<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/internet-governance/news/internet-governance-news/RSS">
  <title>News &amp; Media</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
       
       
  </description>
  
  
  
            <syn:updatePeriod>daily</syn:updatePeriod>
            <syn:updateFrequency>1</syn:updateFrequency>
            <syn:updateBase>2011-07-21T06:30:37Z</syn:updateBase>
        
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/panel-discussion-how-to-avoid-digital-id-systems-that-put-people-at-risk"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/biometric-update-june-26-2021-chris-burt-advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/times-of-india-june-4-2021-facebook-launches-india-tech-scholars-programme-for-law-students"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-news-minute-june-4-2021-sreedevi-jayarajan-no-such-rule-but-many-vaccination-centres-are-insisting-on-aadhaar-as-proof"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/deccan-herald-krupa-joseph-june-10-2021-new-rules-leave-social-media-users-vulnerable"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/deccan-herald-may-21-2021-krupa-joseph-women-on-covid-lists-get-lewd-calls-and-messages"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/deccan-herald-june-8-2021-krupa-joseph-insult-to-kannada-shows-google-ai-in-a-poor-light"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/dw-june-21-2021-aditya-sharma-twitter-india-troubles-show-tough-path-ahead-for-digital-platforms"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/ietf106"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/stakeholder-consultation-on-digital-assets-for-women2019s-economic-empowerment-un-women-sewa"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-times-of-india-december-12-2019-power-over-privacy"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/hindustan-times-december-11-2019-indias-record-on-internet-shutdown-gets-bleaker"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/huffignton-post-december-13-2019-rachna-khaira-outrage-as-privileged-iit-ians-use-tech-to-spy-on-sweepers"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/deccan-herald-november-6-2019-theres-sudeep-whatsapp-spy-attack-and-after"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/deccan-herald-december-1-2019-theres-sudeep-cyber-security-tips-for-small-businesses"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/panel-discussion-how-to-avoid-digital-id-systems-that-put-people-at-risk">
    <title>Panel discussion on 'How to Avoid Digital ID Systems That Put People at Risk: Lessons from Afghanistan' at Freedom Online Conference</title>
    <link>http://editors.cis-india.org/internet-governance/news/panel-discussion-how-to-avoid-digital-id-systems-that-put-people-at-risk</link>
    <description>
        &lt;b&gt;Amber Sinha participated as a panelist in a panel discussion on How to Avoid Digital ID Systems That Put People at Risk: Lessons from Afghanistan at the Freedom Online Conference yesterday.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Freedom Online Coalition (FOC) was established in 2011 in response to the growing recognition of the importance of the Internet for the enjoyment of human rights. Periodically, the FOC holds a multistakeholder Conference that aims to deepen the discussion on how online freedoms are helping to promote social, cultural and economic development. The ownership of the Conference program and outputs lies with the host country, most often the Chair of the Coalition during that year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aim of the panel was to use the lessons learned from the Afghanistan case to take a critical and realistic look at the implementation of digital identification programs around the world. A video of the panel can be &lt;a class="external-link" href="https://www.freedomonlineconference.com/session/how-to-avoid-digital-id-systems-that-put-people-at-risk-lessons-from-afghanistan"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/panel-discussion-how-to-avoid-digital-id-systems-that-put-people-at-risk'&gt;http://editors.cis-india.org/internet-governance/news/panel-discussion-how-to-avoid-digital-id-systems-that-put-people-at-risk&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-12-03T14:52:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/biometric-update-june-26-2021-chris-burt-advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions">
    <title>Advanced biometric technologies and new market entries tackle fraud, chase digital ID billions</title>
    <link>http://editors.cis-india.org/internet-governance/news/biometric-update-june-26-2021-chris-burt-advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions</link>
    <description>
        &lt;b&gt;Amid forecasts of rapid growth and huge market potential, digital ID platforms launches by Techsign and Ping Identity, new services, features and even an investment fund have been launched.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Chris Burt was &lt;a class="external-link" href="https://www.biometricupdate.com/202106/advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions"&gt;published by Biometric Update&lt;/a&gt; on June 26, 2021.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A new camera solution for under-display 3D face biometrics from Infineon and partners, and IPO filings by Clear and SenseTime show parallel investment activity in biometrics, meanwhile, and experts from Veridium and Intellicheck provide insight into the shifting technology and fraud landscapes, among the most widely-read stories this week on Biometric Update.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Top biometrics news of the week&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Several areas of the digital identity market continued to be very active, with a new investment fund launched to support startups in digital commerce and payments, Yoti joining a regulatory sandbox, Techsign launching a digital ID platform, and Mastercard and b.well reporting positive results from a recent pilot for their biometric healthcare platform. All this activity contributes to explaining Juniper Research’s &lt;a href="https://www.biometricupdate.com/202106/digital-identity-verification-market-forecast-to-reach-16-7b-by-2026"&gt;forecast of rapid growth&lt;/a&gt; in the sector to $16.7 billion in 2026, driven largely by spending on remote onboarding.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Okta CEO Todd McKinnon, meanwhile, told Barron’s that the total addressable market for identity and access management providers like Okta is something like &lt;a href="https://www.biometricupdate.com/202106/okta-ceo-says-total-addressable-identity-and-access-management-market-near-80b"&gt;$80 billion&lt;/a&gt;, as well as that effective integration is the key to solving biometrics challenges in the space. Entrust and Yubico formed an integration partnership, LoginRadius launched a new feature, Jamf launched a biometric tool for enterprises, and a certification program for IAM professionals was launched.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A list of goods for sale on the dark web includes a listing for &lt;a href="https://www.biometricupdate.com/202106/biometric-selfies-and-forged-passports-identities-for-sale-on-the-dark-web"&gt;selfies holding an American ID credential&lt;/a&gt;, which in theory could be used in a biometric spoofing attack. Cybersecurity researcher Luana Pascu helps guide readers through the report, and shares insights such as on the status of faked vaccination certificates on dark web marketplaces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ensuring the validity of the ID document a biometric identity verification process is based on, without adding too much friction, often means adopting &lt;a href="https://www.biometricupdate.com/202106/intellicheck-ceo-on-building-the-foundations-for-biometric-verification-and-fraud-protection"&gt;layered risk profiling&lt;/a&gt;, Intellicheck CEO Bryan Lewis tells &lt;em&gt;Biometric Update&lt;/em&gt; in a sponsored post. The company has deep roots in detecting fraudulent documents and has found that even scanning the barcode on an identity document will not necessarily catch a fake if the unique security elements are not validated as part of the scan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fourthline Anti-Financial Crime Head Ro Paddock writes in a Biometric Update guest post about the ever-increasing sophistication of fraud attacks, which reached the level of computer-generated &lt;a href="https://www.biometricupdate.com/202106/the-fraudsters-new-game-face"&gt;3D masks and deepfakes&lt;/a&gt; during the pandemic,. In response, information-sharing between organizations will be necessary to understand the scope of these new threats, and how to defend against them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Philippines’ election commission has launched an app to allow people to preregister for the &lt;a href="https://www.biometricupdate.com/202106/philippines-launches-app-to-fast-track-biometric-voter-registration"&gt;voter roll online&lt;/a&gt; before enrolling their biometrics in person, as the country continues digitizing its public services. Governments in Pakistan, Haiti and Nigeria are also making moves to improve the accessibility and trustworthiness of their electoral processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A partnership between Research ICT Africa and the Centre for Internet and Society, supported by the Omidyar Network, to explore the development of digital ID systems for the African context is explained in a &lt;a href="https://researchictafrica.net/2021/06/21/why-digital-id-matters/" target="_blank"&gt;blog post&lt;/a&gt;. The project will be based on an adaptation of the Evaluation Framework for Digital Identities which the CIS used to assess India’s Aadhaar system, with rule of law, rights and risk-based tests, and presented in a series of posts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Details of Clear’s IPO plans emerged, including its intention to raise up to &lt;a href="https://www.biometricupdate.com/202106/clear-ipo-could-raise-up-to-396m-in-hot-biometrics-investment-market"&gt;$396 million&lt;/a&gt; on the NYSE. The $2.2 billion valuation aligns with some comparable companies, by revenue multiple, but the lower voting power of the shares on offer could be a restraining factor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An even bigger IPO could be held by SenseTime later this year, with the Chinese AI firm looking to raise up to $2 billion &lt;a href="https://www.biometricupdate.com/202106/not-smarting-from-us-sanctions-sensetime-says-its-ipo-is-on-again"&gt;on the Hong Kong exchange&lt;/a&gt;. The company has been talking about a public stock launch since before the company was hit with restrictions to U.S. trade, which it indicates have had little impact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The latest major funding round in digital identity is the largest yet, with &lt;a