<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1 to 2.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cyber-crime-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/cyber-crime-privacy">
    <title>Cyber Crime &amp; Privacy</title>
    <link>https://cis-india.org/internet-governance/cyber-crime-privacy</link>
    <description>
        &lt;b&gt;India is a growing area in the field of active Internet usage with 71 million Internet users.&lt;/b&gt;
        &lt;h3&gt;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Introduction&lt;/h3&gt;
&lt;p&gt;India is a growing area in the field of active Internet usage with 71 million Internet users.[&lt;a href="#1"&gt;1&lt;/a&gt;] “Cyberspace is shorthand for the Web of consumer electronics; computers and communication networks that interconnect the World”. [&lt;a href="#2"&gt;2&lt;/a&gt;] The recent incidents of hacking into various popular websites of Yahoo, CNN, Sony, the CBI and the Indian Army raise the very pertinent issue of online data privacy. This blog will examine the growing instances of hacking websites and its impact on data privacy.&lt;/p&gt;
&lt;h3&gt;Cyber Crime&lt;/h3&gt;
&lt;p&gt;“Cybercrime is a criminal offence on the Web, a criminal offence regarding the Internet, a violation of law on the Internet, an illegality committed with regard to the Internet, breach of law on the Internet, computer crime, contravention through the Web, corruption regarding Internet, disrupting operations through malevolent programs on the Internet, electric crime, sale of contraband on the Internet, stalking victims on the Internet and theft of identity on the Internet.”[&lt;a href="#3"&gt;3&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;The computer age gave rise to a new field of crime namely “cybercrime” or “computer crime”. During the 1960s and 1970s cybercrime involved physical damage to the consumer system. Gradually computers were attacked using more sophisticated modus operandi where individuals would hack into the operating system to gain access to consumer files. The 1970s - through to the present - saw cybercrimes taking different trajectories like impersonation, credit card frauds, identity theft, and virus attacks, etc.[&lt;a href="#4"&gt;4&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;The IT Act 2000 was enacted by the government to punish such acts of cyber crime. The Act was amended in the year 2008[&lt;a href="#5"&gt;5&lt;/a&gt;].&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Cybercrime — An Overview: India&lt;/h3&gt;
&lt;p&gt;The IT Act 2000 was enacted by the government in 2000 to punish acts of cyber crime. The Act was amended in the year 2008[&lt;a href="#5"&gt;5&lt;/a&gt;]. According to the National Crime Records Bureau, cyber crime is on the rise. The Bureau reported that 420 cases were reported under the IT Act in the year 2009 alone, which was a 45.8 per cent increase from the year 2008. [&lt;a href="#6"&gt;6&lt;/a&gt;] The NCRB data on cyber crime also provides a useful insight as to the growing awareness of the IT Act. The data clearly shows an increase in the number of cases reported from the years 2005 to 2009.[&lt;a href="#7"&gt;7&lt;/a&gt;]. Hacking and obscene [&lt;a href="#8"&gt;8&lt;/a&gt;] publication/transmission are the highest reported crimes with the highest rate of conviction under the IT Act 2008.&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Cyber Attack: No One is Safe!!&lt;/h3&gt;
&lt;p&gt;In February 2000 the many ‘busy’ Internet websites were jammed shut by hackers causing a national upheaval in the USA with the then President Clinton calling in a high level meeting with experts from around the world. Websites like Yahoo.com were forced to shut down for three hours after they were ‘smurfed’ by hackers [&lt;a href="#9"&gt;9&lt;/a&gt;]. Many other websites like Amazon.com and CNN.com were also attacked by the same hackers. Hacking such popular websites within a span of few hours was unprecedented which left many, including the FBI, clueless. By far these are the most serious cyber attacks in the history of Internet. The attacks not only shut down important sites, but also highlighted a very disturbing growing trend. If such popular websites were shut down by unknown perpetrators then how in the world will these and similar sites be able to protect scores of personal data and credit card information of the customers they pledge to serve? &amp;nbsp;&lt;/p&gt;
