The Centre for Internet and Society
https://cis-india.org
These are the search results for the query, showing results 1 to 13.
Workshop on Democratic Accountability in the Digital Age (Delhi, November 14-15)
https://cis-india.org/internet-governance/events/workshop-on-democratic-accountability-in-the-digital-age-delhi-november-14-15
<b>IT for Change, along with Centre for Internet and Society (CIS), Digital Empowerment Foundation (DEF), Mazdoor Kisan Shakti Sangathan (MKSS) and National Campaign for People’s Right to Information (NCPRI), is organising a two day workshop on ‘Democratic Accountability in the Digital Age’. The workshop will focus on evolving a comprehensive policy approach to data based governance and digital democracy, grounded in a rights and social justice framework. It will be held at the United Service Institution of India, Delhi, during November 14-15, 2016. The CIS team to participate in the workshop includes Sumandro Chattapadhyay (speaker), Amber Sinha (speaker), Vanya Rakesh (participant), and Himadri Chatterjee (participant).</b>
<p> </p>
<p>The workshop aims to:</p>
<ul><li>
<p>Discuss the institutional norms, rules and practices appropriate to the rise of ‘governance by networks’ and ‘rule by data’ that can guarantee democratic accountability and citizen participation, and</p>
</li>
<li>
<p>Articulate the steps to claim the civic-public value of digital technologies so that data and the new possibilities for networking are harnessed for a vibrant grassroots democracy.</p>
</li></ul>
<p>We hope the workshop can create a civil society coalition that can build effective strategies for legal and policy reform to further participatory democracy in the digital age. On the first day, the workshop will set the context through knowledge sharing and thematic presentations and discussions. On the second day, we aim to concretize strategies for collective action to further democratic accountability in the digital age.</p>
<hr />
<h4><a href="http://itforchange.net/mavc/wp-content/uploads/2016/11/Workshop-Agenda-Democratic-accountability-in-the-digital-age-14-to-15-Nov-2016-2.pdf">Workshop Agenda</a> (PDF)</h4>
<h4><a href="http://itforchange.net/mavc/wp-content/uploads/2016/10/Background-note-for-workshop-on-Democracy-in-Digital-Age-Sep21.odt">Background Note</a> (ODT)</h4>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/events/workshop-on-democratic-accountability-in-the-digital-age-delhi-november-14-15'>https://cis-india.org/internet-governance/events/workshop-on-democratic-accountability-in-the-digital-age-delhi-november-14-15</a>
</p>
No publishersumandroDigital IDDigital GovernancePrivacyUIDInternet GovernanceAccountabilityDigital IndiaAadhaarWelfare GovernanceE-GovernanceDigital Rights2016-12-15T09:27:22ZEventWorkshop on Big Data in India: Benefits, Harms, and Human Rights (Delhi, October 01)
https://cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016
<b>CIS welcomes you to participate in the workshop we are organising on Saturday, October 01 at India Habitat Centre, Delhi, to discuss benefits, harms, and human rights implications of big data technologies, and explore potential research questions. A quick RSVP will be much appreciated.</b>
<p> </p>
<h4>Workshop invitation: <a href="http://cis-india.org/internet-governance/files/big-data-in-india-invitatation-to-workshop/at_download/file">Download</a> (PDF)</h4>
<h4>Workshop agenda: <a href="http://cis-india.org/internet-governance/files/big-data-in-india-workshop-agenda/at_download/file">Download</a> (PDF)</h4>
<hr />
<p>In the last few years, there has been an emergence of the discourse of big data viewing it as an instrument not just for ensuring efficient, targeted and personalised services in the private sector, but also for development, social and policy research, and formalising and monetising various sections of the economy. This possibility is premised upon the idea that there is great knowledge that resides in both traditional and new forms of data made possible by our digital selves, and that we may now have the capability to tap into that knowledge for insights across diverse sectors like healthcare, finance, e-governance, education, law enforcement and disaster management, to name but a few. Alongside, various commentators have also pointed to the new problems and risks that big data could create for privacy of individuals through greater profiling, for free speech and economic choice by strengthening monopolistic tendencies, and for socio-economic inequalities by making existing disparities more acute and facilitating algorithmic bias and exclusion.</p>
<p>From a regulatory perspective, big data technologies pose fundamental challenges to the national data regulatory frameworks that have existed since many years. The nature of collection and utilisation of big data, which is often not driven by immediate purpose of the collected data, conflict with the principles of data minimisation and collection limitation that have been integral to data protection laws globally. This compels us to revisit existing theories of data governance. Additionally, use of big data in public decision-making highlights the question of how algorithmic control and governance must be regulated. This raises concerns around taking determining a balanced position that recognises the importance of big data, including for development actions, and ensures unhindered innovation with simultaneous focus on greater transparency and anonymisation to protect individual privacy, and various big data risks faced by population groups. In order to answer these questions, we need to begin with identifying the different harms and benefits of big data that could arise through its use across sectors and disciplines, especially in the context of human rights.</p>
<p>This workshop is designed around an extensive study of current and potential future uses of big data for governance in India that CIS has undertaken over the last year. The study focused on key central government projects and initiatives like the UID project, the Digital India programme, the Smart Cities Challenge, etc.</p>
<p>We will initiate the workshop with a detailed presentation of our findings and key concerns, which will then shape the discussion agenda of the workshop. We look forward to discuss aspects of big data technologies through the entry points of harms, opportunities, and human rights.</p>
<p>The final session of the workshop will focus on identifying key research questions on the topic, and exploring potential alliances of scholars and organisations that can drive such research activities.</p>
<p>We look forward to making this a forum for knowledge exchange for our friends and colleagues attending the discussion and discuss the opportunity to for potential collaboration.</p>
<p><strong>RSVP:</strong> Please send an email to Ajoy Kumar at <<a href="mailto:ajoy@cis-india.org">ajoy@cis-india.org</a>>.</p>
<p><strong>Organisers:</strong> Amber Sinha <<a href="mailto:amber@cis-india.org">amber@cis-india.org</a>> and Sumandro Chattapadhyay <<a href="mailto:sumandro@cis-india.org">sumandro@cis-india.org</a>>.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016'>https://cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016</a>
</p>
No publishervanyaDevelopmentBig DataInternet GovernanceDigital SecurityDigital IndiaDigitisationDigital subjectivitiesBiometricsBig Data for DevelopmentE-GovernanceDigital Rights2016-09-28T05:53:55ZEventWorkshop on 'Privacy after Big Data' (Delhi, November 12)
https://cis-india.org/internet-governance/events/privacy-after-big-data-delhi-nov-12-2016
<b>The Centre for Internet and Society (CIS) and the Sarai programme, CSDS, invite you to a workshop on 'Privacy after Big Data: What Changes? What should Change?' on Saturday, November 12. This workshop aims to build a dialogue around some of the key government-led big data initiatives in India and elsewhere that are contributing significant new challenges and concerns to the ongoing debates on the right to privacy. It is an open event. Please register to participate.</b>
<p> </p>
<h4>Invitation note and agenda: <a href="https://github.com/cis-india/website/raw/master/docs/CIS-Sarai_PrivacyAfterBigData_ConceptAgenda.pdf">Download</a> (PDF)</h4>
<hr />
<h3>Venue and RSVP</h3>
<p><strong>Venue:</strong> Centre for the Study of Developing Societies 29, Rajpur Road, Civil Lines, Delhi 110054.</p>
<p><strong>Location on Google Maps:</strong> <a href="https://www.google.com/maps/place/CSDS/@28.677775,77.2162523,17z/">https://www.google.com/maps/place/CSDS/@28.677775,77.2162523,17z/</a>.</p>
<p><strong>Registration:</strong> <a href="https://goo.gl/forms/py0Q0u8rMppu4smE3">Complete this form</a>.</p>
<h3>Concept Note</h3>
<p>In this age of big data, discussions about privacy are intertwined with the use of technology and the data deluge. Though big data possesses enormous value for driving innovation and contributing to productivity and efficiency, privacy concerns have gained significance in the dialogue around regulated use of data and the means by which individual privacy might be compromised through means such as surveillance, or protected. The tremendous opportunities big data creates in varied sectors ranges from financial technology, governance, education, health, welfare schemes, smart cities to name a few.</p>
<p>With the UID (“Aadhaar”) project re-animating the Right to Privacy debate in India, and the financial technology ecosystem growing rapidly, striking a balance between benefits of big data and privacy concerns is a critical policy question that demands public dialogue and research to inform an evidence based decision.</p>
<p>Also, with the advent of potential big data initiatives like the ambitious Smart Cities Mission under the Digital India Scheme, which would rely on harvesting large data sets and the use of analytics in city subsystems to make public utilities and services efficient, the tasks of ensuring data security on one hand and protecting individual privacy on the other become harder.</p>
<p>As key privacy principles are at loggerheads with big data activities, it is important to consider privacy as an embedded component in the processes, systems and projects, rather than being considered as an afterthought. These examples highlight the current state of discourse around data protection and privacy in India and the shapes they are likely to take in near future.</p>
<p>This workshop aims to build a dialogue around some of the key government-led big data initiatives in India and elsewhere that are contributing significant new challenges and concerns to the ongoing debates on the right to privacy.</p>
<h3>Agenda</h3>
<h4>09:00-09:30 Tea and Coffee</h4>
<h4>09:30-10:00 Introduction</h4>
<p><a href="#amber">Mr. Amber Sinha</a> and <a href="#sandeep">Mr. Sandeep Mertia</a><br />
<em>This session will introduce the topic of the workshop in the context of the ongoing works at CIS and Sarai.</em></p>
<h4>10:00-11:00 From Privacy Bill(s) to ‘Habeas Data’</h4>
<p><a href="#usha">Dr. Usha Ramanathan</a> and <a href="#vipul">Mr. Vipul Kharbanda</a><br />
<em>This session will present a brief history of the privacy bill(s) in India and end with reflections on ‘habeas data’ as a lens for thinking and actualising privacy after big data.</em></p>
<h4>11:00-11:30 Tea and Coffee</h4>
<h4>11:30-12:30 Digital ID, Data Protection, and Exclusion</h4>
<p><a href="#amelia">Ms. Amelia Andersdotter</a> and <a href="#srikanth">Mr. Srikanth Lakshmanan</a><br />
<em>This session will discuss national centralised digital ID systems, often operating at a cross-functional scale, and highlight its implications for discussions on data protection, welfare governance, and exclusion from public and private services.</em></p>
<h4>12:30-13:30 Digital Money and Financial Inclusion</h4>
<p><a href="#anupam">Dr. Anupam Saraph</a> and <a href="#astha">Ms. Astha Kapoor</a><br />
<em>This session will focus on the rise of digital banking and online payments as core instruments of financial inclusion in India, especially in the context of the Jan Dhan Yojana and UPI, and reflect on the concerns around privacy and financial data.</em></p>
<h4>13:30-14:30 Lunch</h4>
<h4>14:30-15:30 Big Data and Mass Surveillance</h4>
<p><a href="#anja">Dr. Anja Kovacs</a> and <a href="#matthew">Mr. Matthew Rice</a><br />
<em>This session will reflect on the rise of mass communication surveillance across the world, and the evolving challenges of regulating il/legal surveillance by government agencies.</em></p>
<h4>15:30-16:15 Privacy is (a) Right</h4>
<p><a href="#apar">Mr. Apar Gupta</a> and <a href="#kritika">Ms. Kritika Bhardwaj</a><br />
<em>This brief session is to share initial ideas and strategies for articulating and actualising a constitutional right to privacy in India.</em></p>
<h4>16:15-16:30 Tea and Coffee</h4>
<h4>16:30-17:30 Round Table</h4>
<p><em>An open discussion session to conclude the workshop.</em></p>
<h3>Speakers</h3>
<h4 id="amber">Mr. Amber Sinha</h4>
<p>Amber works on issues surrounding privacy, big data, and cyber security. He is interested in the impact of emerging technologies like artificial intelligence and learning algorithms on existing legal frameworks, and how they need to evolve in response. Amber studied humanities and law at National Law School of India University, Bangalore.</p>
<p>E-mail: amber at cis-india dot org.</p>
<p>Twitter: <a href="https://twitter.com/ambersinha07">@ambersinha07</a>.</p>
<h4 id="amelia">Ms. Amelia Andersdotter</h4>
<p>Amelia Andersdotter has been a Member of the European Parliament. She works on practical implications of data protection laws and consumer information security in Sweden, and digital rights in the Europe in general. Presently she is residing in Bangalore, where she is a visiting scholar with Centre for Internet and Society. She holds a BSc in Mathematics.</p>
<p>URL: <a href="https://dataskydd.net">https://dataskydd.net</a>.</p>
<p>Twitter: <a href="https://twitter.com/teirdes">@teirdes</a>.</p>
<h4 id="anja">Dr. Anja Kovacs</h4>
<p>Dr. Anja Kovacs directs the Internet Democracy Project in Delhi, India, which works for an Internet that supports free speech, democracy and social justice in India and beyond. Anja’s research and advocacy focuses especially on questions regarding freedom of expression, cybersecurity and the architecture of Internet governance. She has been a member of the of the Investment Committee of the Digital Defenders Partnership and of the Steering Committee of Best Bits, a global network of civil society members. She has also worked as an international consultant on Internet issues, including for the Independent Commission on Multilateralism, the United Nations Development Programme Asia Pacific and the UN Special Rapporteur on Freedom of Expression, Mr. Frank La Rue, as well as having been a Fellow at the Centre for Internet and Society in Bangalore, India.</p>
<p>Internet Democracy Project: <a href="https://internetdemocracy.in/">https://internetdemocracy.in</a>.</p>
<p>Twitter: <a href="https://twitter.com/anjakovacs">@anjakovacs</a>.</p>
<h4 id="anupam">Dr. Anupam Saraph</h4>
<p>Anupam Saraph has extensively researched India's UID number that has been widely regarded as the game changer in development programs. It has come to be linked with both public and private databases and become the requirement for access to entitlements, benefits, services and rights. Dr. Saraph, who has the design of at least two identification programs to his credit has researched the UID’s functional creep since its inception.</p>
<p>He has been dissecting the myths of what the UID is or is not. He has also tracked the consequences of its linkages on databases that protect national security, sovereignty, democratic status and the entire banking and money system in India. He has also highlighted the implications of its use for targeted delivery of cash subsidies from the Consolidated Fund of India. He has written and lectured widely about the devastating impact of the UID number on development programs, national security and the governability of India.</p>
<p>As a Professor of Systems, Governance and Decision Sciences, Environmental Systems and Business he mentors students and teaches systems, information systems, environmental systems and sustainable development at universities in Europe, Asia and the Americas. He has worked with the Rensselaer Polytechnic Institute, Rijksuniversitiet Groningen, RIVM, University of Edinburgh, Resource Use Institute, Systems Research Institute among others. Dr. Saraph has had the unique distinction of being India’s only person who has held the only office of a City CIO in India, in a PPP arrangement with government, industry and himself. He has also been the first e-governance Advisor to a State government. Dr. Saraph has held CxO and ministerial level positions and serves as an independent director on the boards of Public and Private Sector companies and NGOs. He is also the President of the Nagrik Chetna Manch, an NGO charged with the mission to bring accountability in governance.</p>
<p>Dr. Saraph is also actively engaged in civil society where he participates in several environmental, resource and nature conservation initiatives, has authored draft legislations for river and natural resource conservation, right to good governance and has contributed to governance, election and democratic reforms. Dr. Saraph is a regular columnist in newspapers and writes on issues of governance, future design, technology and education from a systems perspective.</p>
