<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 81 to 95.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/remove-misinformation-but-be-transparent-please-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/a-manipuri-trans-woman-recounts-her-ongoing-lockdown-ordeal-covid19"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/geo-economic-impacts-of-the-coronavirus-global-supply-chains-part-i"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-debate-over-internet-governance-and-cyber-crimes-west-vs-the-rest"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/essay-watching-corona-or-neighbours-introducing-2018lateral-surveillance2019-during-covid201919"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/bd4d-guideline-documents/ExtendedNotes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/a-compilation-of-research-on-the-gig-economy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/gig-workers-need-support"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/2018future-of-work2019-in-india2019s-it-it-es-sector-pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/pdf-gendered-future-of-work"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/pdf-final-draft-gender-and-the-future-of-work"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/digital-id-india-case-study"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/governing-id-principles-for-evalution"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/remove-misinformation-but-be-transparent-please-1">
    <title>Remove misinformation, but be transparent please!</title>
    <link>https://cis-india.org/internet-governance/blog/remove-misinformation-but-be-transparent-please-1</link>
    <description>
        &lt;b&gt;The Covid-19 pandemic has seen an extensive proliferation of misinformation and misleading information on the internet - which in turn has highlighted a heightened need for online intermediaries to promptly and effectively deploy its content removal mechanisms. This blogpost examines how this necessity may affect the best practices of transparency reporting and obligations of accountability that these online intermediaries owe to their users, and formulates recommendations to allow preservation of information regarding Covid-19 related content removal, for future research. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This article first&amp;nbsp;&lt;a class="external-link" href="http://cyberbrics.info/remove-misinformation-but-be-transparent-please/"&gt;appeared&lt;/a&gt;&amp;nbsp;in the CyberBrics. The author would like to thank Gurshabad Grover for his feedback and review.&amp;nbsp;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;Introduction&lt;/h2&gt;
&lt;p dir="ltr"&gt;We are living through, to put it mildly, strange times. The ongoing pandemic has pinballed into a humanitarian crisis, revealing and deepening the severe class inequalities that exist today. The crisis has been exacerbated by an ‘infodemic’, as the World Health Organization (WHO)&amp;nbsp;&lt;a href="https://www.who.int/docs/default-source/coronaviruse/situation-reports/20200202-sitrep-13-ncov-v3.pdf"&gt;notes&lt;/a&gt;: a massive abundance of information - occasionally inaccurate - has reduced the general perception of trust and reliability of online sources regarding the disease.&lt;/p&gt;
&lt;p dir="ltr"&gt;As a response to this phenomenon, in March, the Ministry of Electronics and Information Technology (MeitY) issued an&amp;nbsp;&lt;a href="https://meity.gov.in/writereaddata/files/advisory_to_curb_false_news-misinformation_on_corona_virus.pdf"&gt;advisory&lt;/a&gt;&amp;nbsp;to all social media platforms, asking them to “take immediate action to disable/remove [misinformation on Covid-19] hosted on their platforms on priority basis.” This advisory comes at a time when several prominent online platforms, including&amp;nbsp;&lt;a href="https://gadgets.ndtv.com/internet/news/google-india-announces-steps-to-help-combat-covid-19-misinformation-2211357"&gt;Google&lt;/a&gt;,&amp;nbsp;&lt;a href="https://blog.twitter.com/en_us/topics/company/2020/An-update-on-our-continuity-strategy-during-COVID-19.html"&gt;Twitter&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://about.fb.com/news/2020/03/combating-covid-19-misinformation/"&gt;Facebook&lt;/a&gt;&amp;nbsp;are also voluntarily stepping up to remove ‘harmful’ and misleading content relating to the pandemic. In the process, these intermediaries have started to increasingly rely on automated tools to carry out these goals, since their human moderator teams had to be sent home on lockdown norms.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;While the intention behind these decisions is understandable, one must wonder how this new-found speed to remove content, prompted by the bid to rid the social media space of ‘fake news’ may affect the best practices of transparency reporting and obligations of accountability that these online intermediaries owe to their users. In this piece, we explore these issues in a little more detail.&amp;nbsp;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;What is transparency reporting?&amp;nbsp;&lt;/h2&gt;
&lt;p dir="ltr"&gt;Briefly speaking, transparency reports, in the context of online intermediaries and social media companies, are periodic (usually annual or half-yearly) reports that map different policy enforcement decisions the company has taken regarding, among other things, surveillance and censorship. These decisions are either carried out unilaterally by the company, by third-party notices (in case of content that is infringing copyright, for instance), or at the behest of state authorities. For instance, Google’s&amp;nbsp;&lt;a href="https://transparencyreport.google.com/?hl=en"&gt;page&lt;/a&gt;&amp;nbsp;on transparency reporting describes the process as “[s]haring data that sheds light on how the policies and actions of governments and corporations affect privacy, security, and access to information.”x&lt;/p&gt;
&lt;p dir="ltr"&gt;To gauge the importance of transparency reporting in today’s age of the internet, it is perhaps potent to consider their history. In the beginning of the past decade, Google was one of the only online intermediaries&amp;nbsp;&lt;a href="https://transparencyreport.google.com/user-data/overview?hl=en&amp;amp;user_requests_report_period=series:requests,accounts;authority:IN;time:&amp;amp;lu=user_requests_report_period"&gt;providing&lt;/a&gt;&amp;nbsp;any kind of information regarding government requests for user data, or requests for removal of content.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Then, in 2013, the Snowden Leaks happened. This was a watershed moment in the internet’s history, inasmuch as it displayed that these online intermediaries were often excessively pliant with government requests for user information,&amp;nbsp;&lt;a href="https://www.forbes.com/sites/kashmirhill/2013/11/14/silicon-valley-data-handover-infographic/#25de6ae45365"&gt;allowing&lt;/a&gt;&amp;nbsp;them backdoor surveillance access. Of course, all of these companies denied these allegations.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;However, from this moment onwards, online intermediaries began to roll out transparency reports in a bid to fix their damaged goodwill, and till last year, it was&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/files/A%20collation%20and%20analysis%20of%20government%20requests%20for%20user%20data%20%20and%20content%20removal%20from%20non-Indian%20intermediaries%20.pdf"&gt;noted&lt;/a&gt;&amp;nbsp;that these reports continued to be more detailed, at least in the context of data and content related to users located in the US. A notable exception to this rule was the tech giant Amazon, whose&amp;nbsp;&lt;a href="https://www.amazon.com/gp/help/customer/display.html?nodeId=GYSDRGWQ2C2CRYEF"&gt;reports&lt;/a&gt;&amp;nbsp;are essentially a PDF document of three pages, with no nuance regarding any of the verticals mentioned.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Done well, these reports are invaluable sources of information about things like the number of legal takedowns effectuated by the intermediary, the number of times the government asked for user information from the intermediary for law enforcement purposes, and so on. This in turn becomes a useful way of measuring the breadth of government and private censorship and surveillance. For instance, this&amp;nbsp;&lt;a href="https://indianexpress.com/article/india/govt-emergency-requests-to-facebook-for-user-data-more-than-double-in-2019-6407110/"&gt;report&lt;/a&gt;&amp;nbsp;shows that the government emergency reports sent to Facebook have doubled since 2019, which is concerning, since it is not clear what does the company mean by an ‘emergency’ request, and whether its understanding matches up with that provided under the Indian&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009"&gt;law&lt;/a&gt;. Which means that it becomes difficult, in turn, to ascertain the nature of information that the company is handing over to the government.&amp;nbsp;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;Best practices and where to find them&lt;/h3&gt;
&lt;p dir="ltr"&gt;While transparency reports are great repositories to gauge the breadth of government censorship and surveillance, one early challenge has been the lack of standardized reporting. Since these reports were mostly autonomous initiatives by online intermediaries, each of them had taken their own forms. This in turn, had made any comparison between them difficult.&lt;/p&gt;
&lt;p dir="ltr"&gt;This has since been addressed by a number of organizations, including Electronic Frontier Foundation (&lt;a href="https://www.eff.org/wp/who-has-your-back-2019"&gt;EFF&lt;/a&gt;),&amp;nbsp;&lt;a href="https://www.newamerica.org/oti/reports/transparency-reporting-toolkit-content-takedown-reporting/"&gt;New America&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.accessnow.org/transparency-reporting-index/"&gt;Access Now&lt;/a&gt;, all creating their own metrics for measuring transparency reports. More definitively, in the context of content removal in 2018, a group of academicians, organizations and experts had collaborated to form the ‘&lt;a href="https://santaclaraprinciples.org/"&gt;Santa Clara Principles on Transparency and Accountability in Content Moderation&lt;/a&gt;’ which have since received the&amp;nbsp;&lt;a href="https://santaclaraprinciples.org/open-letter/"&gt;endorsement&lt;/a&gt;&amp;nbsp;of around seventy human rights groups. Taken together, these standards and methodologies of analysing transparency reports present a considerable body of work, against which content removals can be mapped.&lt;/p&gt;
&lt;h2 dir="ltr"&gt;Content takedown in the time of pandemic&lt;/h2&gt;
&lt;p dir="ltr"&gt;In some of our previous research, we have&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/blog/torsha-sarkar-november-30-2019-a-deep-dive-into-content-takedown-timeframes"&gt;argued&lt;/a&gt;&amp;nbsp;how the speed of removal, or the time taken by an intermediary to remove ‘unlawful’ content, says nothing about the accuracy of the said action. Twitter, for instance, can say that it took some&amp;nbsp;&lt;a href="https://transparency.twitter.com/en/twitter-rules-enforcement.html"&gt;‘action’&lt;/a&gt;&amp;nbsp;against 584,429 reports of hateful conduct for a specified period; this does not always mean that all the action it took was accurate, or fair, since very little publicly available information is there to comprehensively gauge how effective or accurate are the removal mechanisms deployed by these intermediaries. The heightened pressure to deal with harmful content related to the pandemic, can contribute further to one, removal of perfectly legitimate content (as&amp;nbsp;&lt;a href="https://www.theverge.com/2020/3/17/21184445/facebook-marking-coronavirus-posts-spam-misinformation-covid-19"&gt;examples&lt;/a&gt;&amp;nbsp;from Facebook shows, and as YouTube has&amp;nbsp;&lt;a href="https://youtube-creators.googleblog.com/2020/03/protecting-our-extended-workforce-and.html"&gt;warned&lt;/a&gt;&amp;nbsp;in blogs), and two, towards increasing and deepening the information asymmetry regarding accurate data around removals.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Given the diverse nature of misinformation and conspiracy theories relating to the pandemic currently present on the internet, this offers a critical time to&amp;nbsp;&lt;a href="https://cdt.org/insights/covid-19-content-moderation-research-letter/"&gt;study&lt;/a&gt;&amp;nbsp;the relation between online information and the outcomes of a public health crisis. However, these efforts stand to be thwarted if reliable information around removals relating to the pandemic continue to be unavailable.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;How to map removals in these times?&lt;/h3&gt;
&lt;p dir="ltr"&gt;One, as the industry body IAMAI&amp;nbsp;&lt;a href="https://www.medianama.com/wp-content/uploads/PR_social-media_7-April3.pdf"&gt;notes&lt;/a&gt;, while positive, collaborative steps between social media companies and the government to curb misinformation are welcome, any form of takedown at the behest of the state must take the correct legal path, as mandated by the provisions of the Information Technology (IT) Act. Additionally, all information regarding content takedowns to remove fake news related to Covid-19 must be&amp;nbsp;&lt;a href="https://cdt.org/insights/covid-19-content-moderation-research-letter/"&gt;preserved and collected&lt;/a&gt;&amp;nbsp;separately by these companies, and subsequently represented in their transparency reports.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Two, if the recent case of Twitter fact-checking Donald Trump’s tweet on electoral ballots is any indication, an online intermediary’s suo motu enforcement of its internal speech norms may take different shapes, apart from the usual takedown/leave up binary, including fact-checking and showing warning labels for conspiratorial content (&lt;a href="https://about.fb.com/news/2020/04/covid-19-misinfo-update/"&gt;Facebook&lt;/a&gt;&amp;nbsp;for instance, has taken to adopt measures that would connect verified sources of information to users interacting with Covid-19 related misinformation). Accordingly, information regarding these additional measures must be mapped, including the efficacy of these steps, and should be presented in the transparency reports.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Additionally, several of these companies have stepped up to&amp;nbsp;&lt;a href="https://www.eff.org/deeplinks/2020/05/santa-clara-principles-during-covid-19-more-important-ever"&gt;use&lt;/a&gt;&amp;nbsp;automated moderation tools and systems for quick response against the spread of disinformation on their platforms. However, as YouTube’s Creator Blog&amp;nbsp;&lt;a href="https://youtube-creators.googleblog.com/2020/03/protecting-our-extended-workforce-and.html"&gt;warns&lt;/a&gt;&amp;nbsp;its users, some of these removals may be erroneous, and the users would accordingly have to appeal these decisions. Therefore, while information regarding removals prompted by the use of these tools must be preserved, and represented separately, these numbers should also be expanded to include the error rates of these automated tools, and the rate at which posts removed by error are reinstated.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Three, as previous research on transparency reporting has&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/blog/torsha-sarkar-suhan-s-and-gurshabad-grover-october-30-2019-through-the-looking-glass"&gt;shown&lt;/a&gt;, there is a substantive bridge between the information provided by these companies for users based in the US, and those based out of other countries. This is problematic on several counts. Due to the&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/blog/content-takedown-and-users-rights-1"&gt;expansive&lt;/a&gt;&amp;nbsp;&lt;a href="https://cyberbrics.info/rethinking-the-intermediary-liability-regime-in-india/"&gt;issues&lt;/a&gt;&amp;nbsp;with the laws relating to content removal in India, this inadequate representation of information makes it impossible to gauge the practical ramifications of the opaque legal system, and accordingly, makes reforms difficult. In the current times, this lack of information may also paint an imperfect&amp;nbsp; picture of government censorship. After all, the Indian government has, on multiple occasions, the dubious reputation of sending&amp;nbsp;&lt;a href="https://drive.google.com/drive/folders/1VqH8KzgTtbvF8jT2rtuhgrrOgph9XvCT"&gt;flawed&lt;/a&gt;&amp;nbsp;legal takedown notices and&amp;nbsp;&lt;a href="https://cpj.org/blog/2019/10/india-opaque-legal-process-suppress-kashmir-twitter.php"&gt;forcing&lt;/a&gt;&amp;nbsp;intermediaries to censor content nevertheless.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Therefore, this continued refusal to provide more nuanced information in the context of India would continue to facilitate these practices, and only increase the breadth of censorship of digital expression.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;While the need to remove harmful information from social media platforms in this stage of the crisis might be necessary, such need must not circumvent the adherence to the minimum standards of transparency and accountability. If the Snowdean leaks are any indication, online companies can be made to change their policies during watershed moments in history. The current Covid-19 crisis is one such moment, both offline and online, and the need is more pressing than ever, for these companies to step up and do better.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Shared under Creative Commons BY-SA 4.0 license&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/remove-misinformation-but-be-transparent-please-1'&gt;https://cis-india.org/internet-governance/blog/remove-misinformation-but-be-transparent-please-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>TorShark</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-06-29T11:46:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/a-manipuri-trans-woman-recounts-her-ongoing-lockdown-ordeal-covid19">
    <title>'I feel the pain of having nowhere to go': A Manipuri Trans Woman Recounts Her Ongoing Lockdown Ordeal</title>
    <link>https://cis-india.org/raw/a-manipuri-trans-woman-recounts-her-ongoing-lockdown-ordeal-covid19</link>
    <description>
