The Centre for Internet and Society
https://cis-india.org
These are the search results for the query, showing results 2931 to 2945.
13 crore Aadhaar numbers on four government websites compromised: Report
https://cis-india.org/internet-governance/news/new-indian-express-may-2-2017-akram-mohammed-13-crore-aadhaar-numbers-on-four-government-websites-compromised
<b>The lack of information security practices in key government websites which hosts Personally Identifiable Information (PII) has left citizens of the country more vulnerable to identity theft and financial fraud, a research paper has argued. </b>
<p style="text-align: justify; ">The article by Akram Mohammed was <a href="http://www.newindianexpress.com/nation/2017/may/02/13-crore-aadhaar-numbers-on-four-government-websites-compromised-report-1599999.html">published by the New Indian Express</a> on May 2, 2017.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">A paper by Amber Sinha and Srinivas Kodali of Centre for Internet and Society analysed four government websites and found that more than 13 crore Aadhaar numbers with related PII were available on the websites, exposing lax security features.</p>
<p style="text-align: justify; ">The paper published under Creative Commons is titled ‘Information Security Practices of Aadhaar (or lack thereof): A documentation of public availability of Aadhaar Numbers with sensitive personal financial information’ and was released on Monday.</p>
<p style="text-align: justify; ">Sinha and Kodali looked at databases on four government portals -- National Social Assistance Programme, National Rural Employment Guarantee Scheme, Chandranna Bima Scheme, Govt. of Andhra Pradesh and Daily Online Payment Reports website of NREGA, Govt. of Andhra Pradesh.</p>
<p style="text-align: justify; ">“We chose major government programmes that use Aadhaar for payments and banking transactions. We found sensitive and personal data and information accessible on these portals,” the report said.</p>
<p style="text-align: justify; "><b>Leaked through portals</b></p>
<p style="text-align: justify; ">“Based on the numbers available on the websites, estimated number of Aadhaar numbers leaked through these 4 portals could be around 130-135 million and the number of bank account numbers leaked at around 100 million.</p>
<p style="text-align: justify; ">While these numbers are only from two major government programmes of pensions and rural employment schemes, other major schemes, that have also used Aadhaar for DBT, could have leaked PII similarly due to lack of information security practices,” it said.</p>
<p style="text-align: justify; ">They fear that data of over 23 crore beneficiaries under DBT of LPG subsidies could be leaked also. Identity theft and financial fraud “risks increase multifold in India...,” they said.</p>
<p style="text-align: justify; "><b>Aadhaar payments unsafe</b></p>
<p style="text-align: justify; ">In case a financial fraud takes place through Aadhaar enabled Payment System (AePS), the consumer may not be able to assert his claims for compensation due to the terms and conditions around liabilities.</p>
<p style="text-align: justify; ">“These terms force the consumer to take liabilities onto oneself than the payment provider..... Regulations and standards around Aadhaar are at a very early and nascent stage causing (an) increase in financial risk for both consumers and banks to venture into AePS,” they added. The authors also pulled up UIDAI for their inability in providing strong legislation against such leaks.</p>
<p style="text-align: justify; "><b>Leaky govt portals</b></p>
<p style="text-align: justify; ">National Social Assistance Programme</p>
<p style="text-align: justify; ">PII available - Access to Aadhaar no., name, bank account number, account frozen status 94,32,605 bank accounts linked with Aadhaar</p>
<p style="text-align: justify; ">14,98,919 post office accounts linked with Aadhaar numbers.</p>
<p style="text-align: justify; ">Though total Aadhaar number is 1,56,42,083, not all are linked to bank accounts</p>
<p style="text-align: justify; "><b>NREGA</b></p>
<p style="text-align: justify; ">PII Details available: Job card no., Aadhaar number, bank/postal account number, no. of days worked, registration no., account frozen status</p>
<p style="text-align: justify; ">78,74,315 post office accounts of individual workers seeded with Aadhaar numbers,</p>
<p style="text-align: justify; ">8,24,22,161 bank accounts of individual workers with Aadhaar numbers.</p>
<p style="text-align: justify; ">10,96,41,502 total number of Aadhaar numbers stored by portal</p>
<p style="text-align: justify; "><b>Other websites</b></p>
<p style="text-align: justify; ">Chandranna Bima Scheme, Govt. of Andhra Pradesh</p>
<p style="text-align: justify; ">Daily Online Payment Reports website of NREGA, Govt. of Andhra Pradesh</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/new-indian-express-may-2-2017-akram-mohammed-13-crore-aadhaar-numbers-on-four-government-websites-compromised'>https://cis-india.org/internet-governance/news/new-indian-express-may-2-2017-akram-mohammed-13-crore-aadhaar-numbers-on-four-government-websites-compromised</a>
</p>
No publisherpraskrishnaAadhaarInternet GovernancePrivacy2017-05-03T15:19:52ZNews Item11th Meeting of Information Systems Security Sectional Committee (LITD 17)
https://cis-india.org/internet-governance/news/11th-meeting-of-information-systems-security-sectional-committee-litd-17
<b>Udbhav Tiwari represented CIS at this meeting organized by the Bureau of Indian Standards (BIS) at Manak Bhavan, New Delhi on April 13, 2017.</b>
<p style="text-align: justify; ">The meeting was the national mirror meeting for the 28th ISO/IEC JTC 1/SC 27 Plenary and Working Group Meetings being held at Hamilton, New Zealand between the April 18 and 25, 2017. The meeting provided a fascinating insight into the government and industry viewpoints on key cyber security and privacy issues, especially on the Aadhaar.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/11th-meeting-of-information-systems-security-sectional-committee-litd-17'>https://cis-india.org/internet-governance/news/11th-meeting-of-information-systems-security-sectional-committee-litd-17</a>
</p>
No publisherpraskrishnaAadhaarInternet GovernancePrivacy2017-04-19T02:57:03ZNews Item11th India Knowledge Summit 2013
https://cis-india.org/news/eleventh-india-knowledge-summit-2013
<b>The Associated Chambers of Commerce and Industry in India (ASSOCHAM) is organizing the 11th Knowledge Summit 2013 in Hotel Shangri-La, New Delhi on October 14 and 15, 2013. The Centre for Internet and Society is supporting this event.</b>
<hr />
<p style="text-align: justify; ">Click to read the original <a class="external-link" href="http://www.assocham.org/events/showevent.php?id=888">published by ASSOCHAM here</a> , <a class="external-link" href="http://www.assocham.org/downloads/?filename=11th-India-Knowledege-Summit-Tentative-Agenda.docx">read the tentative agenda here</a> and the <a class="external-link" href="http://www.assocham.org/docs/11th-Konwledge-Summit-CyberSecurityBrochure_13.pdf">event brochure here</a>.</p>
<hr />
<p style="text-align: justify; ">The lack of a national-level doctrine has created an environment where we are entirely reactive in our cyber posture. Indeed, battlefield transcends physical borders and boundaries. The power of a nation-state is not required to inflict widespread damage to critical infrastructure systems; a single malicious actor can wreak havoc. The starkest difference, however, is that today both the private sector and individual citizens have unprecedented access to a myriad of infrastructure systems that can provide entry into sensitive systems – yet they are largely unaware of, and unaccountable for, their responsibilities in defending them.</p>
<p style="text-align: justify; ">As cyber networks rapidly transition from a mere utility to the undercurrent of our entire societal infrastructure, this reliance becomes a vulnerability. The modern Cyber Era demands a national-level doctrine that can be adopted by government agencies, armed forces, private sector organizations and individual citizens alike to establish a collective sense of purpose for our Cyber Security.</p>
