<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 121 to 135.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/podcast-on-abortion-rights-and-privacy-with-pi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/teaching-at-shristi-interlude"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/report-from-oppression-to-liberation-reclaiming-the-right-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/technology-foresight-group-tandem-researchs-ai-policy-lab-on-the-theme-ai-and-environment"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/confidentiality-of-communications-and-privacy-of-data-in-the-digital-age"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls">
    <title>Is Aadhaar Essential To Achieve Error-Free Electoral Rolls?</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls</link>
    <description>
        &lt;b&gt;The Election Commission’s plans to link Aadhaar with electoral rolls may have stirred a hornet’s nest.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://www.bloombergquint.com/politics/is-aadhaar-essential-to-achieve-error-free-electoral-rolls"&gt;Bloomberg's Quint&lt;/a&gt; on December 16, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The commission  plans to undertake the exercise to clean up electoral rolls—which need  to be updated frequently to avoid duplication and errors, &lt;i&gt;The Economic Times&lt;/i&gt; newspaper reported citing people aware of the matter. But with privacy  concerns raised against the Aadhaar, is this the best way to achieve  error-free voter data?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director at the  Centre for Internet and Society, doesn’t think so. Using Aadhaar data  without the consent of the user poses legal problems, he told  BloombergQuint in a conversation. “For the Election Commission to link  Aadhaar with citizens’ voter ID would require amending the law.”&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;It is questionable whether this will fall within the bounds that the SC has set for usage of Aadhaar.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director, Centre for Internet and Society&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  former legal advisor of the Election Commission SK Mendiratta, however,  brushed aside privacy concerns relating to the process. The Election  Commission, according to him, is a constitutional body and can use  information with the government to ensure purity of the electoral roll.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reetika  Khera, associate professor at Indian Institute of Management-Ahmedabad,  said this could be bad for voters. She cited the mass deletion of  voters from electoral rolls in Telangana ahead of the recent elections,  and urged that due process must be followed.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;There  are serious problems with the use of algorithmic approaches in various  spheres. Aadhaar as a tool to clean up the electoral rolls is the  problem.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Reetika Khera, Associate Professor, IIM Ahmedabad&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-25T01:21:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy">
    <title>Centre’s order on computer surveillance threatens right to privacy, experts say</title>
    <link>https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy</link>
    <description>
        &lt;b&gt;The Constitutional validity of the notification allowing ten agencies to intercept information is uncertain.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Abhishek Dey was &lt;a class="external-link" href="https://scroll.in/article/906623/centres-order-on-computer-surveillance-threatens-right-to-privacy-experts-say"&gt;published in Scroll.in&lt;/a&gt; on December 22, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A notification issued by the Union Ministry of Home Affairs on  Thursday allowing ten agencies to intercept, monitor and decrypt any  information generated from any computer poses a grave threat to the &lt;a href="https://scroll.in/article/848321/supreme-courts-decision-that-privacy-is-a-fundamental-right-is-not-just-about-aadhaar"&gt;fundamental right&lt;/a&gt; to privacy, said lawyers and cyber security experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  notification led to a political storm on Friday and criticism from the  Opposition forced Parliament to be adjourned. However, Union Finance  Minister Arun Jaitley &lt;a class="link-external" href="https://indianexpress.com/article/india/oppn-making-a-mountain-where-molehill-does-not-exist-jaitley-on-mhas-surveillance-order-5504009/" rel="nofollow" target="_blank"&gt;accused&lt;/a&gt; the Opposition of “making a mountain where a molehill does not exist”.  The government on Friday issued a clarification stating that the  directive does not confer any new powers on it and has the legal backing  of the Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts agreed that Thursday’s notification lists powers &lt;a href="https://scroll.in/article/906579/home-ministry-order-on-computer-surveillance-is-not-new-upa-introduced-provisions-in-2008"&gt;already available&lt;/a&gt; to the authorities in the Information Technology Act 2000. The legal  provisions to allow interception were introduced in 2008 by the  Congress-led United Progressive Alliance government. However, with the  fresh directive, experts said that the Bharatiya Janata Party-led  government seems to be trying to formalise surveillance through the  interception of computer information, they said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is true that  such [interception] powers already existed,” said Pavan Duggal, a  lawyer with expertise in cyber security. “But neither any such formal  directives were issued which I know of, nor any agency were specifically  notified to have those powers.”