<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1581 to 1595.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/country-report.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/publications/privacy-in-hyderabad.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy-healthcare.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/publications/privacy-bangalore-conference"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/publications/privacy-hyderabad-11-poster.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/publications/privacy-hyderabad-july11.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/P1.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy-events.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/PrivacyDecisionProcess.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/publications/privacy-ahmedabad-conference-presentation.pptx"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/publications/privacy-conference-ahmedabad.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/publications/privacy-nujs-conference"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/one-world-indentity-kaelyn-lowmaster-march-17-2017-privacy-concerns-multiply-for-aadhaar-indias-national-biometric-identity-registry"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy/privacy_privacybydesign"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/publications/it-act/PrivacybyDesignPoster.jpg"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/country-report.pdf">
    <title>Privacy in India — Country Report</title>
    <link>http://editors.cis-india.org/internet-governance/country-report.pdf</link>
    <description>
        &lt;b&gt;Privacy India in partnership with Privacy International, UK, Society in Action Group, Gurgaon, and the Centre for Internet and Society, Bangalore are pleased to bring you the early draft of a Country Report on the state of privacy in India. &lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/country-report.pdf'&gt;http://editors.cis-india.org/internet-governance/country-report.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-02-29T13:26:05Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/publications/privacy-in-hyderabad.pdf">
    <title>Privacy in Hyderabad </title>
    <link>http://editors.cis-india.org/internet-governance/publications/privacy-in-hyderabad.pdf</link>
    <description>
        &lt;b&gt;A conference organized by CIS in Hyderabad.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/publications/privacy-in-hyderabad.pdf'&gt;http://editors.cis-india.org/internet-governance/publications/privacy-in-hyderabad.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-06-16T10:55:29Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy-healthcare.pdf">
    <title>Privacy in Healthcare Chapter</title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy-healthcare.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy-healthcare.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/privacy-healthcare.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-08-19T05:13:23Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/publications/privacy-bangalore-conference">
    <title>Privacy in Bangalore</title>
    <link>http://editors.cis-india.org/internet-governance/publications/privacy-bangalore-conference</link>
    <description>
        &lt;b&gt;pdf&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/publications/privacy-bangalore-conference'&gt;http://editors.cis-india.org/internet-governance/publications/privacy-bangalore-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-02-01T05:38:58Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/publications/privacy-hyderabad-11-poster.pdf">
    <title>Privacy Hyderabad July Poster</title>
    <link>http://editors.cis-india.org/internet-governance/publications/privacy-hyderabad-11-poster.pdf</link>
    <description>
        &lt;b&gt;poster download&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/publications/privacy-hyderabad-11-poster.pdf'&gt;http://editors.cis-india.org/internet-governance/publications/privacy-hyderabad-11-poster.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-06-08T11:09:04Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/publications/privacy-hyderabad-july11.pdf">
    <title>Privacy Hyderabad July Conference</title>
    <link>http://editors.cis-india.org/internet-governance/publications/privacy-hyderabad-july11.pdf</link>
    <description>
        &lt;b&gt;pdf&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/publications/privacy-hyderabad-july11.pdf'&gt;http://editors.cis-india.org/internet-governance/publications/privacy-hyderabad-july11.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-06-08T10:54:20Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/P1.jpg">
    <title>Privacy Guwahati - 1</title>
    <link>http://editors.cis-india.org/home-images/P1.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/P1.jpg'&gt;http://editors.cis-india.org/home-images/P1.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-07-21T07:33:49Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy-events.pdf">
