<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 291 to 305.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/cpdp-computers-privacy-and-data-protection-2017"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/bgr-nandini-yadav-january-24-2017-whatsapp-forward-promising-pm-modi-scheme-for-double-recharge-is-a-scam"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/financial-times-amy-kazmin-january-23-2017-for-indias-complaints-department-visit-facebook-live"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/news/workplace-solutions-champions-consultative-workshop"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/events/odia-wikipedia-and-orientation-training-programme"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/training-programme-for-chairs-convenor-and-experts-for-international-standardization-work"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/files/training-programme-structure"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/economic-times-neha-alawadhi-january-13-2017-govt-should-take-a-relaxed-view-of-violations-of-flag-code-in-products-sold-in-foreign-countries-experts"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/economic-times-january-14-2017-sunil-abraham-on-aadhaar-misuse-during-demonetisation"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/business-standard-january-16-2017-sanjay-kumar-singh-lost-your-phone-here-is-how-you-can-make-your-mobile-theft-proof"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/ndtv-december-24-2016-demonetisation-cost-versus-benefit"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/business-standard-mj-antony-ayan-pramanik-apurva-venkat-supreme-court-issues-notice-to-whatsapp-centre-on-data-privacy"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/bloomberg-mayank-jain-january-17-2017-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/cpdp-computers-privacy-and-data-protection-2017">
    <title>CPDP (Computers, Privacy and Data Protection) 2017 </title>
    <link>http://editors.cis-india.org/internet-governance/news/cpdp-computers-privacy-and-data-protection-2017</link>
    <description>
        &lt;b&gt;Amber Sinha participated as a panelist in a panel on 'EU Adequacy Status for International Data Transfers' in Brussels, Belgium on January 26, 2017. The event was organized by Privacy International.&lt;/b&gt;
        &lt;h3&gt;EU Adequacy Status for International Data Transfers&lt;/h3&gt;
&lt;p&gt;According to EU data protection laws, countries only have blanket freedoms to receive and process personal data from the EU if they have been awarded an adequacy status by the Commission. Given the vital importance of data transfers between countries in the global economy, having such a status is a valuable asset, as other available legal means of transfer are more limited.  India, for e.g. is said to be losing in excess of Euro 30 billion per year through lost trade with the EU, as it lacks such adequacy status.  In the 20+ years since the data protection Directive was passed, only 11 states  have been decided to be ‘adequate’ by the Commission – which include the US with its recently awarded Privacy Shield. The Commission methodology and procedures for granting adequacy to countries is increasingly under scrutiny – for e.g. a recent study found that the way it makes adequacy decisions for its trade partners could be accused of being obscure, inconsistent and without clear criteria or rules or timeframes. This also makes EU data protection laws vulnerable to challenge under world trade rules. This panel will address the following questions:&lt;br /&gt;&lt;br /&gt;Questions to be considered:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;On what basis does the EU and the Commission make decisions on whom to grant adequacy status?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;In the light of the Schrems judgement defining adequacy as ‘essentially equivalent’, should all past decision be revised?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Given that more than 100 countries now have general data protection laws, how should countries be chosen for adequacy judgements?&lt;/li&gt;
&lt;li&gt;What criteria and methodologies should be used to ensure all countries are treated equally,  to ensure fundamental rights are equally upheld, and to avoid possible challenge under WTO rules?&lt;/li&gt;
&lt;li&gt;(New) What are your views on the EC proposal to facilitate international transfers of personal data, recently published?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;Panel:&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Chair: &lt;/b&gt;Jan           Albrecht MEP&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Panel: &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Kristina Irion&lt;/b&gt;, Institute of           Information Law (IVIR), University of Amsterdam:&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Kristina is expert academic in both data             protection and related trade issues, author of recent study&lt;/i&gt; ‘&lt;a href="http://www.ivir.nl/publicaties/download/1807"&gt;Trade             and Privacy: complicated bedfellows&lt;/a&gt;’&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Amber Sinha&lt;/b&gt;,             Centre for Internet and Society (CIS), India&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Amber is policy researcher               specialising in privacy and big data ; CIS is an India NGO               and partner organisation of Privacy International&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Daniel Cooper&lt;/b&gt;,             Covington and Burling ;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Dan is partner at this global               law firm, which advises both business and government               clients round the world ; he leads the data protection               practice in London &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Bruno Gencarelli&lt;/b&gt;,             European Commission DG Justice ;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Bruno is the head of the new DG               Justice unit on data flows and data protection, and as               such the Commission boss of adequacy&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Veronica Perez-Asinari&lt;/b&gt;,             European Data Protection Supervisor (EDPS).&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Veronica is the EDPS head of               unit for supervision and enforcement; she has also             recently spent some months working with the Argentina DPA             (Argentina has EU adequacy). &lt;/i&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Moderator: &lt;/b&gt;Anna           Fielder, Privacy International&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/cpdp-computers-privacy-and-data-protection-2017'&gt;http://editors.cis-india.org/internet-governance/news/cpdp-computers-privacy-and-data-protection-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-03T02:02:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/bgr-nandini-yadav-january-24-2017-whatsapp-forward-promising-pm-modi-scheme-for-double-recharge-is-a-scam">
    <title>WhatsApp forward promising PM Modi scheme for double recharge is a scam</title>
    <link>http://editors.cis-india.org/internet-governance/news/bgr-nandini-yadav-january-24-2017-whatsapp-forward-promising-pm-modi-scheme-for-double-recharge-is-a-scam</link>
    <description>
        &lt;b&gt;Cashing on the ignorance of users, social media platforms are increasingly being used to scam people.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Nandini Yadav was &lt;a class="external-link" href="http://www.bgr.in/news/whatsapp-forward-promising-pm-modi-scheme-for-double-recharge-is-a-scam/"&gt;published by BGR &lt;/a&gt;on January 24, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Ever since demonetization, and the ruling government’s vow to  digitize the Indian economy, several incidents of cyber criminals trying  to trick users into sharing delicate information like bank details,  have been reported. Since the sudden digitization is still new to the  Indians, many of us also tend to fall prey to these scams easily. In  series of such incidents, a new scam is being circulated on &lt;a href="http://www.bgr.in/tag/whatsapp/"&gt;WhatsApp&lt;/a&gt; that involves a link to a fake website carrying the name and picture of Prime Minister &lt;a href="http://www.bgr.in/tag/narendra-modi/"&gt;Narendra Modi&lt;/a&gt;.