<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 71 to 85.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/uid-and-npr"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-august-27-2019-a-judicial-overreach-into-matters-of-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-august-28-2019-amrita-madhukalya-what-centre-will-tell-sc-on-aadhaar-and-social-media-account-linkage"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-september-9-2019-submission-to-global-commission-on-stability-of-cyberspace"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/policy-design-jam"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-shreya-nandi-prathma-sharma-october-15-2019-will-fastag-raise-privacy-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bsides-delhi-2019-security-conference"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/torsha-sarkar-suhan-s-and-gurshabad-grover-october-30-2019-through-the-looking-glass"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/participation-in-iso-iec-jtc-1-sc-27-meetings"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/un-special-rapporteur-on-the-right-to-privacy-consultation-on-privacy-and-gender"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/al-jazeera-video-november-8-2019-india-facial-recognition"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/et-tech-megha-mandavia-november-4-2019-cyber-law-experts-asks-why-cert-in-removed-advisory-warning-about-whatsapp-vulnerability"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-september-24-apurva-venkat-and-moulishree-srivastava-whasapp-ruling-experts-seek-privacy-law"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/events/uid-and-npr">
    <title>Unique Identity Number (UID), National Population Register (NPR), and Governance</title>
    <link>https://cis-india.org/internet-governance/events/uid-and-npr</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society and the Say No to UID campaign invite you to a workshop to discuss and learn about the present state of the UID and the NPR schemes. The event will be held on Saturday, March 2, 2013, at TERI, Bangalore, from 10.30 a.m. to 2.00 p.m.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;Among other questions, the workshop will address:&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What is the UID and NPR?&lt;/li&gt;
&lt;li&gt;How do the UID and NPR impact citizenship?&lt;/li&gt;
&lt;li&gt;Will NPR and UID schemes transform governance? &lt;/li&gt;
&lt;li&gt;Why and how is national security linked with UID / NPR?&lt;/li&gt;
&lt;li&gt;What is the relationship between UID and Big Data?&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p style="text-align: left; "&gt;&lt;b&gt;Speakers:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Usha Ramanathan&lt;i&gt;, Independent Law Researcher and Human Rights Activist&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Anant Maringanti&lt;i&gt;, Hyderabad&lt;/i&gt;&lt;i&gt; Urban Labs &amp;amp; Right to the City Foundation&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Kaveri R&lt;i&gt;, Researcher, CES, IISc&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/uid-and-npr'&gt;https://cis-india.org/internet-governance/events/uid-and-npr&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-03-01T04:32:06Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns">
    <title>Electoral Databases – Privacy and Security Concerns</title>
    <link>https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns</link>
    <description>
        &lt;b&gt;In this blogpost, Snehashish Ghosh analyzes privacy and security concerns which have surfaced with the digitization, centralization and standardization of the electoral database and argues that even though the law provides the scope for protection of electoral databases, the State has not taken any steps to ensure its safety.&lt;/b&gt;
        &lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The recent move by the Election Commission of India (ECI) to tie-up with Google for providing electoral look-up services for citizens and electoral information services has faced heavy criticism on the grounds of data security and privacy.&lt;a href="#_edn1" name="_ednref1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[i]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; After due consideration, the ECI has decided to drop the plan.&lt;a href="#_edn2" name="_ednref2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The plan to partner with Google has led to much apprehension regarding Google gaining access to the database of 790 million voters including, personal information such as age, place of birth and residence. It could have also gained access to cell phone numbers and email addresses had the voter chosen to enroll via the online portal on the ECI website.  Although, the plan has been cancelled, it does not necessarily mean that the largest database of citizens of India is safe from any kind of security breach or abuse. In fact, the personal information of each voter in a constituency can be accessed by anyone through the ECI website and the publication of electoral rolls is mandated by the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Publication of Electoral Rolls&lt;/b&gt;&lt;br /&gt;The electoral roll essentially contains the name of the voter, name of the relationship (son of/wife of, etc.), age, sex, address and the photo identity card number. The main objective of creation and maintenance of electoral rolls and the issue of Electoral Photo Identity Card (EPIC) was to ensure a free and fair election where the voter would have been  able to cast his own vote as per his own choice. In other words, the main purpose of the exercise was to curtail bogus voting. This is achieved by cross referencing the EPIC with the electoral roll.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The process of creation and maintenance of electoral rolls is governed by the Registration of Electors Rules, 1960. Rule 22 requires the registration officer to publish the roll with list of amendments at his office for inspection and public information. Furthermore, ECI may direct the registration officer to send two copies of the electoral roll to every political party for which a symbol has exclusively been reserved by the ECI. It can be safely concluded that the electoral roll of a constituency is a public document&lt;a href="#_edn3" name="_ednref3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; given that the roll is published and can be circulated on the direction of the ECI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the computational turn, in 1998 the ECI took the decision to digitize the electoral databases. Furthermore, printed electoral rolls and compact discs containing the rolls are available for sale to general public.&lt;a href="#_edn4" name="_ednref4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iv]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; In addition to that, the electoral rolls for the entire country are available on the ECI website.&lt;a href="#_edn5" name="_ednref5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[v]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; However, the current database is not uniform and standardized, and entries in some constituencies are available only in the local language. The ECI has taken steps to make the database uniform, standardized and centralized.