The Centre for Internet and Society
https://cis-india.org
These are the search results for the query, showing results 91 to 105.
Consultation to Frame Rules under the Whistle Blowers Protection Act, 2011
https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011
<b>The National Campaign for People's Right to Information (NCPRI) and Centre for Communication Governance at National Law University, Delhi (CCG at NLUD) invite you to a consultation to draft rules under the Whistle Blowers Protection Act, 2011. </b>
<p style="text-align: justify; ">The consultation will bring together various stakeholders to discuss the initial stages of framing the draft rules for the legislation. It will take place from 10:00 a.m. to 5:00 p.m. on July 5, 2014 at National Law University, Delhi. Bhairav Acharya will be participating in this event.</p>
<p style="text-align: justify; ">Click to download:</p>
<ul>
<li><a href="https://cis-india.org/internet-governance/blog/consultation-to-frame-rules-under-whistle-blowers-protection-act-2014.pdf" class="internal-link">Consultation to Frame Rules under the Whistle Blowers Protection Act, 2014</a></li>
<li><a href="https://cis-india.org/internet-governance/blog/whistle-blowers-protection-act-2014.pdf" class="internal-link">The Whistle Blowers Protection Act, 2014</a></li>
</ul>
<p>
For more details visit <a href='https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011'>https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011</a>
</p>
No publisherpraskrishnaCyber SecurityInternet GovernancePrivacy2014-07-02T08:03:55ZNews ItemCIS Cybersecurity Series (Part 14) – Menaka Guruswamy
https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy
<b>CIS interviews Menaka Guruswamy, lawyer at the Supreme Court of India, as part of the Cybersecurity Series.</b>
<div><em>"The courts have rarely used privacy to stop the Indian state from getting into someone's business. So jurisprudentially, it is a weak challenge when you mount a rights based or a privacy right challenge against surveillance by the state. Because the answer of the state to that has always been, and as has been Obama's answer in the United States, that there are national security concerns. And usually national security will trump individual privacy."</em></div>
<div> </div>
<div>Centre for Internet and Society presents its fourteenth installment of the CIS Cybersecurity Series. </div>
<div>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </div>
<div> </div>
<div>Menaka Guruswamy practices law at the Supreme Court of India. She was a Rhodes Scholar at Oxford University, and a Gammon Fellow at Harvard Law School, and a gold medalist from the National Law School of India. She has law degrees from all three schools, with a focus on Constitutional Law and Public International Law. Guruswamy has worked at the Office of the Attorney General of India, the highest office that represents the federal government of India in the Supreme Court of India.</div>
<div> </div>
http://youtu.be/GCDD6Z-UrGI
<div> </div>
<div> </div>
<iframe src="//www.youtube.com/embed/GCDD6Z-UrGI" frameborder="0" height="315" width="560"></iframe>
<div>
<div><strong><br /></strong></div>
<div><strong>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></div>
</div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy'>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy</a>
</p>
No publisherpurbaCyber SecurityInternet GovernanceCyber Security Interview2014-07-21T10:39:03ZBlog Entry India needs better cyber police
https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police
<b>On Wednesday, one of the largest online shopping and auction portals, eBay, revealed that earlier this year, cybercriminals accessed details of 145 million of its customers.</b>
<p style="text-align: justify; ">The article by Surabhi Agarwal was <a class="external-link" href="http://www.business-standard.com/article/international/india-needs-better-cyber-police-114052201689_1.html">published in the Business Standard</a> on May 23, 2014. Sunil Abraham is quoted.</p>
<hr />
<p style="text-align: justify; ">Even though eBay's customers' financial details are said to be safe, the incident is being termed a "historic breach" given the enormity of the data compromised. Globally, eBay is being criticised not just for its laxity in securing the digital perimeter but also for reacting too late. The company has said that it first came to know of the breach "two weeks" ago. Records that have been accessed contain passwords as well as email addresses, birth dates, mailing addresses and other personal information.</p>
<p style="text-align: justify; ">The situation is worse when it comes to reporting such instances in <a class="storyTags" href="http://www.business-standard.com/search?type=news&q=India" target="_blank">India</a>, say <a class="storyTags" href="http://www.business-standard.com/search?type=news&q=Cyber+Security" target="_blank">cyber security</a> experts. The Indian Information Technology Act requires companies to adopt "reasonable security measures" to protect consumers' sensitive personal information such as passwords and financial details. It also makes companies duty bound to report breaches and also defines liabilities in case a firm is found not to be adhering to best data security practices. However, implementation is patchy and most such instances go unreported.</p>
<p style="text-align: justify; ">Pavan Duggal, an advocate specialising in cyber security, says most users do not come to know if there has been a breach. "Awareness is also low among consumers about the legal recourse available in case their data has been compromised," he adds. Unlike in the West, lack of a proper data protection and privacy law in India is to be blamed for this. "Companies, too, are inclined not to report such instances as they fear being negatively impacted in the market," he points out.</p>
<p style="text-align: justify; ">In case of a breach, a user can contact the adjudicating officer, which is the state infotech secretary, for legal recourse. However, the onus is on the user to prove the breach. In the US, a consumer can get a subpoena (court order) issued against a company that makes it duty bound to provide details of the breach. "In India, the regime is too lax. It is very difficult to notify the government," says Sunil Abraham, executive director of the Centre for Internet and Society.</p>
<p style="text-align: justify; ">"There are stringent compliance requirements in countries such as the US. The laws in India need to come tougher if we want companies to become more serious about this," adds Duggal.</p>
<p style="text-align: justify; ">eBay has advised consumers, many of whom could be Indians, to immediately change their passwords. While people tend to use the same password across many sites, emails and phones numbers act as verifying tools for several financial transactions and could be misused. Moreover, unlike India, the US does not require additional authentication apart from credit card and CVV number, which makes transactions slightly more vulnerable. "It may be a good idea to include a one-time password as a security layer," says Abraham.</p>
<p style="text-align: justify; ">Over 200 million Indians are online. The Indian <a class="storyTags" href="http://www.business-standard.com/search?type=news&q=E-commerce" target="_blank">e-commerce</a> market is estimated at $2 billion (Rs 12,000 crore) and is expected to cross $20 billion over the next four years.</p>
<p style="text-align: justify; ">"There is no such thing as 100 per cent protection in the digital world. The choice is between transacting online or not," says Akhilesh Tuteja, executive director of consulting firm KPMG. "Technology is becoming so sophisticated that what was good yesterday is not good today." A bigger dialogue is needed on people treating theft of digital assets just as they would physical assets, he adds.</p>
<p style="text-align: justify; ">The last big breach was reported at software maker Adobe Systems in October 2013, when it was uncovered that hackers accessed about 152 million user accounts. Last December Target said some 40 million payment card numbers and another 70 million customer records were hacked into.</p>
<p>
For more details visit <a href='https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police'>https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police</a>
</p>
No publisherpraskrishnaCyber SecurityInternet Governance2014-06-04T07:56:33ZNews ItemCyber Dialogue Conference 2014
https://cis-india.org/news/cyber-dialogue-conference-2014
<b>The Cyber Dialogue conference, presented by the Canada Centre for Global Security Studies at the Munk School of Global Affairs, University of Toronto, will convene an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated public plenary conversations and working groups around cyberspace security and governance.</b>