<p>Dr. Saraph is also actively engaged in civil society where he participates in several environmental, resource and nature conservation initiatives, has authored draft legislations for river and natural resource conservation, right to good governance and has contributed to governance, election and democratic reforms. Dr. Saraph is a regular columnist in newspapers and writes on issues of governance, future design, technology and education from a systems perspective.</p>
<p>Dr. Saraph is also actively engaged in civil society where he participates in several environmental, resource and nature conservation initiatives, has authored draft legislations for river and natural resource conservation, right to good governance and has contributed to governance, election and democratic reforms. Dr. Saraph is a regular columnist in newspapers and writes on issues of governance, future design, technology and education from a systems perspective.</p>
<p>As a future designer and recognized as a global expert on complex systems he helps individuals and organisations understand and design the future of their worlds. Together they address the toughest challenges, accomplish missions and achieve business goals. He also supports building capacity to address the challenges of today as well as to build future designs through teams and effective leadership. Since the eighties Dr. Saraph has modeled complex systems of cities, countries, regions and even the planet. His models have been awarded internationally and even placed in 10-year permanent exhibitions.</p>
<p>Dr Saraph works with business and government executives, civil society leaders, politicians, generals, civil servants, police, trade unionists, community activists, United Nations and ASEAN officials, judges, writers, media, architects, designers, technologists, scientists, entrepreneurs, board members and business leaders of small, mid and large single and trans-national companies, religious leaders and artists across a dozen countries and various industry sectors to help them and their organisations succeed in their missions. He advises the World Economic Forum through its Global Agenda Council for Complex Systems and the Club of Rome, Indian National Association as a founder life member.</p>
<p>Dr Saraph holds a PhD in designing sustainable systems from the faculty of Mathematics and Natural Sciences of the Rijksuniversiteit Groningen, the Netherlands.</p>
<p>Website: <a href="http://anupam.saraph.in/">http://anupam.saraph.in</a>.</p>
<p>Twitter: <a href="https://twitter.com/anupamsaraph">@anupamsaraph</a>.</p>
<h4 id="apar">Mr. Apar Gupta</h4>
<p>Apar Gupta practices law in Delhi. He is also one of the co-founders of the Internet Freedom Foundation. His work and writing on public interest issues can be accessed at his personal website <a href="http://www.apargupta.com/">www.apargupta.com</a>.</p>
<p>Twitter: <a href="https://twitter.com/aparatbar">@aparatbar</a>.</p>
<h4 id="astha">Ms. Astha Kapoor</h4>
<p>Astha Kapoor is a public policy strategy consultant working on financial inclusion and digital payments. Currently, she is working with MicroSave. Her tasks involve a focus on government to people (G2P) payments - and her work spans strategy, advisory and evaluation with the DBT Mission, Office of the Chief Economic Advisor, NITI Aayog and ministries pertaining to food, fuel and fertilizer. She recently designed a pilot to digitize uptake of fertilizers in Krishna district, and evaluated the newly introduced coupon system in the Public Distribution System in Bengaluru.</p>
<p>Twitter: <a href="https://twitter.com/kapoorastha">@kapoorastha</a>.</p>
<h4 id="kritika">Ms. Kritika Bhardwaj</h4>
<p>Kritika Bhardwaj works as a Programme Officer at the Centre for Communication Governance (CCG), National Law University, Delhi. Her main areas of research are privacy and data protection. At CCG, she has written about the privacy implications of several contemporary issues such as Aadhaar (India's unique identification project), cloud computing and the right to be forgotten. A lawyer by training, Kritika has a keen interest in information law and human rights law.</p>
<p>Centre for Communication Governance, NLU Delhi: <a href="http://ccgdelhi.org/">http://ccgdelhi.org</a>.</p>
<p>Twitter: <a href="https://twitter.com/Kritika12">@Kritika12</a>.</p>
<h4 id="matthew">Mr. Matthew Rice</h4>
<p>Matthew Rice is an Advocacy Officer at Privacy International working across the organisation engaging with international partners and strengthening their capacity on communications surveillance issues. He has previously worked at Privacy International as a consultant building the Surveillance Industry Index, the largest publicly available database on the private surveillance sector ever assembled. Matthew graduated from University of Aberdeen with an LLB (Hons.) and also has an MA in Human Rights from University College London.</p>
<p>Privacy International: <a href="https://privacyinternational.org/">https://privacyinternational.org</a>.</p>
<p>Twitter: <a href="https://twitter.com/mattr3">@mattr3</a>.</p>
<h4 id="sandeep">Mr. Sandeep Mertia</h4>
<p>Sandeep Mertia is a Research Associate at The Sarai Programme, Centre for the Study of Developing Societies, Delhi. He is an ICT engineer by training with research interests in Science & Technology Studies, Software Studies
and Anthropology. He is conducting an ethnographic study of emerging modes of data-driven knowledge production in the social sector.</p>
<p>Sarai: <a href="http://sarai.net/">http://sarai.net</a>.</p>
<p>Twitter: <a href="https://twitter.com/SandeepMertia">@SandeepMertia</a>.</p>
<p>Academia: <a href="https://daiict.academia.edu/SandeepMertia">https://daiict.academia.edu/SandeepMertia</a>.</p>
<h4 id="srikanth">Mr. Srikanth Lakshmanan</h4>
<p>Srikanth is a software professional with interests in Internet, follower of Internet policy discussions, volunteers for multiple online campaigns related to Internet. He is also fascinated by FOSS, opendata, localization,
Wikipedia, maps, public transit, civic tech and occasionally contributes to them.</p>
<p>Site: <a href="http://www.srik.me/">http://www.srik.me</a>.</p>
<p>Twitter: <a href="https://twitter.com/logic">@logic</a>.</p>
<h4 id="vipul">Mr. Vipul Kharbanda</h4>
<p>Vipul Kharbanda is a consultant with the Center for Internet and Society, Bangalore. After finishing his BA.LLB.(Hons.) from National Law School of India University in Bangalore, he worked for India’s largest corporate law firm for two and a half years in their Mumbai office for two years working primarily on the financing of various infrastructure projects such as Power Plants, Roads, Airports, etc. Since quitting his corporate law job, Vipul has been working as the Associate Editor in a legal publishing house which has been publishing legal books and journals for the last 90 years in India. He has also been involved with the Center for Internet and Society as a Consultant working primarily on issues related to privacy and surveillance.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/events/privacy-after-big-data-delhi-nov-12-2016'>https://cis-india.org/internet-governance/events/privacy-after-big-data-delhi-nov-12-2016</a>
</p>
No publishersumandroData SystemsDigital GovernancePrivacyData RevolutionSurveillanceBig DataDigital IndiaInternet GovernanceBig Data for DevelopmentDigital Rights2016-11-12T10:14:52ZEventState of Digital Rights in India (Delhi, March 24)
https://cis-india.org/internet-governance/news/state-of-digital-rights-in-india-delhi-march-24
<b>The Centre for Communication Governance at National Law University, Delhi and the Internet Freedom Foundation, in association with Access Now, are hosting a discussion on The State of Digital Rights in India on March 24, 2017 (Friday) from 6.00 pm onwards at Lecture Room-I, India International Centre- Annexe, New Delhi. Japreet Grewal and Sumandro Chattapadhyay will participate in the panel discussions.</b>
<p> </p>
<h4>Registration: <a href="https://www.eventbrite.com/e/state-of-digital-rights-in-india-tickets-33001450226">Eventbrite</a></h4>
<hr />
<p>March 24, 2017 marks the two year anniversary of the landmark Shreya Singhal judgment. This was a very significant ruling on freedom of speech and expression and occupies an important place in the Supreme Court’s discourse on civil liberties. The judgment traces out the contours of free speech on the Internet in India and unequivocally holds that the right to freedom of expression provided under Article 19(1)(a) applies to speech over the Internet, making it clear that this is a medium-neutral right.</p>
<p>The event aims to shed some light on this key judgment and discuss ongoing discussions regarding our civil liberties and freedoms online before courts and the Parliament. We would also like to take this opportunity to discuss some of the other pressing issues like Network Neutrality, Internet shutdowns, Privacy and User Security which need immediate attention and engagement of our democratic institutions. We hope to formulate effective strategies which will further shape the legal and policy framework in India, and facilitate better collaborative efforts between stakeholders.</p>
<p>We hope to bring together everyone who contributed to the judgment, and those who do work connected with it, so that we may build on it to seek a better legal framework to protect online speech and to discuss the threats surrounding digital rights and how best build on the foundations of the judgment.</p>
<p>We would be grateful if you could take out some time on Friday evening (6PM) and be a part of this important discussion. The discussion will be followed by dinner and an Open Bar for an Open Internet, which will start from 9.00 pm at the Annexe Court in the India International Centre - Annexe. In case you are unable to attend the seminar, please do join us for dinner!</p>
<p>Featuring:</p>
<ul><li>A keynote address on our online freedoms and policymaking, by Shri Tathagata Satpathy (Member of Parliament, Lok Sabha)</li>
<li>A legal panel analysing the legacy of the Shreya Singhal v. Union of India judgment</li>
<li>Beyond Shreya Singhal: A conversation with women on the future of our digital rights</li>
<li>Briefings on the state of digital rights in our courts and in Parliament</li>
<li>A conversation on the path ahead for our civil liberties and digital rights community</li>
<p> </p>
</ul>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/state-of-digital-rights-in-india-delhi-march-24'>https://cis-india.org/internet-governance/news/state-of-digital-rights-in-india-delhi-march-24</a>
</p>
No publisherJapreet Grewal and Sumandro ChattapadhyayPrivacyInternet GovernanceCivil SocietySecurityDigital Rights2017-03-27T13:21:20ZBlog EntryStand up for Digital Rights
https://cis-india.org/internet-governance/events/stand-up-for-digital-rights
<b>The Centre for Internet & Society (CIS) invites you to a discussion on a set of recommendations for Ethical Tech, a report on human rights and private online intermediaries which describes key areas where such actors have responsibilities. The event will be held at CIS office in Bangalore on June 15, 2016 from 5 p.m. to 7 p.m.</b>
<p style="text-align: justify; ">The discussion intends to launch a report on human rights and private online intermediaries, which describes key areas where such actors have responsibilities and provides a detailed set of recommendations for Ethical Tech. This work is the culmination of a year long research project led by the Centre for Law and Democracy (CLD), in collaboration with the Arabic Network for Human Rights Information (ANHRI), the Centre for Internet and Society (CIS), Open Net Korea, the Center for Studies on Freedom of Expression and Access to Information at the University of Palermo (CELE) and researchers with the University of Ottawa and the Munk School of Global Affairs at the University of Toronto. The key themes for discussion would include:</p>
<div id="_mcePaste">
<ul>
<li><span>General Human Rights Responsibilities and Private Online Intermediaries</span></li>
<li><span>Expanding Access</span></li>
<li><span>Net Neutrality</span></li>
<li><span>Content Moderation</span></li>
<li><span>Privacy</span></li>
<li><span>Transparency and Informed Consent</span></li>
<li><span>Responding to State Interferences</span></li>
</ul>
</div>
<p>We look forward to meeting you and making this forum for knowledge exchange a success.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/events/stand-up-for-digital-rights'>https://cis-india.org/internet-governance/events/stand-up-for-digital-rights</a>
</p>
No publisherelonnaiEventInternet GovernanceDigital Rights2016-06-13T15:30:12ZEventRankathon on Digital Rights (Delhi, January 08)
https://cis-india.org/internet-governance/events/rankathon-on-digital-rights-delhi-jan-08-2017
<b>Please join us on Sunday, January 08, at the CIS office in Hauz Khas, Delhi, for a rankathon to visualise, and contribute to the findings of the Ranking Digital Rights study, and critique the underlying methodology. The event will begin at 10:00 in the morning and participants can focus on one or more of three kinds of tasks: 1) visualising the CIS and Ranking Digital Rights data, 2) evaluating additional companies using the RDR methodology, and 3) evaluating the RDR methodology and its suitability for independent use.</b>
<p> </p>
<h4>Download: <a href="https://github.com/cis-india/website/raw/master/docs/CIS_RDRIndia-Rankathon_08012017_Invitation.pdf">Invitation</a> (PDF)</h4>
<hr />
<p>The <a href="https://rankingdigitalrights.org/">Ranking Digital Rights Corporate Responsibility Index</a> is a project hosted by the Open Technology Institute at New America Foundation that aims to rank Information and Communications Technology (ICTs) companies with respect to their Governance, Freedom of Expression, and Privacy practices. The inaugural Corporate Accountability Index, released in November 2015, evaluated 16 companies based on the project’s methodology that included 31 indicators in total.</p>
<p>Towards developing an understanding of how Indian ICT companies are recognising and upholding digital rights of their users, and to raise public awareness about the same, the Center for Internet and Society (CIS), with the support of <a href="https://privacyinternational.org/">Privacy International</a>, has studied 8 Indian ICT companies, using the same methodology as the 2015 Corporate Accountability Index, to gain greater insight into company practices and initiate public dialogues.</p>
<p>Please join us on Sunday, January 08, at the CIS office in Hauz Khas, Delhi, for a rankathon to visualise, and contribute to the findings of the Ranking Digital Rights study, and critique the underlying methodology. The event will begin at 10:00 in the morning and participants can focus on one or more of three kinds of tasks:</p>
<ul><li>
<p>visualising the CIS and Ranking Digital Rights data,</p>
</li>
<li>
<p>evaluating additional companies using the RDR methodology, and</p>
</li>
<li>
<p>evaluating the RDR methodology and its suitability for independent use.</p>
</li></ul>
<p>The event is open to all but the venue has limited space. The participants are requested to RSVP by sending an email to <a href="mailto:nisha@cis-india.org?subject=RSVP: Rankathon on Digital Rights">nisha@cis-india.org</a>. The final date for registering for the event is <strong>January 04</strong>.</p>
<p>All visualisations and other outputs produced at the event will be published under open licenses. All participants are expected to bring their own laptop or any other items needed for their work. CIS will offer data, help with understanding how the Ranking Digital Rights methodology work, refreshments, and any other support as needed.</p>
<p>We are also organising a discussion event on Saturday, January 07, at the India Islamic Cultural Centre, Delhi, to present our findings on digital rights practices of 8 Indian ICT companies, followed by an open structured discussion on the methodology of the Ranking Digital Rights study. Please find more details about this <a href="http://cis-india.org/internet-governance/events/discussion-on-ranking-digital-rights-in-india-delhi-jan-07-2017">here</a>.</p>
<p>We look forward to your participation and contribution to the discussion. Please support us by sharing this invitation with your colleagues and networks.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/events/rankathon-on-digital-rights-delhi-jan-08-2017'>https://cis-india.org/internet-governance/events/rankathon-on-digital-rights-delhi-jan-08-2017</a>
</p>
No publisheramberFreedom of Speech and ExpressionPrivacyInternet GovernanceDigital Rights2016-12-29T07:10:09ZEventPrivacy and Security Implications of Public Wi-Fi - A Case Study
https://cis-india.org/internet-governance/blog/privacy-and-security-implications-of-public-wi-fi-a-case-study
<b>Today internet is an essential necessity in everyday work and recognizing its vital role, governments across the world including the Indian government, are giving access to public Wi-Fi. However, use of public Wi-Fi brings along with it certain privacy and security risks. This research paper analyses some of these concerns, along with the privacy policies of key ISPs in India providing public Wi-Fi service in Bangalore-namely D-VoIS and Tata Docomo, as a case study to provide suitable recommendations.