&lt;a href="#_edn6" name="_ednref6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security Concerns&lt;/b&gt;&lt;br /&gt;The Registration of Electoral Rules, 1960 is an archaic piece of delegated legislation which is still in force and casts a statutory duty on the ECI to publish the electoral rolls. The publication of electoral rolls is not a threat to security when it is distributed in hard copies and the availability of electoral rolls is limited. The security risks emerge only after the digitization of electoral database, which allows for uniformity, standardization and centralization of the database which in turn makes it vulnerable and subject to abuse. The law has failed to evolve with the change in technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a recent article, Bill Davidow analyzes "the dark side of Moore’s Law" and argues that with the growth processing power there has been a growth in surveillance capabilities and on this note the article is titled, “&lt;i&gt;With Great Computing Power Comes Great Surveillance”&lt;/i&gt;&lt;a href="#_edn7" name="_ednref7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Drawing from Davidow’s argument, with the exponential growth in computing power, search has become convenient, faster and cheap. A uniform, standardized and centralized database bearing the personal information of 790 million voters can be searched and categorized in accordance with the search terms. The personal information of the voters can be used for good, but it can be equally abused if it falls into the wrong hands. Big data analysis or the computing power makes it easier to target voters, as bits and pieces of personal information give a bigger picture of an individual, a community, etc. This can be considered intrusive on individual’s privacy since the personal information of every voter is made available in the public domain&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, the availability of a centralized, searchable database of voters along with their age would allow the appropriate authorities to identify wards or constituencies, which has a high population of voters above the age of 65. This would help the authority to set up polling booths at closer location with special amenities. However, the same database can be used to search for density of members of a particular community in a ward or constituency based on the name, age, sex of the voters. This information can be used to disrupt elections, target vulnerable communities during an election and rig elections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Current IT Laws does not mandate the protection of the electoral database&lt;/b&gt;&lt;br /&gt;A centralized electoral database of the entire country can be considered as a critical information infrastructure (CII) given the impact it may have on the election which is the cornerstone of any democracy. Under Section 70 of the Information Technology Act, 2000 (IT Act) CII means “the computer resource, incapacitation or destruction of which, shall have debilitating impact on national security, economy.”&lt;a href="#_edn8" name="_ednref8"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[viii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; However, the appropriate Government has not notified the electoral database as a protected system&lt;a href="#_edn9" name="_ednref9"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ix]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;. Therefore, information security practices and procedures for a protected system are not applicable to the electoral database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Rules (IT Rules) are also not applicable to electoral databases, &lt;i&gt;per se&lt;/i&gt;. Since, ECI is not a body corporate, the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information), Rules, 2011 (&lt;i&gt;hereinafter &lt;/i&gt;Reasonable Security Practices Rules) do not apply to electoral databases. Ignoring that Reasonable Security Practices Rules only apply to a body corporate, the electoral database does fall within the ambit of definition of “personal information”&lt;a href="#_edn10" name="_ednref10"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[x]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; and should arguably be made subject to the Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The intent of the ECI for hosting the entire country’s electoral database online &lt;i&gt;inter alia&lt;/i&gt; is to provide electronic service delivery to the citizens. It seeks to provide “electoral look up services for citizens ... for better electoral information services.”&lt;a href="#_edn11" name="_ednref11"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; However, the Information Technology (Electronic Service Delivery) Rules, 2011 are not applicable to the electoral database given that it is not notified by the appropriate Government as a service to be delivered electronically. Hence, the encryption and security standards for electronic service delivery are not applicable to electoral rolls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT Act and the IT Rules provide a reasonable scope for the appropriate Government to include electoral databases within the ambit of protected system and electronic service delivery. However, the appropriate government has not taken any steps to notify electoral database as protected system or a mode of electronic service delivery under the existing laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;Publication of electoral rolls is a necessary part of an election process. It ensures free and fair election and promotes transparency and accountability. But unfettered access to electronic electoral databases may have an adverse effect and would endanger the very goal it seeks to achieve because the electronic database may pose threat to privacy of the voters and also lead to security breach.  It may be argued that the ECI is mandated by the law to publish the electoral database and hence, it is beyond the operation of the IT Act. But Section 81 of the IT Act has an overriding effect on any law inconsistent, therewith. The appropriate Government should take necessary steps under the IT Act and notify electoral databases as a protected system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is recommended that the Electors Registration Rules, 1960 should be amended, taking into account the advancement in technology. Therefore, the Rules should aim at restricting the unfettered electronic access to the electoral database and also introduce purposive limitation on the use of the electoral database. It should also be noted that more adequate and robust data protection and privacy laws should be put in place, which would regulate the collection, use, storage and processing of databases which are critical to national security.&lt;/p&gt;
&lt;div&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="edn1"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref1" name="_edn1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[i]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Pratap Vikram Singh, Post-uproar, EC’s Google tie-up plan may go for a toss, Governance Now, January 7, 2014 available at &lt;a class="external-link" href="http://www.governancenow.com/news/regular-story/post-uproar-ecs-google-tie-plan-may-go-toss"&gt;http://www.governancenow.com/news/regular-story/post-uproar-ecs-google-tie-plan-may-go-toss&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn2"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref2" name="_edn2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Press Note No.ECI/PN/1/2014, Election Commission of India , January 9, 2014 available at &lt;a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf"&gt;http://eci.nic.in/eci_main1/current/PN09012014.