<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 81 to 95.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/digital-natives/pathways/facultyworkshop"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/raw/platforms-power-and-politics-perspectives-from-domestic-and-care-work-in-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/web-accessibility-policy-making-an-international-perspective"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/high-level-comparison-and-analysis-of-the-use-and-regulation-of-dna-based-technology-bill-2017"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/blog/enabling-elections"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/telecom/blog/comments-on-dot-panel-report-via-mygov"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/crowdsourcing-incidents-of-communication-privacy-violation-in-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/telecom/blog/an-introduction-to-spectrum-sharing"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/raw/navigating-the-digitalisation-of-finance"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/digital-futures-internet-freedom-and-millennials-2"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/towards-algorithmic-transparency"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/raw/ifat-itf-protecting-workers-in-digital-platform-economy-ola-uber-occupational-health-safety"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/raw/ifat-itf-locking-down-the-impact-of-covid-19"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/digital-natives/pathways/facultyworkshop">
    <title>The Digital Classroom: Social Justice and Pedagogy</title>
    <link>http://editors.cis-india.org/digital-natives/pathways/facultyworkshop</link>
    <description>
        &lt;b&gt;What happens when we look at the classroom as a space of social justice? What are the ways in which students can be engaged in learning beyond rote memorisation? What innovative methods can be evolved to make students stakeholders in their learning process? These were some of the questions that were thrown up and discussed at the 2 day Faculty Training workshop for participant from colleges included in the Pathways to Higher Education programme, supported by Ford Foundation and collaboratively executed by the Higher Education Innovation and Research Application and the Centre for Internet and Society, Bangalore.&lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The workshop focused on 3 chief challenges in contemporary
pedagogy and teaching in higher education in India as identified by &lt;a class="external-link" href="http://heira.in/"&gt;HEIRA&lt;/a&gt;: The need for innovative
curricula, challenges to social justice in education, and possibilities offered
by the intersection of digital and internet technologies with classroom
teaching and evaluation. In the open discussions, the participating faculty
members used their multidisciplinary skills and teaching experience to look at possibilities that we might implement in our classrooms to create a more
inclusive and participatory environment. The conversations were varied, and
through 3 blog entries I want to capture the focus points of the workshop. In
this first post, I focus specifically on the changing nature of student
engagement with education and innovative ways by which we can learn from the
digital platforms of learning and knowledge production and implement certain
innovations in pedagogy that might better help create inclusive and just learning
environments in the undergraduate classroom in India.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Peer 2 Peer:&lt;/strong&gt; One of the observations that was made
unanimously by all the faculty members was that students respond better, learn
faster, engage more deeply with their syllabus when the instructor has a
personal rapport with them. Traditionally, the teachers who have established
human contact which goes beyond the call of duty are also the teachers that
have become catalysts and inspirations for the students. Especially with the
digital aesthetics of non-hierarchical information interaction, this has become
the call of the day.&lt;/p&gt;
&lt;p&gt;Establishing the teacher as a peer within the classroom,
rather than the fountainhead of information flow, is an experiment worth
conducting. Like on other digital platforms, can we think of the classroom as a
space where the interlocutors each bring their life experience and learning to
start an information exchange and dialogue that would make them stakeholders in
the process of learning? This would mean that the teacher would be a &lt;em&gt;facilitator&lt;/em&gt; who builds conditions of
knowledge production and dissemination, thus also changing his/her relationship
with the idea of curriculum and teaching.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reciprocal evaluation&lt;/strong&gt;: It was pointed out that the grade
oriented academic system often leads to students disengaging with innovative
and meaningful learning practices. With the pressure of completing the
curriculum, the students’ instrumental relationship with their classroom
learning and the highly conservative structures of higher education that do not
offer enough space to experiment with the teaching methods, it often becomes
difficult to initiate innovative pedagogic practices. Learning from the
differently hierarchised digital spaces, it was suggested that one of the ways
by which this could be countered is by introducing reciprocal evaluation
patterns which might not directly be associated with the grades but would
recognise and appreciate the skills that students bring to their learning.&lt;/p&gt;
&lt;p&gt;Inspired by the Badges contest at &lt;a class="external-link" href="http://hastac.org/tag/badges"&gt;HASTAC&lt;/a&gt;,
it was suggested that evaluation has to take into account, more than grades.
Different students bring different skills, experiences, personalities and
behaviours to bear upon the syllabus. They work individually and in clusters to
understand and analyse the curriculum. Recognising these skills and the roles
that they play in their learning environments is essential. Getting students to
offer different badges to each other as well as to the teachers involved, helps
them understand their own learning process and engages them in new ways of
learning.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role based learning: &lt;/strong&gt;Within the Web 2.0 there is a peculiar
condition where individuals are recognised simultaneously as experts and
novices. They bring certain knowledges and experiences to the table which make
them credible sources of information and analysis in those areas. At the same
time, they are often beginner learners in certain other areas and they harness
the power of the web to learn. Such a distributed imagination of a student as
not equally proficient in all areas, but diversely equipped to deal with
different disciplines is missing from our understanding of the higher education
classroom.&lt;/p&gt;
&lt;p&gt;We discussed the possibility of making the student responsible not
only for his/her own learning but also the learning of the peers in the
classroom. Making the student aware of what s/he is good at and where s/he is
lacking allows them to gain confidence and also realise that everybody has
differential strengths and aptitudes. Such a classroom might look different
because the students don’t have to be pitched in stressful competition with
each other but instead work collaboratively to learn, research and produce
knowledge in a nurturing and supportive learning environment.&lt;/p&gt;
&lt;p&gt;These initial discussions look at the possibility of
innovative classroom teaching that can accommodate for the skills and
differences of the students in higher education in India. The conversations
opened up the idea that the classroom can be reshaped so that it becomes a more
inclusive space where the quality of students’ access to education can be
improved. It also ties in with the larger imagination of classrooms as spaces
where principles of social justice can be invoked so that students who are
disadvantaged in language, learning skills, socio-economic backgrounds, are not
just looked at as either ‘beyond help’ or ‘victims of a system’. Instead, it
encourages to look at the students as differential learners who need to be made
stakeholders in their own processes of learning and education.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/digital-natives/pathways/facultyworkshop'&gt;http://editors.cis-india.org/digital-natives/pathways/facultyworkshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Higher Education</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>New Pedagogies</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Pluralism</dc:subject>
    

   <dc:date>2015-05-08T12:36:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/raw/platforms-power-and-politics-perspectives-from-domestic-and-care-work-in-india">
    <title>Platforms, Power, and Politics: Perspectives from Domestic and Care Work in India</title>
    <link>http://editors.cis-india.org/raw/platforms-power-and-politics-perspectives-from-domestic-and-care-work-in-india</link>
    <description>
        &lt;b&gt;CIS has been undertaking a two-year project studying the entry of digital platforms in the domestic and care work in India, supported by the Association for Progressive Communications as part of the Feminist Internet Research Network. Implemented through 2019-21, the objective of the project is to use a feminist lens to critique platform modalities and orient platformisation dynamics in radically different, worker-first ways. Ambika Tandon and Aayush Rathi led the research team at CIS. The Domestic Workers’ Rights Union is a partner in the implementation of the project, as co-researchers. Geeta Menon, head of DWRU, was an advisor on the project, and the research team consisted of Parijatha G.P., Radha Keerthana, Zeenathunnisa, and Sumathi, who are office holders in the union and are responsible for organising workers and addressing their concerns.
&lt;/b&gt;
        &lt;p&gt;&lt;span&gt;The Executive Summary for the project report is below.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The full report, ‘Platforms, power, and politics: Perspectives from domestic and care work in India’, can be found &lt;a href="http://editors.cis-india.org/raw/platforms-power-and-politics-pdf" class="external-link"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The press release can be found &lt;a href="http://editors.cis-india.org/raw/platforms-power-and-politics-press-release-pdf" class="external-link"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;span&gt;Introduction&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Paid domestic and care work is witnessing the entry of digital intermediaries over the past decade. More recently, there has been tremendous growth of digital platforms. This holds the potential to impact millions of workers in the sector, which is characterised by a long history of informality and exclusion from rights-according legal frameworks. Digital intermediation of domestic and care work has been a space of high-growth, but also high-attrition. In India, order books of digital platforms providing domestic and care work services were reported to have been growing by upto 60 percent month-on-month in 2016. This is expected to shift the organisation of workers and employment relations profoundly. &lt;br /&gt;&lt;br /&gt;Broadly, the discourse on digital platforms providing home-based services can be summarised as follows: proponents argue that digitisation will act as a step towards bringing formalisation to the sector, while critics argue that platforms could replicate the exploitation of workers by further disguising the employer-employee relationship. Similar debates around lack of protections and precarity have also taken place in other occupations in gig work such as transportation and food delivery. In fact, the similarity in precarity and the informal nature of this relationship across gig work and domestic work has led to domestic workers being labelled the original gig workers. Domestic work is a particularly vulnerable and unprotected sector, which makes work in the sector qualitatively different from most other sectors in the gig or sharing economy.&lt;br /&gt;&lt;br /&gt;Through a feminist approach to digital labour, our project aimed to examine the dynamics of platformisation in, and of domestic or reproductive care work. Our hypothesis was that platforms are reconfiguring labour conditions, which could empower and/or exploit workers in ways qualitatively different from non-standard work off the platform. In order to interrogate this further, we studied several aspects of the work relationship, including wages, conditions of work, social security, skill levels, and worker surveillance off platforms.&lt;/p&gt;
&lt;h3&gt;Methodology&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We borrowed from ethnographic methods and feminist principles to co-design and implement the research tools with grassroots workers and organisers. Between June to November 2019, we conducted 65 in-depth semi-structured interviews primarily in New Delhi and Bengaluru. A majority of these were with domestic workers who were seeking or had found work through platforms. We also did interviews with workers who had found work through traditional placement agencies to compare our findings, and with representatives from platforms, government labour departments, and workers collectives. Of the workers we interviewed, a majority were women, but men were included as well. Interviews in New Delhi were undertaken by CIS, while interviews with workers in Bengaluru were undertaken by grassroots activists in Bengaluru, affiliated with the Domestic Workers Rights Union (DWRU).&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;In implementing the data collection approach, we employed feminist methodological principles of intersectionality, self-reflexivity, and participation. The methodology draws on standpoint theory, which encourages knowledge production that centres the lived experiences of marginalised groups. We were acutely aware of our own positionality as high income, Savarna researchers studying a sector dominated by Dalit, Bahujan and Adivasi women from low income groups. This power differential was softened partially by involving DWRU through the course of the project. Workers across both field sites were also interviewed in spaces familiar to them, most often their homes, in languages that they were comfortable with including Hindi, Kannada, and Tamil.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Feminist principles also instrumental during the data analysis, with focus on intersectionality and self-reflexivity. We highlighted the ways in which inequalities of gender, income, migration status, caste, and religion are replicated and amplified in the platform economy. In particular, we discussed the impact of the digital gender gap in access and skills on workers’ ability to find economic opportunities.&lt;/p&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;Findings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Our typology of platforms mediating domestic work finds three types of platforms – (i) marketplace, or platforms that list workers’ data on their profile, provide certain filters for automated selection of a pool of workers, and charge a fee from customers for access to workers’ contact details, (ii) digital placement agency, or platforms that provide an end-to-end placement service to customers, identify appropriate workers on the basis of selection criteria, and negotiate conditions of work on behalf of workers, and (iii) on-demand platforms, or companies that provide services or ‘gigs’ such as cleaning on an hourly basis, performed by a roster of workers who are characterised as ‘independent contractors’.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;When it comes to the role played by platforms in determining employment relations, there is a wide variation within and across platform categories. There are both weak and strong models of intervention. On one end of the spectrum are marketplaces, with minimal intervention in the recruitment process, and on the other on-demand platforms, that exact control over each aspect of work. Digital platforms reconfigure the conception of intermediaries in the domestic work sector, functioning as next-generation placement agencies. All three platform types contain aspects that provide workers agency, as well as those that reinforce their positions of low-power. Platform design impacts the role platforms play in setting conditions of work, but does not determine it entirely.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;(Re)shaping the terms of work&lt;/strong&gt;&lt;br /&gt;Across the three types of platforms, wages are slightly higher than or matching those of workers off platforms. Some marketplace platforms have incorporated features to nudge customers towards setting higher wages, such as enforcing minimum wage standards, or informing customers of expected wages in their locality. Conversely, on-demand platforms charge a high rate of commission from workers, despite refusing to recognise them as employees. This indicates that this is a misclassification of an employment relationship, given that workers are unable to set their own conditions or wages for work. Despite the high rates of commission and appropriation of labour by platforms, on-demand workers earn higher wages than workers on other platforms. The relatively high wage is a result of marketing on-demand cleaning as professionalised and more skilled than day-to-day cleaning. Tasks in the sector continue to be distributed along the lines of gender and caste, as has historically been the case. Dalit, Bahujan and Adivasi women are more likely to take up work such as cleaning and washing dishes, while men and women across castes are equally distributed in cooking work. Women dominate tasks such as elderly and childcare, as in the traditional economy. Workers in professionalised tasks such as deep cleaning that requires technical equipment and chemicals are almost entirely men.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Digital divides and workers’ agency&lt;/strong&gt;&lt;br /&gt;We find that workers are primarily onboarded onto platforms by learning about it from other workers, through onboarding camps held by platforms, or offline advertising by platforms. Such in-person onboarding techniques allows workers with no digital access or literacy to register themselves on marketplace platforms and digital placement agencies.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;However, we find that low levels of education and digital literacy continue to impact platformed labour by creating a strong informational asymmetry between workers and platforms. For instance, we find that women workers from low income communities have very little information about how platforms work, causing deep distrust. Workers with digital devices and literacy (and therefore a relatively better understanding of the functionality of the platform), physical mobility and the resources to bear indirect costs that were outsourced to them were at a significant advantage in finding better-paying jobs. Workers who were seeking flexibility and were not necessarily dependent on the platform for their primary income were also better placed than those entirely dependent on platforms. Women workers tended to be disadvantaged on all these counts, limiting their agency and capacity to reap the benefits of the platform economy.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Across the three types of platforms, systems of placement and ratings add to the information asymmetry, as workers are not aware of the impact of ratings on their ability to find work or charge better wages. Ratings and filtering systems also hard-code the impact of workers’ social characteristics on their work. Workers are unable to exercise control over their data, further undermining their agency vis-a-vis platforms and employers. We identify a clear need for collective bargaining structures to protect workers’ rights, although platformed domestic workers remained distant from both domestic work unions and emergent unions of platform workers in other sectors.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Intersectionalities of formalisation&lt;/strong&gt;&lt;br /&gt;We find that inequalities of caste, class, and gender that have historically shaped the sector continue to be replicated or even amplified in the platform economy. What remains clear is that platforms in the domestic work sector adopt the logics of this sector, more than the converse. Platformisation is conflated with formalisation, and it is within this vector, from complete informality to piecemeal formalisation, that platforms operate. Labour benefits do not take the form of labour protections or welfare entitlements that are the central function of formalisation processes. Instead, the so-called benefits are intended to transform domestic workers to participate within the logics and vagaries of the market.&lt;/p&gt;