<p style="text-align: justify; ">The Chamber is providing a forum to bring executive leaders, policymakers and academia together with the scientists and practitioners that intimately understand cyber technology to collaborate and begin a debate about the complex issues.<span> </span></p>
<p style="text-align: justify; ">The time has come when we should consider not only the military impact of the new cyber world, but also what role cyber defense will hold in shaping the future of our country’s economy, education, foreign affairs policies and critical infrastructure initiatives. Only then can our government, industry, and private citizens align under common goals to shape a safe and prosperous future.</p>
<p style="text-align: justify; ">ASSOCHAM India's Apex Chamber for Commerce & Industry was set up in 1920. Today the Chamber is proud to have more than 450,000 Companies as it's esteemed Member which includes many of the big global technology companies.</p>
<p style="text-align: justify; ">ASSOCHAM is privileged to be a Member of the <b>“Cyber Regulation Advisory Committee” </b>set up by <b>Ministry of Communications and IT, </b>and the <b>Joint Working Group (JWG) on Cyber Security </b>set up by the <b>National Security Council Secretariat, </b>Government of India.</p>
<p style="text-align: justify; ">The ASSOCHAM’s flagship program the Annual <b>INDIA KNOWLEDGE SUMMIT, </b>organized since 1999 has been Addressed in the past by Noble Laureates, as the Distinguished ‘Key Note Speaker’ including – Dr. Craig Venter, Sir Harry Kroto, Prof. Aaron Ciechanover, Dr. Raj Reddy, Dr. A P J Abdul Kalam, Dr. Kirsty Duncan, Prof. John A Pickett to name a few.</p>
<p style="text-align: justify; ">This year the <b>11th INDIA KNOWLEDGE SUMMIT </b>is being organized from <b>14-15 October, 2013 in Hotel </b><b>Shangri-La, New Delhi.</b></p>
<p style="text-align: justify; ">The Theme for this year’s Summit is <b>“Cyber Era - Securing the Future”</b>.</p>
<p align="left"><b>Registration Fees: </b></p>
<blockquote><b>International Delegates</b>: $ 200/- for both days<b><br />Indian Delegates</b>: Rs. 5,000/- per day<b><br />Students</b>: Rs. 2,000/- per day
<p>The Delegate Registration Fee include:<br /> Tea & Coffee<br /> Copy of Background Paper / <br /> Copy of Workshop Study Material</p>
</blockquote>
<p align="left"><b>For more details please contact: </b></p>
<blockquote>
<p>Ajay Sharma, Senior Director, M: 9899188488 , eMail: <a href="mailto:ajay.sharma@assocham.com">ajay.sharma@assocham.com</a><br /> Varun Aggarwal, Joint Director, M: 9910613815 , eMail: <a href="mailto:varun.aggarwal@assocham.com">varun.aggarwal@assocham.com</a><br /> Himanshu Rewaria, Executive, M: 9654251077 , eMail: <a href="mailto:himanshu.rewaria@assocham.com">himanshu.rewaria@assocham.com</a><br /> Sahil Goswami Executive, M: 9871962311 , eMail: <a href="mailto:sahil.goswami@assocham.com">sahil.goswami@assocham.com</a><br /><br /> <b>Corporate Office</b><br /> The Associated Chambers of Commerce and Industry of India<br /> ASSOCHAM Corporate Office, 5, Sardar Patel Marg<br />Chanakyapuri, New Delhi – 110021<br /> Phone: 46550555 (Hunting Line)<br /> Fax: 01123017008/9<br /> <br /> Email: <a class="newslink" href="mailto:assocham@nic.in">assocham@nic.in</a></p>
</blockquote>
<p>
For more details visit <a href='https://cis-india.org/news/eleventh-india-knowledge-summit-2013'>https://cis-india.org/news/eleventh-india-knowledge-summit-2013</a>
</p>
No publisherpraskrishnaCyber SecurityInternet Governance2013-09-26T07:15:29ZNews Item11th DSCI-NASSCOM Annual Information Security Summit 2016
https://cis-india.org/internet-governance/news/dsci-nasscom-annual-information-security-summit-2016
<b>Udbhav Tiwari participated as a panelist in the 11th DSCI-NASSSCOM Annual Information Security Summit 2016 in New Delhi on December 14, 2016. The event was organized by DSCI and NASSCOM. </b>
<p style="text-align: justify; ">The Panel was on "Designing Privacy in Data Centric Business Architectures - Designing Privacy in Product, Services & Operations". Udbhav's co-panelists were: Gowree Gokhle, Partner, Nishith Desai Associates - Moderator; Sachin Lodha, Principal Scientist, TCS Innovation Labs; and Ankur Jain, Director IT & CISO, PayU.</p>
<p style="text-align: justify; ">The discussion primarily focused on:</p>
<ol style="text-align: justify; ">
<li>Core Principles - Privacy should not solely be governed by laws, regulations and industry codes but should instead be guided by a core set of principles that companies choose to follow uniformly across their international presence. In fact, laws and regulations should form a basic, minimum standard of requirements and actual practice should attempt to follow these principles to ensure true compliance to the ideals of privacy. These core, minimal principles are: Notice, Transparency, Accountability, Security and Use Limitation.</li>
<li>Privacy as an Incentive - Privacy should be looked at not as a isolated right or legal compliance but an inclusive outlook which can be economically beneficial to both consumer and enterprise facing companies. Customers are increasingly starting to value privacy and providing it in an transparent manner (along with ensuring sufficient modern technical infrastructure) to ensure reliable protection can distinguish business in an increasingly crowded marketplace.</li>
<li>Sound Technological Bedrock - Privacy as a notion in data (and now big data) centric architectures can only be enforced with modern, secure and open technological processes that ensure policy compliance and provide a clear audit trail for any breaches. Measures such as Homomorphic encryption, Multi-party computation, K-anonymity and Identity Management systems must be explored, tested and implemented according to need and requirements of businesses to ensure adequate privacy protection.</li>
<li>Need for a clear Indian legal framework - India's current legal framework with regard to privacy ranges from scattered to non existent, so there is a strong need for their to be a strong, clear and uniform legal framework to govern privacy for both Indian citizens as well as interactions with data from other jurisdictions. This will ensure that organisations will have a clear standard to follow, will have an easier time implementing privacy policies avoid sectoral clashes and can be held accountable for any breaches of legal standards. A large part of the work required for this has been done by the Justice AP Shah Committee on Privacy as well.</li>
</ol>
<p>For more info <a class="external-link" href="http://www.dsci.in/AISS2016/">see this page</a></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/dsci-nasscom-annual-information-security-summit-2016'>https://cis-india.org/internet-governance/news/dsci-nasscom-annual-information-security-summit-2016</a>
</p>
No publisherpraskrishnaInternet Governance2016-12-17T01:14:15ZNews Item10th NLSIR Symposium - Regulating E-Commerce in India
https://cis-india.org/internet-governance/news/10th-nlsir-symposium-regulating-e-commerce-in-india
<b>Vidushi Marda participated in a panel at the "10th NLSIR Symposium on Regulating E-Commerce in India" at NSLIU on November 27, 2016 in Bengaluru. </b>
<p style="text-align: justify; ">The topic for my session was "Liability Regimes - Ensuring Compliance". I spoke about the various kinds of E-Commerce businesses to consider (from aggregators to platforms to the sharing economy) and focussed on issues surrounding intermediary liability and data protection. The panelists were:</p>
<ol>
<li>Pranav Mehra, Snapdeal</li>
<li>Vidushi Marda, Centre for Internet Society</li>
<li>Arun Prabhu, Partner, Cyril Amarchand Mangaldas</li>
<li>Arun Binoy Mattamana, Hewlett Packard Enterprise</li>
<li>Aditya Mudgal, Hindustan Unilever Ltd</li>
</ol>
<p style="text-align: justify; "><a class="external-link" href="http://cis-india.org/internet-governance/files/nlsr-symposium-on-regulating-e-commerce-in-india/view">Click to see more info</a></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/10th-nlsir-symposium-regulating-e-commerce-in-india'>https://cis-india.org/internet-governance/news/10th-nlsir-symposium-regulating-e-commerce-in-india</a>
