The Centre for Internet and Society
http://editors.cis-india.org
These are the search results for the query, showing results 331 to 345.
Data Infrastructures and Inequities: Why Does Reproductive Health Surveillance in India Need Our Urgent Attention?
http://editors.cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india
<b>In order to bring out certain conceptual and procedural problems with health monitoring in the Indian context, this article by Aayush Rathi and Ambika Tandon posits health monitoring as surveillance and not merely as a “data problem.” Casting a critical feminist lens, the historicity of surveillance practices unveils the gendered power differentials wedded into taken-for-granted “benign” monitoring processes. The unpacking of the Mother and Child Tracking System and the National Health Stack reveals the neo-liberal aspirations of the Indian state. </b>
<p> </p>
<p><em>The article was first published by <a href="https://www.epw.in/engage/article/data-infrastructures-inequities-why-does-reproductive-health-surveillance-india-need-urgent-attention" target="_blank">EPW Engage, Vol. 54, Issue No. 6</a>, on 9 February 2019.</em></p>
<hr />
<h3><strong>Framing Reproductive Health as a Surveillance Question</strong></h3>
<p>The approach of the postcolonial Indian state to healthcare has been Malthusian, with the prioritisation of family planning and birth control (Hodges 2004). Supported by the notion of socio-economic development arising out of a “modernisation” paradigm, the target-based approach to achieving reduced fertility rates has shaped India’s reproductive and child health (RCH) programme (Simon-Kumar 2006).</p>
<p>This is also the context in which India’s abortion law, the Medical Termination of Pregnancy (MTP) Act, was framed in 1971, placing the decisional privacy of women seeking abortions in the hands of registered medical practitioners. The framing of the MTP act invisibilises females seeking abortions for non-medical reasons within the legal framework. The exclusionary provisions only exacerbated existing gaps in health provisioning, as access to safe and legal abortions had already been curtailed by severe geographic inequalities in funding, infrastructure, and human resources. The state has concomitantly been unable to meet contraceptive needs of married couples or reduce maternal and infant mortality rates in large parts of the country, mediating access along the lines of class, social status, education, and age (Sanneving et al 2013).</p>
<p>While the official narrative around the RCH programme transitioned to focus on universal access to healthcare in the 1990s, the target-based approach continues to shape the reality on the ground. The provision of reproductive healthcare has been deeply unequal and, in some cases, in hospitals. These targets have been known to be met through the practice of forced, and often unsafe, sterilisation, in conditions of absence of adequate provisions or trained professionals, pre-sterilisation counselling, or alternative forms of contraception (Sama and PLD 2018). Further, patients have regularly been provided cash incentives, foreclosing the notion of free consent, especially given that the target population of these camps has been women from marginalised economic classes in rural India.</p>
<p>Placing surveillance studies within a feminist praxis allows us to frame the reproductive health landscape as more than just an ill-conceived, benign monitoring structure. The critical lens becomes useful for highlighting that taken-for-granted structures of monitoring are wedded with power differentials: genetic screening in fertility clinics, identification documents such as birth certificates, and full-body screeners are just some of the manifestations of this (Adrejevic 2015). Emerging conversations around feminist surveillance studies highlight that these data systems are neither benign nor free of gendered implications (Andrejevic 2015). In continual remaking of the social, corporeal body as a data actor in society, such practices render some bodies normative and obfuscate others, based on categorisations put in place by the surveiller.</p>
<p>In fact, the history of surveillance can be traced back to the colonial state where it took the form of systematic sexual and gendered violence enacted upon indigenous populations in order to render them compliant (Rifkin 2011; Morgensen 2011). Surveillance, then, manifests as a “scientific” rationalisation of complex social hieroglyphs (such as reproductive health) into formats enabling administrative interventions by the modern state. Lyon (2001) has also emphasised how the body emerged as the site of surveillance in order for the disciplining of the “irrational, sensual body”—essential to the functioning of the modern nation-state—to effectively happen.</p>
<h3><strong>Questioning the Information and Communications Technology for Development (ICT4D) and Big Data for Development (BD4D) Rhetoric</strong></h3>
<p>Information and Communications Technology (ICT) and data-driven approaches to the development of a robust health information system, and by extension, welfare, have been offered as solutions to these inequities and exclusions in access to maternal and reproductive healthcare in the country.</p>
<p>The move towards data-driven development in the country commenced with the introduction of the Health Management Information System in Andhra Pradesh in 2008, and the Mother and Child Tracking System (MCTS) nationally in 2011. These are reproductive health information systems (HIS) that collect granular data about each pregnancy from the antenatal to the post-natal period, at the level of each sub-centre as well as primary and community health centre. The introduction of HIS comprised cross-sectoral digitisation measures that were a part of the larger national push towards e-governance; along with health, thirty other distinct areas of governance, from land records to banking to employment, were identified for this move towards the digitalised provisioning of services (MeitY 2015).</p>
<p>The HIS have been seen as playing a critical role in the ecosystem of health service provision globally. HIS-based interventions in reproductive health programming have been envisioned as a means of: (i) improving access to services in the context of a healthcare system ridden with inequalities; (ii) improving the quality of services provided, and (iii) producing better quality data to facilitate the objectives of India’s RCH programme, including family planning and population control. Accordingly, starting 2018, the MCTS is being replaced by the RCH portal in a phased manner. The RCH portal, in areas where the ANMOL (ANM Online) application has been introduced, captures data real-time through tablets provided to health workers (MoHFW 2015).</p>
<p>A proposal to mandatorily link the Aadhaar with data on pregnancies and abortions through the MCTS/RCH has been made by the union minister for Women and Child Development as a deterrent to gender-biased sex selection (Tembhekar 2016). The proposal stems from the prohibition of gender-biased sex selection provided under the Pre-Conception and Pre-Natal Diagnostics Techniques (PCPNDT) Act, 1994. The approach taken so far under the PCPNDT Act, 2014 has been to regulate the use of technologies involved in sex determination. However, the steady decline in the national sex ratio since the passage of the PCPNDT Act provides a clear indication that the regulation of such technology has been largely ineffective. A national policy linking Aadhaar with abortions would be aimed at discouraging gender-biased sex selection through state surveillance, in direct violation of a female’s right to decisional privacy with regards to their own body.</p>
<p>Linking Aadhaar would also be used as a mechanism to enable direct benefit transfer (DBT) to the beneficiaries of the national maternal benefits scheme. Linking reproductive health services to the Aadhaar ecosystem has been critiqued because it is exclusionary towards women with legitimate claims towards abortions and other reproductive services and benefits, and it heightens the risk of data breaches in a cultural fabric that already stigmatises abortions. The bodies on which this stigma is disproportionately placed, unmarried or disabled females, for instance, experience the harms of visibility through centralised surveillance mechanisms more acutely than others by being penalised for their deviance from cultural expectations. This is in accordance with the theory of "data extremes,” wherein marginalised communities are seen as living on the extremes of data capture, leading to a data regime that either refuses to recognise them as legitimate entities or subjects them to overpolicing in order to discipline deviance (Arora 2016). In both developed and developing contexts, the broader purpose of identity management has largely been to demarcate legitimate and illegitimate actors within a population, either within the framework of security or welfare.</p>
<h3><strong>Potential Harms of the Data Model of Reproductive Health Provisioning</strong></h3>
<p>Informational privacy and decisional privacy are critically shaped by data flows and security within the MCTS/RCH. No standards for data sharing and storage, or anonymisation and encryption of data have been implemented despite role-based authentication (NHSRC and Taurus Glocal 2011). The risks of this architectural design are further amplified in the context of the RCH/ANMOL where data is captured real-time. In the absence of adequate safeguards against data leaks, real-time data capture risks the publicising of reproductive health choices in an already stigmatised environment. This opens up avenues for further dilution of autonomy in making future reproductive health choices.</p>
<p>Several core principles of informational privacy, such as limitations regarding data collection and usage, or informed consent, also need to be reworked within this context.<sup>[1]</sup> For instance, the centrality of the requirement of “free, informed consent” by an individual would need to be replaced by other models, especially in the context of reproductive health of rape survivors who are vulnerable and therefore unable to exercise full agency. The ability to make a free and informed choice, already dismantled in the context of contemporary data regimes, gets further precluded in such contexts. The constraints on privacy in decisions regarding the body are then replicated in the domain of reproductive data collection.</p>
<p>What is uniform across these digitisation initiatives is their treatment of maternal and reproductive health as solely a medical event, framed as a data scarcity problem. In doing so, they tend to amplify the understanding of reproductive health through measurable indicators that ignore social determinants of health. For instance, several studies conducted in the rural Indian context have shown that the degree of women’s autonomy influences the degree of usage of pregnancy care, and that the uptake of pregnancy care was associated with village-level indicators such as economic development, provisioning of basic infrastructure and social cohesion. These contextual factors get overridden in pervasive surveillance systems that treat reproductive healthcare as comprising only of measurable indicators and behaviours, that are dependent on individual behaviour of practitioners and women themselves, rather than structural gaps within the system.</p>
<p>While traditionally associated with state governance, the contemporary surveillance regime is experienced as distinct from its earlier forms due to its reliance on a nexus between surveillance by the state and private institutions and actors, with both legal frameworks and material apparatuses for data collection and sharing (Shepherd 2017). As with historical forms of surveillance, the harms of contemporary data regimes accrue disproportionately among already marginalised and dissenting communities and individuals. Data-driven surveillance has been critiqued for its excesses in multiple contexts globally, including in the domains of predictive policing, health management, and targeted advertising (Mason 2015). In the attempts to achieve these objectives, surveillance systems have been criticised for their reliance on replicating past patterns, reifying proximity to a hetero-patriarchal norm (Haggerty and Ericson 2000). Under data-driven surveillance systems, this proximity informs the preexisting boxes of identity for which algorithmic representations of the individual are formed. The boxes are defined contingent on the distinct objectives of the particular surveillance project, collating disparate pieces of data flows and resulting in the recasting of the singular offline self into various 'data doubles' (Haggerty and Ericson 2000). Refractive, rather than reflective, the data doubles have implications for the physical, embodied life of individual with an increasing number of service provisioning relying on the data doubles (Lyon 2001). Consider, for instance, apps on menstruation, fertility, and health, and wearables such as fitness trackers and pacers, that support corporate agendas around what a woman’s healthy body should look, be or behave like (Lupton 2014). Once viewed through the lens of power relations, the fetishised, apolitical notion of the data “revolution” gives way to what we may better understand as “dataveillance.”</p>