</b>
<p> </p>
<h4><a class="external-link" href="http://cis-india.org/internet-governance/files/privacy-and-security-implications-of-public-wi-fi-a-case-study/at_download/file">Download</a> (PDF)</h4>
<hr />
<h4>Contents</h4>
<p>1. <a href="#1">Introduction</a></p>
<p>2. <a href="#2">Global Scenario</a></p>
<p>3. <a href="#3">Overview of Public Wi-Fi in India</a></p>
<p>4. <a href="#4">Indian Policy and Legal Conundrum</a></p>
<p>5. <a href="#5">Public Wi-Fi and Privacy Concerns</a></p>
<p>5.1. <a href="#51">Data Theft</a></p>
<p>5.2. <a href="#52">Tracking an Individual</a></p>
<p>5.3. <a href="#53">Makes the Electronic Devices Prone to Hacking and Setting up Fake Networks</a></p>
<p>5.4. <a href="#54">Illegal Use of Data</a></p>
<p>6. <a href="#6">Ranking Digital Rights Project</a></p>
<p>6.1. <a href="#61">D-VoIS, Bangalore</a></p>
<p>6.2. <a href="#62">Tata Docomo, Bangalore</a></p>
<p>7. <a href="#7">Compliance of Privacy Policies with Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011</a></p>
<p>8. <a href="#8">Conclusion and Recommendations</a></p>
<p>8.1. <a href="#81">Commitment</a></p>
<p>8.2. <a href="#82">Freedom of Expression</a></p>
<p>8.3. <a href="#83">Privacy</a></p>
<hr />
<h2 id="1">1. Introduction</h2>
<p style="text-align: justify;">Recognizing internet as a critical tool for day-to-day work and facilitating increased access to it in the past few years,<a name="_ftnref1" href="#_ftn1"><sup>[1]</sup></a> the Indian Government as well as Governments across the world have rolled out plans for offering public Wi-Fi. However, privacy risks of using public Wi-Fi have also been flagged across jurisdictions, which will be discussed in this paper. Apart from highlighting key privacy concerns associated with the use of free public Wi-Fi, this case study aims to analyse the privacy policies of two of the Internet Service Providers in India-namely Tata Docomo<a name="_ftnref2" href="#_ftn2"><sup>[2]</sup></a> and D-VoiS<a name="_ftnref3" href="#_ftn3"><sup>[3]</sup></a>, which offer public Wi-Fi services in Bangalore city against the indicators listed under the Ranking Digital Rights project<a name="_ftnref4" href="#_ftn4"><sup>[4]</sup></a>, as well as the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011<a name="_ftnref5" href="#_ftn5"><sup>[5]</sup></a>. Based on this analysis, this paper shall list key recommendations to these ISPs to ensure sound privacy policies and practices with a view to have a balanced framework and ecosystem in light of key privacy considerations, especially in light of public Wi-Fi.</p>
<h2 id="2">2. Global Scenario</h2>
<p style="text-align: justify;">Security and privacy concerns around the use of free and public Wi-Fi have been raised in India<a name="_ftnref6" href="#_ftn6"><sup>[6]</sup></a> as well as across the globe. In various cities like Bangalore, Delhi, Hyderabad, New York, London, Paris, etc., privacy experts have raised concerns over the public Wi-Fi systems at metro stations, malls, payphones and other such public places.<a name="_ftnref7" href="#_ftn7"><sup>[7]</sup></a></p>
<p style="text-align: justify;">For many years, New York City has been in the process of developing a “free” public Wi-Fi project called LinkNYC<a name="_ftnref8" href="#_ftn8"><sup>[8]</sup></a> to bring wireless Internet access to the residents of the city. However, privacy concerns have been raised by the users and privacy advocates like the New York Civil Liberties Union, where the latter also issued a letter to the Mayor's office regarding this<a name="_ftnref9" href="#_ftn9"><sup>[9]</sup></a> as the collection of potentially sensitive personal, locational and behavioral data, without adequate safeguards could result in sharing of such data without the data subject’s consent or knowledge. For example, one of the concerns raised has been regarding retention of user's data by CityBridge, the company behind the LinkNYC kiosks, often indefinitely, for building a massive database which carries a risk of security breaches and unwarranted surveillance by the police. <a name="_ftnref10" href="#_ftn10"><sup>[10]</sup></a> Also, users are concerned that their internet browsing history may reveal sensitive information about their political views, religious affiliations or medical issues<a name="_ftnref11" href="#_ftn11"><sup>[11]</sup></a>, since registration is required to use LinkNYC by submitting their email addresses and by agreeing to allow CityBridge to collect information about the websites they visit, the duration for which they linger on certain information on a webpage and the links they click on. On the contrary, the privacy policy of CityBridge states that this massive amount of personally identifiable user information would be cleared only if there have been 12 months of user inactivity, raising an alarm in light of privacy concerns.<a name="_ftnref12" href="#_ftn12"><sup>[12]</sup></a></p>
<p style="text-align: justify;">In the year 2015, the Information Commissioner’s Office (ICO) conducted a review of public Wi-Fi services on a UK high street, where it was found that the Wi-Fi networks requested for varying levels of personal data, which was also processed for marketing purposes. The results highlighted that while some networks did not request any personal data, others asked for varying amounts, including information regarding name, postal and email address, mobile number, gender, as well as asking for a date of birth as a mandatory requirement (except for gender). During the sign-up process, though some Wi-Fi networks provided users with the choice to opt-in or opt-out for receiving electronic newsletters and updates, others offered no choice at all.<a name="_ftnref13" href="#_ftn13"><sup>[13]</sup></a> As a result of the review process, the ICO notified Wi-Fi network providers that it had reviewed and advised them of improvements that they could make to their service and issued guidance<a name="_ftnref14" href="#_ftn14"><sup>[14]</sup></a> regarding the dangers of using public Wi-Fi<a name="_ftnref15" href="#_ftn15"><sup>[15]</sup></a>. ICO also recommended users to take time to read all the information given by providers of Wi-Fi services before connecting.</p>
<p style="text-align: justify;">In 2006, the European Data Retention Directive 2006/24/EC<a name="_ftnref16" href="#_ftn16"><sup>[16]</sup></a> was introduced for the retention of communications data by providers of public electronic communications services for national security. The Directive provides an obligation for providers of publicly available electronic communications services and public communications networks to retain traffic and location data for the purpose of the investigation, detection, and prosecution of serious crime.<a name="_ftnref17" href="#_ftn17"><sup>[17]</sup></a> Also, the Data Retention (EC Directive) Regulations 2009<a name="_ftnref18" href="#_ftn18"><sup>[18]</sup></a> were introduced to implement the Directive in the UK. However, this was challenged on grounds of insufficient safeguards for the privacy rights of individuals, given the substantial interference which it facilitated with those rights.<a name="_ftnref19" href="#_ftn19"><sup>[19]</sup></a></p>
<p style="text-align: justify;">To ensure protection of user’s data and information, the Data Protection Act 1998<a name="_ftnref20" href="#_ftn20"><sup>[20]</sup></a> in UK obliges businesses retaining people’s data to comply with the law, which involves informing people about what data is being collected and ensure that the data is stored securely.<a name="_ftnref21" href="#_ftn21"><sup>[21]</sup></a> . Therefore, in case of ISP’s providing public Wi-Fi service, this would relate to the information people provide when they log on, such as their email address. Under the Act, the data protection principles must be complied with by the data controllers and it needs to be ensured that the information is used fairly and lawfully, for limited and stated purposes, used in a way that is adequate, relevant and not excessive, kept for no longer than is absolutely necessary, handled according to people’s data protection rights, kept safe and secure and not transferred outside the European Economic Area without adequate protection.<a name="_ftnref22" href="#_ftn22"><sup>[22]</sup></a> This would soon be updated and synced with the European Union’s General Data Protection Directive (GDPR).</p>
<h2 id="3">3. Overview of Public Wi-Fi in India</h2>
<p style="text-align: justify;">In India, the public Wi-Fi in some cases has been offered free for a limited duration, in several cities across the country. For example, in 2014, Bangalore became the first city in the country to establish free public Wi-Fi- Namma Wi-Fi (802.11N) to make Bangalore a smart and connected city. The service is offered at MG Road, Brigade Road and four other locations in Bangalore including Traffic and Transit Management Centres (TTMCs) at Shanthinagar, Yeshwanthpur, Koramangala and CMH Road in Indiranagar.<a name="_ftnref23" href="#_ftn23"><sup>[23]</sup></a> The internet and Wi-Fi service provider for Namma Wi-Fi is D-VoiS Broadband Ltd,a city-based firm.<a name="_ftnref24" href="#_ftn24"><sup>[24]</sup></a> However, it seems the State Government plans to pull the plug on the project, funds, lack of awareness and difficulty in access as key constraints.<a name="_ftnref25" href="#_ftn25"><sup>[25]</sup></a> Tata Docomo has inked an agreement with GMR Airports to offer Wi-Fi services at several International Airports in the country, including the Bangalore International Airport. It offers access to access free Wi-Fi service for 45 minutes, following which they users are required to pay for the service online, to continue using the Wi-Fi service.<a name="_ftnref26" href="#_ftn26"><sup>[26]</sup></a></p>
<p style="text-align: justify;">Delhi has also introduced free Wi-Fi at its premier shopping hubs of Connaught Place and Khan Market in the year 2014, and BSNL launched a free WiFi service at Karnataka’s Malpe beach in the year 2016 making it the first WiFi beach in the three coastal districts of the state.<a name="_ftnref27" href="#_ftn27"><sup>[27]</sup></a> The State Governments of Mumbai, Kolkata, Patna and Ahmedabad also offer free Wi-Fi services in limited areas.<a name="_ftnref28" href="#_ftn28"><sup>[28]</sup></a> As part of the flagship programme by Indian Government, Digital India, the Government announced the rollout of Wi-Fi services by June 2015 at select public places in 25 Indian cities with population of over 10 lakh and tourist destinations by December 2015.<a name="_ftnref29" href="#_ftn29"><sup>[29]</sup></a> Also, the Government has plans to digitise India by rolling out free Wi-Fi in 2500 towns and cities over a span of 3 years.<a name="_ftnref30" href="#_ftn30"><sup>[30]</sup></a> Google plans to deploy WiFi at 100 railway stations in partnership with Railtel. Under this scheme, Mumbai Central was the first station to get free Wi-Fi in the year 2016.<a name="_ftnref31" href="#_ftn31"><sup>[31]</sup></a> Also, Google's Project Loon aims to provide internet connectivity in remote and rural areas in India, which is currently being tested in other countries.<a name="_ftnref32" href="#_ftn32"><sup>[32]</sup></a>.</p>
<h2 id="4">4. Indian Policy and Legal Conundrum</h2>
<p style="text-align: justify;">In light of national security concerns around the misuse of public Wi-Fi, the Department of Telecommunication, GoI, published a regulation<a name="_ftnref33" href="#_ftn33"><sup>[33]</sup></a> dated February 2009, defining procedures for the establishment and use of public Wi-Fi to prevent misuse of public Wi-Fi and to be able to track the perpetrator in case of abuse. Indeed, the DOT has stated that “Insecure Wi-Fi networks are capable of being misused without any trail of user at later date”.<a name="_ftnref34" href="#_ftn34"><sup>[34]</sup></a></p>
<p style="text-align: justify;">As per the 2009 Regulations, DoT has instructed ISPs to enforce centralized authentication using Login ID and Password for each user to ensure that the identity of the user can be traced.<a name="_ftnref35" href="#_ftn35"><sup>[35]</sup></a> Regarding Wi-Fi services provided at public places, the Regulations state that bulk login IDs shall be created for controlled distribution, with authentication done at a centralized server. The subscribers are required to use public Wi-Fi by registering with temporary user ID and password, in the following methods:</p>
<ul style="text-align: justify;">
<li>Obtaining copy of photo identity of the subscriber, to be maintained by Licensee for one year; or</li>
<li>Providing details of user ID and password via SMS on subscriber's mobile phone , to be used as his/her identity by keeping the mobile number for one year.</li></ul>