</p>
No publisherpraskrishnaInternet Governance2016-12-06T15:48:25ZNews Item9th International Asian Conference
https://cis-india.org/news/itech-law-india-ninth-intl-asian-conference
<b>ITechLaw is organizing the 9th Annual Asian ITechLaw Conference on February 14 and 15, 2013 in India's high technology capital - Bangalore, India. Sunil Abraham will be speaking at this event.</b>
<hr />
<hr />
<p>This info was <a class="external-link" href="http://www.itechlaw-india.com/index.htm">published on ITechLaw website</a> on January 22, 2013.</p>
<hr />
<p><span class="spacing">This conference will focus on the latest regulatory, commercial and technology law issues being faced by emerging and growth industries in India and Asia as well as the U.S. and Europe.</span></p>
<h2><span class="spacing">Conference Program</span></h2>
<h3><span class="spacing">Day 1, Thursday, February 14, 2013</span></h3>
<table class="listing">
<tbody>
<tr>
<td>07:45 - 08:45</td>
<td>Breakfast <br /></td>
</tr>
<tr>
<td>09:00 - 09:10</td>
<td><span class="topic"><b>Plenary Welcome </b> </span><br /> <b>Presidential Welcome </b><br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>John Beardwood</b>, Fasken Martineau DuMoulin LLP, Toronto </a></td>
</tr>
<tr>
<td>09:10 - 09:30</td>
<td><span class="topic"><b>Keynote Address</b> (TBD)</span></td>
</tr>
<tr>
<td>09:30 - 11:15</td>
<td>
<p><span class="topic"><b>Intellectual Property</b></span></p>
<b>Moderator:</b> <a href="http://www.itechlaw-india.com/program.htm"><span class="moderator">Calab Gabriel, K&S Partners, New Delhi</span></a><br /><br />
<ul>
<li>TBD<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Pravin Anand</b>, Anand & Anand, New Delhi </a></li>
<li>ISP Liability for IP Infringements <br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Paulo Brancher</b>, BKBG Attorneys at Law, Sao Paulo, Brazil</a></li>
<li>John Doe IP Enforcement in India<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Sundari Pisupati</b>, Tempus Law & Associates, Hyderabad</a></li>
<li>Counterfeiting in the context of the Semiconductor Industry <br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Gaurav Jabulee</b>, Senior Counsel - Asia, Texas Instruments, Bangalore </a></li>
</ul>
</td>
</tr>
<tr>
<td>11:15 - 11:30</td>
<td><span class="black"><b>Coffee / Tea / Networking Break</b></span></td>
</tr>
<tr>
<td>11:30 - 13:00</td>
<td><span class="topic"><b>M & A in the Technology Sector <br /></b></span><b>Moderator:</b> <a href="http://www.itechlaw-india.com/program.htm"><span class="moderator"><b>Manjula Chawla</b>, Phoenix Legal, New Delhi</span></a><br />
<ul>
<li>Successor Liability <br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Sadhana Kaul</b>, GC, 3M, Bangalore</a></li>
<li>Tax Planning for Software and Intellectual Property Transactions<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Roger Royse</b>, Royse Law Firm, Palo Alto, California </a></li>
<li>Post-M & A Integration of a Tech Company<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Sivaram Nair</b>, General Counsel, Mphasis India, Bangalore </a></li>
</ul>
</td>
</tr>
<tr>
<td>13:00 - 14:00</td>
<td><span class="black"><b>Buffet Lunch and Networking </b></span></td>
</tr>
<tr>
<td>14:00 - 15:30</td>
<td><span class="topic"><b>Licensing and Contracting</b></span><br /> <b>Moderator:</b> <a href="http://www.itechlaw-india.com/program.htm"><span class="moderator">Azmul Haque, Shook Lin & Bok LLP, Singapore </span></a><br /><br />
<ul>
<li>Software Licensing<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Stephane Lemarchand</b>, DLA Piper, Paris, France</a></li>
<li>Contract Termination <br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Richard Marke</b>, BWB, London, UK</a></li>
<li>21st Century Sourcing - Latest Negotiation Trends and Alternative Contracting Models<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Nick Pantlin</b>, Herbert Smith Freehills LLP, London, UK<br /><br /></a></li>
</ul>
<p><span class="topic"><b>Internet Gaming and Gambling</b></span><b><br />Moderator:</b> <a href="http://www.itechlaw-india.com/program.htm"><span class="moderator">Ananth Padmanabhan, Advocate, Madras High Court</span></a></p>
<ul>
<li>Social Gaming <br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Jenna Karadbil</b>, Pillsbury Winthrop Shaw Pittman LLP, New York</a></li>
<li>Indian Issues in Gaming and Gambling Regulations<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Talha Salaria</b>, Lawyers at Work, Bangalore</a><br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Amrut Joshi</b>, Gamechanger Sports Ventures, Bangalore</a></li>
</ul>
</td>
</tr>
<tr>
<td>15:30 - 15:45</td>
<td><span class="black"><b>Coffee / Tea / Networking Break</b></span></td>
</tr>
<tr>
<td>15:45 - 17:30</td>
<td><span class="topic"><b>Privacy Issues relating to Employee Data</b></span><br /> <br /> <b>Moderator:</b> <a href="http://www.itechlaw-india.com/program.htm"><span class="moderator">Poorvi Chothani, LawQuest International, Mumbai</span></a><br /><br />
<ul>
<li>Legal Barriers for BYOD Strategies - A Holistic Approach to Legal Compliance and Security<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Martin Wiechers</b>, Deutsche Telekom, Germany</a></li>
<li>EU Employee Data Protection<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Roland Falder</b>, Bird & Bird, Munich, Germany</a></li>
<li>TBD<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Frederique David</b>, Co-founding partner, TLD Legal, Paris, France</a></li>
</ul>
<span class="topic"><b>Miscellaneous Hot Topics</b></span><br /> <br /> <b>Moderator:</b> <a href="http://www.itechlaw-india.com/program.htm"><span class="moderator">Vineet Subramani, Versus, Mumbai</span></a><br /><br />
<ul>
<li>Creating an Open Source Policy<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Heather Meeker</b>, Greenberg Traurig, Palo Alto, California</a></li>
<li>Journalism using Social Media - Issues relating to Freedom of Expression, Privacy and Interpretation of India's Information Technology Act.<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Swati Sukumar</b>, Advocate, New Delhi</a></li>
<li>Estate Planning for Digital Properties<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Wendy Goffe</b>, Stoel Rives, Seattle, WA, USA</a></li>
</ul>
<ul>
</ul>
</td>
</tr>
<tr>
<td>18:00 - 19:00</td>
<td><span class="topic"><b>I-WIN Tea</b></span></td>
</tr>
<tr>
<td>19:30 - 22:00</td>
<td><span class="black"><b>Gala Dinner (Ticketed Event)</b></span></td>
</tr>
</tbody>
</table>
<h3><span class="spacing">Day 2, Friday, February 15, 2013<br /></span></h3>
<table class="listing">
<tbody>
<tr>
<td>08:00 - 08:45 <span class="topic"><b> </b></span></td>
<td><span class="topic"></span><span class="topic"><b>Breakfast </b></span></td>
</tr>
<tr>
<td>09:00 - 09:30</td>
<td><span class="topic"><b>Keynote Address</b> (TBD)</span></td>
</tr>
<tr>
<td>09:30 - 11:15</td>
<td><span class="topic"><b>Privacy: Data Protection Issues Across the Globe</b></span><br /> <br /> <b>Moderator:</b> <a href="http://www.itechlaw-india.com/program.htm"><span class="moderator">Gabriela Kennedy, Hogan Lovells, Hong Kong</span></a><br /><br />
<ul>
<li>Cross Border Transfers of Employee Data<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Dr. Wolfgang Büchner</b>, Jones Day, Munich, Germany</a></li>
<li>Data Protection Reform in the EU<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Kristian Foss</b>, Gille advokater DA, Oslo, Norway</a></li>
<li>Addressing the Criminal Aspects of Data Protection Violations<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Claire Bernier</b>, Altanalaw, Paris, France</a></li>
</ul>
</td>
</tr>
<tr>
<td>11:15 - 11:30</td>
<td><span class="black"><b>Coffee / Tea / Networking Break</b></span></td>
</tr>
<tr>
<td>11:30 - 13:00</td>
<td><span class="topic"><b>E-Commerce </b></span><br /> <br /> <b>Moderator:</b> <a href="http://www.itechlaw-india.com/program.htm"><span class="moderator">Raji Nagarkar, Cisco, Bangalore</span></a><br /><br />
<ul>
<li>Privacy Aspects of E-Commerce in Australia<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Philip Catania</b>, Corrs Chambers Westgart, Melbourne, Australia</a></li>