<p style="text-align: justify; ">Malavika Jayaram is <a class="external-link" href="http://www.cyberdialogue.ca/2014-participants/">participating in this event</a> being held on March 30 and 31, 2014. Full event <a class="external-link" href="http://www.cyberdialogue.ca/">details here</a>.</p>
<hr style="text-align: justify; " />
<h2 style="text-align: justify; ">After Snowden, Whither Internet Freedom?</h2>
<p style="text-align: justify; ">A recent stream of documents leaked by former NSA contractor Edward Snowden has shed light on an otherwise highly secretive world of cyber surveillance. Among the revelations — which include details on mass domestic intercepts and covert efforts to shape and weaken global encryption standards — perhaps the most important for the future of global cyberspace are those concerning the way the U.S. government compelled the secret cooperation of American telecommunications, Internet, and social media companies with signals intelligence programs.</p>
<p style="text-align: justify; ">For American citizens, the NSA story has touched off soul-searching discussions about the legality of mass surveillance programs, whether they violate the Fourth and Fifth Amendments of the U.S. Constitution, and whether proper oversight and accountability exist to protect American citizens' rights. But for the rest of the world, they lay bare an enormous “homefield advantage” enjoyed by the United States — a function of the fact that AT&T, Verizon, Google, Facebook, Twitter, Yahoo!, and many other brand name giants are headquartered in the United States.</p>
<p style="text-align: justify; ">Prior to the Snowden revelations, global governance of cyberspace was already at a breaking point. The vast majority of Internet users — now and into the future — are coming from the world’s global South, from regions like Africa, Asia, Latin America, and the Middle East. Of the six billion mobile phones on the planet, four billion of them are already located in the developing world. Notably, many of the fastest rates of connectivity to cyberspace are among the world’s most fragile states and/or autocratic regimes, or in countries where religion plays a major role in public life. Meanwhile, countries like Russia, China, Saudi Arabia, Indonesia, India, and others have been pushing for greater sovereign controls in cyberspace. While a US-led alliance of countries, known as the Freedom Online Coalition, was able to resist these pressures at the Dubai ITU summit and other forums like it, the Snowden revelations will certainly call into question the sincerity of this coalition. Already some world leaders, such as Brazil’s President Rousseff, have argued for a reordering of governance of global cyberspace away from U.S. controls.</p>
<p style="text-align: justify; ">For the fourth annual Cyber Dialogue, we are inviting a selected group of participants to address the question, “After Snowden, Whither Internet Freedom?” What are the likely reactions to the Snowden revelations going to be among countries of the global South? How will the Freedom Online Coalition respond? What is the future of the “multi-stakeholder” model of Internet governance? Does the “Internet Freedom” agenda still carry any legitimacy? What do we know about “other NSA’s” out there? What are the likely implications for rights, security, and openness in cyberspace of post-Snowden nationalization efforts, like those of Brazil’s?</p>
<p style="text-align: justify; ">As in previous Cyber Dialogues, participants will be drawn from a cross-section of government (including law enforcement, defence, and intelligence), the private sector, and civil society. In order to canvass worldwide reaction to the Snowden revelations, this year’s Cyber Dialogue will include an emphasis on thought leaders from the global South, including Africa, Asia, Latin America, and the Middle East.</p>
<p>
For more details visit <a href='https://cis-india.org/news/cyber-dialogue-conference-2014'>https://cis-india.org/news/cyber-dialogue-conference-2014</a>
</p>
No publisherpraskrishnaFreedom of Speech and ExpressionCyber SecurityInternet GovernancePrivacy2014-04-08T05:09:54ZNews ItemElectoral Databases – Privacy and Security Concerns
https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns
<b>In this blogpost, Snehashish Ghosh analyzes privacy and security concerns which have surfaced with the digitization, centralization and standardization of the electoral database and argues that even though the law provides the scope for protection of electoral databases, the State has not taken any steps to ensure its safety.</b>
<p></p>
<p> </p>
<p style="text-align: justify; ">The recent move by the Election Commission of India (ECI) to tie-up with Google for providing electoral look-up services for citizens and electoral information services has faced heavy criticism on the grounds of data security and privacy.<a href="#_edn1" name="_ednref1"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[i]</span></span></a> After due consideration, the ECI has decided to drop the plan.<a href="#_edn2" name="_ednref2"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[ii]</span></span></a></p>
<p style="text-align: justify; ">The plan to partner with Google has led to much apprehension regarding Google gaining access to the database of 790 million voters including, personal information such as age, place of birth and residence. It could have also gained access to cell phone numbers and email addresses had the voter chosen to enroll via the online portal on the ECI website. Although, the plan has been cancelled, it does not necessarily mean that the largest database of citizens of India is safe from any kind of security breach or abuse. In fact, the personal information of each voter in a constituency can be accessed by anyone through the ECI website and the publication of electoral rolls is mandated by the law.</p>
<p style="text-align: justify; "><b>Publication of Electoral Rolls</b><br />The electoral roll essentially contains the name of the voter, name of the relationship (son of/wife of, etc.), age, sex, address and the photo identity card number. The main objective of creation and maintenance of electoral rolls and the issue of Electoral Photo Identity Card (EPIC) was to ensure a free and fair election where the voter would have been able to cast his own vote as per his own choice. In other words, the main purpose of the exercise was to curtail bogus voting. This is achieved by cross referencing the EPIC with the electoral roll.</p>
<p style="text-align: justify; ">The process of creation and maintenance of electoral rolls is governed by the Registration of Electors Rules, 1960. Rule 22 requires the registration officer to publish the roll with list of amendments at his office for inspection and public information. Furthermore, ECI may direct the registration officer to send two copies of the electoral roll to every political party for which a symbol has exclusively been reserved by the ECI. It can be safely concluded that the electoral roll of a constituency is a public document<a href="#_edn3" name="_ednref3"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[iii]</span></span></a> given that the roll is published and can be circulated on the direction of the ECI.</p>
<p style="text-align: justify; ">With the computational turn, in 1998 the ECI took the decision to digitize the electoral databases. Furthermore, printed electoral rolls and compact discs containing the rolls are available for sale to general public.<a href="#_edn4" name="_ednref4"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[iv]</span></span></a> In addition to that, the electoral rolls for the entire country are available on the ECI website.<a href="#_edn5" name="_ednref5"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[v]</span></span></a> However, the current database is not uniform and standardized, and entries in some constituencies are available only in the local language. The ECI has taken steps to make the database uniform, standardized and centralized.<a href="#_edn6" name="_ednref6"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[vi]</span></span></a></p>
<p style="text-align: justify; "><b>Security Concerns</b><br />The Registration of Electoral Rules, 1960 is an archaic piece of delegated legislation which is still in force and casts a statutory duty on the ECI to publish the electoral rolls. The publication of electoral rolls is not a threat to security when it is distributed in hard copies and the availability of electoral rolls is limited. The security risks emerge only after the digitization of electoral database, which allows for uniformity, standardization and centralization of the database which in turn makes it vulnerable and subject to abuse. The law has failed to evolve with the change in technology.</p>