    <title>Privacy Events Poster</title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy-events.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy-events.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/privacy-events.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-09-24T10:19:39Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/PrivacyDecisionProcess.png">
    <title>Privacy Decision Process</title>
    <link>http://editors.cis-india.org/home-images/PrivacyDecisionProcess.png</link>
    <description>
        &lt;b&gt;Privacy Decision Process&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/PrivacyDecisionProcess.png'&gt;http://editors.cis-india.org/home-images/PrivacyDecisionProcess.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-12-14T16:23:34Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/publications/privacy-ahmedabad-conference-presentation.pptx">
    <title>Privacy Conference in Ahmedabad Powerpoint Presentation</title>
    <link>http://editors.cis-india.org/internet-governance/publications/privacy-ahmedabad-conference-presentation.pptx</link>
    <description>
        &lt;b&gt;Matthew's presentation&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/publications/privacy-ahmedabad-conference-presentation.pptx'&gt;http://editors.cis-india.org/internet-governance/publications/privacy-ahmedabad-conference-presentation.pptx&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-04-01T09:34:16Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/publications/privacy-conference-ahmedabad.pdf">
    <title>Privacy Conference in Ahmedabad PDF</title>
    <link>http://editors.cis-india.org/internet-governance/publications/privacy-conference-ahmedabad.pdf</link>
    <description>
        &lt;b&gt;pdf&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/publications/privacy-conference-ahmedabad.pdf'&gt;http://editors.cis-india.org/internet-governance/publications/privacy-conference-ahmedabad.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-04-01T07:43:09Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/publications/privacy-nujs-conference">
    <title>Privacy Conference at NUJS</title>
    <link>http://editors.cis-india.org/internet-governance/publications/privacy-nujs-conference</link>
    <description>
        &lt;b&gt;file&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/publications/privacy-nujs-conference'&gt;http://editors.cis-india.org/internet-governance/publications/privacy-nujs-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2010-12-29T05:05:43Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/one-world-indentity-kaelyn-lowmaster-march-17-2017-privacy-concerns-multiply-for-aadhaar-indias-national-biometric-identity-registry">
    <title>Privacy concerns multiply for Aadhaar, India’s national biometric identity registry</title>
    <link>http://editors.cis-india.org/internet-governance/news/one-world-indentity-kaelyn-lowmaster-march-17-2017-privacy-concerns-multiply-for-aadhaar-indias-national-biometric-identity-registry</link>
    <description>
        &lt;b&gt;The largest and most sophisticated biometric identity system of any country in the world, India’s Aadhaar, is sparking new fears that the personal data it stores on more than 1.1 billion people could be vulnerable to exploitation.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kaelyn Lowmaster was published by &lt;a class="external-link" href="https://oneworldidentity.com/2017/03/17/privacy-concerns-multiply-aadhaar-indias-national-biometric-identity-registry/"&gt;One World Identity&lt;/a&gt; on March 17, 2017, Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar, which translates to “foundation” in Hindi, is a unique 12-digit code tied to citizens’ &lt;a href="https://oneworldidentity.com/2017/02/02/indias-aadhaar-id-program-improve-biometric-security-new-bionetra-iris-partnership/"&gt;biometric data&lt;/a&gt; and personal information. The system was launched in 2009 in an effort  to extend social services to India’s millions of unregistered citizens,  and to cut down on welfare benefit “leakage” resulting from an opaque  and often corrupt bureaucracy.&lt;/p&gt;
&lt;blockquote class="td_box_right td_quote_box" style="text-align: justify; "&gt;
&lt;h5&gt;Constructing a centralized repository of biometric data on nearly a  fifth of the world’s population has raised serious concerns among  privacy advocates.&lt;/h5&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The government has also looked to Aadhaar data to underpin mobile  payment transfer platforms, which have become crucial for cashless  transactions during the country’s &lt;a href="https://www.forbes.com/sites/wadeshepard/2016/12/14/inside-indias-cashless-revolution/#d38bb294d124"&gt;demonetization push&lt;/a&gt; over past year.&lt;/p&gt;