<h3><strong>Towards a Networked State and a Neo-liberal Citizen</strong></h3>
<p>Following in this tradition of ICT being treated as the solution to problems plaguing India’s public health information system, a larger, all-pervasive healthcare ecosystem is now being proposed by the Indian state (NITI Aayog 2018). Termed the National Health Stack, it seeks to create a centralised electronic repository of health records of Indian citizens with the aim of capturing every instance of healthcare service usage. Among other functions, it also envisions a platform for the provisioning of health and wellness-based services that may be dispensed by public or private actors in an attempt to achieve universal health coverage. By allowing private parties to utilise the data collected through pullable open application program interfaces (APIs), it also fits within the larger framework of the National Health Policy 2017 that envisions the private sector playing a significant role in the provision of healthcare in India. It also then fits within the state–private sector nexus that characterises dataveillance. This, in turn, follows broader trends towards market-driven solutions and private financing of health sector reform measures that have already had profound consequences on the political economy of healthcare worldwide (Joe et al 2018).</p>
<p>These initiatives are, in many ways, emblematic of the growing adoption of network governance reform by the Indian state (Newman 2001). This is a stark shift from its traditional posturing as the hegemonic sovereign nation state. This shift entails the delayering from large, hierarchical and unitary government systems to horizontally arranged, more flexible, relatively dispersed systems.<sup>[2]</sup> The former govern through the power of rules and law, while the latter take the shape of self-regulating networks such as public–private contractual arrangements (Snellen 2005). ICTs have been posited as an effective tool in enabling the transition to network governance by enhancing local governance and interactive policymaking enabling the co-production of knowledge (Ferlie et al 2011). The development of these capabilities is also critical to addressing “wicked problems” such as healthcare (Rittel and Webber 1973).<sup>[3]</sup> The application of the techno-deterministic, data-driven model to reproductive healthcare provision, then, resembles a fetishised approach to technological change. The NHSRC describes this as the collection of data without an objective, leading to a disproportional burden on data collection over use (NHSRC and Taurus Glocal 2011).</p>
<p>The blurring of the functions of state and private actors is reflective of the neo-liberal ethic, which produces new practices of governmentality. Within the neo-liberal framework of reproductive healthcare, the citizen is constructed as an individual actor, with agency over and responsibility for their own health and well-being (Maturo et al 2016).</p>
<h3><strong>“Quantified Self” of the Neo-liberal Citizen</strong></h3>
<p>Nowhere can the manifestation of this neo-liberal citizen can be seen as clearly as in the “quantified self” movement. The quantified self movement refers to the emergence of a whole range of apps that enable the user to track bodily functions and record data to achieve wellness and health goals, including menstruation, fertility, pregnancies, and health indicators in the mother and baby. Lupton (2015) labels this as the emergence of the “digitised reproductive citizen,” who is expected to be attentive to her fertility and sexual behaviour to achieve better reproductive health goals. The practice of collecting data around reproductive health is not new to the individual or the state, as has been demonstrated by the discussion above. What is new in this regime of datafication under the self-tracking movement is the monetisation of reproductive health data by private actors, the labour for which is performed by the user. Focusing on embodiment draws attention to different kinds of exploitation engendered by reproductive health apps. Not only is data about the body collected and sold, the unpaid labour for collection is extracted from the user. The reproductive body can then be understood as a cyborg, or a woman-machine hybrid, systematically digitising its bodily functions for profit-making within the capitalist (re)production machine (Fotoloulou 2016). Accordingly, all major reproductive health tracking apps have a business model that relies on selling information about users for direct marketing of products around reproductive health and well-being (Felizi and Varon nd).</p>
<p>As has been pointed out in the case of big data more broadly, reproductive health applications (apps) facilitate the visibility of the female reproductive body in the public domain. Supplying anonymised data sets to medical researchers and universities fills some of the historical gaps in research around the female body and reproductive health. Reproductive and sexual health tracking apps globally provide their users a platform to engage with biomedical information around sexual and reproductive health. Through group chats on the platform, they are also able to engage with experiential knowledge of sexual and reproductive health. This could also help form transnational networks of solidarity around the body and health (Fotopoulou 2016).</p>
<p style="text-align: justify;">This radical potential of network-building around reproductive and sexual health is, however, tempered to a large extent by the reconfiguration of gendered stereotypes through these apps. In a study on reproductive health apps on Google Play Store, Lupton (2014) finds that products targeted towards female users are marketed through the discourse of risk and vulnerability, while those targeted towards male users are framed within that of virility. Apart from reiterating gendered stereotypes around the male and female body, such a discourse assumes that the entire labour of family planning is performed by females. This same is the case with the MCTS/RCH.</p>
<p>Technological interventions such as reproductive health apps as well as HIS are based on the assumption that females have perfect control over decisions regarding their own bodies and reproductive health, despite this being disproved in India. The Guttmacher Institute (2014) has found that 60% of women in India report not having control over decisions regarding their own healthcare. The failure to account for the husband or the family as stakeholder in decision-making around reproductive health has been a historical failure of the family planning programme in India, and is now being replicated in other modalities. This notion of an autonomous citizen who is able to take responsibility of their own reproductive health and well-being does not hold true in the Indian context. It can even be seen as marginalising females who have already been excluded from the reproductive health system, as they are held responsible for their own inability to access healthcare.</p>
<h3><strong>Concluding Remarks</strong></h3>
<p>The interplay that emerges between reproductive health surveillance and data infrastructures is a complex one. It requires the careful positioning of the political nature of data collection and processing as well as its hetero-patriarchal and colonial legacies, within the need for effective utilisation of data for achieving developmental goals. Assessing this discourse through a feminist lens identifies the web of power relations in data regimes. This problematises narratives of technological solutions for welfare provision.</p>
<p>The reproductive healthcare framework in India then offers up a useful case study to assess these concerns. The growing adoption of ICT-based surveillance tools to equalise access to healthcare needs to be understood in the socio-economic, legal, and cultural context where these tools are being implemented. Increased surveillance has historically been associated with causing the structural gendered violence that it is now being offered as a solution to. This is a function of normative standards being constructed for reproductive behaviour that necessarily leave out broader definitions of reproductive health and welfare when viewed through a feminist lens. Within the larger context of health policymaking in India, moves towards privatisation then demonstrate the peculiarity of dataveillance as it functions through an unaccountable and pervasive overlapping of state and private surveillance practises. It remains to be seen how these trends in ICT-driven health policies affect access to reproductive rights and decisional privacy for millions of females in India and other parts of the global South.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india'>http://editors.cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india</a>
</p>
No publisherAayush Rathi and Ambika TandonBig DataData SystemsPrivacyResearchers at WorkInternet GovernanceResearchBD4DHealthcareSurveillanceBig Data for Development2019-12-30T16:44:32ZBlog EntryWhat the government's draft IT intermediary guidelines say
http://editors.cis-india.org/internet-governance/news/livemint-abhijit-ahaskar-february-12-2019-what-the-governments-draft-it-intermediary-guidelines-say
<b>Intermediaries will have to hand over to government agencies any information within 72 hours.
Intermediaries will have to use automated tools to trace the person posting unlawful content.
</b>
<p>The article by Abhijit Ahaskar was <a class="external-link" href="https://www.livemint.com/technology/tech-news/what-the-government-s-draft-it-intermediary-guidelines-say-1549959448471.html">published in Livemint</a> on February 12, 2019. CIS research was quoted.</p>
<hr />
<p style="text-align: justify; ">With voices for regulating tech companies getting stronger in the wake of growing incidence of fake news being circulated through social media platforms, the Ministry of Electronics and Information Technology (MEITY) of India has decided to re-examine the Information Technology (IT) Intermediary Guidelines, 2011, under the IT Act, 2000.</p>
<p style="text-align: justify; ">Setting the wheel in motion, the ministry proposed a draft called Information Technology Intermediaries Guidelines (Amendment), 2018, and released the recommendations on its website for public comments in December 2018. The first round of comments ended on 31 January, 2019 and was made public last week. The second round of comments and counter-comments will close on 14 February, 2019.</p>
<h3 style="text-align: justify; ">What the draft proposes</h3>
<p style="text-align: justify; ">The term intermediary refers to all tech companies that are hosting user data or are providing users with a platform for communication. This brings all internet, social media, telecom companies in its ambit.</p>
<p style="text-align: justify; ">The draft amendment proposes that intermediaries will have to hand over to governmentagencies any information that might be related to cyber security, national security and related with the investigation, prosecution or prevention of an offence, within 72 hours.</p>
<p style="text-align: justify; ">They will have to take down or disable content considered defamatory or against national security under Article 19 (2) of the Constitution within 24 hours on being notified by the appropriate government or its agency in addition to using automated tools to identify, remove and trace the origin of such content. Intermediaries with over 55 lakh users will be required to have a permanent registered office with physical address and a senior official who would be available for coordination with law enforcement agencies.</p>
<h3 style="text-align: justify; ">Concerns over the draft guidelines</h3>