&lt;h3&gt;Policy Recommendations&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recognise and implement labour protections for domestic workers &lt;/strong&gt;&lt;br /&gt;Domestic workers have historically occupied the most vulnerable positions in the workforce, with limited legal protections. Exposed to the regulatory grey areas that platforms operate in, this doubly exposes domestic workers to precarious conditions of work. Despite an avowed move towards formalisation of domestic work, platform-mediated labour continues to retain characteristics of informal labour, even heightening some.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;If pushed to do so, platform companies can be instrumental in resolving some of the implementation challenges that governments have faced in enforcing legislative protections sought to be made available to domestic workers. Platforms have databases of workers, which can be used to mandatorily register them for social security schemes offered by the government. This data can also be used for better policy making, in the absence of reliable statistics particularly on migrant workers in the informal economy.&lt;em&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Reduce the protective gap between employment and self-employment &lt;/strong&gt;&lt;br /&gt;The (mis)classification of “gig” work within labour law frameworks is still a matter that continues to be hotly debated within policy practitioners, legal scholarship, and civil society actors. Three positions, in particular, have been taken—treating gig workers as employees, independent contractors, or occupying a third intermediate category. More recently, there have been some legal victories guaranteeing employment protections and increasing platform companies’ accountability. However, these successes have been more visible in Global North jurisdictions.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Regardless of the resolution of these ongoing debates over employment status, labour frameworks should provide some universal protections to all categories of labour. Such protections must include universal coverage of social security, in addition to rights such as freedom of association, collective bargaining, equal remuneration and anti-discrimination. Policies geared towards achieving this objective would be significant in reducing the protective gaps between different categories of labour, and would particularly help historical and emerging occupational categories of workers such as “gig” workers and domestic workers.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recognise the specific challenge(s) and potential of platformisation of domestic work &lt;/strong&gt;&lt;br /&gt;Platforms hold the potential of acting as effective facilitators in informal labour markets. Even when they do not replace existing recruitment pathways, they provide alternate ones. Workers were more likely to register on a platform if they were entering the domestic work labour market recently (often distress and migration driven), or had not enjoyed success with informal, word-of-mouth networks. However, platforms also heighten labour market insecurities, and create new ones. These potential risks need to be specifically recognised through appropriate frameworks, such as social security, discrimination law and data protection.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Tailor policy-making to platform models &lt;/strong&gt;&lt;br /&gt;We identify three types of platforms, each of which intervene to varying degrees in the work relationship. We recommend that digital placement agencies and marketplace platforms be registered with governments and enforce basic protections for workers such as provision of minimum wage, preventing abuse (including non-payment of wages) and trafficking. On-demand companies on the other hand, must be treated as employers, and workers be accorded employment protections including social security.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;In addition to rights-based policy actions, legal-regulatory mechanisms geared towards mitigating the precariousness of platform-based work are required. This can take the shape of clarifying and expanding existing legal-regulatory formulations, or preparing new ones. Such policy making should factor in the power and information asymmetry between domestic workers (and gig workers, generally) and platforms.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Further, in the absence of health or retirement benefits, risks and indirect costs of operations are shifted from employers to workers. For instance, workers provide capital in the form of tools or equipment, support the fluctuation of business and income, and can be ‘deactivated’ from an application as a result of poor ratings or periods of inactivity. Any regulation aiming to extend employee status should mandate platforms to support such indirect costs.&lt;/p&gt;
&lt;h3&gt;Related Publications&lt;/h3&gt;
&lt;p&gt;1. &lt;a class="external-link" href="https://www.genderit.org/articles/digital-mediation-of-reproductive-and-care-work"&gt;Research notes&lt;/a&gt; with reflections from union members. &lt;br /&gt;2. The &lt;a class="external-link" href="https://cis-india.org/raw/platformisation-of-domestic-work-in-india-report-from-a-multistakeholder-consultation"&gt;event report&lt;/a&gt; from a stakeholder consultation with workers, unions, companies and government representatives. &lt;br /&gt;3. A &lt;a class="external-link" href="https://www.genderit.org/articles/doing-standpoint-theory"&gt;reflection note&lt;/a&gt; on the participatory approach taken by the project. &lt;br /&gt;4. A &lt;a class="external-link" href="https://library.fes.de/pdf-files/bueros/singapur/17840.pdf"&gt;paper&lt;/a&gt; with a comparative analysis of the policy landscape on domestic work in the platform economy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/raw/platforms-power-and-politics-perspectives-from-domestic-and-care-work-in-india'&gt;http://editors.cis-india.org/raw/platforms-power-and-politics-perspectives-from-domestic-and-care-work-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi, and Ambika Tandon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Platform-Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>RAW Research</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Digital Domestic Work</dc:subject>
    

   <dc:date>2021-07-07T15:19:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/web-accessibility-policy-making-an-international-perspective">
    <title>Web Accessibility Policy Making: An International Perspective</title>
    <link>http://editors.cis-india.org/accessibility/web-accessibility-policy-making-an-international-perspective</link>
    <description>
        &lt;b&gt;G3ict and CIS are pleased to announce the publication of a new, improved edition of the Web Accessibility Policy Making: An International Perspective. The report published in cooperation with the Hans Foundation provides an updated synopsis of the many policies that governments have implemented around the world to ensure that the Internet and websites are accessible to persons with disabilities. &lt;/b&gt;
        &lt;p&gt;The report contains a Foreword by Axel Leblois, Founder and Executive Director of G3ict, an introduction and studies from countries like Australia, Canada, Germany, Ireland, Italy, Japan, South Korea, New Zealand, Philippines, Portugal, Sweden, Thailand, United Kingdom, United States, and the European Union. The report contains contributions from Prashanth Ramadas, Asma Tajuddin, G Aravind, Katie Reisner, Sucharita Narasimhan, Bama Balakrishnan and Nirmita Narasimhan. Axel Leblois, Donal Rice, Immaculada Placienca Porrero, Kevin Carey, Licia Sbattella and Sunil Abraham are the expert reviewers.&lt;/p&gt;
&lt;h2&gt;Foreword by Axel Leblois&lt;/h2&gt;
&lt;p&gt;This third edition of our joint report with CIS “WEB ACCESSIBILITY POLICY MAKING: AN INTERNATIONAL PERSPECTIVE” provides an updated synopsis of the many policies that governments have implemented around the world to ensure that the Internet and web sites are accessible to persons with disabilities. With 153 countries parties to the Convention on the Rights of Persons with Disabilities as of December 2011, an increasing number of governments are now in the midst of developing policies and programs to ensure that web sites and services under their jurisdictions are accessible.&lt;/p&gt;
&lt;p&gt;Indeed, the Preamble of the Convention on the Rights of Persons with Disabilities recognizes “the importance of accessibility to the physical, social, economic and cultural environment, to health and education and to information and communication, in enabling persons with disabilities to fully enjoy all human rights and fundamental freedoms”. Its article 9 stipulates that: “To enable persons with disabilities to live independently and participate fully in all aspects of life, States Parties shall take appropriate measures to ensure to persons with disabilities access, on an equal basis with others, to the physical environment, to transportation, to information and communications, including information and communications technologies and systems” (1). It further specifies that “State Parties shall also take appropriate measures to … Promote access for persons with disabilities to new information and communications technologies and systems, including the Internet” (2.g).&lt;/p&gt;
&lt;p&gt;There is therefore no doubt that all State Parties have an obligation to act upon those commitments. However, as this report demonstrates it clearly, web accessibility policies and their levels of enforcement vary considerably among countries with some common denominators such as the compliance with the W3C – WAI guidelines on web accessibility.&lt;/p&gt;
&lt;p&gt;G3ict and CIS hope that this new, improved edition, which will now be available in print as well as in electronic format, will help accelerate the development of web accessibility policies and programs around the world. We want to express our sincere appreciation to Nirmita Narasimhan, programme manager at CIS and editor of the G3ict Publications and Reports for her dedication to this report which would not have been made possible without her incredible work and motivation as Disability Advocate.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://editors.cis-india.org/accessibility/web-accessibility.pdf" class="internal-link" title="Web Accessibility Policy Making"&gt;Download a PDF of the Web Accessibility Policy Making here&lt;/a&gt; [335 KB]&lt;/p&gt;
&lt;p&gt;&lt;a href="http://editors.cis-india.org/accessibility/daisy-file" class="internal-link" title="Web Accessibility (Daisy) File"&gt;Download the Daisy File&lt;/a&gt; [23412 KB]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/web-accessibility-policy-making-an-international-perspective'&gt;http://editors.cis-india.org/accessibility/web-accessibility-policy-making-an-international-perspective&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-09-25T05:33:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights">
    <title>Delhi High Court Orders Blocking of Websites after Sony Complains Infringement of 2014 FIFA World Cup Telecast Rights</title>
    <link>http://editors.cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights</link>
    <description>
        &lt;b&gt;Of late the Indian judiciary has been issuing John Doe orders to block websites, most recently in Multi Screen Media v. Sunit Singh and Others. The order mandated blocking of 472 websites, out of which approximately 267 websites were blocked as on July 7, 2014. This trend is an extremely dangerous one because it encourages flagrant censorship by intermediaries based on a judicial order which does not provide for specific blocking of a URL, instead provides for blocking of the entire website. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The High Court of Delhi on June 23, 2014 issued a &lt;a class="external-link" href="http://delhihighcourt.nic.in/dhcqrydisp_o.asp?pn=119642&amp;amp;yr=2014"&gt;John Doe injunction&lt;/a&gt; restraining more than 400 websites from broadcasting 2014 FIFA world cup matches. &lt;a href="http://www.khelnama.com/140624/football/news/delhi-high-court-bans-400-websites-live-streaming-fifa-wold-cup/16001"&gt;News reports&lt;/a&gt; indicate that the Single judge bench of Justice V. Kameswar Rao directed the &lt;a class="external-link" href="http://www.dot.gov.in/"&gt;Department of Telecom&lt;/a&gt; to issue appropriate directions to ISPs to block the websites that Multi Screen Media provided, as well as &lt;b&gt;“any other website identified by the plaintiff”&lt;/b&gt; in the future. &lt;b&gt;On July 4, Justice G. S. Sistani permitted &lt;a href="http://ibnlive.in.com/news/airtel-blocks-219-websites-for-infringing-on-sonys-world-cup-2014-telecast-rights/484439-11.html"&gt;reducing the list to 219 websites&lt;/a&gt;&lt;/b&gt;. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Background&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Multi Screen Media (MSM) is the official broadcaster for the ongoing 2014 FIFA World Cup tournament. FIFA (the Governing body) had exclusively licensed rights to MSM which included live, delayed, highlights, on demand, and repeat broadcast of the FIFA matches. MSM complained that the defendants indulged in hosting, streaming, providing access to, etc, thereby infringing the exclusive rights and broadcast and reproduction rights of MSM.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The court in the instant order held that the defendants had &lt;b&gt;&lt;i&gt;prima facie&lt;/i&gt;&lt;/b&gt; infringed MSM’s broadcasting rights, which are guaranteed by section 37 of the &lt;a class="external-link" href="http://copyright.gov.in/Documents/CopyrightRules1957.pdf"&gt;Copyright Act, 1957&lt;/a&gt;.  In an over-zealous attempt to pre-empt infringement the court called for a blanket ban on all websites identified by MSM. Further, the court directed the concerned authorities to ensure ISPs complied with this order and block the websites mentioned by MSM presently, and other websites which may be subsequently be notified by MSM.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Where the Court went Wrong&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The court stated that MSM successfully established a &lt;b&gt;prima facie case&lt;/b&gt;, and on its basis granted a sweeping injunction to MSM ordering &lt;b&gt;blocking 471 second level domains&lt;/b&gt;. I’d like to point out numerous flaws with the order-&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Dissatisfactory "Prima facie case"&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;In my opinion the court could have scrutinised the list of websites provided by MSM more carefully. There is nothing in the order to suggest that evidence was proffered by MSM in support of the list. The order reveals that the list was prepared by &lt;/span&gt;&lt;a href="http://www.markscan.co.in/index.php" style="text-align: justify; "&gt;MarkScan&lt;/a&gt;&lt;span style="text-align: justify; "&gt;, a &lt;/span&gt;&lt;i style="text-align: justify; "&gt;“consulting boutique dedicated to (the client’s) IP requirements in the cyberspace and the Indian sub-continent.”&lt;/i&gt;&lt;span style="text-align: justify; "&gt; The list throws up names such as docs.google.com, goo.gl &amp;amp; ad.ly (provide URL shortening service &lt;/span&gt;&lt;i style="text-align: justify; "&gt;only&lt;/i&gt;&lt;span style="text-align: justify; "&gt;), torrent indexing websites, IP addresses, online file streaming websites, etc., at a cursory glance. Evidently, perfectly legitimate websites have been targeted by an ill conducted search and shoddily prepared list which may lead to blocking of legitimate content on account of no verification by the court. &lt;/span&gt;&lt;b style="text-align: justify; "&gt;471 websites out of 472 mentioned in the first list are second level domains&lt;/b&gt;&lt;span style="text-align: justify; "&gt; and &lt;/span&gt;&lt;b style="text-align: justify; "&gt;23&lt;/b&gt;&lt;span style="text-align: justify; "&gt; websites have been &lt;/span&gt;&lt;b style="text-align: justify; "&gt;listed twice&lt;/b&gt;&lt;span style="text-align: justify; "&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b style="text-align: justify; "&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;2. &lt;/span&gt;&lt;b style="text-align: justify; "&gt;Generic order which abysmally fails to identify specific infringing URLS&lt;/b&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Out of the 472 websites (list provided in the order by MarkScan)-&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;471 are file streaming websites, video sharing websites, file lockers, URL shorteners, file storage websites; &lt;b&gt;only one is a specific URL&lt;/b&gt; [&lt;a href="http://www.24livestreamtv.com/brazil-2014-fifa-world-cup-football-%20%C2%A0%C2%A0live-streaming-online-t"&gt;http://www.24livestreamtv.com/brazil-2014-fifa-world-cup-football-%20%C2%A0%C2%A0live-streaming-online-t&lt;/a&gt; ].&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;&lt;img src="http://editors.cis-india.org/copy_of_Untitled.jpg/image_preview" alt="Breakdown of the list in the July 23rd Order" class="image-inline image-inline" title="Breakdown of the list in the July 23rd Order" /&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;The order calls for blocking of complete websites. This is in complete contradiction to the 2012 Madras High Court’s order in &lt;a href="http://editors.cis-india.org/internet-governance/blog/internet-governance/resources/john-doe-order-r.k.-productions-v.-bsnl-mtnl-and-ors.-movie-3"&gt;R K Productions v BSNL&lt;/a&gt; which held that only a particular URL where the infringing content is kept should be blocked, rather than the entire website. The Madras High Court order had also made it mandatory for the complainants to provide exact URLs where they find illegal content, such that ISPs could block only that content and not the entire site. MSM did not adhere to this and I have serious doubts if the defendants brought the distinguishing Madras High Court judgment to the attention of the bench. The entire situation is akin to MarkScan scamming MSM by providing their clients a dodgy list, and MSM scamming the court and the public at large.&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;3.&lt;b&gt; Lack of Transparency – Different blocking messages on different ISPs&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;The message displayed uniformly on blocked websites was:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This website/URL has been blocked until further notice either pursuant to court orders or on the directions issued by the Department of Telecommunications."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I observed that a few websites showed the message &lt;b&gt;“Error 404 – File or Directory not found”&lt;/b&gt; without the blocking message (above) on the network provider Reliance, and same Error 404 with the blocking message on the network provider Airtel highlighting the non-transparent manner of adherence to the order. Further, both the messages do not indicate the end period of the block.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Legality of John Doe orders in Website Blocking&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is pertinent to reiterate the ‘misuse’ of John Doe orders to block websites in India. The judiciary has erred in applying the John Doe order to protect copyrightable content on the internet. While the &lt;i&gt;R K Productions v BSNL&lt;/i&gt; case appears reasonable in terms of permitting blocking of only URL specific content, the application of John Doe order to block websites remains unfounded in law. Ananth Padmanabhan in a three part study (&lt;a href="http://editors.cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-1"&gt;Part I&lt;/a&gt;, &lt;a href="http://editors.cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-2"&gt;II&lt;/a&gt; and &lt;a href="http://editors.cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-3"&gt;III&lt;/a&gt;) had earlier analysed the improper use of John Doe injunctions to block websites in India. The John Doe order was conceived by US courts to pre-emptively remedy the irreparable damages suffered by copyright holders on account of unidentified/unnamed infringers. The interim injunction allowed collection of evidence from infringers, who were identified later as certain defendants and the final relief was accordingly granted. The courts routinely advocated judicious use of the order, and ensured that the identified defendants were provided and informed of their right to apply to the court within twenty four hours for a review of the order and a right to claim damages in an appropriate case. Therefore, the John Doe order applied against &lt;i&gt;primary&lt;/i&gt; infringers &lt;i&gt;per se.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, whilst extending this remedy in India the &lt;b&gt;courts have unfortunately placed onus on the conduit i.e. the ISP to block websites&lt;/b&gt;. This is &lt;a href="http://editors.cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-1"&gt;tantamount to providing final relief at the interim stage&lt;/a&gt;, since all content definitely gets blocked; however, this hardly helps in identifying the actual infringer on the internet. &lt;b&gt;The court is prematurely doling out blocking remedies to the complaining party, which, legally speaking should be meted out only during the final disposition of the case after careful examination of the evidence available.&lt;/b&gt; Thus, the intent of a John Doe order is miserably lost in such an application. Moreover, this lends an arbitrary amount of power in the hands of intermediaries since ISPs may or may not choose to approach the court for directions to specifically block URLs which provide access to infringing content only.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights'&gt;http://editors.cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2014-07-08T07:02:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata">