<li>Retail Trading and E-Commerce in India<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Samuel Mani</b>, MCM, Bangalore</a></li>
<li>Commerce in the Social Media<br /> <span class="orange"><b>TBD</b></span></li>
</ul>
</td>
</tr>
<tr>
<td>13:00 - 14:00</td>
<td><span class="black"><b>Buffet Lunch and Networking </b></span></td>
</tr>
<tr>
<td>14:00 - 15:30</td>
<td>
<p><span class="topic"><b>Outsourcing</b></span><b><br />Moderator:</b> <a href="http://www.itechlaw-india.com/program.htm"><span class="moderator">Bradley Joslove, Franklin, Paris</span></a></p>
<ul>
<li>Current Issues - Customer Perspective <br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Mark Rasdale</b>, A&L Goodbody, Dublin, Ireland</a></li>
<li>Current Issues - Service Provider Perspective<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Kalpana Muthireddi</b>, CSC India, Bangalore</a></li>
<li>2nd Generation Outsourcing Transactions<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Ulrich Baeumer</b>, Osborne Clarke, Cologne, Germany</a></li>
</ul>
</td>
</tr>
<tr>
<td>15:30 - 15:45</td>
<td><span class="black"><b>Coffee / Tea / Networking Break</b></span></td>
</tr>
<tr>
<td>15:45 - 17:00</td>
<td><span class="topic"><b>Cloud 2.0 Issues</b></span><br /> <br /> <b>Moderator:</b> <a href="http://www.itechlaw-india.com/program.htm"><span class="moderator">Rajesh Narang, VP legal & CS, Mindtree, Bangalore</span></a><br /><br />
<ul>
<li>Virtual Offices and Cloud Computing - Legal Issues <br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Genevieve Gill</b>, GenLaw, Auckland, New Zealand</a></li>
<li>Regulating the Cloud<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>S.P. Purwar</b>, J. Sagar Associates, Gurgaon</a></li>
<li>Information Security in the Cloud<br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Nagakumar Somasundaram</b>, Amba Research, Bangalore</a></li>
</ul>
</td>
</tr>
<tr>
<td>17:00 - 18:00</td>
<td><span class="topic"><b>Censorship of Online Content</b></span><br /> <b>Moderator:</b> <a href="http://www.itechlaw-india.com/program.htm"><span class="moderator">Stephen Mathias, Kochhar & Co., Bangalore</span></a><br /><br /> Panel Discussion with the following Panelist <br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Marc S Friedman</b>, SNR Denton, New York, USA </a><br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Priti Suri</b>, PSA, New Delhi</a><br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>Sunil Abraham</b>, Executive Director, Centre for Internet and Society</a></td>
</tr>
<tr>
<td>18:00 - 18-30</td>
<td><span class="topic"><b>Closing Remarks</b></span><br /> <br />
<ul>
<li><b>Raffle</b></li>
<li> <b>Valedictory</b><br /> <a class="orange" href="http://www.itechlaw-india.com/program.htm"><b>John Beardwood</b>, Fasken Martineau DuMoulin LLP, Toronto</a></li>
</ul>
</td>
</tr>
<tr>
<td>18:30 - 20:00</td>
<td>Closing Reception</td>
</tr>
</tbody>
</table>
<div id="_mcePaste"></div>
<p>See the speakers <a class="external-link" href="http://www.itechlaw-india.com/speakers.htm">list here</a></p>
<p>
For more details visit <a href='https://cis-india.org/news/itech-law-india-ninth-intl-asian-conference'>https://cis-india.org/news/itech-law-india-ninth-intl-asian-conference</a>
</p>
No publisherpraskrishnaFreedom of Speech and ExpressionInternet GovernanceCensorship2013-01-25T18:20:22ZNews Item১৩ কোটি আধার তথ্য ফাঁস চার সরকারি পোর্টাল থেকে! বিস্ফোরক দাবি রিপোর্টে
https://cis-india.org/internet-governance/news/amar-bazar-patrika-may-2-2017-13-crore-aadhaar-leaked-due-to-poor-security-in-4-govt-websites
<b>খোদ সরকারি পোর্টাল থেকে কয়েক কোটি আধার নম্বর ও যাবতীয় তথ্য ‘ফাঁস’!</b>
<p style="text-align: justify; ">This was published by <a class="external-link" href="http://abpananda.abplive.in/india-news/13-crore-aadhaar-leaked-due-to-poor-security-in-4-govt-websites-334778">Amar Bazar Patrika</a> on May 2, 2017.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">অভিযোগ, গত কয়েক মাসে প্রায় ১৩ কোটি আধার নম্বরের যাবতীয় ব্যক্তিগত ও সংবেদনশীল তথ্য ফাঁস হওয়ার ঘটনা ঘটেছে। আর এসবই হয়েছে চারটি সরকারি পোর্টাল থেকে তথ্যপ্রযুক্তি সুরক্ষার ঘাটতির জেরে! যা ঘিরে এখন তোলপাড় দেশ।</p>
<p style="text-align: justify; ">সম্প্রতি, এমনই বিস্ফোরক রিপোর্ট প্রকাশ করেছে অলাভদায়ক সংগঠন সেন্টার ফর ইন্টারনেট অ্যান্ড সোসাইটি (সিআইএস)। তাদের আশঙ্কা, চারটি সরকারি পোর্টালের মাধ্যমে ১০ কোটি মানুষের ব্যাঙ্ক অ্যাকাউন্ট নম্বরও ফাঁস হয়ে থাকতে পারে।</p>
<p style="text-align: justify; ">সংস্থার দাবি, যে চারটি পোর্টাল থেকে এই সব তথ্য ফাঁসের অভিযোগ, তার মধ্যে দু’টি অন্ধ্রপ্রদেশ সরকারের ওয়েবসাইট। বাকি দুটি পোর্টাল হল ন্যাশনাল সোশ্যাল অ্যাসিস্ট্যান্স প্রোগ্রাম এবং ন্যাশনাল রুরাল এমপ্লয়মেন্ট গ্যারান্টি স্কিম-এর।</p>
<p style="text-align: justify; ">এই গোটা ঘটনার জন্য ইউনিক আইডেন্টিফিকেশন অথরিটি অফ ইন্ডিয়া বা ইউআইডিএআই–কেই দায়ী করেছে সিআইএস। তাদের দাবি, আধার নিয়ন্ত্রক সংস্থার ‘দায়িত্বজ্ঞানহীনতার’ জন্যই এই উদ্ভুত পরিস্থিত সৃষ্টি হয়েছে।</p>
<p style="text-align: justify; ">সিএনআই-এর আরও দাবি, বিভিন্ন সরকারি ও বেসরকারি পোর্টাল—যারা আধার তথ্য ব্যবহার করে থাকে, তাদের নিজস্ব সুরক্ষা-ব্যবস্থা খতিয়ে দেখেনি ইউআইডিএআই। ফলত, এই বিপত্তির সম্মুখীন কয়েক কোটি মানুষ।</p>
<p style="text-align: justify; ">যদিও, ইউআইডিএআই -এর দাবি, তাদের ডেটাবেস থেকে কোনও তথ্য ফাঁস হয়নি।</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/amar-bazar-patrika-may-2-2017-13-crore-aadhaar-leaked-due-to-poor-security-in-4-govt-websites'>https://cis-india.org/internet-governance/news/amar-bazar-patrika-may-2-2017-13-crore-aadhaar-leaked-due-to-poor-security-in-4-govt-websites</a>
</p>
No publisherpraskrishnaAadhaarInternet GovernancePrivacy2017-05-20T11:45:42ZNews Item ভারতে পাঁচশোরও বেশি স্টেশনে ফ্রি ওয়াই-ফাই চালু হবে
https://cis-india.org/internet-governance/news/9ad9be9b09a49c7-9aa9be98199a9b69b0993-9ac9c79b69bf-9b89cd99f9c79b69a89c7-9ab9cd9b09bf-9939af9bc9be987-9ab9be987-99a9be9b29c1-9b99ac9c7
<b>"তবে ভারতে সেন্টার ফর ইন্টারনেট অ্যান্ড সোসাইটির গবেষণা-প্রধান সুমন্দ্র চট্টোপাধ্যায় মনে করেন এই পদক্ষেপগুলো মসৃণভাবে রূপায়ণ করাটাই হবে প্রধান চ্যালেঞ্জ।</b>
<p style="text-align: justify; ">তাঁর কথায়, ‘সিলিকন ভ্যালির এই নৈশভোজটা দারুণ ব্যাপার সন্দেহ নেই। কিন্তু যেটা তত দারুণ নয় তা হল এই যে নতুন পার্টনারশিপ হতে চলেছে তার গভর্ন্যান্স কীভাবে হবে, কোন আইনি নথি মেনে হবে তা একেবারেই পরিষ্কার নয়।’ মি চট্টোপাধ্যায় বলছেন সম্প্রতি ভারতে এনক্রিপশন পলিসি নিয়ে যে বিতর্ক হল তাতে এটা পরিষ্কার হয়ে গেছে যে এ দেশে যাবতীয় যা কমিউনিকেশন হবে সরকার কোনও না কোনওভাবে তা তাদের নাগালে রাখতে ইচ্ছুক! ফলে এই সব কর্মসূচী বাস্তবায়নের পর্যায়ে আসতে গেলেই মব কোম্পানি জানতে চাইবে এনক্রিপশন বা ট্রান্সপারেন্সির প্রশ্নে ভারতের অবস্থান কী। তখন সরকার কী করে সেটাই দেখার!’ বলছেন সুমন্দ্র চট্টোপাধ্যায়।"</p>
<p style="text-align: justify; ">This was published in <a class="external-link" href="http://www.bbc.com/bengali/news/2015/09/150927_digital_india_plan">BBC</a> on September 28, 2015. Sumandro Chattapadhyay is quoted.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/9ad9be9b09a49c7-9aa9be98199a9b69b0993-9ac9c79b69bf-9b89cd99f9c79b69a89c7-9ab9cd9b09bf-9939af9bc9be987-9ab9be987-99a9be9b29c1-9b99ac9c7'>https://cis-india.org/internet-governance/news/9ad9be9b09a49c7-9aa9be98199a9b69b0993-9ac9c79b69bf-9b89cd99f9c79b69a89c7-9ab9cd9b09bf-9939af9bc9be987-9ab9be987-99a9be9b29c1-9b99ac9c7</a>
</p>
No publisherpraskrishnaInternet Governance2015-10-02T14:19:34ZNews Item7th India Digital Summit 2013
https://cis-india.org/news/7th-india-digital-summit-2013
<b>This summitt organised by Internet and Mobile Association of India is being held in New Delhi from January 16 to 17, 2013 at the Lalit Hotel</b>
<p>Sunil Abraham is the moderator for Plenary Session 3: Discussion on Social Media – Freedom, Moderation or Regulation.</p>
<p><a href="https://cis-india.org/internet-governance/blog/7th-india-digital-summit-2013" class="internal-link">Click to download the agenda</a></p>
<h3>Theme of the Summit</h3>
<p style="text-align: justify; ">951 million mobile users with 448 million mobile data subscribers; 137 million Internet users and rural Internet growing 7x in the last two years make India one of the top three digital markets in the world. One of only top two at this scale with free market economy democratic polity; and the only one where there is still headroom for growth. The time to invest in Digital India is now.</p>