<p style="text-align: justify; ">Microsoft notes that the problem MEITY is trying to address is of fake news. “Existing regulations provide enough powers to work with social media platforms. There may be a case to bring out additional guidelines for certain types of intermediaries like social media platforms. There may also be a case to strengthen other laws which make the punishment of fake news and misuse of social media stringent. The focus should be on the perpetrators of the crime rather than the intermediaries," it has said in response to the guidelines. Regarding deployment of tools to proactively identify and remove unlawful content, Microsoft cautions that intermediaries will have to monitor all content passing through their systems for this, which is a violation of their individual privacy and right to freedom of expression. It will also be technically impractical due to the high cost of deploying such tech.</p>
<p style="text-align: justify; ">According to Broadband India Forum, one of the grounds for the Supreme Court striking down Section 66A of the IT Act, 2000, in Shreya Singhal vs Union of India was the vagueness of the terms used in the provision, such as offensive, menacing and dangerous, which invaded the right of free speech. However, words with a similar level of vagueness, such as grossly harmful, harassing and hateful exist in the proposed draft.</p>
<p style="text-align: justify; ">The Centre for Internet and Society (CIS) pointed out that existing laws provide enough teeth to the Indian agencies to act. For instance, Section 505 of the IPC has provisions to penalise disinformation while Sections 290 and 153A of the IPC have provisions if the disinformation is being used to create communal strife. CIS has also flagged the scope of the term unlawful as it is not clearly defined, leaving room for broad interpretation. On the traceability clause, CIS draws attention to the lack of clarity on whether it applies on just social media platforms and messaging services or all intermediaries.</p>
<p style="text-align: justify; ">This can be a bit of problem for ISPs which may have no access to contents of an encrypted communication sent and received on its network.</p>
<h3 style="text-align: justify; ">Threat to privacy</h3>
<p style="text-align: justify; ">The traceability clause, which requires intermediaries to use automated tools to trace the person posting unlawful content, came in for a lot of criticism. While the Ministry in an official tweet in January 2018 clarified that it only requires intermediaries to trace the origin of messages which lead to unlawful activities without breaking encryption, experts believe it isn’t possible without lowering encryption standards or building a backdoor to access encrypted communications.</p>
<p style="text-align: justify; ">Amnesty International slammed the clause, arguing, “While governments can legitimately use electronic surveillance to protect people from crime, forcing companies to weaken encryption will affect all users’ online privacy. Such measures would be inherently disproportionate, and therefore impermissible under international human rights law."</p>
<p style="text-align: justify; ">Wipro in its response rues such a traceability requirement could lead to breaking of encryption on apps such as WhatsApp and Signal, and this will be a major threat to the privacy rights of citizens as enshrined in the Puttaswamy judgment of the Supreme Court.</p>
<h3 style="text-align: justify; ">Undue burden on small companies</h3>
<p style="text-align: justify; ">Commenting on the 72 hours timeline for furnishing user data, the Internet Freedom Foundation says that such short deadline for compliance can only be fulfilled by large social media platforms. This might make smaller companies over compliant to government demands for immunity resulting in a total disregard for user privacy.</p>
<p style="text-align: justify; ">Regarding taking down of unlawful content, technology policy researchers form National Institute of Public Finance & Policy (NIPFP) caution that overzealous implementation along with over reliance on technological tools for the detection of unlawful content would lead to the curtailment of online speech. They pointed out the instance where Facebook had removed posts documenting the ethnic cleansing of Rohingyas as it had classified Rohingya organisations as dangerous militant groups.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/livemint-abhijit-ahaskar-february-12-2019-what-the-governments-draft-it-intermediary-guidelines-say'>http://editors.cis-india.org/internet-governance/news/livemint-abhijit-ahaskar-february-12-2019-what-the-governments-draft-it-intermediary-guidelines-say</a>
</p>
No publisherAdminInternet Governance2019-02-13T00:31:29ZNews ItemIntermediary liability law needs updating
http://editors.cis-india.org/internet-governance/blog/business-standard-february-9-2019-sunil-abraham-intermediary-liability-law-needs-updating
<b>The time has come for India to exert its foreign policy muscle. There is a less charitable name for intermediary liability regimes like Sec 79 of the IT Act — private censorship regimes. </b>
<p style="text-align: justify; ">The article was published in <a class="external-link" href="https://www.business-standard.com/article/opinion/intermediary-liability-law-needs-updating-119020900705_1.html">Business Standard</a> on February 9, 2019.</p>
<hr />
<p style="text-align: justify; ">Intermediaries get immunity from liability emerging from user-generated and third-party content because they have no “actual knowledge” until it is brought to their notice using “take down” requests or orders.</p>
<p style="text-align: justify; ">Since some of the harm caused is immediate, irreparable and irreversible, it is the preferred alternative to approaching courts for each case. When intermediary liability regimes were first enacted, most intermediaries were acting as common carriers — ie they did not curate the experience of users in a substantial fashion. While some intermediaries like Wikipedia continue this common carrier tradition, others driven by advertising revenue no longer treat all parties and all pieces of content neutrally. Facebook, Google and Twitter do everything they can to raise advertising revenues. They make you depressed. And if they like you, they get you to go out and vote. There is an urgent need to update intermediary liability law.</p>
<p style="text-align: justify; ">In response to being summoned by multiple governments, Facebook has announced the establishment of an independent oversight board. A global free speech court for the world’s biggest online country. The time has come for India to exert its foreign policy muscle. The amendments to our intermediary liability regime can have global repercussions, and shape the structure and functioning of this and other global courts.</p>
<p style="text-align: justify; ">While with one hand Facebook dealt the oversight board, with the other hand it took down APIs that would enable press and civil society to monitor political advertising in real time. How could they do that with no legal consequences? The answer is simple — those APIs were provided on a voluntary basis. There was no law requiring them to do so.</p>
<p style="text-align: justify; ">There are two approaches that could be followed. One, as scholar of regulatory theory Amba Kak puts it, is to “disincentivise the black box”. Most transparency reports produced by intermediaries today are on a voluntary basis; there is no requirement for this under law. Our new law could require a extensive transparency with appropriate privacy safeguards for the government, affected parties and the general public in terms of revenues, content production and consumption, policy development, contracts, service-level agreements, enforcement, adjudication and appeal. User empowerment measures in the user interface and algorithm explainability could be required. The key word in this approach is transparency.</p>
<p style="text-align: justify; ">The alternative is to incentivise the black box. Here faith is placed in technological solutions like artificial intelligence. To be fair, technological solutions may be desirable for battling child pornography, where pre-censorship (or deletion before content is published) is required. Fingerprinting technology is used to determine if the content exists in a global database maintained by organisations like the Internet Watch Foundation. A similar technology called Content ID is used pre-censor copyright infringement. Unfortunately, this is done by ignoring the flexibilities that exist in Indian copyright law to promote education, protect access knowledge by the disabled, etc. Even within such narrow application of technologies, there have been false positives. Recently, a video of a blogger testing his microphone was identified as a pre-existing copyrighted work.</p>
<p style="text-align: justify; ">The goal of a policy-maker working on this amendment should be to prevent repeats of the Shreya Singhal judgment where sections of the IT Act were read down or struck down. To avoid similar constitution challenges in the future, the rules should not specify any new categories of illegal content, because that would be outside the scope of the parent clause. The fifth ground in the list is sufficient — “violates any law for the time being in force”. Additional grounds, such as “harms minors in anyway”, is vague and cannot apply to all categories of intermediaries — for example, a dating site for sexual minorities. The rights of children need to be protected. But that is best done within the ongoing amendment to the POCSO Act.</p>
<p style="text-align: justify; ">As an engineer, I vote to eliminate redundancy. If there are specific offences that cannot fit in other parts of the law, those offences can be added as separate sections in the IT Act. For example, even though voyeurism is criminalised in the IT Act, the non-consensual distribution of intimate content could be criminalised, as it has been done in the Philippines.</p>
<p style="text-align: justify; ">Provisions that have to do with data retention and government access to that data for the purposes of national security, law enforcement and also anonymised datasets for the public interest should be in the upcoming Data Protection law. The rules for intermediary liability is not the correct place to deal with it, because data retention may also be required of those intermediaries that don’t handle any third-party information or user generated content. Finally, there have to be clear procedures in place for reinstatement of content that has been taken down.</p>
<hr />
<p style="text-align: justify; "><i>Disclosure: The Centre for Internet and Society receives grants from Facebook, Google and Wikimedia Foundation</i></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/business-standard-february-9-2019-sunil-abraham-intermediary-liability-law-needs-updating'>http://editors.cis-india.org/internet-governance/blog/business-standard-february-9-2019-sunil-abraham-intermediary-liability-law-needs-updating</a>
</p>
No publishersunilInternet GovernanceIntermediary Liability2019-02-13T00:05:30ZBlog EntryCIS Comment on ICANN's Draft FY20 Operating Plan and Budget
http://editors.cis-india.org/internet-governance/blog/akriti-bopanna-february-8-2019-comment-on-icann-draft-fy-20-operating-plan-and-budget
<b>At the Centre for Internet and Society, we are grateful for the opportunity to provide our comments on the proposed draft of ICANN’s FY20 Operating Plan and Budget along with their Five-Year Operating Plan Update. As part of the public comment process, ICANN provided a list of documents which can be found here that included their highlights of the budget, the total draft budget for FY20, an operating plan segregated by portfolios, amongst others.</b>
<p style="text-align: justify; ">The following are our comments on relevant aspects from the different documents:</p>
<p style="text-align: justify; ">There are several significant undertakings which have not found adequate support in this budget, chief among them being the implementation of the ICANN Workstream 2 recommendations on Accountability. The budget accounts for any expenses that arise from WS2 as emanating from its contingency fund which is a mere 4%. Totalling more than 100 recommendations across 8 sub groups, execution of these would require significant expenditure. Ideally, this should have been budgeted for in the FY20 budget considering the final report was submitted in June, 2018 and conversations about its implementation have been carried out ever since. It is wondered if this is because the second Workstream does not have the effectuation of its recommendations in its mandate and hence it is easier for ICANN to be slow on it.<a href="#_ftn1" name="_ftnref1"><sup>[1]</sup></a> As a member of the community deeply interested in integrating human rights better in ICANN’s various processes, it is concerning to note the glacial pace of the approval of the aforementioned recommendations especially coupled with the lack of funds allocated to it. Further, there is 1 one person assigned to work on the WS2 implementation work which seems insufficient for the magnitude of work involved.<a href="#_ftn2" name="_ftnref2"><sup>[2]</sup></a></p>