&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;&lt;b&gt;Privacy test&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  Information Technology Act 2000 was amended in 2008 to allow to the  monitoring and interception of computer information, while the rules  under which this would operate were &lt;a class="link-external" href="http://meity.gov.in/writereaddata/files/Information%20Technology%20%28Procedure%20and%20Safeguards%20for%20Interception%2C%20Monitoring%20and%20Decryption%20of%20Information%29%20Rules%2C%202009.pdf" rel="nofollow" target="_blank"&gt;promulgated&lt;/a&gt; in 2009. In 2017, the Supreme Court delivered a judgment establishing  privacy as a fundamental right. The legal foundation of the computer  interception directive could be still be challenged in court because it  has not yet been considered in light of the privacy judgment, said  Duggal. “It is now a matter of Constitutional validity,” he said&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thursday’s  notification lists the agencies authorised to intercept, monitor and  decrypt computer data: the Intelligence Bureau, Narcotics Control  Bureau, Enforcement Directorate, Central Board of Direct Taxes,  Directorate of Revenue Intelligence, Central Bureau of Investigation,  National Investigation Agency, Cabinet Secretariat (RAW), Directorate of  Signal Intelligence (for service areas of Jammu and Kashmir, North East  and Assam) and the Commissioner of Police, Delhi. The Act provides a  jail term of seven years for anyone who refuses to cooperate with these  agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Friday, experts questioned whether a notification listing the 10  agencies had actually been issued earlier, as the Centre claimed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It  is a fresh notification,” said Apar Gupta, a lawyer who specialises in  technology and media issues. “With this, interception of computers has  received formal acceptance in the public domain and it can have serious  implications on privacy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior officials of the Delhi Police  also said this appeared to be a fresh order. Asked if this meant that  the agencies would not need to ask for authorisation in every case since  a blanket order has been issued, the officials said that this still  needs to be clarified.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;&lt;b&gt;Lacking proportionality&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  order has raised questions about the validity of the cases of  interception of computer information conducted by the state police and  other security agencies between 2009 (the year the interception rules  were promulgated) and 2018 (the year the notification has been issued),  Pranesh Prakash, co-founder of the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One possibility, he said, may be that they were all unlawful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  if they were indeed conducted with legal backing, Prakash said, then  permission for this would  been sanctioned in the form of an order by a  competent authority. This is what Rule 3 of the &lt;a class="link-external" href="http://meity.gov.in/writereaddata/files/Information%20Technology%20%28Procedure%20and%20Safeguards%20for%20Interception%2C%20Monitoring%20and%20Decryption%20of%20Information%29%20Rules%2C%202009.pdf" rel="nofollow" target="_blank"&gt;interception rules&lt;/a&gt; mandate. But if so, Rule 4, which deals with the government authorising  agencies to conduct such interceptions, is redundant. “How can it not  be when any state police or other agency is capable of acquiring an  order for interception under Rule 3?” he said&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides, Prakash said, the new directive does not pass the test of proportionality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  2007, the Central government introduced rules to amend the Indian  Telegraph Act 1951 to allow for information to be intercepted, Prakash  said. However, the rules say that the competent authority should resort  to interception only after considering all alternative means to acquire  information. Thursday’s directive, though, is silent about the  circumstances in which interception will be permitted, he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy'&gt;https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-25T00:50:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/podcast-on-abortion-rights-and-privacy-with-pi">
    <title>Podcast on 'Abortion rights and privacy' with PI</title>
    <link>https://cis-india.org/internet-governance/news/podcast-on-abortion-rights-and-privacy-with-pi</link>
    <description>
        &lt;b&gt;Ambika Tandon recorded a podcast with Privacy International on abortion rights, bodily autonomy, and privacy in the Indian and Argentinian context, which was released on December 6, 2018.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The participants in the podcast are Eva Blum-Dumontet from Privacy International, Eduardo Ferreyra from Asociacion pos los Derechos Civiles, and Ambika herself. Listen to the &lt;a class="external-link" href="https://soundcloud.com/privacyinternational/gender-and-privacy-series-abortion"&gt;podcast here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/podcast-on-abortion-rights-and-privacy-with-pi'&gt;https://cis-india.org/internet-governance/news/podcast-on-abortion-rights-and-privacy-with-pi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-25T01:09:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/teaching-at-shristi-interlude">
    <title>Teaching at Shristi Interlude</title>
    <link>https://cis-india.org/internet-governance/news/teaching-at-shristi-interlude</link>
    <description>
        &lt;b&gt;Shweta Mohandas is participating as a mentor for Srishti Interlude (a set of workshops that help the design students to produce outputs on a given theme) the theme of this year is Privacy. The course would end on December 7, 2018.&lt;/b&gt;