href="https://www.biometricupdate.com/202106/transmit-security-raises-543m-to-grow-biometric-passwordless-authentication"&gt;Transmit Security raising $543 million&lt;/a&gt; at a $2.2 billion valuation to expand the market reach of its passwordless biometric authentication technology. The company claims it is the highest ever Series A funding round in cybersecurity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bob Eckel, Aware CEO and International Biometrics + Identity Association (IBIA) Director and Board Member, discusses why people should own their own identity, identifying things and protecting supply chains, and his background in setting up air traffic control systems used all over the world with the Requis &lt;a href="https://requis.com/podcasts/podcast-bob-eckel-biometrics-future-secured-identities/" target="_blank"&gt;Supply Chain Next podcast&lt;/a&gt;. In the longer term Eckel sees biometric replacing passwords, and in the shorter term being used to make processes touchless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Veridium CTO John Callahan guides Biometric Update through recent NIST guidance on the &lt;a href="https://www.biometricupdate.com/202106/nist-touchless-fingerprint-biometrics-guidance-confirms-interoperability"&gt;interoperable use of contactless fingerprints&lt;/a&gt; with contact-based back-end AFIS systems. The guidance, which changes definitions within the NIST ITL biometric container standard, but advises that the associated image quality metric does not apply to contactless prints, could spark further investment in the modality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A new time-of-flight 3D imaging solution that could be used to implement facial authentication from &lt;a href="https://www.biometricupdate.com/202106/under-display-camera-for-3d-face-biometrics-developed-by-infineon-pmd-arcsoft"&gt;under the display of mobile devices&lt;/a&gt; without notches or bezels has been developed by partners Infineon, pmdtechnologies and ArcSoft. Based on the REAL3 sensor and ArcSoft’s computer vision algorithms, the solution is expected to reach availability in Q3 2021.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://www.biometricupdate.com/202106/ping-identity-adds-behavioral-biometrics-and-bot-detection-with-securedtouch-acquisition"&gt;Ping Identity has acquired SecuredTouch&lt;/a&gt; in a deal with undisclosed financial details to integrate its behavioral biometrics-based continuous user authentication with the PingOne enterprise cloud platform. Ping also launched a consumer application for reusable credentials and added unified management features to its cloud platform at its Identiverse 2021 event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notre Dame-IBM Technology Ethics Lab Founding Director Elizabeth Renieris joins the MIT Sloan Management Review’s &lt;a href="https://sloanreview.mit.edu/audio/starting-now-on-technology-ethics-elizabeth-renieris/" target="_blank"&gt;Me, Myself and AI podcast&lt;/a&gt; to discuss the role of the lab, her path past and through some of the digital identity space’s key ethical developments, and the need to take the long view on technology to understand its ethical implications. Renieris makes a pitch for process-oriented regulations, based on the best understanding we have at the time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ProctorU’s announcement that it will no longer sell fully-automated remote proctoring services is seen as a win in the battle against “the AI shell game” by the &lt;a href="https://www.eff.org/deeplinks/2021/06/long-overdue-reckoning-online-proctoring-companies-may-finally-be-here" target="_blank"&gt;Electronic Frontier Foundation&lt;/a&gt;. The descriptions of the balance between the automated and human decision-making by AI proctoring providers amount to doublespeak, the EFF says, before panning their human review processes, accuracy rates, and use of facial recognition.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/biometric-update-june-26-2021-chris-burt-advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions'&gt;http://editors.cis-india.org/internet-governance/news/biometric-update-june-26-2021-chris-burt-advanced-biometric-technologies-and-new-market-entries-tackle-fraud-chase-digital-id-billions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Chris Burt</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>UIDAI</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2021-06-28T01:13:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/times-of-india-june-4-2021-facebook-launches-india-tech-scholars-programme-for-law-students">
    <title>Facebook launches India tech scholars programme for law students</title>
    <link>http://editors.cis-india.org/internet-governance/news/times-of-india-june-4-2021-facebook-launches-india-tech-scholars-programme-for-law-students</link>
    <description>
        &lt;b&gt;Facebook India on Friday announced a new initiative - the Facebook India Tech Scholars (FITS) programme - for law students in the country.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="https://timesofindia.indiatimes.com/home/education/news/facebook-launches-india-tech-scholars-programme-for-law-students/articleshow/83235723.cms"&gt;published in the Times of India&lt;/a&gt; on June 4, 2021.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The novel programme aims to provide students from select leading law schools in the country a platform for research and mentorship on topics related to technology law and policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first edition, the FITS programme 2021-2022, will offer eight law students an opportunity to work on a research project with leading Indian thinktanks who will also extend mentorship support to the students. It will be open to 4th and 5th year students from the National Law School of India University, Bengaluru, the WB National University of Juridical Sciences, Kolkata, the National Law University, Delhi, and the National Law University, Jodhpur.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"With rapid advancements in technology and the evolution of technology law and policy in India, the programme is designed to encourage students to develop an independent voice on pressing topics that will have a bearing on future policy discussions in this area," the social networking giant said in a statement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We hope to expand the FITS programme to more students in coming years," it added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The FITS programme 2021-2022 will see the Centre for Internet and Society, the Observer Research Foundation, the Carnegie Endowment for International Peace India, and the Software Freedom Law Center participating as mentoring institutions. Facebook is also guided by an experienced and expert Advisory Committee for the duration of the programme. Shardul Amarchand Mangaldas &amp;amp; Co. will be a knowledge partner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Applications will close on June 20. The FITS programme will run for a period of nine months, commencing in Summer 2021.&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/times-of-india-june-4-2021-facebook-launches-india-tech-scholars-programme-for-law-students'&gt;http://editors.cis-india.org/internet-governance/news/times-of-india-june-4-2021-facebook-launches-india-tech-scholars-programme-for-law-students&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Technological Protection Measures</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-06-26T04:55:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-news-minute-june-4-2021-sreedevi-jayarajan-no-such-rule-but-many-vaccination-centres-are-insisting-on-aadhaar-as-proof">
    <title>No such rule, but many vaccination centres are insisting on Aadhaar as proof</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-news-minute-june-4-2021-sreedevi-jayarajan-no-such-rule-but-many-vaccination-centres-are-insisting-on-aadhaar-as-proof</link>
    <description>
        &lt;b&gt;Radhika Radhakrishnan saw three words swimming before her as she inched closer to the hospital lobby. &lt;/b&gt;
        &lt;p&gt;The blog post by Sreedevi Jayarajan was &lt;a class="external-link" href="https://www.thenewsminute.com/article/no-such-rule-many-vaccination-centres-are-insisting-aadhaar-proof-covid150080"&gt;published in the News Minute&lt;/a&gt; on June 4, 2021. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The words were written on a white board inside the private hospital she had visited in Bengaluru on May 21, three weeks after the Union Government opened up COVID-19 vaccinations for the 18+ category after online registration. “I had booked a vaccine slot and visited the hospital and the words on the board read ‘Aadhaar is mandatory’, along with other dos and don’ts of the vaccination process that the hospital followed,” she tells TNM. On the morning of her vaccination date, Radhika had registered on the Union Health Ministry’s CoWin portal for a vaccine slot in the 18+ age group. She had given her PAN number when the portal asked for a government ID proof. The appointment slip on CoWin also showed her PAN, she says.&lt;/p&gt;
&lt;p class="_yeti_done" style="text-align: justify; "&gt;But on the day of vaccination, authorities at the private hospital refused to accept her PAN card. Radhika says that they insisted on her Aadhaar number in order to authenticate her vaccination appointment, despite her telling them that it is illegal to demand her Aadhar card. “The hospital authorities told me that they only used Aadhaar cards to register people for vaccination or authenticate CoWin appointments. They said that if I did not want to give my Aadhaar number, I would have to wait a few more hours for them to figure out a different process,” she tells TNM. By this time, Radhika had already waited three hours in the hospital queue.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Bengaluru-based journalist Biswak* too recounts a similar experience at a government run vaccination centre he had visited on May 5. The 25-year-old had registered on CoWin using his Driving License, one of five government ID proofs that the Health Ministry portal accepts for booking vaccination slots. But at the centre, Biswak says that the officials insisted on his Aadhaar number. “Thankfully I had the number despite not carrying my card. I got vaccinated and the vaccination certificate issued on my CoWin account showed the last four digits of my Aadhaar, and did not mention my driving license which was my ID proof of choice,” he says.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;TNM got in touch with several people from Tamil Nadu and Karnataka among other states who confirmed that their vaccination centres refused to accept any other ID proof, and insisted on Aadhaar. This despite the Union government not making Aadhaar mandatory for CoWin registration, for on-the-spot registrations, and even for authentication of appointments at vaccination centres.&lt;/p&gt;