<p style="text-align: justify; ">By 2020 riding on a government investment of 4 billion USD [roughly 10 billion USD on PPP terms] Internet users is expected to be 600 million; and mobile would possibly penetrate 100% of rural India creating the largest free economy digital market in the world.</p>
<p style="text-align: justify; ">The Digital Opportunity now and in the next 5 years in India is explosive. And the need to create a Digital Economy on scale is a developmental necessity. The opportunity, however, lies in addressing the current challenges of the ability to provide: low cost connectivity, universal access, usable content, secure networks, affordable devices and enabling policy.</p>
<p style="text-align: justify; ">Building on the theme of “Creating the World’s Largest Free Market Digital Economy” the 7th India Digital Summit will focus on five tracks: Infrastructure, Regulatory Frameworks, Services & Content, Entrepreneurship / Innovation and Business 3.0.</p>
<hr />
<h2 style="text-align: justify; ">Webcast of the Event</h2>
<h3>Day 1, January 16, 2013</h3>
<table class="listing">
<tbody>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">Inaugural</a></th>
</tr>
<tr>
<td>
<p><b><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">Welcome Address</a></b><br />Mr. Hitesh Oberoi, Chairman, IAMAI & Co-Founder and Chief Executive Officer, Info Edge India Limited<br /><b><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">Address by Chief Guest</a></b><br />Mr. Montek Singh Ahluwalia, Deputy Chairman, Planning Commission, Government of India<b><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">Keynote Address by</a></b><br />Mr. R Chandrashekhar, Chairman (TC) & Secretary , Department of Telecommunications, Ministry of Communications and IT</p>
</td>
</tr>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">Plenary Session 1: 1000 digital startups a year: How to make it happen?</a></th>
</tr>
<tr>
<td>
<p>Session Chair and presenter: <br />Mr. Satyan Gajwani, CEO, Times Internet</p>
<p>Presenter ‐</p>
<ul>
<li>Mr. Mahesh Murthy, Founder, Pinstorm and Co-founder, Seedfund</li>
<li>Mr. Manish Vij, Founder, VUN Network</li>
<li>Mr. Pranay Gupta, Joint CEO, Centre for Innovation</li>
<li>Mr. Rajesh Sawhney, Founder, GSF Accelerator & Superangels</li>
<li>Mr. Mukund Mohan, CEO in Residence, Microsoft Startup Accelerator</li>
</ul>
</td>
</tr>
<tr>
<th>
<p>Business track</p>
<p><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">Topic: Importance of Creativity to Digital Advertising</a></p>
</th>
</tr>
<tr>
<td>
<p>Session Chair and presenter Neville Taraporewalla, Sr. Director - Emerging Markets| India, Malaysia,Thailand & Korea, Advertising and Online, Microsoft</p>
<p><b>Discussion:</b></p>
<ul>
<li>M Mohit Hira, Senior Vice President & Regional Business Leader-Airtel, JWT</li>
</ul>
<ul>
<li>Vineet Gupta, Managing Partner, 22feet Communications</li>
</ul>
<ul>
<li>Arun Sharma, VP Marketing - Head Media & Rural, Bharti Airtel</li>
</ul>
<ul>
<li>Vikas Tandon, Managing Director, Indigo Consulting Aditya Save, Head-Media & Digital Marketing, Marico </li>
</ul>
<p><b>Audience Interaction </b></p>
</td>
</tr>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">“Lowering the barrier for mobile web - for both operators and users”</a></th>
</tr>
<tr>
<td>Keynote Address by Mr. Peter Panait Løjmand, Senior Vice President, Opera Software<br />Interaction with Mr. Sanjay Goyal, Chief Executive Officer, ACL Wireless <br /></td>
</tr>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">Plenary Session 2: Cloud – Leveraging the Cloud for Business Efficiency </a><br /></th>
</tr>
<tr>
<td>
<p>Session Chair and presenter<br />Mr. Manoj Chugh, Regional President, Global Accounts-APJ, EMC</p>
<p>Presenters:</p>
<ul>
<li>Mr. Manav Khanna, Sr. Consultant –Enterprise Security, SafeNet Inc.</li>
<li>Mr. Jasminder Singh Gulati, Co-founder and Chief Executive Officer, Nowfloats</li>
<li>Mr. Ravi Shankar, Chief Executive Officer, Nevales Networks</li>
<li>Mr. Mandar Kulkarni, Vice President, Solution Engg & Pvt. Cloud Practice, Netmagic</li>
<li>Mr. Balaka Baruah Aggarwal, Business Evangelist, Amazon Web Services</li>
<li>Mr. Jaydeep Nargund, Head Services-India, AKAMAI</li>
<li>Mr. Vivek Ravindran, Director-Core & App Platform, Microsoft</li>
</ul>
</td>
</tr>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">Email Marketing Roundtable with juvlon</a><br /></th>
</tr>
<tr>
<td>Email Marketing in the Year of the Snake - 2013<br />Presented by Mr. Naresh Bhagtani, CEO, Juvlon, Niche Software <br /></td>
</tr>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">“Unique Identity and Its Positive Externalities for Inclusiveness"<br /></a><br /></th>
</tr>
<tr>
<td>Keynote Address by Mr. Nandan Nilekani , Chairman, UAIDI<br />Interaction with Mr. Shubhashis Gangopadhyay, IDF research</td>
</tr>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">“Bharat Broadband [NOFN]: Going extra mile with public investment”</a></th>
</tr>
<tr>
<td>Keynote Address by Mr. Sam Pitroda<br />Interaction with Mr. Lalitesh Katragadda, Country Head-India Products, Google</td>
</tr>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">Plenary Session 3: Discussion on Social media – Freedom, moderation or regulation</a><br /></th>
</tr>
<tr>
<td>Session Chair & Moderator:<br />Sunil Abraham, Executive Director, The Centre for Internet and Society <br /></td>
</tr>
<tr>
<td>
<p><b>Discussion with:</b></p>
<ul>
<li>Rajesh Kalra, Chief Editor, Times Internet</li>
</ul>
<ul>
<li> R Sukumar, Managing Editor, Mint</li>
</ul>
<ul>
<li> Shivam Vij, Kafila.org </li>
</ul>
</td>
</tr>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">Track 3: The last mile of customer connect: m-Engagement from OPENHOUSE</a><br /></th>
</tr>
<tr>
<td>Presenter:<br />Mr. Ankit Singh, Senior Manager, Enterprise mobility, IMI Mobile<br />Mr. Ramesh Raman , Senior manager, Marketing, IMI Mobile</td>
</tr>
</tbody>
</table>
<h3>Day 2, January 17, 2013</h3>
<table class="listing">
<tbody>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">“Future of Apps and their Monetization”</a> <br /></th>
</tr>
<tr>
<td>Keynote Address by Mr. Ilja Laurs, Founder and Chairman, GetJar<br />Moderated by : Mr. Kiruba Shankar</td>
</tr>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">“Communications challenges in the age of Social media” </a><br /></th>
</tr>
<tr>
<td>Keynote address by <br />Dr Shashi Tharoor, Minister of State for Human Resource Development, Government of India<br />Interaction with audience Moderated by Mr. R Jagannanthan<br /></td>
</tr>
<tr>
<th>
<p>Track 4:</p>
<p><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">CXOs Closed door discussion on Local Language – The Game Changer</a></p>
</th>
</tr>
<tr>
<td>
<p>Session moderated by<br />Gyan Gupta, Chief Operating Officer, Dainik Bhaskar;<br /><br />Address by speakers<br />Mr. Arvind Pani, Co-founder, Reverie language Technologies<br />Mr. Ajay Gallwale, Founder, Maayboli<br />Mr. C Mathew, DGM (Marketing), Malayala Manorama Mr. Manoj Gupta, Head, VAS & Applications, Micromax</p>
<p><b>Audience Interaction<br />Summarising by Moderator </b></p>
</td>
</tr>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">Start-Up Unconference</a></th>
</tr>
<tr>
<td>A peer to peer, informal sharing of views between new entrepreneurs and start-ups of our industry <br /></td>
</tr>
<tr>
<td>
<p>Chaired by:<br />Mr. Sanjiv Bikhchandani, Founder and Executive Vice Chairman, Infoedge</p>
<p>Moderator by:<br />Kiruba Shankar</p>
</td>
</tr>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">Plenary Session 5: Discussion on e-Commerce 2.0– Emerging trend </a><br /></th>
</tr>
<tr>
<td>
<p>Session Chair & Moderator:<br />Mr. Avnish Bajaj, Managing Director, Matrix Partners</p>
<p>In Discussion with:</p>
<ul>
<li> Mr. Alok Mittal, Managing Director, Canaan Patners India</li>
</ul>
<ul>
<li> Mr. Sachin Bansal, Co-founder & CEO, Flipkart</li>
</ul>
<ul>
<li> Mr. Sundeep Malhotra, Chief Executive Officer, HomeShop18</li>
</ul>
<ul>
<li> Mr. Muralikrishnan B, Country Manager, eBay</li>
</ul>
<ul>
<li> Mr. Mukesh Bansal, Founder, Myntra.com</li>
</ul>
<ul>