<p style="text-align: justify; ">A topical issue with ICANN currently is its tussle with the implementation of the General Data Protection Regulation (GDPR) and despite the prominence and extent of the legal burden involved, resources to complying with it have not been allocated. Again, it is within the umbrella of the contingency budget.</p>
<p style="text-align: justify; ">The Cross Community Working Group on New gTLD Auction Proceeds is also, presently, developing recommendations on how to distribute the proceeds. It is unclear where these will be funded from since their work is funded by the core ICANN budget yet it is assumed that the recommendations will be funded by the auction proceeds. Almost 7 years after the new gTLD round was open, it is alarming that ICANN has not formulated a plan for the proceeds and are still debating the merits of the entity which would resolve this question, as recently as the last ICANN meeting in October, 2018.</p>
<p style="text-align: justify; ">Another important policy development process being undertaken right now is the Working Group who is reviewing the current new gTLD policies to improve the process by proposing changes or new policies. There are no resources in the FY20 budget to implement the changes that will arise from this but only those to support the Working Group activities.</p>
<p style="text-align: justify; ">Lastly, the budgets lack information on how much each individual RIR contributes.</p>
<p style="text-align: justify; "><b><span style="text-decoration: underline;">Staff costs</span></b></p>
<p style="text-align: justify; ">ICANN’s internal costs on their personnel have been rising for years and slated to account for more than half their annual budget with an estimated 56% or $76.3 million in the next financial year. The community has been consistent in calling upon them to revise their staff costs with many questioning if the growth in staff is justified.<a href="#_ftn3" name="_ftnref3"><sup><sup>[3]</sup></sup></a> There was criticism from all quarters such as the GNSO Council who stated that it is “<i>not convinced that the proposed budget funds the policy work it needs to do over the coming year”.<a href="#_ftn4" name="_ftnref4"><sup><b><sup>[4]</sup></b></sup></a> </i>The excessive use of professional service consultants has come under fire too.</p>
<p style="text-align: justify; ">As pointed out in a mailing list, in comments on the FY19 budget, <i>every single constituency and stakeholder group</i> remarked that personnel costs presented too high a burden on the budget. One of the suggestions presented by the NCSG was to relocate positions from from the LA headquarters to less expensive countries such as those in Asia. This can be seen from the high increase this budget of $200,000 in operational costs though no clear breakdown of that entails was given.</p>
<p style="text-align: justify; ">The view seems to be that ICANN repeatedly chooses to retain higher salaries while reducing funding for the community. This is even more of an issue since there employment remuneration scheme is opaque. In a DIDP I filed enquiring about the average salary across designations, gender, regions and the frequency of bonuses, the response was either to refer to their earlier documents which do not have concrete information or that the relevant documents were not in their possession.<a href="#_ftn5" name="_ftnref5"><sup><sup>[5]</sup></sup></a></p>
<p style="text-align: justify; "><b><span style="text-decoration: underline;">ICANN Fellowship</span></b></p>
<p style="text-align: justify; ">The budget of the fellowship has been reduced which is an important initiative to involve individuals in ICANN who cannot afford the cost of flying to the global ICANN meetings. The focus should be not only be on arriving at a suitable figure for the funding but also to ensure that people who either actively contribute or are likely to are supported as opposed to individuals who are already known in this circle.</p>
<p style="text-align: justify; ">Again, our attempts at understanding the Fellowship selection were met with resistance from ICANN. In a DIDP filed regarding it with questions such as if anyone had received it more than the maximum limit of thrice and details on the selection criteria, no clarity was provided.<a href="#_ftn6" name="_ftnref6"><sup><sup>[6]</sup></sup></a></p>
<p style="text-align: justify; "><b><span style="text-decoration: underline;">Lobbying and Sponsorship</span></b></p>
<p style="text-align: justify; ">At ICANN 63 in Barcelona, I enquired about ICANN’s sponsorship strategies and how the decision making is done with respect to which all events in each region to sponsor and for a comprehensive list of all sponsorship ICANN undertakes and receives. I was told such a document would be published soon but in the 4 months since then, none can be found. It is difficult to comment on the budget for such a team where there is not much information on the work it specifically carries out and the impact of such sponsoring activities. When questioned to someone on their team, I was told that it depends on the needs of each region and events that are significant in such regions. However without public accountability and transparency about these, sponsorship can be seen as a vague heading which could be better spent on community initiatives.</p>
<p style="text-align: justify; ">Talking of Transparency, it has also been pointed out that the Information Transparency Initiative has 3 million dollars set aside for its activities in this budget. It sounds positive yet with no deliverables to show in the past 2 years, it is difficult to ascertain the value of the investment in this initiative.</p>
<p style="text-align: justify; ">Lobbying activities do not find any mention in the budget and neither do the nature of sponsorship from other entities in terms of whether it is travel and accommodation of personnel or any other kind of institutional sponsorship.</p>
<p style="text-align: justify; "><a href="#_ftnref1" name="_ftn1"><sup><sup>[1]</sup></sup></a> https://cis-india.org/internet-governance/blog/icann-work-stream-2-recommendations-on-accountability</p>
<p style="text-align: justify; "><a href="#_ftnref2" name="_ftn2"><sup><sup>[2]</sup></sup></a> https://www.icann.org/en/system/files/files/proposed-opplan-fy20-17dec18-en.pdf</p>
<p style="text-align: justify; "><a href="#_ftnref3" name="_ftn3"><sup><sup>[3]</sup></sup></a> http://domainincite.com/22680-community-calls-on-icann-to-cut-staff-spending</p>
<p style="text-align: justify; "><a href="#_ftnref4" name="_ftn4"><sup><sup>[4]</sup></sup></a> Ibid</p>
<p style="text-align: justify; "><a href="#_ftnref5" name="_ftn5"><sup><sup>[5]</sup></sup></a>https://cis-india.org/internet-governance/blog/didp-request-30-enquiry-about-the-employee-pay-structure-at-icann</p>
<p style="text-align: justify; "><a href="#_ftnref6" name="_ftn6"><sup><sup>[6]</sup></sup></a> https://cis-india.org/internet-governance/blog/didp-31-on-icanns-fellowship-program</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/akriti-bopanna-february-8-2019-comment-on-icann-draft-fy-20-operating-plan-and-budget'>http://editors.cis-india.org/internet-governance/blog/akriti-bopanna-february-8-2019-comment-on-icann-draft-fy-20-operating-plan-and-budget</a>
</p>
No publisherakritiICANNInternet Governance2019-02-12T23:44:46ZBlog EntryThe Future of Work in the Automotive Sector in India
http://editors.cis-india.org/internet-governance/blog/harsh-bajpai-ambika-tandon-and-amber-sinha-february-8-2019-the-future-of-work-in-automotive-sector-in-india
<b>This report empirically studies the future of work in the automotive sector in India. The report has been authored by Harsh Bajpai, Ambika Tandon and Amber Sinha. Rakhi Sehgal and Aayush Rathi have edited the report.</b>
<h2>Introduction</h2>
<p style="text-align: justify;">The adoption of information and communication based technology (ICTs) for industrial use is not a new phenomenon. However, the advent of Industry 4.0 hasbeen described as a paradigm shift in production, involving widespread automation and irreversible shifts in the structure of jobs. Industry 4.0 is widely understood as the technical integration of cyber-physical systems into production and logistics, and the use of Internet of Things (IoTs) in processes and systems. This may pose major challenges for industries, workers, and policymakers as they grapple with shifts in the structure of employment and content of jobs, bring about significant changes in business models, downstream services and the organisation of work.</p>
<p style="text-align: justify;">The adoption of information and communication based technology (ICTs) for industrial use is not a new phenomenon. However, the advent of Industry 4.0 hasbeen described as a paradigm shift in production, involving widespread automation and irreversible shifts in the structure of jobs. Industry 4.0 is widelyunderstood as the technical integration of cyber-physical systems into production and logistics, and the use of Internet of Things (IoTs) in processes and systems.This may pose major challenges for industries, workers, and policymakers as they grapple with shifts in the structure of employment and content of jobs, bringabout significant changes in business models, downstream services and the organisation of work.</p>
<p style="text-align: justify;">Industry 4.0 is characterised by four elements. First, the use of intelligent machines could have significant impact on production through the introduction of automated processes in ‘smart factories.’ Second, real-time production would begin optimising utilisation capacity, with shorter lead times and avoidance of standstills. Third, the self-organisation of machines can lead to decentralisation of production. Finally, Industry 4.0 is commonly characterised by the individualisation of production, responding to customer requests. The advancement of digital technology and consequent increase in automation has raised concerns about unemployment and changes in the structure of work. Globally, automation in manufacturing and services has been posited as replacing jobs with routine task content, while generating jobs with non-routine cognitive and manual tasks.</p>
<p style="text-align: justify;">Some scholars have argued that unemployment will increase globally as technology eliminates tens of million of jobs in the manufacturing sector. It could then result in the lowering of wages and employment opportunities for low skilled workers, and increased investment in capital-intensive technologies for employer.</p>
<p style="text-align: justify;">However, this theory of technologically driven job loss and increasing inequality has been contested on numerous occasions, with the assertion that technology will be an enabler, will change task content rather than displace workers, and will also create new jobs . It has further been argued that other factors such as increasing globalisation, weakening trade unions and platforms for collective bargaining, and disaggregation of the supply chain through outsourcing has led to declined wages, income inequality, inadequate health and safety conditions, and displacement of workers.</p>
<p>In India, there is little evidence of unemployment caused by adoption of technology due to Industry 4.0, but there is a strong consensus that technology affects labour by changing the job mix and skill demand. It should be noted that technological adoption under Industry 4.0 in advanced industrial economies has been driven by cost-benefit analysis due to accessible technology, and a highly skilled labour force. However, these key factors are serious impediments in the Indian context, which brings the large scale adoption of cyber-physical systems into question.</p>
<p style="text-align: justify;">The diffusion of low cost manual labour across a large majority of roles in manufacturing raises concerns about the cost-benefit analysis of investing capital inexpensive automative technology, while also accounting for the resultant displacement of labour. Further, the skill gap across the labour force implies that the adoption of cyber-physical systems would require significant up-skilling or re-skilling to meet the potential shortage in highly skilled professionals.</p>