&lt;span id="more-439336"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The link lures users to tap on it and claims that on a recharge of Rs  500 to Rs 1,000, users will get double the amount as top-up on by their  telecom operators. The link also claims that this is a scheme run by  the Prime Minister. Now, what really happens here is, that the website  makes a user complete transactions and takes a whatever amount they do  the recharge for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While users don’t get any free recharge, the amount they pay for also  does not get added to their mobile balance. But they do end of up  losing the money entirely. Any time a user makes the payment for the  recharge, at the end of the process the transaction shows failed on the  website, but the money gets deducted from their account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here, not only do users lose their money, but they also end up  sharing their bank details on a very unreliable website, which probably  retrieves the data you feed in on the transaction gateways. A senior  police officer of cyber cell told India Today that the amount of these  top-ups are usually small and so people don’t turn up to register an  FIR, but these hoax websites end up making huge profits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is highly advised, that if any user receives such a message, they  should immediately delete it so that even by mistake they don’t end up  tapping on this and forwarding it to their contacts. Such malicious  links not only can affect your device, but may also seep into your phone  and steal data,” Kisalay Chaudhary, cyber crime expert told the  publication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“These bogus websites try to appear like an official Government of  India website or related to telecom operators to trap gullible  customers. Government website are .&lt;i&gt;gov.in&lt;/i&gt; or .&lt;i&gt;nic.in&lt;/i&gt; but fraud websites are &lt;i&gt;-gov.in&lt;/i&gt; or &lt;i&gt;_nic.in&lt;/i&gt; which may appear real but do not belong to government. So all people  making online transaction should be very alert about the website they  are browsing. WhatsApp has been a breeding ground for such activities  and spreading malicious links,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This isn’t the first time such a hoax has been circulated. Earlier  this month, a message on WhatsApp was circulating that claimed that the  Prime Minister was offering a &lt;a href="http://www.bgr.in/news/beware-whatsapp-message-of-pm-narendra-modi-offering-free-rs-500-recharge-is-a-hoax/"&gt;free Rs 500 recharge&lt;/a&gt; to all Indians. The message read, “Rs 500 balance for every Indians.  Reforming India. Modiji giving free balance. Click here.” The words  ‘click here’ were followed by a link to a new webpage, which once tapped  on, asked a user to share their personal details like, their contact  number, operator name and the state they live in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And it’s not just through messages, these scams are being run on  every possible platform. Late last year, Internet expert Pranesh Prakash  pointed out a &lt;a href="http://www.bgr.in/news/beware-of-the-fake-narendra-modi-app-on-google-play-store/"&gt;fake Narendra Modi app&lt;/a&gt;,  which actually claimed to be from the Government of India and its  interface looks almost identical to the original application. However,  when he dug deep, he found out that the app developer of the purported  Government of India Narendra Modi app was actually a person based out of  Bangladesh, suggesting that the app was possibly hosted by a con  artist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once downloaded, the ‘fake’ app, automatically got excessive  permission including full network access and ability to take pictures  and videos from a user’s device. The original Narendra Modi app, on the  other hand, only gets access to read, modify and delete user’s media  files. Also, the original app was published by &lt;i&gt;Narendramodi.in&lt;/i&gt; and the fake one shows under the name of Government Of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And this isn’t the only fake Narendra Modi app, if you launch the &lt;a href="http://www.bgr.in/tag/google-play-store/"&gt;Google Play Store&lt;/a&gt; right now, you would easily be able to spot a score of fake apps like  this. Within a week of launch if the new UPI app BHIM, we &lt;a href="http://www.bgr.in/news/over-40-fake-bhim-apps-available-on-google-play-store-heres-how-to-spot-the-genuine-one/"&gt;spotted&lt;/a&gt; 40 odd apps that were claiming to be the original BHIM app.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/bgr-nandini-yadav-january-24-2017-whatsapp-forward-promising-pm-modi-scheme-for-double-recharge-is-a-scam'&gt;http://editors.cis-india.org/internet-governance/news/bgr-nandini-yadav-january-24-2017-whatsapp-forward-promising-pm-modi-scheme-for-double-recharge-is-a-scam&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-01-25T02:13:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/financial-times-amy-kazmin-january-23-2017-for-indias-complaints-department-visit-facebook-live">
    <title>For India’s complaints department, visit Facebook Live</title>
    <link>http://editors.cis-india.org/internet-governance/news/financial-times-amy-kazmin-january-23-2017-for-indias-complaints-department-visit-facebook-live</link>
    <description>
        &lt;b&gt;Notebook: Social media cuts through red tape in a country beset by inertia.&lt;/b&gt;
        &lt;p&gt;The article by Amy Kazmin was &lt;a class="external-link" href="https://www.ft.com/content/9eb3b4ba-e156-11e6-9645-c9357a75844a"&gt;published in the Financial Times&lt;/a&gt; on January 23, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Rarely has a soldier’s lament about bad food received such attention. But Tej Bahadur Yadav, of India’s Border Security Force, made national headlines with Facebook videos complaining about his rations along India’s tense line-of-control with neighbouring Pakistan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Standing against a landscape of desolate, snow-covered mountains, Mr Yadav bemoaned the fried flatbread and tea that constitutes breakfast, and the watery lentils, seasoned only with salt and turmeric, of his lunch. It was unclear whether his main complaint was about the poor cooking quality or limited food quantity but the &lt;a class="external-link" href="https://www.youtube.com/watch?v=i2XEpolmass"&gt;video&lt;/a&gt; of the offending meals, including a burnt chapati, suggested both.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I do not want to blame the government,” he said calmly in Hindi. “The government provides everything for us but these higher officers sell everything. Sometimes, we soldiers go hungry.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reaction to the videos, which were covered widely by the mainstream media, came fast and furious. The BSF publicly accused Mr Yadav of indiscipline, saying he was a chronic malcontent previously subjected to a court martial for aiming his weapon at a superior. It also noted he was taking voluntary retirement soon.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But many Indians found it easy to believe that their country’s troops are short-changed on food and they rallied to the disgruntled soldier as a courageous whistleblower. Prime Minister Narendra Modi ordered an investigation, and a dietitian was reportedly sent to the border to assess the soldiers’ food.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Analysts pointed out that Mr Yadav’s gripe echoed official critiques of deficiencies in the army’s food procurement. “One can imagine the toil our jawans [junior soldiers] go through while guarding the border in chilling conditions. And the least they can expect is a good meal after long hours of hard duty,” an Indian Express editorial declared.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That a soldier posted in a remote border area could unleash such a kerfuffle via a video highlights how Indians armed with mobile phones are taking to social media to hold to account the traditionally non-responsive political and bureaucratic establishment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Smartphones make up nearly 30 per cent of phones in use in India and that number is rising fast, according to the Asian research group CLSA.  Sushma Swaraj, India’s foreign minister, has garnered attention for her rapid responses to individual Twitter pleas for help — whether from Indians in trouble abroad or those struggling to renew a passport or secure a visa for a visitor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now other ministers and government agencies, including local police forces, have begun to respond personally to pleas for help and public complaints on Twitter. It’s a big change from a time I recall well, when Indians tangled in red tape had no option but to find those with connections to try to influence, or prod, the seemingly impenetrable bureaucracy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Bureaucrats and politicians are now active and available on social media — ordinary citizens tweet politicians and there is a spectacle of immediate redress of complaints,” Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society, told me.  