        &lt;p&gt;1. Aravani Art Project&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Is LGBTQ desire only public at a             queer pride parade?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; How private is my bedroom?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; How does an insult unfold in ‘public view’ ? &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt; 2. Padmini Ray Murray&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Is LGBTQ desire only public at a             queer pride parade?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; How private is my bedroom?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; “Move fast and break things.” Do you trust Facebook with             your privacy?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt; 3. Joshua Muyiwa&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Is LGBTQ desire only public at a             queer pride parade?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; How private is my bedroom?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Profits should be private, risks should be public and art             should be beautiful?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt; 4. Roshan Sahi&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Profits should be private, risks             should be public and art should be beautiful?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; “Move fast and break things.” Do you trust Facebook with             your privacy?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; How does an insult unfold in ‘public view’ ? &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt; 5. Shweta Mohandas&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; “Move fast and break things.” Do             you trust Facebook with your privacy?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Is caste “Sensitive Personal Data”?           How does an insult unfold in             ‘public view’? &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt; 6. Suresh Kumar&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Is caste “Sensitive Personal             Data”?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Profits should be private, risks should be public and art             should be beautiful?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; How does an insult unfold in ‘public view’? &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/teaching-at-shristi-interlude'&gt;https://cis-india.org/internet-governance/news/teaching-at-shristi-interlude&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-05T02:53:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/report-from-oppression-to-liberation-reclaiming-the-right-to-privacy">
    <title>Report: From Oppression to Liberation: Reclaiming the Right to Privacy</title>
    <link>https://cis-india.org/internet-governance/news/report-from-oppression-to-liberation-reclaiming-the-right-to-privacy</link>
    <description>
        &lt;b&gt;Eva Blum-Dumontet, Research Officer at Privacy International, published her report on gender and privacy on November 28, 2018. The report, titled 'From Oppression to Liberation: Reclaiming the Right to Privacy', traces the history of privacy as a tool of oppressing women across different spheres, eventually calling for a feminist reclamation of privacy. Ambika Tandon was quoted. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Whose  privacy are we fighting for when we say we defend the right to privacy?  In this report we take a hard look at the right to privacy and its  reality for women, trans and gender diverse people. We highlight how  historically privacy has been appropriated by patriarchal rule and  systems of oppression to keep women, trans and gender diverse people in  the private sphere. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;For  us, this report is also an opportunity to show how surveillance and  data exploitation are also uniquely affecting women, trans and gender  diverse people. We demonstrate how patriarchy and systems of oppression  rely on surveillance to perpetuate themselves and how surveillance and  data exploitation need the rigid and gender-normative categories of  patriarchy to function. We conclude by presenting how protecting the  right to privacy can address some of these challenges.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;We hope this report will be read as a call for action: privacy needs to be reclaimed by women, trans and gender diverse people.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/from-opression-to-liberation"&gt;Download the report&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/report-from-oppression-to-liberation-reclaiming-the-right-to-privacy'&gt;https://cis-india.org/internet-governance/news/report-from-oppression-to-liberation-reclaiming-the-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-05T02:48:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint">
    <title>Facebook Privacy Design Sprint</title>
    <link>https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint</link>
    <description>
        &lt;b&gt;Pranav Bidare and Saumyaa Naidu participated in the Facebook Privacy Design Sprint on Friday, November 30, 2018.&lt;/b&gt;
        &lt;p&gt;&lt;img src="https://cis-india.org/home-images/FacebookPrivacyDesignSprintInvitation30thNovember.png/@@images/a737a9d8-6924-405e-a31b-45310d2d2a9b.png" alt="Facebook Privacy Design " class="image-inline" title="Facebook Privacy Design " /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint'&gt;https://cis-india.org/internet-governance/news/facebook-privacy-design-sprint&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-04T16:28:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics">
    <title>Danish Expert Group on Data Ethics</title>
    <link>https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics</link>
    <description>
