<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 14.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-to-the-id4d-practitioners2019-guide"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-appropriate-use-of-digital-identity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/holding-id-issuers-accountable-what-works"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/digtial-identities-research-plan"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-to-the-id4d-practitioners2019-guide">
    <title>Comments to the ID4D Practitioners’ Guide</title>
    <link>https://cis-india.org/internet-governance/blog/comments-to-the-id4d-practitioners2019-guide</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;This post presents our comments to the ID4D Practitioners’ Guide: Draft For Consultation released by ID4D in June, 2019. CIS has conducted research on issues related to digital identity since 2012. This submission is divided into three main parts. The first part (General Comments) contains the high-level comments on the Practitioners’ Guide, while the second part (Specific Comments) addresses individual sections in the Guide. The third and final part (Additional Comments) does not relate to particulars in the Practitioners' Guide but other documents that it relies upon. We submitted these comments to ID4D on August 5, 2019.&amp;nbsp;Read our comments &lt;a class="external-link" href="https://digitalid.design/comments-ID4D-practitioners-guide.html"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-to-the-id4d-practitioners2019-guide'&gt;https://cis-india.org/internet-governance/blog/comments-to-the-id4d-practitioners2019-guide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Yesha Tshering Paul, Prakriti Singh, and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Appropriate Use of Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2019-08-08T10:25:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-appropriate-use-of-digital-identity">
    <title>The Appropriate Use of Digital Identity</title>
    <link>https://cis-india.org/internet-governance/blog/the-appropriate-use-of-digital-identity</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;As governments across the globe implement new, foundational, digital identification systems (“Digital ID”), or modernize existing ID programs, there is dire need for greater research and discussion about appropriate uses of Digital ID systems. This significant momentum for creating Digital ID in several parts of the world has been accompanied with concerns about the privacy and exclusion harms of a state issued Digital ID system, resulting in campaigns and litigations in countries such as UK, India, Kenya, and Jamaica. Given the very large range of considerations required to evaluate Digital ID projects, it is necessary to think of evaluation frameworks that can be used for this purpose.&lt;/p&gt;
&lt;p&gt;At RightsCon 2019 in Tunis, we presented &lt;a class="external-link" href="http://bit.ly/CISDigitalIDAppropriateUse"&gt;working drafts&lt;/a&gt; on appropriate use of Digital ID by the partner organisations of this &lt;a class="external-link" href="https://www.omidyar.com/blog/appropriate-use-digital-identity-why-we-invested-three-region-research%C2%A0alliance"&gt;three-region research alliance&lt;/a&gt; - ITS from Brazil, CIPIT from Kenya, and CIS from India.&lt;/p&gt;
&lt;p&gt;In the &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-01.html"&gt;draft by CIS&lt;/a&gt;, we propose a set of principles against which Digital ID may be evaluated. We hope that these draft principles can evolve into a set of best practices that can be used by policymakers when they create and implement Digital ID systems, provide guidance to civil society examinations of Digital ID and highlight questions for further research on the subject. We have drawn from approaches used in documents such as the necessary and proportionate principles, the OECD privacy guidelines and scholarship on harms based approach.&lt;/p&gt;
&lt;p&gt;Read and comment on CIS’s Draft framework &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-01.html"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Download Working drafts by CIPIT, CIS, and ITS &lt;a class="external-link" href="http://bit.ly/CISDigitalIDAppropriateUse"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-appropriate-use-of-digital-identity'&gt;https://cis-india.org/internet-governance/blog/the-appropriate-use-of-digital-identity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Appropriate Use of Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2019-08-08T10:24:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/holding-id-issuers-accountable-what-works">
    <title>Holding ID Issuers Accountable, What Works?</title>
    <link>https://cis-india.org/internet-governance/blog/holding-id-issuers-accountable-what-works</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;Together with the &lt;a class="external-link" href="https://itsrio.org/pt/home/"&gt;Institute of Technology &amp;amp; Society&lt;/a&gt; (ITS), Brazil, and the &lt;a class="external-link" href="https://www.cipit.org/"&gt;Centre for Intellectual Property and Information Technology Law&lt;/a&gt; (CIPIT), Kenya, CIS participated at a side event in &lt;a class="external-link" href="https://www.rightscon.org/"&gt;RightsCon 2019&lt;/a&gt; held in Tunisia, titled Holding ID Issuers Accountable, What Works?, organised by the &lt;a class="external-link" href="https://www.omidyar.com/"&gt;Omidyar Network&lt;/a&gt;. The event was attended by researchers and advocates from nearly 20 countries. Read the event report &lt;a class="external-link" href="https://digitalid.design/rightscon-2019-report.html"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/holding-id-issuers-accountable-what-works'&gt;https://cis-india.org/internet-governance/blog/holding-id-issuers-accountable-what-works&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Trikanad and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Appropriate Use of Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2019-08-08T10:23:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/digtial-identities-research-plan">
    <title>Design and Uses of Digital Identities - Research Plan</title>
    <link>https://cis-india.org/internet-governance/blog/digtial-identities-research-plan</link>
    <description>
        &lt;b&gt;In our research project about uses and design of digital identity systems, we ask two core questions: a) What are appropriate uses of ID?, and b) How should we think about the technological design of ID? Towards the first research question, we have worked on first principles and will further develop definitions, legal tests and applications of these principles. Towards the second research question, we have first identified a set of existing and planned digital identity systems that represent a paradigm of how such a system can be envisioned and implemented, and will look to identify key design choices which are causing divergence in paradigm.&lt;/b&gt;
        
&lt;h4&gt;Read the research plan &lt;a class="external-link" href="https://digitalid.design/research-plan.html"&gt;here&lt;/a&gt;.&lt;/h4&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/digtial-identities-research-plan'&gt;https://cis-india.org/internet-governance/blog/digtial-identities-research-plan&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha and Pooja Saxena</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Appropriate Use of Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2019-08-17T07:58:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