When New Delhi’s police department set up an office to receive complaints against corrupt officers, for example, many citizens provided audio or visual recordings of the alleged wrongdoing. It’s only a matter of time before such footage finds its way to social media — or beyond.  Ironically, those whose plights gain traction on social media, and are then amplified by mainstream media, are sometimes low-ranking civil servants harassed by their superiors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This week brought news of a &lt;a class="external-link" href="https://twitter.com/ArchisMohan/status/823216559376175104"&gt;female railway clerk&lt;/a&gt; punished for dereliction of duty after she refused to sing “one particular” duet with her senior manager at his farewell party.  A friend who works for a major western social media platform here in India (who ironically can’t be identified as he wasn’t authorised to speak to me), tells me that “the power structures that governed who used to be heard and who wouldn’t be heard have changed”. As technology spreads further and deeper in India, we can expect that noise to amplify.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/financial-times-amy-kazmin-january-23-2017-for-indias-complaints-department-visit-facebook-live'&gt;http://editors.cis-india.org/internet-governance/news/financial-times-amy-kazmin-january-23-2017-for-indias-complaints-department-visit-facebook-live&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-01-25T02:03:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/news/workplace-solutions-champions-consultative-workshop">
    <title>Workplace Solutions Champions Consultative Workshop</title>
    <link>http://editors.cis-india.org/accessibility/news/workplace-solutions-champions-consultative-workshop</link>
    <description>
        &lt;b&gt;A two day workshop was held on January 21 - 22 at Ecumenical Christian Centre in Bangalore. The workshop was organized by Enable India. Nirmita Narasimhan attended the workshop. &lt;/b&gt;
        &lt;h2&gt;Agenda&lt;/h2&gt;
&lt;h3&gt;Day 1: January 21, 2017&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Sl. No.&lt;/th&gt;&lt;th&gt;Agenda Item &lt;/th&gt;&lt;th&gt;Description&lt;/th&gt;&lt;th&gt;Timings&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Context Setting for the Workshop&lt;/td&gt;
&lt;td&gt;What outcomes we hope to achieve during the workshop&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;9.30 - 10.00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;Reflections and Sharing&lt;/td&gt;
&lt;td&gt;Sharing on achievements and impact, through discussions and activities&lt;/td&gt;
&lt;td&gt;10.00 - 10.45&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Tea Break&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;10.45 - 11.15&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Reflections and Sharing (Continued)&lt;/td&gt;
&lt;td&gt;Sharing on achievements and impact, through discussions and activities&lt;/td&gt;
&lt;td&gt;11.15 – 12.45&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Lunch Break&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;12.45 - 13.45&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Situational Context for WPS Champions Network&lt;/td&gt;
&lt;td&gt;Understanding the background of workplace solutions and their critical role in shaping livelihoods for persons with vision impairment&lt;/td&gt;
&lt;td&gt;13.45 - 14.30&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Curriculum Development&lt;/td&gt;
&lt;td&gt;Creation of curriculum for development of quality WPS Implementation professionals&lt;/td&gt;
&lt;td&gt;14.30 - 16.30&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Tea Break&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;16.30 - 17.00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Curriculum Development&lt;/td&gt;
&lt;td&gt;Creation of curriculum for development of quality WPS Implementation professionals&lt;/td&gt;
&lt;td&gt;17.00 - 19.00&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Day 2: January 22, 2017&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Sl. No.&lt;/th&gt;&lt;th&gt;Agenda Item&lt;/th&gt;&lt;th&gt;Description&lt;/th&gt;&lt;th&gt;Timings&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;WPS Champions Network Long Term Vision and My Personal Vision&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Understanding the future of WPS implementation, and personal vision alignment&lt;/td&gt;
&lt;td&gt;9.00 - 10.00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Tea Break&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;10.00 - 10.30&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;National track: Top Actions for the Year, and Who Will Do What&lt;/td&gt;
&lt;td&gt;Understanding the roadmap for WPS across India&lt;/td&gt;
&lt;td&gt;10.30 – 11.00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Regional Tracks for North, South and West regions: Top Actions for the Year, and Who Will do What&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Preparing a region-specific roadmap for WPS in the north, south and west regions&lt;/td&gt;
&lt;td&gt;11.00 - 12.00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Open Session on Employment&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Group discussion on WPS in the context of employment and livelihoods&lt;/td&gt;
&lt;td&gt;12.00 - 13.00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Lunch Break&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;13.00 - 14.00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Logistics and communication channels for next steps&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Service management tool demo, Whatsapp group and other information&lt;/td&gt;
&lt;td&gt;14.00 - 15.00&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/news/workplace-solutions-champions-consultative-workshop'&gt;http://editors.cis-india.org/accessibility/news/workplace-solutions-champions-consultative-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2017-02-03T01:23:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/events/odia-wikipedia-and-orientation-training-programme">
    <title>Odia Wikipedia and Orientation Training Programme</title>
    <link>http://editors.cis-india.org/a2k/events/odia-wikipedia-and-orientation-training-programme</link>
    <description>
        &lt;b&gt;An Odia Wikipedia orientation and training programme is being organized by the Centre for Internet &amp; Society's (CIS-A2K) team on 31 January 2017 at the Indian Institute of Mass Communication, Dhenkanal in Odisha. &lt;/b&gt;
        &lt;h3&gt;Agenda&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Bringing new editors on board.&lt;/li&gt;
&lt;li&gt;Orientation programme for students of IIMC.&lt;/li&gt;
&lt;li&gt;Finding possible partnership with the institute.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/events/odia-wikipedia-and-orientation-training-programme'&gt;http://editors.cis-india.org/a2k/events/odia-wikipedia-and-orientation-training-programme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Odia Wikipedia</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2017-01-23T00:58:38Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/training-programme-for-chairs-convenor-and-experts-for-international-standardization-work">
    <title>Training programme for Chairs, Convenor and Experts for International Standardization Work</title>
    <link>http://editors.cis-india.org/internet-governance/news/training-programme-for-chairs-convenor-and-experts-for-international-standardization-work</link>
    <description>
        &lt;b&gt;Udbhav Tiwari attended this programme organized by National Institute of Training for Standardization, under the Bureau of India Standards on the 19 and 20 of January, 2017 in Nodia, New Delhi.&lt;/b&gt;
        &lt;p&gt;Udbhav was invited due to CIS's membership at the LITD 17 at BIS and WG5 under ISO JTC 1 SC 27. For full schedule of the training programme &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/training-programme-structure"&gt;click here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/training-programme-for-chairs-convenor-and-experts-for-international-standardization-work'&gt;http://editors.cis-india.org/internet-governance/news/training-programme-for-chairs-convenor-and-experts-for-international-standardization-work&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-01-20T17:06:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/files/training-programme-structure">
    <title>Training Programme Structure</title>