<p style="text-align: justify;">Additionally, the data protection regime in India is governed by section 43A of the Information Technology Act, 2000 and the Rules<a name="_ftnref36" href="#_ftn36"><sup>[36]</sup></a> notified under it. It obliges corporate bodies which possess, deal or handle any sensitive personal data to implement and maintain reasonable security practices, failing which they would be held liable to compensate those affected by any negligence attributable to this failure. The said Rules also define requirements and safeguards that every Body Corporate is legally required to incorporate into the company's privacy policy. The Rules put restrictions on body corporates on collecting sensitive personal information, and also states that it must obtain prior consent from the “provider of information” regarding “purpose, means and modes of use of the information, along with limiting disclosure of such information.<a name="_ftnref37" href="#_ftn37"><sup>[37]</sup></a> Most of the ISPs in India being a private company, like D-VoiS and Tata Docomo, are obliged to comply with these provisions. Also, under the model License Agreement for Unified License<a name="_ftnref38" href="#_ftn38"><sup>[38]</sup></a> by Ministry of Communication & IT, Department of Telecommunications, Government of India, where the Unified Access License Framework allows for a single license for multiple services such as telecom, the internet and television and provides certain security guidelines, privacy of communications is to be maintained by the Licensee (the ISPs in this case) and network security practices and audits are mandated along with penalties for contravention in addition to what is prescribed under the Information Technology Act,2000. It also provides for ensuring unauthorized interception of messages does not take place. Therefore, the ISPs providing public Wi-Fi services in various cities across India would be governed by the data protection regime and could be held liable under these provisions in case of non-compliance with the security measures so stated.</p>
<p style="text-align: justify;">In July 2016, the Telecom Regulatory Authority of India (hereinafter referred as “TRAI”) floated a Consultation paper on Proliferation of Broadband through Public Wi-Fi Networks<a name="_ftnref39" href="#_ftn39"><sup>[39]</sup></a> with an objective to examine the need of encouraging public Wi-Fi networks in the country from a public policy point of view and discuss the issues as well as solutions in its proliferation. The paper recognises the fact that India is still in a green field deployment phase in terms of adoption of public Wi-Fi services and requires solutions for resolving the challenges and risks being faced in the process and lay a strong foundation to evolve towards a meaningful position in the advancement of initiatives related to Internet of Things, Smart Cities, etc.<a name="_ftnref40" href="#_ftn40"><sup>[40]</sup></a> This is an important step towards fulfilment of the Digital India scheme of the Indian Government to ensure better connectivity. In the paper, TRAI has advocated development of a payment platform which allows easy access to Wi-Fi services across internet service providers (ISPs) and through any payment instrument.<a name="_ftnref41" href="#_ftn41"><sup>[41]</sup></a> Besides that, the paper raises issues of various regulatory, licensing or policy measures required to encourage ubiquitous city-wide Wi-Fi networks as well as expansion of Wi-Fi networks in remote or rural areas, along with the issue of encouraging interoperability between the Wi-Fi networks of different service providers, both within the country and internationally, as well as between cellular and Wi-Fi networks.<a name="_ftnref42" href="#_ftn42"><sup>[42]</sup></a></p>
<h2 id="5">5. Public Wi-Fi and Privacy Concerns</h2>
<p style="text-align: justify;">Since proliferation of public Wi-Fi in India is happening at a moderate pace, the paper discusses key issues towards this, one of them being the logistics of deploying this service. This section briefly states and acknowledges privacy and security concerns as an important factor that may be posing issues in the adoption of public Wi-Fi services in the country. Since there have been numerous cases of security vulnerabilities in public Wi-Fi networks worldwide, security of networks and cyber crimes is a key issue for consideration.<a name="_ftnref43" href="#_ftn43"><sup>[43]</sup></a></p>
<p style="text-align: justify;">Deployment of public wireless access points has made it more convenient for people to access the Internet outside of their offices or homes. Despite advantages like ease of accessibility, connectivity and convenience, public Wi-Fi connection pose serious concerns as well. “The proliferation of public Wi-Fi is one of the biggest threats to consumer data”, says David Kennedy, founder of TrustedSec, a specialised information security consulting company based in the United States of America.<a name="_ftnref44" href="#_ftn44"><sup>[44]</sup></a> Also, the networks become an easier target with little public awareness about the existence of such threats wherein users expose valuable personal data over Wi-Fi hotspots. The recently released Norton Cyber Security Report 2016<a name="_ftnref45" href="#_ftn45"><sup>[45]</sup></a> shows how the benefit of constant connectivity is often outweighed by consumer complacency, leaving consumers and their Wi-Fi networks at risk. For the purpose of this report, Norton surveyed 20,000 people (over a 1,000 from India ) which reflects that though users in India may be increasingly becoming aware of the cyber threats they face due to use of public Wi-Fi, they don’t fully understand the accompanying risks and their online behaviour is often contradictory.<a name="_ftnref46" href="#_ftn46"><sup>[46]</sup></a> Also, it is important to consider that the services which claim to be free, actually generate revenue by advertisements, where the model works by providing free access to internet in exchange for user's’ personal and behavioral data, which is subsequently used to target ads to them.<a name="_ftnref47" href="#_ftn47"><sup>[47]</sup></a></p>
<p style="text-align: justify;">Some of the privacy harms stemming from use of public Wi-Fi are listed below.</p>
<h3 id="51"><strong>5.1. Data Theft</strong></h3>
<p style="text-align: justify;">With hackers finding it easy to access personal information of the data subjects, data can be hijacked by unauthorized internet access by spoofing the MAC and IP addresses of the authenticated user’s device or by use of default settings (saved passwords or IPs).<a name="_ftnref48" href="#_ftn48"><sup>[48]</sup></a> The following kinds of data is at a risk of being stolen and further misused:</p>
<ul style="text-align: justify;">
<li>demographic and locational data<a name="_ftnref49" href="#_ftn49"><sup>[49]</sup></a></li>
<li>forms of personal information acting as identifiers like financial information, social and personal information<a name="_ftnref50" href="#_ftn50"><sup>[50]</sup></a></li>
<li>private information like passwords to social networking sites, email accounts and banking websites<a name="_ftnref51" href="#_ftn51"><sup>[51]</sup></a></li>
<li>historical data from the devices<a name="_ftnref52" href="#_ftn52"><sup>[52]</sup></a></li></ul>
<ol style="text-align: justify;"></ol>
<h3 id="52"><strong>5.2. Tracking an Individual</strong></h3>
<p style="text-align: justify;">Like cell phones, Wi-Fi devices have unique identifiers that can be used for tracking purposes which can cause potential security issues. Tracking by using a Wi-Fi hotspot can also lead to third party harms like stalking.<a name="_ftnref53" href="#_ftn53"><sup>[53]</sup></a> To receive or use a service, often websites require the user to share their personal information such as name, age, ZIP code, or personal preferences, which is many times shared with advertisers and other third parties, without the knowledge or consent of the users.<a name="_ftnref54" href="#_ftn54"><sup>[54]</sup></a></p>
<h3 id="53"><strong>5.3. Makes the Electronic Devices Prone to Hacking and Setting up Fake Networks</strong></h3>
<p style="text-align: justify;">A recent experiment conducted by the chief scientist at mobile security firm Appknox at the Bengaluru International Airport, India, found that the wireless devices could be easily hacked over the airport’s free Wi-Fi network due to the easily exploitable security holes in the software made by Apple, Google, and Microsoft.<a name="_ftnref55" href="#_ftn55"><sup>[55]</sup></a> A similar experiment was backed by the European law enforcement agency, Europol, where a mobile hotspot was created in central London<a name="_ftnref56" href="#_ftn56"><sup>[56]</sup></a> and the hacker was able to gain access to passwords, apps, and even credit card and banking information with ease.<a name="_ftnref57" href="#_ftn57"><sup>[57]</sup></a> Lack of secure softwares and prevalence of open, unprotected Wi-Fi has made it fairly easy for hackers to set up fake twin access points that give them access to data histories and personal information.<a name="_ftnref58" href="#_ftn58"><sup>[58]</sup></a> This makes is easy to track data histories of users. Even if certain softwares use encryption codes, a simple decryption software can be used to obtain the information.<a name="_ftnref59" href="#_ftn59"><sup>[59]</sup></a></p>
<h3 id="54"><strong>5.4. Illegal Use of Data</strong></h3>
<ul style="text-align: justify;">
<li><strong>By authorities:</strong> the authorities have easier access to people’s browsing details and habits, and with justification in the name of national security, could be used to monitor the people without their consent.<a name="_ftnref60" href="#_ftn60"><sup>[60]</sup></a></li><br />
<li><strong>Wi-Fi provider:</strong> can sell the user’s demographic and location information. <a name="_ftnref61" href="#_ftn61"><sup>[61]</sup></a> Also, it was revealed in a study that the personal information of users is often transmitted by service providers without encryption. Anyone along the path between the user and the service’s data center can then intercept this information, opening users to grave privacy and security risks.<a name="_ftnref62" href="#_ftn62"><sup>[62]</sup></a></li><br />
<li><strong>By hackers:</strong> steal information and hack into unsuspecting victim’s bank accounts and misuse corporate financial information and secrets<a name="_ftnref63" href="#_ftn63"><sup>[63]</sup></a></li></ul>
<h2 id="6">6. Ranking Digital Rights Project</h2>
<p style="text-align: justify;">The "Ranking Digital Rights" project, an ongoing international non-profit research initiative, aims to promote greater respect for freedom of expression and privacy by focusing on the policies and practices of companies in the information communications technology (ICT) sector<a name="_ftnref64" href="#_ftn64"><sup>[64]</sup></a>, rank such companies in this light, and undertake research to develop the ranking methodology.<a name="_ftnref65" href="#_ftn65"><sup>[65]</sup></a></p>
<p style="text-align: justify;">In November 2015, the Ranking Digital Rights project launched the Corporate Accountability Index. Since several actors like the Internet and telecommunications companies, software producers, and device and networking equipment manufacturers exert growing influence over the political and civil lives of people all over the world, it is important to state that these organisations share a responsibility to respect human rights. For this purpose, 16 Internet and telecommunications companies were evaluated according to 31 indicators, which focused on corporate disclosure of policies and practices that affect users’ freedom of expression and privacy.<a name="_ftnref66" href="#_ftn66"><sup>[66]</sup></a></p>
<p style="text-align: justify;">The data produced by the index can help companies improve their policies, practices and help them identify challenges faced by companies in meeting their corporate obligations to respect human rights like Freedom of Expression and Privacy in the digital space.<a name="_ftnref67" href="#_ftn67"><sup>[67]</sup></a> Some of the key corporate practices which affect these rights are :</p>
<ul style="text-align: justify;">
<li>How companies handle government requests to hand over user data or restrict content;</li>
<li>How companies enforce their own terms of service;</li>
<li>What information companies collect about users and how long they retain it; and</li>
<li>To whom they share or sell user information.<a name="_ftnref68" href="#_ftn68"><sup>[68]</sup></a></li></ul>
<p style="text-align: justify;">The 2015 Corporate Accountability Index assesses transparency levels of the World’s most powerful Internet and telecommunications companies regarding their commitments, policies and practices that affect users’ freedom of expression and privacy and evaluates what companies share about these practices and offers recommendations for improvement. The methodology adopted relies on publicly available information so that advocates, researchers, journalists, policy makers, investors, and users can understand the extent to which different companies respect freedom of expression and privacy, and make appropriate policy, investment, and advocacy decisions. Also, public disclosures would enable researchers and journalists to investigate and verify the accuracy of company statements.<a name="_ftnref69" href="#_ftn69"><sup>[69]</sup></a></p>
<p style="text-align: justify;">For the purpose of this research, we would apply this index and the indicators to the internet service provider of public Wi-Fi in Bangalore-D-VoiS Ltd. and Tata Docomo to understand how comprehensive their privacy policies are when compared to global standards and make informed recommendations. Analysing policies against the index can help these companies identify best practices, as well as the obstacles they face in meeting their corporate obligations to respect human rights in the very digital spheres they helped to create.<a name="_ftnref70" href="#_ftn70"><sup>[70]</sup></a> The information has been gathered and analysed on the basis of publicly available information, and this can help companies empower users to make informed decisions about how they use technology, which would help build trust between users and companies in the long run.<a name="_ftnref71" href="#_ftn71"><sup>[71]</sup></a></p>