<p style="text-align: justify;">This is an in-depth case study on the future of work in the automotive sector in India. We chose to focus on the future of work in the automotive sector in India for two reasons: first, the Indian automotive sector is one of largest contributors to the GDP at 7.2 percent, and second, it is one of the largest employment generators among non-agricultural industries. The first section details the structure of the automotive industry in India, including the range of stakeholders, and the national policy framework, through an analysis of academic literature, government reports, and legal documents.</p>
<p style="text-align: justify;">The second section explores different aspects of the future of work in the automotive sector, through a combination of in-depth semi-structured interviews and enterprise-based surveys in the North Indian belt of Gurgaon-Manesar-Dharuhera-Bawal. Challenges posed by shifts in the industrial relations framework, with increasing casualization and emergence of a typical forms of work, will also be explored, with specific reference to crises in collective bargaining and social security. We will then move onto looking at the state of female participation in the workforce in the automotive industry. The report concludes with policy recommendations addressing some of the challenges outlined above.</p>
<p style="text-align: justify;">Read the full report <a href="http://editors.cis-india.org/internet-governance/pdf-automotive-case-study" class="internal-link" title="PDF Automotive Case Study">here</a>.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/harsh-bajpai-ambika-tandon-and-amber-sinha-february-8-2019-the-future-of-work-in-automotive-sector-in-india'>http://editors.cis-india.org/internet-governance/blog/harsh-bajpai-ambika-tandon-and-amber-sinha-february-8-2019-the-future-of-work-in-automotive-sector-in-india</a>
</p>
No publisherHarsh Bajpai, Ambika Tandon, and Amber SinhaAutomotiveInternet GovernanceInternet of Things2020-03-18T09:00:31ZBlog EntryInternet Speech: Perspectives on Regulation and Policy
http://editors.cis-india.org/internet-governance/events/internet-speech-perspectives-on-regulation-and-policy
<b>The Centre for Internet & Society and the University of Munich (LMU), Germany are jointly organizing an international symposium at India Habitat Centre in New Delhi on April 5, 2019</b>
<p><img src="http://editors.cis-india.org/home-images/FreeSpeechSymposium_Poster_02.jpg/@@images/89fe6323-7608-482a-8072-dc241e9f0fda.jpeg" alt="Free Speech Poster" class="image-inline" title="Free Speech Poster" /></p>
<hr />
<p><a class="external-link" href="http://cis-india.org/internet-governance/files/free-speech-symposium-agenda"><b>Click to download the agenda</b></a></p>
<p> </p>
<p><a class="external-link" href="https://cis-india.org/internet-governance/files/free-speech-symposium-agenda"> </a></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/internet-speech-perspectives-on-regulation-and-policy'>http://editors.cis-india.org/internet-governance/events/internet-speech-perspectives-on-regulation-and-policy</a>
</p>
No publisherakritiFreedom of Speech and ExpressionInternet GovernanceFeaturedInternet FreedomEvent2019-04-01T16:38:54ZEventResponse to the Draft of The Information Technology [Intermediary Guidelines (Amendment) Rules] 2018
http://editors.cis-india.org/internet-governance/blog/response-to-the-draft-of-the-information-technology-intermediary-guidelines-amendment-rules-2018
<b>In this response, we aim to examine whether the draft rules meet tests of constitutionality and whether they are consistent with the parent Act. We also examine potential harms that may arise from the Rules as they are currently framed and make recommendations to the draft rules that we hope will help the Government meet its objectives while remaining situated within the constitutional ambit.</b>
<p><br style="text-align: start;" /><span style="text-align: start; float: none;">This document presents the Centre for Internet & Society (CIS) response</span><span style="text-align: start; float: none;"> to the Ministry of Electronics and Information Technology’s invitation</span><span style="text-align: start; float: none;"> to comment and suggest changes to the draft of The Information</span><span style="text-align: start; float: none;"> Technology [Intermediary Guidelines (Amendment) Rules] 2018 (hereinafter</span><span style="text-align: start; float: none;"> referred to as the “draft rules”) published on December 24, 2018. CIS is</span><span style="text-align: start; float: none;"> grateful for the opportunity to put forth its views and comments. This response was sent on the January 31, 2019.</span><br style="text-align: start;" /><br style="text-align: start;" /><span style="text-align: start; float: none;">In this response, we aim to examine whether the draft rules meet tests</span><span style="text-align: start; float: none;"> of constitutionality and whether they are consistent with the parent</span><span style="text-align: start; float: none;"> Act. We also examine potential harms that may arise from the Rules as</span><span style="text-align: start; float: none;"> they are currently framed and make recommendations to the draft rules</span><span style="text-align: start; float: none;"> that we hope will help the Government meet its objectives while</span><span style="text-align: start; float: none;"> remaining situated within the constitutional ambit.</span></p>
<p><span style="text-align: start; float: none;">The response can be accessed <a href="https://cis-india.org/internet-governance/resources/Intermediary%20Liability%20Rules%202018.pdf">here</a>.<br /></span></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/response-to-the-draft-of-the-information-technology-intermediary-guidelines-amendment-rules-2018'>http://editors.cis-india.org/internet-governance/blog/response-to-the-draft-of-the-information-technology-intermediary-guidelines-amendment-rules-2018</a>
</p>
No publisherGurshabad Grover, Elonnai Hickok, Arindrajit Basu, AkritiFreedom of Speech and ExpressionInternet GovernanceIntermediary Liability2019-02-07T08:06:41ZBlog EntryCIS Submission to UN High Level Panel on Digital Cooperation
http://editors.cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-cooperation
<b>The UN high-level panel on Digital Cooperation issued a call for inputs that called for responses to various questions. CIS responded to the call for inputs. </b>
<p><span style="text-align: start; float: none;">The high-level panel on
Digital Cooperation was convened by the UN Secretary-General to advance
proposals to strengthen cooperation in the digital space among
Governments, the private sector, civil society, international
organizations, academia, the technical community and other relevant
stakeholders. The Panel issued a call for input that called for
responses to various questions. CIS responded to the call for inputs.<br /><br />The response can be accessed <a href="https://cis-india.org/internet-governance/submission-to-un-high-level-panel-on-digital-co-operation.pdf">here</a>.<br /></span></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-cooperation'>http://editors.cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-cooperation</a>
</p>
No publisherAayush Rathi, Ambika Tandon, Arindrajit Basu and Elonnai HickokInternational RelationsInternet Governance2019-02-07T07:26:22ZBlog EntryMediaNama roundtables on intermediary liability rules
http://editors.cis-india.org/a2k/news/medianama-roundtables-on-intermediary-liability-rules
<b>MediaNama hosted one policy round-table on Intermediary Liability protections in Bangalore and another round-table in New Delhi, to discuss inputs sought by MEITY on the amendments to Safe Harbor for platforms (payments services, content services, ISPs, etc.) in India. Centre for Internet & Society is a community partner for the event.</b>
<p style="text-align: justify; ">One round-table was held at St. Mark's Hotel in Bangalore on January 25, 2019 and the next one will be held at India Habitat Centre in New Delhi on February 7, 2019. Gurshabad Grover participated in the meeting held on January 25, 2019. Participants discussed the draft amendments to the intermediary liability rules (under Section 79 of the IT Act) and recommendations stakeholders could respond with. For more info <a class="external-link" href="https://www.medianama.com/2019/01/223-announcing-nama-event-on-the-future-of-online-safe-harbor-bangalore-delhi-ad/">click here</a>.</p>
<hr />
<p>MediaNama has posted some pieces after the discussion that may be of interest:</p>
<ul>
<li><a class="external-link" href="https://www.medianama.com/2019/02/223-namapolicy-no-clarity-on-what-constitutes-offenses-for-intermediaries-alok-prasanna-kumar/">No clarity on what constitutes offenses for intermediaries</a> (by Alok Prasanna Kumar)</li>
<li><a class="external-link" href="https://www.medianama.com/2019/02/223-regulation-of-intermediaries-nama/">Should different sizes or categories of intermediaries be regulated differently?</a> (by Nikhil Pahwa)</li>
<li><a class="external-link" href="https://www.medianama.com/2019/02/223-safe-harbor-intermediary-liability-traceability/">The Intent of Traceability is behavioral change</a> (by Nikhil Pahwa)</li>
</ul>
<p>
For more details visit <a href='http://editors.cis-india.org/a2k/news/medianama-roundtables-on-intermediary-liability-rules'>http://editors.cis-india.org/a2k/news/medianama-roundtables-on-intermediary-liability-rules</a>
</p>
No publisherAdminInternet GovernanceIntermediary Liability2019-02-17T15:59:33ZNews ItemDSCI's Bangalore chapter meet
http://editors.cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet
<b>On January 29, 2019, Karan Saini and Gurshabad Grover participated in the Bangalore chapter meet organized by Data Security Council of India in Bangalore.</b>
<p><img src="http://editors.cis-india.org/home-images/DSCI.png/@@images/5964984e-07ca-4be0-8a63-98b2490b5032.png" alt="DSCI" class="image-inline" title="DSCI" /></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet'>http://editors.cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet</a>
</p>
No publisherAdminInternet GovernancePrivacy2019-02-02T01:47:51ZNews ItemConmen seed fake phone numbers in Google to trap people looking for customer care details
http://editors.cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details
<b>Googling for anything might seem like a good idea, but searching for contacts of businesses and customer care numbers is landing people in the hands of conmen.</b>
<p>The article by Tushar Kaushik was published in <a class="external-link" href="https://economictimes.indiatimes.com/news/politics-and-nation/conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details/articleshow/67751196.cms">Economic Times</a> on January 30, 2019.</p>
<hr />
<p style="text-align: justify; ">Many use Google or other search engines for specific contact numbers — the customer care numbers of a bank, for instance. The search results do not throw up bona fide numbers, but those of conmen waiting to lure a victim. The conmen, knowing what the caller is seeking, and on the pretext of helping, cunningly makes them part with information such as bank account, debit/credit card and even the OTP.</p>
<p style="text-align: justify; ">About 20-odd people have been duped in this manner in the past month in Bengaluru, according to the city’s cybercrime police. About 20-30 victims have fallen prey in Gurugram in the last one-and-a-half months. In Maharashtra and Hyderabad, the trend of fake numbers being seeded on Google Maps and being used to dupe people is being observed since October 2018. The frauds are helped by the fact that any user can edit contact information on Google Maps. The Maharashtra cyber police reportedly notified Google authorities regarding this.</p>
<p style="text-align: justify; ">Inspector and in-charge of cyber police station at Gurugram, Anand Kumar, said another variant of such cases was on the rise. People searching for contacts to help them return products they bought from e-commerce websites have been led to fake numbers. “In the past one-and-half months, about 20-30 such complaints have been received,” Kumar said.</p>
<p style="text-align: justify; ">Srinivas Kodali, a Hyderabad-based data security researcher, said similar incidents using fake numbers being uploaded on Google Maps had occurred in Hyderabad 2-3 months ago. He claimed Google had been informed of the incidents.</p>
<p style="text-align: justify; ">Illustrating another instance of the way Google searches are misused, dairy brand Amul issued a legal notice to Google, alleging that a series of fake B2B campaigns regarding Amul Parlours and Distributors have started through fake websites using Google search ads since September 2018.</p>