    <link>http://editors.cis-india.org/internet-governance/files/training-programme-structure</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/files/training-programme-structure'&gt;http://editors.cis-india.org/internet-governance/files/training-programme-structure&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-01-20T17:05:16Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/economic-times-neha-alawadhi-january-13-2017-govt-should-take-a-relaxed-view-of-violations-of-flag-code-in-products-sold-in-foreign-countries-experts">
    <title>Govt should take a relaxed view of 'violations' of flag code in products sold in foreign countries: Experts</title>
    <link>http://editors.cis-india.org/internet-governance/news/economic-times-neha-alawadhi-january-13-2017-govt-should-take-a-relaxed-view-of-violations-of-flag-code-in-products-sold-in-foreign-countries-experts</link>
    <description>
        &lt;b&gt;When it comes to products on sale in global ecommerce vendor sites that seem to violate India’s strict flag code, the government should take a more relaxed and less punitive approach.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Neha Alawadhi was published in the &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/politics-and-nation/govt-should-take-a-relaxed-view-of-violations-of-flag-code-in-products-sold-in-foreign-countries-experts/articleshow/56508056.cms"&gt;Economic Times&lt;/a&gt; on 13 January 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;That’s the view of industry observers and lawyers familiar with internal business practices and regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s  External Affairs Minister Sushma Swaraj had on Wednesday tweeted that  India visas for Amazon executives may be withdrawn unless the America  headquartered ecommerce giant apologised for its Canadian site selling  doormats in India flag colours.  &lt;br /&gt; &lt;br /&gt; The point, lawyers and  experts say, is that Indian law itself protects Amazon from being  prosecuted in this case. India recognises companies like Amazon (whether  in India or Canada), as intermediaries, who are exempt from liability  under  the IT (Information Technology) Act, because a third-party seller was selling those doormats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Plus, Indian law does not apply outside the country, and a global ecommerce company has millions of products for sale in scores of marketplaces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Neither Prevention of Insults to National Honour Act, 1971nor the Flag Code applies outside India,” said Virag Gupta, a Supreme Court advocate specialising in cyber law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The only thing the Indian government can do, said Sarvjeet Singh, programme manager, Centre for Communication Governance, National Law University, Delhi, is to ask the company to take down the listing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That Amazon had already done, he noted. “Given the volume of traffic and usage and the number of sellers, it is impossible for a company to monitor all the goods listed,” Singh added, and said that’s why the IT Act recognises that companies like Amazon are intermediaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many experts also wondered whether India’s flag code is ready for a reset, aligning it more with today’s less statist views on such matters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The code calls for a three-year jail term, or a fine, or both for violations. In democracies such as the United States, Canada and the Netherlands, national flag colours in product design does not invoke legal punitive responses. “In a lot of these countries, where issues about Indian flag code violation have come up, these activities are legal and covered by freedom of expression guarantees and we should be aware of these cultural contexts before making statements,” Singh said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others feel the flag code smothers creativity. “Repealing most flag-related regulation will unlock creativity, encourage derivative works and remix and greatly increase the visibility of the Indian flag in public places. This in turn will foster a sense of community, national pride and social cohesion,” said Sunil Abraham, executive director at Bengaluru-based research organisation, the Centre for Internet and Society.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/economic-times-neha-alawadhi-january-13-2017-govt-should-take-a-relaxed-view-of-violations-of-flag-code-in-products-sold-in-foreign-countries-experts'&gt;http://editors.cis-india.org/internet-governance/news/economic-times-neha-alawadhi-january-13-2017-govt-should-take-a-relaxed-view-of-violations-of-flag-code-in-products-sold-in-foreign-countries-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-01-19T02:37:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/economic-times-january-14-2017-sunil-abraham-on-aadhaar-misuse-during-demonetisation">
    <title>Sunil Abraham on Aadhaar's misuse during demonetisation</title>
    <link>http://editors.cis-india.org/internet-governance/news/economic-times-january-14-2017-sunil-abraham-on-aadhaar-misuse-during-demonetisation</link>
    <description>
        &lt;b&gt;Sunil Abraham spoke to Economic Times on the misuse of Aadhaar during demonetisation. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham said:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We saw Aadhaar being misused at large-scale during the demonetization, criminals had created a black market in Aadhaar identity cards and photocopies of Aadhaar. Those interested in converting black money were purchasing these photocopies from the black market and giving them to bank officials so that they could maintain fake records that tried to prove that ordinary people came in photos' cash transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whenever we try to introduce technological measures we must always think of the human systems that are at work and the human procedures that are at work. Another example is today telcos giving sim cards based on Aadhaar authentication to meet their sales targets some of these telcos are giving multiple sim  cards for a single Aadhaar based KYC. Those sim cards are often resold into black market or given to persons that are not familiar with the aadhaar number holder and this has only makes the security situation in the country worse. It has not improved." Watch the &lt;b&gt;&lt;a class="external-link" href="http://economictimes.indiatimes.com/et-now/experts/sunil-abraham-on-aadhaars-misuse-during-demonetisation/videoshow/56544492.cms"&gt;Video&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/economic-times-january-14-2017-sunil-abraham-on-aadhaar-misuse-during-demonetisation'&gt;http://editors.cis-india.org/internet-governance/news/economic-times-january-14-2017-sunil-abraham-on-aadhaar-misuse-during-demonetisation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-01-19T01:35:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/business-standard-january-16-2017-sanjay-kumar-singh-lost-your-phone-here-is-how-you-can-make-your-mobile-theft-proof">
    <title>Lost your phone? Here's how you can make your mobile theft-proof </title>
    <link>http://editors.cis-india.org/internet-governance/news/business-standard-january-16-2017-sanjay-kumar-singh-lost-your-phone-here-is-how-you-can-make-your-mobile-theft-proof</link>
    <description>
        &lt;b&gt;Losing a phone has become even more costly after the government's push for a cashless society. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sanjay Kumar Singh was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/pf/lost-your-phone-here-s-how-you-can-make-your-mobile-theft-proof-117011600015_1.html"&gt;Business Standard&lt;/a&gt; on January 16, 2017. Udbhav Tiwari was quoted. Read the full article on &lt;a class="external-link" href="https://www.pressreader.com/india/business-standard/20170116/281556585522622"&gt;Press Reader&lt;/a&gt;. Udbhav Tiwari was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Prime Minister Narendra Modi, while pitching for cashless transactions, has coined a new phrase — your mobile is a bank. If you really want to use your mobile phone as a bank, remember the costs of losing it are much higher. Earlier, if you lost your mobile phone, there was the risk of misuse of personal data. Now, with most gadgets also carrying mobile wallet apps, there is the added risk of serious financial loss. A number of security solutions, available in the form of external security software or in-built into the phone, can help you track the device, lock it and minimise the probability of misuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;First, it should give you some satisfaction  that if your device is of recent vintage, someone stealing your phone  will not be able to use it. Earlier, thieves would wipe the data on the  phone (if it had a pin), set up a new account, and use it. But if it is  an Apple phone that came out after 2014 or a phone with Android 6.0  Marshmallow or higher operating system (OS), the server will ask for  login information of the first account (with which the owner had  initially set up the phone). Only then will it allow someone to set up a  second account on the same device. Since that information is not likely  to be available to the thief, the phone will be of little use to  him. