<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 701 to 715.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/gov-now-pratap-vikram-singh-17032016-why-aadhaar-is-baseless"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/reuters-march-16-2016-sanjeev-miglani-and-manoj-kumar-indias-billion-member-biometric-database-raises-privacy-fears"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/hindustan-times-march-17-2016-aloke-tikku-forget-privacy-aadhaar-bill-gives-too-much-power-to-the-executive"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/a-scheme-in-india-to-help-the-poor-raises-privacy-concerns"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/business-standard-sahil-makkar-march-12-2016-aadhaar-is-actually-surveillance-tech-sunil-abraham"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/blog/January%20Report%202016.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/new-indian-express-march-14-2016-will-only-legal-backing-for-aadhaar-suffice"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/Flaws_in_the_UIDAI_Process_0.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/motherboard-march-4-2016-joseph-cox-crypto-wars-are-global"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/2016-WIPIP-Agenda.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/blog/february-2016-report.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/telecom/news/the-register-february-15-2016-india-facebook-ruling-is-another-nail-in-coffin-of-mno-model"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-telegraph-february-18-2016-violence-call-key-to-sedition"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/ozy-february-19-2016-sanjena-sathian-why-internet-is-making-india-furious"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/gov-now-pratap-vikram-singh-17032016-why-aadhaar-is-baseless">
    <title>Pratap Vikram Singh - Why Aadhaar is Baseless?</title>
    <link>http://editors.cis-india.org/internet-governance/news/gov-now-pratap-vikram-singh-17032016-why-aadhaar-is-baseless</link>
    <description>
        &lt;b&gt;This article by Pratap Vikram Singh, Governance Now, discusses the problems emerging out of the UIDAI project due to its lack of mechanisms for informed and granular consent, and for seeking recourse in the case of denial of service. The article quotes Sumandro Chattapadhyay and mentions Hans Varghese Mathew's work on the biometric basis of UIDAI. It was written before the Aadhaar bill was passed in Lok Sabha.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Cross-posted from &lt;a class="external-link" href="http://www.governancenow.com/news/regular-story/baseless-aadhaar"&gt;Governance Now&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;It was no less than a roller-coaster ride for Aadhaar, a programme formulated by the UPA government to assign a 12-digit unique number to every Indian resident. From the time it came into being in 2009, Aadhaar drew a volley of criticism, thanks to the misgivings and apprehensions that various critics and civil society organisations had. It was criticised for lack of a clear purpose, degree of effectiveness and absence of a privacy law and was virtually thrown into the bin by a parliamentary panel headed by BJP’s Yashwant Sinha in December 2011.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;When the finance minister Arun Jaitley, in his budget speech, announced that the government would introduce the Aadhaar bill during the budget session, expectations were already set high. The bill, giving statutory backing to the unique identification authority of India (UIDAI), the implementing authority, was passed by the Lok Sabha on March 11. While the privacy and voluntary versus mandatory provisions are under the consideration of the supreme court, the bill makes way for linking Aadhaar with all government subsidies, benefits and services. The law on Aadhaar, former UIIDAI chairman Nandan Nilekani wrote in the Indian Express, will help the government in going paperless, presence-less and cashless. The legislation, however, fails to deliver on several counts.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, prior to evaluating the bill (yet to be passed by the Rajya Sabha at the time of this writing though it is a money bill), let us take a look at its major aspects. For those, who always wondered whether Aadhaar is mandatory or voluntary, the bill 2016 makes it mandatory to avail subsidy, benefit or a service from the government.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The bill has provisions related to information security and confidentiality (section 28) which not only extend to employees of the UIDAI but also consultants and external agencies working with the authority.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The proposed law restricts information sharing. It bars UIDAI from sharing core biometric information – the bill defines it as fingerprints and iris scan – with “anyone for any reason whatsoever” or “used for any purpose other than generation of Aadhaar numbers and authentication under this Act”. The section 32 of the bill entitles Aadhaar number holders to access her or his authentication record. It also bars the authority from collecting, keeping or maintaining information about the purpose of authentication.&lt;/p&gt;
&lt;h3&gt;Odd Drives the Bill&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;While the intent is clear and is aimed at streamlining welfare schemes to ensure it reaches the bottom of the pyramid, cutting through the long chain of pilferage and subversion, the bill, however, has several shortcomings. To begin with, the government should not have taken the money bill route to pass the legislation – tactfully avoiding any conclusive discussion and debate in the Rajya Sabha, where it is in minority.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The bill assumes that the technology and the biometric system used by the UIDAI are flawless and it doesn’t provide any recourse in case of denial of a service. “If your fingerprint is not matching and you lose out on service, then what is the alternative mechanism you have,” asks Sumandro Chattapadhyay, research director, centre for internet and society (CIS). The bill doesn’t provide for recourse. “What if the scanning machine fails? What if the identifiers of two people match?”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Based on experiments conducted in the initial days of the Aadhaar programme, Hans Verghese Mathews, another CIS researcher, did a study on the probability of matching of identifiers of two persons. “For the current population of 1.2 billion the expected proportion of duplicands (users whose identifiers match) is 1/121, a ratio which is far too high,” Mathews wrote in the Economic and Political Weekly in February.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“It is like putting the technology in a black box – which can’t be reviewed,” says Chattapadhyay. The bill doesn’t talk about setting up an independent body to review the logs and keep an eye on wrong and duplicate matches.&lt;/p&gt;
&lt;h3&gt;Who Defines National Security?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;According to public policy experts, it is an attempt to seek “minimal legitimacy” from parliament and further adds to the unbridled power of the executive.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although the bill restricts information sharing in section 29, sections 33 and 48 provide exemption in cases of national security and public emergency, respectively. The legislation, nevertheless, doesn’t elaborate on what constitutes national security and public emergency, leaving it to the executives. The section 33 reads: “Nothing contained in… shall apply in respect of any disclosure of information, including identity information or authentication records, made in the interest of national security….”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Similarly, section 48 states that if, at any time, the central government is of the opinion that a public emergency exists, “the central government may, by notification, supersede the Authority for such period, not exceeding six months, as may be specified in the notification and appoint a person or persons as the president may direct to exercise powers and discharge functions under this Act”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Says Jayati Ghosh, professor, centre for economic studies and planning, Jawaharlal Nehru University, “National security is a very opaque term. Who decides what national security is? Today, the whole JNU is being projected as a threat to national security.” Swagato Sarkar, associate professor and executive director, Jindal school of government and public policy, OP Jindal Global University, says, “The bill has provisions for oversight on the use of Aadhaar, but then it suspends those provisions in case of emergency in the later sections, giving the state the power to use biometric information for whatever it deems fit.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Sarkar adds, “It seems the bill is simply an instrument for seeking minimum legitimacy from parliament. The bill tries to address the concern of privacy minimally and it hardly serves any purpose.” He believes that there is a need to define the broader contours of democratic control of the state and reassess the changing state-citizen relationship, instead of rejecting the whole idea on the basis of surveillance and privacy. In other words, there is a need for strong parliamentary oversight, and that the Aadhaar related matters shouldn’t be completely delegated to the executive.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In its recommendations on formulating Privacy Act, the justice AP Shah committee in 2012 provided for establishing the office of privacy commissioner at the regional and central levels, defining the role of self-regulating organisations and co-regulation, and creating a system of complaints and redressal for aggrieved individuals. Since the country still doesn’t have any legislation on privacy, people are left on their own in case of an infringement or violation of privacy. Moreover, section 47 states, “No court shall take cognizance of any offence punishable under this Act, save on a complaint made by the Authority or any officer or person authorised by it.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In its report, the parliamentary committee headed by Yashwant Sinha notes that “enactment of national data protection law… is a prerequisite for any law that deals with large scale collection of information from individuals and its linkages across separate databases”. The committee notes that in absence of data protection legislation, it would be difficult to deal with issues of access, misuse of personal information, surveillance, profiling, linking and matching of databases and securing confidentiality of information.&lt;/p&gt;