<p style="text-align: justify; ">Bengaluru-based app developer and co-founder of TBG Labs Harsha Halvi said it was fairly easy for any conman to seed his own number and masquerade as a contact number and make it appear in a Google search. He said all it takes is a very good understanding of search engine optimisation (SEO).</p>
<p style="text-align: justify; ">Gurshabad Grover, senior policy officer at The Centre for Internet and Society, Bengaluru, said, “The problem right now is Google is not making it clear whether something is verified information or is crowdsourced. On Google Maps, businesses can be claimed by legitimate owners. A suggestion is that Google verify the claimed entities,” Grover said. He added that people too should exercise vigilance while accessing information online.</p>
<p style="text-align: justify; ">Additional commissioner of police (crime) at Bengaluru Alok Kumar said Google could not be held responsible for such incidents as individuals seeded the fake numbers.</p>
<p style="text-align: justify; ">Reacting to the incidents, a spokesperson from Google India said, “Overall, allowing users to suggest edits provides comprehensive and up-to-date info, but we recognise there may be occasional inaccuracies or bad edits suggested by users.” The spokesperson said when such issues are reported to Google, the claims are investigated and action is taken in line with the findings.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details'>http://editors.cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details</a>
</p>
No publisherAdminInternet GovernancePrivacy2019-02-01T15:22:27ZNews ItemIndia’s largest bank SBI leaked account data on millions of customers
http://editors.cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers
<b>India’s largest bank has secured an unprotected server that allowed anyone to access financial information on millions of its customers, like bank balances and recent transactions.</b>
<p id="speakable-summary" style="text-align: justify; ">The blog post by Zack Whittaker was <a class="external-link" href="https://techcrunch.com/2019/01/30/state-bank-india-data-leak/">published Tech Crunch</a> on January 30, 2019. Karan Saini was quoted.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">The server, hosted in a regional Mumbai-based data center, stored two months of data from SBI Quick, a text message and call-based system used to request basic information about their bank accounts by customers of <a href="https://www.crunchbase.com/organization/state-bank-of-india#section-overview">the government-owned State Bank of India</a> (SBI), the largest bank in the country and a highly ranked company in the Fortune 500.</p>
<p style="text-align: justify; ">But the bank had not protected the server with a password, allowing anyone who knew where to look to access the data on millions of customers’ information.</p>
<p style="text-align: justify; ">It’s not known for how long the server was open, but long enough for it to be discovered by a security researcher, who told TechCrunch of the leak, but did not want to be named for the story.</p>
<p style="text-align: justify; ">SBI Quick allows SBI’s banking customers to text the bank, or make a missed call, to retrieve information back by text message about their finances and accounts. It’s ideal for millions of the banking giant’s customers who don’t use smartphones or have limited data service. By using predefined keywords, like “BAL” for a customer’s current balance, the service recognizes the customer’s registered phone number and will send back the current amount in that customer’s bank account. The system can also be used to send back the last five transactions, block an ATM card and make inquiries about home or car loans.</p>
<p style="text-align: justify; ">It was the back-end text message system that was exposed, TechCrunch can confirm, storing millions of text messages each day.</p>
<p style="text-align: justify; "><img src="http://editors.cis-india.org/home-images/SBI.png" alt="SBI" class="image-inline" title="SBI" /></p>
<p style="text-align: justify; ">A redacted example of some of the banking and credit information found in the database (Image: TechCrunch)</p>
<p style="text-align: justify; ">The passwordless database allowed us to see all of the text messages going to customers in real time, including their phone numbers, bank balances and recent transactions. The database also contained the customer’s partial bank account number. Some would say when a check had been cashed, and many of the bank’s sent messages included a link to download SBI’s YONO app for internet banking.</p>
<p style="text-align: justify; ">The bank sent out close to three million text messages on Monday alone.</p>
<p style="text-align: justify; ">The database also had daily archives of millions of text messages each, going back to December, allowing anyone with access a detailed view into millions of customers’ finances.</p>
<p style="text-align: justify; ">We verified the data by asking India-based security researcher <a href="https://twitter.com/iasni">Karan Saini</a> to send a text message to the system. Within seconds, we found his phone number in the database, including the text message he received back.</p>
<p style="text-align: justify; ">“The data available could potentially be used to profile and target individuals that are known to have high account balances,” said Saini in a message to TechCrunch. Saini previously <a href="https://www.zdnet.com/article/another-data-leak-hits-india-aadhaar-biometric-database/">found a data leak</a> in India’s Aadhaar, the country’s national identity database, and <a href="https://www.zdnet.com/article/uber-security-flaw-two-factor-login-bypass/">a two-factor bypass bug</a> in Uber’s ridesharing app.</p>
<p style="text-align: justify; ">Saini said that knowing a phone number “could be used to aid social engineering attacks — which is one of the most common attack vectors in the country with regard to financial fraud,” he said.</p>
<p style="text-align: justify; ">SBI <a href="https://www.sbichicago.com/about-us/about-sbi">claims more than</a> 500 million customers across the glob,e with 740 million accounts.</p>
<p style="text-align: justify; ">Just days earlier, SBI accused Aadhaar’s authority, UIDAI, of mishandling citizen data that allowed fake Aadhaar identity cards to be created, despite <a href="https://www.tribuneindia.com/news/nation/uidai-says-tribune-story-misreporting--read-how-that-is-wrong/523478.html">numerous security lapses</a> and misuse of the system. UIDAI denied the report, saying there was “no security breach” of its system. (UIDAI often uses <a href="https://twitter.com/UIDAI/status/1023543590033608705">the term “fake news”</a> to describe coverage it doesn’t like.)</p>
<p style="text-align: justify; ">TechCrunch reached out to SBI and India’s National Critical Information Infrastructure Protection Centre, which receives vulnerability reports for the banking sector. The database was secured overnight.</p>
<p style="text-align: justify; ">Despite several emails, SBI did not comment prior to publication.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers'>http://editors.cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers</a>
</p>
No publisherAdminInternet GovernancePrivacy2019-02-01T15:13:15ZNews ItemAmazon and Walmart are about to take a big hit in India
http://editors.cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india
<b>India is the world’s biggest emerging digital economy, and Silicon Valley’s top companies have invested huge sums to cash in on it. Now new regulations are threatening their business.</b>
<p style="text-align: justify; ">The blog post was published in <a class="external-link" href="https://q13fox.com/2019/01/31/amazon-and-walmart-are-about-to-take-a-big-hit-in-india/">Q13 Fox</a> on January 31, 2019. Gurshabad Grover was quoted.</p>
<hr />
<p style="text-align: justify; ">E-commerce restrictions due to go into effect Friday will prevent global retailers such as Amazon and Walmart from using their deep pockets and massive scale to drive down prices in India.</p>
<p style="text-align: justify; ">And proposed legal changes would require social media companies like Facebook and Twitter to monitor and take down content at the request of Indian authorities, which critics say could be misused for censorship.</p>
<p style="text-align: justify; ">The new rules highlight the risk global tech giants are running in a country they see as <a href="https://www.cnn.com/interactive/2018/11/business/internet-usage-india-future/" rel="noopener" target="_blank">their next growth frontier</a>.</p>
<h3 style="text-align: justify; ">Amazon and Walmart push back</h3>
<p style="text-align: justify; ">The <a href="https://www.cnn.com/2018/12/27/business/india-amazon-walmart/" rel="noopener" target="_blank">new e-commerce rules</a>, announced in late December, look to curb practices like steep discounts that have helped Amazon dominate the US market and already make huge inroads in India.</p>
<p style="text-align: justify; ">The rules state that foreign online retailers can no longer strike deals with companies to offer products that are not available elsewhere. They also prevent these platforms from selling products distributed by companies they have invested in.</p>
<p style="text-align: justify; ">That would strike at the heart of Amazon’s business in India — the US company has <a href="https://www.cnn.com/2018/09/30/tech/more-supermarket-amazon-india/index.html" rel="noopener" target="_blank">snapped up stakes</a> in several local<b> </b>suppliers<b>.</b></p>
<p style="text-align: justify; ">Amazon and India’s biggest online retailer, Walmart-owned Flipkart, had been pushing India to delay the introduction of the new rules, but the government said in a statement Thursday that it had decided “after due consideration” not to do so.</p>
<p style="text-align: justify; ">Amazon had written to the Indian government asking for a four-month extension to comply with the new rules, a company spokesperson said.</p>
<p style="text-align: justify; ">“With over [400,000] sellers and hundreds of thousands of transactions happening daily on the Amazon India Marketplace we need adequate time to understand the details of the policy,” the spokesperson added.</p>
<p style="text-align: justify; ">Flipkart had asked the government for a six-month extension, a person familiar with the matter told CNN.</p>
<p style="text-align: justify; ">The company reportedly warned of “significant customer disruption” if the new policy is implemented this week. Flipkart CEO Kalyan Krishnamurthy said in a letter to the Indian government that the new rules could “have undesirable impacts on the continued growth of e-commerce in India,” <a href="https://www.reuters.com/article/us-india-ecommerce-flipkart-exclusive/exclusive-walmarts-flipkart-warns-of-major-customer-disruption-if-new-india-rules-not-delayed-idUSKCN1PN12E" rel="noopener" target="_blank">according to Reuters</a>.</p>
<p style="text-align: justify; ">The rules will affect the Bangalore-based company’s sales of products like <a href="https://edition.cnn.com/2018/10/12/tech/flipkart-amazon-india-smartphone/index.html" rel="noopener" target="_blank">smartphones</a>, many of which it <a href="https://www.flipkart.com/oppo-new-launch-2wer3-3wsdf-store?affid=HotDeals20&affExtParam2=redpixel&affExtParam1=4513302" rel="noopener" target="_blank">offers exclusively</a> to its customers.</p>
<p style="text-align: justify; ">Flipkart declined to comment.</p>
<p style="text-align: justify; ">The changes follow intensive lobbying by India’s small businesses against Amazon and Walmart’s outsized influence in the country. (Together they have more than 70% of the Indian online shopping market.)<b> </b>The Confederation of All India Traders, which says it represents more than 70 million local retailers, warned the government against granting an extension.</p>
<p style="text-align: justify; ">“If any deferment or extension is given, the small traders both offline and online will be compelled to resort to a national campaign against any such move … which may also have political repercussions,” the group said in a statement earlier this week, a thinly-veiled warning to the government in an election year.</p>
<p style="text-align: justify; ">The trade body expressed “deep satisfaction” at the government’s decision not to extend the deadline.</p>
<h3 style="text-align: justify; ">India’s WhatsApp problem</h3>