    <title>FinFisher in India and the Myth of Harmless Metadata</title>
    <link>http://editors.cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata</link>
    <description>
        &lt;b&gt;In this article, Maria Xynou argues that metadata is anything but harmless, especially since FinFisher — one of the world's most controversial types of spyware — uses metadata to target individuals. &lt;/b&gt;
        &lt;p align="JUSTIFY"&gt;In light of PRISM, the Central Monitoring System (CMS) and other such surveillance projects in India and around the world, the question of whether the collection of metadata is “harmless” has arisen.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; In order to examine this question, FinFisher&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; — surveillance spyware — has been chosen as a case study to briefly examine to what extent the collection and surveillance of metadata can potentially violate the right to privacy and other human rights. FinFisher has been selected as a case study not only because its servers have been recently found in India&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; but also because its “remote monitoring solutions” appear to be very pervasive even on the mere grounds of metadata.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;FinFisher in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is spyware which has the ability to take control of target computers and capture even encrypted data and communications. The software is designed to evade detection by anti-virus software and has versions which work on mobile phones of all major brands.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In many cases, the surveillance suite is installed after the target accepts installation of a fake update to commonly used software.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Citizen Lab researchers have found three samples of FinSpy that masquerades as Firefox.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is a line of remote intrusion and surveillance software developed by Munich-based Gamma International. FinFisher products are sold exclusively to law enforcement and intelligence agencies by the UK-based Gamma Group.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; A few months ago, it was reported that command and control servers for FinSpy backdoors, part of Gamma International´s FinFisher “remote monitoring solutions”, were found in a total of 25 countries, including India.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The following map, published by the Citizen Lab, shows the 25 countries in which FinFisher servers have been found.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="http://editors.cis-india.org/home-images/Map.png" alt="Map" class="image-inline" title="Map" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;The above map shows the results of scanning for characteristics of FinFisher command and control servers&lt;/i&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="JUSTIFY"&gt;FinFisher spyware was not found in the countries coloured blue, while the colour green is used for countries not responding. The countries using FinFisher range from shades of orange to shades of red, with the lightest shade of orange ranging to the darkest shade of red on a scale of 1-6,  and with 1 representing the least active servers and 6 representing the most active servers in regards to the use of FinFisher. On a scale of 1-6, India is marked a 3 in terms of actively using FinFisher.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Research published by the Citizen Lab reveals that FinSpy servers were recently found in India, which indicates that Indian law enforcement agencies may have bought this spyware from Gamma  Group and might be using it to target individuals in India.&lt;a href="#fn11" name="fr11"&gt;[11] &lt;/a&gt;According to the Citizen Lab, FinSpy servers in India have been detected through the HostGator operator and the first digits of the IP address are: 119.18.xxx.xxx. Releasing complete IP addresses in the past has not proven useful, as the servers are quickly shut down and relocated, which is why only the first two octets of the IP address are revealed.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Citizen Lab's research reveals that FinFisher “remote monitoring solutions” were found in India, which, according to Gamma Group's brochures, include the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy: &lt;/b&gt;hardware or software which monitors targets that regularly change location, use encrypted and anonymous communications channels and reside in foreign countries. FinSpy can remotely monitor computers and encrypted communications, regardless of where in the world the target is based. FinSpy is capable of bypassing 40 regularly tested antivirus systems, of monitoring the calls, chats, file transfers, videos and contact lists on Skype, of conducting live surveillance through a webcam and microphone, of silently extracting files from a hard disk, and of conducting a live remote forensics on target systems. FinSpy is hidden from the public through anonymous proxies.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy Mobile:&lt;/b&gt; hardware or software which remotely monitors mobile phones. FinSpy Mobile enables the interception of mobile communications in areas without a network, and offers access to encrypted communications, as well as to data stored on the devices that is not transmitted. Some key features of FinSpy Mobile include the recording of common communications like voice calls, SMS/MMS and emails, the live surveillance through silent calls, the download of files, the country tracing of targets and the full recording of all BlackBerry Messenger communications. FinSpy Mobile is hidden from the public through anonymous proxies.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly USB: &lt;/b&gt;hardware which is inserted into a computer and which can automatically install the configured software with little or no user-interaction and does not require IT-trained agents when being used in operations. The FinFly USB can be used against multiple systems before being returned to the headquarters and its functionality can be concealed by placing regular files like music, video and office documents on the device. As the hardware is a common, non-suspicious USB device, it can also be used to infect a target system even if it is switched off.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly LAN: &lt;/b&gt;software which can deploy a remote monitoring solution on a target system in a local area network (LAN). Some of the major challenges law enforcement faces are mobile targets, as well as targets who do not open any infected files that have been sent via email to their accounts. FinFly LAN is not only able to deploy a remote monitoring solution on a target´s system in local area networks, but it is also able to infect files that are downloaded by the target, by sending fake software updates for popular software or to infect the target by injecting the payload into visited websites. Some key features of the FinFly LAN include: discovering all computer systems connected to LANs, working in both wired and wireless networks, and remotely installing monitoring solutions through websites visited by the target. FinFly LAN has been used in public hotspots, such as coffee shops, and in the hotels of targets.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly Web:&lt;/b&gt; software which can deploy remote monitoring solutions on a target system through websites. FinFly Web is designed to provide remote and covert infection of a target system by using a wide range of web-based attacks. FinFly Web provides a point-and-click interface, enabling the agent to easily create a custom infection code according to selected modules. It provides fully-customizable web modules, it can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly ISP:&lt;/b&gt; hardware or software which deploys a remote monitoring solution on a target system through an ISP network. FinFly ISP can be installed inside the Internet Service Provider Network, it can handle all common protocols and it can select targets based on their IP address or Radius Logon Name. Furthermore, it can hide remote monitoring solutions in downloads by targets, it can inject remote monitoring solutions as software updates and it can remotely install monitoring solutions through websites visited by the target.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Although FinFisher is supposed to be used for “lawful interception”, it has gained notoriety for targeting human rights activists.&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; &lt;span&gt;According to &lt;/span&gt;Morgan Marquis-Boire, a security researcher and technical advisor at the Munk School and a security engineer at Google, FinSpy has been used in Ethiopia to target an opposition group called Ginbot.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; Researchers have argued that FinFisher has been sold to Bahrain's government to target activists, and such allegations were based on an examination of malicious software which was emailed to Bahraini activists.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; Privacy International has argued that FinFisher has been deployed in Turkmenistan, possibly to target activists and political dissidents.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Many questions revolving around the use of FinFisher and its “remote monitoring solutions” remain   vague, as there is currently inadquate proof of whether this spyware is being used to target individuals by law enforcement agencies in the countries where command and control servers have been found, such as India.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt; However, FinFisher's brochures which were circulated in the ISS world trade shows and leaked by WikiLeaks do reveal some confirmed facts: Gamma International claims that its FinFisher products are capable of taking control of target computers, of capturing encrypted data  and of evading mainstream anti-virus software.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt; Such products are exhibited in the world's largest surveillance trade show and probably sold to law enforcement agencies around the world.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;This alone unveils a concerning fact: spyware which is so sofisticated that it even evades encryption and anti-virus software is currently in the market and law enforcement agencies can potentially use it to target activists and anyone who does not comply with social conventions.&lt;a href="#fn26" name="fr26"&gt;[26] &lt;/a&gt;A few months ago, two Indian women were arrested after having questioned the shutdown of Mumbai for Shiv Sena patriarch Bal Thackeray's funeral.&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;Thus, it remains unclear what type of behaviour is targeted by law enforcement agencies and whether spyware, such as FinFisher, would be used in India to track individuals without a legally specified purpose.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, India lacks privacy legislation which could safeguard individuals from potential abuse, while sections 66A and 69 of the Information Technology (Amendment) Act, 2008, empower Indian authorities with extensive surveillance capabilites.&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;While it remains unclear if Indian law enforcement agencies are using FinFisher spy products to unlawfully target individuals, it is a fact that FinFisher control and command servers have been found in India and that, if used, they could potentially have severe consequences on individuals' right to privacy and other human rights.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;The Myth of Harmless Metadata&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;Over the last months, it has been reported that the Central Monitoring System (CMS) is being implemented in India, through which all telecommunications and Internet communications in the country are being centrally intercepted by Indian authorities. This mass surveillance of communications in India is enabled by the omission of privacy legislation and Indian authorities are currently capturing the metadata of communications.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Last month, Edward Snowden leaked confidential U.S documents on PRISM, the top-secret  National Security Agency (NSA) surveillance programme that collects metadata through telecommunications and Intenet communications. It has been reported that through PRISM, the NSA has tapped into the servers of nine leading Internet companies: Microsoft, Google, Yahoo, Skype, Facebook, YouTube, PalTalk, AOL and Apple.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; While the extent to which the NSA is actually tapping into these servers remains unclear, it is certain that the NSA has collected metadata on a global level.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; Yet, the question of whether the collection of metadata is “harmful” remains ambiguous.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;According to the National Information Standards Organization (NISO), the term “metadata” is defined as “structured information that describes, explains, locates or otherwise makes it easier to retrieve, use or manage an information resource”. NISO claims that metadata is “data about data” or “information about information”.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; Furthermore, metadata is considered valuable due to its following functions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Resource discovery&lt;/li&gt;
&lt;li&gt;Organizing electronic resources&lt;/li&gt;
&lt;li&gt;Interoperability&lt;/li&gt;
&lt;li&gt;Digital Identification&lt;/li&gt;
&lt;li&gt;Archiving and preservation&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Metadata can be used to find resources by relevant criteria, to identify resources, to bring similar resources together, to distinguish dissimilar resources and to give location information. Electronic resources can be organized through the use of various software tools which can automatically extract and reformat information for Web applications. Interoperability is promoted through metadata, as describing a resource with metadata allows it to be understood by both humans and machines, which means that data can automatically be processed more effectively. Digital identification is enabled through metadata, as most metadata schemes include standard numbers for unique identification. Moreover, metadata enables the archival and preservation of large volumes of digital data.&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Surveillance projects, such as PRISM and India's CMS, collect large volumes of metadata, which include the numbers of both parties on a call, location data, call duration, unique identifiers, the International Mobile Subscriber Identity (IMSI) number, email addresses, IP addresses and browsed webpages.&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt; However, the fact that such surveillance projects may not have access to content data might potentially create a false sense of security.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt; When Microsoft released its report on data requests by law enforcement agencies around the world in March 2013, it revealed that most of the  disclosed data was metadata, while relatively very little content data was allegedly disclosed.&lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;imilarily, Google's transparency report reveals that the company disclosed large volumes of metadata to law enforcement agencies, while restricting its disclosure of content data.&lt;a href="#fn38" name="fr38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Such reports may potentially provide a sense of security to the public, as they reassure that the content of  personal emails, for example, has not been shared with the government, but merely email addresses – which might be publicly available online anyway. However, is content data actually more “harmful” than metadata? Is metadata “harmless”? How much data does metadata actually reveal?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Guardian recently published an article which includes an example of how individuals can be tracked through their metadata. In particular, the example explains how an individual is tracked – despite using an anonymous email account – by logging in from various hotels' public Wi-Fi and by leaving trails of metadata that include times and locations. This example illustrates how an individual can be tracked through metadata alone, even when anonymous accounts are being used.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Wired published an article which states that metadata can potentially be more harmful than content data because “unlike our words, metadata doesn't lie”. In particular, content data shows what an individual says – which may be true or false – whereas metadata includes what an individual does. While the validity of the content within an email may potentially be debateable, it is undeniable that an individual logged into specific websites – if that is what that individuals' IP address shows. Metadata, such as the browsing habits of an individual, may potentially provide a more thorough and accurate profile of an individual than that individuals' email content, which is why metadata can potentially be more harmful than content data.&lt;a href="#fn40" name="fr40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, voice content is hard to process and written content in an email or chat communication may not always be valid. Metadata, on the other hand, provides concrete patterns of an individuals' behaviour, interests and interactions. For example, metadata can potentially map out an individuals' political affiliation, interests, economic background, institution, location, habits and the people that individual interacts with. Such data can potentially be more valuable than content data, because while the validity of email content is debateable, metadata usually provides undeniable facts. Not only is metadata more accurate than content data, but it is also ideally suited to automated analysis by a computer. As most metadata includes numeric figures, it can easily be analysed by data mining software, whereas content data is more complicated.&lt;a href="#fn41" name="fr41"&gt;[41]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, provide solid proof that the collection of metadata can potentially be “harmful”. In particular, FinFly LAN can be deployed in a target system in a local area network (LAN) by infecting files that are downloaded by the target, by sending fake software updates for popular software or by infecting the payload into visited websites. The fact that FinFly LAN can remotely install monitoring solutions through websites visited by the target indicates that metadata alone can be used to acquire other sensitive data.&lt;a href="#fn42" name="fr42"&gt;[42]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFly Web can deploy remote monitoring solutions on a target system through websites. Additionally, FinFly Web can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn43" name="fr43"&gt;[43]&lt;/a&gt; FinFly ISP can select targets based on their IP address or Radius Logon Name. Furthermore, FinFly ISP can remotely install monitoring solutions through websites visited by the target, as well as inject remote monitoring solutions as software updates.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt; In other words, FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, can target individuals, take control of their computers and their data, and capture even encrypted data and communications with the help of metadata alone.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The example of FinFisher products illustrates that metadata can potentially be as “harmful” as content data, if acquired unlawfully and without individual consent.&lt;a href="#fn45" name="fr45"&gt;[45]&lt;/a&gt; Thus, surveillance schemes, such as PRISM and India's CMS, which capture metadata without individuals' consent can potentially pose a major threat to the right to privacy and other human rights.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt; Privacy can be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others.&lt;a href="#fn47" name="fr47"&gt;[47]&lt;/a&gt; Furthermore, privacy is at the core of human rights because it protects individuals from abuse by those in power.