<h3 id="61"><strong>6.1. D-VoIS<a name="_ftnref72" href="#_ftn72"><sup>[72]</sup></a>, Bangalore</strong></h3>
<p style="text-align: justify;">For the purpose of this case study, the Privacy Policies of D-VoIS have been analysed on the basis of the Corporate Accountability index, and the answers can be accessed in <a class="external-link" href="http://cis-india.org/internet-governance/files/ranking-digital-rights-2015-annexure-1.pdf">Annex 1</a>.</p>
<h4>Summary</h4>
<p style="text-align: justify;">On the basis of the indicators and the information available, it can be ascertained that:</p>
<ul style="text-align: justify;">
<li>The Company has a freely available and understandable Privacy Policy and Terms of Use, though only in the English language.</li><br />
<li>The company does not commit to notify users in case of changes in the privacy policy of the company.</li><br />
<li>The company states circumstances in which it would restrict use of its services, along with reasons for content restriction.</li><br />
<li>The Company commits to the principle of data minimization, discloses circumstances when it shares information with third parties, and provides users with options to control the company’s collection and sharing of their information</li><br />
<li>Deploys industry standards for security of products and services.</li></ul>
<h4>Analysis</h4>
<ul style="text-align: justify;">
<li><strong>Commitment:</strong> D-VoIS fares low on Commitment since it has made no overarching public commitments to protect users’ freedom of expression or privacy in a manner that meets the Index’s criteria. The Company lacks adequate top-level policy commitments to users’ freedom of expression and privacy, establishing executive and management oversight over these issues, creating a process for human rights impact assessment, and lacks stakeholder engagement and a grievance mechanism.</li><br />
<li><strong>Freedom of Expression:</strong> The Company also fares low on Freedom of Expression as the terms of services, though easily available, are only in English language. Also, it does not commit to notify users about changes to the terms of service. While the company discloses what content and activities it prohibits , it provides no information about how the company notifies these restrictions to the users.<br /><br />
Regarding transparency about content restriction requests, since the Indian law prevents the company from disclosing government requests for content removal<a name="_ftnref73" href="#_ftn73"><sup>[73]</sup></a>, but it does not prevent the company from publishing more information about private requests for content restriction. D-VoIS does not provide any information with respect to this.</li><br />
<li><strong>Privacy:</strong> D-VoIS is required by law to have a privacy policy available on its website, this policy is available in English, but not in other languages spoken in India. Also, D-VoIS does not disclose what user information is collected, how and why, nor does it offer users meaningful access to their information. D-VoIS does not disclose any information regarding retention of user information, and the company could improve its disclosures about what user information it collects and how long it is retained.<br /><br />
Though the company discloses information about its security practices, it does not disclose any information regarding its efforts to educate users about security threats. It also does not disclose information regarding requests by non-governmental entities for user data.</li></ul>
<h3 id="62"><strong>6.2. Tata Docomo<a name="_ftnref74" href="#_ftn74"><sup>[74]</sup></a>, Bangalore</strong></h3>
<p style="text-align: justify;">The Privacy Policy and Terms & Conditions of Tata Docomo have been analysed on the basis of the Corporate Accountability index, and the answers can be accessed in <a class="external-link" href="http://cis-india.org/internet-governance/files/ranking-digital-rights-2015-annexure-2.pdf">Annex 2</a>.</p>
<h4>Summary</h4>
<p style="text-align: justify;">On the basis of the indicators and the information available, it can be ascertained that:</p>
<ul style="text-align: justify;">
<li>The Company has a freely available and understandable Data Privacy Policy and Terms of Use, though only in English language.</li><br />
<li>The Company has established electronic and administrative safeguards designed to secure the information collected to prevent unauthorized access to or disclosure of that information and to ensure it is used appropriately.</li><br />
<li>The company states circumstances in which it would restrict use of its services, along with reasons for content restriction. The company’s disclosed policies and practices demonstrate how it works to avoid contributing to actions that may interfere with the right to freedom of expression, except where such actions are lawful, proportionate and for a justifiable purpose.</li><br />
<li>The Company clearly states the kind of information collected, ways of collection and the reasons for collection as well as sharing.</li><br />
<li>Deploys industry standards for security of products and services</li></ul>
<h4>Analysis</h4>
<ul style="text-align: justify;">
<li><strong>Commitment:</strong> Tata Docomo fares low on Commitment since it has made no overarching public commitments to protect users’ freedom of expression or privacy in a manner that meets the Index’s criteria. Though the Company has established electronic and administrative safeguards designed to secure the information collected, it lacks adequate top-level policy commitments to users’ freedom of expression and privacy, establishing executive and management oversight over these issues, creating a process for human rights impact assessment, and lack of stakeholder engagement.</li><br />
<li><strong>Freedom of Expression:</strong> The Company fares low on Freedom of Expression as the terms of services, though easily available, are only in English language. Also, it does not commit to notify users about changes to the terms of service. While the company discloses what content and activities it prohibits , it provides no information about how the company notifies these restrictions to the users.<br /><br />
Regarding transparency about content restriction requests, since the Indian law prevents the company from disclosing government requests for content removal, it does not prevent the company from publishing more information about private requests for content restriction. Tata Docomo does not provide any information with respect to that.</li><br />
<li><strong>Privacy:</strong> Tata Docomo is required by law to have a privacy policy available on its website, this policy is available in English, but not in other languages spoken in India. No information is publically available regarding users option to control company's collection of information. Tata Docomo discloses that user information shall be retained as long as required and does not mention a specific duration for the same. Though the company discloses information about its security practices, it does not disclose any information regarding its efforts to educate users about security threats. It also does not disclose information regarding requests by non-governmental entities for user data.</li></ul>
<h2 id="7">7. Compliance of Privacy Policies with Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011</h2>
<p style="text-align: justify;">The Privacy Policy and Terms & Conditions of D-VoIS and Tata Docomo have been analysed on the basis of the security measures and procedures stated under the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 to ascertain how sound and compliant the framework is with the existing data protection regime in India. The comparison can be accessed in <a class="external-link" href="http://cis-india.org/internet-governance/files/it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011.pdf">Annex 3</a>.</p>
<p style="text-align: justify;">Comparing the requirements listed under the Rules with the policies of both the companies, it can be said that though the websites of both companies provide privacy policies and are easily accessible, they lack crucial information regarding consent of the user before collection as well as sharing of information. Also, though the policies state the purpose of sharing such data with third parties, it does not state the purpose of collection of the information. The policies are also silent regarding the requirements to be complied with before transferring personal data into another jurisdiction . There is also no information about the companies having a grievance officer. Additionally, though the terms of services of D-VoIS state that the customer may choose to restrict the collection or use of their personal information, both companies do not specifically provide for an opt out mechanism to its users.</p>
<h2 id="8">8. Conclusion and Recommendations</h2>
<p style="text-align: justify;">To allay the numerous concerns regarding privacy and security with respect to public Wi-Fi’s, the ISPs must have a sound Privacy Policy in place. For this purpose, adherence to the indicators as listed under the Corporate Accountability Index, along with requirements for security of personal information stated under the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 and improving the policies accordingly shall greatly contribute to protection of Freedom of Expression and ensure Privacy of user information. Ensuring compliance with the existing data protection regime in the country becomes more important in light of the growing privacy and security concerns due to proliferation of free and public Wi-Fi service in India. Adequate measures like acquiring consent for collection and sharing of user data, commitment by company executives to ensure protection of rights of individuals, adoption of security standards, creating awareness about security concerns, etc. by such corporate must be considered to ensure protection of personal information and reduce the likelihood of a data breach. Both D-VoIS and Tata Docomo must consider the following recommendations in order to meet the criteria set by the Ranking Digital Rights project, ensuring commitment towards protection of right to freedom of expression and privacy of the users.</p>
<h3 id="81"><strong>8.1. Commitment</strong></h3>
<ul style="text-align: justify;">
<li>Set in place an oversight mechanism to monitor how the company’s policies and practices affect freedom of expression and privacy. In case the Company already has that in place, information regarding the same must be made publically available for greater transparency.</li>
<li>Also, they must conduct regular, comprehensive, and credible due diligence, such as human rights impact assessments, to identify how all aspects of their business impact freedom of expression and privacy.</li>
<li>In addition to that, they must Provide for a remedy or grievance mechanism. The Telecom Regulatory Authority of India also requires that all service providers have redress mechanisms. In case the Company already has that in place, information regarding the same must be made publically available for greater transparency.</li></ul>
<h3 id="82"><strong>8.2. Freedom of Expression</strong></h3>
<ul style="text-align: justify;">
<li>The Companies must make an effort to make the Terms of Service available in the most commonly spoken languages by its users, besides English.</li>
<li>Also, it is recommended that the Companies must ensure to provide meaningful notice to users regarding change in terms of service.</li>
<li>Besides disclosing what content and activities the companies prohibit, they must disclose information regarding how it enforces these prohibitions and should provide examples regarding the circumstances under which it may suspend service to individuals or areas to help users understand such policies.</li>
<li>The Companies must also disclose information regarding the process for evaluating and responding to requests from third parties to restrict content or service. Additionally, it must disclose how long it retains user information, publish process for evaluating and responding to requests from government and other third parties for stored user data and/or real-time communications.</li></ul>
<h3 id="83"><strong>8.3. Privacy</strong></h3>
<ul style="text-align: justify;">
<li>Though both the Companies disclose that the user information shall be shared with third parties, and Tata Docomo discloses what information is collected and how, yet there should be no legal impediment for the companies to improve its disclosures about what user information it collects, with whom it is shared, and how long it is retained to protect the privacy of the users.</li>
<li>Though Tata Docomo allows the users to review and correct their Personal Information collected by the Company, D-VoIS must release information regarding whether the users are able to view, download or otherwise obtain all of the information about them that the company holds. In case it does not allow, the Company must duly change its policy regarding the same.</li>