<p style="text-align: justify; ">In a recent article, Bill Davidow analyzes "the dark side of Moore’s Law" and argues that with the growth processing power there has been a growth in surveillance capabilities and on this note the article is titled, “<i>With Great Computing Power Comes Great Surveillance”</i><a href="#_edn7" name="_ednref7"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[vii]</span></span></a> Drawing from Davidow’s argument, with the exponential growth in computing power, search has become convenient, faster and cheap. A uniform, standardized and centralized database bearing the personal information of 790 million voters can be searched and categorized in accordance with the search terms. The personal information of the voters can be used for good, but it can be equally abused if it falls into the wrong hands. Big data analysis or the computing power makes it easier to target voters, as bits and pieces of personal information give a bigger picture of an individual, a community, etc. This can be considered intrusive on individual’s privacy since the personal information of every voter is made available in the public domain</p>
<p style="text-align: justify; ">For example, the availability of a centralized, searchable database of voters along with their age would allow the appropriate authorities to identify wards or constituencies, which has a high population of voters above the age of 65. This would help the authority to set up polling booths at closer location with special amenities. However, the same database can be used to search for density of members of a particular community in a ward or constituency based on the name, age, sex of the voters. This information can be used to disrupt elections, target vulnerable communities during an election and rig elections.</p>
<p style="text-align: justify; "><b>Current IT Laws does not mandate the protection of the electoral database</b><br />A centralized electoral database of the entire country can be considered as a critical information infrastructure (CII) given the impact it may have on the election which is the cornerstone of any democracy. Under Section 70 of the Information Technology Act, 2000 (IT Act) CII means “the computer resource, incapacitation or destruction of which, shall have debilitating impact on national security, economy.”<a href="#_edn8" name="_ednref8"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[viii]</span></span></a> However, the appropriate Government has not notified the electoral database as a protected system<a href="#_edn9" name="_ednref9"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[ix]</span></span></a>. Therefore, information security practices and procedures for a protected system are not applicable to the electoral database.</p>
<p style="text-align: justify; ">The Information Technology Rules (IT Rules) are also not applicable to electoral databases, <i>per se</i>. Since, ECI is not a body corporate, the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information), Rules, 2011 (<i>hereinafter </i>Reasonable Security Practices Rules) do not apply to electoral databases. Ignoring that Reasonable Security Practices Rules only apply to a body corporate, the electoral database does fall within the ambit of definition of “personal information”<a href="#_edn10" name="_ednref10"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[x]</span></span></a> and should arguably be made subject to the Rules.</p>
<p style="text-align: justify; ">The intent of the ECI for hosting the entire country’s electoral database online <i>inter alia</i> is to provide electronic service delivery to the citizens. It seeks to provide “electoral look up services for citizens ... for better electoral information services.”<a href="#_edn11" name="_ednref11"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[xi]</span></span></a> However, the Information Technology (Electronic Service Delivery) Rules, 2011 are not applicable to the electoral database given that it is not notified by the appropriate Government as a service to be delivered electronically. Hence, the encryption and security standards for electronic service delivery are not applicable to electoral rolls.</p>
<p style="text-align: justify; ">The IT Act and the IT Rules provide a reasonable scope for the appropriate Government to include electoral databases within the ambit of protected system and electronic service delivery. However, the appropriate government has not taken any steps to notify electoral database as protected system or a mode of electronic service delivery under the existing laws.</p>
<p style="text-align: justify; "><b>Conclusion</b><br />Publication of electoral rolls is a necessary part of an election process. It ensures free and fair election and promotes transparency and accountability. But unfettered access to electronic electoral databases may have an adverse effect and would endanger the very goal it seeks to achieve because the electronic database may pose threat to privacy of the voters and also lead to security breach. It may be argued that the ECI is mandated by the law to publish the electoral database and hence, it is beyond the operation of the IT Act. But Section 81 of the IT Act has an overriding effect on any law inconsistent, therewith. The appropriate Government should take necessary steps under the IT Act and notify electoral databases as a protected system.</p>
<p style="text-align: justify; ">It is recommended that the Electors Registration Rules, 1960 should be amended, taking into account the advancement in technology. Therefore, the Rules should aim at restricting the unfettered electronic access to the electoral database and also introduce purposive limitation on the use of the electoral database. It should also be noted that more adequate and robust data protection and privacy laws should be put in place, which would regulate the collection, use, storage and processing of databases which are critical to national security.</p>
<div>
<hr align="left" size="1" width="100%" />
<div id="edn1">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref1" name="_edn1"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[i]</span></span></a> Pratap Vikram Singh, Post-uproar, EC’s Google tie-up plan may go for a toss, Governance Now, January 7, 2014 available at <a class="external-link" href="http://www.governancenow.com/news/regular-story/post-uproar-ecs-google-tie-plan-may-go-toss">http://www.governancenow.com/news/regular-story/post-uproar-ecs-google-tie-plan-may-go-toss</a></p>
</div>
<div id="edn2">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref2" name="_edn2"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[ii]</span></span></a> Press Note No.ECI/PN/1/2014, Election Commission of India , January 9, 2014 available at <a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf">http://eci.nic.in/eci_main1/current/PN09012014.pdf</a></p>
</div>
<div id="edn3">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref3" name="_edn3"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[iii]</span></span></a> Section 74, Indian Evidence Act, 1872</p>
</div>
<div id="edn4">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref4" name="_edn4"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[iv]</span></span></a> <a class="external-link" href="http://eci.nic.in/eci_main1/the_function.aspx">eci.nic.in/eci_main1/the_function.aspx</a></p>
</div>
<div id="edn5">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref5" name="_edn5"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[v]</span></span></a> <a class="external-link" href="http://eci.nic.in/eci_main1/Linkto_erollpdf.aspx">http://eci.nic.in/eci_main1/Linkto_erollpdf.aspx</a></p>
</div>
<div id="edn6">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref6" name="_edn6"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[vi]</span></span></a> “At present, in most States and UTs the Electoral Database is kept at the district level. In some cases it is kept even with the vendors. In most States/UTs it is maintained in MS Access, while in some cases it is on a primitive technology like FoxPro and in some other cases on advanced RDBMS like Oracle or Sql Server. The database is not kept in bilingual form in some of the States/UTs, despite instructions of the Commission. In most cases Unicode fonts are not used. The database structure not being uniform in the country, makes it almost impossible for the different databases to talk to each other” – Election Commission of India, Revision of Electoral Rolls with reference to 01-01-2010 as the qualifying date – Integration and Standardization of the database- reg., No. 23/2009-ERS, January 6, 2010 available at e<a class="external-link" href="http://eci.nic.in/eci_main/eroll&epic/ins06012010.pdf">ci.nic.in/eci_main/eroll&epic/ins06012010.pdf</a><span dir="RTL"></span></p>
</div>
<div id="edn7">
<p class="MsoEndnoteText"><a href="#_ednref7" name="_edn7"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[vii]</span></span></a><a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf"><span><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"> </span></span></span>http://www.theatlantic.com/technology/archive/2014/01/with-great-computing-power-comes-great-surveillance/282933/</a></p>