&lt;h3&gt;Subsidy-Aadhaar Linkage&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Sinha committee also takes a cautious view of the role of Aadhaar in curbing leakages in subsidy distribution, as beneficiary identification is done by states. It notes, “Even if the Aadhaar number links entitlements to targeted beneficiaries, it may not even ensure that beneficiaries have been correctly identified. Thus, the present problem of proper identification would persist.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;According to Ghosh, the biggest danger in using Aadhaar for social welfare programmes is that the fingerprints of the rural working class is not always in good shape and hence Aadhaar will not be the best way of identification. “If I am misidentified, I can go to so many places for recourse. But what if a labourer in a remote Jharkhand village is misidentified? Where and whether he would go?” the economist asks. Besides, the bill doesn’t limit the use of Aadhaar and defines areas where it can be used. Section 57 says that the law will not prevent the use of Aadhaar number for establishing the identity of an individual for any purpose, “whether by the state or anybody corporate or person, pursuant to any law, for the time being in force or any contract to this effect.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;According to a PRS Legislative review, since the bill also allows private persons to use Aadhaar as a proof of identity for any purpose, the provision will open a floodgate and enable private entities such as airlines, telecom, insurance and real estate companies to mandate Aadhaar as a proof of identity for availing their services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Since the bill doesn’t restrict its application, people will not have a choice to identify themselves other than using Aadhaar when corporate organisations make it mandatory, says Chattapadhyay of the CIS. Adds Sarkar, “The bill should clearly mention sectors or services where Aadhaar will be potentially used (or made mandatory). Every time a new sector or service is added to the list, it is done after parliamentary approval.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;So far, 98 crore people have been assigned Aadhaar number. So far the project has costed Rs 8,000 crore.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/gov-now-pratap-vikram-singh-17032016-why-aadhaar-is-baseless'&gt;http://editors.cis-india.org/internet-governance/news/gov-now-pratap-vikram-singh-17032016-why-aadhaar-is-baseless&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-04-02T05:31:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/reuters-march-16-2016-sanjeev-miglani-and-manoj-kumar-indias-billion-member-biometric-database-raises-privacy-fears">
    <title>India's billion-member biometric database raises privacy fears</title>
    <link>http://editors.cis-india.org/internet-governance/news/reuters-march-16-2016-sanjeev-miglani-and-manoj-kumar-indias-billion-member-biometric-database-raises-privacy-fears</link>
    <description>
        &lt;b&gt;India's parliament is set to pass legislation that gives federal agencies access to the world's biggest biometric database in the interests of national security, raising fears the privacy of a billion people could be compromised.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sanjeev Miglani and Manoj Kumar was &lt;a class="external-link" href="http://www.reuters.com/article/us-india-biometrics-idUSKCN0WI14E"&gt;published by Reuters&lt;/a&gt; on March 16, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The move comes as the ruling Bharatiya Janata Party (BJP) cracks down on student protests and pushes a Hindu nationalist agenda in state elections, steps that some say erode India's traditions of tolerance and free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It could also usher in surveillance far more intrusive than the U.S. telephone and Internet spying revealed by former National Security Agency (NSA) contractor Edward Snowden in 2013, some privacy advocates said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar database scheme, started seven years ago, was set up to streamline payment of benefits and cut down on massive wastage and fraud, and already nearly a billion people have registered their finger prints and iris signatures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now the BJP, which inherited the scheme, wants to pass new provisions including those on national security, using a loophole to bypass the opposition in parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It has been showcased as a tool exclusively meant for disbursement of subsidies and we do not realize that it can also be used for mass surveillance," said Tathagata Satpathy, a lawmaker from the eastern state of Odisha.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Can the government ... assure us that this Aadhaar card and the data that will be collected under it – biometric, biological, iris scan, finger print, everything put together – will not be misused as has been done by the NSA in the U.S.?"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finance Minister Arun Jaitley has defended the legislation in parliament, saying Aadhaar saved the government an estimated 150 billion rupees ($2.2 billion) in the 2014-15 financial year alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A finance ministry spokesman added that the government had taken steps to ensure citizens' privacy would be respected and the authority to access data was exercised only in rare cases.&lt;br /&gt; &lt;br /&gt;According to another government official, the new law is in fact more limited in scope than the decades-old Indian Telegraph Act, which permits national security agencies and tax authorities to intercept telephone conversations of individuals in the interest of public safety.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"POLICE STATE"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="midArticle_12"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those assurances have not satisfied political opponents and people from religious minorities, including India's sizeable Muslim community, who say the database could be used as a tool to silence them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="midArticle_13"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We are midwifing a police state," said Asaduddin Owaisi, an opposition MP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="midArticle_14"&gt; &lt;/span&gt; &lt;span class="second-article-divide"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Raman Jit Singh Chima, global policy director at Access, an international digital rights organization, said the proposed Indian law lacked the transparency and oversight safeguards found in Europe or the United States, which last year reformed its bulk telephone surveillance program.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="midArticle_15"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He pointed to the U.S. Foreign Intelligence Surveillance Court, which must approve many surveillance requests made by intelligence agencies, and European data protection authorities as oversight mechanisms not present in the Indian proposal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="midArticle_0"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government brought the Aadhaar legislation to the upper house of parliament on Wednesday in a bid to secure passage before lawmakers go into recess.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="midArticle_1"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To get around its lack of a majority there, the BJP is presenting it as a financial bill, which the upper chamber cannot reject. It can return it to the lower house, where the ruling party has a majority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="midArticle_2"&gt; &lt;/span&gt; &lt;span class="third-article-divide"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its assessment of the measure, New Delhi-based PRS Legislative Research said law enforcement agencies could use someone's Aadhaar number as a link across various datasets such as telephone and air travel records.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That would allow them to recognize patterns of behavior and detect potential illegal activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="midArticle_4"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But it could also lead to harassment of individuals who are identified incorrectly as potential security threats, PRS said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="midArticle_5"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of the Bengaluru-based Centre for Internet and Society, said Aadhaar created a central repository of biometrics for almost every citizen of the world's most populous democracy that could be compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="midArticle_6"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Maintaining a central database is akin to getting the keys of every house in Delhi and storing them at a central police station," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="midArticle_7"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It is very easy to capture iris data of any individual with the use of next generation cameras. Imagine a situation where the police is secretly capturing the iris data of protesters and then identifying them through their biometric records.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/reuters-march-16-2016-sanjeev-miglani-and-manoj-kumar-indias-billion-member-biometric-database-raises-privacy-fears'&gt;http://editors.cis-india.org/internet-governance/news/reuters-march-16-2016-sanjeev-miglani-and-manoj-kumar-indias-billion-member-biometric-database-raises-privacy-fears&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-17T15:25:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/hindustan-times-march-17-2016-aloke-tikku-forget-privacy-aadhaar-bill-gives-too-much-power-to-the-executive">
    <title>Forget privacy, Aadhaar Bill gives too much power to the executive </title>
    <link>http://editors.cis-india.org/internet-governance/news/hindustan-times-march-17-2016-aloke-tikku-forget-privacy-aadhaar-bill-gives-too-much-power-to-the-executive</link>
    <description>