        &lt;b&gt;Amber Sinha was one of the stakeholders who provided inputs to the Danish Expert Group on Data Ethics in June 2018 during their visit to New Delhi. The Expert Group has prepared and submitted its final report.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;In April the Danish             Expert Group on Data Ethics commenced work on developing             recommendations on Data Ethics for the Danish Government.             The expert group have now handed over their recommendations             to the Danish Minister of Industry, Business and Financial             Affairs. &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/data-for-the-benefit-of-people"&gt;Read the report&lt;/a&gt;.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics'&gt;https://cis-india.org/internet-governance/news/danish-expert-group-on-data-ethics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-01T04:42:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs">
    <title>Cyberspace and External Affairs:A Memorandum for India Summary</title>
    <link>https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs</link>
    <description>
        &lt;b&gt;This memorandum seeks to summarise the state of the global debate in cyberspace; outline how India can craft it’s global strategic vision and finally, provides   a set of recommendations for the MEA as they craft their cyber diplomacy strategy.&lt;/b&gt;
        &lt;p class="moz-quote-pre" style="text-align: justify; "&gt;It limits itself to advocating certain procedural steps that the Ministry of External Affairs should take towards propelling  India forward as a leading voice in  the global cyber norms space and explains why occupying this leadership position should be a vital foreign policy priority. It does not delve into content-based recommendations at this stage.   Further, this memorandum is not meant to serve as exhaustive academic research on the subject but builds on previous research by the Centre for Internet &amp;amp; Society in this area to highlight key policy windows that can be driven by India.&lt;/p&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;This memorandum provides  a background to global norms formation focussing on key global developments over the past month; traces the opportunities s for India  to play a lead role in the global norms formulation debate and then charts out process related recommendations on next steps towards India taking this forward.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyberspace-and-external-affairs"&gt;Click here&lt;/a&gt; to read more&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs'&gt;https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-01T04:10:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse">
    <title>Informational Privacy in India: An Emerging Discourse</title>
    <link>https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse</link>
    <description>
        &lt;b&gt;Centre for Policy Research supported by Omidyar Network organized this event in New Delhi on November 29, 2018. Amber Sinha was a speaker on the first panel on privacy and its tradeoffs.&lt;/b&gt;
        &lt;h3&gt;Concept Note&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The last few years have seen a formalisation of the right to informational privacy within India’s constitutional framework. While the context to this – the challenge to the validity of the Aadhaar project – has entailed broader issues on delivery of public goods and services, the response to whether an individual can assert control over key informational aspects of her life has become a critical part of our rights jurisprudence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court verdict in Justice Puttaswamy’s case (2017) unequivocally affirmed this right despite leaving open several important aspects including the permissibility of restrictions on this right, and the level of scrutiny which the judiciary could exercise to safeguard them. What was particularly striking was the judicial reliance on considerable scholarship emerging from India and Indian scholars on important themes pertaining to this right: the differing conceptions of privacy and the role for each of them within India’s constitutional framework; the impact of privacy erosion on citizen-State relationship and private transactions in the commercial realm; surveillance tools and technologies in India; the need for an indigenous data protection law, and much more. The court has picked up on this thread in the second Puttaswamy verdict upholding the constitutional validity of Aadhaar with some important caveats and exceptions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, the Expert Committee headed by retired Justice Srikrishna also convened to come out with a draft personal data protection bill. The centrality of data to both commercial activity and governance purposes has found recognition in this bill. While the present legal regime to regulate data in India can be considered chequered at best with divergent regulations across finance, healthcare, telecom, mobility etc., the new bill aims to create a “big data-ready” framework. It impacts any private enterprise handling personal data by stipulating new internal procedures and strong penalties. The major themes in the bill are new user rights for data principals (individuals) who share their data with data fiduciaries (technology companies); data localisation and crossborder data flows; data protection authority (DPA) and its powers; data fiduciaries and new compliance requirements; and exceptions including law enforcement. Each of these carries major implications for data-driven solutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the deliberations of the Committee too, substantial Indian scholarship on the themes listed above have been referenced and relied upon. This is truly a breakout moment for privacy and data protection in India. It is changing the terrain of institutional responses to personal data, technology architectures, and digital trade.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Discussion Objectives and Format&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the above background, the Centre for Policy Research conducted a closed-door, invite only discussion on November 29, 2018 on the theme Informational Privacy in India: An Emerging Discourse. This discussion sought to engage with representatives from embassies, chambers of commerce and research funding organisations located in India. It took place from 10.00 to 13.00 hours at the Taj Vivanta Ambassador, Sujan Singh Park off Subramaniam Bharti Marg, New Delhi 110003.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The core objectives driving this workshop were to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Highlight informational privacy debates in India;&lt;/li&gt;