        &lt;b&gt;"My life and work in Bengaluru came to an abrupt halt with the COVID-19 outbreak and lockdown this March. We no longer had jobs and were forced to plan our departure from the city." -- As told to Santa Khurai, Manipur-based queer and Nupi Manbi activist, artist and writer. Compiled by Aayush Rathi, a cisgender, heterosexual man, and researcher with Centre for Internet and Society, India. This account is part of an ongoing CIS research project on gender, welfare and surveillance in India, and is supported by Privacy International, UK.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally published by &lt;a href="https://www.firstpost.com/india/i-feel-the-pain-of-having-nowhere-to-go-a-manipuri-trans-woman-recounts-her-ongoing-lockdown-ordeal-8494321.html" target="_blank"&gt;Firstpost&lt;/a&gt;, June 20, 2020.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;In 2015, I left my home state of Manipur for Bengaluru.&lt;/p&gt;
&lt;p&gt;My name is Sarik*; I prefer to be known as Siku. I am a Nupi Manbi (trans woman).&lt;/p&gt;
&lt;p&gt;Other Nupi Manbi had told me that Bengaluru is tolerant of transgender individuals, and that it is easy to find decent, well-paying jobs here. I contacted friends who had already moved here and relocated with their help.&lt;/p&gt;
&lt;p&gt;Immediately, I found work at a fabric dyeing factory. The salary meant I could send some money home, my family was able to invest some of the funds in a monthly marup [revolving informal credit collective], and I was able to dream of someday having enough to buy a piece of land in Manipur.&lt;/p&gt;
&lt;p&gt;I wasn’t to know at the time that just five years later, the happiness and hope would both prove fleeting.&lt;/p&gt;
&lt;p&gt;***&lt;/p&gt;
&lt;p&gt;I grew up in a small locality of Imphal East District, the youngest of three siblings. My mother had passed away, my father is a priest and story-teller, and my older brother worked as a traditional cook. As a result, our lives were fairly hand-to-mouth.&lt;/p&gt;
&lt;p&gt;The frequent shifting of homes was very difficult for me, but I had no choice in the matter. I used to earn money by assisting other transgender friends in their tailoring works. While I worked hard in order to set aside enough money to own a small piece of land, it proved impossible with my meagre earnings.&lt;/p&gt;
&lt;p&gt;After years of struggle, I decided to move to a big city with the aspiration to earn more.&lt;/p&gt;
&lt;p&gt;***&lt;/p&gt;
&lt;p&gt;My life and work in Bengaluru came to an abrupt halt with the COVID-19 outbreak and lockdown this March.&lt;/p&gt;
&lt;p&gt;We no longer had jobs and were forced to plan our departure from the city. The Manipur government had announced measures that would allow stranded citizens to return to the state, so we began the formal process for our repatriation.&lt;/p&gt;
&lt;p&gt;On 14 May 2020, three of us left Bengaluru in a special train that was organised for returnees to Manipur. Four days later, we were in Manipur.&lt;/p&gt;
&lt;p&gt;When we reached Imphal, all returnees were first assembled at Modern College in Porompat, Imphal East. From there, we were sent to our respective constituencies to be quarantined. In the process, I was separated from my friends.&lt;/p&gt;
&lt;p&gt;I was taken to Wangkhei Girl School as my permanent address falls under this constituency. At the quarantine centre, I was allocated a room shared by six other men. All the inmates were also sharing a toilet. This made me very uncomfortable; my body was undergoing changes due to hormonal effects.&lt;/p&gt;
&lt;p&gt;In my discomfort, I reached out to transgender activist Santa Khurai, highlighting the need to set up a separate quarantine centre for transgender people. She immediately created a WhatsApp group for all the transgender people housed at different quarantine centres, keeping us updated about a separate quarantine centre for us. On the evening of 20 May, we rejoiced on seeing photos of the quarantine centre set up for transgender people. That night was the end of my terrible stay at the common quarantine centre.&lt;/p&gt;
&lt;p&gt;***&lt;/p&gt;
&lt;p&gt;On 21 May, I was shifted to the quarantine centre for transgender people at Ideal Blind School, Takyel. There, I was reunited with two of my friends. We stayed there for 17 days, receiving support from Santa Khurai through telecounseling. Before the quarantine period concluded, we were tested for COVID-19. We did not receive the results, but were advised to go back home. We were provided an acknowledgment in the form of a medical document. The relatives and parents of the other two trans girls had come to pick them up, but since my family doesn’t own a vehicle and it was not possible to hire on, I called a transgender friend to drop me home. I could sense some animosity in the neighbourhood, and decided not to step out from the house.&lt;/p&gt;
&lt;p&gt;On the morning of 4 June, local governing bodies and clubs including Meira Paibi [a women’s rights group] thronged my house. A large crowd gathered in the temple shed. The club and Meira Paibi leader called my family members out and we were made to sit in the middle of a large group of people. They asked me to produce the result of the COVID-19 test, and I showed the acknowledgement given to us at the quarantine centre. People in the crowd passed the paper to each other disapprovingly, arguing that I hadn’t been declared COVID negative. One of the local club leaders called the police and doctors. The doctor who was in charge of the facility for transgender persons responded to the call, and validated my discharge from quarantine.&lt;/p&gt;
&lt;p&gt;After few hours, even the police arrived and said that I could stay at home. However, the locals pressured the cops into taking my family — including my frail father who is in his 80s — to the police station.&lt;/p&gt;
&lt;p&gt;***&lt;/p&gt;
&lt;p&gt;We were finally allowed to leave the police station after several rounds of interrogation. My father, my brother (along with his wife and son) were taken back home by the police, while I was separately dropped off at a hotel in Gandhi Avenue, Thangal Bazar. I was advised to check in the hotel at around 3 pm; the charge was Rs 1,000 per day. When I asked the man who would pay for the room, he said, “Let’s see. At least you will be safe to stay here as the locals didn’t accept you coming home. You stay here until the test result come out.”&lt;/p&gt;
&lt;p&gt;I called Santa in desperation, who consoled and reassured me. In the meantime, I had also called my sister to ask if some clothes could be brought for me. Her response alarmed and frightened me: My sister told me that my family were not being allowed to enter the house. The gate had been locked and they were instructed to stay at a quarantine centre as they were exposed to me. The news shocked me and made me desperate in wanting the test result to come out expeditiously, so that it would at least prevent any further hardships for my family.&lt;/p&gt;
&lt;p&gt;Now I’m staying at the hotel. I fear going back to the house, the hostility of the locals, my family being attacked, my old father being forced to stay at a quarantine centre. I feel the pain of having nowhere to go. It is also infuriating to think that this could have been completely avoided had the officials not been in a haste to make us leave the quarantine centre, and had let us stay till the actual test results were received.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;* Name changed to protect identity&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/a-manipuri-trans-woman-recounts-her-ongoing-lockdown-ordeal-covid19'&gt;https://cis-india.org/raw/a-manipuri-trans-woman-recounts-her-ongoing-lockdown-ordeal-covid19&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Santa Khurai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Covid19</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Gender, Welfare, and Privacy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2020-06-22T11:42:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu">
    <title>Guest Report: Bridging the Concerns with Recommending Aarogya Setu</title>
    <link>https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu</link>
    <description>
        &lt;b&gt;Keywords: Aarogya Setu, Constitutionality, Digital Contact Tracing, Location Data, Personal Data Protection Bill, 2019, Exemptions, Personal Data, Sensitive Personal Data, Mosaic Theory, Surveillance, Privacy, Governing Law, Necessity, Intensity of Review, disparate Impact, Proportionality

&lt;/b&gt;
        
&lt;p id="docs-internal-guid-8cd22a8f-7fff-cd1f-19b3-539a748e971f" style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;This report was edited and reviewed by Arindrajit Basu, Mira Swaminathan, and Aman Nair.Read the full report &lt;a class="external-link" href="http://cis-india.org/aarogya setu privacy"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;EXECUTIVE SUMMARY&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;Aarogya Setu collects real-time location data of users every fifteen minutes to facilitate digital contact tracing during the Pandemic. It inter alia color-codes users indicating the extent of risk they pose based on their health status and predicts hotspots which are more susceptible to COVID-19. Its forecasts have reportedly facilitated the identification of 650 clusters of COVID-19 hotspots and predicting 300 emerging hotspots which may have been otherwise missed. In a welcome move, the source code of the application was recently made public. The initially-introduced mandate to use the application was reportedly diluted and a Protocol supplementing the privacy policy with additional safeguards was released. Despite these steps in the right direction, some key concerns continue to require alleviation through engagement. This Report seeks to constructively engage with these concerns towards making privacy safeguards governing its operability more consistent with international best practices.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;First, the Report maps situations in which Aarogya Setu in fact remains mandatory (in Table 1) In these situations, there exists no restriction against private parties (e.g. employers, airlines, etc.) from indirectly making its use mandatory. Consequently, there is no real choice in determining the use of the application. Even where there exists a choice to opt-out (e.g. in contexts where there is only an advisory but no indirect mandate), the choice is not meaningful due to the inability to examine the potential consequences of using the apn remains mandatory for practical purposes since there still exists an obligation to undertake due diligence towards making sure that every employee uses the application. In other words, this part of the report explains why it remains indirectly mandatory to use the application. This indirect mandate impedes the exercise of meaningful consent. This could be addressed through a notification directing that no one should be indirectly compelled to use the application. This part also acknowledges that even where a choice to opt-out (e.g. in contexts where there is only an advisory but no indirect mandate), the choice is not meaningful due to the inability to examine the potential consequences of using the application.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;Second, the report explains why the mandate to use the Application raises concerns in the first place: i.e. in the absence of transparency beyond the publication of the source code. The open-source code may not necessarily result in meaningful algorithmic transparency (since the processing in the models at the Government of India server continues to remain a black box) in respect of predictions made to determine appropriate health responses. Based on the source code per se, people are unable to verify the wherever there exists operability of the Application more meaningfully. Algorithmic transparency enables people to make an informed decision in using the Application by choice. The ability to make an informed decision is critical to the right to privacy. The right to privacy does not just mean drawing boundaries or creating limitations against any external interference. The right also includes the public’s right to know how an algorithm affects their lives. Given the centrality of transparency in the ability of the user to exercise their privacy better, beyond releasing the source code of Aarogya Setu, publicizing information about how predictions are made is important. This part acknowledges the limitations of transparency in that it can only facilitate identification of privacy harms and not really solve them by itself. Yet, it goes ahead and re-emphasises the inter-relationship of transparency and privacy, highlighting how it became a basis recently in striking down a government-used algorithm, which indicates incentive to increase transparency.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Third, the report reviews whether based on the already-available information from the combined reading of the privacy policy and the protocol, the operability of the application seems consistent with best international practices in protecting user privacy. This part begins with an analysis of the privacy policy and the protocol, which indicate privacy concerns in relation to inter alia location data, followed by an explanation as to why there exists a reasonable expectation of privacy over location data (to establish a privacy intrusion). This is followed by structurally applying the proportionality test to identify necessary modifications to the current framework:&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The 'legality' prong may be satisfied by a combined reading of the NDMA and the specificity in the delegated legislation, as has been done in the past particularly in the context of location tracking. However, it is suggested (in the recommendations section) that a statutory legislation comprehensively governing the operability of the Application is introduced to ensure predictability and permanency in the framework governing the operability of the Application as done internationally. Moreover, determining appropriate health responses to the Pandemic is indeed a legitimate interest that is sought to be achieved through the application&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Given the limitations of traditional methods of contact-tracing, digital contact tracing could perhaps be a suitable method of ascertaining appropriate health responses to the Pandemic subject to a comprehensive review of evidence on a regular basis to evaluate verifiably its effectiveness. Since the use of the application seems likely in the long run, its efficacy needs to be backed by concrete evidence which corroborates its accuracy and effectiveness such as statistical data on false positives and negatives that result from the application&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A careful reading of the combined reading of the Aarogya Setu privacy policy and the Protocol with Fair Information Protection Principles (‘FIPP’) indicates some inconsistencies with international best practices. The extent of inconsistency with best practices may not be considered the least restrictive and therefore necessary form in which digital contact tracing can be conducted in India&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Since the inconsistencies seem relatively more restrictive than necessary to facilitate digital contact tracing in India, a balancing of privacy and public health could result in the conclusion that the application is not ‘proportionate’ to the potential privacy harms that can result from using the application. While conducting the balancing exercise, privacy and public health should be viewed as complementary, not competing interests. This conception would encourage courts to consider privacy concerns with sufficient extent of intensity&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;Based on this analysis, the report concludes that digital contact tracing provided the following conditions (detailed in the ‘Recommendations’ section) are conjunctively satisfied:&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Digital contact tracing should supplement (e.g. be in addition to) and not supplant (i.e. replace) traditional methods of contact tracing entirely, particularly for vulnerable groups (e.g. interviews where vulnerable groups, particularly marginalized women do not have access to mobile phones);&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A statutory law should be introduced which strictly and comprehensively governs the scope of the application,&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;the suitability of the application (with meaningful algorithmic transparency) should be corroborated by reliable and relevant statistical evidence (e.g. with the help of closer scrutiny of the basis of predictive outcomes) and&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The privacy compromises using the application should be intrusive to the minimum extent possible. This could be done by further adding robust safeguards through stronger restrictions on sharing the collected data&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;(Final year undergraduate student of the National University of Juridical Sciences (NUJS), Kolkata with a sustained interest in law, technology and policy (graduating with the class of 2020).&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu'&gt;https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-06-24T05:19:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/geo-economic-impacts-of-the-coronavirus-global-supply-chains-part-i">
    <title>Geo-economic impacts of the coronavirus: Global Supply Chains (Part I)</title>
    <link>https://cis-india.org/internet-governance/geo-economic-impacts-of-the-coronavirus-global-supply-chains-part-i</link>
    <description>
        &lt;b&gt;This two part blog post looks at the geo-economic impacts of the coronavirus by examining crucial impacts of developments in China. Part I looks at the impact of China's shutdown on global supply chains and part two, considers the implications for the future of 5G technology.&lt;/b&gt;
        