</div>
<div id="edn8">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref8" name="_edn8"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[viii]</span></span></a> Section 70, Information Technology Act, 2000</p>
</div>
<div id="edn9">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref9" name="_edn9"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[ix]</span></span></a> Computer resource which directly or indirectly affects the facility of Critical Information Infrastructure</p>
</div>
<div id="edn10">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref10" name="_edn10"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[x]</span></span></a> Rule 2(1)(i), Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011</p>
</div>
<div id="edn11">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref11" name="_edn11"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[xi]</span></span></a> Press Note No.ECI/PN/1/2014, Election Commission of India , January 9, 2014 available at <a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf">http://eci.nic.in/eci_main1/current/PN09012014.pdf</a></p>
</div>
</div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns'>https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns</a>
</p>
No publishersnehashishDigital GovernancePrivacyCybersecurityData ProtectionInternet GovernanceSafetyInformation TechnologyCyber SecuritySecuritye-GovernanceTransparency, PoliticsE-Governance2014-01-16T11:07:21ZBlog EntryDigital Citizens: Why Cyber Security and Online Privacy are Vital to the Success of Democracy and Freedom of Expression
https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression
<b>Michael Oghia will give a presentation which will show why cyber security and online privacy are vital for democracy and freedom of expression.</b>
<p style="text-align: justify; ">In the time when Edward Snowden is fighting for both clemency and to be known as a brave whistle blower that exposed government wrongdoing, cyber security and online privacy have never been more important. As <a class="external-link" href="https://www.youtube.com/watch?feature=player_embedded&v=H0I7wi3ZLG8&noredirect=1">Jacob Applebaum discussed in May last year</a>, and CIS’ Maria Xynou <a href="https://cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou" class="external-link">presented recently in December</a>, surveillance throughout the world is increasing. With security apparatus’ likethe NSA and now India’s Central Monitoring System, coupled with corporate data centers around the world storing our e–mails, address books, preferences, and passwords, it is easy to see how our online privacy is increasingly being threatened and often, violated.</p>
<p style="text-align: justify; ">Indeed, online privacy is inextricably linked to freedom of expression, and freedom of expression is a fundamental civil liberty imperative to democracy. Moreover, online security and privacy are essential to good, transparent, and accountable democratic governance. This is largely because surveillance, censorship, and monitoring ultimately create environments where self-censorship is the norm, as is the fear of the government instead of spaces that allow for freedom of expression and democratic dialogue and dissent.</p>
<p style="text-align: justify; ">What I would like to accomplish my speaking at CIS is not to merely educate about the dangers posed to Internet security or to world democracy, but rather to:</p>
<ol>
<li style="text-align: justify; ">Reiterate the importance of digital privacy and cyber security to the success of democracy and the continued protection of free expression.</li>
<li style="text-align: justify; ">Encourage citizens, technology specialists, Internet and privacy advocates, and others to see themselves as part of a larger system of democratic governance and civic participation. This means understanding how technical capabilities intersect with civil society, and then use them to advocate for a more open, accessible, and private cyberspace.</li>
<li style="text-align: justify; ">Reinforce that digital media literacy education is vital to ensuring a free, open, accessible, and democratic Internet.</li>
</ol>
<p style="text-align: justify; ">Additionally, I want to present ideas and recommendations for what you can do to engage with these problems, and how we can collaborate together to address them.</p>
<h3 style="text-align: justify; ">About the Public Intelligence Project</h3>
<p style="text-align: justify; ">The Public Intelligence Project is an independent, non-partisan, not-for-profit think tank conducting research, education, and advocacy on the importance of diversity, critical thinking, dialogue, and freedom of expression. We seek to promote more robust systems of participatory democracy, civic engagement, and conflict prevention in order to create a culture of democracy.</p>
<h3 style="text-align: justify; ">Michael Oghia</h3>
<p style="text-align: justify; ">Michael is responsible for a new project at Meta-Culture called the Public Intelligence Project, which focuses on expanding participatory democracy, civic engagement, and conflict prevention by conducting research, education, and advocacy on the intersections between diversity, dialogue, critical thinking, and freedom of expression. While new to the conflict resolution field, as a poet, musician, editor, writer, blogger, and activist, he is well-versed in the importance of freedom of expression and participating in the democratic process. He was born in Kentucky to Lebanese-Syrian parents, and after graduating with a BS in sociology from the University of Louisville, he moved to Lebanon to pursue an MA in sociology from the American University of Beirut. There, he had the opportunity to witness the Arab Revolutions first-hand while research about topics such as Internet ownership in the Middle East, social movements, Arab media, globalization, Arab youth and family, and his thesis subject, romantic love in the Arab world. Michael enjoys engaging Twitter conversations, and has an unnatural affinity for crunchy peanut butter.</p>
<hr />
<p>Date: Tuesday, January 14, 2014<br />Time: 6.30 p.m. to 8.00 p.m.<br />Talk by: Michael Oghia<br />Title: Research & Advocacy Consultant, and Project Manager<br />Organisation: Meta-Culture / Public Intelligence Project<br />Websites: <a class="moz-txt-link-abbreviated" href="http://www.meta-culture.in">www.meta-culture.in</a> <a class="moz-txt-link-rfc2396E" href="http://www.meta-culture.in"><http://www.meta-culture.in></a> & <a class="moz-txt-link-abbreviated" href="http://www.publicintelligenceproject.org">www.publicintelligenceproject.org</a> <a class="moz-txt-link-rfc2396E" href="http://www.publicintelligenceproject.org"><http://www.publicintelligenceproject.org></a></p>
<p>
For more details visit <a href='https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression'>https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression</a>
</p>
No publisherpraskrishnaSocial MediaPrivacyInternet GovernanceCyber SecurityEvent2014-01-08T04:59:10ZEventCIS Cybersecurity Series (Part 13) - Pranesh Prakash
https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash
<b>CIS interviews Pranesh Prakash, lawyer and policy director with Centre for Internet and Society, as part of the Cybersecurity Series.</b>
<div>
<div><i>"When it comes to things cyber we completely lose our sense of proportion. While killing someone by negligence only attracts two years of punishment, saying something that people can define "offensive" attracts even more under 66A of the Information Technology Act. Something that can be a nuisance, under the Criminal Laws, can attract up to six months punishment, whereas under the IT act, it is up to three years..." - Pranesh Prakash, lawyer and policy director, Centre for Internet and Society</i></div>
<div></div>
<div>Centre for Internet and Society presents its thirteenth installment of the CIS Cybersecurity Series.</div>
<div></div>
<div>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</div>
<div></div>
<div>Pranesh is a Policy Director with the Centre, and is a graduate of the National Law School of India University, Bangalore, with a degree in Arts and Law.</div>
<div></div>
</div>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/gUDeTeQ6DAg" width="560"></iframe></p>
<div><b><i><br /></i></b></div>
<div><b><i>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</i></b></div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash'>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash</a>
</p>
No publisherpurbaCyberspaceCybersecurityInternet GovernanceCyber Security FilmCyberculturesCyber SecurityCyber Security Interview2014-01-20T06:20:44ZBlog EntryDesiSec: Episode 1 - Film Release and Screening
https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening
<b>The Centre for Internet and Society is pleased to to announce the release of the first documentary film on cybersecurity in India - DesiSec.