        &lt;b&gt;The government promotes the Aadhaar programme because it believes the 12-digit unique identification number will let them track every penny spent from the exchequer. But money is not all that the Aadhaar number can track.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aloke Tikku was &lt;a class="external-link" href="http://www.hindustantimes.com/india/forget-privacy-aadhaar-bill-gives-too-much-power-to-the-executive/story-ZZjsWwMypqyw7Q5nIFWXcJ.html"&gt;published in the Hindustan Times&lt;/a&gt; on March 17, 2016. Sunil Abraham gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It can help track people too with amazing efficiency. This is at the centre of the controversy around the programme, and the Aadhaar bill that requires every resident to get the number to access government subsidies and services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finance minister Arun Jaitley put up a spirited defence of the bill in the Rajya Sabha on Wednesday when the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016 came up for passage. And he was right.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As far as privacy is concerned, the NDA government’s version is much more stringent than the creaky draft proposed by the UPA in 2010.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jaitley said there were only two circumstances in which personal data collected by UIDAI could be shared under this bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One, if the Aadhaar number holder consents to his details being shared. Second, if a government agency wants to access this data on grounds of national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the debate around privacy concerns – that neither the NDA nor the UPA governments addressed – and the new bill is much more fundamental.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar bill gives the executive too much power to decide how to administer the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every law requires the government to frame rules to specify the nitty-gritty of its implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the Aadhaar bill passed by Parliament gives the Unique Identification Authority of India (UIDAI) the power to prescribe regulations for nearly every provision, right down to what biometric or biological attributes need to be captured.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The law leaves too much power in the hands of the executive,” said Sunil Abraham, executive director of the Bengaluru-headquartered research advocacy group, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, the bill gives the Unique identification Authority of India (UIDAI) powers to determine if it should collect any biological attribute of people too. This means the government could at a later date mandate that DNA of all Aadhaar numbers too be collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The example echoed in the Rajya Sabha on Wednesday as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“No power should be delegated to the UID Authority because then the UID Authority will decide tomorrow that DNA is required, and they will then have the powers to take DNA information as well,” Congress MP Jairam Ramesh said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The minister tried to explain the reliance on regulations issued by UIDAI – the word ‘regulations’ does appear some 50 times through the legislation – as compared to less than 10 in, say, the right to information law or the 2010 version of the bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said MPs could still review notifications issued by UIDAI when they are placed for parliamentary approval.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/hindustan-times-march-17-2016-aloke-tikku-forget-privacy-aadhaar-bill-gives-too-much-power-to-the-executive'&gt;http://editors.cis-india.org/internet-governance/news/hindustan-times-march-17-2016-aloke-tikku-forget-privacy-aadhaar-bill-gives-too-much-power-to-the-executive&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-17T14:44:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/a-scheme-in-india-to-help-the-poor-raises-privacy-concerns">
    <title>A scheme in India to help the poor raises privacy concerns</title>
    <link>http://editors.cis-india.org/internet-governance/news/a-scheme-in-india-to-help-the-poor-raises-privacy-concerns</link>
    <description>
        &lt;b&gt;India’s legislators are on Wednesday debating a law that would allow the government to collect biometric and demographic information from people in return for distributing to them government benefits and subsidies. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by John Ribeiro published by IDG News Service on March 16, 2016 was also mirrored on &lt;a class="external-link" href="http://www.csoonline.com/article/3044722/security/a-scheme-in-india-to-help-the-poor-raises-privacy-concerns.html"&gt;CSO&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A number of legislators and civil rights activists are concerned about the absence of strong privacy safeguards in the legislation and a provision in the law that allows the government to access the data collected for national security reasons. There is also concern that such a large centralized database of personal information could be hacked and critical information leaked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Biometric information, once leaked cannot be 'revoked,' and identity fraud may in fact become harder to detect if Aadhaar is used for authentication of transactions, said Pranesh Prakash, policy director at the Centre for Internet and Society in Bangalore, in an email.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Activists are also wary that the program could be extended by the government to make it a mandatory digital ID card for people in the country. Already some telecommunications services and financial services companies use the biometric identity as an optional way for verifying customers. Currently, people can keep their personal information in silos, as for example their insurance company can't combine their database with that of a hospital, Prakash said. "However, with Aadhaar as a unique linking factor, they could, even without the person's consent," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The biometric ID, which assigns a person a 12-digit number called the Aadhaar number, requires the collection of photos, fingerprints, iris scans and other information such as the name, date of birth and address of the individual. Every time a person has to be verified, he has to present the Aadhaar number, and his biometric information has to match the data stored in a centralized repository.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The digital identity is expected to provide proof of identification to the large number of poor Indians who do not have house addresses, school certificates, birth certificates or other documents that are usually used to prove identity in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The traditional paper ration books used in the country are notoriously stuffed with people who are nonexistent or who do not typically qualify for benefits, so the government hopes to save some money by linking the benefits to a digital identity. But the new scheme addresses only end-user fraud and not the large-scale theft prevalent in the entire supply chain, according to analysts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rajeev Chandrasekhar, a member of India’s Parliament, has proposed amendments to the bill that would ensure that Aadhaar numbers should not be used as proof of identity for purposes other than subsidies and benefits. Chandrasekhar also wants the Unique Identification Authority of India that manages the project to be responsible for ensuring the security and privacy of the biometric and demographic information of the account holder, with liability for damages in a civil court in the case of a breach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar program has been allotting IDs for a number of years, even under a previous government, but the program was the offshoot of an executive order and had no legal sanction. The country’s Supreme Court &lt;a href="http://www.pcworld.com/article/2049364/indian-biometric-id-project-faces-court-hurdle.html"&gt;&lt;span&gt;ruled in 2013&lt;/span&gt;&lt;/a&gt; in an interim order that people cannot be required to have Aadhaar identification to collect state subsidies. Aware of the legal minefield it was treading on, the government had said the scheme was voluntary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016 passed recently in the Lok Sabha, one of the houses of India’s parliament, now aims to make the scheme mandatory. The bill sailed through the Lok Sabha where the government has a majority, but will likely meet with strong opposition from the other house, the Rajya Sabha. But the government has classified the bill as a money bill and the Rajya Sabha does not have the final say on such bills. So the legislation is likely to be passed in any case despite its limitations.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/a-scheme-in-india-to-help-the-poor-raises-privacy-concerns'&gt;http://editors.cis-india.org/internet-governance/news/a-scheme-in-india-to-help-the-poor-raises-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-17T03:08:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/business-standard-sahil-makkar-march-12-2016-aadhaar-is-actually-surveillance-tech-sunil-abraham">
    <title>Aadhaar is actually surveillance tech: Sunil Abraham</title>
    <link>http://editors.cis-india.org/internet-governance/news/business-standard-sahil-makkar-march-12-2016-aadhaar-is-actually-surveillance-tech-sunil-abraham</link>
    <description>
        &lt;b&gt;On March 12, the Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016, paving the way for giving legal status to Aadhaar, a 12-digit unique identification number generated after collecting biometric and other details of an Indian resident.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sahil Makkar on behalf of Business Standard interviewed Sunil Abraham. The &lt;a class="external-link" href="http://www.business-standard.com/article/opinion/aadhaar-is-actually-surveillance-tech-sunil-abraham-116031200790_1.html"&gt;article was published &lt;/a&gt;on March 12, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government intends to use Aadhaar to roll out more subsidy schemes and allay privacy concerns. However, activists are not convinced. &lt;strong&gt;Sunil Abraham&lt;/strong&gt;, executive director of Bengaluru based-research organisation The Centre for Internet &amp;amp; Society, tells &lt;em&gt;Sahil Makkar&lt;/em&gt; that the concept of Aadhaar is principally flawed and it doesn't substantially help in plugging leakages in government schemes. Edited excerpts:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;What is your position on Aadhaar and the UIDAI Bill?&lt;br /&gt;&lt;br /&gt;&lt;/strong&gt; What technology has broken cannot be fixed by the law. Aadhaar is a broken technology; it is surveillance technology disguised as developmental intervention that identifies people without their consent and authenticates transactions on their behalf. The architecture is a disaster from the security perspective and there is no recourse in law for citizens whose rights have been infringed. The other objection should be to the subtitle of the Bill that mentions "services": it is unclear whether Aadhaar is to be provided to the residents or the citizens. A bulk of the government services is meant for citizens.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;What are the repercussions of this "broken technology"?