&lt;p id="docs-internal-guid-055914a2-7fff-c699-d116-5c085772a9ef" dir="ltr" align="left"&gt;&lt;strong&gt;Introduction&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;The outbreak and swift spread of COVID-19, though comparable to previous incidents such as the SARS-CoV virus outbreak in 2003, has had a far more severe impact for a number of reasons which inter alia, include China’s &lt;a href="https://fortune.com/2020/02/13/coronavirus-business-impact-supply-chains/"&gt;enhanced role&lt;/a&gt;&amp;nbsp; in the world economy and global supply chains. Back in 2003, China produced a mere 5% of the &lt;a href="https://www.dw.com/en/coronavirus-outbreak-china-and-the-world-economy-worse-than-sars/a-52253833"&gt;Global GDP&lt;/a&gt;, which has since increased nearly four times to 16%, with &lt;a href="https://www.cnbc.com/2020/02/05/coronavirus-how-china-economy-has-changed-since-sars.html"&gt;similar rise&lt;/a&gt;s&amp;nbsp; in Chinese imports, exports,&amp;nbsp; services sector and tourism. Emerging as a public health emergency and global pandemic over the past few months, there have been 7 million confirmed cases of COVID-19 and nearly 4,00,000 deaths worldwide.&amp;nbsp; The resultant economic impact has also been devastating for most affected countries. In most instances, it can be traced back to China’s integral role as the “world’s factory.”&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;As the situation worsened in January, the response from China was drastic, with complete lockdowns of cities and provinces giving free reign to the &lt;a href="https://www.reuters.com/article/us-china-health-surveillance-idUSKBN2011HO"&gt;surveillance state&lt;/a&gt; to control the lives of its citizens. The province of Hubei with a population of 58 million people was completely isolated from the rest of the country and millions of businesses worldwide, as it was placed in strict lockdown for months.&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;The adverse impact of a viral outbreak in a city was compounded greatly by the rate at which it can spread due to the efficiency of modern transport systems. The Chinese aviation sector being one of the largest in the world led to the rapid spread of COVID-19 across a number of countries. Beyond the impact on human lives, it has also exposed the pitfalls of placing complete reliance on one manufacturing hub.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;Through this two part blog post, two broad impacts will be addressed– in part one, the impact of China’s shutdown on global supply chains and economy and in part two, the implications for the future of 5G technology. The latter would also include how China has strategically leveraged its near monopoly status in certain sectors, its earlier recovery, and the vulnerable economic position of states as effective tools to further its lead in the all-important 5G tech race.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;&lt;strong&gt;BLOG POST 1 : Global Supply Chains&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;&lt;strong&gt;Disruption of Global Supply Chains&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;Internationally, the manufacturing industry is structured within the intertwined nature of global supply chains. This implies that a break in the flow of production and distribution of one part of the chain would have a compound effect on the interconnected global economy. It would prevent the manufacture of finished products in several other countries which are dependent on a specific region for components. However, these highly interdependent supply chains have only developed over the last three decades, with &lt;a href="https://www.scmp.com/economy/china-economy/article/3083858/coronavirus-evidence-demand-shock-wave-chinas-economy-piles"&gt;China’s extensive expansion&lt;/a&gt; and a massive push towards globalisation from the 1990s. China emerged as an &lt;a href="https://www.forbes.com/sites/kenrapoza/2019/09/03/why-american-companies-choose-china-over-everyone-else/#934a88c71de2"&gt;industrial hub&lt;/a&gt; for several reasons which inter alia include: a low-cost workforce, extremely efficient manufacturing capabilities, lower tax rates, and streamlined logistics – placing it miles ahead of competing developing economies. This would provide companies with two particular benefits – extremely low production cost and a significant increase in profit margins. For businesses in the West, it became nearly impossible to compete with another that was manufacturing in China because they had significantly larger margins to undercut them on cost. Thus, businesses globally gravitated towards China as a manufacturer and provider of essential components with no readily available alternatives.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;The resultant global supply chains tend to be rather &lt;a href="https://hbr.org/2020/03/coronavirus-is-a-wake-up-call-for-supply-chain-management"&gt;opaque in their functioning&lt;/a&gt;, due to the prohibitively high investment of time and resources required in supply network mapping (the process of figuring out where each component of a product is sourced from).&amp;nbsp; As a direct consequence, most companies tend to not have sufficient clarity on when disruptions are likely and &lt;a href="https://blogs.thomsonreuters.com/answerson/covid-19-vulnerability-global-supply-chains/"&gt;no conceivable back-up plans&lt;/a&gt;. This has been witnessed in previous disasters such as the 2011 tsunami and earthquake in Japan when &lt;a href="https://www.automotivelogistics.media/after-the-disaster-in-japan/7408.article"&gt;several automobile companies were oblivious to the supply chain disruptions&lt;/a&gt; for several weeks and production was halted globally.&amp;nbsp; Yet, the troubles caused by placing reliance on a single supplier has not led to companies across sectors taking major steps to remedy the situation.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;The lack of prior estimation of such an incident and creation of response plans despite a similar, albeit much smaller coronavirus outbreak (&lt;a href="https://www.who.int/whr/2003/en/Chapter5.pdf?ua=1"&gt;SARS-CoV&lt;/a&gt; in 2003) recently, has halted production across sectors US, Germany, France and others. The global supply chains have &lt;a href="https://blogs.thomsonreuters.com/answerson/covid-19-vulnerability-global-supply-chains/"&gt;broken down&lt;/a&gt; in sectors ranging from machinery, aviation,&amp;nbsp; pharmaceuticals, medical equipment, apparel, automobiles, and technology.&amp;nbsp; This is majorly due to the limited inventories and paucity of substitutable source for components.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;As per reports of a &lt;a href="https://www.instituteforsupplymanagement.org/news/NewsRoomDetail.cfm?ItemNumber=31171&amp;amp;SSO=1"&gt;survey conducted by the Institute for Supply Management&lt;/a&gt;, nearly 75% of companies have faced supply chain disruptions due to China’s lockdown measures and transportation restrictions – showing the level of unpreparedness that most businesses are at within the current global crisis. A second &lt;a href="https://www.dnb.com/content/dam/english/economic-and-industry-insight/DNB_Business_Impact_of_the_Coronavirus_US.pdf"&gt;study conducted by Dun &amp;amp; Bradstreet&lt;/a&gt;&amp;nbsp; found that nearly 51,000 companies had direct suppliers in Wuhan itself – and the province has facilities which are Tier-2 suppliers for nearly 5 million companies in the world. Both multinationals and small businesses depend on China for either finished products or essential components – this enhances the economic impact with production being disrupted across all levels. So when China’s factories are closed, half the world’s factories across diverse sectors cannot continue production beyond the inventory they possess.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;&lt;strong&gt;Excessive dependence?&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;The Sino-American Trade war had already &lt;a href="https://www.reuters.com/article/us-nintendo-china/nintendo-says-to-shift-part-of-switch-console-production-out-of-china-idUSKCN1U40HR"&gt;stressed supply chains&lt;/a&gt; sufficiently over the past two years and China’s shutdown ended up being the last straw. Two key areas that have been impacted – critical medical equipment production (given the public health emergency) and the technology industry. The two have also been strategically linked by China to extract important geo-political benefits.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;The response to the pandemic exposed the world’s over-dependence on China for key medical equipment including PPE, ventilators, and N95 masks which became &lt;a href="https://www.theguardian.com/world/2020/apr/28/face-masks-coveted-commodity-coronavirus-pandemic"&gt;highly valued&lt;/a&gt; as infection numbers rose.&amp;nbsp; China produced nearly half of the world’s &lt;a href="https://www.wsj.com/articles/why-the-richest-country-on-earth-cant-get-you-a-face-mask-11585741254"&gt;N95 respirators&lt;/a&gt; before the pandemic and with production in overdrive, it accounts for 85% . With China looking to use it as a bargaining chip, it had soured US-China relations further.&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;China’s integral role in the global electronics and technology industry produced a definitive impact on production for US companies and the rest of the world.&amp;nbsp; Even the smartphone market which has witnessed consistent growth over the past decade has seen a &lt;a href="https://www.idc.com/getdoc.jsp?containerId=prUS46264320"&gt;decline in the first quarter&lt;/a&gt; of 2020. Apple was one of the first tech companies to acknowledge the impact on revenues and smartphone sales world over. Thus, the shutdown of China’s factory floors had created a supply side problem which soon evolved into a &lt;a href="https://www.idc.com/getdoc.jsp?containerId=prUS46264320"&gt;demand crunch due to lockdowns&lt;/a&gt; being imposed in all major economies.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;The smartphone market demand crunch is indicative of a larger pattern of a sharp fall in demand across industries in the West. &lt;a href="https://www.scmp.com/economy/china-economy/article/3083858/coronavirus-evidence-demand-shock-wave-chinas-economy-piles"&gt;South Korea&lt;/a&gt;, one of the top exporters, has witnessed a 46.3% fall in exports as per its May numbers. Even in early March, a &lt;a href="https://unctad.org/en/pages/newsdetails.aspx?OriginalVersionID=2297"&gt;UNCTAD report&lt;/a&gt; estimated that global value chains had already suffered a loss of $50 billion, due to COVID-19 related shutdowns, of which the major impact has been on the US, EU, Japan and South Korea. Just two months later, the estimated losses to the global economy stand at $5.8-8.8 trillion, as per a &lt;a href="https://thewire.in/economy/covid-19-global-economy-could-witness-losses-worth-up-to-8-8-trillion"&gt;report by the Asian Development Bank&lt;/a&gt;. China’s production shutdown along with the continued spread of COVID-19 has caused a catastrophic domino effect for the global economy which cannot be overstated.&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;&lt;strong&gt;Path ahead for Global Supply Chains &amp;amp; China’s Role&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;China has been slowly trying to get production back up with &lt;a href="https://www.washingtonpost.com/world/asia_pacific/infrared-cameras-personal-towels-china-factories-go-to-extremes-to-fend-off-virus/2020/04/08/4aae5036-722c-11ea-ad9b-254ec99993bc_story.html"&gt;increased safety measures&lt;/a&gt; in place and stood at around &lt;a href="https://www.chicagotribune.com/coronavirus/ct-nw-coronavirus-china-restarting-economy-20200416-dmrwgw56q5bu3cvopwoojqek7y-story.html"&gt;80% of earlier levels&lt;/a&gt; in April. Nonetheless the devastating impact of the pandemic has caused several states to re-evaluate their strategies of complete reliance on China for essential components. The sole dependence on China for essential components must be cut down despite the lower margins it provides simply because of the possibly incalculable damage caused by such an event.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;An overarching trend among countries largely dependent on China has been their government’s push to decouple from China’s supply chains by setting-up of manufacturing facilities in South-East Asia. A number of businesses had been considering &lt;a href="https://www.atlanticcouncil.org/blogs/new-atlanticist/achieving-supply-chain-independence-in-a-post-covid-economy/"&gt;a transfer of part of their production centres&lt;/a&gt; to other Asian countries including India and other South-East Asian nations. These include the US tech giants – &lt;a href="https://www.cnbc.com/2020/03/05/coronavirus-apple-microsoft-google-look-to-move-production-away-from-china.html"&gt;Apple, Microsoft and Google&lt;/a&gt; as well as Samsung, Intel, Nike and Adidas, that are considering a shift in partial production to Vietnam and Thailand. As a reactionary measure, governments in the &lt;a href="https://www.bbc.com/news/world-us-canada-52398980"&gt;United States&lt;/a&gt; and &lt;a href="https://www.independent.co.uk/news/world/europe/coronavirus-eu-economy-recovery-lockdown-stimulus-package-a9480996.html"&gt;the EU&lt;/a&gt; have announced economic stimulus packages with figures in trillions. Within these stimulus packages some countries such as &lt;a href="https://www.scmp.com/news/asia/east-asia/article/3079126/japan-pay-firms-leave-china-relocate-production-elsewhere-part"&gt;Japan&lt;/a&gt; have offered incentives in billions of dollars to firms for shifting production out of China.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;Even though the US had signed phase one of a “historic”&lt;a href="https://www.nytimes.com/2020/01/15/business/economy/china-trade-deal.html"&gt; trade deal&lt;/a&gt; with China in January 2020, signalling a short truce after the trade wars, Trump has pushed the pedal back on sanctions in May. These include &lt;a href="https://www.economist.com/leaders/2020/05/23/america-is-determined-to-sink-huawei"&gt;sanctions targeting Huawei&lt;/a&gt; to cover up loopholes which allowed American companies with facilities abroad to continue supplying components to China - including the all important semiconductor chips used in most Huawei devices and 5G base-stations. China has stated that they will retaliate with&amp;nbsp; &lt;a href="https://www.usnews.com/news/business/articles/2020-05-17/china-warns-us-of-all-necessary-measures-over-huawei-rules"&gt;all necessary measures&lt;/a&gt; suggesting the trade wars are only likely to heighten once again. There have also been reports that China, taking a leaf out of the US’s ‘lawfare’ strategy, intends to launch innumerable &lt;a href="https://www.dailymail.co.uk/news/article-8330319/China-Nuke-bomb-Apple-endless-investigations-retaliation-Huawei-penalties.html"&gt;investigations into US tech companies&lt;/a&gt; in retaliation. The sanctions could include investigations into companies such as Apple, Cisco, and Qualcomm that are heavily reliant on Chinese suppliers along with a prospective ban on Boeing aircrafts being purchased in China.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;In light of the fresh sanctions and pressure on Johnson from his own party, even the UK has announced its intentions of forming a &lt;a href="https://theprint.in/world/uk-wants-5g-alliance-of-10-countries-including-india-to-avoid-reliance-on-chinese-huawei/431735/"&gt;5G alliance&lt;/a&gt; of democratic nations - the D10 - independent of Chinese reliance. (US sanctions on Huawei and the 5G alliance will be addressed in further detail in Part Two). China’s economic sanctions against Australia as retaliation for official investigations demands on the origin of the virus has caused Australia to consider &lt;a href="https://theconversation.com/australias-links-with-china-must-change-but-decoupling-is-not-an-option-137391"&gt;reducing complete reliance&lt;/a&gt; on China as the primary market for its goods but stopping short of decoupling due to their mutual dependence.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;Another strong indicator of a prominent economy looking to limit China’s impact in its economy and supply chains has been India’s move to&lt;a href="https://www.business-standard.com/article/economy-policy/india-blocks-automatic-fdi-route-for-neighbours-to-curb-hostile-takeovers-120041900010_1.html"&gt; block the automatic FDI route&lt;/a&gt; for neighbours given the “volatile business climate” in the COVID-19 hit economy. India’s clear intention is to prevent hostile takeover of businesses in India by Chinese firms and their rising commercial&amp;nbsp; influence in India’s markets. All of these moves certainly suggest that several major economies are looking to reduce their economic reliance on China and diversify their supply chains.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;With several countries looking to decouple their supply chains from China, geo-economic relations could be starkly different from the standards of normalcy. However, shifting production away from China and reducing their dependency presents several complex obstacles. China’s &lt;a href="https://www.brinknews.com/coronavirus-global-supply-chain-reliance-china-manufacturers-economic-recession-risk/"&gt;infrastructure and supply of highly-skilled workers&lt;/a&gt; in the technology and electronics industry are difficult to replicate elsewhere. Creation of adequate replacement for &lt;a href="https://www.cnbc.com/2020/03/05/coronavirus-apple-microsoft-google-look-to-move-production-away-from-china.html"&gt;component manufacturing&lt;/a&gt; particularly is likely to take several years to develop capacity and infrastructure as well. Even if manufacturing processes are shifted outside China, companies may still have to rely on China for component sourcing, one of the major causes for the current breakdown of supply chains. Nintendo had &lt;a href="https://www.reuters.com/article/us-nintendo-china/nintendo-says-to-shift-part-of-switch-console-production-out-of-china-idUSKCN1U40HR"&gt;partially transferred&lt;/a&gt; production of Switch consoles to Vietnam in 2019. In the wake of China’s shutdown, the console has been unavailable in stores since component supply dried up from China.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr" align="left"&gt;Even if a large swathe of countries is miraculously successful in reducing their economic reliance on China – the pattern of continued dependence displayed by companies like Nintendo in the technology sector point towards China’s continued importance. Its domination in 5G network infrastructure is also likely to continue - as will be mentioned in the subsequent blog post- this further entrenches the world’s reliance on China in the manufacture and deployment of technology. China is already slated to &lt;a href="https://www.china-briefing.com/news/china-will-lead-global-economic-recovery-covid-19/"&gt;lead the global economic recovery&lt;/a&gt; since it is well ahead of other states and one of the only major economies likely to grow this year.&amp;nbsp;&lt;/p&gt;