We hope you can join us for a special screening of the first episode of DesiSec, on 11th December, at CIS!</b>
<div>Early 2013, the Centre for Internet and Society began shooting its first documentary film project. After months of researching and interviewing activists and experts, CIS is thrilled to announce the release of the first documentary film on cybersecurity in India - <strong>DesiSec: Cybersecurity and Civi Society in India</strong>.</div>
<div> </div>
<div>Trailer link: <a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer">http://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer</a></div>
<div> </div>
<div>CIS is hosting a special screening of <strong>DesiSec: Episode 1</strong> on <strong>11th December, 2013, 6 pm</strong> and invites you to this event. The first episode is centered around the issue of privacy and surveillance in cyber space and how it affects Indian society.</div>
<div> </div>
<div>We look forward to seeing you there!</div>
<div> </div>
<div>RSVP: <a href="mailto:purba@cis-india.org" target="_blank">purba@cis-india.org</a></div>
<div>Venue: http://osm.org/go/yy4fIjrQL?m=</div>
<div> </div>
<div><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening'>https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening</a>
</p>
No publisherpurbaCyberspacePrivacyCybersecurityInternet GovernanceSurveillanceCyber Security FilmCyber SecurityEvent2013-12-17T08:13:32ZEventFirst Look: CIS Cybersecurity documentary film
https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer
<b>CIS presents the trailer of its documentary film DesiSec: Cybersecurity & Civil Society in India</b>
<p>The Centre for Internet and Society is pleased to release the trailer of its first documentary film, on cybersecurity and civil society in India. </p>
<p>The documentary is part of the CIS Cybersecurity Series, a work in progress which may be found <a class="external-link" href="http://cismetamedia.tumblr.com">here</a>.</p>
<iframe src="//www.youtube.com/embed/3134xVvMmfc" frameborder="0" height="315" width="560"></iframe>
<p><strong>DesiSec: Cybersecurity and Civil Society in India</strong></p>
<p>The trailer of <em>DesiSec: Cybersecurity and Civil Society in India</em> was shown at the Internet Governance Forum in Bali on October 24. It was a featured presentation at the Citizen Lab workshop, <em>Internet Governance For The Next Billion Users.</em></p>
<p>The transcript of the workshop is available here: <a href="http://www.intgovforum.org/cms/component/content/article/121-preparatory-process/1476-ws-344-internet-governance-for-the-next-billion-users">http://www.intgovforum.org/cms/component/content/article/121-preparatory-process/1476-ws-344-internet-governance-for-the-next-billion-users</a> </p>
<p><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer'>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer</a>
</p>
No publisherpurbaCybersecurityInternet Governance ForumInternet GovernanceCyber Security FilmCyberculturesCyber Security2013-12-17T08:16:42ZBlog EntryCIS Cybersecurity Series (Part 12) - Namita Malhotra
https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra
<b>CIS interviews Namita Malhotra, researcher and lawyer at Alternative Law Forum, Bangalore, as part of the Cybersecurity Series.</b>
<p><em>"In a strange mix of how both capitalism and state control work, what is happening is that more and more of these places that one could access, for various reasons, whether it is for ones own pleasure or for political conversations, are getting further and further away from us. And I think that that mix of both corporate interests and state control is particularly playing a role in this regard." - Namita Malhotra, researcher and lawyer, Alternative Law Forum</em></p>
<p>Centre for Internet and Society presents its twelfth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>Namita Malhotra is a researcher and lawyer at Alternative Law Forum (ALF). She has a keen interest in working on law, technology and media through legal research, cultural studies, new media practices and film making.</p>
<p>ALF homepage: www.altlawforum.org</p>
<iframe src="//www.youtube.com/embed/R9bSvrs5w74" frameborder="0" height="315" width="560"></iframe>
<p><strong><em><br /></em></strong></p>
<p><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra'>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra</a>
</p>
No publisherpurbaCybersecurityInternet GovernanceCyberculturesCyber SecurityCyber Security Interview2013-11-18T10:03:29ZBlog EntryThe Evolving Cyber Threat and How to Address It
https://cis-india.org/internet-governance/events/evolving-cyber-threat-and-how-to-address-it
<b>Larry Clinton, the President and Chief Executive Officer of the Internet Security Alliance will give a talk on cyber threat and how to address the same. The talk will be held at the office of the Centre for Internet and Society in Bangalore on November 22, 2.30 p.m. to 3.30 p.m.</b>
<p style="text-align: justify; ">The talk will broadly cover the following:</p>
<ul style="text-align: justify; ">
<li style="text-align: justify; ">Using Public-Private Partnerships to Enhance Cyber Security</li>
<li style="text-align: justify; ">Ongoing Threat of Cyber-attacks Must be Fought on Both a Technical and Economic Basis</li>
<li style="text-align: justify; ">Targeted Education's Critical Role in Cyber security</li>
<li style="text-align: justify; ">Combating the Persistent Cyber Security Threat in the Manufacturing Industry / Cyber Security Threats to the Supply Chain</li>
<li style="text-align: justify; ">Economics of Cyber Security</li>
</ul>
<h2 style="text-align: justify; ">Larry Clinton</h2>
<p style="text-align: justify; "><b>Larry Clinton</b> is the<b> President and Chief Executive Officer of the Internet Security Alliance (ISA)</b>. ISA is a multi-sector trade association with membership from virtually every one of the designated critical industry sectors. The mission of the ISA is to combine advanced technology with economics and public policy to create a sustainable system of cyber security.</p>
<p style="text-align: justify; ">Mr. Clinton is regularly called upon to testify before both the U.S. House and Senate. In 2008, ISA published its Cyber Security “Social Contract,” which is both the first and last source cited in the Executive Summary of President Obama’s “Cyberspace Policy Review” (<a href="http://www.whitehouse.gov/CyberReview/">click here for report</a>). This report also cited more than a dozen of ISA’s white papers – far more than any other source. Recently, these ISA documents were also the inspiration for many of the recommendations in the House Republican Cyber Security Task Force Report (<a href="http://thornberry.house.gov/news/documentsingle.aspx?DocumentID=263044">click here for report</a>).</p>
<p style="text-align: justify; ">Mr. Clinton is known for his ability to take the complicated issues in this space and explain them clearly to a wide range of audiences: professional, policy makers and the general public. He has been featured in mass media such as USA Today, the PBS News Hour, the Morning Show on CBS, Fox News, CNN’s Situation Room, C-SPAN, and CNBC. He has also authored numerous professional journal articles on cyber security. This year he has published articles in the Cutter IT Journal, the Journal of Strategic Security and the Journal of Software Technology (<a href="http://www.isalliance.org/isa-in-the-news/">click here for a full list of articles and other ISA news appearances</a>).</p>
<p style="text-align: justify; ">The ISA’s pro-market, incentives-based approach to cyber security, rather than regulation, is outlined in its numerous publications, including the ISA Cyber Security Social Contract and Financial Management of Cyber Security series, which were written by the ISA Board of Directors and edited by Mr. Clinton (<a href="http://www.isalliance.org/isa-publications/" title="ISA PUBLICATIONS">click here for the full list of ISA Publications</a>).</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/events/evolving-cyber-threat-and-how-to-address-it'>https://cis-india.org/internet-governance/events/evolving-cyber-threat-and-how-to-address-it</a>
</p>