&lt;blockquote class="pullquote" style="text-align: justify; "&gt;But constructing a centralized repository of biometric data on nearly  a fifth of the world’s population has raised serious concerns among  privacy advocates, who cite several vulnerabilities both with the  Aadhaar system and the Modi administration’s planned expansion.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Despite this, recent metrics indicate that Aadhaar has been  enormously successful in achieving those goals. Though the program is  theoretically voluntary, &lt;a href="http://timesofindia.indiatimes.com/india/99-of-indians-over-18-now-have-aadhaar/articleshow/56820818.cms"&gt;more than 99%&lt;/a&gt; of Indian adults are now enrolled. Over &lt;a href="http://www.economist.com/news/business/21712160-nearly-all-indias-13bn-citizens-are-now-enrolled-indian-business-prepares-tap"&gt;three billion&lt;/a&gt; individual identity verifications have been conducted, and some reports indicate that the Indian government is saving &lt;a href="http://economictimes.indiatimes.com/news/economy/finance/aadhaar-id-saving-indian-govt-about-1-billion-per-annum-world-bank/articleshow/50575112.cms"&gt;a billion dollars per year&lt;/a&gt; now that welfare subsidies can be paid to citizens directly through Aadhaar-verified fund transfers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prime Minister Narendra Modi has ambitions to broaden the system even  further, seeking to use Aadhaar as the gateway for accessing government  programs ranging from public education to subsidized cooking gas, as  well as partnering with private companies to offer services facilitated  by the Aadhaar database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns, however, remain. One primary worry is that India’s legal  framework for information security is still weak and fragmented, despite  government &lt;a href="http://pib.nic.in/newsite/mberel.aspx?relid=158849"&gt;assurances&lt;/a&gt; that Aadhaar biometrics have never been misused or stolen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite this, recent metrics indicate that Aadhaar has been enormously  successful in achieving those goals. Though the program is theoretically  voluntary, &lt;a href="http://timesofindia.indiatimes.com/india/99-of-indians-over-18-now-have-aadhaar/articleshow/56820818.cms"&gt;more than 99%&lt;/a&gt; of Indian adults are now enrolled. Over &lt;a href="http://www.economist.com/news/business/21712160-nearly-all-indias-13bn-citizens-are-now-enrolled-indian-business-prepares-tap"&gt;three billion&lt;/a&gt; individual identity verifications have been conducted, and some reports indicate that the Indian government is saving &lt;a href="http://economictimes.indiatimes.com/news/economy/finance/aadhaar-id-saving-indian-govt-about-1-billion-per-annum-world-bank/articleshow/50575112.cms"&gt;a billion dollars per year&lt;/a&gt; now that welfare subsidies can be paid to citizens directly through Aadhaar-verified fund transfers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prime Minister Narendra Modi has ambitions to broaden the system even  further, seeking to use Aadhaar as the gateway for accessing government  programs ranging from public education to subsidized cooking gas, as  well as partnering with private companies to offer services facilitated  by the Aadhaar database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns, however, remain. One primary worry is that India’s legal  framework for information security is still weak and fragmented, despite  government &lt;a href="http://pib.nic.in/newsite/mberel.aspx?relid=158849"&gt;assurances&lt;/a&gt; that Aadhaar biometrics have never been misused or stolen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="td-animation-stack-type0-1 aligncenter wp-image-30798" height="447" src="https://oneworldidentity.com/wp-content/uploads/2017/03/Adhar_DSCN4543-1024x768-2-300x225.jpg" width="596" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There are no regulations in India on safeguards over and procedures  for the collection, processing, storage, retention, access, disclosure,  destruction, and anonymization of sensitive personal information by any  service provider,” according to a 2016 &lt;a href="http://pubdocs.worldbank.org/en/655801461250682317/WDR16-BP-Aadhaar-Paper-Banerjee.pdf"&gt;World Bank report&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a href="http://www.livemint.com/Opinion/C4NOYNosPTZuRGjgH7UMLP/Indias-privacy-nonlaw.html"&gt;patchwork of rules&lt;/a&gt; outlining “reasonable security practices and procedures” for personal  data has accumulated since Aadhaar was launched, but there is no  codified law outlining how data in the system must be secured, or what  penalties exist for potential leaks, fraud or misuse.&lt;/p&gt;
&lt;blockquote class="pullquote" style="text-align: justify; "&gt;“Imagine a situation where the police (are) secretly capturing the iris data of protesters and then identifying them through their biometric records” – Sunil Abraham, executive director of the Centre for Internet and Society in Bangalore&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;This regulatory gap poses a particularly acute risk now  that the   government has begun offering companies and app developers  support for   starting new businesses that use Aadhaar data. Through a  new  initiative  called &lt;a href="https://indiastack.org/about/"&gt;IndiaStack&lt;/a&gt;,   the  administration is providing open program interfaces for companies   in  fintech, healthcare, and other areas to integrate Aadhaar-based    transactions into their business platforms. While IndiaStack’s terms of    use explicitly state that user consent is required for any information    sharing between service providers and the Aadhaar database, doubts    remain about the integrity of the network infrastructure and the lack of    clarity surrounding acceptable information sharing and storing    protocols.