&lt;p align="left"&gt;&lt;span id="docs-internal-guid-ba8c69d6-7fff-22b8-ec77-fd3c05fefc46"&gt;China has also displayed a willingness to take action to kickstart the process of global economic recovery by engaging and providing aid through several multilateral fora - including the &lt;/span&gt;&lt;a href="https://www.aa.com.tr/en/asia-pacific/china-ready-to-include-asean-in-2b-covid-19-aid/1857846"&gt;ASEAN&lt;/a&gt;, the Central and Eastern European States under its controversial 17=1 Mechanism, the ten Pacific Island states, and the Arab League. The US, under Trump, has been adopting a policy of ‘&lt;a href="https://www.theatlantic.com/ideas/archive/2020/03/america-first-is-making-the-pandemic-worse/608401/"&gt;America First&lt;/a&gt;’ which led to a lack of crucial international cooperation during the pandemic with other countries adopting export controls on essential products too. Furthermore, the US decision to cut funding from the WHO in the midst of a pandemic only brought further harms to their soft power and position as an international leader. The key advantages held and actions taken by China, in contrast to the US’s apathy could ensure their emergence as a winner in the emerging global economic order of the post-pandemic world.&amp;nbsp; The control of global supply chains entrenched in Chinese domination seems unlikely to witness a radical shift because of the very over-dependence on China. This factor coupled with its earlier economic recovery from the pandemic highlight the importance it will continue to play in global economic affairs. &amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="left"&gt;&lt;em&gt;(Nikhil Dave is a student at the West Bengal University of National Juridical Sciences and a researcher at CIS. This post was edited and reviewed by Arindrajit Basu and Aman Nair&lt;/em&gt;)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/geo-economic-impacts-of-the-coronavirus-global-supply-chains-part-i'&gt;https://cis-india.org/internet-governance/geo-economic-impacts-of-the-coronavirus-global-supply-chains-part-i&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Nikhil Dave</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-06-16T08:17:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-debate-over-internet-governance-and-cyber-crimes-west-vs-the-rest">
    <title>The debate over internet governance and cyber crimes: West vs the rest?</title>
    <link>https://cis-india.org/internet-governance/blog/the-debate-over-internet-governance-and-cyber-crimes-west-vs-the-rest</link>
    <description>
        &lt;b&gt;The post looks at the two models proposed for internet governance and the role of cyber crimes in shaping the debate. In this context, it will also critically analyze the Budapest Convention (the “convention”) and the recently proposed Russian Resolution (the “resolution”), and the strategies adopted in each to deal with the menace of cybercrimes. It will also briefly discuss India’s stances on these issues.&lt;/b&gt;
        
&lt;p id="docs-internal-guid-39e165aa-7fff-b007-b454-3ccddd674db1" style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;With&amp;nbsp; Internet connectivity and use of technology rising exponentially, the tug of war over Internet governance continues. On one end are the states advocating for a global, open and free model of the Internet, dubbed as the ‘Western model’, spearheaded by the U.S. and its allies. On the other end are a cluster of states led by China and Russia, advocating for a sovereign and controlled version of the internet, a ‘Leviathan model’. Although the idea of an Internet embodying the principles of equality, openness and multistakeholderism sounds appealing, the rise of new trends including cyber crimes and online misinformation poses a challenge to this model making it arduous, if not impossible, to pick one model over the other.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The post will briefly explore the two models proposed for Internet governance and the role of cybercrimes in shaping the debate. In this context, it will also critically analyze the Budapest Convention (the “convention”) and the recently proposed Russian Resolution (the “resolution”), and the strategies adopted in each to deal with the menace of cybercrimes. It will also briefly discuss India’s stance on the convention.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Two Models and Three Parties&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Since the evolution of the Internet, its stewards have been expounding a &lt;a href="https://www.newamerica.org/cybersecurity-initiative/reports/digital-deciders/two-poles-and-three-clusters"&gt;global internet&lt;/a&gt; embodying features such as statelessness, openness, interoperability, security, and multistakeholderism. Known as the Western model of internet governance, it has been embraced by many states including UK, France. The model is premised on the idea that the&amp;nbsp; internet should be a space where there is free flow of content without filtering by any intervening party including the state, thereby&amp;nbsp; upholding the freedom of speech and human rights. However since the potential to cause harm in cyberspace is real, the states cannot leave the domain ungoverned. Therefore, the proponents of the Western model do exercise &lt;a href="https://www.cfr.org/blog/how-much-cyber-sovereignty-too-much-cyber-sovereignty"&gt;some degree of sovereignty&lt;/a&gt; over cyberspace within their borders but it is largely in contrast to the tight control exercised by the &lt;a href="https://www.newamerica.org/cybersecurity-initiative/reports/digital-deciders/two-poles-and-three-clusters"&gt;statist and controlled model&lt;/a&gt;, spearheaded by China and Russia. The latter model advocates for a closed version of the internet bound by territorial borders along with authoritarian&amp;nbsp; control over the flow of information.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Interestingly, not every state can be easily categorized into either of these groups.&amp;nbsp; Some states either lack the capacity or an interest to implement one of the model. Tim Maurer et al. in a seminal paper identifies&amp;nbsp; such states as the “&lt;a href="https://www.cigionline.org/sites/default/files/gcig_paper_no2.pdf"&gt;swing states&lt;/a&gt;”. They are undecided on either of the models but have the capacity to influence global conversations due to their mixed political orientations and resources. Swing states and the influence they wield in shaping the trajectory of the international process is not the focus of this post but will be explored in a future blog post.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Cyber Crime: The Menace of Internet Era&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;While the internet has&amp;nbsp; huge potential to enable development of states on many fronts, it can also be used for criminal purposes. &lt;a href="https://www.thirdway.org/report/countering-the-cyber-enforcement-gap-strengthening-global-capacity-on-cybercrime"&gt;Cybercrime&lt;/a&gt; is one of the most daunting challenges of the internet era. Technological advancements that enable unique features like anonymity in cyberspace make cybercrimes less risky with the&amp;nbsp; potential to provide high returns, making it all the more appealing to various actors. The growing number of internet users and connected devices increases the number of possible targets. Examples include &lt;a href="https://www.csoonline.com/article/3218104/what-is-stuxnet-who-created-it-and-how-does-it-work.html"&gt;Stuxnet&lt;/a&gt;, a malware that targeted the Iranian nuclear facility, and &lt;a href="https://www.csoonline.com/article/3227906/what-is-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.html"&gt;Wannacry&lt;/a&gt;, a ransomware attack that affected computers worldwide. In 2018, the Chief of &lt;a href="https://news.un.org/en/story/2018/05/1009692"&gt;United Nations Office on Drugs and Crime&lt;/a&gt; (UNODC) pointed out that cyber crimes are estimated to generate revenue of approximately $1.5trillion per year. Despite cyber crimes proliferating rapidly, law enforcement agencies have not been able to keep up the pace resulting in an &lt;a href="https://www.thirdway.org/report/countering-the-cyber-enforcement-gap-strengthening-global-capacity-on-cybercrime"&gt;enforcement gap&lt;/a&gt;. The transnational nature of cyber crimes is one of the major difficulties faced by them. Due to its global nature, cyberspace provides a platform for criminals to commit crimes out of one state, which could have the potential to affect multiple victims in different states. This means investigations of such crimes involve questions of extra territorial jurisdictions and increased cooperation between authorities of different states, creating various complications. This, coupled with diverse types of actors such as states, non-state actors, and groups hired by either of the two further complicates the issue at hand.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The Convention on Cybercrime of the Council of Europe, known as the &lt;a href="https://www.europarl.europa.eu/meetdocs/2014_2019/documents/libe/dv/7_conv_budapest_/7_conv_budapest_en.pdf"&gt;Budapest Convention&lt;/a&gt;, is the only international instrument currently in place that addresses the issue of cyber crime. Recognizing the paramount need for combating crimes, it criminalizes&amp;nbsp; conduct that affects the “confidentiality, integrity, and availability of computer systems, networks, and computer data”. It covers a diverse rangeof issues ranging from illegal access, computer related fraud to child pornography. Furthermore, it serves as an instrument that facilitates greater cooperation among states to enable better detection, investigation, and prosecution of cyber crimes.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The wide division of opinions on internet governance is also mirrored in the debate on how to effectively tackle the issue of cybercrime. This led to a recent development in last year’s General Assembly in the form of a &lt;a href="https://www.undocs.org/A/74/401"&gt;Russian-led resolution&lt;/a&gt; on cybercrime. The resolution proposes the establishment of a committee of experts to draft a new cybercrime treaty that would replace the convention.&amp;nbsp; Considering the fact that Russia has been a strong advocate of a Leviathan model of internet, the proposed treaty would in most likelihood embrace principles of sovereignty and non-interference while dealing with cyber crimes.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;With the resolution passing the final &lt;a href="https://www.un.org/press/en/2019/ga12235.doc.htm"&gt;vote&lt;/a&gt; at the UN General Assembly, the proponents of the convention are met with a time bound challenge to come up with innovative approaches to convince more states to join their side.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;The Budapest Convention v. The Russian Resolution&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The Budapest Convention has met with multiple criticisms, the major one being that it is a West drafted treaty with hardly any involvement of the developing countries. It’s also argued that as the treaty is almost two decades old, its provisions are too outdated to deal with evolving crimes. Furthermore, it is criticized for the vagueness of some of its provisions, which allow governments to bifurcate their obligations, and thereby hinders the effective implementation of the treaty. For example, the MLA regime of the treaty is often cited as &lt;a href="https://cis-india.org/internet-governance/blog/vipul-kharbanda-april-29-2019-international-cooperation-in-cybercrime-the-budapest-convention"&gt;ineffective&lt;/a&gt; as it does not command firm cooperation from parties by providing them grounds to refuse the same.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Despite being imperfect, a realistic analysis of the convention would reveal that it is the best instrument at hand to deal with cyber crimes. The convention, establishing common standards for its signatories, along with the &lt;a href="https://www.coe.int/en/web/cybercrime/tcy"&gt;Cybercrime Convention Committee&lt;/a&gt; (the “Committee”) that oversees its implementation and Programme Office on Cyber Crime (the “C-PROC”) dedicated towards capacity building,&amp;nbsp; provides a dynamic framework for effectively tackling cybercrimes. The Committee ensures that the convention is adapted to address evolving crimes such as denial of service attacks and identity thefts, which did not exist at the time the convention was adopted, by issuing guidance notes and draft protocols. Similarly on the issue of procedural law, despite new developments such as cloud servers, the Committee is actively working on addressing the complicated challenges posed by it. It has proposed an &lt;a href="https://ccdcoe.org/incyder-articles/council-of-europe-ponders-a-new-treaty-on-cloud-evidence/"&gt;additional protocol&lt;/a&gt; to specifically deal with access to evidence in the cloud by facilitating more efficient mutual legal assistance amongst the signatories and direct cooperation with service providers, while striking a balance between rule of law and human rights. The protocol if adopted would not only aid in the law enforcement process but would also have a major impact on how the international community perceives sovereignty in cyberspace. Furthermore, The &lt;a href="https://www.coe.int/en/web/cybercrime/cybercrime-office-c-proc-"&gt;C-PROC&lt;/a&gt; through its various capacity building initiatives such as strengthening of the legislations along the lines of rule of law and human rights, training of relevant authorities, promotion of public-private partnerships and international cooperation strengthens the ability of states to deal with cyber crimes.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;While the international community is unable to arrive at a consensus on internet governance, with neither conglomerate of states acceding to the demands of the other, renewing global diplomatic negotiations on it might seem to be the best step. However a look at Russia’s resolution and its &lt;a href="https://www.rusemb.org.uk/fnapr/6394"&gt;draft cyber crime convention&lt;/a&gt; would indicate that it might not be the appropriate solution to the problem at hand. The resolution as well as the draft convention, which is supposed to serve as a framework for the treaty, are drafted without due regard for &lt;a href="https://www.apc.org/sites/default/files/Open_letter_re_UNGA_cybercrime_resolution_0.pdf"&gt;human rights concerns&lt;/a&gt;.&amp;nbsp; A mere reference to human rights, requiring use of ICTs to be in compliance with human rights and fundamental freedoms, is insufficient to safeguard it while combating cyber crimes. Primarily, the language used in the resolution is vague.It fails to define “use of information and communication technologies for criminal purposes". It mentions both cyber enabled crimes such as use of ICTs for trafficking as well as cyber crimes that could detrimentally affect “critical infrastructures of states and enterprises” and “well-being of individuals”. Such broad wording is highly problematic as it vests immense powers at the hands of the state to criminalize even ordinary online behaviour that is detrimental to its interests. In fact, such practices are already in existence around the world where we see governments clamping down on human rights activists, journalists, and civil society for expressing their opinions that are critical of the government in the online space. Numerous examples of such authoritarian actions include &lt;a href="https://internetshutdowns.in/"&gt;internet shutdowns&lt;/a&gt;, blocking of websites, which have become the trend around the world. While legislations curbing cyber crimes are quintessential to ensure a safe and secure cyberspace, arbitrary use of it, as is widely observed, today can have chilling effects on exercising rights in the online domain.&amp;nbsp; Furthermore, combating a complex issue like cyber crime, which involves questions of technicalities, laws, and human rights, requires concerted efforts from various stakeholders including civil society and private sector. It is only through such multistakeholder endeavors that we can curb the use of ICTs for criminal purposes without hindering human rights. Therefore an ad hoc intergovernmental group of experts, as proposed by the resolution, is not the appropriate body to develop an international treaty on cyber crimes.