No publisherpraskrishnaCyber SecurityEventInternet Governance2013-11-18T10:49:15ZEventBali meet to discuss Internet governance issues
https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues
<b>Four-day event hosted by Internet Governance Forum to also discuss Internet access and diversity, privacy, security.</b>
<hr />
<p style="text-align: justify; ">This article by Moulishree Srivastava was <a class="external-link" href="http://www.livemint.com/Politics/nSMWfhzTld5AHD3lJFrv3L/Bali-meet-to-discuss-Internet-governance-issues.html">published in Livemint</a> on October 22, 2013. Sunil Abraham is quoted.</p>
<hr />
<p style="text-align: justify; ">Representatives of governments around the world, technology executives and activists will discuss issues such as Internet access and diversity, privacy, security, inter-governmental corporation, and Internet governance at a four-day event hosted by the Internet Governance Forum (IGF) that begins on Tuesday in Bali, Indonesia.<span class="person"><a href="http://www.livemint.com/Search/Link/Keyword/J.%20Satyanarayana"></a></span></p>
<p style="text-align: justify; "><span class="person"><a href="http://www.livemint.com/Search/Link/Keyword/J.%20Satyanarayana">J. Satyanarayana</a></span>, secretary, ministry of communications and information technology, confirmed India’s participation in the forum and said the country would be represented by Dr Govind, a senior director and head of department, e-infrastructure and Internet governance division, department of information technology.</p>
<p style="text-align: justify; ">“We will also be taking part in a working group on Internet governance and enhanced cooperation, which will be convened by the United Nations Commission on Science and Technology for Development in November,” said Satyanarayana.</p>
<p style="text-align: justify; ">“IGF is a valuable learning forum wherein different stakeholders can discuss Internet governance policy issues without any antagonism. Other fora for Internet policy like ICANN, WIPO (World Intellectual Property Organization), ITU (International Telecommunication Union), etc., are places where international law and policy are developed, and do not allow for such learning because negotiations are always very acrimonious. Since IGF is only meant for learning, it does not directly address the global policy vacuum that exists for cyber crime, data protection and privacy,” said <span class="person"><a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham">Sunil Abraham</a></span>, executive director of Bangalore-based Centre for Internet and Society, who will be participating in the Bali event.</p>
<p style="text-align: justify; ">“Indian government, private sector, civil society, technical and academic community can become more competent and effective through such a dialogue in other multilateral and multi-stakeholder fora where international Internet standards, policies and laws are formulated. It also helps the stakeholders contribute to the development of internationally interoperable domestic policy,” he added.</p>
<p style="text-align: justify; ">In 2006, the UN secretary general established a small secretariat in Geneva to assist him in the convening of IGF. The first meeting was convened in October-November 2006 in Athens. In December 2010, IGF’s mandate was extended for five years.</p>
<p style="text-align: justify; ">In its eighth edition, IGF will have detailed discussions on issues such as free flow of information on the Internet, regulatory approaches to privacy, and protection of interests of individuals and communities in cyberspace, Internet surveillance and legal framework for cyber crime, said the forum in a statement on its website.</p>
<p style="text-align: justify; ">During the four-event, for instance, one of the workshops “will explore what core principles and strategies are needed to achieve a balanced and fair approach to data protection that is effective internationally and regionally”, according to IGF.</p>
<p style="text-align: justify; ">Some of the prominent speakers in the event include <span class="person"><a href="http://www.livemint.com/Search/Link/Keyword/Jari%20Arkko">Jari Arkko</a></span>, chairman, Internet Engineering Task Force, Finland; <span class="person"><a href="http://www.livemint.com/Search/Link/Keyword/Virat%20Bhatia">Virat Bhatia</a></span>, president, South Asia, <span class="company"><a href="http://www.livemint.com/Search/Link/Keyword/AT&T%20Inc.">AT&T Inc.</a></span>; <span class="person"><a href="http://www.livemint.com/Search/Link/Keyword/Chris%20Painter">Chris Painter</a></span>, coordinator for cyber issues, US department of state; <span class="person"><a href="http://www.livemint.com/Search/Link/Keyword/Karen%20Mulberry">Karen Mulberry</a></span>, policy adviser, Internet Society; and <span class="person"><a href="http://www.livemint.com/Search/Link/Keyword/Matthew%20Shears">Matthew Shears</a></span>, director of Internet policy and human rights, Center for Democracy and Technology.</p>
<p style="text-align: justify; ">According to industry estimates, over 2.5 billion Internet users interact in shared cross-border online spaces where they can post content potentially accessible worldwide.</p>
<p style="text-align: justify; ">“No clear frameworks exist yet to handle the tensions between these competing normative orders or values and enable peaceful cohabitation in cross-border cyberspace. This challenge constitutes a rare issue of common concern for all stakeholder groups,” said IGF on its website.</p>
<p style="text-align: justify; ">According to a UN estimate, nearly 40% of the world’s population will be online by the end of 2013. “The Internet has become an essential tool for the creation of jobs and the delivery of basic public services,” said the UN undersecretary-general for economic and social affairs, <span class="person"><a href="http://www.livemint.com/Search/Link/Keyword/Wu%20Hungbo">Wu Hungbo</a></span>, in a statement, adding that it is also essential “for improving access to knowledge and education, for empowering women, for enhancing transparency, and for giving marginalized populations a voice in decision-making processes”.</p>
<p>
For more details visit <a href='https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues'>https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues</a>
</p>
No publisherpraskrishnaCyber SecurityInternet GovernancePrivacy2013-10-23T08:29:23ZNews ItemFair process frameworks for cross-border online spaces
https://cis-india.org/news/igf-2013-workshop-42-fair-process-frameworks-for-cross-border-online-spaces
<b>This workshop is being organised by the Internet & Jurisdiction Project, Civil Society of France, Western Europe and Others Group and Internet & Jurisdiction Project, Civil Society of Germany, Western Europe and Others Group. Sunil Abraham is one of the panelists for this workshop.</b>
<p style="text-align: justify; "><i>The Internet Governance Forum 2013 is being held at Bali from October 22 to 25. The overarching theme for the 2013 IGF meeting is: "Building Bridges"- Enhancing Multistakeholder Cooperation for Growth and Sustainable Development"</i>.</p>
<p><a class="external-link" href="http://www.intgovforum.org/cms/wks2013/workshop_2013_status_list_view.php?xpsltipq_je=42">Read the original published on IGF website</a>. Also <a class="external-link" href="http://www.internetjurisdiction.net/igf-2013-workshop/">read it on Internet & Jurisdiction website</a>.</p>
<hr />
<h2>Theme: Legal Frameworks and Cyber-crime (Spam, Cyber-security, etc.)</h2>
<p style="text-align: justify; ">This workshop is organized by the Internet & Jurisdiction Project, a global multi-stakeholder dialogue process launched in January 2012, which engages key actors from states, international organizations, companies, civil society, academia and the technical community from all around the world to address the tension between the cross-border Internet and national jurisdictions.</p>