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another source of concern is the risk that Aadhaar information could be  leveraged by the government itself for political purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Maintaining a central database is akin to getting the keys of every  house in Delhi and storing them at a central police station,” Sunil  Abraham, executive director of the Centre for Internet and Society in  Bangalore, &lt;a href="http://in.reuters.com/article/india-aadhaar-privacy-fears-idINKCN0WI2JW"&gt;told&lt;/a&gt; Reuters. “It is very easy to capture iris data of any individual with  the use of next generation cameras. Imagine a situation where the police  (are) secretly capturing the iris data of protesters and then  identifying them through their biometric records.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further stoking fears of federal overreach, the Modi administration has &lt;a href="http://www.thehindu.com/news/national/Supreme-Court-finds-govt.-defying-its-order-on-Aadhaar/article14999391.ece"&gt;attempted&lt;/a&gt; to make Aadhaar registration mandatory in certain sectors, violating a  Supreme Court ruling from October 2015 that enrollment must remain  voluntary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still, the benefits of building on the Aadhaar identity system appear to  be outweighing the risks for now, and the system is gathering momentum  worldwide. The World Bank is &lt;a href="http://www.livemint.com/Politics/UEQ9o8Eo8RiaAaNNMyLbEK/Aadhaar-goes-global-finds-takers-in-Russia-and-Africa.html"&gt;helping market&lt;/a&gt; the Aadhaar model abroad, and Russia, Morocco, Tunisia, and Algeria  have all expressed interest in instituting national biometric identity  programs of their own. Microsoft is already &lt;a href="http://economictimes.indiatimes.com/industry/tech/software/microsoft-to-launch-skype-with-aadhaar-seeding-for-banking/articleshow/57299071.cms"&gt;on board&lt;/a&gt;, and Google is &lt;a href="http://economictimes.indiatimes.com/opinion/interviews/google-in-talks-with-government-to-partner-for-aadhaar-upi-caesar-sengupta-vice-president-next-billion-users-at-google/articleshow/54556320.cms"&gt;negotiating&lt;/a&gt; ways to get involved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar may indeed live up to is potential and become the global  standard for universal legal identity, but until India can manage to  create more robust mechanisms to protect citizens’ personal data, their  security could remain uncertain.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/one-world-indentity-kaelyn-lowmaster-march-17-2017-privacy-concerns-multiply-for-aadhaar-indias-national-biometric-identity-registry'&gt;http://editors.cis-india.org/internet-governance/news/one-world-indentity-kaelyn-lowmaster-march-17-2017-privacy-concerns-multiply-for-aadhaar-indias-national-biometric-identity-registry&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-22T14:38:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy/privacy_privacybydesign">
    <title>Privacy By Design — Conference Report</title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy/privacy_privacybydesign</link>
    <description>
        &lt;b&gt;How do we imagine privacy? How is privacy being built into technological systems? On April 16th,The Center for Internet and Society hosted Privacy by Design, an Open Space meant to answer these questions and more around the topic of privacy. Below is a summary of the conversations and dialogs from the event. &lt;/b&gt;
        
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;On April 16th, The Center for Internet and Society hosted Privacy by Design, an Open Space meant to foster discussions around questions related to how privacy is being designed into technological systems. The day opened with two basic questions: How do we imagine privacy? And how are individuals building technology systems incorporating privacy into the system? Throughout the day the conversations took many twist and turns, but at the end of the day three basic points about privacy had come out of the many discussions: 1. Privacy cannot be limited to one definition; it is constantly changing based on person and on context 2. To a person - privacy is a function of abuse and violation 3. The increased generation of data that was made possible by web 2.0 has lead to a rise in privacy issues and is significantly changing many traditional concepts, spaces, and relationships – such as what constitutes a public space, and the relationship between a state and its citizens.&lt;/p&gt;
&lt;h3&gt;Database architecture and privacy&lt;/h3&gt;