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In short, the resolution and the draft convention are proposing a Leviathan model vesting state with excessive control over the internet. In practice, it would bear resemblance to the “&lt;a href="https://dgap.org/en/research/publications/deciphering-russias-sovereign-internet-law"&gt;sovereign internet law&lt;/a&gt;” of Russia and the “&lt;a href="https://cs.stanford.edu/people/eroberts/cs181/projects/2010-11/FreedomOfInformationChina/the-great-firewall-of-china-background/index.html"&gt;Golden Shield Project&lt;/a&gt;” of China. Such models are widely criticized for eschewing democratic principles in the name of ensuring security of the state from cyber attacks. For instance, the “sovereign internet law” mandates installation of technical equipments for counteracting threats to stability, security, and functional integrity of the internet.” The law, therefore, allows the government to prevent any communication that challenges its interests. A &lt;a href="https://www.nytimes.com/2018/04/18/world/europe/russia-telegram-shutdown.html"&gt;past attempt by &lt;/a&gt;the Russian government to block Telegram, is an example of the same. Furthermore, in the event of a “threat”, the law provides for routing of traffic solely through networks located within Russia, thereby allowing isolation of the national network and centralized control over it by the state. It paves the way for creation of digital borders, premised on the principle of state sovereignty. The “&lt;a href="https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown"&gt;Great Firewall of China&lt;/a&gt;”, a part of the “Golden Shield Project”, is the most appropriate depiction of &lt;a href="https://theglobepost.com/2019/04/23/internet-sovereignty/"&gt;internet sovereignty&lt;/a&gt;. The Firewall serves as a system of surveillance that vests the government with complete control over all incoming and outgoing information over the Chinese networks. Any new domain has to obtain prior approval from the government before becoming accessible on the Chinese internet. When it comes to the question of human rights, a mere search for the term “democracy” in a search engine is &lt;a href="http://cyberjustice.blog/index.php/2019/07/17/china-the-great-firewall-cyber-sovereignty-freedom-of-speech-and-international-law/"&gt;blocked&lt;/a&gt;. The resolution by leaving the question of what amounts to use of ICTs for criminal purposes open-ended creates the danger of exercising of similar excessive powers by the states that could impinge upon fundamental human rights. The draft convention already incorporates the principle of state sovereignty. If adopted, it comes with the risk of us seeing the likes of Chinese model of the internet in greater numbers.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The convention is not perfect but we should be realistic and not expect one treaty to solve all problems at a go. The convention, coupled with its &lt;a href="https://rm.coe.int/16802e726c"&gt;follow-up&lt;/a&gt; and&amp;nbsp; &lt;a href="https://www.coe.int/en/web/cybercrime/cybercrime-office-c-proc-"&gt;capacity-building&lt;/a&gt; mechanisms are making positive developments in addressing evolving cyber threats while promoting a global and open internet . With as many as &lt;a href="https://www.coe.int/en/web/cybercrime/parties-observers"&gt;65 parties&lt;/a&gt; and many using it as the model for their national cyber crime legislation, a new treaty to address cyber crimes pose the risk of hindering the developments made by the convention so far especially in the international cooperation front. Concerted efforts to improvise the convention are more practical than developing a new international framework, especially when the probability of reaching a consensus is almost nil.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;India and the Budapest Convention: To Ratify or Not&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Despite cybersecurity being a major concern and occupying a central place in its overall internet governance policy, India has surprisingly not yet become a party to the convention. It has even amended its Informational Technology Act, 2008 along the lines of the convention. India’s reluctance to sign, notwithstanding the convention’s potential to aid it in addressing its concerns in the cyber front especially with regard to jurisdictional issues while tackling cyber crimes, warrants an analysis.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;One of the widely cited reasons for the reluctance is the &lt;a href="https://internetdemocracy.in/reports/india-and-the-budapest-convention-to-sign-or-not-considerations-for-indian-stakeholders/"&gt;non-inclusion&lt;/a&gt; of India and other developing countries in the drafting stage. However choosing to stand on the sidelines merely because of non-inclusion in the initial negotiations might not be the wisest move especially since the convention addresses matters that are of extreme importance to India. Ratifying the treaty even at a later stage would still enable it to participate in further evolution of the convention, which could outweigh this concern. Another major concern for India is that &lt;a href="https://internetdemocracy.in/reports/india-and-the-budapest-convention-to-sign-or-not-considerations-for-indian-stakeholders/"&gt;terrorism&lt;/a&gt;, considering how cyberspace has enlarged its scope and reach, does not find any mention in the substantive law of the convention. However the procedural provisions of the convention apply to any criminal offence committed with the aid of a computer, including terrorism. But it is &lt;a href="https://www.orfonline.org/expert-speak/india-and-the-budapest-convention-why-not/"&gt;often argued&lt;/a&gt; that the MLA regime is not sufficiently firm to facilitate cooperation. While it is true that the process has to be made more efficient, the Committee along with the Cloud Evidence Group is actively working on addressing its shortcomings. Finally, controversial provision-Ar.32, on cross border access to data- is also a cause for concern for India. The &lt;a href="https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent?documentId=09000016802e726a"&gt;Guidance Notes&lt;/a&gt; issued by the Committee, however, clarifies the limited scope of the article thereby addressing the privacy and data protection concerns raised against it.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The convention is still evolving and is constantly being reviewed to make it more effective. Therefore India has to ask itself the question whether it wants to stand on the sidelines and observe the developments or if it should partake in shaping its progress. Currently, it is the only instrument in place that provides a legal framework for facilitating cooperation on cyber crime investigations amongst various jurisdictions. Considering that India has already embarked on a “Digital India” initiative, which in most likelihood will be accompanied by a spike in cyber crimes, it is the need of the hour to ratify the convention.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;em&gt;Elizabeth Dominic is a lawyer and a tech-policy researcher. Her work focuses on the intersection of law and technology and human rights, particularly on the applicability of current international legal frameworks to cyberspace and emerging technologies. Previously, she has worked at the Centre for Communication Governance and at IT for Change.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;em&gt;
&lt;/em&gt;
&lt;p&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;em&gt;
&lt;/em&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;em&gt;This post was reviewed and edited by Aman Nair,Amber Sinha and Arindrajit Basu&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-debate-over-internet-governance-and-cyber-crimes-west-vs-the-rest'&gt;https://cis-india.org/internet-governance/blog/the-debate-over-internet-governance-and-cyber-crimes-west-vs-the-rest&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elizabeth Dominic</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-06-08T07:04:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/essay-watching-corona-or-neighbours-introducing-2018lateral-surveillance2019-during-covid201919">
    <title>Essay: Watching Corona or Neighbours? - Introducing ‘Lateral Surveillance’ during COVID-19</title>
    <link>https://cis-india.org/internet-governance/blog/essay-watching-corona-or-neighbours-introducing-2018lateral-surveillance2019-during-covid201919</link>
    <description>
        &lt;b&gt;Surveillance is already suspected to have become the ‘new normal’ considering the extensive amounts of money that is being invested by governments around the globe. The only way out of this pandemic is to take a humane approach to surveillance wherein the discriminatory tendencies of the people while spreading information  about those infected are factored in to prevent excessive harm.&lt;/b&gt;
        
&lt;p id="docs-internal-guid-723b0765-7fff-b509-3976-20d8fe80ff02" style="text-align: left;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;" dir="ltr"&gt;In &lt;a href="https://www.ft.com/content/19d90308-6858-11ea-a3c9-1fe6fedcca75"&gt;times of emergency&lt;/a&gt;, ‘immature and even dangerous technologies are pressed into service, because the risks of doing nothing are bigger.’ Several mechanisms undertaken by governments worldwide, in response to the COVID-19 pandemic, have been criticized for enabling State sponsored mass surveillance. There are certain long term impacts of these mechanisms, especially mobile applications that arm the State with seemingly accurate&lt;a href="https://www.bloombergquint.com/coronavirus-outbreak/covid-19-how-the-aarogya-setu-app-handles-your-data"&gt; and real time data of the individual&lt;/a&gt;. In this article, we explore the possibility&amp;nbsp; of these apps becoming tools of&amp;nbsp; lateral surveillance, i.e., the act of&amp;nbsp; citizens surveilling each other and becoming the ‘eyes and ears’ of the State, in the near future. Though these apps may be helpful tools for contract tracing in times of the COVID-19 pandemic, the long term implications of these short term measures may cost the members of the society their anonymity, freedom of speech and create obstacles in the creation of a healthy and friendly society. One such implication is the ‘skill of surveilling thy neighbour’ being enabled by these apps to a certain extent at the present.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;The governments across the &lt;a href="https://contegohumanitas.com/2020/04/13/covid-19-the-9-11-for-privacy/"&gt;globe&lt;/a&gt; have responded to COVID-19 through aggressive technological measures to trace individuals and enforce quarantine, costing individuals their privacy in exchange for the supposed benefit&amp;nbsp; to the collective public health. In the same week when the Karnataka Government &lt;a href="https://bangaloremirror.indiatimes.com/bangalore/others/government-publishes-details-of-19240-home-quarantined-people-to-keep-a-check/articleshow/74807807.cms"&gt;released a PDF with the &lt;/a&gt;names and addresses of around nineteen thousand international passengers who were quarantined in Bangalore, a man in Maharashtra was &lt;a href="https://www.ndtv.com/india-news/coronavirus-outbreak-man-beaten-up-for-sneezing-in-public-in-maharashtra-kolhapur-2197618"&gt;beaten up for sneezing in public&lt;/a&gt;. This stigma against anyone who could be potentially infected is not just prevalent in India but also in other countries. For example, in the &lt;a href="https://www.nytimes.com/2020/03/04/us/stigma-coronavirus.html"&gt;United States&lt;/a&gt;, a man who returned from a Cruise that had a COVID-19 carrier on&amp;nbsp; board, received death threats and personal attacks despite him being tested negative&amp;nbsp; for COVID-19. Though &lt;a href="https://www.nytimes.com/2020/03/23/world/asia/coronavirus-south-korea-flatten-curve.html"&gt;South Korea&lt;/a&gt; has been successful in flattening the curve of COVID-19 cases through aggressive contact tracing (using security camera footage, credit card records, even GPS data from cars and cellphones), excessive data was &lt;a href="https://www.theguardian.com/world/2020/mar/06/more-scary-than-coronavirus-south-koreas-health-alerts-expose-private-lives"&gt;exploited by internet mobs&lt;/a&gt; to hound infected individuals leading the government to minimize data sharing with the public. Escalations of a similar nature were evident in India as well when a woman was &lt;a href="https://www.huffingtonpost.in/entry/quarantined-govt-coronavirus-india_in_5e7da410c5b661492264fd39"&gt;harassed and boycotted&lt;/a&gt; by her neighbours after the Delhi government marked her house with a quarantine sticker. With implicit and explicit forms of ‘watching over your neighbours’, the question then arises, is it the virus we are required to keep a check on or the neighbour next door who is “suspected” of carrying the virus?&lt;/p&gt;
&lt;p style="text-align: left;" dir="ltr"&gt;&lt;strong&gt;What is Lateral Surveillance?&amp;nbsp;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;Surveillance, as is used in the &lt;a href="https://www.researchgate.net/publication/279673507_The_Public_Domain_Surveillance_in_Everyday_Life"&gt;hierarchical sense&lt;/a&gt;, is a vertical relationship between the person watching and the person being watched, which is usually the State and the citizen. All situations of surveillance &lt;a href="https://www.jstor.org/stable/3005718?seq=1"&gt;involve power relations.&lt;/a&gt; In the conventional form of surveillance, there is a direct power hierarchy between the State and the citizens, and the State determines the collection, control and use of data for ‘public good.’ Lateral surveillance, on the other hand&amp;nbsp; is a rather nuanced concept where citizens ‘keep an eye’ on other citizens and be vigilant of their acts.&amp;nbsp; In this setup, there is not a hierarchical relationship where the one being watched is in some way being controlled or is under the authority of the watcher. &lt;a href="https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/3359/3322"&gt;As described by Mark Andrejevic,&lt;/a&gt; surveillance relationships can be mutual, a horizontal relationship between person to person is referred to as lateral or peer to peer surveillance. He further describes it as “the use of surveillance tools by individuals, rather than by agents of institutions public or private, to keep track of one another, covers (but is not limited to) three main categories: romantic interests, family, and friends or acquaintances.”&lt;/p&gt;
&lt;p style="text-align: left;" dir="ltr"&gt;Sometimes, peer to peer surveillance is used to achieve emotional objectives such as community building and strengthening relationships with neighbours or tackling depression among the lonely. These emotional and social factors act as a driving force for lateral surveillance mechanisms creating a situation where privacy may be undermined for the betterment of the community. Surveillance technologies not only act as a tool for social control, but also as &lt;a href="https://www.researchgate.net/publication/264217485_Social_perspectives_of_surveillance_and_democracy"&gt;a tool for social exclusion&lt;/a&gt;. The mere requirement of Aarogya Setu as a &lt;a href="https://www.thehindu.com/news/national/aarogya-setu-app-mandatory-for-travel-on-15-special-trains-railways/article31563211.ece"&gt;‘mandatory condition’ to travel &lt;/a&gt;via Indian Railways is a massive social exclusion of a large population of people who do not have smartphones. Lateral surveillance thus makes it easier to identify between those who conform to the ‘norms’ and those who don’t.&amp;nbsp; For instance, even silent acts of not conforming with societal norms or opinion of the majority, threaten freedom of expression: during the lockdown to prevent the spread of COVID-19,&amp;nbsp; the citizens who chose not to participate in the activity of lighting of lamps (&lt;a href="https://economictimes.indiatimes.com/news/politics-and-nation/pm-modi-urges-countrymen-to-dispel-the-darkness-spread-by-coronavirus-by-lighting-a-candle-on-april-5/articleshow/74959545.cms?from=mdr"&gt;urged by the Prime Minister&lt;/a&gt;) were either &lt;a href="https://en.maktoobmedia.com/2020/04/06/modi-govt-take-lockdown-as-an-opportunity-to-witch-hunt-us-say-jamia-students-who-protest-pm-modis-9pm-appeal/"&gt;forced to conform&lt;/a&gt;, or were faced with a potential to be termed as&amp;nbsp; &lt;a href="https://twitter.com/one_by_two/status/1241350422964494336"&gt;‘anti-national’&lt;/a&gt; by some of their neighbours. In another instance, in South Korea, the &lt;a href="https://www.ft.com/content/f9037ad5-b0de-4dfe-afd8-795a16a3214a"&gt;LGBT&lt;/a&gt; community came under the scanner after a cluster of Coronavirus cases were reported from a particular area. This resulted in large-scale circulation of &lt;a href="https://www.dw.com/en/is-south-koreas-lgbt-community-being-scapegoated-for-covid-19-spread/a-53423958"&gt;homophobic content and comments &lt;/a&gt;against the patients who tested positive from the community. This not only made it difficult for authorities to collect information but also increased troubles for the people belonging to the sexual minority in getting tested.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;" dir="ltr"&gt;Lateral surveillance&lt;a href="https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/3359"&gt; creates a culture of suspicion,&lt;/a&gt; where everyone is looked at as a potential suspect.&amp;nbsp; In the times of COVID- 19, it translates into instances of being suspicious of the activity of a neighbour who could be potentially carrying the virus or someone who exercises his fundamental right to criticize the government. The practice of lateral surveillance is most harmful as it creates a culture of ‘hate’, ‘fear’ and ‘constant suspicion’ against an ‘enemy’.&amp;nbsp; Lateral surveillance has been used for multiple instances, wherever the State &lt;a href="https://www.brainscape.com/flashcards/lect-5-lateral-surveillance-2810389/packs/4705380"&gt;identifies that it &lt;/a&gt;“cannot be everywhere”. There have been several campaigns that have been launched to promote lateral surveillance. For example, the “if you see something, say something” &lt;a href="https://www.washingtonpost.com/posteverything/wp/2016/09/23/how-if-you-see-something-say-something-became-our-national-motto/"&gt;campaign&lt;/a&gt; launched after 9/11 attacks in the United States of America was an extreme form of lateral surveillance.&amp;nbsp; The campaign encouraged people to report ‘any suspicious activity’ which resulted in creating&lt;a href="http://www.femestella.com/end-see-something-say-something-campaign/"&gt; a culture of xenophobia &lt;/a&gt;and racism where innocent individuals were reported by their neighbours for crimes they did not commit. Thus, the culture of lateral surveillance ensures that a system is created wherein everyone has the duty to ‘keep an eye’ for ‘their own safety’ and &lt;a href="https://www.emerald.com/insight/content/doi/10.1016/S1521-6136(07)00210-2/full/html"&gt;this heightens the fear of crime in the society&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;&lt;strong&gt;Potential Lateral Surveillance issues with the Apps tracking Coronavirus&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;The priority of the government during such times is to take all available resources to address the emergency. However, these measures raise concerns about the invasion of privacy on account of public health considerations and balancing between the two conflicting interests. With the increase&amp;nbsp; in quarantine monitoring and Corona tracking apps, the question is: whether real time collection and availability of (some of this) information secures the safety of the people or build a culture of surveillance?