&lt;a href="#fn48" name="fr48"&gt;[48]&lt;/a&gt; The unlawful collection of metadata exposes individuals to the potential violation of their human rights, as it is not transparent who has access to their data, whether it is being shared with third parties or for how long it is being retained.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;It is not clear if Indian law enforcement agencies are actually using FinFisher products, but the Citizen Lab did find FinFisher command and control servers in the country which indicates that there is a high probability that such spyware is being used.&lt;a href="#fn49" name="fr49"&gt;[49] &lt;/a&gt;This probability is highly concerning not only because the specific spy products have such advanced capabilities that they are even capable of capturing encrypted data, but also because India currently lacks privacy legislation which could safeguard individuals.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Thus, it is recommended that Indian law enforcement agencies are transparent and accountable if they are using spyware which can potentially breach their citizens' human rights and that privacy legislation is enacted into law. Lastly, it is recommended that all surveillance technologies are strictly regulated with regards to the protection of human rights and that Indian authorities adopt the principles on communication surveillance formulated by the Electronic Frontier Foundation and Privacy International.&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt; The above could provide a decisive first step in ensuring that India is the democracy it claims to be.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Robert Anderson (2013), &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;a class="external-link" href="http://bit.ly/fnkGF3"&gt;http://bit.ly/fnkGF3&lt;/a&gt;&lt;a href="http://www.finfisher.com/FinFisher/en/index.php"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Michael Lewis, &lt;i&gt;“FinFisher Surveillance Spyware Spreads to Smartphones”, &lt;/i&gt;&lt;span&gt;The Star: Business, 30 August 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sF2IQ"&gt;http://bit.ly/14sF2IQ&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Marcel Rosenbach, &lt;i&gt;“Troublesome Trojans: Firm Sought to Install Spyware Via Faked iTunes Updates”, &lt;/i&gt;&lt;span&gt;Der Spiegel, 22 November 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sETVV"&gt;http://bit.ly/14sETVV&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Intercept Review, &lt;i&gt;Mozilla to Gamma: stop disguising your FinSpy as Firefox, &lt;/i&gt;&lt;span&gt;02 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/131aakT"&gt;http://bit.ly/131aakT&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Intercept Review, &lt;i&gt;LI Companies Review (3) – Gamma, &lt;/i&gt;&lt;span&gt;05 April 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/Hof9CL"&gt;http://bit.ly/Hof9CL&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy Mobile: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19pPObx"&gt;http://bit.ly/19pPObx&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly USB: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cJSu4h"&gt;http://bit.ly/1cJSu4h&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Jeremy Kirk, &lt;i&gt;“FinFisher Spyware seen Targeting Victims in Vietnam, Ethiopia”, &lt;/i&gt;&lt;span&gt;Computerworld: IDG News, 14 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J8BwW"&gt;http://bit.ly/14J8BwW&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Reporters without Borders: For Freedom of Information (2012), &lt;i&gt;The Enemies of the Internet: Special Edition: Surveillance, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/10FoTnq"&gt;http://bit.ly/10FoTnq&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. Privacy International, &lt;i&gt;FinFisher Report, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/QlxYL0"&gt;http://bit.ly/QlxYL0&lt;/a&gt;&lt;span&gt;&lt;a href="https://www.privacyinternational.org/finfisherreport"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013,&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Adi Robertson, &lt;i&gt;“Paranoia Thrives at the ISS World Cybersurveillance Trade Show”, &lt;/i&gt;&lt;span&gt;The Verge, 28 December 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/tZvFhw"&gt;http://bit.ly/tZvFhw&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. BBC News, &lt;i&gt;“India arrests over Facebook post criticising Mumbai shutdown”, &lt;/i&gt;&lt;span&gt;19 November 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/WoSXkA"&gt;http://bbc.in/WoSXkA&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. Indian Ministry of Law, Justice and Company Affairs, &lt;i&gt;The Information Technology (Amendment) Act, 2008, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/19pOO7t"&gt;http://bit.ly/19pOO7t&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Phil Muncaster, &lt;i&gt;“India introduces Central Monitoring System”, &lt;/i&gt;&lt;span&gt;The Register, 08 May 2013,&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt;http://bit.ly/ZOvxpP&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Glenn Greenwald &amp;amp; Ewen MacAskill, &lt;i&gt;“NSA PRISM program taps in to user data of Apple, Google and others”, &lt;/i&gt;&lt;span&gt;The Guardian, 07 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1baaUGj"&gt;http://bit.ly/1baaUGj&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. BBC News, &lt;i&gt;“Google, Facebook and Microsoft seek data request transparency”, &lt;/i&gt;&lt;span&gt;12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/14UZCCm"&gt;http://bbc.in/14UZCCm&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. National Information Standards Organization (2004), &lt;i&gt;Understanding Metadata, &lt;/i&gt;&lt;span&gt;NISO Press, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/LCSbZ"&gt;http://bit.ly/LCSbZ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. The Hindu, &lt;i&gt;“In the dark about 'India's PRISM'”, &lt;/i&gt;&lt;span&gt;16 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bJCXg3"&gt;http://bit.ly/1bJCXg3&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.thehindu.com/sci-tech/technology/in-the-dark-about-indias-prism/article4817903.ece"&gt;&lt;/a&gt; ; Glenn Greenwald, &lt;/span&gt;&lt;i&gt;“NSA collecting phone records of millions of Verizon customers daily”, &lt;/i&gt;&lt;span&gt;The Guardian, 06 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/16L89yo"&gt;http://bit.ly/16L89yo&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. Microsoft: Corporate Citizenship, &lt;i&gt;2012 Law Enforcement Requests Report,&lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/Xs2y6D"&gt;http://bit.ly/Xs2y6D&lt;/a&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. Google, &lt;i&gt;Transparency Report&lt;/i&gt;&lt;span&gt;, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J7hKp"&gt;http://bit.ly/14J7hKp&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;]. Guardian US Interactive Team, &lt;i&gt;A Guardian Guide to your Metadata, &lt;/i&gt;&lt;span&gt;The Guardian, 12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZJLkpy"&gt;http://bit.ly/ZJLkpy&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;]. Matt Blaze, &lt;i&gt;“Phew, NSA is Just Collecting Metadata. (You Should Still Worry)”, &lt;/i&gt;&lt;span&gt;Wired, 19 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bVyTJF"&gt;http://bit.ly/1bVyTJF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files,&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;]. Shalini Singh, &lt;i&gt;“India's surveillance project may be as lethal as PRISM”, &lt;/i&gt;&lt;span&gt;The Hindu, 21 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/15oa05N"&gt;http://bit.ly/15oa05N&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr47" name="fn47"&gt;47&lt;/a&gt;]. Cyberspace Law and Policy Centre, &lt;i&gt;Privacy, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/14J5u7W"&gt;http://bit.ly/14J5u7W&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.cyberlawcentre.org/genl0231/privacy.htm"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;]. Bruce Schneier, &lt;i&gt;“Privacy and Power”, &lt;/i&gt;&lt;span&gt;Schneier on Security, 11 March 2008, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/i2I6Ez"&gt;http://bit.ly/i2I6Ez&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. Elonnai Hickok, &lt;i&gt;“Draft International Principles on Communications Surveillance and Human Rights”, &lt;/i&gt;&lt;span&gt;The Centre for Internet and Society, 16 January 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata'&gt;http://editors.cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-13T11:30:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/high-level-comparison-and-analysis-of-the-use-and-regulation-of-dna-based-technology-bill-2017">
    <title>High Level Comparison and Analysis of the Use and Regulation of DNA Based Technology Bill 2017</title>
    <link>http://editors.cis-india.org/internet-governance/blog/high-level-comparison-and-analysis-of-the-use-and-regulation-of-dna-based-technology-bill-2017</link>
    <description>
        &lt;b&gt;This blog post seeks to provide a high level comparison of the 2017 and 2015 DNA Profiling Bill - calling out positive changes, remaining issues, and missing provisions. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In July 2017 the Law Commission published a report on DNA profiling and the &lt;a href="http://lawcommissionofindia.nic.in/reports/Report271.pdf"&gt;&lt;i&gt;“Draft Use and Regulation of DNA Based Technology Bill 2017”&lt;/i&gt;&lt;/a&gt;. India has  been contemplating a draft DNA Profiling Bill since 2007. There have been two publicly available versions of the bill, &lt;a href="https://cis-india.org/internet-governance/blog/draft-dna-profiling-bill-2012.pdf"&gt;2012,&lt;/a&gt; and &lt;a href="http://www.prsindia.org/uploads/media/draft/Draft%20Human%20DNA%20Profiling%20Bill%202015.pdf"&gt;2015,&lt;/a&gt; and one version in 2016. In 2013, the Department of Biotechnology formulated an &lt;a href="https://cis-india.org/internet-governance/blog/expert-committee-meetings.zip/view"&gt;Expert Committee &lt;/a&gt;to discuss different aspects and issues raised regarding the Bill towards finalizing the text. The Centre for Internet and Society was a member of the Expert Committee, and in its conclusion, issued a note of &lt;a href="https://cis-india.org/internet-governance/blog/dna-dissent"&gt;dissent to the Expert Committee for DNA Profiling&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This post provides a high level overview of the Use and Regulation of DNA Based Technology Bill 2017 and calls out positive changes from the 2015 Bill, remaining issues, and missing provisions. The post also calls out if, and where, CIS's recommendations to the Expert Committee have been incorporated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If enacted, the 2017 Bill will establish national and regional DNA data banks that will maintain five different types of indices: a crime scene  index, missing persons, offenders, suspects, and unknown deceased persons. The data banks will be led by a Director, responsible for communicating information with requesting entities, foreign states, and international organizations.  Information relating to DNA profiles, DNA samples, and records maintained in a DNA laboratory can be made available in six instances: to law enforcement and investigating agencies, in judicial proceedings, for facilitating prosecution and adjudication of criminal cases, for taking defence of an accused, for investigation of civil disputes, and other cases which might be specified by regulations. Offences related to unauthorized disclosure of information in the DNA data bank, obtaining information from DNA data banks without authorization, unlawful access to information in the DNA Data Bank, using DNA sample or result without authorization, and destroying, altering, contaminating, or tampering with biological evidence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Below are some key positive changes from the 2015 Bill, remaining issues, and missing safeguards from the 2017 Bill:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Positive Changes: &lt;/b&gt;The Bill contains a number of positive changes from the 2015 draft. Key ones include: &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Consent:&lt;/b&gt; Section 21 prohibits the taking of samples from arrested persons without consent, except in the case of a specified offence - a specified offence being any offence punishable with death or imprisonment for a term exceeding seven years. If consent is refused, a magistrate can order the taking of the sample. This can be in the case of any matter listed in the Schedule of the Act. Section 22 provides for consent from volunteers. It is important to note that despite being an improvement from the 2015 Bill, which did not address instances of collection with our without consent,  this provision is still broad as the list of offences under the Schedule is expansive and can be further expanded by the Central Government.&lt;b&gt; &lt;/b&gt;Furthermore, the Magistrate can overrule a refusal of consent of the parent or guardian of a voluneet who is a minor, which does not provide adequate protection to childrens' rights.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Deletion&lt;/b&gt;: Section 31 defines instances for deletion of suspect profiles, under trial profiles, and all other profiles. Though a step in the right direction, as the 2015 Bill only addressed retention and deletion of the offenders index, this provision does not address the automatic removal of innocents.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Purpose limitation&lt;/b&gt;: Section 33 limits the purpose of profiles in the DNA Data Bank to that of facilitating identification. This is a positive step from the 2015 Bill - which enabled use of DNA profiles for the creation and maintenance of a population statistics data bank.  Section 34 also limits the purposes for which information relating to DNA profiles, samples, and records can be made available.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Destruction of samples:&lt;/b&gt; Section 20 defines instances for destruction of DNA samples. Destruction of samples was not address in the 2015 Bill, and is an important protection as it prevents samples from being re-analyzed.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Comparison of profiles&lt;/b&gt;: Section 29 clarifies that if the individual is not an offender or a suspect, their information will not be compared with DNA profiles in the offenders’ or suspects index. This creates an important distinction between types of indices held in the data bank and the purpose for the same i.e missing persons are not treated as potential offenders. In the 2015 Bill, profiles entered in the offenders or crime scene index could be compared by the DNA Data Bank Manger against all profiles contained in the DNA Data Bank.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Re-testing&lt;/b&gt;: Section 24 allows for an accused person to request for a re-examination of fresh bodily substances if it is believed the sample has been contaminated. The closest provision to this in the 2015 was the creation a post - conviction right for DNA profiling - which is now deleted. It is important to note that fresh samples can easily be obtained from individuals, but if contamination happens at a crime scene, it is much more difficult to obtain a fresh sample.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Limiting Indices and including a crime scene index&lt;/b&gt;: The 2017 Bill limits the number of indices to five - a crime scene  index, missing persons, offenders, suspects, and unknown deceased persons.  This is an improvement from the 2015 Bill which provides for the maintenance of indices in the DNA Bank and includes a missing person’s index, an unknown deceased person’s index, a volunteers’ index, and such other DNA indices as may be specified by regulation. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Remaining Issues: &lt;/b&gt;There are some remaining issues in the 2017 Bill. Some of these include:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Delegating and Expanding through Regulation:&lt;/b&gt; The Bill delegates a number of procedures to regulation - many which should be in the text of the Bill. For example: the format for receiving and storing DNA profiles, and additional criteria for entry, retention, and deletion of DNA profiles. Furthermore, a number of provisions allow for expansion through regulation. For example, the sources from which DNA can be collected from to be expanded as specified by regulations. Further purposes for making DNA profiles available can be defined by regulation. Important procedures such as privacy and security safeguards are also left to regulation.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Broad Powers and Composition of the Board:&lt;/b&gt; The Bill designates twenty one responsibilities to the Board. As pointed out in 1, many of these should be detailed in the text of the legislation. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;While serving on the Expert Committee,&lt;a href="http://cis-india.org/internet-governance/blog/expert-committee-meetings.zip/view"&gt;CIS recommended&lt;/a&gt; that the functions of the DNA Profiling Board should be limited to licensing, developing standards and norms, safeguarding privacy and other rights, ensuring public transparency, promoting information and debate and a few other limited functions necessary for a regulatory authority. This recommendation has not been incorporated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ideally, the Board should also include privacy experts, an expert in ethics, as well as civil society. Towards this, the Board should be comprised of separate Committees to address these different functions. There should be a Committee addressing regulatory issues pertaining to the functioning of Data Banks and Laboratories and an Ethics Committee to provide independent scrutiny of ethical issues.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;As a positive note, the reduction of the size of the Board was agreed upon by &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/blog/expert-committee-meetings.zip/view"&gt;&lt;b&gt;the Expert Committee from 16 members (2012 Bill) to 11 member&lt;/b&gt;&lt;/a&gt;&lt;b&gt;s. This reccomendation has been incorporated. &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS also provided &lt;a href="http://cis-india.org/internet-governance/blog/dna-dissent"&gt;language regarding&lt;/a&gt; how the Board could consult with the public:&lt;i&gt;The Board, in carrying out its functions and activities, shall be required to consult with all persons and groups of persons whose rights and related interests may be affected or impacted by any DNA collection, storage, or profiling activity. The Board shall, while considering any matter under its purview, co-opt or include any person, group of persons, or organisation, in its meetings and activities if it is satisfied that that person, group of persons, or organisation, has a substantial interest in the matter and that it is necessary in the public interest to allow such participation. The Board shall, while consulting or co-opting persons, ensure that meetings, workshops, and events are conducted at different places in India to ensure equal regional participation and activities.&lt;/i&gt; This language has not been fully incorporated&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Lack of Authorization Procedure:&lt;/b&gt; Though the Bill defines instances of when DNA information can be made available, it fails to establish or refer to an authorization process for making information available and the decision currently seems to rest with the DNA Bank Director.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Expansive Schedule:&lt;/b&gt; The Bill creates a schedule containing a list of matters for DNA testing which includes whole acts and a range of civil disputes and matters that are broad and do not relate to criminal cases - most notably “issues relating to immigration or emigration and issues relating to establishment of individual identity.”&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Unclear Data Stored:&lt;/b&gt; Though the Bill clarifies the circumstance that the identity of the individual will be associated with a profile, it allows for ‘information of data  based on DNA testing and records relating thereto” to be stored, yet it is unclear what information this would entail.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Lack of procedures for chain of custody:&lt;/b&gt; Presently, the Bill defines quality assurance procedures for a sample that is already at the lab. There are no provisions defining a process for the examination of a crime scene and laying down standards for the chain of custody of a sample from the crime scene to a DNA laboratory. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Missing Safeguards: &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are some safeguards that, if added, would strengthen the Bill and ensure rights to the individual:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Notification to the individual:&lt;/b&gt; There are no provisions that ensure that notification is given to an individual if his/her information is accessed or made available.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Right  to challenge&lt;/b&gt;: There are no provisions that give the individual the right to challenge the storage of their DNA.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Established profiling standard&lt;/b&gt;: Though the Law Commission report refers to the 13 CODIS standard, the Bill does not mandate the use of the 13 CODIS profiling standard.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Reporting standard&lt;/b&gt;: There are no standards for how matches or other information should be communicated from the DNA director to the authority or receiving entity including instances of partial matches.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Right to access and review:&lt;/b&gt; There are no provisions that allow an individual to review his/her information contained in the  regional or the national database.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Lack of costing:&lt;/b&gt; There is  no cost estimate in the report or a requirement for one to be carried out.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Study for the potential for false matches:&lt;/b&gt; This must consider the size of the population and large family size, i.e. relatively large numbers of closely related people and is particularly necessary given the the size over population as large as India's. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Importantly&lt;/b&gt;, in the DNA Expert Committee, CIS requested the Expert Committee that the Bill be brought in line with the nine national principles defined in the Report of Experts on Privacy led by Justice AP Shah. These include the principles of notice, choice and consent, collection limitation, purpose limitation, access and correction, disclosure of information, security, openness, and accountability. These principles have not been fully incorporated.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/high-level-comparison-and-analysis-of-the-use-and-regulation-of-dna-based-technology-bill-2017'&gt;http://editors.cis-india.org/internet-governance/blog/high-level-comparison-and-analysis-of-the-use-and-regulation-of-dna-based-technology-bill-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-08-11T02:16:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/blog/enabling-elections">