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Track your device &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Both  Apple and Android have in-built features that allow you to track your  device if it gets lost. In Apple it is called 'Find my phone' and on  Android, 'Android device manager'. When you log in through your Apple or  Google account while setting up the phone, this feature gets enabled by  default. After your phone is stolen, go online and type 'Find my phone'  or 'Android device manager'. Use your account credentials to log in. As  long as your phone is on and is connected to the Internet, it will  broadcast its location. If it has been switched off or can't connect to  the Internet, you will only be able to see the last location from where  it transmitted.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Antivirus software for mobile phones  also offer tracking features. "Using our mobile security software, users  can locate their lost device on a map or receive the location  coordinates through an SMS," says Ritesh Chopra, country manager, Norton  by Symantec. These software also enable you to lock the lost device  remotely either from the antivirus software's web site or by sending an  SMS. Chopra informs that you can also remotely delete all the data  stored either on the device or its memory card. Users can also trigger  an alarm if they think their device is still in the vicinity. "Some  antivirus software also allow you to take snapshots of the illegal user  once the original user has reported it as stolen," says Udbhav Tiwari,  policy officer at the Centre for Internet and Society, Bengaluru.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Take preventive security measures&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;How  well your phone and the data on it are protected after theft will,  however, depend on the security measures you adopt proactively while the  phone is in your possession. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Install a password: &lt;/span&gt;&lt;/b&gt;&lt;span&gt;The  first stage of protection you should adopt is a pin, pattern lock, or  password for your mobile phone. If you don't set up a pin, everything  that doesn't require a second level of authentication is available to  anyone who gets possession of your device. If you lose your laptop but  have logged out of your email or social networking account, the thief  can't access them. But on mobile phones most of these services don't  require a second level of authentication.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Most  alarming from a financial standpoint is the fact that most mobile  wallets don't ask for a password before allowing you to transact (Paytm  has introduced one recently). "If you have a mobile wallet and don't  have a pin on your phone and it gets stolen, the thief can easily  transfer money from your wallet to another," says Tiwari. Most mobile  and net banking apps, however, require a login and password every time  you want to access them, and are hence safer.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Set a  pin promptly--a strong one that can't be easily guessed. Numbers  associated with you, such as your birthday, are a strict no-no. If your  phone carries especially sensitive or important data, eschew pins  altogether and use a detailed password with a diverse combination of  characters.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Nowadays you can also deploy  fingerprint-based unlocking feature on your phone. "By using Fonetastic  for the Android platform, you can set the fingerprint unlock feature on  your phone," informs Sanjay Katkar, managing director and chief  technology officer, Quick Heal Technologies. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Encrypt data on your device: &lt;/span&gt;&lt;/b&gt;&lt;span&gt;Even  if you set up a pin or password, the data on your mobile phone is not  protected. Hackers can bypass it and gain access to your files. To  protect data, OS developers like Google and Apple encrypt data. The  device encryption feature works using something unique on your device,  such as its serial number, and your pin. Even if someone gets access to  your files via a computer, they will not be able to open them. These  files will open only on your phone, and for that they will need your  pin, password or pattern lock (presuming you have set one).&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In  all iOS phones, the moment you set your pin, all files get  automatically encrypted. In any Android phone purchased within the last  one year (that runs on Android 6.0 Marshmallow by default), the same  holds true. But if you have an older Android phone or OS version, you  need to enable this feature manually. Go to Settings, then to Security,  find an option called 'Encrypt phone' and click on it.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Install an app lock: &lt;/span&gt;&lt;/b&gt;&lt;span&gt;Some  security apps allow you to lock the apps on your phone and also encrypt  the files produced by those apps. When you start an app, the security  app will ask for a pin. And when you exit an app, it will encrypt the  files stored within the app. Go to Google Play or iStore and type  'encrypted file storage' to get the most popular lock-and-encrypt apps.  "If you use device-level encryption, you may not need these apps, as the  former locks and encrypts the entire device," says Tiwari&lt;/span&gt;&lt;/p&gt;
&lt;div dir="auto" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div dir="auto" style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/business-standard-january-16-2017-sanjay-kumar-singh-lost-your-phone-here-is-how-you-can-make-your-mobile-theft-proof'&gt;http://editors.cis-india.org/internet-governance/news/business-standard-january-16-2017-sanjay-kumar-singh-lost-your-phone-here-is-how-you-can-make-your-mobile-theft-proof&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-01-19T02:40:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/ndtv-december-24-2016-demonetisation-cost-versus-benefit">
    <title>Demonetisation: Cost Vs Benefit</title>
    <link>http://editors.cis-india.org/internet-governance/news/ndtv-december-24-2016-demonetisation-cost-versus-benefit</link>
    <description>
        &lt;b&gt;Sunil Abraham took part in a discussion on Demonetisation in NDTV's Big Fight programme aired on December 24, 2016. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Prime Minister's big post-demonetisation deadline of 50 days is coming  to a close. Does this mean that people's ordeal with the currency ban  will also come to an end? Will the government continue to have people's  support and patience through its big bang reforms if they fail to  achieve their original aim of retrieving black money? We ask, what lies  ahead for India? How long will it take for India to become a cashless  economy? What are the pitfalls? With a high bank dormancy rate of 43%,  most Indians still prefer to make transactions through cash. Even if we  are able to make that journey to becoming a cashless economy by 2020,  does the government have the infrastructure to make online payments  safe?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Sunil Abraham said that the trouble with the design of the Aadhaar project is that it makes citizens transparent to the state and does not make state transparent to the citizen. With every generation of corruption busting technology we see new ways of corruption being introduced into our society&lt;/i&gt;. For more &lt;a class="external-link" href="http://www.ndtv.com/video/news/the-big-fight/demonetisation-cost-vs-benefit-443536?site=full"&gt;&lt;b&gt;watch the video&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/ndtv-december-24-2016-demonetisation-cost-versus-benefit'&gt;http://editors.cis-india.org/internet-governance/news/ndtv-december-24-2016-demonetisation-cost-versus-benefit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-01-17T16:04:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality">
    <title>India’s Digital ID Rollout Collides With Rickety Reality</title>
    <link>http://editors.cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality</link>
    <description>
