best international practices in protecting user privacy. This part begins with an analysis of the privacy policy and the protocol, which indicate privacy concerns in relation to inter alia location data, followed by an explanation as to why there exists a reasonable expectation of privacy over location data (to establish a privacy intrusion). This is followed by structurally applying the proportionality test to identify necessary modifications to the current framework:&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The 'legality' prong may be satisfied by a combined reading of the NDMA and the specificity in the delegated legislation, as has been done in the past particularly in the context of location tracking. However, it is suggested (in the recommendations section) that a statutory legislation comprehensively governing the operability of the Application is introduced to ensure predictability and permanency in the framework governing the operability of the Application as done internationally. Moreover, determining appropriate health responses to the Pandemic is indeed a legitimate interest that is sought to be achieved through the application&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Given the limitations of traditional methods of contact-tracing, digital contact tracing could perhaps be a suitable method of ascertaining appropriate health responses to the Pandemic subject to a comprehensive review of evidence on a regular basis to evaluate verifiably its effectiveness. Since the use of the application seems likely in the long run, its efficacy needs to be backed by concrete evidence which corroborates its accuracy and effectiveness such as statistical data on false positives and negatives that result from the application&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A careful reading of the combined reading of the Aarogya Setu privacy policy and the Protocol with Fair Information Protection Principles (‘FIPP’) indicates some inconsistencies with international best practices. The extent of inconsistency with best practices may not be considered the least restrictive and therefore necessary form in which digital contact tracing can be conducted in India&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Since the inconsistencies seem relatively more restrictive than necessary to facilitate digital contact tracing in India, a balancing of privacy and public health could result in the conclusion that the application is not ‘proportionate’ to the potential privacy harms that can result from using the application. While conducting the balancing exercise, privacy and public health should be viewed as complementary, not competing interests. This conception would encourage courts to consider privacy concerns with sufficient extent of intensity&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;Based on this analysis, the report concludes that digital contact tracing provided the following conditions (detailed in the ‘Recommendations’ section) are conjunctively satisfied:&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Digital contact tracing should supplement (e.g. be in addition to) and not supplant (i.e. replace) traditional methods of contact tracing entirely, particularly for vulnerable groups (e.g. interviews where vulnerable groups, particularly marginalized women do not have access to mobile phones);&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A statutory law should be introduced which strictly and comprehensively governs the scope of the application,&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;the suitability of the application (with meaningful algorithmic transparency) should be corroborated by reliable and relevant statistical evidence (e.g. with the help of closer scrutiny of the basis of predictive outcomes) and&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The privacy compromises using the application should be intrusive to the minimum extent possible. This could be done by further adding robust safeguards through stronger restrictions on sharing the collected data&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;(Final year undergraduate student of the National University of Juridical Sciences (NUJS), Kolkata with a sustained interest in law, technology and policy (graduating with the class of 2020).&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu'&gt;https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-06-24T05:19:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