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; Consent happens without conscious cooperation during the authentication process of getting access to a subsidy or a service. Also, the person providing the service is holding a biometric reader and he may say the device is not working and hence, refuse the subsidy. Yet the database will reflect that the subsidy has been availed of because authentication has already been completed. So you have to accept what the person is saying because only that person and the UIDAI have access to the information. Aadhaar makes the citizen transparent to the state but makes the state completely opaque and unaccountable to its citizens.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Will the beneficiary not receive a message about the transaction?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; That will only happen when the banks are involved. At the subsidised ration shop the beneficiary will get nothing. The world over security professionals don't trust biometric-based authentication, relying rather on other revocable authentication factors. It is irrevocable if the biometric details are compromised. Instead, writable smart cards could be used to record details of government officers on the cards of beneficiaries and make both the state and the resident transparent to each other.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Hasn't the National Population Register under the Ministry of Home Affairs been advocating the use of smart cards?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; In this case biometrics should be used only to link the individual to the smart card. Biometric information should be stored on smart cards and under no circumstances should there be a central repository of biometrics at one place. Maintaining a central database is akin to getting the keys of every house in Delhi and storing them at a central police station. The chances of getting a central database compromised depend on the nature of information stored in it. For the sake of security one can't create a honey pot to be attacked by many. The internet is secure because it doesn't have a central database. The other difference is that faking biometrics is much easier than faking smart cards.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;So your principle opposition is to the setting up of a central repository of biometrics?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; I am also opposed to the use of biometrics for identification and authentication; this is nothing but surveillance. It is very easy to capture iris data of any individual with the use of next generation cameras. Imagine a situation when the police is secretly capturing the iris data of protesters and then identifying them through their biometric records.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;But if the security agencies are able to identify those who create law and order problems, what is the hitch?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; It is exactly the same argument that Apple is giving while refusing back-door entry to intelligence and investigating agencies. Once you build surveillance capacity for good governance, it may be misused by a repressive government, a rogue corporation or by criminals. Fear of this type of surveillance will deter people from holding any protest.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Doesn't the Aadhaar or the UIDAI conform to safety and security provisions in the IT Act?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; The standards in our IT Act are woefully inadequate in comparison to European regulators and courts. If it adhered to the highest standards, the European privacy commissioner and data protection authorities would have given India adequacy status. The second problem is that the current IT Act doesn't apply to the government. If the government holds your data, it is under no obligation to protect your rights.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;You have been part of the Justice A P Shah Committee on privacy. How important is it to have a separate privacy law in the present context?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; It is not only important for the purpose of safeguarding human rights, but also to protect the competitiveness of our BPO, ITeS and KPO sectors. We need a data protection law that is compliant with European Data Protection Regulation.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;How will such a law help a common man whose data have been compromised?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; It will provide clarity to an individual about where he or she stands with regard to privacy. It is strange that the government took diametrically opposite stands in two cases related to privacy in the Supreme Court. When some activists demanded that the UIDAI be scrapped, the government argued before the court that there was no Constitutional right to privacy. When the police asked for the biometric records from the UIDAI, the same government argued there was a right to privacy and that it couldn't divulge the details to the police. The government is not speaking in the same voice; even courts are not speaking in the same voice, because there have been conflicting judgements. So the proposed law will provide clarity on privacy and people will be able to seek compensation under it.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;At the same time it cannot be denied that Aadhaar can plug leakages and save hundreds and thousands of rupees for the exchequer....&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; Aadhaar is only answering two questions: Is this particular biometric unique (enrolment) and does it match the template in the database? If you bring a Bangladeshi into the system, it will answer both the questions in the affirmative. The Aadhaar only eliminates the possibility of one person receiving the benefits twice. At the same time it is very easy to put a ghost beneficiary back into the system. If Aadhaar has to work, we need a publicly visible auditable trail of subsidy moving from Delhi to the villages. That will eliminate corruption in the supply chain.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Isn't it difficult for a large number of ghost beneficiaries to get into the system?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; There is no way to check whether a genuine or a ghost beneficiary has been removed from the list. It is not a foolproof system because no one is vouching for anybody. In the current system it is difficult to find out who created this ghost beneficiary. Nobody loses a job for creating a ghost; in fact, here everyone has an incentive.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;If there are problems with the UIDAI system, why is the government upbeat about it?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; As techno-utopians our government wants technology to answer everything and solve all our problems. If anything goes wrong, it can easily be blamed on technology.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/business-standard-sahil-makkar-march-12-2016-aadhaar-is-actually-surveillance-tech-sunil-abraham'&gt;http://editors.cis-india.org/internet-governance/news/business-standard-sahil-makkar-march-12-2016-aadhaar-is-actually-surveillance-tech-sunil-abraham&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-16T17:07:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham">
    <title>Govt narrative on Aadhaar has not changed in the last six years: Sunil Abraham</title>
    <link>http://editors.cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham</link>
    <description>
        &lt;b&gt;The bill is basically the same as the UPA version, with some cosmetic changes, and some tokenism towards the right to privacy, says Abraham.&lt;/b&gt;
        &lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Shreeja Sen interviewed Sunil Abraham. The article was &lt;a class="external-link" href="http://www.livemint.com/Politics/l0H1RQZEM8EmPlRFwRc26H/Govt-narrative-on-Aadhaar-has-not-changed-in-the-last-six-ye.html"&gt;published in Livemint &lt;/a&gt; on March 8, 2016.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The government’s bid to push financial inclusiveness and access to government services has received a fresh boost, with finance minister Arun Jaitley introducing a proposed law to give legislative backing to Aadhaar, being implemented by the Unique Identification Authority of India (UIDAI).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This project, which uses a person’s biometric data like fingerprints and iris scans to authenticate identity of people receiving subsidies and other state benefits, will move India towards a cashless economy and help digital initiatives such as biometric attendance, Pradhan Mantri Jan Dhan Yojana, digital certificates, pension payments and the proposed introduction of payments banks.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, 42&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham is executive director of Centre for Internet and Society, a Bengaluru-based think tank focusing on accessibility, access to knowledge, telecom and Internet governance. He has written extensively on the UID scheme, and the intersection of privacy and security. He founded Mahiti—an enterprise that aims to reduce the cost and complexity of information and communications technology for the voluntary sector by using free software.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar project has faced its share of roadblocks with cases challenging it pending before the Supreme Court. A constitution bench of the court will decide whether the right to privacy is a fundamental right and if Aadhaar violates it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, the executive director of Centre for Internet and Society, a Bengaluru-based policy research institute, is a critic of Aadhaar for several reasons. He explained his concerns in an interview. Edited excerpts:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Have any of the concerns regarding the Aadhaar project since its inception in 2009 been addressed?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whatever we complained about six or seven years ago, whatever complaints were made by the civil society...all of those complaints remain in the exact same situation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nothing has changed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;What kind of concerns?