    <title>Enabling Elections</title>
    <link>http://editors.cis-india.org/accessibility/blog/enabling-elections</link>
    <description>
        &lt;b&gt;For making the 2014 General Elections in India participatory and accessible for voters with disabilities the Centre for Law and Policy Research and the Centre for Internet and Society have come up with a report. The report addresses the barriers that people with disabilities face during elections and recommends solutions for the same.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Executive Summary&lt;/h2&gt;
&lt;p&gt;The report examines three main areas:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The barriers that people with disabilities face at the time of elections.&lt;/li&gt;
&lt;li&gt;The legal framework around this issue.&lt;/li&gt;
&lt;li&gt;The measures which need to be taken to eliminate the barriers in the pre-voting phase, during voting phase and also post-voting phase, so as to enhance the participation of voters with disabilities.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Access to the public sphere and full political participation is a matter of right for persons with disabilities and the state is constitutionally mandated to enforce this right. The rights of voters with disabilities are examined under the constitutional provisions, the Representation of People’s Act 1951, the relevant directions of the Supreme Court and the international conventions. This report also considers international best practices while making recommendations, to the extent that they are suitable and practical in the Indian context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This report looks at Electoral Participation in two dimensions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;“Pre-electoral Participation” and&lt;/li&gt;
&lt;li&gt;“Actual Electoral Participation”&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The report then goes on to make recommendations for enhancing accessibility in both these categories.&lt;/p&gt;
&lt;p&gt;On Pre-electoral Participation, the report inter alia recommends the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Opportunities for people with disabilities to participate in public consultations.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Immediate outreach programs for higher voter registrations.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Making election material and candidate guides available in different formats such as large print, Braille and audio formats upon request so that voters can have full knowledge of the candidate they want to vote for.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Providing information for voters about locations which have special access, wheelchair facilities, technological assistance for visually impaired, etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;On Actual Electoral Participation, we inter alia recommend the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Accessible polling sites.&lt;/li&gt;
&lt;li&gt;Training election staff to be sensitive to diverse needs of voters.&lt;/li&gt;
&lt;li&gt;Enabling privacy and independent voting by persons with disabilities.&lt;/li&gt;
&lt;li&gt;Arranging for mobile polling booths.&lt;/li&gt;
&lt;li&gt;Making EVM’s compatible and accessible such as by providing for Braille, large print.&lt;/li&gt;
&lt;li&gt;Tactile buttons, 'sip and puff' and audio devices.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The report also recommends the need to monitor participation of voters with disabilities in the forthcoming elections.There is a need to collect data, surveys and studies in the pre-election, election and post-election phases.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="http://editors.cis-india.org/accessibility/blog/enabling-elections.pdf" class="internal-link"&gt;Click here&lt;/a&gt; to download and read the full report (PDF, 4.5 MB)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/blog/enabling-elections'&gt;http://editors.cis-india.org/accessibility/blog/enabling-elections&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2014-05-10T00:12:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/telecom/blog/comments-on-dot-panel-report-via-mygov">
    <title>Comments on the DoT Panel Report via MyGov</title>
    <link>http://editors.cis-india.org/telecom/blog/comments-on-dot-panel-report-via-mygov</link>
    <description>
        &lt;b&gt;On behalf of the Centre for Internet and Society, I must commend the Department of Telecom Panel on its report.  Overall, it displays a far better understanding of the underlying issues than the TRAI consultation paper did, and is overall a good effort at balancing the different sides.  However, some of its most important recommendations are completely off-mark and would be disastrous if accepted by the government.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It is praiseworthy that the panel emphasizes the separation in regulatory terms between the network layer and the service layer.  This also means that telecom carriers should be regulated differently from OTT services.&lt;/p&gt;
&lt;h3&gt;Licensing of Communication OTT Services&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The proposal by the DoT panel of a licensing regime for communication OTT services is a terrible idea.  It would presumptively hold all licence non-holders to be unlawful, and that should not be the case; as the panel itself notes, apps that lower the cost of communication are a welcome development and should be encouraged by the government and not made presumptively unlawful.&lt;br /&gt;&lt;br /&gt;While it is in India's national interest to want to hold VoIP services to account if they do not follow legitimate regulations, it is far better to do this through ex-post regulations rather than an ex-ante licensing scheme. &lt;br /&gt;&lt;br /&gt;A licensing scheme would benefit Indian VoIP companies (including services like Hike, which Airtel has invested in) over foreign companies like Viber, or free/open source technologies like WebRTC.  The Universal Licence is designed for a world where all the licencees have an operational presence in India.  This is not true of communications OTT services.  Therefore a licensing regime would unjustly favour some services over others.&lt;br /&gt;&lt;br /&gt;Further, VoIP services need not be provided by a company: a person can choose to run XMPP, SIP, or Mumble — all of which are protocol that support VoIP — on their own computers.  Will a licensing regime force such individuals' many of whom may not be Indian nationals — to become licence-holders if they facilitate domestic communications within India?  The DoT panel report doesn't say.  This would also result in a licensing regime unjustly favouring some services over others.&lt;br /&gt;&lt;br /&gt;The report also doesn't say how one would distinguish between OTT communication services and OTT application services, when many apps such as personal assistance apps like HelpChat, are centred around communications.  It also does not mention what regulatory distinction exists between text communication services and video/voice communication services, or between purely domestic and international video/voice communications.  Stating that certain telecom companies are currently earning most of their revenue from domestic voice traffic will not suffice as a regulatory, just as it did not suffice to say that VSNL's international telephony monopoly earned it a lot of money.  Regulatory fairness is the important issue and not protecting specific business models.  Thus, there is no rational distinction to be drawn.  Even if the panel has some regulatory distinction that it has not stated, this is an impossibility to enforce.  Much domestic IP traffic is 'round-tripped', with traffic leaving India and coming back in.  How would the regulator propose to regulate that?&lt;br /&gt;&lt;br /&gt;Will there be a revenue-sharing mechanism, as is currently the case under the Unified Licence?  If so, how will it be calculated in case of services like WhatsApp?  These questions too find no answer in the report.&lt;br /&gt;&lt;br /&gt;Given these numerous objections and unanswered questions, the government would be well-advised not seek to license OTT communications services.  Instead, it would be useful for the government to hold public consultations about:&lt;br /&gt;&lt;br /&gt; 1. What Universal Licence conditions makes sense in the world of IP-based services, and international services?&lt;br /&gt; 2. How can we frame ex-post regulations that address legitimate concerns?  Is there overlap with provisions of the IT Act such as s.69, s.69B, s.79, and others?&lt;br /&gt; 3. How can we ensure that the regulatory burden for telecom players with respect to their being able to provide IP-based services that are equivalent to OTT communication services?&lt;/p&gt;
&lt;h3&gt;Net neutrality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While the DoT panel reiterates a number of times that the core principles of Net neutrality should be adhered to, it nowhere defines what these core tenets are.  We suggest the following definition:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; net neutrality is the principle that we should regulate gatekeepers to ensure they do not use their power to unjustly discriminate between similarly situated persons, content or traffic.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The above definition applies to the way the ISPs treat consumers, treat interconnecting networks, as well as the way they treat traffic internally.&lt;br /&gt;We agree with the panel that in that while Net neutrality should find place in a new law, for the time being Net neutrality principles can be enforced through the licence agreement between the DoT and telecom providers.&lt;/p&gt;
&lt;h3&gt;Traffic Management&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is unclear what precisely the DoT panel means by "application-agnostic" and "application-specific" network management.  Different scholars on this issue — such as Barbara van Schewick and Christopher Yoo — mean different things when they use the word "application".  Without a definition, it is difficult to say whether the panel's recommendation on that front are sound.&lt;br /&gt;Instead, we suggest the following tests:&lt;br /&gt;Discrimination between classes of traffic for the sake of network management should only be permissible if:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;there is an intelligible differentia between the classes which are to be treated differently, and&lt;/li&gt;
&lt;li&gt;there is a rational nexus between the differential treatment and the aim of such differentiation, and &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;the aim sought to be furthered is legitimate, and is related to the security, stability, or efficient functioning of the network, or is a technical limitation outside the control of the ISP, and &lt;/li&gt;
&lt;li&gt;the network management practice is the least harmful manner in which to achieve the aim.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;As for the provision of enterprise and managed services, which we more broadly term "specialized services", we would recommend:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Provision of specialized services is permitted if and only if it is shown that&lt;/li&gt;
&lt;li&gt;The service is available to the user only upon request, and not without their active choice, and&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service cannot be reasonably provided with "best efforts" delivery guarantee that is available over the Internet, and hence requires discriminatory treatment, or&lt;/li&gt;
&lt;li&gt;The discriminatory treatment does not unduly harm the provision of the rest of the Internet to other customers.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Lastly, we would recommend that the above regulatory guidlines only be applied against ISPs, and not against public providers of Internet connectivity, such as a library, a school, an airport, a hotel, etc.&lt;/p&gt;
&lt;h3&gt;Zero-rating&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On the contentious issue of zero-rating, a process that involves both ex-ante and ex-post regulation is envisaged to prevent harmful zero-rating, while allowing beneficial zero-rating. Further, the report notes that the supposed altruistic or "public interest" motives of the zero-rating scheme do not matter if they result in harm to competition, distort consumer markets, violate the core tenets of Net neutrality, or unduly benefit an Internet "gatekeeper".&lt;br /&gt;&lt;br /&gt;Much of the discussion around zero-rating has been happening around an assumption of common understanding of the phrase.  Unfortunately, that is not true.  There is no consensus as to whether a "special Facebok pack of 200MB for Rs.20" offered by a telecom company constitutes zero-rating or not.  Without a working definition of zero-rating, not much progress can be made.&lt;br /&gt;&lt;br /&gt;We propose the following as a definition:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Zero-rating is the practice of not counting (aka "zero-rating") certain traffic towards a subscriber's regular Internet usage. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;The zero-rated traffic could be zero-priced or fixed-price; capped or uncapped; subscriber-paid, Internet service-paid, paid for by both, or unpaid; content- or source/destination-based, or agnostic to content or source/destination; automatically provided by the ISP or chosen by the customer.&lt;br /&gt;&lt;br /&gt;We believe that zero-rating can be non-discriminatory in nature, and such zero-rating should not be prohibited.  Having a system with both ex-ante and ex-post checks is rather heavy-handed regulation, but since the issue is very contentious in India, we believe it might be merited.&lt;br /&gt;&lt;br /&gt;We thank you for giving us this opportunity to comment.&lt;br /&gt;Pranesh Prakash, Policy Director at the Centre for Internet and Society&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/telecom/blog/comments-on-dot-panel-report-via-mygov'&gt;http://editors.cis-india.org/telecom/blog/comments-on-dot-panel-report-via-mygov&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2015-09-26T10:16:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/crowdsourcing-incidents-of-communication-privacy-violation-in-india">
    <title>Crowdsourcing Incidents of Communication Privacy Violation in India</title>
    <link>http://editors.cis-india.org/internet-governance/crowdsourcing-incidents-of-communication-privacy-violation-in-india</link>
    <description>
        &lt;b&gt;In the context of several ongoing threads of debates and policy discussions, we are initiating this effort to crowdsource incidents of violation of digital/online/telephonic privacy of persons and organisations in India. The full list of submitted incidents is publicly shared, under Creative Commons Attributions-ShareAlike 4.0 International license. Please contribute and share with your friends and colleagues.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Report an incident: &lt;a href="http://goo.gl/forms/8Xcf0zcWZW"&gt;http://goo.gl/forms/8Xcf0zcWZW&lt;/a&gt;&lt;/h3&gt;
&lt;h3&gt;Collected incidents: &lt;a href="http://bit.ly/privacy-violation-india"&gt;http://bit.ly/privacy-violation-india&lt;/a&gt; (CC BY-SA 4.0)&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;You are welcome to cross-post this to your website or other online forum. Please provide attribution, and link back to this page. For any clarification, write to Sumandro Chattapadhyay, Research Director, CIS, at sumandro[at]cis-india[dot]org.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/crowdsourcing-incidents-of-communication-privacy-violation-in-india'&gt;http://editors.cis-india.org/internet-governance/crowdsourcing-incidents-of-communication-privacy-violation-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-10-16T10:49:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/telecom/blog/an-introduction-to-spectrum-sharing">
    <title>An Introduction to Spectrum Sharing</title>
    <link>http://editors.cis-india.org/telecom/blog/an-introduction-to-spectrum-sharing</link>
    <description>
        &lt;b&gt;We will look at how current technology – mainly GSM, but also CDMA and touching upon LTE - shares spectrum, how they might share spectrum, the trade-off between spectral (in this case, 'trunking') and 'economic' efficiency in the traditional, purely intra-operator shared scenario, and how it might be overcome by inter-operator sharing.&lt;/b&gt;
        