&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;Among these measures, the most publicised one is the Indian Government’s Aarogya Setu app. The app which was initially released hastily with an incomprehensive/ambiguous privacy policy and later &lt;a href="https://analyticsindiamag.com/arogya-setu-app-gets-revised-privacy-policy/"&gt;replaced without notice&lt;/a&gt; to its users, is now being &lt;a href="https://inc42.com/buzz/govt-orders-ecommerce-companies-to-install-aarogya-setu-app-in-employees-mobile-devices/"&gt;mandated&lt;/a&gt; for not only certain groups who are on the frontline such as &lt;a href="https://www.broadcastandcablesat.co.in/prasar-bharati-makes-it-mandatory-for-staffers-to-install-arogya-setu-app/"&gt;journalists&lt;/a&gt;, &lt;a href="https://inc42.com/buzz/govt-orders-ecommerce-companies-to-install-aarogya-setu-app-in-employees-mobile-devices/"&gt;e-commerce employees&lt;/a&gt;, &lt;a href="https://www.indiatoday.in/technology/news/story/zomato-urban-company-make-aarogya-setu-app-mandatory-for-staff-delivery-partners-1670032-2020-04-23"&gt;delivery personnel&lt;/a&gt; but also is increasingly becoming a precondition to access &lt;a href="https://indianexpress.com/article/technology/tech-news-technology/aarogya-setu-app-mandatory-air-train-travel-more-list-6413841/"&gt;public places&lt;/a&gt;. The government and private entities alike are making the app compulsory for entering &lt;a href="https://twitter.com/nah_im_abdulla/status/1259123982726426625"&gt;apartments&lt;/a&gt;, travelling by the &lt;a href="https://www.businesstoday.in/current/economy-politics/download-aarogya-setu-bring-your-food-blankets-railways-to-passengers/story/403474.html"&gt;railways&lt;/a&gt; or the &lt;a href="https://theprint.in/india/when-delhi-metro-reopens-these-are-the-guidelines-cisf-wants-followed-by-commuters-staff/412289/"&gt;metro&lt;/a&gt;. The concept of ‘consent’ is seen eroding in the face of social pressure as the acceptance of the terms and conditions of the app is no longer an act free from coercion in the larger public interest. However, the Aarogya Setu app which exists over and above the various State Government apps to track COVID-19, enforce quarantine and spread awareness in the &lt;a href="https://citizenmatters.in/tracking-quarantine-tracing-cases-sharing-info-can-these-govt-issued-apps-help-fight-covid-19-17151"&gt;respective states&lt;/a&gt;, has come under the &lt;a href="https://www.bloombergquint.com/coronavirus-outbreak/covid-19-how-the-aarogya-setu-app-handles-your-data"&gt;radar&lt;/a&gt; for not meeting the &lt;a href="https://thedialogue.co/wp-content/uploads/2020/05/Privacy-Framework-for-the-Aarogya-Set-App.pdf"&gt;expected privacy standards&lt;/a&gt; such as minimal data collection, transparency to verify encryption techniques among others. The privacy policy of the app reveals that it maintains a record of all the places the user may have visited along with records of contact the user may have made with other users.&amp;nbsp; This exchange of personally identifiable information among people’s devices may become a point of attack for malicious actors as highlighted in the &lt;a href="https://drive.google.com/file/d/1UK5rElhcdP5T3Y-8fYP6cCgQKKpQBeOX/view"&gt;Working Paper&lt;/a&gt; of Internet Freedom Foundation. Concerns over the working and information storage of the app were also raised by an &lt;a href="https://medium.com/@fs0c131y/aarogya-setu-the-story-of-a-failure-3a190a18e34"&gt;ethical hacker&lt;/a&gt; who warned that “an attacker can get with a meter precision the health status” of someone anywhere in India. When seen from the lens of lateral surveillance, the information (stored on the server) is vulnerable to unwarranted exposure even though it is only meant to be shared with the government and other departments “formulate or implement an &lt;a href="https://meity.gov.in/writereaddata/files/Aarogya_Setu_data_access_knowledge_Protocol.pdf"&gt;appropriate health response&lt;/a&gt;”. What raises deeper issues is the wide scope of the government’s ability to share the response data in de-identified form with several government departments and third parties on a ‘strict necessity’ basis or for research purposes.&amp;nbsp; The possibility of the app being repurposed to meet multiple purposes cannot be overlooked. This potential for&amp;nbsp; excessive sharing and function creep are the basis for concerns over changing forms of surveillance, from traditional to lateral due to higher possibilities of leakage of personal information.&lt;/p&gt;
&lt;p style="text-align: left;"&gt;A fundamental problem that can be noticed here is that &lt;a href="https://cis-india.org/papers/ebola-a-big-data-disaster"&gt;an implementation of a public good &lt;/a&gt;is looked at as a binary. Each individual or organization in this pandemic performs their actions based on an “imaginary binary,” wherein the choice needs to be made between two equally worse options, created by their existing circumstances.&amp;nbsp; Surveillance is &lt;a href="https://www.economist.com/open-future/2019/12/13/surveillance-is-a-fact-of-life-so-make-privacy-a-human-right"&gt;regarded as &lt;/a&gt;‘binary’ in nature, &lt;a href="https://www.economist.com/open-future/2019/12/13/surveillance-is-a-fact-of-life-so-make-privacy-a-human-right"&gt;a tool used for both&lt;/a&gt; protection and control. For example, feminist legal theories &lt;a href="https://socialchangenyu.com/review/the-surveillance-gap-the-harms-of-extreme-privacy-and-data-marginalization/"&gt;have recognized that &lt;/a&gt;privacy used at either of the extremes (in the form of a binary) can result in affecting people’s autonomy.&amp;nbsp; These theories acknowledge that while surveillance regimes exist,&lt;a href="https://socialchangenyu.com/review/the-surveillance-gap-the-harms-of-extreme-privacy-and-data-marginalization/"&gt; there are ‘gaps’ created in the system &lt;/a&gt;to reinforce newer surveillance mechanisms. This gap can support vulnerable groups while&amp;nbsp; a ‘contextualized situation’ is created to ensure everyone’s rights are equally protected.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;It is important to note that implementing 'absolute surveillance’ without basic ethical considerations like how it would affect minority groups (religious minorities, LGBTQIA community etc.) creates a problem of the ‘binary’ between surveillance and privacy, especially since the ‘culture of surveillance’ is involved in the process. Similarly, when the government responds to the pandemic by leveraging technology as its option against protecting the interests of those who may be discriminated against due to such intrusive technologies while ignoring the ethical considerations such as &lt;a href="https://www.accessnow.org/cms/assets/uploads/2020/03/Access-Now-recommendations-on-Covid-and-data-protection-and-privacy.pdf"&gt;&amp;nbsp;transparency and openness&lt;/a&gt;, it creates an air of suspicion. For instance, inaccessibility or absence of privacy policies in the case of &lt;a href="https://www.deccanherald.com/national/south/coronavirus-tn-tracks-movements-of-home-quarantine-people-through-a-mobile-app-817853.html"&gt;Tamil Nadu&lt;/a&gt; &amp;amp; &lt;a href="https://play.google.com/store/apps/details?id=com.pixxonai.covid19wb"&gt;West Bengal&lt;/a&gt; Quarantine apps, heightens suspicion about the long term implications of such data collection activities. However, if ethical considerations are adopted in the implementation of these apps, lateral surveillance could be potentially avoided.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;Apps like &lt;a href="https://www.thehindu.com/news/national/karnataka/corona-watch-app-launched/article31193062.ece"&gt;Corona Watch&lt;/a&gt; and&lt;a href="https://www.indiatoday.in/india/story/karnataka-govt-demands-hourly-selfies-from-those-in-home-quarantine-1661654-2020-03-31"&gt; Quarantine Watch&lt;/a&gt;, are potential examples of such surveillance apps where the State collects personal data and the citizens are expected to be more vigilant towards each other. As these apps&amp;nbsp; increase the chances of &lt;a href="https://cpg.doc.ic.ac.uk/blog/evaluating-contact-tracing-apps-here-are-8-privacy-questions-we-think-you-should-ask/"&gt;users learning&lt;/a&gt; about who could have infected them (by showing the timing when an infected person visited a particular location on interactive maps). Though most of these apps currently available in &lt;a href="https://play.google.com/store/apps/details?id=com.pixxonai.covid19wb"&gt;West Bengal&lt;/a&gt;, &lt;a href="https://www.outlookindia.com/website/story/india-news-coronavirus-a-james-bond-inspired-mobile-app-helping-tamil-nadu-authorities-keep-track-of-quarantined-people/349478"&gt;Tamil Nadu&lt;/a&gt;, &lt;a href="https://www.news18.com/news/tech/maharashtra-govt-introduces-mahakavach-app-to-track-suspected-covid-19-cases-2560495.html"&gt;Maharashtra&lt;/a&gt; or &lt;a href="https://innovaccer.com/test-yourself-goa/"&gt;Goa&lt;/a&gt; are capable of being used as sophisticated tools for State surveillance through creation of heat maps, checking on those quarantined while monitoring containment zones, and potential database for&lt;a href="https://threatpost.com/covid-19-spurs-facial-recognition-tracking-privacy-fears/153953/"&gt; facial recognition&lt;/a&gt; because of selfies being sought from individuals at periodic intervals. The problem of lateral surveillance surfaces due to the potential of the same information being leaked to the public due to the lack of safeguards in the app and its design such as excessive data collection, third party exploitation of the data, lack of proper anonymization and encryption measures.&amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;The other problem is that these apps affect&amp;nbsp; the attitude of the people, making them more suspicious and wary as a community member. Since these apps make it more likely for personal information of nearby citizens to be revealed to other citizens, they encourage the practice of ‘watching over others’. They are being encouraged to stay updated about who is a possible threat to them or a vector of the virus, which is similar to the objective of neighbourhood watch schemes and peer surveillance programs. Instead of building a ‘healthy society’, there is increased suspicion, heightened fear of the virus, possibilities of &lt;a href="https://internetfreedom.in/quarantine-list/amp/?__twitter_impression=true"&gt;discrimination and ostracisation &lt;/a&gt;of those suspected of carrying the virus. Further, intrusive tracking and excessive health messaging can &lt;a href="https://www.thenewhumanitarian.org/opinion/2020/03/30/coronavirus-apps-technology"&gt;discourage citizens&lt;/a&gt;, making them feel bullied and stigmatised. As &lt;a href="https://www.cigionline.org/articles/digital-response-outbreak-covid-19"&gt;Sean McDonald&lt;/a&gt; writes, when these technologies which enable the use of individual information as a “representative sample for public health risk” can have dangerous unintended consequences “when paired with the kinds of panic, scarcity and desperation”in such public health emergencies.&lt;/p&gt;
&lt;p style="text-align: left;"&gt;The need for more security makes people more likely to detect threats in every different&amp;nbsp; action from the normal. This not only heightens the fear among everyone regarding the ‘perceived threat’ of the existence of a quarantined or infected patient, but it also creates a culture of vigilance, i.e. the people start to suspect everything and everyone. As Janet Chan &lt;a href="https://www.researchgate.net/publication/235285281_The_new_lateral_surveillance_and_a_culture_of_suspicion"&gt;mentions in her work&lt;/a&gt;- “such perceived threat has a tendency to ‘increase intolerance, prejudice, ethno-centrism, and xenophobia’. The consequence of the constant contact among neighbours may result in ethnic profiling, increased anxiety, communication overload and create potential tensions among them.” In &lt;a href="https://www.theguardian.com/world/2020/mar/06/more-scary-than-coronavirus-south-koreas-health-alerts-expose-private-lives"&gt;Seoul where a restaurant manager was&lt;/a&gt; “eavesdropping in people’s conversations” just to confirm whether or not they’re infected with the Coronavirus and in India where photos and videos of patients tested positive of COVID &lt;a href="https://economictimes.indiatimes.com/news/politics-and-nation/leaks-whatsapp-rumours-add-to-quarantine-blues/articleshow/74854472.cms?from=mdr"&gt;are circulated amongst whatsapp groups&lt;/a&gt;. Such forms of lateral surveillance in the physical world is already having a negative impact on the society. Especially in India, where the concept of social distancing &lt;a href="https://thewire.in/caste/social-distancing-dangers-india"&gt;mirrors and invokes distinct histories&lt;/a&gt; of caste hierarchies, even the most diluted form of social distancing is harmful as it reinforces this segregation of ‘touchable’ and ‘untouchable.’ The virus further aids the existing structures of inequality. Hence, social exclusion due to the ‘culture of suspicion’ is deepened further in such a society in times of&amp;nbsp; a crisis.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;" dir="ltr"&gt;The potential technological solutionism&amp;nbsp; of it through the aforementioned apps poses greater risks. The problem lies not only in the manner in which the individuals are being encouraged to seek more information but also the way in which the information is being handled by the State. Apart from the aforementioned apps, some States such as &lt;a href="https://twitter.com/internetfreedom/status/1245364494705897473"&gt;Delhi&lt;/a&gt;, &lt;a href="https://www.huffingtonpost.in/entry/kerala-police-quarantine-surveillance_in_5e7c801ac5b6cb9dc19ae2d9"&gt;Kerala&lt;/a&gt; and &lt;a href="https://www.thehindu.com/news/cities/Hyderabad/telangana-police-to-start-online-monitoring/article31171889.ece"&gt;Telangana&lt;/a&gt; are using softwares to track cell phone location for the purposes of contact tracing. In &lt;a href="https://twitter.com/kushalable/status/1260167230311895040"&gt;Ahmedabad&lt;/a&gt;, the MU Corporation map even reveals the&amp;nbsp; names and addresses of patients who tested positive. Further, the attitude of the people that creates social pressure on the State to reveal personal information as was seen in &lt;a href="https://caravanmagazine.in/commentary/covid-19-pandemic-quarantine-lists-right-to-privacy"&gt;Mohali&lt;/a&gt;. The fact that ‘social pressure’ is a justification for making public quarantine lists, the possibility of more information being rolled out through these apps in the future for the sake of one or a few persons’ protection cannot be ignored.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;Furthermore, as more personal data is gathered, the State needs to ensure that security standards and safeguards are maintained to prevent leakage of such data on social media as was already witnessed in &lt;a href="https://bangaloremirror.indiatimes.com/bangalore/others/government-publishes-details-of-19240-home-quarantined-people-to-keep-a-check/articleshow/74807807.cms"&gt;Karnataka&lt;/a&gt;, &lt;a href="https://economictimes.indiatimes.com/news/politics-and-nation/leaks-whatsapp-rumours-add-to-quarantine-blues/articleshow/74854472.cms?from=mdr"&gt;Delhi&lt;/a&gt; and &lt;a href="https://timesofindia.indiatimes.com/city/nagpur/home-quarantine-list-made-public-by-authorities/articleshow/74738773.cms"&gt;Nagpur&lt;/a&gt;. Even if these measures are being flagged as “necessary” to enforce quarantine or contain transmission, they are prima facie violative of the &lt;a href="https://www.article-14.com/post/death-of-privacy-in-the-time-of-pandemic"&gt;right to privacy&lt;/a&gt; of the people whose sensitive personal information is being disclosed like public property. There is no doubt that the right to privacy is not an absolute right, but neither the Epidemic Diseases Act, 1897 nor the National Disaster Management Act 2005 provide any explicit basis to disclose personal information of persons who have either been infected with the virus or who have been quarantined. Even if such disclosures can be justified as an act in good faith to prevent the outbreak of the disease under Section 4 the Epidemic Diseases Act or within the powers of the National Authority to take such measures for the prevention of disaster under Section 6(i) of the National Disaster Management Act, they need to be proportionate in nature and have a rational nexus with the legitimate aim sought to be achieved by the State (&lt;a href="https://indconlawphil.wordpress.com/2017/09/01/the-supreme-courts-right-to-privacy-judgment-vi-limitations/"&gt;test for which was laid down &lt;/a&gt;in Puttaswamy Judgment).&amp;nbsp; It is difficult to determine the connection between the careless disclosure of such sensitive information and prevention of the pandemic. There are less intrusive alternatives available. If public knowledge about an infected person’s residence and mobile phone number is going to assist the fight against the pandemic, then it is a clear case of lateral surveillance being encouraged by the State and that is the path to the ‘culture of suspicion’ as explained above.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;In the absence of a comprehensive data protection law (particularly where the State is bound and accountable as a data collection entity), there is no &lt;a href="https://www.article-14.com/post/death-of-privacy-in-the-time-of-pandemic"&gt;judicial recourse available &lt;/a&gt;if the data is used for purposes other than those mentioned in the privacy policies. In certain cases, the privacy policies have not even been made public. This raises more concerns about possibilities of the data being disclosed to unauthorised entities or retained and used for other purposes. This data, if made available or leaked to the public in such times, increases the risks of vigilantism and lateral surveillance resulting in potential discrimination and harassment. The State needs to recognize the risk of &lt;a href="https://www.ft.com/content/19d90308-6858-11ea-a3c9-1fe6fedcca75"&gt;normalization&lt;/a&gt; of these tools which if continued even after the pandemic could negatively affect the right to privacy not only vis-a-vis the State (as is already the case) but also vis-a-vis other members of society.&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;