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first thing to remember is that privacy and security are just two sides of the same coin. You cannot have one without the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our first concern with the project is centralization. Whenever you build an information system, and you create a central point of failure, then it will fail because the possibility of failure exists. The Internet has no central point of failure. That is why it is so difficult for you to bring the Internet down. Complaint number 2 is the opaque technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI keeps saying that “we have built a technology using a free software and open standard stack”. The first is a de-duplication software and the second one is the authentication software—those are the most important pieces of software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This software is proprietary and nobody knows how they work and nobody can independently audit them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third complaint is the use of an irrevocable and non-consensual authentication factor. In the UID scheme, the biometrics serve two purposes: it can be used to identify a citizen and it can be used to authenticate a transaction. Authentication factors, commonly known as passwords, should always be revocable. That means if the password is compromised, you should be able to change the password or at least say that this password is no longer valid. The use of biometrics eliminates those two important requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, in most other authentication, the process of authentication ensures that you are consenting. For example, PIN (personal identity number) authentications. But suppose I am authenticating you through your irises, then as long as your eyes are open, the machine will think you’re authenticating. There’s no way of saying I don’t want to authenticate. Or if you’re sleeping, somebody can hold your fingers over a biometric reader and open your iPhone. So that’s complaint number three.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fourth complaint from the privacy perspective is: there is a very important database that they don’t talk about. I call it the transactions database. Suppose there is somebody who is using the UIDAI service to authenticate a transaction, then UIDAI should keep a record of that successful or unsuccessful transaction authentication. That means you have been registered into the database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You go to a fair price shop to purchase subsidized grain and at that fair price shop or ration shop, you use your finger on the biometric reader, and then the UIDAI system says “yes you are indeed who you say you are”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, at that point, later the shop should not be able to say X never came here, or X came twice. So, in order for them to not say all those things, a record should be made on the UID database, that on this day, from this geographical location, this particular biometric reader sent us X’s biometric template and asked if the template matched against X’s UID number...the transaction database can be used for profiling. They never talk about it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They never tell us what that database holds and how long they’re keeping all those records. None of that is clear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Does Aadhaar bill help assuage your doubts about the project?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government narrative has not changed in the last six years; the bill is basically the same as the UPA (United Progressive Alliance) version, with some cosmetic changes, and some tokenism towards the right to privacy. The proof that the technology is fallible is in the bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the technology was infallible, as the UIDAI would like us to believe, then the bill would not criminalize the following: (1) impersonation at the time of enrolment; (2) unauthorized access to the Central Identities Data Repository.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine that the bill admits that every Indian’s biometric can be stolen from one single centralized database. Now why don’t we have a similar offence for stealing all private keys from the Internet—we don’t because that is technical impossibility thanks to decentralization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore we don’t need a law to make (it) illegal. We’ve suggested changes to both the technology and the law. We’ve written seven open letters to the UIDAI, and we’ve never gotten any response. Very few of our concerns have been addressed. We’ve seen dogs getting UID, various other things getting UID, so there’s a lot of evidence that the system does not work. From Kerala we have stories of one person getting several UIDs, so we have no idea about technological feasibility of the project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of our distinguished fellows, Hans Varghese Mathews, has published an academic paper in the latest &lt;i&gt;EPW&lt;/i&gt; (&lt;i&gt;Economic and Political Weekly&lt;/i&gt;), by extrapolating UIDAI field trial data to national scale. He predicts that by the time the number crosses 1 billion, every time UIDAI tries to register someone new, they will match with about 850 people already in the database positively. So, the unique identification capability of the UIDAI will not scale above the billion. The consequence of the technology failing is not trivial. If someone replaces your biometrics in the central database, then the onus is on you to prove that you are a resident of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previously, human beings determined the answer to this question, and they had to find proof that you were not a resident. Now, a fallible technology will be asked to answer this important question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Isn’t the basic function of the Aadhaar project to ensure that benefits reach the person they are meant for, and it’s easier for people to get an identity proof for those who have no other ID, like migrant workers?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two responses: is it good anti- corruption technology? Unfortunately not, because it is intended at retail fraud. The person under surveillance is very poor. But the person responsible for corruption is not poor. So, I believe you should be surveilling those responsible for corruption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What I had said is UID should be first given to every single bureaucrat and every single politician in the country. From Delhi till the Panchayat office, till the ration shop in the village, that supply chain must be monitored and documented using cryptography, so that nobody can deny anything. We need non-repudiatable audit trail from New Delhi to the village because according to all analyses, that is where the theft is happening—in the supply chain. The villager who is taking false benefits, that is called retail fraud.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bulk of the fraud is actually wholesale fraud. Please tackle wholesale fraud using non-repudiatable public audit trail from New Delhi to the village first, before you start surveilling the poor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second point is that people find it easy to get the UID. That is fine, but there is a problem; that it’s not uniquely identifying anybody. So, people will keep registering and the UID system will keep giving them more and more UIDs because there are no human checks and balances. Because you’ve gone with a pure technological solution, it’s very easy to fool (the system).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, the ease of registration has not served the purpose.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham'&gt;http://editors.cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-16T16:37:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/blog/January%20Report%202016.pdf">
    <title>January Report 2016.pdf</title>
    <link>http://editors.cis-india.org/accessibility/blog/January%20Report%202016.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/blog/January%20Report%202016.pdf'&gt;http://editors.cis-india.org/accessibility/blog/January%20Report%202016.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-03-16T13:56:50Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/new-indian-express-march-14-2016-will-only-legal-backing-for-aadhaar-suffice">
    <title>Will Only Legal Backing For Aadhaar Suffice? </title>
    <link>http://editors.cis-india.org/internet-governance/new-indian-express-march-14-2016-will-only-legal-backing-for-aadhaar-suffice</link>
    <description>
        &lt;b&gt;Aadhaar is set to become mandatory, but the opponents of the scheme are not amused. Concerns about privacy of the Aadhaar number and the authenticity of the biometric data being collected have been expressed by people right from the beginning. But the government has not done much to address these issues.&lt;/b&gt;
        &lt;p&gt;The article was published in &lt;a class="external-link" href="http://www.newindianexpress.com/nation/Will-Only-Legal-Backing-For-Aadhaar-Suffice/2016/03/14/article3326144.ece"&gt;New Indian Express &lt;/a&gt;on March 14, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“It does not matter what legislative backing they give it, it is still a surveillance programme. How can you have a privacy Bill for a surveillance programme? Legislative backing would be band-aid. I do not agree with it,” says Sunil Abraham, Executive Director of The Centre for Internet and Society. The society is a Bengaluru-based organisation looking at multi-disciplinary research and advocacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham says that ever since the Aadhaar scheme was implemented, there was a massive degradation of civil liberties. “It is an opaque technology. Why should the government have such a database?” he asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="http://editors.cis-india.org/home-images/Aadhaar1.jpg" alt="Aadhaar" class="image-inline" title="Aadhaar" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham says that the keys to the data should not have rested with the government where it is vulnerable. Instead, the government should have explored the concept of introducing smart cards issued to the citizen with the data stored on it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Access to this data could not be had without the permission of the citizen, he says. At present, if something goes wrong or if the data is compromised, the government can always blame a lapse in technology, Abraham adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He questions the government’s logic where it assumes that only the poor section of society can misuse the benefits and says that it is well known that the problem exists in the supply chain and that the government has done nothing to address this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mathew Thomas of The Fifth Estate, an NGO, wonders what advantage the BJP suddenly found that they decided to pursue Aadhaar rather than send it to the trash bin as they had promised before the general elections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thomas says Aadhaar is flawed and is a fraud on the Constitution and the government has taken the money bill route simply to avoid a debate on it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Just passing a Bill is meaningless. This is radically wrong and we all know that protection of privacy is nonsense. How do they plan to plug the leakages? Have they even conducted a study, because there is no evidence of it. The correct beneficiary can get an LPG cylinder, but what is stopping the person from using it for an auto or for his car? That the government can lie to its own people is terrible,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A five-judge bench of the Supreme Court, which is hearing the matter on privacy concerns about Aadhaar, is expected to have a hearing by the end of this month.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/new-indian-express-march-14-2016-will-only-legal-backing-for-aadhaar-suffice'&gt;http://editors.cis-india.org/internet-governance/new-indian-express-march-14-2016-will-only-legal-backing-for-aadhaar-suffice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-16T02:31:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/Flaws_in_the_UIDAI_Process_0.pdf">