&lt;h3 id="_mcePaste"&gt;Co-Win does not insist on Aadhaar&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A quick look at the CoWin portal will tell you that you can register with any of six government ID proofs other than your Aadhaar card. These are Driving License, PAN card, Passport, Pension Passbook, NPR Smart Card and Voter ID (EPIC). To the vaccine centres, registered citizens should carry the very same ID proof they have used to register on the Co-Win portal, along with a printout or screenshot of their appointment slip. This means, if a person has registered on the portal using an Aadhaar card, the vaccination centre will ask for the same for authentication.&lt;/p&gt;
&lt;p dir="ltr"&gt;Once vaccinated, citizens get a certificate with their vaccination status (one dose or fully vaccinated) on their phones. This certificate contains the person’s name, age, type of vaccine (Covishield or Covaxin) and the last four digits of the ID proof used for registration.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;While Radhika and Biswak say that their appointment slips had their PAN and Driving License numbers respectively, after they were coerced to give their Aadhaar numbers, the vaccination certificate on the Co-Win portal showed their Aadhaar number. “This means that they have forced me to give my Aadhaar number and then used this, despite me giving a different ID proof,” Radhika says. Multiple private hospitals in Chennai too currently insist on Aadhaar card for vaccinations, while Tamil Nadu government maintains that Aadhaar is not mandatory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TNM spoke to a senior official in the Revenue and Finance Department of the Greater Chennai Corporation who confirmed that centres, both private and government, did not have the right to demand Aadhaar for vaccination. “There is no such rule that Aadhaar has to be submitted by citizens. In fact, the Co-Win portal also has a section to register those who have no ID proof, i.e homeless persons or those from marginalised sections. The portal finds another way to register these people. So insisting on an Aadhaar number is out of the question,” he says. In the neighbouring state of Kerala, the government recently announced that persons who had to travel abroad for various reasons should register on the government portal only using their passports. This, so that their vaccination certificate would generate their passport number as ID proof.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A matter of convenience?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the absence of a law which mandates Aadhaar to be used for the purpose of universal COVID-19 vaccination, there is no legal basis for hospitals and vaccination centres to insist on Aadhaar numbers to vaccinate people. “Unlike a law passed by the Union government which makes it compulsory for your PAN to be linked to your Aadhaar, there is no law which the government has passed to make Aadhaar compulsory for vaccination. The Union government does, however, have the legislative competence to pass such a law. Which means that if they want to make Aadhaar mandatory for vaccination, they can. So far they have not. And therefore, nobody has the right to demand Aadhaar to vaccinate people,” says Pranesh Prakash of the Centre for Internet and Society.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;However, it could be a matter of convenience for hospitals to use one type of ID proof, to be able to streamline their data entry process. “As (I believe) Aadhaar is the most widespread ID card in the country right now, when compared to other ID proofs, it makes it simple for vaccination centres to ask for Aadhaar numbers and key this in," Pranesh adds.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;To a query that TNM posted on Twitter, we got varied responses from people. While many said that the centres did not insist on a particular ID card, many others said they had to give their Aadhaar. The insistence for Aadhaar by vaccination centres, both private and government, seems to be random, with no proper pattern or rule in place.&lt;/p&gt;
&lt;h3&gt;System does not support other ID proofs?&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;From Radhika’s experience, the hospital she visited for vaccination could not support any other ID proof, as they, in their own words “followed a system of using just Aadhaar cards”. This indirectly coerces unwilling citizens to part with their Aadhaar details, and offers no choice for those who registered with other ID proofs.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“I had to finally give my Aadhaar number but it said that there was a mismatch. Later we found out that my name on my PAN was a bit different from the name on my Aadhaar card. Since I had used the PAN to register on Co-Win, the portal could not authenticate me with the Aadhaar number. Finally I had to re-register on the spot and give a different phone number as the phone number I had given was already linked to my Aadhaar and PAN,” she says, adding that all of this could have been avoided if the hospital had accepted her PAN in the first place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, a private hospital that has been doing vaccinations in many places across India told TNM that they had no instructions from the state or Union government to use only Aadhaar and claimed that they only asked for Aadhaar if the person had used it during registration. However, many people who responded to TNM named this private hospital and many others too as those insisting on Aadhaar as proof.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-news-minute-june-4-2021-sreedevi-jayarajan-no-such-rule-but-many-vaccination-centres-are-insisting-on-aadhaar-as-proof'&gt;http://editors.cis-india.org/internet-governance/news/the-news-minute-june-4-2021-sreedevi-jayarajan-no-such-rule-but-many-vaccination-centres-are-insisting-on-aadhaar-as-proof&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sreedevi Jayarajan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-06-26T04:43:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/deccan-herald-krupa-joseph-june-10-2021-new-rules-leave-social-media-users-vulnerable">
    <title>New rules leave social media users vulnerable: Experts</title>
    <link>http://editors.cis-india.org/internet-governance/news/deccan-herald-krupa-joseph-june-10-2021-new-rules-leave-social-media-users-vulnerable</link>
    <description>
        &lt;b&gt;They analyse the implications of the government vs Twitter controversy on individual privacy&lt;/b&gt;
        &lt;p&gt;The article by Krupa Joseph was &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-your-bond-with-bengaluru/new-rules-leave-social-media-users-vulnerable-experts-993460.html"&gt;published in the Deccan Herald&lt;/a&gt; on 10 June 2021. Torsha Sarkar has been quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government had notified the changes on February 25, and allowed social media companies three months to comply. Twitter and WhatsApp had then separately approached the Delhi High Court against the new regulations, fearing they could compromise user privacy.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;On Monday, the court gave Twitter three weeks to file a response to the government’s charge that it had not appointed a grievance officer as claimed.&lt;/p&gt;
&lt;p class="Default"&gt;&lt;strong&gt;Vague rules&lt;/strong&gt;&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Karthik Srinivasan, communications consultant, who uses his blog Beast of Traal to comment on social media, says the new rules are “vague and open-ended”.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;“Coupled with the fact that we still do not have a data protection law, the rules could be severely misused both by government and private entities,” he says.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Users are particularly vulnerable in a country where anything and everything offends a lot of people, he says.&lt;/p&gt;
&lt;p class="Default"&gt;&lt;strong&gt;Law overreach&lt;/strong&gt;&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Torsha Sarkar, researcher with the Centre for Internet and Society, says the rules introduce additional obligations for social media platforms and classify intermediaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Intermediaries with over five million users would have obligations to introduce traceability, instal automated filtering, provide detailed grievance redressal mechanisms, and publish compliance &lt;span&gt; reports detailing action taken on takedown orders,” she says.&lt;/span&gt;&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;While some of these obligations are similar to those laid down internationally, some alterations are causing concern. The traceability requirement, for example, is highly contentious as it would erode user privacy.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;“It is also concerning that the user threshold, for a country like India, with such vast Internet usage, is set at a very low level. This means that even smaller social media platforms might becompelled to carry out economically crippling obligations,” she explains.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;The legislative overreach is seen in how the initial draft , which only covered entities like Twitter and Facebook, now seeks to cover digital news media and content curators like Netfl ixand Hulu, she says.&lt;/p&gt;
&lt;p class="Default"&gt;Stretching the scope of the legislation this way is undemocratic since it was not subject to any public consultation, she notes.&lt;/p&gt;
&lt;p class="Default"&gt;&lt;b&gt;Case in High Court&lt;/b&gt;&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Mishi Choudhary, technology lawyer and founder of SFLC.in, a legal services organisation specialising in law, technology and policy, says the IT rules notified by the government are unconstitutional. “In the garb of addressing misinformation and regulating technology companies, the government has been exceeding the powers granted through subordinate legislation and using it for political purposes,” she says. It is on these grounds that the Free and Open Source Software community has challenged the new rules in the Kerala High Court. “Technology companies need regulation but not at the expense of user rights,” she says.&lt;/p&gt;
&lt;p class="Default"&gt;&lt;b&gt;Congress &lt;/b&gt;&lt;span&gt;‘&lt;/span&gt;&lt;b&gt;toolkit&lt;/b&gt;&lt;span&gt;’ &lt;/span&gt;&lt;b&gt;row&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few weeks after social media platforms were asked to take down posts critical of thegovernment’s management of India’s Covid-19 crisis, Twitter once again found itself at thereceiving end. Last week, Twitter labelled a tweet by BJP leader Sambit Patra, accusing theCongress of working with a ‘toolkit, as ‘manipulated media’. Twitter says it gives the label totweets that include media (videos, audio, and images) that are “deceptively altered orfabricated”. The Delhi police then sent a notice to Twitter in connection and asked the micro-blogging site to explain the reasons for assigning the tag. The police also conducted raids onTwitter offices in India. Things escalated when Twitter said the government was intimidating it. The government hit back saying law-making was its privileges, and Twitter, being a social media platform, should not dictate legal policy framework.&lt;/p&gt;