&lt;p&gt;More recently cyber vandals attacked the US Senate website on the 14 June 2011, causing a huge security scare [&lt;a href="#10"&gt;10&lt;/a&gt;]. This instance again brings us to the pertinent question of the safety of our personal data held by these websites. If the personal data of the US Senators can be breached by somebody, then certainly we as consumers should be very wary of the cyberspace and its ability to protect our data.&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Closer Home&lt;/h3&gt;
&lt;p&gt;On June 8, a group claiming to be “anonymous” hacked into the government’s National Information Centre to protest against the anti-graft agitation [&lt;a href="#11"&gt;11&lt;/a&gt;]. The same group was accused of hacking into the Indian Army’s website although no report of data theft was claimed by the government. &amp;nbsp;Last year in December a Pakistani hacker group named Predators PK hacked into various websites including the website of the CBI.[&lt;a href="#12"&gt;12&lt;/a&gt;]&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt; Cyber Crime: Its Implications to Privacy&lt;/h3&gt;
&lt;p&gt;Internet security has become an important issue. Recent cyber attacks on various important websites has placed many consumers at risk and vulnerable to cyber criminals. The hacking attack on the Sony website on April 16 and 17 led to the theft of 26.4 million SOE (Sony Online Enterprise) Accounts. The criminals even hacked into a 2007 database which held credit and debit card information of 23,400 customers.[&lt;a href="#13"&gt;13&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;Attacks such as these demonstrate the vulnerability of websites, and the possibility of serious harm to a countries economy and security. Furthermore, consumers’ personal data can be used by hackers to extort and blackmail individuals.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Internet has become a huge stakeholder in facilitating trade and e-commerce, subsequently cyberspace has become a large network of communication and commerce. We carry out a number of tasks on the Internet — from e-shopping and e-ticketing to e-banking. Though the recent attacks on the CBI website, and the Indian Army website did catch some attention from the media, and the government did make some noise about it, the issue slowly faded away. The government cannot seem to protect its own websites which houses sensitive details of national security, but seems confident about putting personal data and biometrics of a billion plus population under the AADHAR scheme [&lt;a href="#14"&gt;14&lt;/a&gt;] onto a web server which can be hacked anytime by almost anybody with a personal computer in China or Pakistan.[&lt;a href="#15"&gt;15&lt;/a&gt;]&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Privacy: No More?&lt;/h3&gt;
&lt;p&gt;Data generated in cyberspace are a fingerprint of an individual which is detailed, processed, and made permanent.[&lt;a href="#16"&gt;16&lt;/a&gt;] The cyberspace generates a blue print of our whole personality as we navigate through a health site, pay our bills, or shop for books at Amazon.com. The data collected by surfing through all these domains creates a fitting profile of who we are. [&lt;a href="#17"&gt;17&lt;/a&gt;] When hackers and cyber vandals steal this very information, it becomes a gross violation of our privacy.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;Privacy does not exist in cyber space. The various websites that offer varied services to its consumers fail to protect their personal data time and again. The Sony website including its play station and music website was hacked at least three times this year. Scores of personal data was stolen and the consumers were kept in dark regarding the breach for almost a week. Speaking as a consumer, if a large corporate company like Sony cannot protect its website from being hacked into, it is hard to imagine other websites protecting itself from attacks.