&lt;/strong&gt;&lt;/p&gt;
&lt;div style="text-align: left;"&gt;&lt;strong&gt;&lt;strong&gt;Measures to Better Implement Contract Tracing and Reduce Lateral Surveillance&amp;nbsp;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;strong&gt;
&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;
&lt;/strong&gt;&lt;/p&gt;
&lt;div style="text-align: left;"&gt;&lt;strong&gt;&lt;strong&gt;1. Rule of Law and implementation of Privacy Principles :&amp;nbsp;&lt;/strong&gt;&lt;/strong&gt;Though the measures introduced for tracking Coronavirus are necessary and crucial in the times of a fast spreading pandemic, they also need to be tested against the requirements of legality and doctrine of proportionality as well. The test of legitimate state aim, necessity and proportionality acts as the guiding force for implementation of state actions that constrain privacy. Deployment of excessively intrusive means to further public health while &lt;a href="https://www.thehindu.com/opinion/op-ed/privacy-concerns-during-a-pandemic/article31456602.ece"&gt;restraining privacy &lt;/a&gt;without any legal basis will do more harm than good.&amp;nbsp; If the conflict between common good and individual privacy is resolved, the impact of the surveillance measures on people in general would reduce, thereby limiting the prospects of lateral surveillance. The path to prevent lateral surveillance goes through the path of reducing the scope of vertical surveillance itself. For instance, if the data collecting authority ensures that the system does not or is least likely to reveal any personal information of the user, then the risk of the same being available in public&amp;nbsp; is minimal. In this regard, the &lt;a href="https://web.swaraksha.gov.in/ncv19/privacy/"&gt;privacy policy&lt;/a&gt; of Aarogya Setu app states that the data will be stored in “anonymized, aggregated datasets for the purpose of generating reports, heat maps and other statistical visualisations for the purpose of management of COVID-19 in the country or to provide you general notifications pertaining to COVID-19 as may be required.” Further, it also provides that the personal information will not be shared with any third party.&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: left;"&gt;Although it is easier to brush aside the application of the privacy principles due to the lack of a comprehensive data protection law, a pandemic cannot be an excuse to forgo the application of these principles and the rule of law. Presently, India is witnessing instances of loss of privacy and confidentiality, stigmatization and rights violations which have been identified as harms of public health practice and surveillance by the&lt;a href="https://www.who.int/ethics/publications/epidemics-emergencies-research/en/"&gt; World Health Organization&lt;/a&gt;. In order to minimize the harm from surveillance, preventive measures such as avoiding collection of unnecessary identifiable information, limited access to collected data, secured data storage practices, pseudonymisation of collected data, definite period of retention of data and promotion of transparency, inclusiveness and openness, should be taken. For instance, Singapore’s &lt;a href="https://www.tracetogether.gov.sg/common/privacystatement"&gt;TraceTogether app&lt;/a&gt; provides a good example of application of data protection principles. The app collects only the mobile number and creates a random anonymized user ID, uses bluetooth, instead of the GPS location or WIFI or mobile network, stores data only on the phone of the user, and prevents third parties from identifying or tracking the user (employing &lt;a href="https://medium.com/searchencrypt/7-principles-of-privacy-by-design-8a0f16d1f9ce"&gt;privacy-by-design&lt;/a&gt;). The Privacy Policy of the app depicts how privacy principles can be put to work, with minimum data collection, allowing withdrawal of consent and minimal retention of data among other principles.&amp;nbsp; Though Aarogya Setu follows most of the aforementioned principles employed at global level as seen in the case of TraceTogether as well, it goes a step ahead to collect&amp;nbsp; even GPS location which may be considered an excessive means.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;" dir="ltr"&gt;Finally, it is essential that the use of these apps remains limited to the times of pandemic without paving the way for sophisticated surveillance, traditional or lateral, post the pandemic. And for privacy policy of Aarogya Setu mentions the use of information only for the “management of COVID-19” the concerns over the its use for an unidentifiable period of time in the future&amp;nbsp; are hinting at it becoming a surveillance tool in a world where people will have to live with Coronavirus.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;&amp;nbsp;2&lt;strong&gt;. Positive initiatives for improving mental health of citizens:&amp;nbsp;&lt;/strong&gt;We understand and acknowledge that the impact of lateral surveillance cannot be completely eradicated during a pandemic, we can suggest mechanisms in which initiatives encouraging surveillance can be better implemented by the State and the citizens. Since even a &lt;a href="https://caravanmagazine.in/health/india-digitial-response-covid-19-risks-inefficacy-exclusion-discrimination"&gt;“privacy preserving” app&lt;/a&gt; cannot comprehensively address the fundamental issues relating to the efficacy of contact tracing, intended or unintended consequences of social exclusion and discriminatory use, lateral surveillance can be turned on its head by &lt;a href="https://www.researchgate.net/publication/235285281_The_new_lateral_surveillance_and_a_culture_of_suspicion"&gt;ensuring that mutual care and trust &lt;/a&gt;is practiced instead of enabling surveillance.&amp;nbsp; The &lt;a href="https://www.mohfw.gov.in/pdf/MindingourmindsduringCoronaeditedat.pdf"&gt;Central &lt;/a&gt;&amp;nbsp;Government and several State Governments such as Maharashtra and &lt;a href="https://science.thewire.in/health/covid-19-kerala-mental-health/"&gt;Kerala&lt;/a&gt; among others are trying to deal with the impact of Coronavirus on mental health with innovative campaigns.&amp;nbsp; So instead of a helpline number, an app can be introduced by the State that gives counselling services to quarantined patients which would help in destigmatizing the existing scenario. Further, citizens too can be involved in helping one another, for example, &lt;a href="https://www.thesun.co.uk/news/11207176/neighbours-brilliant-traffic-light-system/"&gt;neighbourhoods in England use&lt;/a&gt; “innovative placards wherein they identify the quarantined people in need (and their concerns) with a simple showcase of ‘red/yellow/green’ placards outside their houses. They have also &lt;a href="https://www.countryliving.com/uk/news/a31654244/printable-postcard-self-isolation-coronavirus/"&gt;introduced the use &lt;/a&gt;of “printable postcards” that are used to offer help for the elderly in the communities. These community initiatives are a much better way of approaching this public health crisis instead of a ‘sticker’ or a ‘label’ outside the quarantined person’s house labelling them in a negative way, as though they have committed a crime.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;&lt;strong&gt;Avoiding the toxic culture created in the ‘new normal'&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;Citizens need to be made aware of the consequences of this pandemic on the community in a way they can help each other to overcome it , instead of simply alarming or scaring them which would definitely have long term negative impacts on the community. Considering how instances of discrimination against certain communities are already surfacing amidst the pandemic, contact tracing should explored&amp;nbsp; within the bounds of the law while being implemented through these apps. With &lt;a href="https://pib.gov.in/PressReleseDetailm.aspx?PRID=1616393"&gt;certain governments &lt;/a&gt;using personnel tracking tools such as smart watches for purposes of public services, the increase in the use of these kinds of intrusive technologies is soon going to be a harsh reality. Surveillance is already suspected to have become the &lt;a href="https://www.theguardian.com/world/2020/mar/09/the-new-normal-chinas-excessive-coronavirus-public-monitoring-could-be-here-to-stay"&gt;‘new normal’&lt;/a&gt; considering the extensive &lt;a href="https://www.dw.com/en/virus-itself-is-not-the-biggest-danger-says-yuval-noah-harari/a-53195552"&gt;amounts of money&lt;/a&gt; that is being invested by governments around the globe. The only way out of this pandemic is to take a humane approach to surveillance wherein the discriminatory tendencies of the people while spreading information&amp;nbsp; about those infected are factored in to prevent excessive harm. It can only be expected that the State would be wary of the means being deployed to achieve the end, and the citizens act responsibly while participating in these initiatives so as to reduce the negative impacts of vertical or lateral surveillance. We should all move towards a society where we watch the virus and carefully use technology to avoid situations where ordinary citizens are encouraged to watch over their neighbours. We need to unlearn this habit of “watching over someone else”&amp;nbsp; both voluntarily and involuntarily before it becomes too late.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: left;"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/essay-watching-corona-or-neighbours-introducing-2018lateral-surveillance2019-during-covid201919'&gt;https://cis-india.org/internet-governance/blog/essay-watching-corona-or-neighbours-introducing-2018lateral-surveillance2019-during-covid201919&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Mira Swaminathan and Shubhika Saluja</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-05-22T06:39:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/bd4d-guideline-documents/ExtendedNotes">
    <title>CIS_BD4D_Guideline04_PT+PB_BigDataAIEthicsReview_ExtendedNotes PDF</title>
    <link>https://cis-india.org/raw/bd4d-guideline-documents/ExtendedNotes</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/bd4d-guideline-documents/ExtendedNotes'&gt;https://cis-india.org/raw/bd4d-guideline-documents/ExtendedNotes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-05-19T10:58:54Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/a-compilation-of-research-on-the-gig-economy">
    <title> A Compilation of Research on the Gig Economy</title>
    <link>https://cis-india.org/raw/a-compilation-of-research-on-the-gig-economy</link>
    <description>
        &lt;b&gt;Over the past year, researchers at CIS have been studying gig economies and gig workers in India. Their work has involved consultative discussions with domestic workers, food delivery workers, taxi drivers, trade union leaders, and government representatives to document the state of gig work in India, and highlight the concerns of gig workers. 

The imposition of a severe lockdown in India in response to the outbreak of COVID-19 has left gig workers in precarious positions. Without the privilege of social distancing, these workers are having to contend with a drastic reduction in income, while also placing themselves at heightened health risks. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;On gig economy during the COVID-19 pandemic&lt;/h3&gt;
&lt;p dir="ltr"&gt;Supported by &lt;a href="https://www.apc.org/en/project/firn-feminist-internet-research-network"&gt;Feminist Internet Research Network&lt;/a&gt; led by the Association for Progressive Communications (APC) and funded by the International Development Research Centre (IDRC)&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Along with Tandem Research, we spoke to leaders of four unions that represent gig workers across the country about the risks and vulnerabilities that they are having to contend with in the face of the COVID-19 crisis. &lt;strong&gt;Zothan Mawii&lt;/strong&gt; (Tandem Research), &lt;strong&gt;Ambika Tandon&lt;/strong&gt;, and &lt;strong&gt;Aayush Rathi&lt;/strong&gt; share key reflections in this essay published on The Wire. (&lt;a href="https://cis-india.org/raw/gig-workers-need-support"&gt;link&lt;/a&gt;).&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Based on the discussion, a charter of recommendations was prepared with contributions from participants, and was shared with public and private stakeholders. (&lt;a href="https://cis-india.org/raw/covid-19-charter-of-recommendations"&gt;link&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3 dir="ltr"&gt;On domestic workers in the platform economy&amp;nbsp;&lt;/h3&gt;
&lt;p dir="ltr"&gt;Supported by &lt;a href="https://www.apc.org/en/project/firn-feminist-internet-research-network"&gt;Feminist Internet Research Network&lt;/a&gt; led by the Association for Progressive Communications (APC) and funded by the International Development Research Centre (IDRC)&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;We discussed our ongoing research on the platformisation of domestic work in India with domestic workers, union members, and representatives from the Karnataka Labour Department in November 2019. &lt;strong&gt;Tasneem Mewa&lt;/strong&gt; documented the rich discussion from this consultation. (&lt;a href="https://cis-india.org/raw/platformisation-of-domestic-work-in-india-report-from-a-multistakeholder-consultation"&gt;link&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p dir="ltr"&gt;CIS worked with members of the Domestic Workers Rights Union to conduct field research on the lives and challenges of domestic workers in the platform economy. The following essays published on GenderIT capture their experiences of doing this research:&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Parijatha G.P.&lt;/strong&gt; writes about a “gated society management app,” MyGate, and the experiences of surveillance of migrant workers in Bengaluru. (&lt;a href="https://www.genderit.org/articles/domestic-work-platform-economy-reflections-awareness-workers-rights"&gt;link&lt;/a&gt;)&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Radha Keerthna&lt;/strong&gt; writes about the similarity in the conditions of domestic workers in the traditional and platform economy, particularly the precarity and invisibility of labour. (&lt;a href="https://www.genderit.org/articles/domestic-work-platform-economy-reflections-conducting-interviews-sensitive-issues"&gt;link&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Sumathi&lt;/strong&gt;, a union leader, reflects on and her experience as an activist-researcher interacting with domestic gig workers through the course of our study. (&lt;a href="https://www.genderit.org/articles/domestic-work-platform-economy-reflections-difficulty-set-interviews"&gt;link&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Zeenathunissa&lt;/strong&gt; shares the difficulty of speaking to domestic workers in the gig economy, especially when workers undergo constant surveillance by employers and companies. (&lt;a href="https://www.genderit.org/articles/domestic-work-platform-economy-reflections-research-and-social-work"&gt;link&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;On economic, algorithmic, and affective vulnerabilities of gig workers&lt;/h3&gt;
&lt;p dir="ltr"&gt;Supported by &lt;a href="https://azimpremjiuniversity.edu.in/SitePages/research-grant-overview.aspx"&gt;Azim Premji University&lt;/a&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;CIS commissioned a set of four field studies of platform workers delivering food and driving taxis for platform companies in Mumbai and New Delhi. The researchers involved wrote a series of essays that were published by Platypus blog of CASTAC:&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Anushree Gupta&lt;/strong&gt; explores women’s presence as workers as well as passengers/customers in the ride hailing platform economy in Mumbai and related concerns of safety and risk mitigation. (&lt;a href="https://cis-india.org/raw/anushree-gupta-ladies-log-women-safety-risk-transfer-ridehailing"&gt;link&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Sarah Zia&lt;/strong&gt; highlights how algorithmic management of work and revenue targets of gig workers impact their everyday lives and plans for the future. (&lt;a href="https://cis-india.org/raw/sarah-zia-not-knowing-as-pedagogy-ride-hailing-drivers-in-delhi"&gt;link&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Kinship networks are a critical source of safety and security for workers in the gig economy. &lt;strong&gt;Simiran Lalvani&lt;/strong&gt; writes about the network among transportation workers in Mumbai, also reflecting on implications for those who are excluded. (&lt;a href="https://cis-india.org/raw/simiran-lalvani-workers-fictive-kinship-relations-app-based-food-delivery-mumbai"&gt;link&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Noopur Raval&lt;/strong&gt; and &lt;strong&gt;Rajendra Jadhav&lt;/strong&gt; describe the unregulated and exploitative temporal structures of gig work, and how work-time of gig workers get configured by customer-facing promises of platform companies. (&lt;a href="https://cis-india.org/raw/noopur-raval-rajendra-jadhav-power-chronography-of-food-delivery-work"&gt;link&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;The four researchers, led by &lt;strong&gt;Noopur Raval&lt;/strong&gt; (co-PI for the project, held a roundtable discussion to reflect on methods, challenges, inter-subjectivities and possible future directions for research on the gig economy and its workers. (&lt;a href="https://cis-india.org/raw/india-gig-work-economy-roundtable"&gt;link&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
The consultants - Noopur Raval, Anushree Gupta, Rajendra Jadhav, Sarah Zia and Simiran Lalvani - involved in this project on mapping digital labour in India’s platform economies (in Mumbai and New Delhi) gathered in &lt;a href="https://cis-india.org/raw/platform-work-india-panel-discussion-20190719"&gt;Bengaluru on July 19, 2019&lt;/a&gt; to share their preliminary field insights along with reflections on what it meant to do such studies, how they went about studying gig-work, and challenges that arose in their work. Watch the livestream from this discussion &lt;a href="https://www.youtube.com/watch?v=Q1lwpb3jRMQ"&gt;here&lt;/a&gt;.