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn3"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref3" name="_edn3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Section 74, Indian Evidence Act, 1872&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn4"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref4" name="_edn4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iv]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; &lt;a class="external-link" href="http://eci.nic.in/eci_main1/the_function.aspx"&gt;eci.nic.in/eci_main1/the_function.aspx&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn5"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref5" name="_edn5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[v]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; &lt;a class="external-link" href="http://eci.nic.in/eci_main1/Linkto_erollpdf.aspx"&gt;http://eci.nic.in/eci_main1/Linkto_erollpdf.aspx&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn6"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref6" name="_edn6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; “At present, in most States and UTs the Electoral Database is kept at the district level. In some cases it is kept even with the vendors. In most States/UTs it is maintained in MS Access, while in some cases it is on a primitive technology like FoxPro and in some other cases on advanced RDBMS like Oracle or Sql Server. The database is not kept in bilingual form in some of the States/UTs, despite instructions of the Commission. In most cases Unicode fonts are not used. The database structure not being uniform in the country, makes it almost impossible for the different databases to talk to each other” –  Election Commission of India, Revision of Electoral Rolls with reference to 01-01-2010 as the qualifying date – Integration and Standardization of the database- reg., No. 23/2009-ERS, January 6, 2010 available at e&lt;a class="external-link" href="http://eci.nic.in/eci_main/eroll&amp;amp;epic/ins06012010.pdf"&gt;ci.nic.in/eci_main/eroll&amp;amp;epic/ins06012010.pdf&lt;/a&gt;&lt;span dir="RTL"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn7"&gt;
&lt;p class="MsoEndnoteText"&gt;&lt;a href="#_ednref7" name="_edn7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf"&gt;&lt;span&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;http://www.theatlantic.com/technology/archive/2014/01/with-great-computing-power-comes-great-surveillance/282933/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn8"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref8" name="_edn8"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[viii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Section 70, Information Technology Act, 2000&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn9"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref9" name="_edn9"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ix]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Computer resource which directly or indirectly affects the facility of Critical Information Infrastructure&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn10"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref10" name="_edn10"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[x]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Rule 2(1)(i), Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn11"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref11" name="_edn11"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Press Note No.ECI/PN/1/2014, Election Commission of India , January 9, 2014 available at &lt;a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf"&gt;http://eci.nic.in/eci_main1/current/PN09012014.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns'&gt;https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Safety</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Security</dc:subject>
    
    
        <dc:subject>e-Governance</dc:subject>
    
    
        <dc:subject>Transparency, Politics</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    

   <dc:date>2014-01-16T11:07:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-august-27-2019-a-judicial-overreach-into-matters-of-regulation">
    <title>A judicial overreach into matters of regulation</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-august-27-2019-a-judicial-overreach-into-matters-of-regulation</link>
    <description>
        &lt;b&gt;A PIL on Aadhaar sheds light on some problematic trends&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Gurshabad Grover was &lt;a class="external-link" href="https://www.thehindu.com/opinion/op-ed/a-judicial-overreach-into-matters-of-regulation/article29262148.ece"&gt;published in the Hindu&lt;/a&gt; on August 27, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Madras High Court has been hearing a PIL petition since 2018 that initially asked the court to declare the linking of Aadhaar with a government identity proof as mandatory for registering email and social media accounts. The petitioners, victims of online bullying, went to the court because they found that law enforcement agencies were inefficient at investigating cybercrimes, especially when it came to gathering information about pseudonymous accounts on major online platforms. This case brings out some of the most odious trends in policymaking in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first issue is how the courts, as Anuj Bhuwania has argued in the book &lt;em&gt;Courting the People&lt;/em&gt;, have continually expanded the scope of issues considered in PILs. In this case, it is absolutely clear that the court is not pondering about any question of law. In what could be considered as abrogation of the separation of powers provision in the Constitution, the Madras High Court started to deliberate on a policy question with a wide-ranging impact: Should Aadhaar be linked with social media accounts?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After ruling out this possibility, it went on to consider a question that is even further out of its purview: Should platforms like WhatsApp that provide encrypted services allow forms of “traceability” to enable finding the originator of content? In essence, the court is now trying to regulate one particular platform on a very specific technical question, ignoring legal frameworks entirely. It is worrying that the judiciary is finding itself increasingly at ease with deliberations on policy and regulatory measures, and its recent actions remind us that the powers of the court also deserve critical questioning.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Government’s support&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Second, not only are governments failing to assert their own powers of regulation in response to the courts’ actions, they are on the contrary encouraging such PILs. The Attorney General, K.K. Venugopal, who is representing the State of Tamil Nadu in the case, could have argued for the case’s dismissal by referring to the fact that the Ministry of Electronics and Information Technology has already published draft regulations that aim to introduce “traceability” and to increase obligations on social media platforms. Instead, he has largely urged the court to pass regulatory orders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third, ‘Aadhaar linking’ is becoming increasingly a refrain whenever any matter even loosely related to identification or investigation of crime is brought up. While the Madras High Court has ruled out such linking for social media platforms, other High Courts are still hearing petitions to formulate such rules. The processes that law enforcement agencies use to get information from platforms based in foreign jurisdictions rely on international agreements. Linking Aadhaar with social media accounts will have no bearing on these processes. Hence, the proposed ‘solution’ misses the problem entirely, and comes with its own threats of infringing privacy.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Problems of investigation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;That said, investigating cybercrime is a serious problem for law enforcement agencies. However, the proceedings before the court indicate that the cause of the issues have not been correctly identified. While legal provisions that allow agencies to seek information from online platforms already exist in the Code of Criminal Procedure and the Information Technology Act, getting this information from platforms based in foreign jurisdictions can be a long and cumbersome process. For instance, the hurdles posed by the mutual legal assistance treaty between India and the U.S. effectively mean that it might take months to receive a response to information requests sent to U.S.