    <title>Flaws_in_the_UIDAI_Process_0.pdf</title>
    <link>http://editors.cis-india.org/internet-governance/blog/Flaws_in_the_UIDAI_Process_0.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/Flaws_in_the_UIDAI_Process_0.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/Flaws_in_the_UIDAI_Process_0.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-03-06T10:37:28Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/motherboard-march-4-2016-joseph-cox-crypto-wars-are-global">
    <title>The Crypto Wars Are Global</title>
    <link>http://editors.cis-india.org/internet-governance/news/motherboard-march-4-2016-joseph-cox-crypto-wars-are-global</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Joseph Cox was &lt;a class="external-link" href="http://motherboard.vice.com/read/the-crypto-wars-are-global"&gt;published by Motherboard &lt;/a&gt;on March 4, 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;American politicians, media, and the public may be focused on the &lt;a href="https://motherboard.vice.com/read/fbi-apple-iphone-backdoor-violates-international-free-speech-treaties-united-nations-says"&gt;&lt;span&gt;ongoing battle&lt;/span&gt;&lt;/a&gt; between Apple and the FBI over encryption in the iPhone, but the so-called Crypto Wars are far from just a national issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proliferation of encryption—and law enforcement’s efforts to defeat it—is a wordwide phenomenon, and one that might have much more urgent consequences outside of Europe and the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On top of that, some governments’ reactions to the increased use of cryptography have been more kinetic and drastic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was starkly demonstrated &lt;a href="https://www.washingtonpost.com/world/national-security/senior-facebook-executive-arrested-in-brazil-after-police-denied-access-to-data/2016/03/01/f66d114c-dfe5-11e5-9c36-e1902f6b6571_story.html"&gt;&lt;span&gt;with the arrest&lt;/span&gt;&lt;/a&gt; of a senior Facebook executive in Brazil on Tuesday, seemingly carried out because WhatsApp was unable to fulfill a court order to intercept messages on the service. That case was likely an exceptional one, but it was symptomatic of growing frustration amongst governments and law enforcement around the world.&lt;/p&gt;
&lt;blockquote class="quote" style="text-align: justify; "&gt;
&lt;h3&gt;Plenty of countries already seemingly target devices to circumvent encryption&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;So as foreign authorities clamp down on crypto in their own way, how will this affect users?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Outside the US, the consequences for users, the risks, the threats that they face; the reasons they use crypto, are going to be much more pronounced,” Amie Stepanovich, &lt;a href="https://www.accessnow.org/author/amie-stepanovich/"&gt;&lt;span&gt;US Policy Manager&lt;/span&gt;&lt;/a&gt; at Access Now, a digital rights group told Motherboard in a phone call.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For some users, Stepanovich said, “encryption really is a matter of life or death.” She pointed to LGBQT communities in the Middle East or North Africa, where their sexual preference might be illegal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Various countries have taken wildly different approaches to tackling crypto. Late last year, the &lt;a href="https://motherboard.vice.com/read/kazakhstan-announces-plan-to-spy-on-encrypted-internet-traffic"&gt;&lt;span&gt;Kazakhstan government announced a plan&lt;/span&gt;&lt;/a&gt; to force all internet users to download a digital certificate that would allow the authorities to snoop on encrypted traffic. And in 2014, the &lt;a href="https://motherboard.vice.com/read/russia-has-put-a-bounty-on-tor"&gt;&lt;span&gt;Russian government called&lt;/span&gt;&lt;/a&gt; for researchers to find a way to crack the Tor anonymity network. Both of those plans have seemingly failed to materialise in any concrete results, but the intention was certainly there.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others have looked at attacking devices of individuals, something that the FBI is also &lt;a href="https://motherboard.vice.com/read/the-fbi-wants-38-million-to-buy-encryption-breaking-technology?12"&gt;&lt;span&gt;keen to develop&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The future might be in the hacking of the device, hacking the end-point,” said Richard Tynan, a technologist at activist group Privacy International.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, plenty of countries already seemingly target devices to circumvent encryption. Italian surveillance company Hacking Team had at least 70 customers from all over the world, according to &lt;a href="https://en.wikipedia.org/wiki/Hacking_Team#Customer_List"&gt;&lt;span&gt;hacked internal documents&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The legislative approach has also been fairly popular. In December, &lt;a href="http://www.reuters.com/article/us-china-security-idUSKBN0UA07220151228"&gt;&lt;span&gt;China passed a law&lt;/span&gt;&lt;/a&gt; requiring technology firms to assist in the decryption of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This legal route parallels the current battle between Apple and the FBI, where the agency has asked the company to write code that would override the iPhone’s security features. Some feel that if the FBI is successfully in making the technology giant write malicious code, then a precedent will be set for other countries to follow.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I think that if the US government is successful in ordering Apple to write code, we're going to see other countries also try to push Apple in the same direction,” Stepanovich said. (In &lt;a href="https://www.apple.com/pr/pdf/Intel.pdf"&gt;&lt;span&gt;its recent amicus brief&lt;/span&gt;&lt;/a&gt; in the Apple case, Intel wrote that if the FBI is successful in its demands, other countries, particularly those with less protective privacy laws, might see an invitation to require companies to undermine the security of their products.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;J. Carlos Lara, research and policy director from Derechos Digitales in Chile, said “There are many reasons to be following the debate, even if it does not appear to be directly about us, or about our country, because it might become one of the issues in our country at any point in the future.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Carolina Botero, director of Fundación Karisma, a Colombian civil society organization, told Motherboard that she could imagine a situation similar there to that ongoing in the US if Apple does lose this fight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Colombia has a real need to fight against terrorists; there is a real national security issue here,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others remained sceptical, saying that some countries may follow their own path, as they've already been doing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“U.S. commentators greatly over-estimate the positive impact of U.S. self-imposed restrictions in national security matters on how foreign countries will act,” Pranesh Prakash, &lt;a href="https://twitter.com/pranesh"&gt;&lt;span&gt;policy director&lt;/span&gt;&lt;/a&gt; at the Centre for Internet and Society in India, told Motherboard in an email.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although it’s not a case strictly dealing with the same issues as Apple and the FBI, Prakash pointed to when the Indian government pressured BlackBerry &lt;a href="http://crackberry.com/rim-installs-blackberry-server-mumbai"&gt;&lt;span&gt;to install a server in the country&lt;/span&gt;&lt;/a&gt;, so messages could be more easily intercepted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Though the U.S. government does not put restrictions on the encryption that may be deployed by telecom networks and ISPs, the Indian government does. And we aren't even talking about an 'authoritarian' government here, but the world's largest democracy,” he wrote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The encryption debate is clearly not one limited to only the US, or even Europe. Rather, the spread of cryptography, and how governments respond to that, is likely an immediately more important issue elsewhere in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The global threat is much more serious,” than in the US, Stepanovich said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/motherboard-march-4-2016-joseph-cox-crypto-wars-are-global'&gt;http://editors.cis-india.org/internet-governance/news/motherboard-march-4-2016-joseph-cox-crypto-wars-are-global&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-04-01T16:06:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/2016-WIPIP-Agenda.pdf">
    <title>2016-WIPIP-Agenda.pdf</title>
    <link>http://editors.cis-india.org/a2k/blogs/2016-WIPIP-Agenda.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/2016-WIPIP-Agenda.pdf'&gt;http://editors.cis-india.org/a2k/blogs/2016-WIPIP-Agenda.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-03-03T01:46:12Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/blog/february-2016-report.pdf">
    <title>Febrary Report 2016.pdf</title>
    <link>http://editors.cis-india.org/accessibility/blog/february-2016-report.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/blog/february-2016-report.pdf'&gt;http://editors.cis-india.org/accessibility/blog/february-2016-report.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-03-02T02:32:32Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/telecom/news/the-register-february-15-2016-india-facebook-ruling-is-another-nail-in-coffin-of-mno-model">
    <title>India's ‘Facebook ruling’ is another nail in the coffin of the MNO model</title>