&lt;h3&gt;The Current Scenario – Wi-Fi, GSM and CDMA: A Primer from the Perspective of Spectrum Coordination&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Sharing spectrum is not a radically new idea: it's probably being shared in many places in your living room. Your family's phones could be communicating with your laptops using Bluetooth; your Wi-Fi router is sharing Wi-Fi spectrum with your next door neighbor's. There is no central brain that tells each device how to share spectrum, but each device pair (phone+laptop, for example) has some unique identifier (a code) that enables them to hear each other over the “noise” created by the other devices, as though they were speaking different languages. Each device can access the same frequencies at the same time and place, but does not know in advance which other devices are going to use them, and as long as there aren't too many such devices close to each other, the scheme works well.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;From a technological standpoint, this is one of two kinds of spectrum coordination that's currently in wide use: the second is where each device is given a narrow sliver of frequency to itself for a specified period of time.&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; This is what happens with GSM cellphone technology: the service provider's tower allocates frequency — from the pool of frequencies available — to users on a per-call basis: this is called Frequency Division Multiple Access, or FDMA. GSM further divides access between different users in the same frequency channel in the time domain with bursts of data of the order of milliseconds, something called Time Division Multiple Access or TDMA; you'd be sharing your frequency channel with up to seven other people&lt;a name="fr2" href="#fn2"&gt;[2] &lt;/a&gt;and your content would be sent in sub-millisecond bursts approximately every five milliseconds.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Code Division Multiplexing, or CDMA, Is concept that assigns a user a 'code' for the duration of her call that effectively makes interference from other users, with other codes, appear as noise. The following picture illustrates FDMA, TDMA and CDMA:&lt;a name="fr3" href="#fn3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="http://editors.cis-india.org/home-images/Frequency.png" alt="null" class="image-inline" title="Frequency" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The preceding discussion would suffice for a single cell tower, alone in a desert. In the real world, there's more than one tower, so we'll have to create a system so that no two adjacent towers end up allocating the same frequency at the same time. The simplest way to do that, and the only one currently used, is splitting the available spectrum such that the range of frequencies available to a tower does not intersect with that available to any of its neighbors, ever – that way, a tower can only allocate from its own set of frequencies, but it need not concern itself with what its neighbors are doing. If adjacent towers were to share spectrum, then the preceding condition only needs to apply at that exact moment in time – at that precise instant a tower should be aware of the frequencies being used by all towers that are close enough to interfere with it, and pick a frequency outside that set, which it can use for the duration of a call.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Frequency Reuse&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;When there weren't so many cellphones crowding up the spectrum, it did not make economic sense to invest in the extra infrastructure required to make neighboring towers&amp;nbsp; 'talk' to each other with low latency, so the solution we have now, even within the towers of a single service provider, is that any tower's neighbors do not intrude upon the spectrum assigned to that particular tower — what a neighbour is in this statement is qualified below. To start with, let's look at how towers could ideally be placed. We want to place towers on the ground in some regular pattern that makes them end up equidistant from each other: there are as many ways of doing that as there are of tiling a plane, which you can think of as tiling a bathroom with regular shapes (called 'regular polygons' by the pedantic).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Starting from the simplest, we can do it with tiles shaped like triangles, squares or hexagons, and a little thought will convince you that these are the only choices. Since a tower's signal would be 'strong enough' only up to some maximum radius, we'd ideally like to tile our plane with circles, but if we settle for the next best thing, the closest shape to a circle with which to tile the plane is a hexagon, in a honeycomb pattern; if you're looking at it from above, the towers would be placed as in the diagram below.&lt;a name="fr4" href="#fn4"&gt;[4] &lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="http://editors.cis-india.org/home-images/Figure.png" alt="null" class="image-inline" title="Figure" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;This is just a part of a much larger honeycomb on the ground; the towers go in the center of the hexagons, where the numbers are; why the numbers are as they are will become clear in a couple of lines. Let's focus at tower 1 in the center of the diagram for our example. If the signals decay slow enough — so that the signals radiated from the nearest neighbors (towers surrounding 1, i.e. 2 through 7) and the next-nearest neighbors (towers two steps away from 1, with numbers from 2 through 7), interfere significantly with tower 1 in the center, but the next-to-next-nearest neighbors (three steps away from 1) do not, then the frequency reuse pattern can be like what we see in the diagram above, with towers denoted by the same number (and only the same number) using same exclusive set of frequencies. In this example, the closest towers with the same frequency as the central tower are the 1's in the hexagons at the edge – the frequency reuse factor is 3 (see footnote). In this diagram, the ordering of the numbers makes no difference – the situation would be the same if we exchanged the position of every, say, 1 and 3.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In reality the grid of towers of a particular operator covering a city is rarely hexagonal, due to local constraints, so what needs to be taken care of is not to use the frequencies that the nearest neighbors, next-nearest neighbors and so on are using depending upon the frequency reuse factor.&lt;a name="fr5" href="#fn5"&gt;[5] &lt;/a&gt;It's clear that without the towers being able to communicate in near-real time, with and FDMA/TDMA system like GSM, this is the optimal — and, in fact, the only — way to go.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Neighbouring towers sharing spectrum&lt;/h3&gt;
&lt;p style="text-align: justify;" class="western"&gt;Everything changes, though, if the towers can communicate and coordinate fast enough — in theory, at least, all the service provider's towers could pick spectrum from a common pool.&lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt; In fact, every service providers could put their spectrum into a common pool from which frequencies can be allocated to users as before. This would increase &lt;em&gt;trunking efficiency&lt;/em&gt; and thereby the maximum number of users per tower dictated by &lt;em&gt;quality of service&lt;/em&gt; limits &lt;em&gt; &lt;/em&gt;(both terms are defined in the next section), making more efficient use of the spectrum.&lt;/p&gt;
&lt;h3 style="text-align: justify;" class="western"&gt;The Current Trade-off between Trunking and 'Economic' Efficiency: The Principal Argument for (Inter-operator) Shared Spectrum&lt;/h3&gt;
&lt;p&gt;Imagine the following scenario:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;We have 5 MHz of spectrum split it into five channels of one MHz each;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Five thousand people own cell phones and each is assigned a channel so that there are a thousand cellphone users per channel;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;People call infrequently: calls are randomly distributed but on average, in each channel, five people attempt to make a call every minute and each call is ten seconds long.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;" class="western"&gt;In this way, a lot of people can use a few channels with a reasonable hope that their calls will be connected, a phenomenon called 'trunking'. Chances are high, however, that at least one person's going to make a call before the previous caller on her channel is done, and end up being blocked. The probability that a call will go through is factored into the &lt;a class="western" href="https://en.wikipedia.org/wiki/Mobile_QoS"&gt;Quality of Service&lt;/a&gt; (QoS) through the &lt;a class="western" href="https://en.wikipedia.org/wiki/Blocking_probability#Erlang_B_formula"&gt;Erlang B Formula&lt;/a&gt;; roughly speaking, the less chance there is of a caller being blocked, the higher your QoS. It's  essentially a question of queuing: the same logic can be applied to beds at a hospital. The number of hospital beds in a town would be much fewer than the number of people, but it works because everyone's not sick all the time; if people are sick more often, or for longer durations, the chances that someone won't get a bed would be higher:&lt;a name="fr7" href="#fn7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="http://editors.cis-india.org/home-images/Numberofbeds.png" alt="null" class="image-inline" title="Number of beds" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;" class="western"&gt;Suppose someone own an Airtel phone and Airtel's channels are all in use, but Vodaphone has a channel free at the time. Let's look at two alternatives:&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;a) she's not allowed to switch, and cannot make her call;&lt;br /&gt;b) she's allowed to switch to the empty channel, and her call goes through.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;Clearly, the second choice is better &lt;strong&gt;— &lt;/strong&gt;and it has greater trunking efficiency.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;In the current scenario, service providers get exclusive rights to chunks of spectrum. Naively, the more competitors (in this case, service providers like Airtel and Vodaphone) you have in a market, the better the competition. This, unfortunately, leads to a decrease in trunking efficiency &lt;strong&gt;— &lt;/strong&gt;it's inversely proportional to the number of players in the market because every chunk of frequencies split between two service providers (every successive split) increases the chances for an event such as the one described above happening. The question that logically follows is: what is the optimal number of service providers for the Indian market? This is hard to find, and differs depending on who you ask &lt;strong&gt;— &lt;/strong&gt;incumbents, for instance, may quote a smaller number, whereas prospective new entrants may quote a larger one. The number is controversial within policy-making circles as well, and is being debated as this article is being written. We note in passing that the number of competitors &lt;strong&gt;— &lt;/strong&gt;and thus fragmentation of spectrum &lt;strong&gt;— &lt;/strong&gt;is higher in the Indian market than most others.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;If spectrum were shared, however, all this would be moot. This, therefore, is the primary argument towards spectrum sharing: better trunking efficiency as well as more competition &lt;strong&gt;— &lt;/strong&gt;you can , in this instance, have it both ways.&lt;/p&gt;
&lt;h3 style="text-align: justify;" class="western"&gt;CDMA and Spectrum Sharing&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;GSM is a simple example, where both the difficulty and the benefits of intra-operator spectrum sharing are readily apparent. Things get more difficult conceptually if we talk about newer technologies, so we'll have to get a little deeper into the technicalities. Code Division Multiple Access, or CDMA, allows phones to communicate using the same frequencies at the same time and place, but differentiated by codes &lt;strong&gt;—&lt;/strong&gt; similar to WiFi but using different encoding schemes and technology.&amp;nbsp; CDMA might look (from the analogy with Wifi) to require no central planning, but quality of service guarantees require that various phones in a 'cell' coordinate, and the coordinating agent happens to be that cell's tower. Two things need to happen: one, the code allocated to each phone needs to be sufficiently different,&lt;a name="fr8" href="#fn8"&gt;[8]&lt;/a&gt; at least with respect to other nearby phones, which means the tower has to allocate codes. Additionally, the distance involved between cellphone and tower (as against laptop and router) causes the &lt;a class="external-link" href="https://en.wikipedia.org/wiki/Near-far_problem"&gt;near-far problem&lt;/a&gt;.&lt;a name="fr9" href="#fn9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For synchronous CDMA, the concept analogous to frequency reuse is code reuse &lt;strong&gt;—&lt;/strong&gt; a tower needs to take into account the codes being used by its nearest neighbors, next-nearest neighbors and so on, which might be easier than coordinating timing in a TDMA system. For asynchronous CDMA (the most commonly used variant), even that is not required &lt;strong&gt;—&lt;/strong&gt; the &lt;a class="external-link" href="https://en.wikipedia.org/wiki/Chip_(CDMA)"&gt;low cross-correlation pseudorandom codes&lt;/a&gt; that are used have so many possibilities that the likelihood of a collision would be small, though other users would appear as &lt;a class="external-link" href="https://en.wikipedia.org/wiki/Code_division_multiple_access#Asynchronous_CDMA"&gt;gaussian noise&lt;/a&gt;, so just like GSM, the number of users is limited by QoS limits. This makes intro-operator sharing of spectrum between adjacent towers easier and asynchronous CDMA ends up with a frequency reuse factor of 1, meaning that a tower can access the same set of frequencies as its (intra-operator) neighbor, hypothetically making it easier to use in a shared-spectrum system.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;LTE&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;LTE uses Orthogonal Frequency Division Multiplexing, or OFDM, which can be – very roughly &lt;strong&gt;—&lt;/strong&gt; thought of as combining ideas used in FDMA as well as CDMA, in that information is redundantly split between several frequencies ('subcarriers' in the literature) and each frequency can have more than one channel, using an orthogonal coding schemes like (synchronous) CDMA, where, as mentioned earlier, a mobile phone can distinguish its channel by its code. As it's an FDMA system, the benefits of frequency sharing for LTE can be inferred as above for GSM.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;The Regulatory Perspective&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The European Commission has this to say about shared spectrum:&lt;a name="fr10" href="#fn10"&gt;[10] &lt;/a&gt;“From a regulatory point of view, band sharing can be achieved in two ways: either by the Collective Use of Spectrum (CUS), allowing spectrum to be used by more than one user simultaneously without a license; or using Licensed Shared Access (LSA), under which users have individual rights to access a shared spectrum band”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CUS is how unlicensed spectrum like Wi-Fi is currently used, which does not require a central 'brain' allocating spectrum to users. It requires no setup or organization before or during use. LSA is what shared spectrum would have to be like when used by service providers: it requires setup and organization but could offer better efficiency and quality of service because the central 'brain' &lt;strong&gt;—&lt;/strong&gt; in this case the CPU at the cellphone tower &lt;strong&gt;—&lt;/strong&gt; can figure out the most efficient way to allocate spectrum to users, just like a city's traffic lights coordinate the flow of traffic to prevent jams, and for that multiple towers &lt;strong&gt;—&lt;/strong&gt; or multiple transmitters on a single tower &lt;strong&gt;—&lt;/strong&gt; would have to coordinate somehow. In other words, you don't require approval before setting up your Wi-Fi router in your living room, but (depending upon the router, how many neighbors have routers, how close they are, and how far you are from your router) your connection might get dropped; this kind of thing is okay because there usually aren't that many people with routers living that close to each other, though that's fast changing. The 2.4 GHz Wi-Fi band is further crowded in by other microwave radio technologies, like Bluetooth and microwave ovens. Cellphones are a different thing altogether, because you wouldn't want your cellphone to stop working in the middle of a crowded bus if you're late en route to meeting someone at a coffee shop, or if you're being mugged and need to call the police. Therefore it is the service providers' and regulatory agencies' responsibility to provide a high (minimum) quality of service. This classification is symbolized by the following diagram:&lt;a name="fr11" href="#fn11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="http://editors.cis-india.org/home-images/Multiple.png" alt="null" class="image-inline" title="Multiple Access Techniques" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;" class="western"&gt;CUS falls on the left, being contention-based – that is, different user devices (eg, laptops) could contend with each other for the attention of the base station (eg, Wi-Fi router &lt;strong&gt;—&lt;/strong&gt; random access, CSMA), whereas LSA is conflict-free (which would be the case if the router decides, period). The potential for conflict exists in CUS, there being multiple devices asking for spectrum, whereas for LSA, a central authority  decides which device to allocate spectrum to at any particular point in space and time. CUS isn't total chaos, however: it would now be appropriate &lt;strong&gt;—&lt;/strong&gt; taking a leaf from ex-FCC chief technology officer Jon M. Peha – to introduce the concepts of &lt;em&gt;coexistence&lt;/em&gt; and &lt;em&gt;etiquette&lt;/em&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;In our Wi-Fi example, the Wi-Fi routers merely coexist, and the technological standard allows them to try and use the codes/spectral bands that are in their best interests, to best communicate with their client devices (though actual Wi-Fi routers also follow some sort of etiquette with other routers). One could additionally introduce some sort of etiquette into the equation by requiring that one router should, for example, “wait in the cue” for another &lt;strong&gt;—&lt;/strong&gt; and vice versa &lt;strong&gt;—&lt;/strong&gt; as and when required, as well as other requirements for cooperation depending upon the technology used. This minimal cooperation would be enough for them to, in Mr Peha's &lt;a class="western" href="http://morse.colorado.edu/~timxb/5520/ho/PehaSpectrum.pdf"&gt;words&lt;/a&gt;, “greatly improve efficiency &lt;em&gt;if and only if&lt;/em&gt; designed appropriately for the applications in the band” - depending upon the technology used, being too 'polite' could cause longer wait times that decrease efficiency. The situation is complicated by the existence of multiple technologies at the same spot – for example, your Bluetooth receiver, two-way radio and Wifi router working in the same room. If there is potential for interference, common communication protocols could be implemented to enable all those devices to 'talk' to each other and effectively follow some form of wireless etiquette so that they can cooperate and not get in each others way. This is all the more important as Wi-Fi will become an essential part of the cellphone communication network for 4G.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;To conclude, there are many ways shared spectrum technology could hypothetically work, and in practice the core technologies that are used would dictate the details of the spectrum sharing solution. Spectrum sharing would reduce the regulatory conundrum that is spectrum allocation, and make more efficient use of spectrum &lt;strong&gt;—&lt;/strong&gt; most obviously through trunking efficiency, though there may be other technological benefits depending upon the core technology used. For maximum efficiency and robustness, there would have to be some kind of rules followed, so that devices apply for spectrum like people in a cafeteria queue as opposed to the scrum you might find trying to get into an Indian bus; the etiquette we were talking about earlier should be baked into the design of the communication infrastructure. Some services (like voice calling) by their nature, need a guaranteed high QoS &lt;strong&gt;—&lt;/strong&gt; need to be conflict-free &lt;strong&gt;—&lt;/strong&gt; and therefore need Licensed Shared Access. Others need a minimum of regulation &lt;strong&gt;—&lt;/strong&gt; but with the movement of what used to be CUS-appropriate devices (In many plans for 4G LTE-Advanced, specifically Wi-Fi) towards LSA-appropriate applications, a careful optimization needs to be done in deciding where to draw the line.&lt;/p&gt;