-based platforms, if a response is received at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To make cybercrime investigation easier, the Indian government has various options. India should push for fairer executive agreements possible under instruments like the United States’ CLOUD Act, for which we need to first bring our surveillance laws in line with international human rights standards through reforms such as judicial oversight. India could use the threat of data localisation as a leverage to negotiate bilateral agreements with other countries to ensure that agencies have recourse to quicker procedures. As a first step, however, Indian courts must wash their hands of such questions. For its part, the Centre must engage in consultative policymaking around these important issues, rather than support ad-hoc regulation through court orders in PILs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(&lt;/span&gt;&lt;em&gt;Disclosure: The CIS is a recipient of research grants from Facebook.&lt;/em&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-august-27-2019-a-judicial-overreach-into-matters-of-regulation'&gt;https://cis-india.org/internet-governance/blog/the-hindu-august-27-2019-a-judicial-overreach-into-matters-of-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gurshabad</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-08-28T01:28:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-august-28-2019-amrita-madhukalya-what-centre-will-tell-sc-on-aadhaar-and-social-media-account-linkage">
    <title>What Centre will tell Supreme Court on Aadhaar and social media account linkage</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-august-28-2019-amrita-madhukalya-what-centre-will-tell-sc-on-aadhaar-and-social-media-account-linkage</link>
    <description>
        &lt;b&gt;The top court had held in the Aadhaar case that the government can make the linking of the 12-digit-number mandatory only in the case of availing subsidies and welfare benefits. Consequently, Section 57 of the Aadhaar Act was struck down.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Amrita Madhukalya was published in &lt;a class="external-link" href="https://www.hindustantimes.com/india-news/what-centre-will-tell-supreme-court-on-aadhaar-and-social-media-account-linkage/story-KSnf1PHpsTboHQh6sk7VxK.html"&gt;Hindustan Times&lt;/a&gt; on August 28, 2019. Gurshabad Grover was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Centre will refer to the Aadhaar Act and the Supreme Court’s 2017 privacy judgement when it is directed by the top court to put forward its view on whether the unique identification number should be made mandatory in opening and managing accounts on Facebook, Twitter, WhatsApp and other social media platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While we are yet to receive a notice from the SC asking for our reply, the Aadhaar (Targeted Delivery of Financial and other Subsidies, benefits and services) Act, 2016, and the apex court’s 2017 judgement upholding the Right to Privacy will guide us in drafting a response,” a senior official of the ministry of electronics and information technology, who did not wish to be named, said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The top court had held in the Aadhaar case that the government can make the linking of the 12-digit-number mandatory only in the case of availing subsidies and welfare benefits. Consequently, Section 57 of the Aadhaar Act was struck down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a division bench of Madras High Court continues to hear two writ petitions on whether social media profiles should be linked to Aadhaar so that users in cases where pornographic material, fake news and communal content is posted on these sites can be traced, Facebook had simultaneously filed a plea to transfer all similar cases in the high courts of Madras, Bombay as well as Madhya Pradesh. The top court will hear the matter on September 13.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During its hearings, Madras High Court made it clear that it will not rule on Aadhaar-linking and the case will concentrate on traceability now. As of now, only one of the transfer petitions, the one in Jabalpur, deals with Aadhaar linking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, the top court has already asked social media companies for their stand on the matter. Senior lawyers Mukul Rohatgi and Kapil Sibal, who have been representing Facebook and WhatsApp respectively in Madras High Court case, have already said that as both the companies are headquartered outside of India, with operations in dozens of countries, the high court’s judgement will have ramifications globally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both Twitter and Google declined to comment on the matter, as the matter is sub-judice, while Facebook was not available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in March this year, Facebook CEO Mark Zuckerberg said that privacy, encryption and secure data storage were some of these principles while unveiling the company’s “vision and principles” in building a “privacy-focused” social platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Wherein people can have “clear control over who can communicate with them and confidence that no one else can access what they share”, such communication could be secure with end-to-end encryption, and Facebook will not store sensitive data in countries with “weak records on human rights”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gurshabad Grover of the Centre for Internet Security says he welcomes the Centre’s stand but adds that the petition should not have been allowed by the Madras High Court in the first place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The case is now deliberating on policy, which is the responsibility of the government. This goes against the basis of separation of power,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre is dealing with issues surrounding traceability through the Intermediaries Guidelines, which is due in the next few weeks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The solution, Grover says, lies in diplomatic negotiations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Instruments like the US’ Clarifying Lawful Overseas Use of Data Act can come in handy if India can fight for better executive agreements there, provided we have data protection laws in line with human rights standards,” he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-august-28-2019-amrita-madhukalya-what-centre-will-tell-sc-on-aadhaar-and-social-media-account-linkage'&gt;https://cis-india.org/internet-governance/news/hindustan-times-august-28-2019-amrita-madhukalya-what-centre-will-tell-sc-on-aadhaar-and-social-media-account-linkage&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amrita Madhukalya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-09-02T04:28:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-september-9-2019-submission-to-global-commission-on-stability-of-cyberspace">
    <title>Submission to Global Commission on Stability of Cyberspace on the definition of Cyber Stability</title>
    <link>https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-september-9-2019-submission-to-global-commission-on-stability-of-cyberspace</link>
    <description>