<p style="text-align: justify; ">India’s effort to further regulate its internet isn’t restricted to retail.</p>
<p style="text-align: justify; ">In late December, two days before the e-commerce restrictions were unveiled, India’s technology ministry published a host of proposed changes to laws governing online content.</p>
<p style="text-align: justify; ">The changes state that “intermediaries” including internet providers and platforms like Facebook and Twitter must remove “unlawful” material within 24 hours at the request of Indian authorities. That covers content that goes against India’s sovereignty, national security or foreign relations as well as “public order, decency or morality,” the new rules state.</p>
<p style="text-align: justify; ">Experts say the broad phrasing leaves the rules open to misuse and could be used to suppress free speech. It could also lead to self censorship by tech companies to avoid government scrutiny.</p>
<p style="text-align: justify; ">“It can lead to en masse takedown of content,” said Gurshabad Grover, a policy officer at the Bangalore-based Centre for Internet and Society, a think tank. “Intermediaries are often happy to take down perfectly legal content just to avoid liability.”</p>
<p style="text-align: justify; ">Twitter said in a statement that it would continue to lobby the Indian government on the proposed<b> </b>regulations before they are passed into law.</p>
<p style="text-align: justify; ">“Our hope is that after this robust public consultation process any changes to the [rules] in India strike a careful balance that protects important values such as freedom of expression,” a Twitter spokesperson told CNN Business.</p>
<p style="text-align: justify; ">Google and Facebook declined to comment.</p>
<p style="text-align: justify; ">The Asia Internet Coalition, an industry group that counts all three companies as its members, also urged the Indian government to reconsider the rule changes.</p>
<p style="text-align: justify; ">“In addition to interfering with the fundamental rights of freedom of speech and expression, and right to privacy as guaranteed under the constitution, the [proposed regulations] impose burdensome obligations on the intermediaries,” the group said in a letter to India’s technology ministry.</p>
<p style="text-align: justify; ">The regulations appear to be driven by India’s growing battle with fake news and misinformation, with viral rumors on Facebook’s mobile messaging service WhatsApp blamed for <a href="https://edition.cnn.com/2018/09/30/tech/facebook-whatsapp-india-misinformation/index.html" rel="noopener" target="_blank">more than a dozen lynchings</a> last year.</p>
<p style="text-align: justify; ">The Indian government specifically called out the mob violence in its statement announcing the regulations, citing the “misuse of social media by criminals and anti-national elements” as a key factor.</p>
<p style="text-align: justify; ">The rules also state that platforms must enable the tracing of individual posts and messages at the government’s request, a requirement that WhatsApp has <a href="https://money.cnn.com/2018/08/24/technology/whatsapp-india-encryption-privacy/index.html" rel="noopener" target="_blank">previously rejected</a> as a non-starter.</p>
<p style="text-align: justify; ">India is WhatsApp’s biggest market, with more than 200 million users.</p>
<h3 style="text-align: justify; ">Why India matters</h3>
<p style="text-align: justify; ">India has opened itself up to foreign investment in recent years, particularly in its fast-growing tech and retail industries, and companies from around the world have rushed in.</p>
<p style="text-align: justify; ">India’s internet is a particularly tempting prize. About 500 million people are already online, with nearly 900 million more yet to be connected.</p>
<p style="text-align: justify; ">Amazon has pledged at least $5 billion dollars to growing its business in the country, while <a href="https://money.cnn.com/2018/05/09/investing/walmart-flipkart-india-softbank/" rel="noopener" target="_blank">Walmart spent $16 billion<b> </b>to buy Flipkart</a> last year.</p>
<p style="text-align: justify; ">Facebook and Google have also identified India as their next big market, rolling out several features and services in the country before taking it to the rest of the world.</p>
<p style="text-align: justify; ">But the changing legal environment presents a huge challenge, and Big Tech is battling to keep the promise alive.</p>
<p style="text-align: justify; ">“An uncertain, constantly changing regulatory environment is not good for any business,” Mishi Choudhary, legal director at the New York-based advocacy group Software Freedom Law Center<b>,</b> told CNN.</p>
<p style="text-align: justify; ">“India must decide where it sees itself in the global landscape,” Choudhary added. “It can either be a democracy that will let the best company win and provide an open, free and secure internet to its citizens or turn the way our neighbors across the Himalayas [China] have. It can’t have it both ways.”</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india'>http://editors.cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india</a>
</p>
No publisherAdminInternet Governance2019-02-01T15:03:56ZNews ItemJanuary 2019 Newsletter
http://editors.cis-india.org/about/newsletters/january-19-newsletter
<b>The Centre for Internet & Society (CIS) welcomes you to the first issue of its e-Newsletter for 2019.</b>
<p style="text-align: justify; ">The CIS <span class="highlightedSearchTerm">newsletter</span> aims to highlight developments in copyright and patent, free speech and expression, privacy, cyber security, telecom, etc. as well as Industry 4.0, big data, additive manufacturing and so on which are revolutionizing and moving the digital world forward. Through this <span class="highlightedSearchTerm">newsletter</span> we look to engage you with our research and build a strong bond by bringing you insightful articles and blog posts which will be beneficial for you and your business. Throughout the year we will send you stories and insights from our board, staff and community leaders. We welcome your feedback, suggestions or comments regarding our <span class="highlightedSearchTerm">newsletter</span> or any other aspect of our research.</p>
<hr />
<h2 style="text-align: justify; ">Welcome to r@w blog!</h2>
<p style="text-align: justify; ">CIS researchers@work programme (RAW) is delighted to <a class="external-link" href="https://medium.com/rawblog">announce the launch of its new blog hosted on Medium</a>. The RAW blog will feature works by researchers and practitioners working in India and elsewhere at the intersections of internet, digital media, and society. The blog will also feature highlights and materials from ongoing research and events at the researchers@work programme.</p>
<h3 style="text-align: justify; ">Highlights for January 2019</h3>
<ul>
<li style="text-align: justify; ">Ambika Tandon and Aayush Rathi have produced <a class="external-link" href="https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work">a research paper that contextualises the narrative around Industry 4.0 and the future of work</a> with reference to the female labour force in India. </li>
<li style="text-align: justify; ">Gurshabad Grover, Nikhil Srinath and Aayush Rathi (with inputs from Anubha Sinha and Sai Shakti) presented a response to the Telecom Regulatory Authority of India’s Consultation Paper on <a class="external-link" href="https://cis-india.org/internet-governance/blog/response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-ott-communication-services">Regulatory Framework for Over-The-Top (OTT) Communication Services</a>. <i>CIS appreciates the continual efforts of TRAI to have consultations on the regulatory framework that should be applicable to OTT services and Telecom Service Providers (TSPs)</i>.</li>
<li style="text-align: justify; ">Pranesh Prakash, Karan Saini and Elonnai Hickok <a class="external-link" href="https://cis-india.org/internet-governance/blog/pranesh-prakash-elonnai-hickok-karan-saini-january-23-2019-leveraging-the-coordinated-vulnerability-disclosure-process-to-improve-the-state-of-information-security-in-india">authored a policy brief that recommends several changes</a> pertaining to current legislation, policy and practice to the Government of India regarding coordinated vulnerability disclosure (“CVD”) for improving the overarching information and cyber security posture of the country. </li>
<li style="text-align: justify; ">The Global Commission on the Stability of Cyberspace, a multi-stakeholder initiative comprised of eminent individuals across the globe opened a public comment procedure to solicit comments and obtain additional feedback. Arindrajit Basu, Gurshabad Grover and Elonnai Hickok <a class="external-link" href="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation">responded to the public call-offering comments on all six norms and proposing two further norms</a>. </li>
</ul>
<h3>CIS and the News</h3>
<p>The following news pieces were authored by CIS and published on its website in January:</p>
<ul>
<li><a class="external-link" href="https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy">How to make EVMs hack-proof, and elections more trustworthy</a> (Pranesh Prakash; Times of India; December 9, 2018).</li>
<li><a class="external-link" href="https://cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019">Registering for Aadhaar in 2019</a> (Sunil Abraham; Business Standard; January 2, 2019).</li>
<li><a class="external-link" href="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-and-shweta-mohandas-january-14-2019-dna-bill-has-a-sequence-of-problems-that-need-to-be-resolved">The DNA Bill has a sequence of problems that need to be resolved</a> (Shweta Mohandas and Elonnai Hickok; Newslaundry; January 15, 2019).</li>
<li><a class="external-link" href="https://cis-india.org/internet-governance/blog/hindustan-times-gurshabad-grover-january-24-2019-india-should-reconsider-its-proposed-regulation-of-online-content">India should reconsider its proposed regulation of online content</a> (Gurshabad Grover; Hindustan Times; January 24, 2019). <i>Akriti Bopanna and Aayush Rathi provided feedback for the article</i>.</li>
<li><a class="external-link" href="https://cis-india.org/raw/nishant-shah-indian-express-january-27-2019-indias-proposed-new-internet-bill-is-as-repressive-as-the-worst-of-chinese-laws">India’s proposed new internet bill is as repressive as the worst of Chinese laws</a> (Nishant Shah; Indian Express; January 27, 2019).</li>
</ul>
<h3>CIS in the News</h3>
<p>CIS was quoted in these news articles published elsewhere:</p>
<ul>
<li style="text-align: justify; "><a class="external-link" href="https://cis-india.org/internet-governance/news/news-minute-sanyukta-dharmadhikari-january-10-2019-creeped-out-by-netflixs-you">Creeped out by Netflix's 'You'? Here's how you can avoid online stalkers, data thieves</a> (Sanyukta Dharmadhikari; The News Minute; January 10, 2019).</li>
<li><a class="external-link" href="https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru">Civic activism over WhatsApp and stories of and from cab drivers are part of a new narrative in Bengaluru</a> (Sowmya Rajaram; Bangalore Mirror; January 13, 2019).</li>
<li><a class="external-link" href="https://cis-india.org/internet-governance/news/tini-sara-anien-deccan-herald-january-17-2019-they-know-where-you-are">They know where you are</a> (Tini Sara Anien; Deccan Herald; January 17, 2019).</li>
<li><a class="external-link" href="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-january-16-2019-oyo-hotels-real-time-digital-record-database-sparks-privacy-fears">Oyo Hotels’ Real-Time Digital Record Database Sparks Privacy Fears</a> (Nishant Sharma; Bloomberg Quint; January 16, 2019).</li>
<li><a class="external-link" href="https://cis-india.org/internet-governance/news/scroll-in-january-18-2019-devarsi-ghosh-is-the-viral-10yearchallenge-just-another-sneaky-way-for-tech-firms-to-gather-users-personal-data">Is the viral #10YearChallenge just another sneaky way for tech firms to gather users’ personal data?</a> (Devarsi Ghosh; Scroll.in; January 18, 2019).</li>
<li><a class="external-link" href="https://cis-india.org/a2k/news/wired-january-22-2019-google-wikipedia-machine-learning-glow-languages">Google Gives Wikimedia Millions—Plus Machine Learning Tools</a> (Wired; January 22, 2019).</li>
<li><a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-herald-surupasree-sarmmah-january-23-2019-new-movies-lose-out-due-to-piracy">New movies lose out due to piracy</a> (Surupasree Sarmmah; Deccan Herald; January 23, 2019).</li>