&lt;h3 style="text-align: justify;" class="western"&gt;The Big Question: Infrastructure Sharing&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;We've gone through a thought experiment on intra- and inter-operator sharing of spectrum for the particular case of mobile towers in adjacent cells, and come to the general conclusion that the solution is in principle a question of fast and efficient coordination between the geographically separated towers, toward which there are two driving forces at present: the demand for more efficient use of spectrum by a growing body of users with growing data needs, and the supply of low latency, cheaper and higher bandwidth communication options using fiber-optic cables.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There are essentially two parts to the big question we're going to ask: one, what happens when there are multiple operators serving the same geographical area, and two, is it necessary to have multiple towers standing right next to each other for multiple operators?&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify;"&gt;To answer the first question, one could have a 'roaming' agreement between multiple operators at the same spot: if all the channels of one operator are busy, the user just has to switch to a channel of an operator which isn't.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For the second, a single tower (the physical tower structure as well as the transmitting equipment on it) could serve any operator, who could rent it's usage on a per-call basis. That, in fact, already seems to be the case: Airtel and Vodaphone, for instance, each own a 42% share in India's largest tower corporation Indus Towers, the remaining 16% belonging to Idea Cellular.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="http://editors.cis-india.org/home-images/PitampuraTower.png" title="Pitampura Tower" height="264" width="383" alt="null" class="image-inline" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Infrastructure sharing will be explored further in a forthcoming post.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Coarse-grained Spectrum Sharing&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;For completeness, we should point out that there are more course-grained (simpler but less efficient) means of sharing in time as well as geography: the appropriate thought experiment is to imagine a radio station at the base of a hill that only has two shows, one for breakfast and one for dinner. Using its radio spectrum on the other side of that hill, or beyond the area it serves, would be fine at anytime; using it's spectrum in between the morning and evening shows would be fine anywhere.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Caveats&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;It must be emphasized at this point that the above is a purely hypothetical scenario, and not a prescription. Getting this to work would involve technical hurdles that a brief overview such as the one above could not bring up, that could only be discovered in the process of bringing the technology to market. Each technological solution – GSM, CDMA and LTE – would present its own difficulties, which may become apparent only when the product is shipped, so to speak. Fine technical judgments would need to be made: an example of the difficulty involved could be gauged from the early debates comparing the first CDMA standard (IS-95) with GSM at the time.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The economic model to use for shared spectrum and shared infrastructure is also something under intense discussion right now, and a number of scholarly papers have already been written up.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. This is what you'd get in your first few Google search results when you look for “shared spectrum”, because the former has become so widely accepted that it's now part of the linguistic background.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. Explained on http://www.radioraiders.com/gsm-frequency.html, referring to 3GPP spec &lt;a class="external-link" href="http://www.3gpp.org/ftp/Specs/latest/Rel-7/45_series/45005-7d0.zip"&gt;http://www.3gpp.org/ftp/Specs/latest/Rel-7/45_series/45005-7d0.zip&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;]. From &lt;a class="external-link" href="http://www.umtsworld.com/technology/cdmabasics.htm"&gt;http://www.umtsworld.com/technology/cdmabasics.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;]. From Mike Buehrer, William Tranter-Code Division Multiple Access (CDMA)-Morgan &amp;amp; Claypool Publishers (2006).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;]. There are multiple definitions; the simplest one is “how many steps (in cells) that you have to walk from the tower before you can reuse the frequency”, which will suffice for us.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;]. Of course, it's going to be messier in practices.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn7" href="#fr7"&gt;7&lt;/a&gt;]. From &lt;a class="external-link" href="http://www.vumc.com/branch/PICA/Software/"&gt;http://www.vumc.com/branch/PICA/Software/&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote-western"&gt;[&lt;a name="fn8" href="#fr8"&gt;8&lt;/a&gt;]. Orthogonal for synchronous CDMA, or 'sufficiently' orthogonal for asynchronous CDMA&lt;/p&gt;
&lt;p style="text-align: justify;" class="sdfootnote-western"&gt;[&lt;a name="fn9" href="#fr9"&gt;9&lt;/a&gt;]. Remember that the receiver on the tower has to demux (split) the signals received from many cellphones, and while a Wifi router would perhaps service multiple laptops in the same building, a CDMA tower has to work for a couple of hundred phones at varying distances – some a building-length away and some, many kilometers away. Every receiver has its own maximum signal to noise ratio, where the strength of the signal received has to be more that a certain fraction (which can be quite small, for a good receiver) of the strength of the electromagnetic (radio) noise it receives from other sources; cellphone towers have to deal with much larger signal to noise ratios than Wifi routers. For an FDMA or TDMA system, different users' data arrives at different frequency or time-slots, so as long as those slots are properly differentiated, one user's signal won't be another user's noise. For the commonly used asynchronous CDMA system, however, this is not the case, so at a receiver on a tower, the signal transmitted by a distant cellphone could be swamped by that from a much closer phone. The way this is dealt with is to have phones closer to the tower decrease their transmission power. So even in CDMA, the tower is still telling the phone what to change, only in this case it's the transmission power as opposed to the exact frequency and time.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn10" href="#fr10"&gt;10&lt;/a&gt;]. http://ec.europa.eu/digital-agenda/en/promoting-shared-use-europes-radio-spectrum&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn11" href="#fr11"&gt;11&lt;/a&gt;]. From Mike Buehrer, William Tranter-Code Division Multiple Access (CDMA)-Morgan &amp;amp; Claypool Publishers (2006)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/telecom/blog/an-introduction-to-spectrum-sharing'&gt;http://editors.cis-india.org/telecom/blog/an-introduction-to-spectrum-sharing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>beli</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Shared Spectrum</dc:subject>
    

   <dc:date>2014-03-20T09:34:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/raw/navigating-the-digitalisation-of-finance">
    <title>Navigating the Digitalisation of Finance:  User experiences of risks and harms </title>
    <link>http://editors.cis-india.org/raw/navigating-the-digitalisation-of-finance</link>
    <description>
        &lt;b&gt;Our study unpacks the experiences of marginalised users navigating the digitalisation of finance. Through a survey of 3,784 users, 18 interviews and 7 focus group discussions, our study’s findings highlight user experiences of risks and harms while accessing digital financial services, unpacking experiences specifically of persons with disabilities, transgender persons, gender and sexual minorities, elderly persons, women, regional language-first users, and persons facing digital and economic vulnerabilities.
&lt;/b&gt;
        
&lt;p&gt;Read the &lt;a href="http://editors.cis-india.org/CIS_Navigating-the-digitalisation-of-finance" class="external-link"&gt;full report here&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Executive Summary&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The last couple of decades have seen significant changes in the financial ecosystem in India, both within the fintech sector and with respect to digital financial inclusion. The rapid growth in the reach of banking services to previously unbanked citizens through the Pradhan Mantri Jan Dhan Yojana has been followed by digitalisation in financial and public services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, a commensurate increase in digital and financial literacy has not followed, and rates of access to digital devices and the internet are still growing for many user groups, like rural women and regional language speakers. From the proliferation of fraudulent schemes and cybercrime to regulatory loopholes and inadequate consumer protections, the landscape of online financial services in India presents numerous risks. Factors such as weak cybersecurity measures, data breaches, lack of awareness among users, and the absence of comprehensive regulations create a fertile ground for financial scams. Simultaneously, rapid digitalisation of financial services, especially post demonetisation and the COVID-19 pandemic, has also brought to the fore concerns around omissions and exclusion of sections of users from databases, and a steep learning curve in adapting to this new digital ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;These combined factors open up users to a range of potential financial risks and harms, with differential impact on specific marginalised and vulnerable groups. With this understanding, we use the term digital financial harms to refer to adverse financial outcomes and other related detrimental consequences in the use of digital financial services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Through this study, we aim to situate these experiences in a continuum of harms within a rapidly digitalising financial ecosystem. By exploring questions of access, accessibility and language we hope to bring aspects of cybersecurity, digital and financial literacy and design justice into conversation with each other. While some research has aimed to understand technology-facilitated gender based violence, financial fraud, misinformation, and other forms of digital risks in siloes, the correlations between these risks online remain severely understudied. In this report, we focus on the experiences of groups long marginalised within the financial system, to recommend that their needs are centred in shaping digital financial services.&lt;/p&gt;
&lt;p&gt;Key questions guiding our research were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;How were digital financial risks understood and experienced by users of digital financial services across groups? What factors have amplified risks for marginalised and at-risk user groups?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;What potential vulnerabilities, risks and harms have emerged relating to digital financial services around device and internet access, accessibility, challenges with use, exclusions from digitalised social protection, and forms of social engineering and digital financial fraud?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;How accessible were digital financial service providers’ and governments’ reporting and grievance redressal systems?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;What role should fintech platforms, social media platforms, banking and financial institutions, government, and regulatory bodies play in reducing digital financial risks across the ecosystem?&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;This was a mixed methods study, consisting of a review of available literature in the field, followed by quantitative and qualitative data collection through surveys and in-depth interviews. The report highlights the experiences of persons with disabilities, gender minorities, the elderly, low income users, and regional language first users; to better understand how discrimination, exclusion or slow redressal processes may increase their risk or cause disproportionate harm when using digital financial services. It discusses users’ experiences of fraud in the context of an evolving regulatory ecosystem, as well as practical challenges users face with redressal systems.&lt;/p&gt;
&lt;p&gt;Key findings include:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Access to digital financial services, still requires improving      access and accessibility of physical and phygital banking services, and      good internet connectivity.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Even among mobile phone owners, many users still rely on shared      devices, particularly among women and persons with disabilities.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;There is a high need for support in utilising net banking services,      with 60% of surveyed netbanking users mentioning that they sought help to      conduct online banking transactions. Migrating to digital financial      services is not a purely digital journey for users who are still building      comfort with digital interfaces, or those whose languages are      deprioritised in the development of digital financial platforms.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Age, gender, and income were significant factors in the access to      the internet, and adoption of digital financial services. For instance,      women and transgender persons over 45 years were less likely to have a      Unified Payments Interface (UPI) account. Women, transgender persons, and      disabled users of UPI were also more likely to be infrequent users      compared to the rest of the sample.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Over reliance on digital platforms for the administration of direct      benefit transfer programmes results in challenges and risks of exclusions      for beneficiaries.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;While awareness of common forms of fraud is high, awareness of      security protocols, Know Your Customer (KYC) requirements and markers of      trustworthy banking and non-banking institutions is low.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Irrespective of the amount of money lost during frauds, it caused      significant financial and emotional burden, especially for low-income      persons.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;In the absence of monitoring frameworks, bad actors within the      financial system are able to exploit vulnerabilities like the dependence      of account holders on banking correspondents.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Gender and sexual minorities, and women face disproportionate      impacts of harm in the event of financial loss, including the consequences      of image-based sexual abuse, victim blaming, domestic violence and limits      on financial independence.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Ineffective grievance redressal for cybercrimes is a major      deterrent to reporting.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Digitalisation and the use of assistive technology have allowed      some persons with visual impairments to gain relative levels of      independence in managing their own finances and conducting transactions.      However, implementation of accessibility policies and features remains      uneven, and is marred by the continued exclusion and discrimination within      traditional banking services.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;Based on these findings, this report offers a set of recommendations addressed to stakeholders within the financial ecosystem such as banking and other financial institutions, regulatory bodies, fintech companies, cybersecurity professionals, as well as social media platforms and civil society organisations working on digital inclusion, safety and literacy. The recommendations offer nuanced perspectives on how digital financial harms can be prevented and mitigated based on our interactions with various stakeholders during the research process.&lt;/p&gt;
&lt;p&gt;Key recommendations emerging from the study are:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Create meaningful connectivity and access to digital platforms by      improving public infrastructure and addressing the challenges associated      with shared devices and mediated use.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Improve platform design to engender trust; increase accessibility      and usability through assessment and better implementation of available      technologies, regular design audits and facilitate availability in Indian      languages.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Building awareness and capacity across user and stakeholder groups      through customised and inclusive programming, working in partnership with      communities.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Centre consumer protection in regulatory interventions and      approaches to law enforcement, by implementing robust time-sensitive      reporting and redressal mechanisms, placing accountability on financial      institutions, and monitoring and curbing fraudulent activity.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Encourage transparent governance and public oversight by measuring      and evaluating digital public infrastructures to maximise their public      value.&lt;/li&gt;&lt;/ol&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;h1&gt;Contributors&lt;/h1&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Research design and/or report writing:&lt;/strong&gt; Amrita Sengupta, Chiara Furtado, Garima Agrawal, Nishkala Sekhar, Puthiya Purayil Sneha, and Vipul Kharbanda&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Research advice and/or review:&lt;/strong&gt; Antara Rai Chowdhury, Janaki Srinivasan, Nayantara Sarma, Palak Gadhiya, Pallavi Bedi, Sameet Panda, Semanti Chakladar, Shashidhar K J, Shweta Mohandas, and Taranga Sriraman&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Research and/or data analysis support:&lt;/strong&gt; Chetna V M, Pallavi Krishnappa, and Yesha Tshering Paul&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Data analysis:&lt;/strong&gt; Chiara Furtado, Garima Agrawal, and Nishkala Sekhar&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Research tool translation:&lt;/strong&gt;&amp;nbsp;  Aravind R (Kannada), Balaji J (Tamil), Bhaskar Bhuyan (Assamese), Nettime Sujata (Bangla), and Suresh Khole (Marathi)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Research tool pilots:&lt;/strong&gt; Raveenaben (Megha Cooperative, SEWA), Sunaben (Megha Cooperative, SEWA), and Raja Mouli N&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Data collection (survey):&lt;/strong&gt; D-Cor Consulting&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Data collection (focus group discussions):&lt;/strong&gt; D-Cor Consulting; Jnana Prabodhini, Pune; Transgender Rights Association, Chennai; and Subodh Kulkarni&lt;/p&gt;
&lt;p&gt;This work is shared under the &lt;a href="https://creativecommons.org/licenses/by-sa/4.0/"&gt;Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0)&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/raw/navigating-the-digitalisation-of-finance'&gt;http://editors.cis-india.org/raw/navigating-the-digitalisation-of-finance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amrita Sengupta, Chiara Furtado, Garima Agrawal, Nishkala Sekhar, Puthiya Purayil Sneha, and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Financial Platforms</dc:subject>
    
    
        <dc:subject>Digital Financial Harms</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Digital Financial Services</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2025-04-10T05:49:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/digital-futures-internet-freedom-and-millennials-2">
    <title>Digital Futures: Internet Freedom and Millennials</title>
    <link>http://editors.cis-india.org/internet-governance/digital-futures-internet-freedom-and-millennials-2</link>
    <description>
        &lt;b&gt;Last year was a turbulent year for freedom of speech and online expression in India. Early in 2011 we saw the introduction of an Intermediaries Liability amendment to the existing Information Technologies Law in the country, which allowed intermediaries like internet service providers (ISPs), digital content platforms (like Facebook and Twitter) and other actors managing online content, to remove material that is deemed objectionable without routing it through a court of law. Effectively, this was an attempt at crowdsourcing censorship, where at the whim or fancy of any person who flags information as offensive, it could be removed from digital platforms, writes Nishant Shah in DMLcentral on 3 February 2012.&lt;/b&gt;
        
&lt;p&gt;While we were still reeling from the potential abuse this could lead 
to – from weekend drunken games where people send take-down notices on 
an ad hoc basis to regressive fundamentalists using this to silence 
voices of protests – we encountered another shock. The Information and 
Technologies minister of India called some of the biggest social 
networking platforms that support user generated content to exercise a 
regime of self-regulation and censorship. Citing content that was 
considered slanderous to political leaders in the country and 
potentially offensive to the religious sentiments of certain groups, he 
called for a ‘pre-screening’ of online content – invoking visions of 
thought police, where an army of thousands will be trained to read your 
personal and private information, sift it for offensive content, and 
disallow it to be published online.&lt;/p&gt;
&lt;p&gt;And while we deal with the aftermath of what this might mean to the 
future of openness and our constitutionally enshrined rights of freedom 
of speech and expression, there was another shock that awaited us in 
2012. Even as I write this, Facebook and Google – two of the largest 
social media platforms in India – have been 'implicated' in a gamut of 
civil and criminal charges. It has been alleged that these companies 
knowingly allowed obscene and immoral material capable of inciting 
prurience, communal tension, hatred and violence, to proliferate in 
their systems because it helps generate revenue. Because the people who 
uploaded the information are outside the jurisdiction of the court, they
 cannot be punished but these intermediaries that have allowed this 
content that is deemed ‘obscene, lascivious, indecent and shocking’, are
 now being held responsible.&lt;/p&gt;
&lt;p&gt;There has been a lot of debate in and outside the country about the 
implications this has for the form and nature of information online. 