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/a-compilation-of-research-on-the-gig-economy'&gt;https://cis-india.org/raw/a-compilation-of-research-on-the-gig-economy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi, Ambika Tandon, Sumandro Chattapadhyay</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Digital Labour</dc:subject>
    
    
        <dc:subject>Covid19</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Platform-Work</dc:subject>
    
    
        <dc:subject>RAW Research</dc:subject>
    
    
        <dc:subject>research</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Domestic Work</dc:subject>
    

   <dc:date>2020-05-19T08:20:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/gig-workers-need-support">
    <title>From Health and Harassment to Income Security and Loans, India's Gig Workers Need Support</title>
    <link>https://cis-india.org/raw/gig-workers-need-support</link>
    <description>
        &lt;b&gt;Deemed an 'essential service' by most state governments, and thereby exempt from temporary suspension during the COVID-19 lockdown, food, groceries and other essential commodities have continued to be delivered by e-commerce companies and on-demand services. Actions to protect workers, who are taking on significant risks, have been far less forthcoming than those for customers. Zothan Mawii (Tandem Research), Aayush Rathi (CIS) and Ambika Tandon (CIS) spoke with the leaders of four workers' unions and labour researchers to identify recommended actions that public agencies and private companies may undertake to better support the urgent needs of gig workers in India. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally published by &lt;a href="https://thewire.in/business/covid-19-lockdown-delivery-gig-workers" target="_blank"&gt;The Wire&lt;/a&gt; on April 29, 2020.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Nearly two weeks ago, news broke that a Zomato delivery worker &lt;a href="https://indianexpress.com/article/cities/delhi/pizza-man-who-tested-covid-19-positive-also-delivered-food-for-us-zomato-6365513/" target="_blank"&gt;tested positive for COVID-19&lt;/a&gt; in New Delhi.&lt;/p&gt;
&lt;p&gt;As many as 72 families in the south Delhi neighbourhood where he made deliveries have been quarantined, along with 17 other people he worked with. With the luxury of social distancing not extended to delivery workers, the incident further fuelled the apprehensions and uncertainties that they already were contending with. This was only a matter of time.&lt;/p&gt;
&lt;p&gt;Deemed an “essential service” by most state governments, and thereby exempt from temporary suspension during the lockdown, food, groceries and other essential commodities have continued to be delivered by e-commerce companies and on-demand services including Swiggy, Zomato, BigBasket, Dunzo, Housejoy and Flipkart.&lt;/p&gt;
&lt;p&gt;In choosing to continue operations, these companies have then rushed to enforce measures to put customers at ease. Such measures have included no-contact deliveries, card-only payments, and displaying temperature readings of workers.&lt;/p&gt;
&lt;p&gt;Uber and Ola Cabs suspended services in most areas, and announced that in places where they are &lt;a href="https://www.livemint.com/news/india/covid-19-uber-to-offer-cabs-for-essential-services-11586077100965.html" target="_blank"&gt;providing essential services&lt;/a&gt;, workers have been instructed to wear masks and observe hygiene standards.&lt;/p&gt;
&lt;p&gt;Swiggy and Zomato announced they were communicating with workers about safety and hygiene standards. Zomato has more recently &lt;a href="https://twitter.com/deepigoyal/status/1252844887797428230" target="_blank"&gt;announced&lt;/a&gt; that the company is making the Aarogya Setu app mandatory for workers to receive orders.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://economictimes.indiatimes.com/small-biz/startups/newsbuzz/covid-19-zomato-sets-up-funds-for-income-starved-daily-wage-workers-in-india/articleshow/74823838.cms" target="_blank"&gt;Relief funds&lt;/a&gt; have been set up— donations to these funds continue to be solicited from the public and company executives have made grandiose gestures of &lt;a href="https://www.carandbike.com/news/ola-introduces-drive-the-driver-fund-initiative-to-fund-relief-for-driver-community-2201886" target="_blank"&gt;contributing their salaries&lt;/a&gt; to these funds.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Stark reality&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The situation on the ground, however, tells another story. Actions to protect workers, who are taking on significant risks, have been far less forthcoming than those for customers. Workers are also bearing the brunt of arbitrary surveillance measures, like being asked to download the Aarogya Setu app, in addition to scrutiny they are placed under regularly. No such surveillance measures have been placed on customers. The priorities of on-demand service companies are clear: protect the bottom line at the expense of vulnerable workers.&lt;/p&gt;
&lt;p&gt;In the absence of any concerted support from the companies, service workers could have looked to the state for relief. None has been forthcoming. Government action has pegged the targeting of relief works and services to those currently eligible for welfare programs and registered under its various schemes. Most gig workers, if not all, are ineligible as a result of the arbitrary conditions underlying these schemes.&lt;/p&gt;
&lt;p&gt;We spoke to the leaders of four unions — including the Indian Federation of App-based Transport Workers (IFAT) and the Ola and Uber Drivers and Owners’ Association (OTU)– who represent gig workers across the country about the risks and vulnerabilities that they are having to contend with.&lt;/p&gt;
&lt;p&gt;The precariousness characterising gig work could not be starker. A summary of the discussions can be found &lt;a href="https://cis-india.org/raw/zothan-mawii-covid-19-and-relief-measures-for-gig-workers-in-india" target="_blank"&gt;here&lt;/a&gt;, while the recommendations emerging from these discussions have been shared with government officials and company representatives and can be found in full &lt;a href="https://cis-india.org/raw/covid-19-charter-of-recommendations" target="_blank"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Below are some of the key recommendations that emerged from these discussions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Health&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Many on-demand service companies have not provided workers with any personal protective equipment (PPE), not even to delivery workers who face heightened risks of exposure to the coronavirus at nearly every step of the delivery process.&lt;/p&gt;
&lt;p&gt;Some unions had to take to distributing masks, while many other workers continue to incur repeated costs to safeguard their own health. At a later stage, Swiggy announced that workers would be reimbursed for these purchases, but the process is so tedious that workers have found it untenable.&lt;/p&gt;
&lt;p&gt;In addition, health awareness campaigns regarding safety measures and risks were also launched very late into the crisis, and then were not in vernacular languages and could not be comprehended by most workers.&lt;/p&gt;
&lt;p&gt;In terms of insurance, most platforms have announced financial assistance for workers who test positive for COVID-19. This is aimed at covering their hospital expenses, as well as providing a daily stipend for a limited period. However, these come short as there are no provisions for OPD consultations or even for the cost of going and getting tested (losing one day’s work and then potentially one more before the results come in).&lt;/p&gt;
&lt;p&gt;Additionally, the difficulty and expenses of obtaining a test could place an additional burden on workers — as without proof of a positive test, workers will be unable to access this fund in the first place. This is far from the robust health insurance that must be provisioned to ensure workers’ health and safety. Some platforms have made telemedicine services available for workers and while this is a step in the right direction, it must be backed by more tangible protections like covering part of the costs incurred for treatment.&lt;/p&gt;
&lt;p&gt;Unions demand that companies provide adequate PPE to workers free of cost —masks, gloves, hand sanitisers, and soap. If platforms continue to ask workers to log in at significant risks to themselves and their families, provision of safety equipment is the basic minimum requirement that must be met immediately. This should also include a plan to ensure workers’ access to clean and hygienic sanitation facilities, as they may not have access to these on their delivery routes.&lt;/p&gt;
&lt;p&gt;In addition, platforms must provide health insurance cover in addition to accident insurance coverage and hospitalisation cover for COVID-19. This should include OPD consultations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Income security and social protection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;With services suspended or demand really low, gig workers have either lost their income or seen it fall drastically — delivery workers’ daily earnings are as low as Rs 150-Rs 300 for a full day’s work.&lt;/p&gt;
&lt;p&gt;Almost a month into the lockdown, there is little clarity as to who is eligible for the funds that companies have raised, and in what manner and or what purposes it will be disbursed.&lt;/p&gt;
&lt;p&gt;Ola Cabs has offered interest free loans to drivers for relief in the short term, while some Uber drivers have received a Rs 3,000 grant from the company. If disbursed universally this would ensure availability of some liquidity for workers, although at this stage it remains unclear if all drivers are eligible to receive the grant.&lt;/p&gt;
&lt;p&gt;Workers and unions are afraid that this grant might only be accessible for workers with high ratings, or those who have logged longer hours especially through the course of the lockdown period. This would effectively penalise workers for going to their homes for the lockdown, or being otherwise unable to work. Unions have estimated that not more than 20 percent of workers continue to remain active through the lockdown period.&lt;/p&gt;
&lt;p&gt;Moreover, research has shown that workers are not necessarily aware of the protections made available to them as a result of the legalese that companies couch these terms in.&lt;/p&gt;
&lt;p&gt;To ensure income security, platforms must make direct cash transfers to all workers who have logged in for at least two weeks between January and April 2020. This should be fixed according to minimum wage standards for skilled work in each state or at Rs 1,000 per day of the lockdown, and will have to be enforced with retrospective effect.&lt;/p&gt;
&lt;p&gt;The former should be treated as an entitlement of workers while a portion of the latter can be asked to be repaid by the workers over the course of the next year. The fiscal responsibility for the cash transfers can be shared with governments. Governments can request the data held by these companies for the transfers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Rent and loans&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Some states have announced moratoriums on house rent but again there is no explicit mention of gig workers being included in this — and in states where such a move hasn’t been announced, gig workers must continue to pay house rent without having a source of income to rely on.&lt;/p&gt;
&lt;p&gt;On the issue of loan repayments, the RBI allowed lending institutions to grant a three-month moratorium on retail loan repayments as a part of its COVID-19 regulatory package. On the one hand, availing of the moratorium will significantly increase the loan tenure and total amount to be repaid. On the other, several gig workers have reported that the enforcement of the moratorium itself has been piecemeal outside of public sector institutions.&lt;/p&gt;
&lt;p&gt;Here again they have to make a Faustian bargain. The government should enforce the RBI’s directive strictly so gig workers get some relief.&lt;/p&gt;
&lt;p&gt;Further, several companies themselves have leased vehicles to workers, for which payment of EMI must be ceased through the months of March to May to allow workers some relief without requiring the return of vehicles. Currently, EMIs have only been stalled on the condition of returning vehicles.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Harassment&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Workers have been subject to harassment and discrimination by the police and customers alike, making it difficult to continue work. Despite the categorisation of delivery as an essential service, companies are finding it difficult to get easy access to movement passes in bulk, which implies that workers are penalised by being unable to work even if they are available. Companies have come out to allege harassment despite clear directions to allow movement of delivery workers, which points to gaps in enforcement.&lt;/p&gt;
&lt;p&gt;Further, frequent barricading has implied that workers are not able to complete orders without diversions despite having passes for movement. Meanwhile, companies continue to mandate door-to-door delivery so as to ensure that customers are not inconvenienced at all. In some cases, this has implied that workers have to travel on foot in barricaded areas to deliver orders.&lt;/p&gt;
&lt;p&gt;We recommend that companies urgently set up a helpline for workers to address such issues that may arise in delivery. We also recommend that companies proactively work with the government to map hotspots and containment zones and cease delivery in such areas. Thus far, there is no indication of any such measures by companies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Post-lockdown revival&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The lockdown brings to the fore just how vulnerable gig workers are.&lt;/p&gt;
&lt;p&gt;This is a direct consequence of the gig work arrangements structured as disguised employment. Deeming workers as independent contractors and self-identifying as technology providers, on-demand service companies have washed their hands of the responsibility of providing labour protections and social security measures despite exerting extensive control over the conditions of work (such as wages, incentives) and the manner of its dispensing (such as the standard of work, hours of work).&lt;/p&gt;
&lt;p&gt;Governments, too, have done little to recognise gig workers although they have been added as a category of workers in the draft Social Security code. Relief measures announced by the government exclude them. However, the government needs to intervene urgently in the current situation.&lt;/p&gt;
&lt;p&gt;Platforms are likely to recover once the lockdown is lifted —home delivery services like BigBasket and Grofers have already seen their businesses skyrocket.&lt;/p&gt;
&lt;p&gt;However, there is an urgent need to rebuild on-demand work as one that isn’t merely in the service of capital. A first step to that would be to reduce commissions to 5% for at least 6 months so that workers can recover financially. The unencumbered spending to capture market share at the expense of workers needs to be curbed. Enforcing these recommendations will require a coordinated effort between governments and on-demand service companies. As consumers, it is also our responsibility to question companies that do not take on the moral responsibilities of extending adequate worker protections.&lt;/p&gt;
&lt;p&gt;With unemployment in the country skyrocketing, it may be the case that on-demand work opens up avenues to securing work. It then becomes imperative to ensure any future of work is one that is inclusive and accounts for the systemic changes that are now impossible to ignore.&lt;/p&gt;
&lt;p&gt;While social distancing is a choice truly available to a privileged few, we need to ensure that social protection isn’t.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/gig-workers-need-support'&gt;https://cis-india.org/raw/gig-workers-need-support&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Zothan Mawii (Tandem Research), Aayush Rathi (CIS), and Ambika Tandon (CIS)</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gig Work</dc:subject>
    
    
        <dc:subject>Digital Labour</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Platform-Work</dc:subject>
    
    
        <dc:subject>Network Economies</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2020-05-19T06:57:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/2018future-of-work2019-in-india2019s-it-it-es-sector-pdf">
    <title>‘Future of Work’ in India’s IT/IT-eS Sector pdf </title>
    <link>https://cis-india.org/internet-governance/2018future-of-work2019-in-india2019s-it-it-es-sector-pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/2018future-of-work2019-in-india2019s-it-it-es-sector-pdf'&gt;https://cis-india.org/internet-governance/2018future-of-work2019-in-india2019s-it-it-es-sector-pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-04-28T09:52:19Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/pdf-gendered-future-of-work">
    <title>PDF Gendered Future of Work</title>
    <link>https://cis-india.org/internet-governance/pdf-gendered-future-of-work</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/pdf-gendered-future-of-work'&gt;https://cis-india.org/internet-governance/pdf-gendered-future-of-work&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-03-05T19:48:35Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/pdf-final-draft-gender-and-the-future-of-work">
    <title>PDF Final draft Gender and the future of work</title>
    <link>https://cis-india.org/internet-governance/pdf-final-draft-gender-and-the-future-of-work</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/pdf-final-draft-gender-and-the-future-of-work'&gt;https://cis-india.org/internet-governance/pdf-final-draft-gender-and-the-future-of-work&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-03-05T08:44:57Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/digital-id-india-case-study">
    <title>Digital ID India Case Study</title>
    <link>https://cis-india.org/internet-governance/digital-id-india-case-study</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/digital-id-india-case-study'&gt;https://cis-india.org/internet-governance/digital-id-india-case-study&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-03-02T11:30:30Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity">
    <title>Governing ID: A Framework for Evaluation of Digital Identity</title>
    <link>https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;As governments across the globe implement new and foundational 
digital identification systems (Digital ID), or modernize existing ID 
programs, there is an urgent need for more research and discussion about
 appropriate uses of Digital ID systems. This significant momentum for 
creating Digital ID has been accompanied with concerns about privacy, 
surveillance and exclusion harms of state-issued Digital IDs in several 
parts of the world, resulting in campaigns and litigations in countries,
 such as UK, India, Kenya, and Jamaica. Given the sweeping range of 
considerations required to evaluate Digital ID projects, it is necessary
 to formulate evaluation frameworks that can be used for this purpose.&lt;/p&gt;
&lt;p&gt;This work began with the question of what the appropriate uses
 of Digital ID can be, but through the research process, it became clear
 that the question of use cannot be divorced from the fundamental 
attributes of Digital ID systems and their governance structures. This 
framework provides tests, which can be used to evaluate the governance 
of Digital ID across jurisdictions, as well as determine whether a 
particular use of Digital ID is legitimate. Through three kinds of 
checks — Rule of Law tests, Rights based tests, and Risks based tests — 
this scheme is a ready guide for evaluation of Digital ID.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/image-governing-id-principles-for-evalution/" alt="null" width="100%" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;View the &lt;a class="external-link" href="https://digitalid.design/evaluation-framework-02.html"&gt;framework&lt;/a&gt; or download as&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/governing-id-principles-for-evalution" class="internal-link" title="Governing ID: Principles for Evalution"&gt;PDF&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity'&gt;https://cis-india.org/internet-governance/blog/governing-id-a-framework-for-evaluation-of-digital-identity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vrinda Bhandari, Shruti Trikanad, and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2020-03-02T13:22:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/governing-id-principles-for-evalution">
    <title>Governing ID: Principles for Evalution</title>
    <link>https://cis-india.org/internet-governance/governing-id-principles-for-evalution</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/governing-id-principles-for-evalution'&gt;https://cis-india.org/internet-governance/governing-id-principles-for-evalution&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-03-02T08:20:55Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