<p style="text-align: justify; ">Over 2,5 billion Internet users interact in shared cross-border online spaces where they can post content potentially accessible worldwide. On the one hand platforms’ Terms of Service try to set transnational rules on acceptable postings, but on the other hand content that is legal in one jurisdiction can be illegal or sensitive in other territories. No clear frameworks exist yet to handle the tensions between these competing normative orders or values and enable peaceful cohabitation in cross-border cyberspaces. This challenge constitutes a rare issue of common concern for all stakeholder groups.</p>
<p style="text-align: justify; ">Building upon the intersessional work conducted by the Internet & Jurisdiction Project since the 2012 IGF, the roundtable will address the following topics:</p>
<ul>
<li style="text-align: justify; "> Can commonly agreed interoperability procedures ensure fair process in interactions between platforms, public authorities, technical operators and users regarding seizures, content takedowns and access to user data? regarding seizures, content takedowns and LEA access to user data? - See more at: <a class="external-link" href="http://www.internetjurisdiction.net/igf2013-workshop/#sthash.q6PQ3uMn.dpuf">http://www.internetjurisdiction.net/igf2013-workshop/#sthash.q6PQ3uMn.dpuf</a></li>
</ul>
<ul>
<li style="text-align: justify; "> How could appropriate multi-stakeholder frameworks be developed?</li>
</ul>
<p style="text-align: justify; ">Note: This roundtable is listed above under the “legal frameworks and cybercrime” track. However it equally touches upon other thematic areas: Human Rights/ Freedom of Expression on the Internet (addressing takedown procedures); Internet Governance Principles (eg. fair process and accountability) and Principles of Multi-Stakeholder Cooperation (the development of mutual frameworks).</p>
<p style="text-align: justify; "><b>Has the proponent organised a workshop with a similar subject during past IGF meetings?</b></p>
<p style="text-align: justify; ">Yes</p>
<p style="text-align: justify; "><b>Indication of how the workshop will build on but go beyond the outcomes previously reached</b></p>
<p style="text-align: justify; ">At the IGF 2012, after a year of interaction with different stakeholders, the Internet & Jurisdiction Project organized two workshops titled: “What is the Geography of Cyberspace?” and “What frameworks for cross-border online communities and services?” These sessions explored the roots of the tension between the Internet and the patchwork of national jurisdictions and examined how to address this common concern. Both these two workshops and the ongoing dialogue facilitated by the I&JProject in 2013 (including several preparatory meetings around the world) confirmed the need to explore how to develop appropriate frameworks to handle the tension in a multi-stakeholder setting. Therefore, the I&J Project will gather involved stakeholders at the 2013 workshop “Fair process frameworks for cross-border online spaces” to discuss the way forward: How could appropriate frameworks be developed and what commonly agreed interoperability procedures could ensure fair process?</p>
<p style="text-align: justify; ">Background Paper: No background paper provided</p>
<p style="text-align: justify; ">Session Type: Roundtable</p>
<ul>
<li style="text-align: justify; ">Mr. Bertrand De La Chapelle, Internet & Jurisdiction Project, Civil Society, France, Western Europe and Others Group - WEOG</li>
</ul>
<ul>
<li style="text-align: justify; ">Mr. Paul Fehlinger, Internet & Jurisdiction Project, Civil Society, Germany, Western Europe and Others Group - WEOG</li>
</ul>
<p><b>Have the Proponent or any of the co-organisers organised an IGF workshop before? </b></p>
<p>Yes</p>
<p>The link(s) to the workshop report(s):</p>
<ul>
<li><a href="http://wsms1.intgovforum.org/content/no154-internet-jurisdiction-what-frameworks-cross-border-online-communities-and-services">http://wsms1.intgovforum.org/content/no154-internet-jurisdiction-what-frameworks-cross-border-online-communities-and-services</a></li>
<li><a href="http://wsms1.intgovforum.org/content/no171-what-geography-cyberspace">http://wsms1.intgovforum.org/content/no171-what-geography-cyberspace</a></li>
<li><a href="http://www.intgovforum.org/cms/rio_reports/WS_27_Short_Report.pdf">http://www.intgovforum.org/cms/rio_reports/WS_27_Short_Report.pdf</a></li>
<li><a href="http://www.intgovforum.org/cms/2008-igf-hyderabad/event-reports/72-workshops/366-workshop-81-national-multi-stakeholder-processes-and-their-relation-to-the-igf">http://www.intgovforum.org/cms/2008-igf-hyderabad/event-reports/72-workshops/366-workshop-81-national-multi-stakeholder-processes-and-their-relation-to-the-igf</a></li>
</ul>
<h3>Panelists</h3>
<p>Please click on biography to view the biography of the panelist:</p>
<ol>
<li>Fiona Alexander, Department of Commerce, NTIA, Female, Government, United States, Western Europe and Others Group – WEOG<a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=213" target="_blank"><span><i><br /></i>Biography</span></a></li>
<li>Anne Carblanc, OECD, Female, Intergovernmental Organizations, France, Western Europe and Others Group – WEOG<a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=255" target="_blank"><span><i><br /></i>Biography</span></a></li>
<li>Elvana Thaci, Council of Europe, Female, Intergovernmental Organizations, France, Western Europe and Others Group – WEOG<a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=287" target="_blank"><span><i><br /></i>Biography</span></a></li>
<li>Sunil Abraham, Centre for Internet & Society, Male, Civil Society, India, Asia-Pacific Group<a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=108" target="_blank"><span><i><br /></i>Biography</span></a></li>
<li>Anriette Esterhuysen, Association for Progressive Communications, Female, Civil Society, South Africa, African Group<a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=74" target="_blank"><span><i><br /></i>Biography</span></a></li>
<li>Carlos Affonso Pereira Da Souza, Fundacao Getulio Vargas, Male, Technical Community, BRAZIL, Latin American and Caribbean Group – GRULAC<a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=286" target="_blank"><span><i><br /></i>Biography</span></a></li>
<li>Ross Lajeunesse, Google, Male, Private Sector, United States, Western Europe and Others Group – WEOG <a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=264" target="_blank"><span>Biography</span></a></li>
<li>Ebele Okobi, Yahoo, Female, Private Sector, United States, Western Europe and Others Group – WEOG<a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=435" target="_blank"><span><i><br /></i>Biography</span></a></li>
<li>Linda Corugedo Steneberg, European Commission, Belgium, Western Europe and Others Group – WEOG<a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=256" target="_blank"><span><i><br /></i>Biography</span></a></li>
</ol>
<h3>Agenda</h3>
<ol>
<li style="text-align: justify; ">Can commonly agreed interoperability procedures ensure fair process in interactions between platforms, public authorities, technical operators and users regarding seizures, content takedowns and access to user data?</li>
<li style="text-align: justify; ">How could appropriate multi-stakeholder frameworks be developed?</li>
</ol>
<h3>Inclusiveness of the Session</h3>
<p style="text-align: justify; ">The format of the workshop is going to be an open roundtable discussion between a diverse group of stakeholders on the basis of a structured agenda, without formal presentations. Taking stock of the preparatory process with meetings around the world, the participants will be able to discuss the outcomes of the multi-stakeholder dialogue process, explore the components of possible frameworks and how to move forward. The objective is to produce a structured but fluid and dynamic discussion that includes the audience in the debate.</p>
<h3 style="text-align: justify; ">Suitability for Remote Participation</h3>
<p style="text-align: justify; ">In addition to the remote participation tools provided by the IGF, the session will be covered live on Twitter with a dedicated hashtag and questions can also be submitted through tweets to open the discussion and engage new stakeholders. Moreover, participants of the Internet & Jurisdiction dialogue process around the world will be encouraged to participate remotely in the discussion.</p>
<p>