        &lt;b&gt;"The Global Commission on the Stability of Cyberspace  released a public consultation process that sought to  solicit comments and obtain feedback on the definition of “Stability of Cyberspace”, as developed by the Global Commission on the Stability of Cyberspace (GCSC).&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The definition of cyberspace the GCSC provided was :&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Stability of cyberspace is the condition where individuals and institutions can be reasonably confident in their ability to use cyberspace safely and securely, where the availability and integrity of services in cyberspace is generally assured, where change is managed in relative peace, and where tensions are resolved in a peaceful manner.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;CIS gave detailed commentary on the definitions [attached] and suggested a new definition of cyber stability documented below:&lt;/p&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;Stability of cyberspace is the objective where individuals, i&lt;strong&gt;nstitutions and communities &lt;/strong&gt;are confident in the safety and security of cyberspace; the  &lt;strong&gt;accessibility,&lt;/strong&gt;availability and integrity of services in cyberspace can be relied upon and  where change is managed and tensions ranging  from &lt;strong&gt;external interference in sovereign processes to the use of force in cyberspace &lt;/strong&gt;are resolved  peacefully in &lt;strong&gt;line with the tenets of International Law,specifically the principles of the UN Charter and universally recognised human rights.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;&lt;strong&gt;Cyber stability can only be fostered if key stakeholders in cyberspace conform to a due diligence obligation of not undertaking and preventing actions that may prevent cyber stability. The end goal of cyber stability must minimize or eliminate immaterial or peripheral incentives while preserving and potentially legitimizing those cyber offensive operations that can further effective deterrence and thereby foster stability, while also minimising any collateral damage to civilian life or property.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/files/gcsc-response"&gt;Click to view the detailed submission here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-september-9-2019-submission-to-global-commission-on-stability-of-cyberspace'&gt;https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-september-9-2019-submission-to-global-commission-on-stability-of-cyberspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-09-11T14:52:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/policy-design-jam">
    <title>Policy Design Jam</title>
    <link>https://cis-india.org/internet-governance/news/policy-design-jam</link>
    <description>
        &lt;b&gt;Pallavi Bedi, Akash Sheshadri and Anubha Sinha attended the event organized by Whatsapp and ISPP on 16 September 2019 at Indian School of Public Policy campus, Qutub Institutional Area, Delhi.&lt;/b&gt;
        &lt;h3&gt;Session Schedule&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
&lt;div id="_mcePaste"&gt;2 00 pm - 3 00 pm - Registration&lt;/div&gt;
&lt;div id="_mcePaste"&gt;3 05 pm - 4 00 pm - Experiential design exercises&lt;/div&gt;
&lt;div id="_mcePaste"&gt;4 00 pm - 4 15 pm - Break&lt;/div&gt;
&lt;div id="_mcePaste"&gt;4 15 pm - 5 00 pm - Design Thinking for Policy Insights from Global Design Jams&lt;/div&gt;
&lt;div id="_mcePaste"&gt;5 00 pm - 5 20 pm - Q &amp;amp; A&lt;/div&gt;
&lt;div id="_mcePaste"&gt;5 20 pm - 6 00 pm - High tea&lt;/div&gt;
&lt;p&gt;2 00 pm - 3 00 pm - Registration3 05 pm - 4 00 pm - Experiential design exercises&lt;br /&gt;&lt;span&gt;4 00 pm - 4 15 pm - Break&lt;br /&gt;4 15 pm - 5 00 pm - Design Thinking for Policy Insights from Global Design Jams&lt;br /&gt;5 00 pm - 5 20 pm - Q &amp;amp; A&lt;br /&gt;5 20 pm - 6 00 pm - High tea&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/policy-design-jam'&gt;https://cis-india.org/internet-governance/news/policy-design-jam&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-09-25T14:30:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-shreya-nandi-prathma-sharma-october-15-2019-will-fastag-raise-privacy-concerns">
    <title>Will FASTag raise privacy concerns?</title>
    <link>https://cis-india.org/internet-governance/news/livemint-shreya-nandi-prathma-sharma-october-15-2019-will-fastag-raise-privacy-concerns</link>
    <description>
        &lt;b&gt;FASTag, an electronic device that enables direct, cashless toll payment, has been touted as the Aadhaar for vehicles as it would help the government track movement of automobiles. But the move can also stoke fresh concerns on privacy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shreya Nandi and Prathma Sharma was &lt;a class="external-link" href="https://www.livemint.com/news/india/will-fastag-raise-privacy-concerns-11571125214325.html"&gt;published in Livemint&lt;/a&gt; on October 15, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The device can track movement of vehicles, toll booth cameras can catch traffic law violations, prevent crime, and help authorities curb tax evasion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the movement of commercial vehicles will be tracked by revenue authorities by integrating with e-way bill system under &lt;a href="https://www.livemint.com/news/india/ihmcl-gstn-to-ink-pact-to-link-fastag-with-gst-e-way-bill-system-on-oct-14-11570973104434.html" target="_blank"&gt;Goods and Services Tax (GST)&lt;/a&gt; to curb revenue leakage, experts believe that tracking personal vehicle is a matter of concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is not that the government will only use the stored data or video under limited and well-defined circumstances such as for evidence in case of traffic accidents, according to Pranesh Prakash, fellow, Centre for Internet Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“As transport minister Gadkari said (on Monday), the government will also use the video or data for any for analysis. And that will happen in a non-consensual manner, and outside the purview of a data protection framework, and without paying heed to the Supreme Court's landmark judgment on privacy," Prakash said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Monday, transport minister &lt;a href="https://www.livemint.com/news/india/gadkari-says-revenue-from-toll-collection-to-hit-rs-1-lakh-crore-in-5-years-11571057140954.html" target="_blank"&gt;Nitin Gadkari&lt;/a&gt; said cameras at the toll booth will take photos of passengers in a vehicle, which will be useful for the home ministry as there will be a record of the vehicle’s movement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FASTag, which comes into effect 1 December, uses radio frequency identification technology to enable direct toll payments from a moving vehicle. The toll fare is deducted from the bank account linked to FASTag. It will not only encourage cashless payments at toll plaza, but also decongest national highways, thereby ensuring seamless movement of vehicles, and reduce pollution and logistics cost.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amid privacy concerns related to sharing Aadhaar details with banks, telecom companies or any other authority for fulfilling KYC norms, the Supreme Court had in September last year ruled that Aadhaar can only be used for welfare schemes and for delivering state subsidies. It had barred private companies from using Aadhaar data for authenticating customers.&lt;br /&gt;Another expert said since FASTag data includes information that is personally identifiable with the vehicle owner, it can be misused if shared with various entities.&lt;br /&gt;"With FASTag being linked with National Vehicle Database (Vahan database), it does raise privacy concerns, specially as Nitin Gadkari, the minister of road transport and highways, has admitted that the government has provided access to Vahan and Sarathi database to 32 government and 87 private entities for ₹65 crore till date," Salman Waris Managing Partner, TechLegis Advocates &amp;amp; Solicitors, said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“With the Personal Data Protection Bill still in the making there are little regulatory measures to prevent or even punish FasTag data breaches," Waris said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-shreya-nandi-prathma-sharma-october-15-2019-will-fastag-raise-privacy-concerns'&gt;https://cis-india.org/internet-governance/news/livemint-shreya-nandi-prathma-sharma-october-15-2019-will-fastag-raise-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shreya Nandi and Prathma Sharma</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-10-18T15:22:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bsides-delhi-2019-security-conference">