<li><a class="external-link" href="https://cis-india.org/internet-governance/news/the-better-india-vidya-raja-january-24-2019-aadhaar-biometric-privacy-safety-online-india">Submitted Your Biometrics for Aadhaar? Here’s How You Can Lock/Unlock That Data</a> (Vidya Raja; Better India; January 24, 2019).</li>
<li><a class="external-link" href="https://cis-india.org/internet-governance/news/tech-crunch-zak-whittaker-january-30-2019-indias-largest-bank-sbi-leaked-account-data-on-millions-of-customers">India’s largest bank SBI leaked account data on millions of customers</a> (Zack Whittaker; Tech Crunch; January 30, 2019).</li>
<li><a class="external-link" href="https://cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly">Open standards can disrupt Facebook’s messaging monopoly</a> (Abhimanyu Ghoshal; The Next Web; January 30, 2019).</li>
<li><a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-tushar-kaushik-january-30-2019-conmen-seed-fake-phone-numbers-in-google-to-trap-people-looking-for-customer-care-details">Conmen seed fake phone numbers in Google to trap people looking for customer care details </a>(Tushar Kaushik; Economic Times; January 30, 2019).</li>
<li><a class="external-link" href="https://cis-india.org/internet-governance/news/q-13-fox-january-31-2019-amazon-and-walmart-are-about-to-take-a-big-hit-in-india">Amazon and Walmart are about to take a big hit in India</a> (Q13 Fox; January 31, 2019).</li>
</ul>
<div></div>
<ul>
</ul>
<div></div>
<h2><a class="external-link" href="https://cis-india.org/internet-governance">Internet Governance</a></h2>
<p style="text-align: justify; ">As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.</p>
<h3 style="text-align: justify; ">Cyber Security</h3>
<p><b>Submission</b></p>
<ul>
<li><a class="external-link" href="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation">Response to GCSC on Request for Consultation: Norm Package Singapore</a> (Gurshabad Grover, Arindrajit Basu and Elonnai Hickok; January 22, 2019).</li>
</ul>
<div><b>Policy Brief</b></div>
<div>
<ul>
<li style="text-align: justify; "><a class="external-link" href="https://cis-india.org/internet-governance/blog/pranesh-prakash-elonnai-hickok-karan-saini-january-23-2019-leveraging-the-coordinated-vulnerability-disclosure-process-to-improve-the-state-of-information-security-in-india">Leveraging the Coordinated Vulnerability Disclosure Process to Improve the State of Information Security in India</a> (Pranesh Prakash; Karan Saini and Elonnai Hickok; January 23, 2019).</li>
</ul>
<h3>Privacy</h3>
<p><b>Submission</b></p>
<ul>
<li><a class="external-link" href="https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-co-operation">CIS Submission to UN High Level Panel on Digital Co-operation</a> (Aayush Rathi, Ambika Tandon, Arindrajit Basu and Elonnai Hickok; January 30, 2019).</li>
</ul>
<h3>Gender</h3>
<p><b>Research Paper</b></p>
<ul>
<li><a class="external-link" href="https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work">A Gendered Future of Work</a> (Ambika Tandon and Aayush Rathi; December 19, 2018).</li>
</ul>
<h3>Event Organized</h3>
<ul>
<li><a class="external-link" href="https://cis-india.org/internet-governance/news/rfcs-we-love-meetup">RFCs We Love meetup</a> (Organized by CIS and India Internet Engineering Society; CIS, Bangalore; January 19, 2019).</li>
</ul>
<h3>Events Participated / Partnered In</h3>
<ul>
<li><a class="external-link" href="https://cis-india.org/internet-governance/news/webinar-on-the-draft-intermediary-guidelines-amendment-rules">Webinar on the draft Intermediary Guidelines Amendment Rules</a> (Organized by CCAOI and the ISOC Delhi Chapter; New Delhi; January 10, 2019). Gurshabad Grover was a discussant in the panel.</li>
<li><a class="external-link" href="https://cis-india.org/a2k/news/medianama-roundtables-on-intermediary-liability-rules">MediaNama roundtables on intermediary liability rules</a> (St. Marks Hotel, Bangalore; January 25, 2019). CIS was a community partner. Gurshabad Grover participated in the meeting.</li>
<li><a class="external-link" href="https://cis-india.org/internet-governance/news/dscis-bangalore-chapter-meet">DSCI's Bangalore chapter meet</a> (Organized by Data Security Council of India; Bangalore; January 29, 2019). Karan Saini and Gurshabad Grover participated in the meet.</li>
</ul>
<div>
<h2><a class="external-link" href="https://cis-india.org/telecom">Telecom</a></h2>
<p style="text-align: justify; ">The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions.</p>
<h3 style="text-align: justify; ">Submission</h3>
<ul>
<li> <a class="external-link" href="https://cis-india.org/internet-governance/blog/response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-ott-communication-services">Response to TRAI Consultation Paper on Regulatory Framework for Over-The-Top (OTT) Communication Services</a> (Gurshabad Grover, Nikhil Srinath and Aayush Rathi with inputs from Anubha Sinha and Sai Shakti; January 10, 2019).</li>
</ul>
</div>
<ul>
</ul>
</div>
<div></div>
<h2><a class="external-link" href="https://cis-india.org/raw">Researchers at Work (RAW)</a></h2>
<p style="text-align: justify; ">The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:</p>
<p style="text-align: justify; "><b>Announcement</b></p>
<ul>
<li><a class="external-link" href="https://cis-india.org/raw/irc19-list">Internet Researchers' Conference 2019 (IRC19): #List, Jan 30 - Feb 1, Lamakaan</a> (P.P. Sneha; January 9, 2019).</li>
</ul>
<ul>
</ul>
<hr />
<h2><a class="external-link" href="http://cis-india.org/">About CIS</a></h2>
<p style="text-align: justify; ">The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.</p>
<p>► Follow us elsewhere</p>
<div>
<ul>
<li>Twitter:<a href="http://twitter.com/cis_india"> http://twitter.com/cis_india</a></li>
<li>Twitter - Access to Knowledge: <a href="https://twitter.com/CISA2K">https://twitter.com/CISA2K</a></li>
<li>Twitter - Information Policy: <a href="https://twitter.com/CIS_InfoPolicy">https://twitter.com/CIS_InfoPolicy</a></li>
<li>Facebook - Access to Knowledge:<a href="https://www.facebook.com/cisa2k"> https://www.facebook.com/cisa2k</a></li>
<li>E-Mail - Access to Knowledge: <a>a2k@cis-india.org</a></li>
<li>E-Mail - Researchers at Work: <a>raw@cis-india.org</a></li>
<li>List - Researchers at Work: <a href="https://lists.ghserv.net/mailman/listinfo/researchers">https://lists.ghserv.net/mailman/listinfo/researchers</a></li>
</ul>
</div>
<p>► Support Us</p>
<div>Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.</div>
<p>► Request for Collaboration</p>
<div>
<p style="text-align: justify; ">We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at <a>tanveer@cis-india.org</a>.</p>
<div style="text-align: justify; "><i>CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects</i>.</div>
</div>
<p>
For more details visit <a href='http://editors.cis-india.org/about/newsletters/january-19-newsletter'>http://editors.cis-india.org/about/newsletters/january-19-newsletter</a>
</p>
No publisherpraskrishnaResearchers at WorkInternet GovernanceAccess to Knowledge2019-03-03T16:34:21ZPageOpen standards can disrupt Facebook’s messaging monopoly
http://editors.cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly
<b>Facebook made the news last week when The New York Times’ Mike Isaac reported that CEO Mark Zuckerberg intended to integrate the company’s three messaging platforms: WhatsApp, Messenger, and Instagram.</b>
<p style="text-align: justify; ">The blog post by Abhimanyu Ghoshal was <a class="external-link" href="https://thenextweb.com/facebook/2019/01/28/open-standards-can-help-disrupt-facebook-messaging-monopoly/">published in The Next Web</a> on January 30, 2019. Pranesh Prakash was quoted.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">We don’t have all the details of exactly how this will work. The plan is still in its early stages, and there are plenty of moving parts – legal and technical – to take care of. What’s clear is this: with more than 2.6 billion users between the platforms, this is set to impact a lot of people if it goes through – and potentially many hundreds of millions more in the following years.</p>
<p style="text-align: justify; ">While the specifics of the move are yet to be revealed, a move like this could help Facebook create more detailed profiles of its users. Even if the company encrypts communications end-to-end as it seemed to imply in its responses to NYT, it could still leverage communications metadata to target ads more accurately than you might think.</p>
<p style="text-align: justify; ">Here’s an example: without looking at your messages (because they’re encrypted), Facebook could gather data on who you chat with most often and for how long, later correlating that with the recipients’ interests from Instagram. It could then show you ads for gifts that contact may like, right around the time their birthday comes up.</p>
<p style="text-align: justify; ">Integrating these platforms could also bolster Facebook’s efforts to keep users tied into its ecosystem. That’s problematic, when you consider the larger your network of contacts is on the company’s services, the harder it is for you to leave them and use an alternative you’re more comfortable with.</p>
<p style="text-align: justify; ">Is there a way out? <a href="https://www.linkedin.com/in/praneshprakash/" rel="nofollow noopener" target="_blank">Pranesh Prakash</a> – a Fellow at the <a href="https://cis-india.org/" rel="nofollow noopener" target="_blank">Center for Internet and Society</a>, as well as a Fellow at the <a href="https://www.newamerica.org/" rel="nofollow noopener" target="_blank">New America</a> think tank – believes that the answer lies not in breaking up Facebook over privacy laws, but in competition, and regulators at the government level should demand Facebook use open standards for its messaging platforms.</p>
<p style="text-align: justify; ">Prakash explained that standards like SMTP and IMAP, which are used for facilitating email exchanges, allow for interoperability between services run by different organizations. They also let users choose the client apps they prefer for accessing their inboxes.</p>
<p style="text-align: justify; ">Facebook’s messaging services, meanwhile, run on closed standards and don’t play nice with platforms created by third parties.</p>
<p style="text-align: justify; ">This results in people becoming trapped in Facebook’s ecosystem: even if you’re opposed to using the company’s products, you can’t realistically ditch them all because your friends and family are all using its platforms.</p>
<p style="text-align: justify; ">In case you’re worried about open-source protocols not being up to the task of serving massive networks like the ones Facebook operates, consider the fact that <a href="https://mycodeplex.wordpress.com/2016/03/08/inside-of-whatsapp-part-1/" rel="nofollow noopener" target="_blank">WhatsApp runs on FunXMPP</a>, a customized version of <a href="https://xmpp.org/" rel="nofollow noopener" target="_blank">the open XMPP set of standards</a> that anyone can use for their own projects.</p>
<p style="text-align: justify; ">If Facebook is doing the difficult legwork of unifying the underlying technical infrastructure of its three apps, Prakash argues, <a href="https://www.hindustantimes.com/analysis/privacy-laws-cannot-make-facebeook-and-google-accountable/story-Yne6DwUoGb0eO9mRxaDTaL.html" rel="nofollow noopener" target="_blank">it’d do well to make its new protocol public and open-source</a>. That way, anyone should be able to use the company’s services to reach people just the same as when they choose to use a service created by a separate entity.</p>
<p style="text-align: justify; ">Prakash said that the only way diminishing Facebook’s power in this regard is to open up access to its network of users. In doing so, it will see people stick with the company’s services because they like using them, not because they can’t stay in touch with their contacts.</p>
<p style="text-align: justify; ">Questions surrounding Facebook’s monopolistic domination of the messaging space will inevitably crop up when the company implements Zuckerberg’s plan, and this sounds like a healthy way to tackle those issues.</p>
<p style="text-align: justify; ">Naturally, that seems like it’d hurt Facebook’s bottom line – but it’s important to start thinking about realistic measures to comply with antitrust law – or risk being booted from countries that don’t appreciate the way the company does business.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly'>http://editors.cis-india.org/internet-governance/news/the-next-web-abhimanyu-ghoshal-january-30-2019-open-standards-can-disrupt-facebooks-messaging-monopoly</a>
</p>
No publisherAdminInternet Governance2019-02-02T01:59:37ZNews Item