&lt;p class="Default"&gt;&lt;b&gt;New rules&lt;/b&gt;&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Under the new IT rules, social media companies like Facebook, WhatsApp and Twitter will be responsible for identifying the originator of a flagged message within 36 hours. They also have to appoint a chief compliance officer, a nodal contact person and a resident grievance officer. Failing to comply with these rules would cause the platforms to lose their status as intermediaries, and make them liable for whatever is posted on their platforms.&lt;/p&gt;
&lt;p class="Default"&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/deccan-herald-krupa-joseph-june-10-2021-new-rules-leave-social-media-users-vulnerable'&gt;http://editors.cis-india.org/internet-governance/news/deccan-herald-krupa-joseph-june-10-2021-new-rules-leave-social-media-users-vulnerable&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Krupa Joseph</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-06-14T11:27:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/deccan-herald-may-21-2021-krupa-joseph-women-on-covid-lists-get-lewd-calls-and-messages">
    <title>Women on Covid lists get lewd calls and messages</title>
    <link>http://editors.cis-india.org/internet-governance/news/deccan-herald-may-21-2021-krupa-joseph-women-on-covid-lists-get-lewd-calls-and-messages</link>
    <description>
        &lt;b&gt;Perverts are eating into precious time in the middle of a pandemic and adding to the overall anxiety.&lt;/b&gt;
        &lt;p&gt;&lt;span&gt;Women are getting lewd calls and messages when they share their phone numbers to seek and offer pandemic-related help.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On April 15, Shasvathi Siva tweeted about how her number, shared on blood donation and social media groups, received obscene photos and video calls from strangers.&lt;/p&gt;
&lt;p&gt;When she spoke about the harassment on Instagram, she ended up receiving more abuse from men.&lt;/p&gt;
&lt;p&gt;With the second wave of the pandemic raging, many patients and families are turning to social media to search for medicines, oxygen, and even hospital beds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ambika Tandon, senior researcher, Centre for Internet and Society, says, “There are many stories of how prominent and outspoken women like journalists and activists have received hate speech and messages threatening violence.” What is shocking, she says, is not the harassment, but that it is not stopping even during a medical emergency.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-your-bond-with-bengaluru/women-on-covid-lists-get-lewd-calls-and-messages-988523.html"&gt; Click to read&lt;/a&gt; the complete coverage in Deccan Herald on May 21, 2022.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/deccan-herald-may-21-2021-krupa-joseph-women-on-covid-lists-get-lewd-calls-and-messages'&gt;http://editors.cis-india.org/internet-governance/news/deccan-herald-may-21-2021-krupa-joseph-women-on-covid-lists-get-lewd-calls-and-messages&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-05-24T06:35:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/deccan-herald-june-8-2021-krupa-joseph-insult-to-kannada-shows-google-ai-in-a-poor-light">
    <title>Insult to Kannada shows Google AI in a poor light</title>
    <link>http://editors.cis-india.org/internet-governance/news/deccan-herald-june-8-2021-krupa-joseph-insult-to-kannada-shows-google-ai-in-a-poor-light</link>
    <description>
        &lt;b&gt;A Google search for ‘the ugliest language in India’ yielded ‘Kannada’ as the answer late last week, causing widespread outrage.
&lt;/b&gt;
        &lt;p&gt;The article by Krupa Joseph was &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-your-bond-with-bengaluru/insult-to-kannada-shows-google-ai-in-a-poor-light-995307.html"&gt;published in Deccan Herald&lt;/a&gt; on June 8, 2021. Pranesh Prakash and Shweta Mohandas have been quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Google has since apologised, saying the answer does not reflect its views, but questions still remain about why this happened at all, and who drafted the answer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“When artificial intelligence gets it wrong, things can go really wrong, says tech entrepreneur,”Hari Prasad Nadig, who has worked on Kannada in free and open source soft ware.“Usually, you would expect Google to give an answer based on citings from multiple sources,and at least one or two credible sources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google’s AI should be good enough not to draw answers from opinionated sources,” he says. Google shouldn’t even try to answer prejudiced questions like this in the first place, and the answer shows how flawed it is, he told Metrolife.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Usually, you would expect Google to give an answer based on citings from multiple sources, and at least one or two credible sources. Google’s AI should be good enough not to draw answers from opinionated sources,” he says. Google shouldn’t even try to answer prejudiced questions like this in the first place, and the answer shows how flawed it is, he told Metrolife.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Fallible process&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Centre for Internet and Society, Bengaluru, says the incident exposes the fallibility of the process by which Google selects its “featured snippets”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is not an opinion that Google or its employees or its algorithms have come up with, but rather an existing opinion that Google wrongly amplified,” he says.It demonstrates that the snippets that Google features as ‘facts’ aren’t necessarily based on facts, he says.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Periodic checks&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shweta Mohandas, researcher with the Center for Internet and Society, says Google does not create content, but only provides content that is available on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Hence, the biases come from the tags, then used to train the AI. There should be periodic checks on the data fed into the system,” she says. Such blunders can be prevented if the tags and results are audited periodically, and a mechanism is put in place to enable people to report them, she says.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Who was upto mischief?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The answer was created on a financial services website whose owners aren’t revealing their names Pavanaja UB, CEO, Vishva Kannada Softech, says the answer was attributed to a website called debt consolidations questions.com — but he was unable to find this post anywhere on the site.“This is a website registered in Russia and it offers questions and answers on many topics. But this particular page could not be found. Maybe it was removed following the outrage,” he says. Pavanaja believes this was a deliberate attempt to upset people. “The website lists no information about the owner and gives no contact details. Even if such a question did exist on the page before, how did it get to the top of the Google search results?” he wonders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He suggests that someone planted the answer and kept searching for it until it reached the top.“But who would take so much effort?” he says.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Furore and after&lt;/h3&gt;
&lt;p&gt;‘Kannada’ came up as an answer to a query in Google about ‘the ugliest language in India’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aravind Limbavali, minister for Kannada and Culture, demanded an apology from Google, and threatened legal action against the company “for maligning the image of our beautiful language.”&lt;/p&gt;
&lt;p&gt;Google removed the answer and issued a statement:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We know this is not ideal, but we take swift corrective action when we are made aware of an issue and are continually working to improve our algorithms. Naturally, these are not reflective of the opinions of Google, and we apologise for the misunderstanding and hurting any sentiments."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/deccan-herald-june-8-2021-krupa-joseph-insult-to-kannada-shows-google-ai-in-a-poor-light'&gt;http://editors.cis-india.org/internet-governance/news/deccan-herald-june-8-2021-krupa-joseph-insult-to-kannada-shows-google-ai-in-a-poor-light&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Krupa Joseph</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2021-06-26T05:25:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/dw-june-21-2021-aditya-sharma-twitter-india-troubles-show-tough-path-ahead-for-digital-platforms">
    <title>Twitter's India troubles show tough path ahead for digital platforms</title>
    <link>http://editors.cis-india.org/internet-governance/news/dw-june-21-2021-aditya-sharma-twitter-india-troubles-show-tough-path-ahead-for-digital-platforms</link>
    <description>
        &lt;b&gt;Twitter is in a standoff with Indian authorities over the government's new digital rules. Critics see the rules as an attempt to curb free speech, while others say more action is needed to hold tech giants accountable.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog by Aditya Sharma &lt;a class="external-link" href="https://www.dw.com/en/twitters-india-troubles-show-tough-path-ahead-for-digital-platforms/a-57980916"&gt;was published by DW&lt;/a&gt; on 21 June 2021. Torsha Sarkar was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="http://editors.cis-india.org/home-images/Intermediary.jpg/@@images/08eb8de3-4fd6-408f-94d2-3f202da0e730.jpeg" alt="Intermediary" class="image-right" title="Intermediary" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter holds a relatively low share of India's social media market. But, since 2017, the huge nation has emerged as Twitter's fastest-growing market, becoming critical to its global expansion plans.