    <title>BSides Delhi 2019 Security Conference</title>
    <link>https://cis-india.org/internet-governance/news/bsides-delhi-2019-security-conference</link>
    <description>
        &lt;b&gt;Karan Saini attended the BSides Delhi security conference on October 11, 2019. The event was organized by Bsides Delhi in New Delhi. &lt;/b&gt;
        &lt;p&gt;Click to view the agenda &lt;a class="external-link" href="https://bsidesdelhi.in/program.php"&gt;here&lt;/a&gt;. Videos of the event can be &lt;a class="external-link" href="https://www.youtube.com/channel/UCZidtr5OB-OGQwxWXDDSTBQ"&gt;viewed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bsides-delhi-2019-security-conference'&gt;https://cis-india.org/internet-governance/news/bsides-delhi-2019-security-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-10-20T06:47:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/torsha-sarkar-suhan-s-and-gurshabad-grover-october-30-2019-through-the-looking-glass">
    <title>Through the looking glass: Analysing transparency reports</title>
    <link>https://cis-india.org/internet-governance/blog/torsha-sarkar-suhan-s-and-gurshabad-grover-october-30-2019-through-the-looking-glass</link>
    <description>
        &lt;b&gt;An analysis of companies' transparency reports for government requests for user data and content removal&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Over the past decade, a few private online intermediaries, by rapid innovation and integration, have turned into regulators of a substantial amount of online speech. Such concentrated power calls for a high level of responsibility on them to ensure that the rights of the users online, including their rights to free speech and privacy, are maintained. Such responsibility may include appealing or refusing to entertain government requests that are technically or legally flawed, or resisting gag orders on requests. For the purposes of measuring a company’s practices regarding refusing flawed requests and standing up for user rights, transparency reporting becomes useful and relevant.Making information regarding the same public also ensures that researchers can build upon such data and recommend ways to improve accountability and enables the user to understand information about when and how governments are restricting their rights.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For some time in the last decade, Google and Twitter were the only major online platforms that published half-yearly transparency reports documenting the number of content take down and user information requests they received from law enforcement agencies. In 2013 however, that changed, when the Snowden leaks revealed, amongst other things, that these companies were often excessively compliant with requests from US’ intelligence operations, and allowed them backdoor surveillance access to user information. Subsequently, all the major Silicon Valley internet companies have been attempting to publish a variance or other of transparency reports, in hopes of re-building their damaged goodwill, and displaying a measure of accountability to its users.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The number of government requests for user data and content removal has also seen a steady rise. In 2014, for instance Google noted that in the US alone, they observed a 19% rise for the second half of the year, and an overall 250% jump in numbers since Google began providing this information. As per a study done by Comparitech, India sent the maximum number of government requests for content removal and user data in the period of 2009 - 2018.8 This highlights the increasing importance of accessible transparency reporting.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Initiatives analysing the transparency reporting practices of online platforms, like The Electronic Frontier Foundation (EFF)’s Who Has Your Back? reports, for instance, have developed a considerable body of work tracing these reporting practices, but have largely focused at them in the context of the United States (US).&amp;nbsp;In our research, we found that the existing methodology and metrics to assess the transparency reports of online platforms developed by organisations like the EFF are not adequate in the Indian context. We identify two reasons for developing a new methodology:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Online platforms make available vastly different information for US and India. For instance, Facebook breaks up the legal requests it receives for US into eight different classes (search warrants, subpoenas, etc.). Such a classification is not present for India. These differences are summarised in Annexure &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The legal regimes and procedural safeguards under which states can compel platforms to share information or take content down also differ. For instance, in India, an order for content takedown can be issued either under section 79 and its allied rules or under section 69A and its rules, each having their own procedures and relevant authorities. A summary of such provisions for Indian agencies is given in Annexure 3.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;These differences may merit differences in the methodology for research into understanding the reporting practices of these platforms, depending on each jurisdiction’s legal context.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In this report, we would be analyzing the transparency reports of online platforms with a large Indian user-base, specifically focusing on data they publish about user information and takedown requests received from Indian governments’ and courts.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;First, we detail our methodology for this report, including how we selected platforms whose transparency reports we analyse, and then specific metrics relating to information available in those reports. For the latter, we collate relevant metrics from existing frameworks, and propose a standard that can be applicable for our research.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the second part, we present company-specific reports. We identify general trends in the data published by the company, and then compare the available data to the best practices of transparency reporting that we proposed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/A%20collation%20and%20analysis%20of%20government%20requests%20for%20user%20data%20%20and%20content%20removal%20from%20non-Indian%20intermediaries%20.pdf"&gt;Download the full report&lt;/a&gt;.&amp;nbsp;The report was edited by Elonnai Hickok. Research assistance by Keying Geng and Anjanaa Aravindan.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/torsha-sarkar-suhan-s-and-gurshabad-grover-october-30-2019-through-the-looking-glass'&gt;https://cis-india.org/internet-governance/blog/torsha-sarkar-suhan-s-and-gurshabad-grover-october-30-2019-through-the-looking-glass&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Torsha Sarkar, Suhan S and Gurshabad Grover</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-11-02T05:48:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/participation-in-iso-iec-jtc-1-sc-27-meetings">
    <title>Participation in ISO/IEC JTC 1 SC 27 meetings</title>