&lt;p&gt;The morning discussion focused on databases and privacy, and began with questions like: How can a database be built to protect privacy? When a database is built, what role does privacy play in the migration of data? Is privacy protected in databases simply by limiting access to certain parts of data sets? Though many of these were left unanswered, the conversation highlighted the fact that th databases are coded to segregate /regulate users and information in order to protect the system. Thus, databases are architected to incorporate privacy in such a way that protects the viability of only the system and not the individual. In our research we have seen many cases of this. Individual’s privacy has been violated because of malfunctioning or poorly constructed databases. For example, currently Indian governmental databases often have incorrect information, individuals do not have the ability to access and change their information, and if an individual’s information is compromised the government is not held accountable, and there is no course of action that an individual can take towards redress.&lt;/p&gt;
&lt;h3&gt;Security vs. Privacy&lt;/h3&gt;
&lt;p&gt;Embedded in this understanding of how privacy is built into technological systems is the question of what security is, and when systems are built, whether privacy and security are considered to be essentially the same. Thus far in our research we have distinguished between privacy and security, saying that, security and privacy have an interesting relationship, because they go hand in hand, and yet at the same time have a different focus, because of this differing focus data security and privacy are not the same. Data breaches that contain personal information of any sort that can be matched, tracked or otherwise co-related to a person or persons will result in a privacy breach too. Though data security is critical for protecting privacy, because data security and privacy have different focuses, the principles that each follows are also different and sometimes conflicting. For example, data security focuses on data retention, logging, etc, while privacy focuses on consent, restricted access to data, limited data retention, and anonymity. If security measures are carried out without privacy interests in mind, privacy violations can easily result. Therefore we have thought that data security should influence and support a privacy regime, but not drive it.&lt;/p&gt;
&lt;p&gt;security and privacy have an interesting relationship, because they go hand in hand, and yet at the same time have a different focus, because of this differing focus data security and privacy are not the same. Data breaches that contain personal information of any sort that can be matched, tracked or otherwise co-related to a person or persons will result in a privacy breach too. Though data security is critical for protecting privacy, because data security and privacy have different focuses, the principles that each follows are also different and sometimes conflicting. For example, data security focuses on data retention, logging, etc, while privacy focuses on consent, restricted access to data, limited data retention, and anonymity. If security measures are carried out without privacy interests in mind, privacy violations can easily result. Therefore we have thought that data security should influence and support a privacy regime, but not drive it.&lt;/p&gt;
&lt;h3&gt;The right to be forgotten and regulation of data&lt;/h3&gt;
&lt;p&gt;The possibility of creating systems with "off switches" also came out of this thread of conversation. For instance, can a database be structured to show only necessary information to third parties based on the context. In this scenario a card would be created that has all of an individual’s information on it, but only the pertinent information will be shown based on the different situations - if, for example, a teenager goes to a bar, the card will only show a third party that he is over 18. This idea is already taking shape in many Western countries, and is similar to the idea of a federated identity system. A question to ask though is if such a system could work for India, or be even more appropriate for India than a system like the UID. The purpose of federated systems of identity is to take context into consideration, and enable users to keep contexts separate, and link information about an individual only takes place when consent is given by the user. In response to the idea of an identity system that allows only certain information to be seen by third parties based on the situation, it was brought out that privacy is not protected simply by the separation of data into public or private categories, because all data have the potential to be misused. The immediate response to this concern was that if all data have the potential to be mis-used – than the use of data should be carefully regulated. The regulation of data though is also a double edged sword. On one hand regulating the use of data can stop a company from misusing information, but on the other hand it can keep a country from having full and equal access to the internet. A question that came out of this discussion on regulation was about the right to be forgotten. Does an individual have the right to regulate all information about themselves that is in the public sphere? Can they ask for their photos or videos to be taken down from the internet? In India this question has yet to be answered by the law, and it is a question that our research is looking into.&lt;/p&gt;