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The rise of the Internet has brought with it a new dimension of crime. The IT Act 2000 has brought some reprieve to the aggrieved according to the NCRB. Despite this, the IT Act clearly will not completely deter criminals from hacking into websites, as was demonstrated in the NCRB report. The cyber criminals of the February 2000 cyber attacks have yet to be apprehended and the attacks on various websites have been increasing every year.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Despite progress being made on enacting cyber laws and implementing them, cyber crime is still not nipped in the bud. Governments can do precious little to stop it and only hope that a cyber criminal can be traced back and be punished. Hence, Internet users need to more careful of the sites they visit; know the privacy policy of these websites to protect their personal data as much as possible.&lt;/p&gt;
&lt;pre&gt;Notes&lt;/pre&gt;
&lt;p&gt;&lt;a name="1"&gt;[1] According to an annual survey conducted by IMRB and Internet and Mobile Association of India for the year 2009 – 2010.&amp;nbsp;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="2"&gt;[2]&lt;/a&gt;&lt;a href="http://www.jstor.org/stable/pdfplus/1229286.pdf?acceptTC=true"&gt; http://www.jstor.org/stable/pdfplus/1229286.pdf?acceptTC=true&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="3"&gt;[3]&lt;/a&gt;&lt;a href="http://legal-dictionary.thefreedictionary.com/cybercrime"&gt; http://legal-dictionary.thefreedictionary.com/cybercrime&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="4"&gt;[4]&lt;/a&gt;&lt;a href="http://www.mekabay.com/overviews/history.pdf"&gt; http://www.mekabay.com/overviews/history.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="5"&gt;[5]&lt;/a&gt;&lt;a href="http://www.cyberlaws.net/itamendments/index1.htm"&gt;http://www.cyberlaws.net/itamendments/index1.htm&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="6"&gt;[6]&lt;/a&gt;&lt;a href="http://ncrb.nic.in/CII%202009/cii-2009/Chapter%2018.pdf"&gt; http://ncrb.nic.in/CII%202009/cii-2009/Chapter%2018.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="7"&gt;[7]&lt;/a&gt;&lt;a href="http://ncrb.nic.in/CII%202009/cii-2009/Chapter%2018.pdf"&gt; http://ncrb.nic.in/CII%202009/cii-2009/Chapter%2018.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="8"&gt;[8]&lt;/a&gt;&lt;a href="http://ncrb.nic.in/CII%202009/cii-2009/Chapter%2018.pdf"&gt; http://ncrb.nic.in/CII%202009/cii-2009/Chapter%2018.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="9"&gt;[9]&lt;/a&gt;&lt;a href="http://www.pbs.org/newshour/extra/features/jan-june00/hackers_2-17.html"&gt; http://www.pbs.org/newshour/extra/features/jan-june00/hackers_2-17.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="10"&gt;[10]&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/ http://in.reuters.com/article/2011/06/14/idINIndia-57677720110614"&gt; http://in.reuters.com/article/2011/06/14/idINIndia-57677720110614&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="11"&gt;[11]&lt;/a&gt;&lt;a href="http://www.thinkdigit.com/General/Anonymous-hacks-Indian-govt-website-to-support_6933.html"&gt; http://www.thinkdigit.com/General/Anonymous-hacks-Indian-govt-website-to-support_6933.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="12"&gt;[12]&lt;/a&gt;&lt;a href="http://www.deccanherald.com/content/117901/pakistan-hackers-wage-cyber-war.html"&gt; http://www.deccanherald.com/content/117901/pakistan-hackers-wage-cyber-war.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="13"&gt;[13]&lt;/a&gt;&lt;a href="http://mashable.com/2011/05/03/sony-another-hacker-attack/"&gt; http://mashable.com/2011/05/03/sony-another-hacker-attack/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="14"&gt;[14]&lt;/a&gt; &lt;a href="http://uidai.gov.in/"&gt;http://uidai.gov.in/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="15"&gt;[15]&lt;/a&gt;&lt;a href="http://www.securitywatchindia.org.in/selected_Article_Cyber_warfare.aspx"&gt; http://www.securitywatchindia.org.in/selected_Article_Cyber_warfare.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="16"&gt;[16]&lt;/a&gt;&lt;a href="http://www.jstor.org/stable/pdfplus/1229286.pdf?acceptTC=true"&gt; http://www.jstor.org/stable/pdfplus/1229286.pdf?acceptTC=true&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="17"&gt;[17]&lt;/a&gt;&lt;a href="http://www.jstor.org/stable/pdfplus/1229286.pdf?acceptTC=true"&gt; http://www.jstor.org/stable/pdfplus/1229286.pdf?acceptTC=true&lt;/a&gt;&lt;/p&gt;