    <link>http://editors.cis-india.org/telecom/news/the-register-february-15-2016-india-facebook-ruling-is-another-nail-in-coffin-of-mno-model</link>
    <description>
        &lt;b&gt;Ability to access 'net from mobe no longer considered a miracle.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.theregister.co.uk/2016/02/15/indias_facebook_ruling_is_another_nail_in_the_coffin_of_the_mno_model/"&gt;Register&lt;/a&gt; on February 15, 2016. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Nobody could accuse India’s telecoms regulator, TRAI, of being in the operators’ pockets. This month it has, once again, set eye-watering reserve prices for the upcoming 700 MHz spectrum auction (see separate item), and now it has taken one of the toughest stances in the world on net neutrality, in effect banning zero rated or discounted content deals like Reliance Communications’ Facebook Basics, or Bharti Airtel’s Zero.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a ruling last Monday, TRAI said telecoms providers are banned from offering discriminatory tariffs for data services based on content, and from entering deals to subsidize access to certain websites. They have six months to wind down any existing arrangements which contravene the new rules. Its stance is even stricter than in other countries with strong pro-neutrality laws, such as Brazil and The Netherlands.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is the most extensive and stringent regulation on differential pricing anywhere in the world,” Pranesh Prakash, policy director at the Centre for Internet and Society, said. “Those who suggested regulation in place of complete ban have clearly lost.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such decisions, combined with high spectrum costs, will quickly make the traditional cellular business model unworkable in India, and the more that happens, the more wireless internet innovation will switch to open networks running on Wi-Fi and unlicensed spectrum. R.S. Sharma, chairman of TRAI, was careful to tell reporters that the zero rating ruling would not affect any plans to offer free Wi-Fi services, like those planned by Google in a venture with Indian Railways.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A disaster for MNOs, not Facebook&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook pronounced itself “disappointed” at TRAI’s ruling, having lobbied aggressively for a more flexible approach since RCOM was forced to suspend the Basics offering in December while the consultation process took place. But while the ruling bars the Basics offering – which provided free, low speed access, on RCOM’s network, to a selection of websites, curated by Facebook – it does not stop the social media giant pursuing other initiatives within its internet.org umbrella. These include projects to extend access using its own networks, powered by drones and unlicensed spectrum, to the unserved of India and other emerging economies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So while the TRAI decision may be a setback for Facebook, it is not the body blow that it represents for the MNOs with their huge debt loads and infrastructure costs, and low ARPUs. Facebook, with 130m users in India, has a comparable reach to the Indian MNOs (only three, Bharti Airtel, Vodafone and Idea, have more subscribers than Facebook has users), and is better skilled at monetizing those consumers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The challenge for companies like Facebook is that strict neutrality rules reduce their ability to harness others’ networks in order to reach out to new users. There are about 240m people in India who are online, but don’t use Facebook, and about 800m who are not connected, so the growth potential is far larger than in the other 37 countries where Basics is offered, such as Kenya or Zambia (Facebook is blocked in China). Using RCOM’s network and marketing activities was a far cheaper way to reach some of those people than launching drones, but Facebook has other options too, including its existing efforts to make its services more usable on very basic handsets and connections; the ability to leverage the WhatsApp brand; and partnerships with Wi-Fi providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The drones may have less immediate results than Basics, but they are a high profile example of an ongoing shift towards open networks, which has been going on for years, driven more by Wi-Fi proliferation than neutrality laws. The latter will be an accelerant, however.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;All internet will be free, not zero rated&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Currently, zero rating is an increasingly popular tactic to lure users with an apparently cheap deal and then, hopefully, see them upgrade to richer data plans, or spend money on m-commerce and premium content, in future. Zero rating involves allowing users access to selected websites and services without it affecting their data caps or allowances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US regulator has so far tolerated the practice, but the debate is raging, there and elsewhere, over whether it infringes neutrality laws, by offering different pricing for different internet services. If other authorities take the stance adopted by TRAI in India, operators will have to find new ways to attract customers and differentiate themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Increasingly, access to a truly open internet will be the baseline, and priced extremely low. That low pricing will be made commercially viable by rising use of Wi-Fi to reduce cost of data delivery, whether for MNOs, wireline providers or web players like Google and Facebook, which are moving into access provision. Providers, whether traditional or new, will have to stop regarding access to the internet as a premium service or a privilege – it will be more akin to connecting someone to the electricity grid, just the base enabler of the real revenue model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just as it’s only when users plug something into that grid that they start to pay fees, so the operators will charge for higher value offerings which ride on top of the internet – premium content, enterprise services, cloud storage, freemium applications and so on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The mobile operators have not embraced these ideas willingly. For years, the ability to access the internet from a mobile device was regarded as a value-add, almost a miracle. Now that the wireless network is often the primary access method, they need to change their ideas and be more like the smarter cablecos – which have tacked internet access onto a model driven by paid-for content and services – or the web giants, which have worked out ways to monetize ‘free’ access, from advertising to big data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This, of course, is one of the goals of internet.org and Google’s similar initiatives involving drones, white space spectrum and satellites. The more users are able to access the internet, preferably for free, and the more they see Google or Facebook as their primary conduits to the web, the more data these companies have to feed into their deep learning platforms, their context aware services and their advertising and big data engines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So while critics of TRAI said the zero rating decision was a setback to the goal of getting internet access into the hands of the huge underserved population of India, that population is too large and potentially rich for Facebook and its rivals to give up at the first hurdle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook CEO Mark Zuckerberg wrote in a blog post: "While we're disappointed with today's decision, I want to personally communicate that we are committed to keep working to break down barriers to connectivity in India and around the world. Internet.org has many initiatives, and we will keep working until everyone has access to the internet."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/telecom/news/the-register-february-15-2016-india-facebook-ruling-is-another-nail-in-coffin-of-mno-model'&gt;http://editors.cis-india.org/telecom/news/the-register-february-15-2016-india-facebook-ruling-is-another-nail-in-coffin-of-mno-model&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    

   <dc:date>2016-02-28T03:44:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-telegraph-february-18-2016-violence-call-key-to-sedition">
    <title>Violence call key to 'sedition'</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-telegraph-february-18-2016-violence-call-key-to-sedition</link>
    <description>
        &lt;b&gt;Words, whether spoken or shouted, that question or even malign the government cannot be labelled as sedition, unless they specifically incite violence, lawyers and human rights experts familiar with fundamental rights and sedition laws have said.&lt;/b&gt;
        &lt;p&gt;The article was published in the &lt;a class="external-link" href="http://www.telegraphindia.com/1160218/jsp/nation/story_69974.jsp#.VtJizM5OLIU"&gt;Telegraph&lt;/a&gt; on February 18, 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The experts say courts hearing allegations of sedition would be expected to analyse the context and intent to determine whether actions claimed by the prosecution as sedition fit its definition under the Indian Penal Code#(IPC) and various Supreme Court rulings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under Section 124A of the IPC, "whoever by words.... or by signs or visible representation or otherwise brings or attempts to bring into hatred, contempt or excites or attempts to excite disaffection towards the government established by law in India" may be punished. The section defines disaffection as "disloyalty and all feelings of enmity", but clarifies that comments that express even strong disapproval of government actions through lawful means without exciting or attempting to excite hatred, contempt, or disaffection are not an offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It is not the actions alone that count, they have to be seen along with the mental ingredients behind those actions - it is the motive that determines the character of the actions," N.R. Madhava Menon, honorary professor at Bangalore's National Law School, told The Telegraph.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The court would be expected to examine the facts and the evidence presented," he said. "It would ask questions such as, is there evidence for a conspiracy, who was behind the actions, was it an organised event, was it intended to subvert a legally established government?"