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In February, the Indian government &lt;a href="https://www.dw.com/en/india-targets-twitter-whatsapp-with-new-regulatory-rules/a-56708566"&gt;introduced new guidelines&lt;/a&gt; to regulate digital content on rapidly growing social media platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The so-called Intermediary Guidelines are aimed at regulating content on internet platforms such as Twitter and Facebook, making them more accountable to legal requests for the removal of posts and sharing information about the originators of messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Employees at these companies can be held criminally liable for not complying with the government's requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Large social media firms must also set up mechanisms to address grievances and appoint executives to liaise with law enforcement under the new rules, as well as appoint an India-based compliance officer who would be held criminally liable for the content on their platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government says the rules empower "users who become victims of defamation, morphed images, sexual abuse," among other online crimes. It also said that the rules seek to tackle the problem of disinformation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But critics fear that the rules could be used to target government opponents and make sure dissidents don't use the platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media companies were expected to comply with the new rules by May 25.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some Indian media reports have recently said that Twitter lost its status as an "intermediary" and the legal protection that came with it, due to its failure to comply with the new rules.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Failure to comply and serious implications&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Apar Gupta, the executive director of the Internet Freedom Foundation, a New Delhi-based digital rights advocacy group, says failure to comply with the rules could threaten Twitter's India operations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Not complying with the rules would pose a real risk to Twitter's operational environment," he told DW.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It will need to go to court to defend itself each time criminal prosecutions are launched against it," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first case against Twitter was filed last week, where it was charged with failing to stop the spread of a video on its platform that allegedly incited "hate and enmity" between two religious groups.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;'Heavy censorship'&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gupta says adhering to all the government's demands would substantially change Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Absolute compliance would mean heavy censorship of individual tweets, removal of the manipulated media tags, and blocking/suspension of accounts at the government's behest," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Torsha Sarkar, policy officer at the Bengaluru-based Centre for Internet and Society, fears that Twitter might at times be compelled to overcomply with government demands, threatening user rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This can be either by over-complying with flawed information requests, thereby selling out its users, or taking down content that offends the majoritarian sensibilities," she told DW.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, three special rapporteurs appointed by a top UN human rights body expressed "serious concerns" that certain parts of the guidelines "may result in the limiting or infringement of a wide range of human rights."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They urged New Delhi to review the rules, adding that they did not conform to India's international human rights obligations and could threaten the digital rights of Indians.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Twitter's balancing act&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is not the first time that Twitter has been accused of giving in to government pressure to censor content on its platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the height of the long-running farmer protests, &lt;a href="https://www.dw.com/en/farmer-protests-india-blocks-prominent-twitter-accounts-detains-journalists/a-56411354"&gt;Twitter blocked hundreds of tweets&lt;/a&gt; and accounts, including the handle of a prominent news magazine. It subsequently unblocked them following public outrage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US company stopped short of complying with demands to block the accounts of activists, politicians and journalists, arguing that such a move would "violate their fundamental right to free expression under Indian law."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to local media reports, Twitter's Indian executives were reportedly threatened with fines and imprisonment if the accounts were not taken down.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Special police notify Twitter offices&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Last month, the labeling of a tweet by a politician from the ruling BJP as "manipulated media" prompted a special unit of the &lt;a href="https://www.dw.com/en/india-police-visit-twitter-offices-over-manipulated-tweet/a-57650193"&gt;Delhi police to visit Twitter's offices&lt;/a&gt; in the capital and neighboring Gurgaon. Police notified the offices about an investigation into the labeling of the post.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter India's managing director, Manish Maheswari, was said to have been asked to appear before the police for questioning, according to media reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some Twitter employees have refused to talk about the ongoing tensions for fear of government reprisals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Such kind of intimidation does not happen every day. (But) Everyone at Twitter India is terrified," people familiar with the matter told DW on the condition of anonymity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Big Tech VS sovereign power?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Those calling for better regulation of tech giants say transnational &lt;a href="https://www.dw.com/en/india-social-media-conflict/a-57702394"&gt;social media companies like Twitter lack accountability&lt;/a&gt;, blaming them for the alleged inaction against online abuse and disinformation campaigns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The problem with these rules is that they centralize greater power toward the government without providing for the objective benefit of rights toward users," Gupta said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"If Twitter were to comply with these rules, it would make a bad situation worse," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter is unlikely to ditch a major market such as India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sarkar from the Centre for Internet and Society said "It might be difficult to say how the powers of big tech are going to collide with sovereign nations, especially in light of flawed legal interventions around the world."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/dw-june-21-2021-aditya-sharma-twitter-india-troubles-show-tough-path-ahead-for-digital-platforms'&gt;http://editors.cis-india.org/internet-governance/news/dw-june-21-2021-aditya-sharma-twitter-india-troubles-show-tough-path-ahead-for-digital-platforms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aditya Sharma</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2021-06-26T02:54:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/ietf106">
    <title>IETF106</title>
    <link>http://editors.cis-india.org/internet-governance/news/ietf106</link>
    <description>
        &lt;b&gt;Gurshabad Grover participated at IETF106, which was held in Singapore 16-22 November, 2019.&lt;/b&gt;
        &lt;p class="moz-quote-pre"&gt;In the meeting of the Human Rights Protocol Considerations (hrpc) research group, I presented an update to draft-irtf-hrpc-guidelines-03 (Guidelines for Human Rights Protocol and Architecture Considerations), which is an Internet Draft adopted by the hrpc rg that he is co-editing with Niels ten Oever. &lt;a class="external-link" href="https://datatracker.ietf.org/doc/draft-irtf-hrpc-guidelines/"&gt;More info here&lt;/a&gt;.&lt;/p&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;Among other working/research group meetings, I participated theTransport Layer Security (tls) and the Privacy Enhancements and Assessments research group (pearg) sessions. I also participated inseveral side meetings, including the Public Interest Technology Group(pitg) meeting.&lt;/p&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;Agenda for the IETF and the different WGs/RG can be found on the &lt;a class="external-link" href="https://datatracker.ietf.org/meeting/106/agenda"&gt;IETF website&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/ietf106'&gt;http://editors.cis-india.org/internet-governance/news/ietf106&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-12-15T06:14:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/stakeholder-consultation-on-digital-assets-for-women2019s-economic-empowerment-un-women-sewa">
    <title>Stakeholder Consultation on Digital Assets for Women’s Economic Empowerment | UN Women + SEWA</title>
    <link>http://editors.cis-india.org/internet-governance/news/stakeholder-consultation-on-digital-assets-for-women2019s-economic-empowerment-un-women-sewa</link>
    <description>
        &lt;b&gt;On December 06, 2019, Ambika Tandon and Aayush Rathi participated in a "Stakeholder Consultation on Digital Assets for Women’s Economic Empowerment: Addressing Barriers and Enhancing Opportunities for Women in Informal Economy and in Agriculture".&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Aayush and Ambika participated upon the invite of UN Women  and Self Employed Women's Association (SEWA), who were the organisers of  the consultation. The consultation was from 9:30 am to 4:30 pm on 6th  December, 2019 at the Claridges Hotel, New Delhi.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Former UN Secretary-General Mr. Ban Ki Moon established the UN  High-Level Panel on Women’s Economic Empowerment (UNHLP-WEE) to make  action oriented recommendations on how to improve economic outcomes for  women in the context of the Sustainable Development Agenda 2030.The  panel submitted its final report to the UN Secretary General in 2017,  identifying seven drivers for women’s economic empowerment and laying  out concrete actions for accelerating progress towards women’s full and  equal economic participation. &lt;br /&gt; &lt;br /&gt;In February 2019, SEWA Bharat and UN Women had organized a National  consultation on “Taking Action Towards Transformative Change for Women  in the Informal Sector in India” in India with civil society  organizations, researchers, philanthropists and international  organizations to prioritize action on the drivers for women’s economic  empowerment in the context of India. Four drivers, amongst seven, were  prioritized through the consultative process. Driver 4 on Building  Assets – Digital, Financial and Property is one of the critical drivers  for Women’s Economic Empowerment in India and has been prioritized for  the first stakeholder consultation in the roadmap development process to  contextualize the recommendation of HLP in the Indian context. &lt;br /&gt; &lt;br /&gt;The primary objectives, then, of this consultation were as follows:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;To provide a platform for sharing of experiences in research,  programming and policy to ensure digital assets for women in the  informal economy and in agriculture;&lt;/li&gt;