<li> Mr. Ankur Warikoo, Chief Executive Officer, Groupon India</li>
</ul>
</td>
</tr>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">Plenary Session 6: Marketers Viewpoint – Online and Mobile Marketing </a><br /></th>
</tr>
<tr>
<td>
<p>Session Chair:<br />Mr. Upen Rai, Chief Operating Officer and Executive Director, AntFarm</p>
<p>Presenters:</p>
<ul>
<li>Mr. Sanjay Tripathy, EVP - Head Marketing, Products and Direct Channels - HDFC Life</li>
</ul>
<ul>
<li> Mr. Manish Kalra, Chief Marketing Officer, Makemytrip</li>
</ul>
<ul>
<li> Mr. Vinay Bhatia, Customer Care Associate and VP - Marketing and Loyalty, Shoppers Stop</li>
</ul>
<ul>
<li> Mr. Samil Malhotra, Vice President Sales and Marketing. The Lalit Suri Hospitality Group</li>
</ul>
<ul>
<li> Mr. Manu Kumar Jain, Co-founder & Managing Director, Jabong</li>
</ul>
</td>
</tr>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">Plenary Session 7: Interaction: Attracting and retaining talent for Digital Industry </a><br /></th>
</tr>
<tr>
<td>
<p><b>Thought sharing by Industry Leaders </b></p>
<p>Interaction between Industry leaders and Students<br />Industry Leaders:</p>
<ul>
<li>Mr. Sanjiv Bikhchandani, Founder and Executive Vice Chairman, Infoedge</li>
</ul>
<ul>
<li> Mr. Deep Kalra, Founder and Chief Executive Officer, Makemytrip</li>
</ul>
<ul>
<li> Mr. Anupam Mittal, Founder and Chief Executive Officer, People Group</li>
</ul>
<ul>
<li> Mr. Dinesh Agarwal, Founder and Chief Executive Officer, IndiaMART</li>
</ul>
<ul>
<li> Mr. Neville Taraporewalla, Sr. Director , Emerging Markets-India, Malaysia, Thailand & Korea, Advertising and Online, Microsoft</li>
</ul>
<p><b>Student Entrepreneurs:<br />FMS<br />IMT Ghaziabad<br />IITD Moderated by Kiruba Shankar</b></p>
</td>
</tr>
<tr>
<th><a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/">India Digital Award Ceremony</a><br /></th>
</tr>
</tbody>
</table>
<p>
For more details visit <a href='https://cis-india.org/news/7th-india-digital-summit-2013'>https://cis-india.org/news/7th-india-digital-summit-2013</a>
</p>
No publisherpraskrishnaInternet Governance2013-02-13T06:32:31ZNews Item7th Best Practices Meet 2015
https://cis-india.org/internet-governance/news/best-practices-meet-2015
<b>Data Security Council of India (DSCI) organized the 7th edition of its Best Practices Meet (BPM) from July 9 - 10, 2015 at Hotel ITC Gardenia in Bengaluru. BPM2015 had “Architecting Security for Digital Transformation” as its theme. Sunil Abraham and Elonnai Hickok were speakers at this event. </b>
<p style="text-align: justify; ">The two-day deliberations, reflected on policy, endeavours at national and industry levels, proposed industry steps, market response, best practices, industry standards and technology designs and see how they play their roles in architecting of information systems and enterprise security within organizations. Sunil Abraham was a panelist in the session "Architecting Security for transformation to Digital India". Elonnai Hickok was a panelist in the session "Steering privacy in the age of extreme innovation technology & business models."</p>
<p style="text-align: justify; "><a href="https://cis-india.org/internet-governance/blog/best-practices-meet-2015.pdf" class="external-link"><b>See the Agenda</b></a></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/best-practices-meet-2015'>https://cis-india.org/internet-governance/news/best-practices-meet-2015</a>
</p>
No publisherpraskrishnaInternet GovernancePrivacy2015-07-17T13:11:20ZNews Item6th Biannual Surveillance and Society Conference
https://cis-india.org/news/ssn-2014-sixth-biannual-surveillance-and-society-conference
<b>Malavika Jayaram is a speaker at the conference organized by Eticas Research and Consulting at the University of Barcelona and CCCB from April 24 to 26, 2014.</b>
<p style="text-align: justify; ">Malavika will present on the UID and biometrics at the session on “Surveillance: Ambiguities and Uncertainties". Malavika's talk title is "Biometrics in beta: experimenting on a nation (while normalising surveillance for 1.2 billion people)" and is being held on April 26. See the full event details <a class="external-link" href="http://www.ssn2014.net/?cat=80">on this page</a>.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">In the developing world, privacy is often portrayed as a luxury, as something alien to local culture and of interest only to the elite. This ignores the probability of the most marginalized sections of a society being disproportionately impacted by privacy intrusive technologies. The hype about ‘big data’, ‘open data’, ‘data for development’, ‘ICT4D’ and other buzzwords often ignores the fact that the global south is particularly vulnerable to data collection and processing. Literacy issues (lingual and technical), a massive digital divide, desperate socioeconomic conditions and the lack of a robust data protection law render ideas of consent or tradeoffs all but meaningless.</p>
<p style="text-align: justify; ">Techno-utopian welfare schemes present technology as progressive, neutral and frictionless – a seductive and compelling narrative in a region wracked by inequalities, corruption, lack of transparency and structural violence. This vision underpins the world’s largest biometric ID project, which has already registered the irises and fingerprints of 540 million people without even being completed. Yet the assumption that bodies can be rendered into infallible verifiers, as repositories of unchanging truth, ignores embedded biases and normative baselines within such technologies. Welfare projects are further complicated when they are architected as public-private partnerships: the collusion of governmental and corporate agendas in creating massive databases and profiles, in a manner that transforms the citizen-state relationship in profound ways, has sweeping implications for choice, autonomy, anonymity and ultimately, democracy. This is true even when the systems function as intended, without mechanical failure, data breaches, or other consequences of trading privacy for convenience, welfare and security.</p>
<p style="text-align: justify; ">I would like to discuss the risks of using technologies such as biometrics to solve socioeconomic problems, and their potential for excluding the very demographics that they seek to include. I intend to locate my presentation in the context of India’s growing surveillance state, which deliberately intends to use the unique identification number to link disparate databases. I propose to describe the new Centralised Monitoring System, the relative legal vacuum in which data is mined and harvested, and the shaky constitutional foundations on which many of these new regimes stand. In so doing, I will effectively have provided a tour of India’s Rogue’s Gallery of recent incursions into the zone of privacy, free speech, informational self-determination and dignity. I hope also to redress in some small measure the largely western focus of academic and policy debates in this field, despite the risks of developing countries seeking to commoditize and export identity schemes, normalize censorship or opportunistically benefit from the west no longer having the moral ground to resist third country surveillance practices.<br /> <br /></p>
<p>
For more details visit <a href='https://cis-india.org/news/ssn-2014-sixth-biannual-surveillance-and-society-conference'>https://cis-india.org/news/ssn-2014-sixth-biannual-surveillance-and-society-conference</a>
</p>
No publisherpraskrishnaInternet GovernancePrivacy2014-05-05T04:57:59ZNews Item4th National Standards Conclave Evolving a Comprehensive National Strategy for Standards Sectoral and Regional Inclusiveness
https://cis-india.org/internet-governance/news/4th-national-standards-conclave-evolving-a-comprehensive-national-strategy-for-standards-sectoral-and-regional-inclusiveness
<b>Udbhav Tiwari represented CIS in the 4th National Standards Conclave held on the May 1 and 2, 2017 at The Lalit, New Delhi. The event was organized by the Ministry of Commerce and Industry and the Confederation of Indian Industry.</b>