        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cyber-crime-privacy'&gt;https://cis-india.org/internet-governance/cyber-crime-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>merlin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-09-01T09:36:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities">
    <title>CCTV in Universities</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities</link>
    <description>
        &lt;b&gt;Basic Closed Circuit Television (CCTV) Infrastructure is used to observe movements from a central room, and consists of one or more video cameras that transmit video and audio images to a set of monitors or video recorders.&lt;/b&gt;
        &lt;h3&gt;A Brief History of CCTV's&lt;/h3&gt;
&lt;p&gt;Video surveillance as a means of policing gained prominence in the 1950s when the UK police installed two pan-tilt cameras on traffic lights to monitor traffic near the Parliament. Since then the United Kingdom has become the country with the most number of surveillance cameras.[&lt;a href="#1"&gt;1&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;The proliferation of CCTVs has been attributed to the growing radicalization of human behaviour wherein organized groups terrorized entire nations and threatened their internal security. The 1985 terror attack on the then Prime Minister of Britain by the IRA and many such instances thereafter have led many countries to adopt CCTV as a means of policing. In India, terror attacks on the Mumbai stock market and successive instances have pushed the Indian Government to install CCTVs in prominent public areas so that it is possible to monitor suspicious movements.[&lt;a href="#2"&gt;2&lt;/a&gt;]&lt;/p&gt;
&lt;h3&gt;CCTVs and Public Perspective &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Since the 1950'sCCTVs have become ubiquitous and ever present, monitoring our daily movements, and infringing into our personal space. Though governments believe CCTVs are essential security instruments, the public is less convinced. The early anxiety to be safe from an unseen danger has given way to a new unease amongst the people, that of constantly being watched by an unseen eye.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;CCTVs in Educational Institutions&lt;/h3&gt;
&lt;p&gt;CCTVs are typically used by the government or private agencies for surveillance in areas frequented by the public that need monitoring.&amp;nbsp; Recently though, universities across the length and breadth of the country have resorted to the use of CCTVs for policing campus activities and to keep the students in check and under control. Huge budgets are set to wire campuses with CCTV infrastructure, t causing students to protest as well as laud the initiative by the administration. The debate on CCTVs has gained momentum in recent years with students staging huge rallies both in support of and against it.&lt;/p&gt;
&lt;p class="callout"&gt;Example 1:&lt;/p&gt;
&lt;p&gt;The most prominent of the agitations against CCTVs was staged by the students of Jadavpur University in Kolkata on the administration’s decision to install 16 CCTVs on the four main exit points of the campus and other strategic locations.[&lt;a href="#3"&gt;3&lt;/a&gt;] The installation cost Rs.20 lakh. The students protested loudly against the decisions and ‘gheraoed’ the office of the vice chancellor for 52 hours. The students claimed that the administration was curbing their individual freedom and robbing the campus of it’s democratic atmosphere. The administration refused to remove the cameras, and claimed that the move was necessitated for the security of the students and to prevent any unforeseen incident.&lt;/p&gt;
&lt;p class="callout"&gt;Example 2:&lt;/p&gt;