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts say Supreme Court rulings over the decades have narrowed the scope of the sedition law. In a 1995 judgment, the court held that casual raising of slogans by individuals cannot be held as exciting or attempting to excite hatred or disaffection towards the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The court has ruled that only speeches intended to create disorder or disturbance or call for resorting to violence could be punishable under the section, said Ravi Nair, executive director of the South Asia Human Rights Documentation Centre, New Delhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a 1962 judgment, the Supreme Court had limited the scope of Section 124A to incitement to violence or fostering public disorder, Gautam Bhatia, a Delhi-based lawyer and author of Offend, Shock, or Disturb, a book on free speech under the Indian Constitution has pointed out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a report for the non-government Centre for Internet and Society, Bhatia said other Supreme Court rulings had clarified#that that there needed to be a "direct and imminent degree of proximity" between the speech and expression and the breach of public order, and that the relation between the two should be like a "spark in a powder keg".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Something the court has clearly rejected is the argument that it is permissible to criminalise speech and expression simply because its content might lower the authority of the government in the eyes of the public which, in turn, could foster a disrespect for law and the state, and lead to breaches of public order," Bhatia wrote.Human rights analysts point out historical episodes in other countries where citizens have expressed intense opposition to government actions, without having charges of sedition filed against them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The protests in the US against the Vietnam War during the late 1960s and protests in the UK against the Falkland War in 1982 or more recently British involvement in the Gulf war are examples," Nair said. "Supreme Court rulings in India have narrowed the scope of the section on sedition to cover only actions that actually call for violence."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nair said sedition should be seen as an anachronism in any mature democracy. India's sedition law was written during British rule, but the UK abolished its own sedition and seditious libel law in 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-telegraph-february-18-2016-violence-call-key-to-sedition'&gt;http://editors.cis-india.org/internet-governance/news/the-telegraph-february-18-2016-violence-call-key-to-sedition&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-02-28T03:06:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/ozy-february-19-2016-sanjena-sathian-why-internet-is-making-india-furious">
    <title>Why the Internet is Making India Furious</title>
    <link>http://editors.cis-india.org/internet-governance/news/ozy-february-19-2016-sanjena-sathian-why-internet-is-making-india-furious</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) in Bangalore is a kind of hacker club for wonks and lawyers obsessed with issues of digital rights and global development. Not exactly the mainstream kids’ lunch table. But the Center was brought into sudden relief this week, thanks to … Mark Zuckerberg. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read Sanjena Sathian's blog post &lt;a class="external-link" href="http://www.ozy.com/pov/why-the-internet-is-making-india-furious/67211"&gt;published by Ozy &lt;/a&gt;on February 19, 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a splashy bit of news, India’s telecom authority &lt;a href="http://www.ozy.com/presidential-daily-brief/pdb-67802/net-result-67817" target="_blank"&gt;&lt;span&gt;rejected a program called Free Basics&lt;/span&gt;&lt;/a&gt;, which the Facebook team had been promoting as a way to get free Internet to the masses. (Here on the subcontinent, more than 300 million people use the Internet — but that’s only about a quarter of the population.) The idea: Facebook would allow free access to a handful of websites (the “basics”) to everyone; users would pay for further content. The objections: On the dramatic end came comparisons to &lt;a href="http://www.ozy.com/fast-forward/the-surprising-gift-of-a-colonial-education/39554" target="_blank"&gt;&lt;span&gt;colonialism&lt;/span&gt;&lt;/a&gt;; on the wonkier, objections based on the principles of net neutrality, or the idea that all Internet content should be treated the same. The threat the critics saw in Free Basics was that of the Web as a two-lane highway — the free stuff for the poor folks, and the good stuff for those who can afford it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mumbai-based Sanjena Sathian spoke to CIS cofounder and policy director Pranesh Prakash about the changing landscape of web rights that led up to the news.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;OZY:&lt;/h3&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;Tell us what you’re thinking in the wake of India’s decision.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h4 style="text-align: justify; "&gt;Pranesh Prakash:&lt;/h4&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The order seemed to fix the issue with a sledgehammer rather than a scalpel. It over-regulates and bans things that are beneficial along with that that aren’t. They should have aimed for &lt;em&gt;discriminatory &lt;/em&gt;pricing, but they’ve instead eliminated all differential pricing, even when it’s not discriminatory.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;What should come next, in my opinion — it is imperative to ensure that governmental resources are used to provide free access to the Internet. If you’ve taken away something that could have helped and said no, no, no, it’s not good for you, then you are under an obligation to provide a replacement.&lt;/p&gt;
&lt;h4 dir="ltr" style="text-align: justify; "&gt;OZY:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;How do you think the larger political conversations going on in India right now seep into the debates about digital rights?&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;PP:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Many people think the largest divider is between those who are from a developing country or a developed country. I think the larger divide is between those who are politically skeptical of states — more libertarian — versus those who are more trusting of states and see states as having a role to play in Internet governance. How you think the poor in India should get Internet — should that be provided by government or by market mechanisms — well, your political philosophies will play a role. In India, one tends to find fewer free-market fundamentalists than one would meet in, say, San Francisco.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;OZY:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;I think, increasingly, post-Snowden in particular, people think of digital rights as human rights. Where do you see things going wrong on a rights front here in India?&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;PP:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Oh, wow … so many ways. In India we have a situation where, right now, more than 3,000 websites were blocked by the government, but no one knows what these sites are. No one knows whether they were blocked through mechanisms that ensure accountability. There is no transparency around any of these. And this is just the visible tip of the iceberg. And how do I know this? I sent a right-to-information request to the government and they gave me this answer. But beyond this, they put in place a few years ago a law which allows for websites and any kind of web content to be censored by &lt;em&gt;anyone&lt;/em&gt;. And all they have to do is send a request to any “intermediary,” which could be anything from your ISP to your web host to your DNS provider.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;OZY:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Wait, so what does that mean? I get annoyed at a site — where do I go to lodge my complaint?&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;PP:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;All these websites are required by the law to appoint a particular person as a “grievance redressal officer.”&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;OZY:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;What a title!&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;PP:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Yes … and there are more than 40 grounds for grievances that have been listed in the law, including things such as “causing harm to minors” and certain speech being “disparaging.” Now, I engage in disparaging speech at least 12 times a day. And that’s perfectly legal under Indian law!&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;OZY:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Eep. Any good news, though?&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;PP:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;A case went all the way up to the Supreme Court, [involving a young woman named] Shreya Singhal. There was a section 66A, quite an odious provision, that allowed for any kind of “offensive” or “annoying” speech to cause that person to be put in prison for up to three years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two teenage girls in Maharashtra, upon the death of a politician, put out a comment on social media. The death had caused a &lt;em&gt;bandh&lt;/em&gt;, a curfew of sorts in Mumbai, and done not officially by the government but by political party workers. One girl said on Facebook, sure, go ahead, respect this politician, but why inconvenience so many citizens? Her friend liked this. And a case was launched against them. Similarly, some cartoons by an anticorruption activist were challenged and he was imprisoned briefly and released on bail.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;OZY:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;It’s always the cartoonists.…&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;PP:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Yes, and one professor in Calcutta — for &lt;em&gt;forwarding &lt;/em&gt;a cartoon, he was placed under this law too. Many cases of perfectly fine political speech were made illegal thanks to this law. Eventually, though, in a landmark decision, the Supreme Court struck down this law, and this is the first time in almost three decades that the Supreme Court has struck off an entire law for being unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, yes. Mostly? It’s not been pretty.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/ozy-february-19-2016-sanjena-sathian-why-internet-is-making-india-furious'&gt;http://editors.cis-india.org/internet-governance/news/ozy-february-19-2016-sanjena-sathian-why-internet-is-making-india-furious&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    

   <dc:date>2016-02-28T03:01:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