Freedom of speech and expression, information regulation regimes in 
emerging information societies, resurgence of authoritative 
governmentality in the face of quickly eradicating sovereignty, and the 
diminishing openness of the web, have all been variously discussed, much
 like the debates around SOPA/PIPA discussions in the US. In all of 
these conversations, there has been talk about the future but not about 
the people whose futures are the most at stake – digital natives. 
Pulling from my research, here are some summarized reflections of 
members of a younger generation pondering their digital futures:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Innovation&lt;/strong&gt;: One of the tropes that allows digital natives 
intimate relationships with their technology gadgets, platforms and 
environments is to innovate. Especially in the global south where we 
cannot take ubiquitous and affordable access to the internet for 
granted, innovation is not merely about creativity in producing new 
content. Innovation is in mobilizing meager resources in order to 
achieve large tasks. Innovation is in cutting through existing 
boundaries of inequity and building communities of learning and 
information. Innovation is in finding ways by which access can be 
facilitated for large user bases. Free and open information is the 
reward that follows innovation. There is consensus that restricting 
access to information is a negative incentive for those approaching the 
information superhighway. And for some it is also “a challenge to find 
ways of accessing that information. They can ban it, but by the time 
they will ban it, our way of accessing it will have changed!”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Information Read/Write&lt;/strong&gt;: Sometimes the promise of digital 
networks providing abundant information and knowledge, which is free to 
access and consume, overrides the actual allure of speech and 
expression. As one interlocutor explained in Wikipedia terms, “more 
people access Wikipedia to consume information others have produced 
rather than contribute to it...and it is the same everywhere. It is fun 
to write, but it is fun to write only because there is somebody reading 
it. Sometimes I go online to read rather than write.” The censorship 
debates often restrict themselves to freedom of speech and expression, 
but what they overlook is that this also interferes with the freedom to 
read. Reading is a form of engagement, interaction, formation of trust 
and affection online. And when information can no longer be easily read,
 it will have drastic effects on how young people connect and form 
communities.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mapping Learning&lt;/strong&gt;: For many digital natives in my work, the 
digital domain is not only a playground but also a space of learning. 
Not learning in its didactic forms, replacing universities and offering 
abundance of knowledge. For some, the digital space is a new process of 
learning. It helps them negotiate and cope with their formal curricula 
and offers alternative sources to understand and analyze reality. As 
many in our research group mentioned, “we already have access to enough 
academic material through our libraries. What we find on the internet 
are things that help us understand ideas through things that are 
familiar to us.” When pressed for an example, I was shown a wide range 
of popular and academic, cultural and social spaces – blogs, videos, 
movies, music, commentaries, tweets, mashups, etc., which the students 
often map back to their existing curriculum. “Sometimes the textbooks 
talk about things that happened before we were born. Or belonging to 
countries we don’t know much about,” explained a 19-year-old. So as a 
group they try and pull different and more familiar objects back into 
their discussions, using the web, its search potential, and social 
networking sites as filters to gain access to relevant knowledge.&lt;/p&gt;
&lt;p&gt;It is in the nature of information to be filtered or censored. Even 
at a personal level we constantly filter out information that is not 
desirable or useful to us. It is understandable that certain kinds of 
information that are produced with malicious intent needs to be 
controlled. However, the recent attempts attack the very structures that
 define the social web as we understand it now -- openness, 
distribution, sharing, collaboration, co-creation and interactivity. For
 digital natives, being digital is not just about infrastructure and 
access. It is an integral part of how they embed themselves and 
negotiate with our information society. Regulation of information is not
 just about resolving the crisis of the present but also about shaping 
the digital futures for a generation that is growing up digital.&lt;/p&gt;
&lt;p&gt;Banner image credit: zebble &lt;a class="external-link" href="http://www.flickr.com/photos/zebble/6080622/"&gt;http://www.flickr.com/photos/zebble/6080622/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/digital-futures-internet-freedom-and-millennials"&gt;Read the original published in DML Central&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/digital-futures-internet-freedom-and-millennials-2'&gt;http://editors.cis-india.org/internet-governance/digital-futures-internet-freedom-and-millennials-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2012-02-15T04:25:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/towards-algorithmic-transparency">
    <title>Towards Algorithmic Transparency</title>
    <link>http://editors.cis-india.org/internet-governance/blog/towards-algorithmic-transparency</link>
    <description>
        &lt;b&gt;This policy brief examines the issue of transparency as a key ethical component in the development, deployment, and use of Artificial Intelligence.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This brief proposes a framework that seeks to overcome the challenges in preserving transparency when dealing with machine learning algorithms, and suggests solutions such as the incorporation of audits, and ex ante approaches to building interpretable models right from the design stage. Read the full report &lt;a href="http://editors.cis-india.org/internet-governance/algorithmic-transparency-pdf" class="internal-link" title="Algorithmic Transparency PDF"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Regulatory Practices Lab at CIS aims to produce regulatory policy 
suggestions focused on India, but with global application, in an agile 
and targeted manner and to promote transparency around practices 
affecting digital rights. &lt;br /&gt;The Regulatory Practices Lab is supported by Google and Facebook.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/towards-algorithmic-transparency'&gt;http://editors.cis-india.org/internet-governance/blog/towards-algorithmic-transparency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Radhika Radhakrishnan, and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Regulatory Practices Lab</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Algorithms</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Transparency</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2020-07-15T13:16:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/raw/ifat-itf-protecting-workers-in-digital-platform-economy-ola-uber-occupational-health-safety">
    <title>IFAT and ITF - Protecting Workers in the Digital Platform Economy: Investigating Ola and Uber Drivers’ Occupational Health and Safety</title>
    <link>http://editors.cis-india.org/raw/ifat-itf-protecting-workers-in-digital-platform-economy-ola-uber-occupational-health-safety</link>
    <description>
        &lt;b&gt;Between July to November 2019, Indian Federation of App-based Transport Workers (IFAT) and International Transport Workers’ Federation (ITF), New Delhi office, conducted 2,128 surveys across 6 major cities: Bengaluru, Chennai, Delhi NCR, Hyderabad, Jaipur, and Lucknow, to determine the occupational health and safety of app-based transport workers. CIS is proud to publish the study report and the press release. Akash Sheshadri, Ambika Tandon, and Aayush Rathi of CIS supported post-production of this report.&lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;h4&gt;Report: &lt;a href="https://cis-india.org/raw/files/ifat-itf-protecting-workers-in-digital-platform-economy-ola-uber-occupational-health-safety-report/" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;Press Release: &lt;a href="https://cis-india.org/raw/files/ifat-itf-protecting-workers-in-digital-platform-economy-ola-uber-occupational-health-safety-press-release" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;Press Release, August 25, 2020&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;Between July to November 2019, IFAT and ITF conducted 2,128 surveys across 6 major cities: Bengaluru, Chennai, Delhi NCR, Hyderabad, Jaipur, and Lucknow, to determine the occupational health and safety of app-based transport workers.&lt;/p&gt;
&lt;p&gt;Some of the most startling findings from the survey are below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;There is a complete absence of social security and protection—a glaring 95.3% claimed to have no form of insurance, accidental, health or medical. This reflects the inability of workers to invest in their own health. This partly is a result of declining wages—after paying off their EMIs, penalties and commission to the companies and having less than Rs. 20,000 left at the end of the month.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Only 0.15% of the respondents reported to have access to accidental insurance, which is the bare minimum companies like Ola and Uber should have provided to their drivers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Uber and Ola provide no assistance with regard to harassment and violence while drivers are on the road. Ola or Uber for the most part do not intervene if there is any intimidation from traffic police or local authorities, incidents of road rage, violent attack by customers or criminal elements that endanger drivers’ lives, accidents while driving etc.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On average drivers spend close to 16-20 hours in their cars in a day. 39.8% of the respondents spent close to 20 hours in their vehicle in a day, and 72.8% of the respondents from Bengaluru, Chennai and Hyderabad drive for close to 20 hours a day. Due to long hours, 89.8% of the respondents claim they get less than 6 hours of sleep.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Health issues arising directly as a result of conditions of work is affecting the day-to-day lives of workers. Backache, constipation, liver issues, waist pain and neck pain are the top five health ailments that app-based transport workers suffer from due to their work. 60.7% respondents identified backache as a major health issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;App-based drivers/driver partners work in a very toxic and isolated work environment. Drivers can’t exit their current occupational status even if they want to because they are shackled in debts and outstanding EMIs. As a result, they race every day to complete targets so that they may earn just enough to pay these liabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The work these drivers are engaged in cannot be considered to be within the ambit of decent work and in reality, is representative of modern slavery. The algorithm of the companies they work for, pits them against their peers in order to maximize profit, while at the same time denying them social security or protection and essentially refusing to acknowledge them as employees.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Drivers working in various cities and working for different app-based platforms have complained about the lack of transparency in how these app-based companies determine fares, promotional cost, surge pricing, incentives, penalties and bonuses. There is little to no information on how rides are being fixed or are being allocated. There also isn't any effective grievance redressal mechanism to resolve any of the issues faced by workers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The apathy of the state and the exploitation by app-based companies have brought the transport and delivery workers in a precipitous position across the globe. This is underlined and explained by the absence and lack of any social security or protection for the workforce, there are some other issues that the workforce is battling during the Covid-19 pandemic.&lt;/p&gt;
&lt;p&gt;Hear our voices and address our demands.&lt;/p&gt;
&lt;p&gt;- &lt;em&gt;Shaik Salauddin&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;National General Secretary, Indian Federation of App-based Transport Workers (IFAT)&lt;br /&gt; Phone: +91 96424 24799&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Indian Federation of App-based Transport Workers&lt;/strong&gt;&lt;br /&gt; Facebook: &lt;a href="https://www.facebook.com/connectifat/" target="_blank"&gt;connectifat&lt;/a&gt;&lt;br /&gt; Twitter: &lt;a href="https://twitter.com/connect_ifat" target="_blank"&gt;@connect_ifat&lt;/a&gt;&lt;br /&gt; YouTube: &lt;a href="https://www.youtube.com/channel/UCA1AxGq0Fb_A_O_Ey44eiPg" target="_blank"&gt;Indian Federation of App-based Transport Workers&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/raw/ifat-itf-protecting-workers-in-digital-platform-economy-ola-uber-occupational-health-safety'&gt;http://editors.cis-india.org/raw/ifat-itf-protecting-workers-in-digital-platform-economy-ola-uber-occupational-health-safety&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Indian Federation of App-based Transport Workers (IFAT) and International Transport Workers’ Federation (ITF), New  Delhi office</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Labour</dc:subject>
    
    
        <dc:subject>Covid19</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Platform-Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2021-06-29T06:53:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/raw/ifat-itf-locking-down-the-impact-of-covid-19">
    <title>IFAT and ITF - Locking Down the Impact of Covid-19</title>
    <link>http://editors.cis-india.org/raw/ifat-itf-locking-down-the-impact-of-covid-19</link>
    <description>
        &lt;b&gt;This report, by Indian Federation of App-based Transport Workers (IFAT) and International Transport Workers’ Federation (ITF), New Delhi office, explores the responses to the outbreak of Covid-19 by digital platform based companies, trade unions, and governments to help out workers for digital platform based companies hereafter app based workers during the lockdown. The research work in this article is a characterization of the struggles of app based workers during the global pandemic and how it has affected and changed the world of work for them. The surveys were conducted amongst the workforce working for app based companies like Ola, Uber, Swiggy, Zomato etc. This study is partially supported by CIS as part of the Feminist Internet Research Network led by the Association for Progressive Communications.&lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;h4&gt;Report: &lt;a href="https://cis-india.org/raw/files/ifat-itf-locking-down-the-impact-of-covid-19-report/" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;Press Release: &lt;a href="https://cis-india.org/raw/files/ifat-itf-locking-down-the-impact-of-covid-19-press-release/" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;Press Release, 17 September, 2020&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;Between March and June 2020, IFAT and ITF conducted 4 surveys with transport and delivery workers to assess (i) their income levels during the Covid-19 pandemic, (ii) the burden of loan repayment during these months, (iii) the relief provided to them by companies, and (iv) the access to welfare schemes offered by state and central governments.&lt;/p&gt;
&lt;p&gt;The first survey, on income levels and loans administered in March 2020, had 5964 respondents, across 55 cities, in 16 states. The second and third surveys conducted in April 2020, on financial relief from companies and governments, had 1630 respondents, across 59 cities, in 16 states. The fourth survey was conducted in June 2020 to assess income levels as the economies were slowing opening up. Some of the most startling findings from the 4 surveys are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The average monthly EMI of the respondents in March 2020 was between Rs. 10,000 - 20,000. 51% of the respondents had taken vehicle loans from 19 national public sector banks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;30.3% of the respondents worked between 40-50 hours a week, in the week prior to the first national lockdown. Despite high hours of work, the average income of the drivers for the week commencing April 15, 2020 was less than Rs. 2500. 57% of respondents earned between 0 to Rs. 2250.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;89.8% of workers did not receive any ration or food assistance, and 84.5% did not receive any financial assistance from either companies or governments.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Where companies had announced financial assistance programmes, including through donations collected by customers, there was no transparency in disbursement of funds. Other reasons for exclusion included administrative red tape (such as the requirement to produce bills that are GST compliant), and absence of clear criteria for eligibility, leading to random disbursement, among others.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Ola announced waiving off the rental amount for leased vehicles, and asked drivers to return such vehicles. However, there was no announcement of a plan to repossess vehicles once there was an easing of the lockdown, causing great anxiety among workers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;After the easing of the national lockdown, 69.7% of respondents indicated that they had no earnings, while 20% earned between Rs.500 to 1500.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;2716 respondents from 19 states across gig platforms articulated their support for a peaceful demonstration against company practices.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Mandatory installation of Aarogya Setu by workers raised concerns of privacy, as this would allow companies to surveil workers and collect data on their movements after work hours.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;IFAT organised several meetings and protests after each survey, to bring attention to the vulnerable conditions of workers. At these gatherings, workers raised the following key demands:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Companies must reduce commission rates to 5%, to allow workers to get back on their feet, and compensate for losses over the past few months;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Adequate protective equipment and health insurance cover to all drivers must be provided;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;There must be increased transparency in disbursement process of funds, and in the criteria for selection of beneficiaries;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Compounded interest must be waived on EMIs for the 3 months of moratorium on loan repayment.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Hear our voices and address our demands.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;em&gt;Shaik Salauddin&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;National General Secretary, Indian Federation of App-based Transport Workers (IFAT)&lt;/p&gt;
&lt;p&gt;Phone: +91 96424 24799&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Indian Federation of App-based Transport Workers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Facebook: &lt;a href="https://www.facebook.com/watch/connectifat/" target="_blank"&gt;www.facebook.com/watch/connectifat/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Twitter: &lt;a href="https://www.twitter.com/connect_ifat" target="_blank"&gt;www.twitter.com/connect_ifat&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;YouTube: &lt;a href="https://www.youtube.com/channel/UCA1AxGq0Fb_A_O_Ey44eiPg" target="_blank"&gt;www.youtube.com/channel/UCA1AxGq0Fb_A_O_Ey44eiPg&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/raw/ifat-itf-locking-down-the-impact-of-covid-19'&gt;http://editors.cis-india.org/raw/ifat-itf-locking-down-the-impact-of-covid-19&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Indian Federation of App-based Transport Workers (IFAT) and International Transport Workers’ Federation (ITF), New Delhi office</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Labour</dc:subject>
    
    
        <dc:subject>Covid19</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Platform-Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2021-06-29T07:27:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