&lt;p&gt;The girl’s residing in the Women’s Hostel of The University of Pune protested against the setting up of CCTV cameras’ in the entrances of the hostel to check for unauthorized visits from boyfriends and friends. The girl’s vandalized the camera and claimed that they were an infringement to their privacy. The hostel authorities insisted that the cameras did not infringe on the privacy of the women, and were only installed at the entrance gates to keep a tab on visitors.[&lt;a href="#4"&gt;4&lt;/a&gt;] The authorities claimed that this step was taken in congruence with the hostel’s policy of not allowing visitors to stay the night.&lt;/p&gt;
&lt;p class="callout"&gt;Example 3:&lt;/p&gt;
&lt;p&gt;The girls of the Churchgate’s Government Law College succeeded in getting the CCTV camera removed from the Girl’s Common Room, as it was seen as an infringement to their privacy. The MNS stepped up the agitation in favor of the students which led the college administration to finally take notice and remove the camera from the common room.[&lt;a href="#5"&gt;5&lt;/a&gt;]&lt;/p&gt;
&lt;h3&gt;The Flip Side&lt;/h3&gt;
&lt;p&gt;The issue of CCTVs in campuses takes an interesting turn when the students support the move to install cameras in campuses.&lt;/p&gt;
&lt;p class="callout"&gt;Example 1:&lt;/p&gt;
&lt;p&gt;Delhi University installed CCTV cameras in their campuses after the Delhi Police issued an advisory for the same. They claimed that the advisory issued was to monitor the instances of on campus ragging. The Delhi Police also helped fund the setting up of CCTVs in the college. This move was lauded by the students, and the colleges took instant measures to wire their campuses.[&lt;a href="#6"&gt;6&lt;/a&gt;]&lt;/p&gt;
&lt;p class="callout"&gt;Example 2:&lt;/p&gt;
&lt;p&gt;Recently, after the murder of a Delhi University student named Radhika Tanwar in broad day light, many student union groups assembled for a candle light vigil. They demanded CCTV cameras near the Satya Niketan bus stop where Radhika was killed which is an isolated stretch of a road. The massive agitation of almost a week brought the National Commission of Women into the foray who seconded the demand put forth by the student body.[&lt;a href="#7"&gt;7&lt;/a&gt;]&lt;/p&gt;
&lt;p class="callout"&gt;&amp;nbsp;Example 3:&lt;/p&gt;
&lt;p&gt;The recent instance of an RTI exposing inflated bills for setting up CCTVs in the Punjab University Campus also throws light on an interesting facet to this debate as the students do not mind the CCTVs in their campus. The student’s union of the university demanded the authorities to look into the discrepancies of the budget, and also expressed anger as the CCTVs installed did not work. The students claimed that the rising violence in the campus is because of disinterested security men and non working CCTV cameras.[&lt;a href="#8"&gt;8&lt;/a&gt;]&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;The decisions to use CCTVs as a means of surveillance evokes mixed responses. On one side of the debate they are seen as a deterrent to crime while on the other side of the debate they are seen as beinggross infringements on privacy. CCTV surveillance remains as a bone of contention amongst students. If they feel that their personal space is being invaded by these cameras then it needs to be addressed by the administration in a manner which appeases their fear. Universities randomly adopt the policy of CCTV surveillance, disregarding any voice of dissent. Kashmir University put up CCTVs in it’s campus to shoo away lovebirds and the Aligarh Muslim University has installed 57 CCTV cameras in it’s campus to keep a check on students. The rise of the CCTVs in colleges relates to not the actual crime but to the fear of crime. Therefore, CCTVs have become a tool of re-assurance [&lt;a href="#9"&gt;9&lt;/a&gt;]which feeds a notion of safety and security to the authority in charge.&lt;/p&gt;
&lt;p&gt;There is no black and white regarding the implementation of CCTVs in universities. A policy can only benefit both sides when decisions are taken with the students, and not on behalf of them. Indian Universities have no guidelines and policies regarding the implementation of CCTVs and students remain unaware of any decisions in this regard. The Universities should clearly spell out their take on CCTVs including:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;University policy regarding CCTVs policies&lt;/li&gt;&lt;li&gt;The reasons for introducing CCTVs&lt;/li&gt;&lt;li&gt;The proposed uses of CCTV infrastructure&lt;/li&gt;&lt;li&gt;Which areas in the campus will be kept under surveillance&lt;/li&gt;&lt;li&gt;How will the data collected be stored&lt;/li&gt;&lt;li&gt;How long will the data be retained&lt;/li&gt;&lt;li&gt;How will the data be deleted[&lt;a href="#10"&gt;10&lt;/a&gt;]&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Universities should address all these issues to dispel fear from the minds of the students, and the student unions should be included in the discussions regarding the implementation of CCTVs.&amp;nbsp;&lt;/p&gt;