    <link>https://cis-india.org/internet-governance/news/participation-in-iso-iec-jtc-1-sc-27-meetings</link>
    <description>
        &lt;b&gt;From October 14 - 18, 2019, Gurshabad Grover, participated in the meetings of ISO/IEC JTC 1 SC 27 held in Paris, the committee that develops international standards for IT Security techniques.&lt;/b&gt;
        &lt;p&gt;Gurshabad focused on the meetings of working group 5 that deals with identity management and privacy technologies. Some highlights of the participation:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;I represented the Indian delegation's contributions in the comment &lt;/span&gt;&lt;span&gt;resolution meeting on WD TS 27570: Privacy guidelines for smart cities.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Since &lt;/span&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT207_com_zimbra_date"&gt;October 2018&lt;/span&gt;&lt;span&gt;, I have been a co-rapporteur on the working groups' &lt;/span&gt;&lt;span&gt;study period on the impact of machine learning on privacy. At this &lt;/span&gt;&lt;span&gt;meeting, we presented our interim report. We are extending the study &lt;/span&gt;&lt;span&gt;period for six months to further collaborate with SC 42 (that deals with &lt;/span&gt;&lt;span&gt;artificial intelligence standards) to document privacy aspects for the &lt;/span&gt;&lt;span&gt;applications and use cases they have developed.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;I will now be a co-rapporteur on the study period on `Privacy for &lt;/span&gt;&lt;span&gt;fintech services', which was initiated in this meeting. We will be &lt;/span&gt;&lt;span&gt;surveying privacy standards and data protection regulations to assess &lt;/span&gt;&lt;span&gt;the need for new work items (standards/guidelines document) in the space.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/participation-in-iso-iec-jtc-1-sc-27-meetings'&gt;https://cis-india.org/internet-governance/news/participation-in-iso-iec-jtc-1-sc-27-meetings&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-11-02T06:31:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/un-special-rapporteur-on-the-right-to-privacy-consultation-on-privacy-and-gender">
    <title>UN Special Rapporteur on the Right to Privacy Consultation on 'Privacy and Gender'</title>
    <link>https://cis-india.org/internet-governance/news/un-special-rapporteur-on-the-right-to-privacy-consultation-on-privacy-and-gender</link>
    <description>
        &lt;b&gt;Ambika Tandon was a speaker at the Consultation on Privacy and Gender organised by the UN Special Rapporteur on the right to privacy held at New York University, New York on October 30 - 31, 2019. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The consultation was held to receive feedback on the report on privacy and gender towards which Pallavi, Aayush, Pranav and Ambika sent comments. Ambika was a speaker in t&lt;span&gt;he session 'The Body: as Data, as Identity, as &lt;/span&gt;&lt;span&gt;Money Maker', chaired by Eva Blum-Dumontet from Privacy &lt;/span&gt;&lt;span&gt;International, with co-panelists Anja Kovacs, Director, Internet &lt;/span&gt;&lt;span&gt;Democracy Project, and Joana Varon, Director, Coding Rights.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/un-special-rapporteur-on-the-right-to-privacy-consultation-on-privacy-and-gender'&gt;https://cis-india.org/internet-governance/news/un-special-rapporteur-on-the-right-to-privacy-consultation-on-privacy-and-gender&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-11-02T06:39:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/al-jazeera-video-november-8-2019-india-facial-recognition">
    <title>India facial recognition: How effective will it be?</title>
    <link>https://cis-india.org/internet-governance/news/al-jazeera-video-november-8-2019-india-facial-recognition</link>
    <description>
        &lt;b&gt;India is trying to build what could be the world's largest facial recognition system.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;New Delhi says the system could help fight crime and find missing children.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The technology has already been launched at a few Indian airports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Police in New Delhi says it has identified nearly 3,000 missing children during a trial period last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But not everyone is convinced.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet freedom advocates say there is little information about where and what the system will be used for and how data will be stored.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of facial recognition software is already common in places like China.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there are questions about how effective it is, with one British study revealing that the technology could be highly inaccurate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash joins Al Jazeera from Bengaluru in India. He is a fellow at the Centre for Internet and Society but is talking to us in a personal capacity&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/YAsMf9qy3cc" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/al-jazeera-video-november-8-2019-india-facial-recognition'&gt;https://cis-india.org/internet-governance/news/al-jazeera-video-november-8-2019-india-facial-recognition&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-11-15T00:42:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/et-tech-megha-mandavia-november-4-2019-cyber-law-experts-asks-why-cert-in-removed-advisory-warning-about-whatsapp-vulnerability">
    <title>Cyber law experts asks why CERT-In removed advisory warning about WhatsApp vulnerability</title>
    <link>https://cis-india.org/internet-governance/news/et-tech-megha-mandavia-november-4-2019-cyber-law-experts-asks-why-cert-in-removed-advisory-warning-about-whatsapp-vulnerability</link>
    <description>
        &lt;b&gt;On the missing web page note, CERT-In had provided a detailed explanation of the vulnerability, which could be exploited by an attacker by making a decoy voice call to a target.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Megha Mandavia was &lt;a class="external-link" href="https://tech.economictimes.indiatimes.com/news/internet/cyber-law-experts-asks-why-cert-in-removed-advisory-warning-about-whatsapp-vulnerability/71881880"&gt;published in ET Tech.com&lt;/a&gt; on November 4, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Cyber law experts have asked the &lt;a href="https://tech.economictimes.indiatimes.com/tag/government"&gt;government&lt;/a&gt; to explain why the Indian computer emergency response team (&lt;a href="https://tech.economictimes.indiatimes.com/tag/cert-in"&gt;CERT-In&lt;/a&gt;) removed from its website two days ago an advisory it had put out in May warning users of a vulnerability that could be used to exploit &lt;a href="https://tech.economictimes.indiatimes.com/tag/whatsapp"&gt;WhatsApp&lt;/a&gt; on their smartphones.&lt;br /&gt;&lt;br /&gt;“This is merely further evidence that the explanation is to be provided by GoI (Government of India) instead of blame shifting and politicizing the issue,” said Mishi Choudhary, the legal director of the New York-based Software Freedom Law Center. “India is a surveillance state with no judicial oversight.”&lt;br /&gt;&lt;br /&gt;On the missing web page note, CERT-In had provided a detailed explanation of the vulnerability, which could be exploited by an attacker by making a decoy voice call to a target.&lt;br /&gt;&lt;br /&gt;It had warned WhatsApp users that the vulnerability could allow an attacker to access information on the system, such as logs, messages and photos, and could further compromise it. CERT-In rated the severity “high” and asked users to upgrade to the latest version of the app.