&lt;li&gt;Locate informational privacy within India’s constitutional setting, closely re-examining the Supreme Court verdicts in this regard;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Explore themes such as the notice-and-consent framework, regulatory interventions and structural changes, and other key themes on privacy and data protection in India;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Demystify concepts introduced to strengthen personal data protection, including actor and data categories, and new user rights, and their potential impact on technology design;&lt;/li&gt;
&lt;li&gt;Highlight the ramifications of data localization and cross-border data transfer restrictions, on digital trade and e-commerce;&lt;/li&gt;
&lt;li&gt;Decode the new structural mechanisms proposed to mitigate risks in collection, storage, and processing of personal data;&lt;/li&gt;
&lt;li&gt;Identify the impact of these mechanisms on the functioning of data-driven businesses and the future of data innovation in India.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;Click to &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/informational-privacy-in-india"&gt;view the agenda&lt;/a&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse'&gt;https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-01T05:40:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads">
    <title>Briefing on BBC News pan-India research on how 'fake news' / digital misinformation spreads </title>
    <link>https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads</link>
    <description>
        &lt;b&gt;Amber Sinha participated in a special private briefing on the BBC's pan India research on how misinformation spreads. The briefing was conducted on November 16, 2018 in New Delhi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The briefing was very useful in understanding both the methodology employed by the researchers, and how they arrived ate certain findings. The report can be &lt;a class="external-link" href="https://downloads.bbc.co.uk/mediacentre/duty-identity-credibility.pdf"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads'&gt;https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-05T14:01:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners">
    <title>Building a Community of Practice: Reflections from 2nd All Partners</title>
    <link>https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners</link>
    <description>
        &lt;b&gt;On Wednesday, November 14th, the Partnership on AI held its 2nd annual All Partners Meeting in San Francisco, California. Representatives from our 80+ member organizations – for-profit companies, civil society organizations, academic institutions, and advocacy groups – traveled from across the globe to reflect on 2018 progress, and to plan for the future.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Elonnai Hickok participated in the event held in San Francisco on November 14 and 15, 2018. The event was organized by Partnership on AI. On November 14, Elonnai spoke on the panel on the PAI working groups and on November 15 she co-lead the AI Labor and Economy working group meeting as co-chair of the group. More details can be &lt;a class="external-link" href="https://www.partnershiponai.org/building-a-community-of-practice-reflections-from-our-2nd-all-partners-meeting/"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners'&gt;https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-01T04:18:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance">
    <title>Surveillance Stories: Optimizing rights and governance</title>
    <link>https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance</link>
    <description>
        &lt;b&gt;Sunil Abraham gave a talk at the National Centre for Biological Sciences, Tata Institute of Fundamental Research, Bangalore on October 16, 2018. Sunil used a series of stories to explain how surveillance works and fails in the context of theft, murder, insider trading, terrorism, demonetization and encounter killings. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Abraham.jpg/@@images/27cd9d50-b82d-4556-aad2-431d99174b07.jpeg" alt="Surveillance Talk" class="image-inline" title="Surveillance Talk" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These stories were used to explore multiple technical solutions for solving the “surveillance optimization problem”. Policy makers have to simultaneously maximize various rights — the right to privacy, the right to transparency, the right to free speech — and uphold the imperatives of the nation state: national security, law enforcement and effective governance. &lt;br /&gt; &lt;br /&gt;Two decades ago, Lawrence Lessig introduced a socioeconomic theory of regulation called the ‘pathetic dot theory’, which discusses how individuals in a society are regulated by four forces — law, code or technical infrastructure, market and social norms. The talk will explore how these four regulatory options contribute to solving the surveillance optimization problem.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was published on the website of &lt;a class="external-link" href="https://www.ncbs.res.in/events/apls-20181016-surveillance-abraham"&gt;National Centre for Biological Sciences&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance'&gt;https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-31T01:39:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques">