&lt;li&gt;To identify proven and promising practices in this regard; &lt;/li&gt;
&lt;li&gt;To develop an action agenda including identification of areas for  research, programming and policy to reduce the gender digital divide. &lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;br /&gt;&lt;strong class="moz-txt-star"&gt;*Detailed agenda*&lt;/strong&gt;&lt;/p&gt;
&lt;div style="text-align: left;"&gt;Download the detailed agenda &lt;a class="external-link" href="https://cis-india.org/raw/concept-note-and-agenda-for-stakeholder-consultation/"&gt;here&lt;/a&gt;.&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;"&gt; &lt;br /&gt;&lt;strong class="moz-txt-star"&gt;*Participation*&lt;/strong&gt; &lt;br /&gt; &lt;br /&gt;At the consultation, Aayush contributed to the breakout group on DBT while  Ambika contributed to the one on employment. The consultation led to  rich discussions as on-ground experiences and learning from  implementation programs were shared widely to devise a roadmap and  policy recommendations.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/stakeholder-consultation-on-digital-assets-for-women2019s-economic-empowerment-un-women-sewa'&gt;http://editors.cis-india.org/internet-governance/news/stakeholder-consultation-on-digital-assets-for-women2019s-economic-empowerment-un-women-sewa&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-04-07T13:14:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-times-of-india-december-12-2019-power-over-privacy">
    <title>Power over privacy: New Personal Data Protection Bill fails to really protect the citizen’s right to privacy</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-times-of-india-december-12-2019-power-over-privacy</link>
    <description>
        &lt;b&gt;Nikhil Pahwa throws light on the new personal data protection bill.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nikhil Pahwa was &lt;a class="external-link" href="https://timesofindia.indiatimes.com/blogs/toi-edit-page/power-over-privacy-new-personal-data-protection-bill-fails-to-really-protect-the-citizens-right-to-privacy/"&gt;published in the Times of India&lt;/a&gt; on December 12, 2019. CIS report was mentioned.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, in April, &lt;a href="https://blog.trendmicro.com/trendlabs-security-intelligence/55m-registered-voters-risk-philippine-commission-elections-hacked/" rel="noopener noreferrer" target="_blank"&gt;a data breach&lt;/a&gt; in the Election Commission of Philippines led to the leakage of personal information of over 55 million eligible voters on a searchable website: including names, addresses and date of birth. This was not the first data breach from the Election Commission. After the first, which took place in March 2016, where  340 GB of voter data was &lt;a href="http://www.rappler.com/newsbreak/in-depth/127870-comelec-leak-identity-theft-scams-experts" rel="noopener noreferrer" target="_blank"&gt;published online by a group of hackers called LulzSec Pilipinas&lt;/a&gt;, the National Privacy Commission of Philippines found that the Election Commission had violated the Data Privacy Act of 2012, and &lt;a href="https://www.privacy.gov.ph/2017/01/privacy-commission-finds-bautista-criminally-liable-for-comeleak-data-breach/" rel="noopener noreferrer" target="_blank"&gt;recommended criminal prosecution of its chairman&lt;/a&gt;, finding him liable when the agency failed to dispense its duty as a “personal information controller”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s 2019, and that recommendation has still not been acted upon, because the National Privacy Commission of Philippines only has recommendatory powers for criminal prosecution. Meanwhile, data breaches continue at the Election Commission of Philippines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Between 2017 and 2018, Aadhaar related personally identifiable data of several Indian citizens, including names, addresses, bank account numbers, in some cases pregnancy information and even religion and caste information of individuals, was published online by Indian government departments. The Centre for Internet and Society, in a report, estimated that &lt;a href="https://www.medianama.com/2017/05/223-aadhaar-numbers-data-leak/" rel="noopener noreferrer" target="_blank"&gt;personally identifiable data for 130-135 million Indian citizens had been leaked&lt;/a&gt;, thus putting them at risk. 210 government websites had made Aadhaar related data public, &lt;a href="https://www.thehindu.com/news/national/210-govt-websites-made-aadhaar-details-public-uidai/article20555266.ece" rel="noopener noreferrer" target="_blank"&gt;UIDAI confirmed in response to an RTI in 2017&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No one was held liable. There was no data protection law, no data protection authority, no criminal prosecution was recommended. Around that time, the Indian government was instead arguing in the Supreme Court that privacy isn’t a fundamental right under the Indian Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What we can learn from these two instances is that for the enforcement of a citizen’s right to privacy, and ensuring that no one takes the protection of data lightly, there needs to be a strong privacy law that holds even the government responsible, and above all, a strong data protection authority that is independent and has powers to penalise even government officials. On some of these counts, the Personal Data Protection Bill, 2019, disappoints.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, members of the Data Protection Authority will no longer be appointed by independent entities from diverse backgrounds: where they were previously going to be appointed by a committee comprising the Chief Justice of India or a Supreme Court judge, the Cabinet secretary, and an independent expert, the power to appoint members to DPA now rests solely with government officials, including the appointment of adjudicating officers. In addition, the central government, in the interest of “national security, sovereignty, international relations and public order, can issue directions to DPA, which DPA will be bound by. Powers of DPA have also been reduced: while in the previous version of the bill, DPA had the sole power to categorise data as sensitive personal data, in the current version, the power rests with the central government, albeit in consultation with DPA. The central government will also notify any social media company as a significant data fiduciary, and not DPA. Only the central government can determine what critical personal data is, and not DPA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This dependence on the government for appointments, functions and definitions, will invariably impact the independence of DPA, and even though the 2019 version of the bill gives it the authority to fine the state a maximum of Rs 5-15 crore, depending on the offence, i’d be surprised if this ever happens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bill does create significant exceptions for the state to acquire and process data, and an opportunity to create a base for surveillance reform in the country has been lost. The previous version of the bill had brought some sense of safety against mass surveillance, when it included the condition that processing of data by the government must be “necessary and proportionate”, drawing from Supreme Court’s historic right to privacy judgment. This is particularly important given that the bill also gives power to the government to exempt any agency from the provisions of the bill for processing of personal data, which includes acquiring data from any public or private entity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Effectively, this means that government agencies may be exempt from any scrutiny by DPA, and can even collect data from third parties (for example, fin-tech companies, health-tech startups) without the user even knowing. Forget recommending criminal prosecution for mass surveillance, India’s DPA won’t even be able to fine a government agency for such a violation of the fundamental right to privacy. The government also has vast exceptions for data processing: “for the performance of any function of the state authorised by law”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This aside, one of the more curious clauses in the bill is around non-personal data. The government, a few months ago, constituted a committee led by Infosys co-founder Kris Gopalakrishnan to look into the governance of non-personal data. Non-personal data, as the term suggests, is any data that is not related to an individual. In the bill, the government has given itself the right to acquire this data, which is essentially a company’s intellectual property, to “promote framing of policies for digital economy”. Why non-personal data finds a mention in a Personal Data Protection Bill is beyond comprehension, and this move will not inspire much confidence in businesses operating in India, when the state claims eminent domain over intellectual property.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s unfortunate minister Ravi Shankar Prasad is sending the bill to a select committee, given the fact that such significant changes to the bill should have led to another public consultation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-times-of-india-december-12-2019-power-over-privacy'&gt;http://editors.cis-india.org/internet-governance/news/the-times-of-india-december-12-2019-power-over-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Nikhil Pahwa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-12-15T05:57:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/hindustan-times-december-11-2019-indias-record-on-internet-shutdown-gets-bleaker">
    <title>India’s record on internet shutdown gets bleaker; now blocked in 2 NE states</title>
    <link>http://editors.cis-india.org/internet-governance/news/hindustan-times-december-11-2019-indias-record-on-internet-shutdown-gets-bleaker</link>
    <description>