        &lt;b&gt;India’s new digital identification system, years in the making and now being put into widespread use, has yet to deliver the new era of modern efficiency it promised for shop owner Om Prakash and customer Daya Chand.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Gabriele Parussini was published in the &lt;a class="external-link" href="http://www.wsj.com/articles/snags-multiply-in-indias-digital-id-rollout-1484237128?mod=e2fb"&gt;Wall Street Journal&lt;/a&gt; on January 13, 2017. Hans Varghese Mathews was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;At first, it drove both men up a tree.&lt;br /&gt;&lt;br /&gt;The system, which relies on fingerprints and eye scans to eventually provide IDs to all 1.25 billion Indians, is also expected to improve the distribution of state food and fuel rations and eventually facilitate daily needs such as banking and buying train tickets.&lt;br /&gt;&lt;br /&gt;But Mr. Prakash couldn’t confirm his customers’ identities until he dragged them to a Java plum tree in a corner of his village near New Delhi’s international airport. That was the only place to get the phone signal needed to tap into the government database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I hopped on a chair and put my finger in the machine,” said Mr.  Chand, a 60-year-old taxi driver. Getting his state food ration “used to  be much easier,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;a class="none icon" href="http://blogs.wsj.com/briefly/2017/01/13/indias-massive-aadhaar-biometric-identification-program-the-numbers/"&gt;a system so vast&lt;/a&gt;, even small glitches can leave millions of people empty-handed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="none icon" href="http://blogs.wsj.com/indiarealtime/2012/10/03/getting-indias-id-project-back-on-track/"&gt;The government began building the system&lt;/a&gt;,  called Aadhaar, or “foundation,” with great fanfare in 2009, led by a  team of pioneering technology entrepreneurs. Since then, almost 90% of  India’s population has been enrolled in what is now the world’s largest  biometric data set.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prime Minister Narendra Modi, who set aside  early skepticism about the Aadhaar project after taking power in 2014,  is betting that it can help India address critical problems such as  poverty and corruption, while also saving money for the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the technology is colliding with the rickety reality of India,  where many people live off the grid or have fingerprints compromised by  manual labor or age.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Panna Singh, a 55-year-old day laborer in  the northwestern state of Rajasthan who breaks stones used to build  walls, says the machine recognized his scuffed-up fingerprints only a  couple of times.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I’ve come twice today,” he said at a ration shop in the village of Devdungri. “That’s a full day of work, gone.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Iris scans are meant to resolve situations where fingerprints don’t work, but shops don’t yet have iris scanners.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajay Bhushan Pandey, chief executive of the government agency that  oversees Aadhaar, said kinks will be ironed out as the system is used,  as is the case with software rollouts. It works 92% of the time, and  that will rise to 95%, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“On the scale of what [Aadhaar]  has achieved, the rollout has been remarkably smooth,” said Nandan  Nilekani, the Infosys co-founder who spearheaded the project. “I don’t  see any issues that are disproportionate to the size of project.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An  Aadhaar ID is intended to be a great convenience, replacing the  multitude of paperwork required by banks, merchants and government  agencies. The benefits are only just beginning, backers say, as the  biometric IDs are linked to programs and services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in rural  areas, home to hundreds of millions of impoverished Indians dependent on  subsidies, the impact of technical disruptions has already been  evident.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After walking for two hours across rough underbrush in  Rajasthan to get kerosene for the month, Hanja Devi left empty-handed  because the machine couldn’t match her fingerprint with her Aadhaar  number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It’s always so difficult” using the system, said Ms. Devi, who lives  with her husband and a nephew on 1,500 rupees ($22) a month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ranjit  Singh, who operates the shop, said five of the 37 customers before Ms.  Devi also left the shop empty-handed, a failure rate of over 15%.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A shop manager in a neighboring village said identification had failed for a similar portion of his 500 customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any biometric recognition system of Aadhaar’s size is bound to show  duplicates, meaning some people’s biometric identifiers will match  someone else’s when they try to enroll.The new system hasn’t eliminated  attempts at fraud. In August, police in Rajasthan accused two shop  managers of linking their fingerprints to a multitude of cards and  stealing for months the rations of dozens of clients.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hans Varghese Mathews, a mathematician at the Bangalore-based Center for  Internet and Society, used the results of a test run by Aadhaar  officials on a sample of 84 million people to extrapolate the figure for  India’s total population. The error level is less than 1%, but in the  world’s second-most populous country, the snag would still affect about  11 million people, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government officials disputed the calculation, saying the number of  duplicates would be much smaller—and that it would take only seven  analysts to manage the error caseload.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for trouble connecting to the registry, better infrastructure,  including steadier internet connections, will eventually also help, Mr.  Pandey said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For now, Mr. Prakash has found a way to cope without  climbing trees. After scouring the village, he set up a shack in a spot  with enough bandwidth for his fingerprint scanner to work. It is hardly  efficient. He issues receipts in the morning at the shack, then goes  back to his shop to hand out the grains. Customers have to line up  twice, sometimes for hours.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Prakash has applied to the  government to operate without biometric identification, but his request  was turned down, he said. “They said: ‘You have to keep trying.’ ”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality'&gt;http://editors.cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-01-17T15:35:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/business-standard-mj-antony-ayan-pramanik-apurva-venkat-supreme-court-issues-notice-to-whatsapp-centre-on-data-privacy">
    <title>Supreme Court issues notice to WhatsApp, Centre on data privacy </title>
    <link>http://editors.cis-india.org/internet-governance/news/business-standard-mj-antony-ayan-pramanik-apurva-venkat-supreme-court-issues-notice-to-whatsapp-centre-on-data-privacy</link>
    <description>
        &lt;b&gt;Analysts said India lacked data protection laws.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by MJ Antony, Ayan Pramanik and Apurva Venkat was &lt;a class="external-link" href="http://www.business-standard.com/article/current-affairs/supreme-court-issues-notice-to-whatsapp-centre-on-data-privacy-117011601108_1.html"&gt;published in the Business Standard&lt;/a&gt; on January 17, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Supreme+Court" target="_blank"&gt;Supreme Court &lt;/a&gt;on Monday issued notices to the Centre and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;over  an appeal alleging the instant messaging service did not ensure the  privacy of its users and seeking regulations to protect personal  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chief Justice J S Khehar granted urgent hearing when Harish Salve,  counsel for the petitioner, submitted that the service provided free by  the platform to 155 million subscribers violated constitutional  provisions protecting privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;would file their replies within two weeks, the court directed after Salve sought its intervention to protect consumer &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Data" target="_blank"&gt;data &lt;/a&gt;till India enacted &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Data" target="_blank"&gt;data &lt;/a&gt;protection laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Supreme+Court" target="_blank"&gt;Supreme Court &lt;/a&gt;heard the petition after the Delhi High Court in September directed &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;not to share its users’ &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Data" target="_blank"&gt;data &lt;/a&gt;with its parent &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;and  asked it to provide users with the option to opt out. The court was  hearing a public interest litigation over a change in WhatsApp’s user  policies that explicitly allowed &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;to access to &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;users’ data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;spokesperson said the company could not comment immediately.