<li>The Companies must also publish information to help users defend against cyber threats.</li></ul>
<hr style="text-align: justify;" />
<p style="text-align: justify;"><a name="_ftn1" href="#_ftnref1"><sup>[1]</sup></a> The Financial Express, ‘Free wi-fi: Digital Dilemma’, February 22, 2015,</p>
<p style="text-align: justify;"><a href="http://www.financialexpress.com/article/economy/free-Wi-Fi-digital-dilemma/45804/">http://www.financialexpress.com/article/economy/free-Wi-Fi-digital-dilemma/45804/</a></p>
<p style="text-align: justify;"><a name="_ftn2" href="#_ftnref2"><sup>[2]</sup></a> Tata Docomo, http://www.tatadocomo.com/</p>
<p style="text-align: justify;"><a name="_ftn3" href="#_ftnref3"><sup>[3]</sup></a> D-VoIS Communication Pvt. Ltd. <a href="http://www.dvois.com/">http://www.dvois.com/</a></p>
<p style="text-align: justify;"><a name="_ftn4" href="#_ftnref4"><sup>[4]</sup></a> Ranking Digital Rights, https://rankingdigitalrights.org/</p>
<p style="text-align: justify;"><a name="_ftn5" href="#_ftnref5"><sup>[5]</sup></a> the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011. Available at : <a href="http://www.wipo.int/edocs/lexdocs/laws/en/in/in098en.pdf">http://www.wipo.int/edocs/lexdocs/laws/en/in/in098en.pdf</a></p>
<p style="text-align: justify;"><a name="_ftn6" href="#_ftnref6"><sup>[6]</sup></a> See : <a href="http://indianexpress.com/article/technology/technology-others/public-wifi-can-be-used-to-steal-private-information-it-security-expert/">http://indianexpress.com/article/technology/technology-others/public-wifi-can-be-used-to-steal-private-information-it-security-expert/</a>, <a href="http://www.aljazeera.com/indepth/features/2016/03/india-unlocking-public-wi-fi-hotspots-160308072320835.html">http://www.aljazeera.com/indepth/features/2016/03/india-unlocking-public-wi-fi-hotspots-160308072320835.html</a> , <a href="http://www.business-standard.com/article/technology/indians-most-willing-to-share-personal-data-over-public-wifi-116083000673_1.html">http://www.business-standard.com/article/technology/indians-most-willing-to-share-personal-data-over-public-wifi-116083000673_1.html</a> and <a href="http://articles.economictimes.indiatimes.com/2015-05-20/news/62413108_1_corporate-espionage-hotspots-bengaluru-airport">http://articles.economictimes.indiatimes.com/2015-05-20/news/62413108_1_corporate-espionage-hotspots-bengaluru-airport</a></p>
<p style="text-align: justify;"><a name="_ftn7" href="#_ftnref7"><sup>[7]</sup></a> Scroll, ‘Free wifi in Delhi is good news but here is the catch’, November 21, 2014, http://scroll.in/article/690755/free-wifi-in-delhi-is-good-news-but-here-is-the-catch</p>
<p style="text-align: justify;"><a name="_ftn8" href="#_ftnref8"><sup>[8]</sup></a> LinkNYC, https://www.link.nyc/</p>
<p style="text-align: justify;"><a name="_ftn9" href="#_ftnref9"><sup>[9]</sup></a> See : <a href="http://www.nyclu.org/files/releases/city%20wifi%20letter.pdf">http://www.nyclu.org/files/releases/city%20wifi%20letter.pdf</a></p>
<p style="text-align: justify;"><a name="_ftn10" href="#_ftnref10"><sup>[10]</sup></a> The Huffingtonpost, ‘Maybe You Shouldn't Use Public Wi-Fi In New York City’, March 16, 2016, <a href="http://www.huffingtonpost.in/entry/public-wifi-nyc_us_56e96b1ce4b0b25c9183f74a">http://www.huffingtonpost.in/entry/public-wifi-nyc_us_56e96b1ce4b0b25c9183f74a</a></p>
<p style="text-align: justify;"><a name="_ftn11" href="#_ftnref11"><sup>[11]</sup></a> NYCLU, ‘City’s Public Wi-Fi Raises Privacy Concerns’, March 16, 2016,</p>
<p style="text-align: justify;"><a href="http://www.nyclu.org/news/citys-public-wi-fi-raises-privacy-concerns">http://www.nyclu.org/news/citys-public-wi-fi-raises-privacy-concerns</a></p>
<p style="text-align: justify;"><a name="_ftn12" href="#_ftnref12"><sup>[12]</sup></a> NYCLU, ‘City’s Public Wi-Fi Raises Privacy Concerns’, March 16, 2016,</p>
<p style="text-align: justify;"><a href="http://www.nyclu.org/news/citys-public-wi-fi-raises-privacy-concerns">http://www.nyclu.org/news/citys-public-wi-fi-raises-privacy-concerns</a></p>
<p style="text-align: justify;"><a name="_ftn13" href="#_ftnref13"><sup>[13]</sup></a>Information Commissioner’s Office Blog, ‘Be wary of public Wi-Fi’September 25, 2015, <a href="https://iconewsblog.wordpress.com/2015/09/25/be-wary-of-public-Wi-Fi/">https://iconewsblog.wordpress.com/2015/09/25/be-wary-of-public-Wi-Fi/</a></p>
<p style="text-align: justify;"><a name="_ftn14" href="#_ftnref14"><sup>[14]</sup></a>Information Commissioner’s Office Blog, ‘Be wary of public Wi-Fi’September 25, 2015, <a href="https://iconewsblog.wordpress.com/2015/09/25/be-wary-of-public-Wi-Fi/">https://iconewsblog.wordpress.com/2015/09/25/be-wary-of-public-Wi-Fi/</a></p>
<p style="text-align: justify;"><a name="_ftn15" href="#_ftnref15"><sup>[15]</sup></a>Marketing Law, ‘The ICO sounds a warning on public wi-fi and privacy’, November 24, 2015,</p>
<p style="text-align: justify;">http://marketinglaw.osborneclarke.com/data-and-privacy/the-ico-sounds-a-warning-on-public-Wi-Fi-and-privacy/</p>
<p style="text-align: justify;"><a name="_ftn16" href="#_ftnref16"><sup>[16]</sup></a>Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 <a href="http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32006L0024">http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32006L0024</a></p>
<p style="text-align: justify;"><a name="_ftn17" href="#_ftnref17"><sup>[17]</sup></a> Feiler, L., "The Legality of the Data Retention Directive in Light of the Fundamental Rights to Privacy and Data Protection", European Journal of Law and Technology, Vol. 1, Issue 3, 2010, <a href="http://ejlt.org/article/view/29/75">http://ejlt.org/article/view/29/75</a></p>
<p style="text-align: justify;"><a name="_ftn18" href="#_ftnref18"><sup>[18]</sup></a> The Data Retention (EC Directive) Regulations 2009 <a href="http://www.legislation.gov.uk/ukdsi/2009/9780111473894/pdfs/ukdsi_9780111473894_en.pdf">http://www.legislation.gov.uk/ukdsi/2009/9780111473894/pdfs/ukdsi_9780111473894_en.pdf</a></p>
<p style="text-align: justify;"><a name="_ftn19" href="#_ftnref19"><sup>[19]</sup></a> Purple, ‘Update on the legal implications of offering public WiFi in the UK’, September 10, 2014, <a href="http://purple.ai/update-legal-implications-offering-public-wifi-uk/">http://purple.ai/update-legal-implications-offering-public-wifi-uk/</a></p>
<p style="text-align: justify;"><a name="_ftn20" href="#_ftnref20"><sup>[20]</sup></a> Data Protection Act 1998, <a href="http://www.legislation.gov.uk/ukpga/1998/29/contents">http://www.legislation.gov.uk/ukpga/1998/29/contents</a></p>
<p style="text-align: justify;"><a name="_ftn21" href="#_ftnref21"><sup>[21]</sup></a> Wireless Social, <a href="http://www.wireless-social.com/how-it-works/legal-compliance/">http://www.wireless-social.com/how-it-works/legal-compliance/</a></p>
<p style="text-align: justify;"><a name="_ftn22" href="#_ftnref22"><sup>[22]</sup></a> Data Protection Act 1998, <a href="https://www.gov.uk/data-protection/the-data-protection-act">https://www.gov.uk/data-protection/the-data-protection-act</a></p>
<p style="text-align: justify;"><a name="_ftn23" href="#_ftnref23"><sup>[23]</sup></a>The Hindu, ‘Free wifi on M.G. Road and Brigade Road from Friday’, January 23, 2014, <a href="http://www.thehindu.com/news/cities/bangalore/free-wifi-on-mg-road-and-brigade-road-from-friday/article5606757.ece">http://www.thehindu.com/news/cities/bangalore/free-wifi-on-mg-road-and-brigade-road-from-friday/article5606757.ece</a></p>
<p style="text-align: justify;"><a name="_ftn24" href="#_ftnref24"><sup>[24]</sup></a>The Telegraph, ‘Free Wi-fi on tech city streets- Bangalore offers five public hotspots’, January 25, 2014, <a href="http://www.telegraphindia.com/1140125/jsp/nation/story_17863705.jsp#.VwIv_Zx97IU">http://www.telegraphindia.com/1140125/jsp/nation/story_17863705.jsp#.VwIv_Zx97IU</a></p>
<p style="text-align: justify;"><a name="_ftn25" href="#_ftnref25"><sup>[25]</sup></a>Economic Times, ‘Karnataka Govt pulls the plug on public Wi-Fi spots in Bengaluru’, March 15, 2016, <a href="http://tech.economictimes.indiatimes.com/news/internet/karnataka-govt-pulls-the-plug-on-public-Wi-Fi-spots-in-bengaluru/51404414">http://tech.economictimes.indiatimes.com/news/internet/karnataka-govt-pulls-the-plug-on-public-Wi-Fi-spots-in-bengaluru/51404414</a></p>
<p style="text-align: justify;"><a name="_ftn26" href="#_ftnref26"><sup>[26]</sup></a> Medianama, ‘Why Don’t Indian Airports Offer Free WiFi To Passengers?’, May 22, 2013, <a href="http://www.medianama.com/2013/05/223-indian-airports-free-wifi/">http://www.medianama.com/2013/05/223-indian-airports-free-wifi/</a></p>
<p style="text-align: justify;"><a name="_ftn27" href="#_ftnref27"><sup>[27]</sup></a>Hindustan Times, ‘BSNL launches free public WiFi at Karnataka’s Malpe beach’, January 25, 2016, <a href="http://www.hindustantimes.com/tech/bsnl-launches-free-public-wifi-on-karnataka-s-malpe-beach/story-XVM06KQKIcoyqV8CLJoYzJ.html">http://www.hindustantimes.com/tech/bsnl-launches-free-public-wifi-on-karnataka-s-malpe-beach/story-XVM06KQKIcoyqV8CLJoYzJ.html</a></p>
<p style="text-align: justify;"><a name="_ftn28" href="#_ftnref28"><sup>[28]</sup></a>TechTree, ‘Problems With Free City-Wide Wi-Fi Hotspots In India’, September 28, 2015,</p>
<p style="text-align: justify;"><a href="http://www.techtree.com/content/features/9914/problems-free-city-wide-Wi-Fi-hotspots-india.html#sthash.2ZSf9kq7.dpuf">http://www.techtree.com/content/features/9914/problems-free-city-wide-Wi-Fi-hotspots-india.html#sthash.2ZSf9kq7.dpuf</a></p>
<p style="text-align: justify;"><a name="_ftn29" href="#_ftnref29"><sup>[29]</sup></a>India Today, ‘25 Indian cities to get free public Wi-Fi by June 2015’, December 17, 2014, <a href="http://indiatoday.intoday.in/technology/story/25-indian-cities-to-get-free-public-Wi-Fi-by-june-2015/1/407214.html">http://indiatoday.intoday.in/technology/story/25-indian-cities-to-get-free-public-Wi-Fi-by-june-2015/1/407214.html</a></p>
<p style="text-align: justify;"><a name="_ftn30" href="#_ftnref30"><sup>[30]</sup></a>Business Insider, ‘Modi Government To Roll Out Free Wi-Fi In 2,500 Towns And Cities To Make India Digital’, January 23, 2015, <a href="http://www.businessinsider.in/Modi-Government-To-Roll-Out-Free-Wi-Fi-In-2500-Towns-And-Cities-To-Make-India-Digital/articleshow/45989339.cms">http://www.businessinsider.in/Modi-Government-To-Roll-Out-Free-Wi-Fi-In-2500-Towns-And-Cities-To-Make-India-Digital/articleshow/45989339.cms</a></p>
<p style="text-align: justify;"><a name="_ftn31" href="#_ftnref31"><sup>[31]</sup></a>RailTel launches free high-speed public Wi-Fi service with Google at Mumbai Central, <a href="http://www.railtelindia.com/images/Mumbai.pdf">http://www.railtelindia.com/images/Mumbai.pdf</a></p>
<p style="text-align: justify;"><a name="_ftn32" href="#_ftnref32"><sup>[32]</sup></a>Economic Times, ‘Google may get government nod to conduct pilot for Project Loon in India’, May 24, 2016,</p>
<p style="text-align: justify;"><a href="http://economictimes.indiatimes.com/tech/internet/google-may-get-government-nod-to-conduct-pilot-for-project-loon-in-india/articleshow/52408455.cms">http://economictimes.indiatimes.com/tech/internet/google-may-get-government-nod-to-conduct-pilot-for-project-loon-in-india/articleshow/52408455.cms</a></p>
<p style="text-align: justify;"><a name="_ftn33" href="#_ftnref33"><sup>[33]</sup></a>Department of Telecommunications, Ministry of Communications & IT, Government of India, February 23, 2009, <a href="http://www.dot.gov.in/sites/default/files/Wi-%20fi%20Direction%20to%20UASL-CMTS-BASIC%2023%20Feb%2009.pdf">http://www.dot.gov.in/sites/default/files/Wi-%20fi%20Direction%20to%20UASL-CMTS-BASIC%2023%20Feb%2009.pdf</a></p>
<p style="text-align: justify;"><a name="_ftn34" href="#_ftnref34"><sup>[34]</sup></a> Scroll, ‘Free wifi in Delhi is good news but here is the catch’ November 21, 2014, <a href="http://scroll.in/article/690755/free-wifi-in-delhi-is-good-news-but-here-is-the-catch">http://scroll.in/article/690755/free-wifi-in-delhi-is-good-news-but-here-is-the-catch</a></p>
<p style="text-align: justify;"><a name="_ftn35" href="#_ftnref35"><sup>[35]</sup></a>MojoNetworks, ‘Complying with DoT Regulation on Secure Use of WiFi: Less in Letter, More in Spirit’, <a href="http://www.mojonetworks.com/fileadmin/pdf/Implementing_DoT_Regulation_on_WiFi_Security.pdf">http://www.mojonetworks.com/fileadmin/pdf/Implementing_DoT_Regulation_on_WiFi_Security.pdf</a></p>
<p style="text-align: justify;"><a name="_ftn36" href="#_ftnref36"><sup>[36]</sup></a> Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011</p>
<p style="text-align: justify;"><a name="_ftn37" href="#_ftnref37"><sup>[37]</sup></a>The Centre for Internet & Society, ‘Privacy and the Information Technology Act — Do we have the Safeguards for Electronic Privacy?’, April 7, 2011, <a href="http://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy">http://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy</a></p>
<p style="text-align: justify;"><a name="_ftn38" href="#_ftnref38"><sup>[38]</sup></a>License Agreement for Unified License, <a href="http://www.dot.gov.in/sites/default/files/Unified%20Licence.pdf">http://www.dot.gov.in/sites/default/files/Unified%20Licence.pdf</a></p>