<p style="text-align: justify; ">The event looked at creating a National Standards Strategy to focus on India's standardisation efforts in the global stage. The event also focused on the release on the National Standards Portal, a website that creats a one stop access of standards, technical regulations and TBT information. There were a few sessions that were useful in particular - the IT Standardisation, the Standards Portal and the theme paper for National Standards Strategy.</p>
<p style="text-align: justify; "><a class="external-link" href="http://cis-india.org/internet-governance/files/fourth-national-standards-conclave.pdf">Download the Agenda</a></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/4th-national-standards-conclave-evolving-a-comprehensive-national-strategy-for-standards-sectoral-and-regional-inclusiveness'>https://cis-india.org/internet-governance/news/4th-national-standards-conclave-evolving-a-comprehensive-national-strategy-for-standards-sectoral-and-regional-inclusiveness</a>
</p>
No publisherpraskrishnaInternet Governance2017-05-20T08:06:15ZNews Item4 Popular Myths about UID
https://cis-india.org/internet-governance/popular-myths-about-uid
<b>By now, there is already a lot of material in the public domain that is critical about the UID/Aadhar project, writes Prashant Iyengar in this blog entry published in Privacy India on January 22, 2011.</b>
<p>(See <a class="external-link" href="http://aadhararticles.blogspot.com/">aadhararticles.blogspot.com</a> for an exhaustive catalogue). Much of this material has criticized the UID for the ‘big brotherly’ techno-surveillance regime that it threatens to unleash, usually under the guise of delivering assured benefits to the marginal peasant. Many commentators have questioned the haste with which a project of this scale and complexity has sought to be pushed through. Some have expressed doubts on the feasibility – financial, technical or logistical – of the scheme. Much of this material has criticized the UID for the ‘big brotherly’ techno-surveillance regime that it threatens to unleash, usually under the guise of delivering assured benefits to the marginal peasant. Many commentators have questioned the haste with which a project of this scale and complexity has sought to be pushed through. Some have expressed doubts on the feasibility – financial, technical or logistical – of the scheme.</p>
<p>I do not intend to rehearse these arguments in this post. Instead, I pick four somewhat obscure, but troublesome assertions made about the UID and test their veracity against documents available on the UIDIA site itself. The purpose is to cut through all the equivocation behind the claims that UID officials have been making, and arrive at some minimal clarity on what the UID is (and isn’t).</p>
<h3>Registration is voluntary!</h3>
<p>How does one make sense of Nandan Nilenkani’s cryptic remark, “I wouldn’t call it compulsory. I would rather say that it will become ubiquitous”?<br /><br />In a sense, this is true enough. Nowhere in the entire bulk of UID documentation will you encounter the express words “mandatory” or “compulsory”. Hence, proved! But that isn’t to say, however, that there is any way you will be able to avoid getting registered.<br /><br />Very rapidly, accessing basic services and your very status as a citizen will be conditional on your possessing an Aadhar number. This is owing to the complex operational structure that the UID Scheme adopts which leaves the task of enrollment entirely in the hands of third party ‘Registrars’ who include a host of Central and State social security and welfare departments (including the Ministry of Rural Development which administers the Rural employment guarantee scheme), banks and insurance companies. There is nothing in the Aadhar Scheme that forbids these Registrars from making access to their services conditional on one’s consent to UID registration. In practice, many of them have and will continue to make UID registration a preliminary formality before access is granted to their services. So your ‘freedom’ to resist UID registration will depend on your ability to forego your minimum guarantee of the right to employment, cooking gas, banking and insurance services, food rations etc.<br /><br />And if miraculously you are able to subsist without these services, there is still one minor detail that is seldom mentioned in conversations about UID: without a UID number, you will not be counted as a citizen of India. This is owing to the fact that the Registrar General of India, the authority responsible for compiling the National Population Register of India under the Citizenship Act, also happens to be a ‘Registrar’ for the purposes of the UID. Which means that one’s registration in the NPR will entail automatic enrollment in the UID. The Citizenship (Registration of Citizens and Issue of National Identity Cards) Rules, 2003 makes it mandatory for everyone to be enrolled in the National Population Register. So, paradoxically, although the Aadhar number does not confer citizenship, one cannot be a citizen anymore without owning an Aadhar number.</p>
<p>In other words, the UID scheme avoids the charge of being compulsory, by outsourcing its compulsion entirely.</p>
<h3>The UID Scheme will only collect a minimal set of information</h3>
<p>A frequently made assertion about the UID scheme is that the data collected will be limited to a standard set of information like one’s name, residence, date of birth, photo, all 10 finger prints and iris image. Once again, this is only a half truth. As mentioned previously, the entire process of enrollment is carried out through Registrars who have absolute freedom to expand the categories of information collected to include data that is entirely orthogonal to the purposes of the UID. This freedom is typically guaranteed by a clause in the MOUs which the UIDAI has signed with Registrars enabling them to collect additional data that “is required for their business or service”. Thus, for instance, in Himachal Pradesh, citizens are asked to provide additional details such as information about their ration cards, PAN cards, LPG connection and bank accounts[i]<br /><br />To employ a telling epithet found in one of the UID documents, the ‘Registrars own the process of enrollment’.</p>
<h3>Privacy is guaranteed</h3>
<p>Although the UIDAI makes repeated assertions regarding its intent to respect privacy and ensure data protection, the precise mechanism through which these objectives will be secured is extremely unclear.</p>
<ol><li> To begin with, the entire responsibility for devising schemes for safeguarding information during the collection phase rests entirely on the Registrars. The UIDAI’s own responsibility for privacy begins only from the moment the information is transmitted to it by the Registrars – by which time the information has already passed through many hands including the Enrolling Agency, and the Intermediary who passes on information from the Registrar to the UIDAI.</li><li>Rather than setting out an explicit redressal mechanism and a liability regime for privacy violations, the UID’s documents stop at loosely describing the responsibility of the Registrars as a ‘fiduciary duty’ towards the resident/citizen’s information. The Registrars are tasked with maintaining records of the data collected for a minimum period of six months. No maximum period is specified and Registrars are free to make what use of the data they see fit.</li><li>In addition, the Registrars are mandated to keep copies of all documents collected from the Resident either in physical or scanned copies “till the UIDAI finalizes its document storage agency.”[ii]</li><li>The ‘Data Protection and Security Guidelines’ which the UIDAI requires all Registrars to observe merely contains pious injunctions calling on them to observe care at all stages of data collection and to develop appropriate internal policies. There is mention of the desirability of external audits and periodic reporting mechanisms, but the details of these schemes are left to the individual Registrar to draw up.</li><li>Although the Draft National Identification Authority of India Bill penalizes the intentional disclosure or dissemination of identity information collected in the course of enrollment or authentication, this does not guard against accidental leaks and does not mandate the service providers to positively employ heightened security procedures. Prosecution of offences under the Act can only proceed with the sanction of the UID Authority, which further burdens the task of criminal enforcement in these cases and would make it difficult for individuals to obtain redress quickly. The total absence of a provision for civil remedies against Registrars makes it unlikely that they will take the task of protecting privacy seriously.</li><li>In other words, the individual’s right to privacy is only as strong as the weakest link in the elaborate chain of information collection, processing and storage.</li></ol>