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Analysts said India lacked &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Data" target="_blank"&gt;data &lt;/a&gt;protection laws that prohibit global Internet firms from harvesting user &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Data" target="_blank"&gt;data &lt;/a&gt;for  their business. “We used to think that we had some privacy  jurisprudence in the country. If you asked a lawyer 1.5 years ago, he  would say privacy in India was a constitutionally guaranteed right,”  said Sunil Abraham, director of the Centre for Internet Society. “It is  not explicitly referenced into the law.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saroj Kumar Jha, partner, SRGR Law Offices, said, “Along with the lack  of policies and laws, there are very few judgments on privacy issues  based on constitutional rights. Thus, it makes it very difficult to  judge a case.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Salve argued that till the government enacted legislation to protect  user data, the court should provide protection. The Telecom Regulatory  Authority of India should introduce a clause in telecom licences that if  calls were intercepted the licence would be cancelled, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The court sought the assistance of Attorney-General Mukul Rohatgi to sort out the issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rohatgi, while arguing an earlier case related to alleged violation of  privacy, had taken the stand that the Constitution did not protect the  right to privacy. According to him, neither the fundamental rights nor &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Supreme+Court" target="_blank"&gt;Supreme Court &lt;/a&gt;judgments  recognises a citizen’s right to privacy. The bench hearing that case  referred the question to a constitution bench last year.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/business-standard-mj-antony-ayan-pramanik-apurva-venkat-supreme-court-issues-notice-to-whatsapp-centre-on-data-privacy'&gt;http://editors.cis-india.org/internet-governance/news/business-standard-mj-antony-ayan-pramanik-apurva-venkat-supreme-court-issues-notice-to-whatsapp-centre-on-data-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-01-17T15:06:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/bloomberg-mayank-jain-january-17-2017-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about">
    <title>The Dangers Of Aadhaar-Based Payments That No One Is Talking About</title>
    <link>http://editors.cis-india.org/internet-governance/news/bloomberg-mayank-jain-january-17-2017-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about</link>
    <description>
        &lt;b&gt;Less than three months ago, India’s banking sector was hit by a data breach which compromised 32 lakh debit cards and led to fraudulent transactions worth Rs 1.3 crore.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Mayank Jain was &lt;a class="external-link" href="http://www.bloombergquint.com/business/2017/01/17/the-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about"&gt;published by Bloomberg&lt;/a&gt; on January 17, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The incident started a debate around security of payment systems. But the debate had just about begun when the government’s demonetisation decision dragged attention away from it. Now as the dust settles and as the government starts to push newer means of digital payments, the focus is back on the security of systems being seen as an alternative to cash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One such system is Aadhaar-based payments which could potentially allow citizens to pay anytime anywhere with the tap of a finger.&lt;br /&gt;&lt;br /&gt;In theory, it sounds simple.&lt;br /&gt;&lt;br /&gt;The Aadhaar-based payment system runs on the existing Aadhaar infrastructure through which a person’s biometrics are used to authenticate the user. Once authenticated, the user can transfer funds directly from one bank account to another without going through a mobile wallet or a card.&lt;br /&gt;&lt;br /&gt;The payment system requires a smartphone, a working internet connection and a biometric authentication device with the merchant. The customer needn’t have a card or a phone as long as he or she has an Aadhaar-seeded bank account.&lt;br /&gt;&lt;br /&gt;National Payments Corporation of India has developed this payments infrastructure over the existing Aadhaar-Enabled Payments System, the railroad on which the public distribution system has been functioning for years now.&lt;br /&gt;&lt;br /&gt;Amitabh Kant, chief executive officer of the government policy think tank NITI Aayog said, earlier this month, that all cards and point-of-sale machines will become redundant in the country in the next two-and-a-half years as Aadhaar-based payments become popular.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="lazy" src="http://images.assettype.com/bloombergquint%2F2017-01%2Ff3e25ea3-f10b-4059-a95d-412cd4f32caf%2FKey%20Facts%20About%20Aadhaar%20Payments%20Payments%20Payments01.png?auto=format&amp;amp;q=60&amp;amp;w=1024&amp;amp;fm=pjpeg" /&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A Double-Edged Sword&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While payments authenticated by biometrics sound like a good idea in a country where less than one in three people actually own a smartphone, there are fears that integrating biometrics with digital payments could prove to be a security headache.&lt;br /&gt;&lt;br /&gt;The first part of the problem is that Aadhaar, while effective, is not a fool-proof method of authentication and identification failures are not uncommon. Building a payment system atop the Aadhaar system will simply transfer some of these vulnerabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="lazy" src="http://images.assettype.com/bloombergquint%2F2017-01%2F12a47aa6-10f1-4687-a471-a463f876e6d2%2FHow%20Aadhaar%20Payment%20Works.png?auto=format&amp;amp;q=60&amp;amp;w=1024&amp;amp;fm=pjpeg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The possibility of transaction failures due to a biometric mismatch are real, admitted a former high-ranking official from the Unique Identification Authority of India (UIDAI) who spoke to BloombergQuint on the condition of anonymity.&lt;br /&gt;&lt;br /&gt;Officially, the false reject rate – rejection of a biometric when it’s actually correct – is set at a maximum of 2 percent for devices that get certified from the UIDAI. On the ground, however, failure rates vary widely, said the official quoted above.&lt;br /&gt;&lt;br /&gt;According to the official statistics on UIDAI, more than 16 lakh Aadhaar-authentication requests failed in the past week. The type of errors encountered ranged from the biometric data not matching the database to demographic details not checking out.&lt;br /&gt;&lt;br /&gt;The failure rates on Aadhaar Enabled Payment System for interbank transactions (which is a part of all Aadhaar authentication requests) were found to be as high as 60 percent by the Watal Committee on digital payments which published its report in December.&lt;br /&gt;&lt;br /&gt;Additionally, newer security threats may also emerge if the scope of Aadhaar is widened. These include identity theft if a person’s biometrics are compromised from the payment system, phishing attempts, and the difficulty in revoking access once biometric information is compromised.&lt;br /&gt;&lt;br /&gt;Biometrics aren’t an exact science, the official quoted above said, while adding that possible glitches have to be weighed against the benefits of offering a widely accessible non-cash mode of payment to citizens.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How Easy Is It To Beat The System?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of Bangalore based research organisation Center for Internet and Society (CIS) said that one way to assess how secure a system is to understand the cost and effort that goes into breaching it.