<p style="text-align: justify;"><a name="_ftn39" href="#_ftnref39"><sup>[39]</sup></a> Telecom Regulatory Authority of India, ‘Consultation Paper on Proliferation of Broadband through Public Wi-Fi Networks’ July 13, 2016, <a href="https://www.mygov.in/sites/default/files/mygov_1468492162190667.pdf">https://www.mygov.in/sites/default/files/mygov_1468492162190667.pdf</a></p>
<p style="text-align: justify;"><a name="_ftn40" href="#_ftnref40"><sup>[40]</sup></a> Telecom Regulatory Authority of India, ‘Consultation Paper on Proliferation of Broadband through Public Wi-Fi Networks’ July 13, 2016, <a href="https://www.mygov.in/sites/default/files/mygov_1468492162190667.pdf">https://www.mygov.in/sites/default/files/mygov_1468492162190667.pdf</a></p>
<p style="text-align: justify;"><a name="_ftn41" href="#_ftnref41"><sup>[41]</sup></a> The Economic Times, ‘Trai floats consultation paper to boost broadband through Wi-Fi in public places’, July 14, 2016, <a href="http://economictimes.indiatimes.com/articleshow/53195586.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">http://economictimes.indiatimes.com/articleshow/53195586.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst</a></p>
<p style="text-align: justify;"><a name="_ftn42" href="#_ftnref42"><sup>[42]</sup></a> Telecom Regulatory Authority of India, ‘Consultation Paper on Proliferation of Broadband through Public Wi-Fi Networks’ July 13, 2016, <a href="https://www.mygov.in/sites/default/files/mygov_1468492162190667.pdf">https://www.mygov.in/sites/default/files/mygov_1468492162190667.pdf</a></p>
<p style="text-align: justify;"><a name="_ftn43" href="#_ftnref43"><sup>[43]</sup></a>Mint, ‘Trai issues paper on public Wi-Fi networks’ July 14, 2016, <a href="http://www.livemint.com/Industry/1jVgso2R2Lz4NR5IYFaCtN/Trai-issues-paper-on-public-WiFi-networks.html">http://www.livemint.com/Industry/1jVgso2R2Lz4NR5IYFaCtN/Trai-issues-paper-on-public-WiFi-networks.html</a></p>
<p style="text-align: justify;"><a name="_ftn44" href="#_ftnref44"><sup>[44]</sup></a>Forbes,’How To Avoid Data Theft When Using Public Wi-Fi’, March 4, 2014, <a href="http://www.forbes.com/sites/amadoudiallo/2014/03/04/hackers-love-public-wi-fi-but-you-can-make-it-safe/#373c75e32476">http://www.forbes.com/sites/amadoudiallo/2014/03/04/hackers-love-public-wi-fi-but-you-can-make-it-safe/#373c75e32476</a></p>
<p style="text-align: justify;"><a name="_ftn45" href="#_ftnref45"><sup>[45]</sup></a>Symantec, ‘Norton Cyber Security Insights Report’, 2016, <a href="https://www.symantec.com/content/dam/symantec/docs/reports/2016-norton-cyber-security-insights-report.pdf">https://www.symantec.com/content/dam/symantec/docs/reports/2016-norton-cyber-security-insights-report.pdf</a></p>
<p style="text-align: justify;"><a name="_ftn46" href="#_ftnref46"><sup>[46]</sup></a>The Indian Express, ‘Indian cybercrime victims don’t learn from past experience: Norton Report’, November 18, 2016, <a href="http://indianexpress.com/article/technology/tech-news-technology/indian-users-complacent-when-it-comes-to-cyber-security-norton-report/">http://indianexpress.com/article/technology/tech-news-technology/indian-users-complacent-when-it-comes-to-cyber-security-norton-report/</a></p>
<p style="text-align: justify;"><a name="_ftn47" href="#_ftnref47"><sup>[47]</sup></a>Mashable, ‘This is the real price you pay for 'free' public Wi-Fi’, January 26, 2016, <a href="http://mashable.com/2016/01/25/actual-cost-free-Wi-Fi/?utm_cid=mash-com-Tw-main-link#WmAJGJ_COiq5">http://mashable.com/2016/01/25/actual-cost-free-Wi-Fi/?utm_cid=mash-com-Tw-main-link#WmAJGJ_COiq5</a></p>
<p style="text-align: justify;"><a name="_ftn48" href="#_ftnref48"><sup>[48]</sup></a>MojoNetworks, ‘Complying with DoT Regulation on Secure Use of WiFi: Less in Letter, More in Spirit’, <a href="http://www.mojonetworks.com/fileadmin/pdf/Implementing_DoT_Regulation_on_WiFi_Security.pdf">http://www.mojonetworks.com/fileadmin/pdf/Implementing_DoT_Regulation_on_WiFi_Security.pdf</a></p>
<p style="text-align: justify;"><a name="_ftn49" href="#_ftnref49"><sup>[49]</sup></a>Network Computing, ‘Public WiFi, Location Data & Privacy Anxiety’, July 4, 2015, <a href="http://www.networkcomputing.com/wireless/public-wifi-location-data-privacy-anxiety/1496375374">http://www.networkcomputing.com/wireless/public-wifi-location-data-privacy-anxiety/1496375374</a></p>
<p style="text-align: justify;"><a name="_ftn50" href="#_ftnref50"><sup>[50]</sup></a>Network Computing, ‘Public WiFi, Location Data & Privacy Anxiety’, July 4, 2015, <a href="http://www.networkcomputing.com/wireless/public-wifi-location-data-privacy-anxiety/1496375374">http://www.networkcomputing.com/wireless/public-wifi-location-data-privacy-anxiety/1496375374</a></p>
<p style="text-align: justify;"><a name="_ftn51" href="#_ftnref51"><sup>[51]</sup></a>The Indian Express, ‘Public Wifi can be used to steal private information: IT Security Expert’, May 19, 2015, <a href="http://indianexpress.com/article/technology/technology-others/public-wifi-can-be-used-to-steal-private-information-it-security-expert/#sthash.xiuWtL6v.dpuf">http://indianexpress.com/article/technology/technology-others/public-wifi-can-be-used-to-steal-private-information-it-security-expert/#sthash.xiuWtL6v.dpuf</a></p>
<p style="text-align: justify;"><a name="_ftn52" href="#_ftnref52"><sup>[52]</sup></a>Medium, ‘Maybe Better If You Don’t Read This Story on Public WiFi’, October 14, 2014, <a href="https://medium.com/matter/heres-why-public-wifi-is-a-public-health-hazard-dd5b8dcb55e6#.3061h6lsv">https://medium.com/matter/heres-why-public-wifi-is-a-public-health-hazard-dd5b8dcb55e6#.3061h6lsv</a></p>
<p style="text-align: justify;"><a name="_ftn53" href="#_ftnref53"><sup>[53]</sup></a>Network Computing, ‘Public WiFi, Location Data & Privacy Anxiety’, July 4, 2015, <a href="http://www.networkcomputing.com/wireless/public-wifi-location-data-privacy-anxiety/1496375374">http://www.networkcomputing.com/wireless/public-wifi-location-data-privacy-anxiety/1496375374</a></p>
<p style="text-align: justify;"><a name="_ftn54" href="#_ftnref54"><sup>[54]</sup></a>University of Washington, Computer Science and Engineering, ‘When I am on Wi-Fi, I am Fearless:” Privacy Concerns & Practices in Everyday Wi-Fi Use’, <a href="https://djw.cs.washington.edu/papers/wifi-CHI09.pdf">https://djw.cs.washington.edu/papers/wifi-CHI09.pdf</a></p>
<p style="text-align: justify;"><a name="_ftn55" href="#_ftnref55"><sup>[55]</sup></a>Breitbart, ‘Fre Public Wi-Fi poses security risks’, May 19, 2015, <a href="http://www.breitbart.com/big-government/2015/05/19/free-public-wifi-poses-security-risk/">http://www.breitbart.com/big-government/2015/05/19/free-public-wifi-poses-security-risk/</a></p>
<p style="text-align: justify;"><a name="_ftn56" href="#_ftnref56"><sup>[56]</sup></a>The Guardian, ‘Londoners give up eldest children in public Wi-Fi security horror show’, September 29, 2014, <a href="https://www.theguardian.com/technology/2014/sep/29/londoners-Wi-Fi-security-herod-clause">https://www.theguardian.com/technology/2014/sep/29/londoners-Wi-Fi-security-herod-clause</a></p>
<p style="text-align: justify;"><a name="_ftn57" href="#_ftnref57"><sup>[57]</sup></a> Medium, ‘Maybe Better If You Don’t Read This Story on Public WiFi’, October 14, 2014, <a href="https://medium.com/matter/heres-why-public-wifi-is-a-public-health-hazard-dd5b8dcb55e6#.3061h6lsv">https://medium.com/matter/heres-why-public-wifi-is-a-public-health-hazard-dd5b8dcb55e6#.3061h6lsv</a></p>
<p style="text-align: justify;"><a name="_ftn58" href="#_ftnref58"><sup>[58]</sup></a>ABC13, ‘Hackers set up fake Wi-Fi hotspots to steal your information, July 10, 2015, <a href="http://abc13.com/technology/hackers-set-up-fake-Wi-Fi-hotspots-to-steal-your-information/835223/">http://abc13.com/technology/hackers-set-up-fake-Wi-Fi-hotspots-to-steal-your-information/835223/</a></p>
<p style="text-align: justify;"><a name="_ftn59" href="#_ftnref59"><sup>[59]</sup></a>Medium, ‘Maybe Better If You Don’t Read This Story on Public WiFi’, October 14, 2014, <a href="https://medium.com/matter/heres-why-public-wifi-is-a-public-health-hazard-dd5b8dcb55e6#.3061h6lsv">https://medium.com/matter/heres-why-public-wifi-is-a-public-health-hazard-dd5b8dcb55e6#.3061h6lsv</a></p>
<p style="text-align: justify;"><a name="_ftn60" href="#_ftnref60"><sup>[60]</sup></a> Scroll, ‘Free wifi in Delhi is good news but here is the catch’ November 21, 2014, <a href="http://scroll.in/article/690755/free-wifi-in-delhi-is-good-news-but-here-is-the-catch">http://scroll.in/article/690755/free-wifi-in-delhi-is-good-news-but-here-is-the-catch</a></p>
<p style="text-align: justify;"><a name="_ftn61" href="#_ftnref61"><sup>[61]</sup></a> Scroll, ‘Free wifi in Delhi is good news but here is the catch’ November 21, 2014, <a href="http://scroll.in/article/690755/free-wifi-in-delhi-is-good-news-but-here-is-the-catch">http://scroll.in/article/690755/free-wifi-in-delhi-is-good-news-but-here-is-the-catch</a></p>
<p style="text-align: justify;"><a name="_ftn62" href="#_ftnref62"><sup>[62]</sup></a>University of Washington, Computer Science and Engineering, ‘When I am on Wi-Fi, I am Fearless:” Privacy Concerns & Practices in Everyday Wi-Fi Use’, <a href="https://djw.cs.washington.edu/papers/wifi-CHI09.pdf">https://djw.cs.washington.edu/papers/wifi-CHI09.pdf</a></p>
<p style="text-align: justify;"><a name="_ftn63" href="#_ftnref63"><sup>[63]</sup></a> Breitbart, ‘Fre Public Wi-Fi poses security risks’, May 19, 2015, <a href="http://www.breitbart.com/big-government/2015/05/19/free-public-wifi-poses-security-risk/">http://www.breitbart.com/big-government/2015/05/19/free-public-wifi-poses-security-risk/</a></p>
<p style="text-align: justify;"><a name="_ftn64" href="#_ftnref64"><sup>[64]</sup></a> Ranking Digital Rights, <a href="https://rankingdigitalrights.org/who/frequently-asked-questions/">https://rankingdigitalrights.org/who/frequently-asked-questions/</a></p>
<p style="text-align: justify;"><a name="_ftn65" href="#_ftnref65"><sup>[65]</sup></a> Business & Human Rights Resource Centre, ‘Ranking Digital Rights Project’, <a href="http://business-humanrights.org/en/documents/ranking-digital-rights-project">http</a><a href="http://business-humanrights.org/en/documents/ranking-digital-rights-project">://business-humanrights.org/en/documents/ranking-digital-rights-project</a></p>
<p style="text-align: justify;"><a name="_ftn66" href="#_ftnref66"><sup>[66]</sup></a> Ranking Digital Rights, <a href="https://rankingdigitalrights.org/about/">https://rankingdigitalrights.org/about/</a></p>
<p style="text-align: justify;"><a name="_ftn67" href="#_ftnref67"><sup>[67]</sup></a> Ranking Digital Rights, <a href="https://rankingdigitalrights.org/about/">https://rankingdigitalrights.org/about/</a></p>
<p style="text-align: justify;"><a name="_ftn68" href="#_ftnref68"><sup>[68]</sup></a> Ranking Digital Rights, <a href="https://rankingdigitalrights.org/who/frequently-asked-questions/">https://rankingdigitalrights.org/who/frequently-asked-questions/</a></p>
<p style="text-align: justify;"><a name="_ftn69" href="#_ftnref69"><sup>[69]</sup></a> Ranking Digital Rights, <a href="https://rankingdigitalrights.org/who/frequently-asked-questions/">https://rankingdigitalrights.org/who/frequently-asked-questions/</a></p>
<p style="text-align: justify;"><a name="_ftn70" href="#_ftnref70"><sup>[70]</sup></a> Ranking Digital Rights, <a href="https://rankingdigitalrights.org/about/">https://rankingdigitalrights.org/about/</a></p>
<p style="text-align: justify;"><a name="_ftn71" href="#_ftnref71"><sup>[71]</sup></a> Ranking Digital Rights, <a href="https://rankingdigitalrights.org/who/frequently-asked-questions/">https://rankingdigitalrights.org/who/frequently-asked-questions/</a></p>
<p style="text-align: justify;"><a name="_ftn72" href="#_ftnref72"><sup>[72]</sup></a> D-VoIS Communication Pvt. Ltd. <a href="http://www.dvois.com/">http://www.dvois.com/</a></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><a name="_ftn73" href="#_ftnref73"><sup>[73]</sup></a>Section 16 of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009 states that all request and complaints must be kept confidential.</p>
<p style="text-align: justify;"><a name="_ftn74" href="#_ftnref74"><sup>[74]</sup></a> Tata Docomo, http://www.tatadocomo.com/</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/privacy-and-security-implications-of-public-wi-fi-a-case-study'>https://cis-india.org/internet-governance/blog/privacy-and-security-implications-of-public-wi-fi-a-case-study</a>
</p>
No publishervanyaPublic Wireless NetworkPrivacyInternet GovernanceDigital Rights2016-12-12T12:29:49ZBlog EntryMediaNama - #NAMAprivacy: The Future of User Data (Delhi, Sep 6)
https://cis-india.org/internet-governance/news/medianama-namaprivacy-the-future-of-user-data-delhi-sep-6
<b>MediaNama is hosting a full day conference on "the future of user data in India", on the 6th of September 2017, which is particularly significant given the recent Supreme Court ruling on the fundamental right to privacy, and two government consultations: one at the TRAI, and another at MEITY. This discussion is supported by Facebook, Google, and Microsoft. Sumandro Chattapadhyay, Research Director, will participate as a speaker in the session titled "regulating storage, sharing and transfer of data."</b>
<p> </p>
<h4>Details</h4>
<p>Time: September 6th 2017, 9 am to 4:30 pm</p>
<p>Venue: Gulmohar Hall, India Habitat Centre, Lodhi Road (please enter from Gate #3)</p>