        &lt;b&gt;India reported over 100 internet shutdown in 2018, according to an annual study of Freedom House, a US-based non-profit research organization.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="https://www.hindustantimes.com/india-news/amid-anti-citizenship-bill-protests-internet-shutdown-in-tripura-arunachal/story-jqR4jxiJexKbKIivV6XZBP.html"&gt;Hindustan Times&lt;/a&gt; on December 11, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The internet shutdown on Tuesday in Arunachal Pradesh and Tripura amid spiraling protests against the &lt;a href="https://www.hindustantimes.com/editorials/why-north-east-shouldn-t-be-wary-of-citizen-amendment-bill-opinion/story-JPYTnQROIi9cdXACK3k7KO.html" title="Citizenship (Amendment) Bill in the Northeast"&gt;Citizenship (Amendment) Bill in the Northeast&lt;/a&gt; is the latest in a series of such shutdowns across India, which topped the list of countries that resorted to such measures in 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India reported over 100 internet shutdown in 2018, according to an annual study of Freedom House, a US-based non-profit research organization. The study on the internet and digital media freedom was conducted in over 65 countries, which cover 87% of the world’s internet users&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Police and administrative authorities have cited protests and other security reasons to routinely snap the internet in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre promulgated the Temporary Suspension of Telecom Services (Public Emergency or Public Safety) Rules, 2017, under the Indian Telegraph Act, 1885, in August 2017 for legal sanction to the shutdowns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the rules, Union home ministry secretary or secretaries of state home departments can order temporary suspension of the internet. An internet suspension order has to be taken up for review within five days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to 2017, authorities could shut down the internet under Section 144 of the Code of Criminal Procedure (CrPC), which empowers an executive magistrate to prohibit an assembly of over four people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 5 (2) of the Telegraph Act, 1855, allowed the government to prevent transmission of any telegraphic message during a public emergency or in the interest of public safety.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Kashmir Valley has remained under an internet shutdown since August 4. The shutdown was imposed hours ahead of the nullification of the Constitution’s Article 370 that gave Jammu and Kashmir special status.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet and phone lines were snapped ahead of Republic Day celebrations in 2010 in one of the first reported shutdowns in the Valley. Kashmir also holds the record for the longest shutdown when the internet was snapped for 133 days after the killing of Hizbul Mujahideen militant Burhan Wani in July 2016. The current shutdown, with 122 days and counting, is the second-longest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 100-day blackout in Darjeeling during the Gorkha agitation in 2016 is the third-longest internet shutdown in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ahead of the verdict in the Ram Janmabhoomi-Babri Masjid title suit last month, the internet was shut down in parts of Maharashtra, Rajasthan, Haryana and Uttar Pradesh. The internet was shut down for three days in Gujarat during the agitation for a quota in jobs and educational institutes for the Patidar community in 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the Software Freedom Law Centre, which provides free legal services to protect Free and Open Source Software, the total number of shutdowns in Indian since 2012 is more than 359. As per the tracker -- internetshutdowns.in -- which records such instances from newspaper clippings -- there have been 89 internet shutdowns in 2019, 134 in 2018, and 79 in 2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“As a part of this project, we track incidents of Internet shutdowns across India in an attempt to draw attention to the troubling trend of disconnecting access to Internet services, for reasons ranging from curbing unrest to preventing cheating in an examination,” it states as part of its purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In September this year, the Kerala High Court held that access to the internet is a fundamental right. &lt;span&gt;According to Pranesh Prakash of the Centre for Internet Society, the shutdowns are largely unlawful.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“David Kaye, the UN special rapporteur on the right to freedom of opinion and expression, has condemned the shutdowns and noted that the principles of proportionality and necessity should be adhered to in case of shutdowns. Yet, there have been several instances where lives have been lost in Kashmir due to the lockdown,” he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/hindustan-times-december-11-2019-indias-record-on-internet-shutdown-gets-bleaker'&gt;http://editors.cis-india.org/internet-governance/news/hindustan-times-december-11-2019-indias-record-on-internet-shutdown-gets-bleaker&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-12-15T05:51:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/huffignton-post-december-13-2019-rachna-khaira-outrage-as-privileged-iit-ians-use-tech-to-spy-on-sweepers">
    <title>Outrage As Privileged IITians Use Tech To Spy On Sweepers </title>
    <link>http://editors.cis-india.org/internet-governance/news/huffignton-post-december-13-2019-rachna-khaira-outrage-as-privileged-iit-ians-use-tech-to-spy-on-sweepers</link>
    <description>
        &lt;b&gt;Some members of the housekeeping staff at IIT Ropar were put under round the clock surveillance during working hours for many days in February this year without their consent. IIT Ropar Director Prof S K Das has ordered a probe into the incident.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rachna Khaira was &lt;a class="external-link" href="https://www.huffingtonpost.in/entry/outrage-as-privileged-iitians-use-tech-to-spy-on-sweepers_in_5df1bbc8e4b06a50a2e9e659"&gt;published in Huffington Post&lt;/a&gt; on December 31, 2019. Aayush Rathi was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Indian Institute of Technology (IIT), Ropar is conducting a probe into the reported tagging and round the clock electronic surveillance of some housekeeping staff members as part of an experiment run by the Technology Business Incubation Foundation (TBIF) located at the IIT campus  in February this year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;HuffPost India &lt;/em&gt;has learnt that the TBIF, a tech incubator run within IIT Ropar, signed off on the “Sweepy” project in which housekeeping staff were given wristbands and brooms secretly embedded with tracking chips, without seeking the consent of the janitorial staff, or informing IIT Ropar management.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the housekeeping staff were told the wristbands would record their pulse and heart beat, and that they should wear it while cleaning the campus, the tracking chips were used to track to assess if they were sweeping out hard-to-reach corners of the institute.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prof. Sarit Kumar Das, Director IIT Ropar  told HuffPost India that a  three member committee comprising of Prof. Bijoy H Barua, Prof. Javed Agrewala and Prof. Deepak Kashyap has been set up to look into the matter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We at the IIT Ropar respect privacy and  condemn any such violation made by any of our student or staff member,” said Prof. Das. “Before conducting any experiment on human beings, an approval has to be sought from the human ethics team constituted  in  our institution and they present a case to me after seeking a written consent from the people who would undergo the experiment. Only, after getting my approval, such an experiment can be conducted at the campus.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Sweeping surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;J K Sharma, the Chief Operating Officer of TBIF, told &lt;em&gt;HuffPost India&lt;/em&gt; that his tech incubator deliberately misled the housekeeping staff about the true purpose of the wristband as they felt the housekeeping staff wouldn’t agree to wear such a device.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While elaborating more on the ‘Sweepy’ project, Sharma said that the project was based on an idea that came to the hostellers who were upset over the housekeeping staff for not cleaning their rooms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The sweepers were not working properly and despite reporting the matter several times to the authorities, they were not taking any cognisance. Perturbed, the students developed this programme in which the location of the sweeper can be recorded and monitored in a control room by a gadget tied to the sweeper’s wrist,” said Sharma.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He further added that a beacon records the activity of the sensor pasted to the broom or mop held by the sweeper and can monitor the area  and the time in which it was used. The report was produced digitally on the screen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Was a consent sought from the sweepers before tagging them?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The testing was done in a secret manner as the housekeeping staff may not have given their consent for the trial. We tried it on three sweepers and while two of them were found working dedicatedly, one was found to have missed  cleaning from few areas assigned to him,” said Sharma.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The findings were shared with the housekeeping supervisor who later directed his staff to do their duty more diligently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The team working on the project however told &lt;em&gt;HuffPost India&lt;/em&gt; that they secured the privacy of the housekeeping staff by removing the microphone from the gadgets tied to their wrists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This technology does not have video feature and only monitors location of a moving object and is quite cheap as compared to the radio-frequency identification (RFID) technology that uses electromagnetic fields to automatically identify and track tags attached to objects.&lt;/p&gt;