&lt;br /&gt;&lt;br /&gt;It also listed links to hackernews and cyber security firm Check Point Software that pointed to the alleged involvement of Israeli cyber software firm NSO Group in the hacking of WhatsApp messenger.&lt;br /&gt;&lt;br /&gt;CERT-In Director-General Sanjay Bahl did not respond to ET’s mails or calls seeking clarity on why the advisory was pulled from its website.&lt;br /&gt;&lt;br /&gt;The Times of India reported first the development.&lt;br /&gt;&lt;br /&gt;The government had blamed WhatsApp for not informing it about the attack and asked the Facebook-owned company to respond by November 4.&lt;br /&gt;&lt;br /&gt;In response, WhatsApp sources pointed out that it had informed CERT-in in May about the vulnerability and updated in September that 121 Indian nationals were targeted using the exploit, ET reported on Sunday.&lt;br /&gt;&lt;br /&gt;“We should not read too much into it. It could just be bad website management. The vulnerability was public knowledge. It was reported by the Common Vulnerabilities and Exposures (CVE) organization in May,” said Pranesh Prakash, fellow at the Centre of &lt;a href="https://tech.economictimes.indiatimes.com/news/internet"&gt;Internet&lt;/a&gt; and Society, a non-profit organisation.&lt;br /&gt;&lt;br /&gt;The government has also questioned the timing of the disclosure, as it comes amid a request by it to the Supreme Court seeking three months to frame rules to curb misuse of social media in the country.&lt;br /&gt;&lt;br /&gt;The government has categorically told WhatsApp that it wants the platform to bring in a mechanism that would enable tracing of the origin of messages, a demand that the instant messaging platform has resisted citing privacy concerns.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/et-tech-megha-mandavia-november-4-2019-cyber-law-experts-asks-why-cert-in-removed-advisory-warning-about-whatsapp-vulnerability'&gt;https://cis-india.org/internet-governance/news/et-tech-megha-mandavia-november-4-2019-cyber-law-experts-asks-why-cert-in-removed-advisory-warning-about-whatsapp-vulnerability&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Megha Mandavia</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-11-15T00:48:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data">
    <title>The Future of Privacy in the Age of Big Data</title>
    <link>https://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data</link>
    <description>
        &lt;b&gt;A study tour on privacy and big data was organised by Friedrich Naumann Foundation for Freedom from September 3 to 10, 2016 in Berlin and Hamburg. Vanya Rakesh was one of the participants from South Asia who went for the tour.&lt;/b&gt;
        &lt;h3&gt;List of Participants&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Shahid Ahmad, Deputy Director, Digital Empowerment Foundation&lt;/li&gt;
&lt;li&gt;Shahzad Ahmad, Country Director, Bytes for All&lt;/li&gt;
&lt;li&gt;Shivam Satnani, Senior Analyst, Data Security Council of India&lt;/li&gt;
&lt;li&gt;Vanya Rakesh, Senior Policy Officer, Centre for Internet &amp;amp; Society&lt;/li&gt;
&lt;li&gt;Anja Kovacs, Director, Internet Democracy Project&lt;/li&gt;
&lt;li&gt;Tshering Cigay Dorji, CEO, Thimphu Tech Park&lt;/li&gt;
&lt;li&gt;Vrinda Bhandari, Lawyer and Journalist, Chambers of Trideep Pais (Anwaltskanzlei)&lt;/li&gt;
&lt;li&gt;Tahsin Ifnoor Sayeed, Head of Business Intelligence, DNet&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/study-tour-big-data-privacy.pdf"&gt;Click to see the Agenda&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data'&gt;https://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-09-22T23:24:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-september-24-apurva-venkat-and-moulishree-srivastava-whasapp-ruling-experts-seek-privacy-law">
    <title>WhatsApp ruling: Experts seek privacy law</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-september-24-apurva-venkat-and-moulishree-srivastava-whasapp-ruling-experts-seek-privacy-law</link>
    <description>
        &lt;b&gt;On August 25, Whatsapp updated its policy to share user content with social network; the decision opened new monetisation models for the messaging app.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Apurva Venkat and Moulishree Srivastava         quoted Sunil Abraham. It was &lt;a href="http://www.business-standard.com/article/current-affairs/whatsapp-ruling-experts-seek-privacy-law-116092400750_1.html"&gt;published           in the Business Standard&lt;/a&gt; on September 24, 2016.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The recent&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Delhi+High+Court" target="_blank"&gt;Delhi High Court&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;&lt;span&gt;ruling           that&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Messaging+App" target="_blank"&gt;messaging app&lt;/a&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;Whatsapp&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;&lt;span&gt;cannot           share user data highlights the need for legislation on           privacy, according to experts.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;On           August 25, Whatsapp, a platform with 70 million users in India           that was acquired by Facebook in 2014, updated its policy to           share user content with the social network. The decision           opened new monetisation models for the messaging app.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In response to a PIL, the court           ordered&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;&lt;span&gt;to           delete data of users who chose to opt out of its policy           changes before September 25. It also ordered&lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;&lt;span&gt;not           to share data collected before September 25 with Facebook for           users who had not opted out.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;"The           decision makes a strong statement on privacy," said Sunil           Abraham, executive director of the Centre for Internet           Society. According to him, a user trusts a platform and           provides access to his data. As another firm acquires the           platform, it gains access to the data.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;"Facebook           owns Whatsapp. It has to look at ways of monetising it," said           Nikhil Pahwa, co-founder of SavetheInternet.in.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;"With           so much digital data being generated, there is a need for a           privacy law in the country," said Pahwa.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;"Facebook's           consent interface is confusing. It can make a person who wants           to opt out let the company access his data," said Abraham,           adding a law would take care of such intricacies. The           government is working on a privacy bill.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;Saroj           Kumar Jha, partner, SRGR Law Offices, said there were few           judgments on privacy in India based on constitutional rights.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;"While           the Information Technology Act enables courts to pass           judgments on global companies on privacy, enforcing the orders           is difficult," he said.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;"What           is required is a privacy law that can protect user data and           uphold the individual's right to privacy," he added.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-september-24-apurva-venkat-and-moulishree-srivastava-whasapp-ruling-experts-seek-privacy-law'&gt;https://cis-india.org/internet-governance/news/business-standard-september-24-apurva-venkat-and-moulishree-srivastava-whasapp-ruling-experts-seek-privacy-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-09-27T02:35:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