For more details visit <a href='https://cis-india.org/news/igf-2013-workshop-42-fair-process-frameworks-for-cross-border-online-spaces'>https://cis-india.org/news/igf-2013-workshop-42-fair-process-frameworks-for-cross-border-online-spaces</a>
</p>
No publisherpraskrishnaCyber SecurityInternet Governance2013-10-21T09:02:02ZNews ItemCIS Cybersecurity Series (Part 11) - Anja Kovacs
https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs
<b>CIS interviews Anja Kovacs, researcher and activist, and director of the Internet Democracy, Project as part of the Cybersecurity Series.</b>
<p><em>"Having the cyber security debate become more and more important was a real challenge for civil society. I think in part because many of us who were focused on human rights aren't necessarily techies. And so, when you have a conversation with a government bureaucrat, and ask questions about the kind of decisions they decided to take, very often they will come up with a technical answer in response. And then, if you don't have that expertise, it is difficult to react. In the meantime though, I think it has become clear that this is one of the biggest issues in the internet field at the moment. It is also one of the big issues that is driving the desires of governments to have a bigger role to play in internet governance. So it is an area that is unavoidable for activists. What has happened slowly is that we have come to realize that the first thing, as in most other areas, is not the technical details, but principles, and those principles are fairly similar to how they are in many other fields." - Anja Kovacs, Internet Democracy Project</em></p>
<p>Centre for Internet and Society presents its eleventh installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>In this installment, CIS speaks to Anja Kovacs, director of the Internet Democracy Project. Her work focuses on a wide range of questions regarding freedom of expression, cybersecurity and the architecture of Internet governance as they relate to the Internet and democracy. Anja is currently also a member of the of the Investment Committee of the Digital Defenders Partnership and of the interim Steering Group of Best Bits, a global network of civil society members.</p>
<p><em>(Bio from internetdemocracy.in) </em></p>
<p>Internet Democracy Project homepage: http://internetdemocracy.in/</p>
<p> <iframe src="//www.youtube.com/embed/uWH2oup6ND8" frameborder="0" height="315" width="420"></iframe></p>
<div>
<p><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></p>
<div><strong><em><br /></em></strong></div>
</div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs'>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs</a>
</p>
No publisherpurbaCybersecurityInternet GovernanceCyberculturesCyber SecurityCyber Security Interview2013-10-15T15:25:07ZBlog Entry11th India Knowledge Summit 2013
https://cis-india.org/news/eleventh-india-knowledge-summit-2013
<b>The Associated Chambers of Commerce and Industry in India (ASSOCHAM) is organizing the 11th Knowledge Summit 2013 in Hotel Shangri-La, New Delhi on October 14 and 15, 2013. The Centre for Internet and Society is supporting this event.</b>
<hr />
<p style="text-align: justify; ">Click to read the original <a class="external-link" href="http://www.assocham.org/events/showevent.php?id=888">published by ASSOCHAM here</a> , <a class="external-link" href="http://www.assocham.org/downloads/?filename=11th-India-Knowledege-Summit-Tentative-Agenda.docx">read the tentative agenda here</a> and the <a class="external-link" href="http://www.assocham.org/docs/11th-Konwledge-Summit-CyberSecurityBrochure_13.pdf">event brochure here</a>.</p>
<hr />
<p style="text-align: justify; ">The lack of a national-level doctrine has created an environment where we are entirely reactive in our cyber posture. Indeed, battlefield transcends physical borders and boundaries. The power of a nation-state is not required to inflict widespread damage to critical infrastructure systems; a single malicious actor can wreak havoc. The starkest difference, however, is that today both the private sector and individual citizens have unprecedented access to a myriad of infrastructure systems that can provide entry into sensitive systems – yet they are largely unaware of, and unaccountable for, their responsibilities in defending them.</p>
<p style="text-align: justify; ">As cyber networks rapidly transition from a mere utility to the undercurrent of our entire societal infrastructure, this reliance becomes a vulnerability. The modern Cyber Era demands a national-level doctrine that can be adopted by government agencies, armed forces, private sector organizations and individual citizens alike to establish a collective sense of purpose for our Cyber Security.</p>
<p style="text-align: justify; ">The Chamber is providing a forum to bring executive leaders, policymakers and academia together with the scientists and practitioners that intimately understand cyber technology to collaborate and begin a debate about the complex issues.<span> </span></p>
<p style="text-align: justify; ">The time has come when we should consider not only the military impact of the new cyber world, but also what role cyber defense will hold in shaping the future of our country’s economy, education, foreign affairs policies and critical infrastructure initiatives. Only then can our government, industry, and private citizens align under common goals to shape a safe and prosperous future.</p>
<p style="text-align: justify; ">ASSOCHAM India's Apex Chamber for Commerce & Industry was set up in 1920. Today the Chamber is proud to have more than 450,000 Companies as it's esteemed Member which includes many of the big global technology companies.</p>
<p style="text-align: justify; ">ASSOCHAM is privileged to be a Member of the <b>“Cyber Regulation Advisory Committee” </b>set up by <b>Ministry of Communications and IT, </b>and the <b>Joint Working Group (JWG) on Cyber Security </b>set up by the <b>National Security Council Secretariat, </b>Government of India.</p>
<p style="text-align: justify; ">The ASSOCHAM’s flagship program the Annual <b>INDIA KNOWLEDGE SUMMIT, </b>organized since 1999 has been Addressed in the past by Noble Laureates, as the Distinguished ‘Key Note Speaker’ including – Dr. Craig Venter, Sir Harry Kroto, Prof. Aaron Ciechanover, Dr. Raj Reddy, Dr. A P J Abdul Kalam, Dr. Kirsty Duncan, Prof. John A Pickett to name a few.</p>
<p style="text-align: justify; ">This year the <b>11th INDIA KNOWLEDGE SUMMIT </b>is being organized from <b>14-15 October, 2013 in Hotel </b><b>Shangri-La, New Delhi.</b></p>
<p style="text-align: justify; ">The Theme for this year’s Summit is <b>“Cyber Era - Securing the Future”</b>.</p>
<p align="left"><b>Registration Fees: </b></p>
<blockquote><b>International Delegates</b>: $ 200/- for both days<b><br />Indian Delegates</b>: Rs. 5,000/- per day<b><br />Students</b>: Rs. 2,000/- per day
<p>The Delegate Registration Fee include:<br /> Tea & Coffee<br /> Copy of Background Paper / <br /> Copy of Workshop Study Material</p>
</blockquote>
<p align="left"><b>For more details please contact: </b></p>
<blockquote>
<p>Ajay Sharma, Senior Director, M: 9899188488 , eMail: <a href="mailto:ajay.sharma@assocham.com">ajay.sharma@assocham.com</a><br /> Varun Aggarwal, Joint Director, M: 9910613815 , eMail: <a href="mailto:varun.aggarwal@assocham.com">varun.aggarwal@assocham.com</a><br /> Himanshu Rewaria, Executive, M: 9654251077 , eMail: <a href="mailto:himanshu.rewaria@assocham.com">himanshu.rewaria@assocham.com</a><br /> Sahil Goswami Executive, M: 9871962311 , eMail: <a href="mailto:sahil.goswami@assocham.com">sahil.goswami@assocham.com</a><br /><br /> <b>Corporate Office</b><br /> The Associated Chambers of Commerce and Industry of India<br /> ASSOCHAM Corporate Office, 5, Sardar Patel Marg<br />Chanakyapuri, New Delhi – 110021<br /> Phone: 46550555 (Hunting Line)<br /> Fax: 01123017008/9<br /> <br /> Email: <a class="newslink" href="mailto:assocham@nic.in">assocham@nic.in</a></p>
</blockquote>
<p>
For more details visit <a href='https://cis-india.org/news/eleventh-india-knowledge-summit-2013'>https://cis-india.org/news/eleventh-india-knowledge-summit-2013</a>
</p>
No publisherpraskrishnaCyber SecurityInternet Governance2013-09-26T07:15:29ZNews Item