&lt;blockquote class="pull-quote content-list-component" style="text-align: justify; "&gt;The testing was done in a secret manner as the housekeeping staff may not have given their consent for the trial. We tried it on three sweepers and while two of them were found working dedicatedly, one was found to have missed  cleaning from few areas assigned to himJ K Sharma, Chief Executive Officer, Technology Business Incubation Foundation, IIT Ropar&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Calling this an increasingly commonplace trend of covert spying on domestic workers without their knowledge, Ayush Rathi, Programme Officer, Centre for Internet and Society, said that the housekeeping staff was made to wear the gadget under a false pretense is telling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is a classic example of how the access to privacy is stratified along the axes of class, caste and gender. And ties in closely with a key purpose of surveillance — that of exerting control over people’s bodies to conform to the surveiller’s ideas of right and wrong,” said Rathi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He further added that in many ways, this story captures the zeitgeist of the 21st century. The is the essence of so much of what qualifies as innovation today is that they seek to find technological solutions to problems that are structural in nature.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“So, in this instance it is very evident that the objective sought to be achieved was not to merely ‘fix’ the problem of the housekeeping staff performing its duties well, but to solely hold them guilty for failing to do so,” said Rathi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An alternate, albeit more tedious, approach would have been to speak with the workers and iron out the struggles they were facing at the workplace that were preventing them from performing their job well. Any solution could only have been prepared thereafter — he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per Prof. Das, a major problem with the engineering students is that unlike medical students, 90 percent of their experiments are based on machines and not human beings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There is  too much deficiency of  the understanding of human psychology amongst engineering students. To curb this, we at the IIT have started a mandatory course on human ethics which is being taught by some of the renowned human psychology experts. Still sometimes, the violations gets reported,” said Prof. Das.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/huffignton-post-december-13-2019-rachna-khaira-outrage-as-privileged-iit-ians-use-tech-to-spy-on-sweepers'&gt;http://editors.cis-india.org/internet-governance/news/huffignton-post-december-13-2019-rachna-khaira-outrage-as-privileged-iit-ians-use-tech-to-spy-on-sweepers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rachna Khaira</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-12-15T05:33:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/deccan-herald-november-6-2019-theres-sudeep-whatsapp-spy-attack-and-after">
    <title>WhatsApp spy attack and after</title>
    <link>http://editors.cis-india.org/internet-governance/news/deccan-herald-november-6-2019-theres-sudeep-whatsapp-spy-attack-and-after</link>
    <description>
        &lt;b&gt;Bengaluru experts analyse the Pegasus snooping scandal, and provide advice on what you can do about the gaping holes in your mobile phone security.&lt;/b&gt;
        &lt;p&gt;The article by Theres Sudeep was published in &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-your-bond-with-bengaluru/whatsapp-spy-attack-and-after-773955.html"&gt;Deccan Herald&lt;/a&gt; on November 6, 2019. Aayush Rathi was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Last week ended with a sensational piece of news: WhatsApp said spyware Pegasus was being used to hack into the phones of activists and journalists in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The software is the brainchild of the NSO Group, an Israeli company. WhatsApp has detected 1,400 instances of Pegasus being used in the latest wave of attacks between April 29 and May 10. WhatsApp has identified 100-plus cases targeting human rights defenders and journalists. About two dozen of these attacks were in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among those whose security was reportedly compromised is Congress leader Priyanka Gandhi.The first question is who ordered this snooping. NSO claims they sell their technology only to government agencies for lawful investigation into crime and terrorism. Speculation is rife that there is government involvement in the snooping.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vinay Srinivas, lawyer with Alternative Law Forum, Bengaluru, says,“The targets of the attack seem to be those who had critical things to say about the current government.”Referring to a tweet by journalist Arvind Gunasekar, Srinivas says there is clear proof that the government knew of the breach and its severity.The tweet includes a screenshot of a report from the CERT-IN (Indian Computer Emergency Response Team) website dated May 17.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It shows severity rating as “High”.WhatsApp says the vulnerability has now been patched and urged users to update the app. But a level of paranoia around smartphones and privacy has been created. Apar Gupta, executive director of the Internet Freedom Foundation, based in Delhi works towards internet freedom and privacy, says Pegasus,specially, is too expensive (it can cost up to eight million dollars a year to licence) to be used on ordinary citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But not all spyware is expensive. “Multiple kinds are now commercially available and easy to procure. These can be used by an estranged lover or even a professional rival to find information about you,” he says. Jija Hari Singh, retired DGP and Karnataka’s first woman IPS officer, says Pegasus is one of the smaller players, and spyware akin to it has been around for three decades. “Monsters bigger than Pegasus are still snooping on us,” she says.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NOTHING TO HIDE?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Many people fall back on the narrative of ‘I have nothing to hide, so I’m not worried’.Aayush Rathi, Programme Officer at the Centre for Internet and Society, says that this is a flawed premise: “It is like saying free speech is not important for you because you have nothing useful to say.”Gupta breaks down this rationale: “If a person has ‘nothing to hide’ then they should just unlock their phone and hand it over to any person who asks for it. But the minute such a demand is made they would feel uncomfortable.”This discomfort, he says, doesn’t come because they are doing something illegal but because they fear social judgement.“There is a level of intimacy in their conversations that they’d rather not share with anyone else,” he says.Many people believe only illegal activity leads to surveillance, but that is not the case.“Even the most inconsequential actions are being logged on digital devices, and much of this information can be monetised,” he says.The most tangible risks are financial fraud and identity theft, and spyware is also commonly used for corporate espionage.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;UPDATE SECURITY&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;So what must one do if one’s phone is spied on? In the case of Pegasus, Rathi says, “You would have received a communication from WhatsApp if you were targeted. Irrespective, you should update the application immediately as the latest update fixes the vulnerability.”Srinivas says legally the recourse available is the fundamental right to privacy. “Since the government doesn’t have any regulation in place to deal with this, the National Human Rights Commission will have to take it up,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gupta advises precautions against preventable hacks. He advises a reading of online guides on surveillance self-defence, especially those by Electronic Frontier Foundation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/deccan-herald-november-6-2019-theres-sudeep-whatsapp-spy-attack-and-after'&gt;http://editors.cis-india.org/internet-governance/news/deccan-herald-november-6-2019-theres-sudeep-whatsapp-spy-attack-and-after&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Theres Sudeep</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-12-15T05:06:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/deccan-herald-december-1-2019-theres-sudeep-cyber-security-tips-for-small-businesses">
    <title>Cyber security tips for small businesses</title>
    <link>http://editors.cis-india.org/internet-governance/news/deccan-herald-december-1-2019-theres-sudeep-cyber-security-tips-for-small-businesses</link>
    <description>
        &lt;b&gt;It is important to have good cyber security practices, experts recommend.&lt;/b&gt;
        &lt;p&gt;&lt;span style="text-align: justify; "&gt;The article by Theres Sudeep was published in the &lt;/span&gt;&lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-your-bond-with-bengaluru/cyber-security-tips-for-small-businesses-781533.html" style="text-align: justify; "&gt;Deccan Herald&lt;/a&gt;&lt;span style="text-align: justify; "&gt; on December 1, 2019. Arindrajit Basu was quoted.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Many times small businesses don’t allocate any of their budgets to cybersecurity. This is due to the common misconception that it’s only larger companies and governments that need to worry about attacks by hackers and the like.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not the case as Arindrajit Basu of The Centre for Internet and Society explains, “The kind of risks that smaller players are vulnerable to may not be on the scale of threats that larger companies encounter, but it is equally important for them to have good cybersecurity practices,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Phishing, an attempt to obtain sensitive information by disguising oneself as a trustworthy entity, and ransomware, a type of malware that threatens to publish the victim’s data or block access to it unless a ransom is paid, are the two most common kinds of attacks on small business according to Basu.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He adds that many hackers see small businesses as an easy way into a larger network. Once the smaller nodes are breached, they can easily get to the bigger players on the network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bengaluru, the startup capital of the country, has many such small businesses that need to better their cybersecurity practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first and foremost step recommended by Basu is to create a strategy within your business plan and revise it periodically. This must include employee training and guidelines on what to if there is a breach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from this owners and employees are advised to routinely change passwords and back up their data on a device that doesn’t connect to the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Owners are also advised to monitor access to admin accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many small businesses and startups don’t have offices of their own, which means employees end up working at a cafe or the like.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When working at these venues, make sure to carry your own WiFi or use the hotspot from your phone. Open WiFi networks are vulnerable to attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Basu concludes by saying that small businesses must be periodically audited by an independent cybersecurity firm.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/deccan-herald-december-1-2019-theres-sudeep-cyber-security-tips-for-small-businesses'&gt;http://editors.cis-india.org/internet-governance/news/deccan-herald-december-1-2019-theres-sudeep-cyber-security-tips-for-small-businesses&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Theres Sudeep</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-12-05T23:35:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>





</rdf:RDF>