    <title>Participation in the meetings of ISO/IEC JTC 1/SC 27 'IT Security techniques'</title>
    <link>https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques</link>
    <description>
        &lt;b&gt;From 30 September 2018 to 4 October 2018, Gurshabad Grover participated in the meetings of the working groups of ISO/IEC JTC 1/SC 27 'IT Security techniques' held in Gjøvik, Norway. The meetings were organized by Standards Norway with support from NTNU, Microsoft, Telenor, et.al.&lt;/b&gt;
        &lt;p&gt;Gurshabad mainly focused on the meetings of Working Group 5 responsible for standards and research in "Identity management and privacy technologies" in SC 27. I attended sessions discussing work related to current ISO/IEC standards and upcoming work in the WG, such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Establishing a PII deletion concept in organizations&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Privacy guidelines for smart cities&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Additional privacy-enhancing data de-identification standards&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;User-centric framework for PII handling based on user privacy preferences&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Gurshabad will be a co-rapporteur on a 12-month study period to investigate the 'Impact of Artificial Intelligence on Privacy' which was initiated by the WG in the meeting. Additionally, I was a part of the drafting committee which prepared the final resolutions and liaison statements from the meeting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gurshabad also attended the Norwegian Business Forum on cyber security which was held on October 4th, which featured talks by professionals and academicians working in cyber security in their different sectors. The agenda for the business forum can be &lt;a class="external-link" href="http://www.standard.no/en/kurs-og-arrangementer/arrangement-standard-norge-og-nek/arrangement-fra-standard-norge/business-forum---cyber-security/"&gt;found here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques'&gt;https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-31T01:28:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/technology-foresight-group-tandem-researchs-ai-policy-lab-on-the-theme-ai-and-environment">
    <title>Technology Foresight Group Tandem Research's AI policy lab on the theme AI and Environment</title>
    <link>https://cis-india.org/internet-governance/news/technology-foresight-group-tandem-researchs-ai-policy-lab-on-the-theme-ai-and-environment</link>
    <description>
        &lt;b&gt;Shweta Mohandas attended a roundtable discussion on artificial intelligence and environment held at Tandem Research's office in Goa on October 5, 2018. She also made the  framing intervention for the first session by addressing the question - What are the likely ethical conundrums, and plausible unintended consequences of the use of AI for sustainability?&lt;/b&gt;
        &lt;dl style="text-align: justify; "&gt;
&lt;p&gt;Conversations at the lab clustered around four main themes:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;AI in the Anthropocene&lt;/b&gt;&lt;br /&gt;What are the most critical sustainability challenges in India – and can AI be useful in addressing them? What are the likely ethical conundrums, and plausible unintended consequences of the use of AI for sustainability?&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Conservation after nature&lt;/b&gt;&lt;br /&gt;What AI interventions are possible to foster better conservation and can AI driven citizen science initiatives improve people’s relationship with the natural world? Can AI help imagine a more dynamic and proximate co-existence with other species, after nature?&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Water ecosystems&lt;/b&gt;&lt;br /&gt;Can AI help us imagine new paradigm of water control and infrastructure that are more dynamic and ‘mirror’ the complexity of natural water systems? Will AI lead to decentralization and empowerment of water users or will it result in centralized models and loss of power and agency of water users?&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Future Cities&lt;/b&gt;&lt;br /&gt;Can AI systems be used to foster sustainability practices around mobility, energy, waste, and help better plan development zones and create early warning systems? What systems can be built to encourage citizen participation for solving sustainability problems and increase transparency and accountability of municipal governments?&lt;/p&gt;
&lt;/dl&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/technology-foresight-group-tandem-researchs-ai-policy-lab-on-the-theme-ai-and-environment'&gt;https://cis-india.org/internet-governance/news/technology-foresight-group-tandem-researchs-ai-policy-lab-on-the-theme-ai-and-environment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-31T01:10:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/confidentiality-of-communications-and-privacy-of-data-in-the-digital-age">
    <title>Confidentiality of Communications and Privacy of Data in the Digital Age</title>
    <link>https://cis-india.org/internet-governance/news/confidentiality-of-communications-and-privacy-of-data-in-the-digital-age</link>
    <description>
        &lt;b&gt;On September 25, 2018, Elonnai Hickok participated in a side event Confidentiality of Communications and Privacy of Data in the Digital Age organized by INCLO and Privacy International at the Human Rights Council 39th ordinary session. Elonnai spoke on artificial intelligence and privacy.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/confidentiality-of-communications-and-privacy-of-data-in-the-digital-age'&gt;https://cis-india.org/internet-governance/news/confidentiality-of-communications-and-privacy-of-data-in-the-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-28T06:02:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