&lt;p&gt;The purpose of federated systems of identity is to take context into consideration, and enable users to keep contexts separate, and link information about an individual only takes place when consent is given by the user. In response to the idea of an identity system that allows only certain information to be seen by third parties based on the situation, it was brought out that privacy is not protected simply by the separation of data into public or private categories, because all data have the potential to be misused. The immediate response to this concern was that if all data have the potential to be mis-used – than the use of data should be carefully regulated. The regulation of data though is also a double edged sword. On one hand regulating the use of data can stop a company from misusing information, but on the other hand it can keep a country from having full and equal access to the internet. A question that came out of this discussion on regulation was about the right to be forgotten. Does an individual have the right to regulate all information about themselves that is in the public sphere? Can they ask for their photos or videos to be taken down from the internet? In India this question has yet to be answered by the law, and it is a question that our research is looking into.&lt;/p&gt;
&lt;h3&gt;Data types and privacy&lt;/h3&gt;
&lt;p&gt;Emerging from the conversation on database structure, a conversation on types of data in databases was started. The question was raised as to whether or not databases can actually handle certain types of data. The example given was caste-related data. Information about a person’s caste is constantly changing as people lie about their caste, change their caste, and become married and take on another caste. Furthermore, some people do not want to live with their caste and want to shed off their caste. Therefore, can a database accurately represent such a dynamic data set? Is it dangerous to put such a politically volatile concept as caste into a database where it will confine a person to one definition once entered? Another side to this question though is that perhaps it is in fact necessary to try and place a person in one caste, as there benefits enshrined by law based on a person’s caste, and an individual who has the ability to change his/her caste at their whim therefore defeats and takes advantage of governmental benefits. The point was also raised that by placing information like caste and identity into a database, governments have the ability to divide the country into subsets of identities that they decide to generate. Caste is not the only data that faces these complications and issues. For instance religion and race raise similar question. How can you define and represent a person’s relationship with God in a database? How to you represent a child of multiracial parents on a database?&lt;/p&gt;
&lt;h3&gt;Changes in the relationship between the state and the citizen&lt;/h3&gt;
&lt;p&gt;It was also brought out that the representation of citizens’ identities on a database changes the relationship between a state and its citizenry. States no longer see citizens as individuals, but instead as data samples. The UID is an example of an e-governance program that if enacted, could further such a change in the relationship between the state and the citizen, as the whole of India will suddenly and ubiquitously be recognized by the Government (and other entities/organizations) according to their aadhaar number. The relationship between the state and the citizen is not the only social change that databases bring about. Databases also change the concept of public space. As web 2.0 has facilitated the generation of large amounts of data, public space has become a space where one enters and interacts as a dataset. For example face book and twitter allow individuals to create datasets of them and interact with other people through their datasets. Beyond social networking online banking and online shopping also push people to form datasets about themselves and interact with services that were traditionally done in person as individuals, as datasets.&lt;/p&gt;
&lt;h3&gt;Questions of ownership&lt;/h3&gt;
&lt;p&gt;The above thread of conversation led to the next question of whether or not individuals control technology or whether technology controls individuals. The example of Facebook was used to illustrate this question. Even though Facebook has a privacy policy, once a person engages with Facebook he or she accepts Facebook’s definition of privacy – which is two tiered. On one level Facebook defines user privacy in terms of restriction - allowing the user to limit who can see their profiles. On another level Facebook’s privacy policy allows the company to share and sell personal information. In these ways companies are constructing databases so that instead of the company being the custodian of information – an entity that provides a structure to protect and hold information - the