<h3>The UIDAI will not disclose any information and will only authenticate information with Yes/No answers<br /></h3>
<p>This is another of the frequently misleading claims made by the UID Authority. Thus, for instance, in April, 2010, in response to a question in the course of an interview, Nandan Nilekani said “UID itself has very limited fields, it has only four or five fields — name, address, date of birth, sex and all that. But it also does not supply this data to anybody. .. the only authentication you can get from our system is a yes or no. So, you can’t query and say what’s this guys name or what’s his date of birth, you can’t get all that.”[iii]<br /><br />This statement is, however belied by many of the UIDAI’s own documents.</p>
<ol><li>The draft NIA Bill, for instance, permits the Authority to issue regulations on the sharing of “the information of aadhaar number holders, with their written consent, with such agencies engaged in delivery of public benefits and public services as the Authority may by order direct”. In practice, prior “written consent” for sharing is obtained from the resident as a matter of course at the time of enrollment itself, and it is impossible to obtain an Aadhar number without consenting to sharing by the UID Authority.[iv] In practice, in India, a large number of forms will be filled in by assistants and the written consent box will be ticked as a matter of course without the resident understanding the full implications of her “consent”.</li><li>The draft NIA Bill permits the authority to “make any disclosure of information (including identity information) made in the interests of national security in pursuance of a direction to that effect issued by an officer not below the rank of Joint Secretary or equivalent in the Central Government after obtaining approval of the Minister in charge”. There is nothing in the Act that requires that this information be made available on an individual basis – in other words, it is possible for the data to be shared en-masse with any agency “in the interests of national security”.</li><li>There is nothing preventing “Registrars” who carry out the actual data collection functions from sharing this information with anyone they choose. Thus, for instance, the Aadhar information collected during the exercise of compiling the National Population Register will can be shared in whichever manner the Registrar General of India chooses – irrespective of what the UIDAI does with that information.</li></ol>
<p>So, while ordinarily, the UIDAI would not authenticate information other than giving Yes/No responses, there are mechanisms already in place that presume that all this information will be made available, on demand, to whichever agency that happens to be interested.</p>
<p>[i] 2011. UID project picks up pace. Indian Express. Available at: <a class="external-link" href="http://www.indianexpress.com/story-print/735790">http://www.indianexpress.com/story-print/735790</a> [Accessed January 22, 2011].<br />[ii] UIDAI – Document Storage Guidelines for Registrars Ver. 1.2, August 2010.<br />[iii] 2010. To issue first set of UIDs by Feb 2011: Nilekani – CNBC-TV18 -. Money Control. Available at: <a class="external-link" href="http://www.moneycontrol.com/news/business/to-issue-first-setuids-by-feb-2011-nilekani_449820-4.html">http://www.moneycontrol.com/news/business/to-issue-first-setuids-by-feb-2011-nilekani_449820-4.html</a> [Accessed January 22, 2011].<br />[iv] For instance, a flowchart of the Resident Enrollment Process issued by the UID stipulates “Record Resident’s consent for Information Sharing” as the tenth step in the enrollment process. Unless this step is followed, the enrollment process cannot proceed!</p>
<p><a class="external-link" href="http://privacy-india.org/2011/01/22/4-popular-myths-about-the-uid/">Click</a> to read the original here</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/popular-myths-about-uid'>https://cis-india.org/internet-governance/popular-myths-about-uid</a>
</p>
No publisherPrashant IyengarInternet GovernancePrivacy2012-06-20T04:37:08ZBlog Entry2nd India Think Tank Forum
https://cis-india.org/internet-governance/news/2nd-india-think-tank-forum
<b>Udbhav Tiwari participated in a panel titled "The New Cold War: Information and Cyber Wars" at the Second India Think Tank Forum organized by ORF, the Think Tank Programme at UPenn and the McKinsey Institute between 19 to 21 June 2017 at Claridges in New Delhi. </b>
<h3>Agenda</h3>
<p>June 19, 2017<br />18.00 – 18.30 – Registration<br />18.30 – 18.40 – Welcome Remarks<br />18.45 – 20.00 – Big Politics: OBOR, India, and the Liberal International Order</p>
<p style="text-align: justify; ">This panel will explore the emerging trends in geo-politics and the implications thereof on the liberal international order. It will explore the rise of China, in particular the ambitious Belt & Road Initiative and in its strategic and economic impact on Asia. It will discuss the role of the U.S. and Europe in what is now referred to as the Asian century. Lastly, it will discuss India’s role as a liberal actor in a rapidly changing global order.</p>
<p style="text-align: justify; ">Chair: Sanjaya Baru, Distinguished Fellow, USI<br />Speakers:<br />Indrani Bagchi, Diplomatic Editor, Times of India<br />Lt. Gen. Aditya Singh, Senior Fellow, Delhi Policy Group<br />Nitin Pai, co-Founder, Takshashila Institute<br />Seshdari Vasan, Chennai Centre for China Studies, Chennai</p>
<p style="text-align: justify; ">20.00 – 20.30 – Three Years of the Modi Government: Looking Back, Looking Ahead</p>
<p style="text-align: justify; ">In Conversation: Smt. Smriti Irani, Union Cabinet Minister for Textiles, Govt. of India.</p>
<p style="text-align: justify; ">20.30 - Dinner</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/news/2nd-india-think-tank-forum'>https://cis-india.org/internet-governance/news/2nd-india-think-tank-forum</a>
</p>
No publisherpraskrishnaInternet Governance2017-07-07T01:16:00ZNews Item10 tactics for turning information into action
https://cis-india.org/events/10-tactics-for-turning-information-into-action
<b>Tactical Technology Collective (TTC) with The Centre for Internet and Society (CIS) and the Alternative Law Forum, is happy to announce the Bangalore launch of TTC's newest toolkit - '10 tactics for turning information into action'.</b>
<p> </p>
<p>‘10 tactics’ explores the use of technology and social media platforms such as Google Earth, Twitter and Facebook on human rights advocacy in the developing world. The film presents ten strategies for turning information into action and is aimed at global human rights advocates, as well as campaigners of all kinds.</p>
<p>The launch will be in the form of a screening organised by Tactical Technology Collective- India, CIS and ALF. After the screening, there will be an open discussion on the use of social media for advocacy.</p>
<p>This documentary is very important and timely viewing for all and most relevant to advocates working in the grassroots, campaigners, information actvists...</p>
<p>This event is open to all. Admission is free. Attendees will receive a copy of the toolkit in its offline form.</p>
<p>For more information about the film and the event log in to: http://www.informationactivism.org/, or call 080 4153 1129.</p>
<p> </p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/events/10-tactics-for-turning-information-into-action'>https://cis-india.org/events/10-tactics-for-turning-information-into-action</a>
</p>
No publisherradhaInternet Governance2011-04-05T04:19:46ZEvent