<p>Agenda: <a href="https://www.medianama.com/2017/08/223-agenda-namaprivacy-future-of-user-data/">https://www.medianama.com/2017/08/223-agenda-namaprivacy-future-of-user-data/</a></p>
<h4>Announced Speakers</h4>
<ul><li>Chinmayi Arun, Centre for Communication Governance at NLU Delhi</li>
<li>Malavika Raghavan, IFMR Finance Foundation</li>
<li>Renuka Sane, NIPFP</li>
<li>Smitha Krishna Prasad, Centre for Communication Governance at NLU Delhi</li>
<li>Ananth Padmanabhan, Carnegie India</li>
<li>Avinash Ramachandra, Amazon</li>
<li>Hitesh Oberoi, Naukri</li>
<li>Jochai Ben-Avie, Mozilla</li>
<li>Mrinal Sinha, Mobikwik</li>
<li>Murari Sreedharan, Bankbazaar</li>
<li>Sumandro Chattapadhyay, Centre for Internet and Society</li></ul>
<h4>Facilitators</h4>
<ul><li>Saikat Datta, Asia Times Online</li>
<li>Shashidar KJ, MediaNama</li>
<li>Nikhil Pahwa, MediaNama</li></ul>
<h4>Attendees</h4>
<p>We have confirmed 140+ attendees from: Adobe, Amber Health, Amazon, APCO Worldwide, Bank Bazaar, Bloomberg-Quint, Blume Ventures, Broadband India Forum, Business Standard, BuzzFeed News, CCOAI, CEIP, Change Alliance, Chase India, CIS, CNN News18, DEF, Deloitte, DNA, DSCI, E2E Networks, British High Commission, Eurus Network Services, FICCI, Firefly Networks, Flipkart, Forrester Research, Fortumo, DoT, MEITY, IAMAI, IBM, ICRIER, IFMR Finance Foundation, IIMC, Indian Law Institute, Indic Project, Info Edge, ISPAI, IT for Change, ITU-APT, Jamia Millia Islamia, Jindal Global Law School, Mimir Technologies, Mozilla, Newslaundry, NIPFP, Nishith Desai Associates, NIXI, NLU-Delhi, ORF, Paytm, PLR Chambers, PRS Legislative Research, Publicis Groupe, Quartz India, Reliance Jio, Reuters, Saikrishna & Associates, Scroll.in, SFLC.in, Spectranet, The Economics Times, The Indian Express, The Times of India, The Wire, Times Internet, Twitter, and more.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/medianama-namaprivacy-the-future-of-user-data-delhi-sep-6'>https://cis-india.org/internet-governance/news/medianama-namaprivacy-the-future-of-user-data-delhi-sep-6</a>
</p>
No publishersumandroBig DataDigital EconomyPrivacyInternet GovernanceData GovernanceData ProtectionDigital Rights2017-09-05T10:22:12ZBlog EntryJapleen Pasricha - Gendered Spaces in Digital Rights (Delhi, June 02, 5 pm)
https://cis-india.org/raw/firstfridayatcis-japleen-pasricha-gendered-spaces-in-digital-rights-delhi-june-02
<b>It is our priviledge to annouce that Japleen Pasricha will be the speaker for the June #FirstFridayAtCIS event. Japleen smashes the patriarchy for a living, and is Founder & Editor-in-chief of Feminism in India. The talk will focus on her experience of working on gender and digital rights in India, the ways in which "gender" functions as a critical lens in digital rights discourse and practice in India (or not), and the gendered nature of digital rights spaces in India. If you are joining us, please RSVP at the soonest as we have only limited space in our office.</b>
<p> </p>
<h3><strong>Japleen Pasricha</strong></h3>
<h4>Founder & Editor-in-chief, <a href="https://feminisminindia.com/" target="_blank">Feminism in India</a></h4>
<p>Japleen smashes the patriarchy for a living. Founder & Editor-in-chief of Feminism in India, she is a feminist activist based in New Delhi, India. She is a writer, educator, campaigner and researcher. She has vast experience in digital media and online publishing. Her interest lies in women’s studies, global feminism, gender, sexuality, VAW, SRHR, feminist praxis and internet as a space. Currently she is working on online violence against women and media representation of gender and gender-based violence. She’d like to use skills to intersect gender and sexuality with digital & social media and develop safe online spaces for women and marginalized communities.</p>
<p> </p>
<h3><strong>RSVP</strong></h3>
<iframe src="https://docs.google.com/forms/d/e/1FAIpQLSdp_ZWWOWsQxvM2IctUiQdPJwo9UYNCS-rn038qysmnzxeaIg/viewform?embedded=true" frameborder="0" marginwidth="0" marginheight="0" height="666" width="600">Loading...</iframe>
<p> </p>
<h3><strong>Location</strong></h3>
<iframe src="https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d876.157470894426!2d77.20553462919722!3d28.550842498903158!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x0%3A0x834072df81ffcb39!2sCentre+for+Internet+and+Society!5e0!3m2!1sen!2sin!4v1493818109951" frameborder="0" height="450" width="600"></iframe>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/raw/firstfridayatcis-japleen-pasricha-gendered-spaces-in-digital-rights-delhi-june-02'>https://cis-india.org/raw/firstfridayatcis-japleen-pasricha-gendered-spaces-in-digital-rights-delhi-june-02</a>
</p>
No publishersumandroGenderResearchers at Work#FirstFridayAtCISDigital Rights2017-05-31T03:49:26ZEventInternet Shutdown Stories
https://cis-india.org/internet-shutdown-stories
<b>A collection of stories of the impact of internet shutdowns on the lives of Indian citizens.</b>
<p>
For more details visit <a href='https://cis-india.org/internet-shutdown-stories'>https://cis-india.org/internet-shutdown-stories</a>
</p>
No publisherAmbika TandonInternet AccessInternet ShutdownDigital Rights2018-05-17T10:45:20ZFileGlobal Governance Futures 2027 - Session 3, New Delhi
https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi
<b>The Global Governance Futures program (GGF) initiated by Global Public Policy Institute and supported by Robert Bosch Stiftung brings together young professionals to look ahead ten years and recommend ways to address global challenges. Sumandro Chattapadhyay will join Ankhi Das (Facebook) and Arun Mohan Sukumar (Observer Research Foundation) on Tuesday, January 17, to discuss the "data governance" scenarios developed by the GGF 2027 Fellows.
</b>
<p> </p>
<h4>About the Programme: <a href="http://www.ggfutures.net/about/ggf-program/">External Link</a>.</h4>
<h4>GGF 2027 Fellows: <a href="http://www.ggfutures.net/current-fellows/">External Link</a>.</h4>
<h4>GGF 2027 Session 3, New Delhi - Agenda: <a href="http://cis-india.org/internet-governance/files/ggf-2027-session-3-new-delhi-agenda/at_download/file">Download</a> (PDF).</h4>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi'>https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi</a>
</p>
No publishersumandroPrivacyInternet GovernanceData GovernanceE-GovernanceDigital Rights2017-01-15T11:46:27ZBlog EntryDiscussion on Ranking Digital Rights in India (Delhi, January 07)
https://cis-india.org/internet-governance/events/discussion-on-ranking-digital-rights-in-india-delhi-jan-07-2017
<b>Towards developing an understanding of how Indian ICT companies are recognising and upholding digital rights of their users, and to raise public awareness about the same, the Center for Internet and Society (CIS), with the support of Privacy International, has studied 8 Indian ICT companies, using the same methodology as the 2015 Corporate Accountability Index, to gain greater insight into company practices and initiate public dialogues. Please join us on Saturday, January 07, at the India Islamic Cultural Centre, New Delhi, for a presentation of our findings followed by an open structured discussion on the methodology and implications of the study.</b>
<p> </p>
<h4>Download: <a href="https://github.com/cis-india/website/raw/master/docs/CIS_RDRIndia-Discussion_07012017_Invitation.pdf">Invitation and agenda</a> (PDF)</h4>
<hr />
<p>The <a href="https://rankingdigitalrights.org/">Ranking Digital Rights Corporate Responsibility Index</a> is a project hosted by the Open Technology Institute at New America Foundation that aims to rank Information and Communications Technology (ICTs) companies with respect to their Governance, Freedom of Expression, and Privacy practices. The inaugural Corporate Accountability Index, released in November 2015, evaluated 16 companies based on the project’s methodology that included 31 indicators in total.</p>
<p>Towards developing an understanding of how Indian ICT companies are recognising and upholding digital rights of their users, and to raise public awareness about the same, the Center for Internet and Society (CIS), with the support of <a href="https://privacyinternational.org/">Privacy International</a>, has studied 8 Indian ICT companies, using the same methodology as the 2015 Corporate Accountability Index, to gain greater insight into company practices and initiate public dialogues.</p>
<p>Please join us on Saturday, January 07, at the India Islamic Cultural Centre, New Delhi, for a presentation of our findings followed by an open structured discussion on the methodology and implications of the Ranking Digital Rights study. We will begin at 10:30 am with a round of tea and coffee.</p>
<p>The event is open to all but the venue has limited space. The participants are requested to RSVP by sending an email to <a href="mailto:nisha@cis-india.org?subject=RSVP: Ranking Digital Rights Discussion">nisha@cis-india.org</a>.</p>
<p>To further encourage programmers, researchers, journalists, students, and users in general to use and contribute to the findings of the Ranking Digital Rights study, and critique the underlying methodology, we are also organising a “rankathon” on Sunday, January 08, at the CIS office in Delhi. More details can be found <a href="http://cis-india.org/internet-governance/events/rankathon-on-digital-rights-delhi-jan-08-2017">here</a>.</p>
<p>We look forward to your participation and contribution to the discussion. Please support us by sharing this invitation with your colleagues and networks.</p>
<h2>Agenda</h2>
<table class="plain">
<tbody>
<tr>
<td><strong>10:30-11:00</strong></td>
<td><strong>Coffee and Tea</strong></td>
</tr>
<tr>
<td><strong>11:00-11:15</strong></td>
<td><strong>Introduction</strong></td>
</tr>
<tr>
<td><strong>11:15-13:00</strong></td>
<td><strong>Presentation of the Findings and Discussion</strong> <em>Divij Joshi and Aditya Singh Chawla</em></td>
</tr>
<tr>
<td><strong>13:00-14:00</strong></td>
<td><strong>Lunch</strong></td>
</tr>
<tr>
<td><strong>14:00-15:00</strong></td>
<td><strong>Open Discussion #1: Parameters of Evaluation</strong><br />The RDR methodology was based upon evaluating commitments to uphold human rights through their services – in particular towards their commitment to users’ freedom of expression and privacy. Are there other parameters that may be considered in the Indian context?</td>
</tr>
<tr>
<td><strong>15:00-16:00</strong></td>
<td><strong>Open Discussion #2: Towards Protecting Digital Rights</strong><br />What steps can be taken by the government, civil society, and industry in India to create an environment that recognizes and protects users digital rights? What are the relevant legal, political, and economic factors to take into consideration towards this? What are steps that other, multinational ICT companies have taken? Would these be realistic for Indian companies to implement?</td>
</tr>
<tr>
<td><strong>16:00-16:30</strong></td>
<td><strong>Conclusion</strong></td>
</tr>
<tr>
<td><strong>16:30-17:00</strong></td>
<td><strong>Coffee and Tea</strong></td>
</tr>
</tbody>
</table>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/events/discussion-on-ranking-digital-rights-in-india-delhi-jan-07-2017'>https://cis-india.org/internet-governance/events/discussion-on-ranking-digital-rights-in-india-delhi-jan-07-2017</a>
</p>
No publisheramberPrivacyFreedom of Speech and ExpressionInternet GovernanceRanking Digital RightsDigital Rights2016-12-29T07:07:34ZEventAn Open Digital Global South: Risks and Rewards
https://cis-india.org/internet-governance/news/an-open-digital-global-south-risks-and-rewards
<b>Pranesh Prakash will be speaking at a conference to be organized by UC Davis Law School on May 25 and 26, 2017, in California, USA. </b>
<p>The event is open to the public. Please register <a href="https://www.eventbrite.com/e/an-open-digital-south-risks-and-rewards-registration-33599812945">here</a>.</p>
<p style="text-align: justify; ">This conference explores the promises and risks of openness in scholarship in relationship to the Global South. Scholars increasingly are under pressure to make their work “open” through sharing their research as reusable open data and open source software, and making their publications open access. Scholarly “openness”—for example, open data, open access, open source—is intended to facilitate the free flow of information, to address barriers to access, and to foster global intellectual conversations. Do attempts at promoting openness in scholarship create new forms of exclusion or hierarchy? How are Southern scholars and publishers’ experiences with open access and open data taken into account within conversations on developing standards and models for open access and open data in the Global North? What are the unanticipated risks created through the implementation of models for open data or open access?</p>
<p style="text-align: justify; ">For more info <a class="external-link" href="http://icis.ucdavis.edu/?tribe_events=openness-and-the-global-south-new-access-or-new-exclusions">click here</a></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/an-open-digital-global-south-risks-and-rewards'>https://cis-india.org/internet-governance/news/an-open-digital-global-south-risks-and-rewards</a>
</p>
No publisherpraskrishnaInternet GovernanceDigital Rights2017-04-12T14:25:39ZNews Item