companies are now the owners of information- selling and using individuals information for profit. In India, this is a problem. Companies, once they collect data, treat it as their own - selling and sharing data with third parties, or using it in ways that were not agreed to by the customer. The question of ownership was a critical question for the group. In the discussions it was important to individuals that they had control and ownership over their information. Individuals felt that information that could be traced back to them or their identity belonged to them, and that in order to protect privacy consent should be secured before any information is used. For instance, data mining by websites without notice was seen as a violation of privacy. The collection of data in public places for marketing purposes without a person’s consent or awareness was similarly seen as a privacy violation. It was also brought out from this conversation that the digitization of information has caused a commercialization of information, and that has led to a sense of ownership and need for privacy over information. For example, before, if someone were to take one’s name and mis-use it, that person was charged with defamation – not for violation of privacy – but if someone misuses information that is in a database or online, that person is now charged for a violation of privacy. This shift in thinking is another example of how web 2.0 has increased privacy violations.&lt;/p&gt;
&lt;h3&gt;Perceptions and expectations of privacy&lt;/h3&gt;
&lt;p&gt;The day ended with a conversation about the perceptions and expectations of privacy. Privacy as it relates to an individual is almost wholly dependent on expectation, which changes from person to person, from community to community, and from culture to culture. Just as the expectation of privacy varies between individuals, so does the degree of violation. Thus, it is important to recognize the changing nature of privacy, because it explains why it is difficult for the legal system to address all the nuances of privacy with one broad legislation. This point has been crucial in our research thus far as we are consulting with the public, analyzing legislation, and following news items to see if privacy legislation is wanted and needed in India, and if it is - how it should be shaped.&lt;/p&gt;
&lt;p&gt;From the conversation on perceptions of privacy and privacy violations it was also brought out that the concept of privacy is on one hand related to the notion of ownership, and on the other hand it is related to the violation. From the experiences shared by individuals, their privacy never became a concern until it was violated, or they learned about someone else’s privacy being violated. This led to the observation that not only is it difficult for the law to address privacy violations because the violation is based on perception, but also because the effect when one’s privacy is violated is often an emotional one.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;The conversations held throughout the day showed the dynamic and personal nature of privacy, and how when databases are constructed, and how our lives made digital this personal aspect is easily lost. When we think about the conversations held throughout the day in relation to our initial questions: what are the different ways of imagining privacy, and how is privacy being built into technological systems, besides the three basic themes of privacy highlighted in the beginning of this blog - there emerged to more themes. One theme portrayed an imagination of privacy that is more personal, and that address the emotional component and the perception component to privacy. Another theme portrayed an imagination of privacy that is technologically more controlled, that allows for more personal regulation, more precise segregation of information in a database, and restricted access by third parties. This imagination of privacy can be and is being met by new and developing technologies. Increasingly in many countries technology is being structured with privacy built into the system. The larger question that this open space has raised, and not completely answered is if privacy legislation can adequately protect an individual’s privacy, and if it cannot, can technology can fill the gaps that privacy legislation leaves open.&lt;/p&gt;

&lt;h3&gt;&lt;/h3&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy/privacy_privacybydesign'&gt;http://editors.cis-india.org/internet-governance/blog/privacy/privacy_privacybydesign&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-08-22T12:03:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/publications/it-act/PrivacybyDesignPoster.jpg">
    <title>Privacy by Design </title>
    <link>http://editors.cis-india.org/internet-governance/publications/it-act/PrivacybyDesignPoster.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/publications/it-act/PrivacybyDesignPoster.jpg'&gt;http://editors.cis-india.org/internet-governance/publications/it-act/PrivacybyDesignPoster.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-04-01T03:49:33Z</dc:date>
   <dc:type>Image</dc:type>
   </item>




</rdf:RDF>