&lt;pre&gt;Notes&lt;/pre&gt;
&lt;p&gt;&amp;nbsp;&lt;br /&gt;&lt;a name="1"&gt;[1].&lt;/a&gt;&lt;a href="http://www.surveillance-and-society.org/ojs/index.php/journal"&gt;Webster,William; CCTV policy in the UK: Reconsidering the evidence base; sueveillanceandsociety.org.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="2"&gt;[2].&lt;/a&gt;&lt;a href="http://www.surveillance-and-society.org/ojs/index.php/journal"&gt;Norris, Clive;MC Cahill, Mike;Wood, David; The Growth of CCTV: A Global Perspective on the international diffusion of video surveillance in publically accessible space; surveillance-and-society.org.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="3"&gt;[3].&lt;/a&gt;&lt;a href="http://www.haata.com"&gt;Timesnow.tv/jadavpuruniversity, www.haata.com.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="4"&gt;[4]&lt;/a&gt;&lt;a href="http://www.ndtv.com/article/cities/female-hostellers-damage-cctv-cameras-to-protect-privacy-83889"&gt;.http://www.ndtv.com/article/cities/female-hostellers-damage-cctv-cameras-to-protect-privacy-83889,&lt;/a&gt;&lt;a href="http://toostep.com/debate/is-it-right-to-install-a-cctv-in-girls-hostel-to-stop-unauth"&gt; http://toostep.com/debate/is-it-right-to-install-a-cctv-in-girls-hostel-to-stop-unauth.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="5"&gt;[5].&lt;/a&gt;&lt;a href="http://www.mumbaimirror.com/index.aspx?page=article§id=2&amp;amp;contentid=201101212011012104560935753ecb888"&gt;http://www.mumbaimirror.com/index.aspx?page=article§id=2&amp;amp;contentid=201101212011012104560935753ecb888, &lt;/a&gt;&lt;a href="http://ibnlive.in.com/news/cctv-cameras-in-hostel-rob-pune-women-of-freedom/142681-3.html"&gt;http://ibnlive.in.com/news/cctv-cameras-in-hostel-rob-pune-women-of-freedom/142681-3.html.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="6"&gt;[6]&lt;/a&gt;&lt;a href="http://www.expressindia.com/latest-news/after-delhi-police-advisory-du-to-install-cctv-cameras/761421/"&gt;.http://www.expressindia.com/latest-news/after-delhi-police-advisory-du-to-install-cctv-cameras/761421/.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="7"&gt;[7]&lt;/a&gt;&lt;a href="http://www.indianexpress.com/news/women-constables-cctv-cameras-in-girl-stude/766083/"&gt;.http://www.indianexpress.com/news/women-constables-cctv-cameras-in-girl-stude/766083/.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="8"&gt;[8].&lt;/a&gt;&lt;a href="http://www.punjabcolleges.com/5526999-itemdisplay-Misappropriation-of-funds-on-CCTV,-RTI-exposed-it-Chandigarh.htm"&gt;http://www.punjabcolleges.com/5526999-itemdisplay-Misappropriation-of-funds-on-CCTV,-RTI-exposed-it-Chandigarh.htm.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="9"&gt;[9].&lt;/a&gt;&lt;a href="http://www.surveillance-and-society.org/ojs/index.php/journal/article/view/prozac/prozac"&gt;www.surveillance-and-society.org/ojs/index.php/journal/article/view/prozac/prozac.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="10"&gt;[10]&lt;/a&gt;&lt;a href="http://www.ucl.ac.uk/estates/security/documents/cctvp"&gt;.www.ucl.ac.uk/estates/security/documents/cctvpolicy.doc,&lt;/a&gt;&lt;a href="http://www.wustl.edu/policies/cctv-monitoring-and-recording.html"&gt; http://www.wustl.edu/policies/cctv-monitoring-and-recording.html.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="10"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="10"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="10"&gt;&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities'&gt;https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>merlin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-09-01T09:50:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