&lt;br /&gt;&lt;br /&gt;In the case of Aadhaar-based payment systems, the costs may not be high.&lt;br /&gt;&lt;br /&gt;“There’s the gummy finger method which essentially requires some Fevicol or gum to duplicate someone’s fingerprint which can be enough to transact on someone’s behalf without them being there,” said Abraham in a phone conversation with BloombergQuint. “An average person can’t clone a smart card. Just fevicol and glue can help you make a gummy finger. The biometric lobby will say that advanced scanners defeat the gummy finger attack but more advanced scanners are also more expensive.”&lt;br /&gt;&lt;br /&gt;Also, using more sensitive devices could push up the instance of false rejection of transactions, said Abraham.&lt;br /&gt;&lt;br /&gt;There are other concerns. Like the fact that devices used for Aadhaar identification could store personal information, which, in turn, could be susceptible to a breach.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;There are five main components in an Aadhaar app transaction – the customer, the vendor, the app, the back-end validation software, and the Aadhaar system itself. There are also two main external concerns – the security of the data at rest on the phone and the security of the data in transit. At all seven points, the customer’s data is vulnerable to attack. &lt;br /&gt;Bhairav Acharya, Program Fellow, New America&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Acharya, who works at a U.S.-based think tank called New America and focuses on cyber-law, said the key concern is that Aadhaar data can be stolen and misused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The app and validation software are insecure, the Aadhaar system  itself is insecure, the network infrastructure is insecure, and the laws  are inadequate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The biometric data collected on the  authentication device at a merchant location can potentially be stored  on the device as well as the smartphone of a merchant for a long time.  Abraham added that there is a possibility that non-certified devices  will enter the market, which can store data and use it in the future to  do fraudulent transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The concerns over potential misuse of  biometric data by private agencies has also been highlighted by the  Supreme Court of India. Earlier this month, the apex court refused to  expedite the hearing on a petition regarding Aadhaar being utilised for  multiple use cases by private companies. It, however, &lt;a href="http://economictimes.indiatimes.com/articleshow/56352843.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst" target="_blank"&gt;&lt;ins&gt;observed&lt;/ins&gt;&lt;/a&gt; that private agencies collecting biometric data “is not a great idea”.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Deficient Privacy Laws&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Apar Gupta, a Delhi-based lawyer working on cyber security, says that  the lack of strong privacy protecting provisions is another concern  that should be kept in mind while moving towards an Aadhaar-based  payment system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The data stays for a long time with the  stakeholders in the system. The requesting agency can keep it for seven  years and the UIDAI can store it for five years. There are insufficient  safeguards and there’s an absence of privacy law and an independent  privacy regulator,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Acharya agreed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India does not  have the necessary laws to deal with a decentralised,  biometrically-authenticated, mobile payments system, according to  Acharya.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Moreover, current laws and policies regarding the  Aadhaar project, particularly the centralised database, are inadequate  from the point of view of data security and end-user privacy,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham of CIS said the issue is wider than Aadhaar. The problem is the lack of a strong data security law.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;We only have a minimal data security law under the Section 43A of the Information and Technology Act which only applies to the private sector. There’s no law that applies to the government. Even 43A has not been applied consistently. There’s no place for you to go and complain if your identity has been compromised.&lt;br /&gt;Sunil Abraham, Executive Director, Centre for Internet &amp;amp; Society&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Gupta noted that, in the event of an identity threat, avenues of recourse are also limited. He said the best option is an appeal in the civil court, which is a long drawn out process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In final analysis, according to Abraham, credit and debit cards are easier to secure as access can be revoked quickly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The trouble with biometrics is that the chain of trust is harder to  establish because too many people can get access to biometrics and then  you need to devise these convoluted solutions like hardware secure  zones,” Abraham said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“So the advantage of going with a smart card  is that it can be easily re-secured, but with biometrics, once I  compromise it, it’s lifelong.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/bloomberg-mayank-jain-january-17-2017-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about'&gt;http://editors.cis-india.org/internet-governance/news/bloomberg-mayank-jain-january-17-2017-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Money</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2017-01-17T14:39:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint">
    <title>The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint</title>
    <link>http://editors.cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint</link>
    <description>
        &lt;b&gt;Paying for your groceries and other goods by using your biometrics instead of an e-wallet, debit card or cash seems to be the next phase in the Centre’s ambitious push to shift the country to a “less cash” economy, as its mandarins term it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Indulekha Aravind was &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/economy/policy/the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint/articleshow/56542475.cms"&gt;published in the Economic Times&lt;/a&gt; on 15 January 2017. Sunil Abraham was &lt;a class="external-link" href="http://economictimes.indiatimes.com/et-now/experts/sunil-abraham-on-aadhaars-misuse-during-demonetisation/videoshow/56544492.cms"&gt;consulted for this&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajay  Bhushan Pandey, CEO of the Unique Identification Authority of India  (UIDAI), says it will be rolling out Aadhaar-enabled payment system, or  Aadhaar Pay, for merchants in the next few weeks. This will be an app  for merchants that enables them to receive payments through biometric  authentication of the customer, provided their bank accounts are linked  to their Aadhaar number. "A pilot is under way in fair price shops in  Andhra Pradesh where shopkeepers are accepting payments from PDS  beneficiaries. The results are very encouraging," says Pandey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The idea takes off from the existing Aadhaar-enabled payment system (AEPS) used by bank business correspondents (BCs) in rural areas to disburse and accept cash, using micro ATMs. "We are trying to tweak this so that a similar device can be used by a local merchant," says Pandey. Adoption will depend on two factors: merchants’ acceptance of it and whether they can use an app rather than a micro ATM. The biggest advantage through this method of payment, says Pandey, is that the customer will not need a credit or debit card, or even a smartphone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint" class="gwt-Image" src="http://img.etimg.com/photo/56542603/page-19-1.jpg" title="The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  limits for transactions using AEPS, such as the number of daily  transactions, will be left to the discretion of the banks. In the long  term, the AEPS will be migrated to the BHIM (Bharat Interface for Money)  platform but the rollout of Aadhaar Pay will happen before that. Post  demonetisation, banking BC’s number of transactions using AEPS has leapt  from 4-5 lakh to 14-15 lakh, says Pandey. According to Reserve Bank of  India data on electronic payment systems, the total volume of such  transactions  jumped from 671 million in November 2016 to 957 million in December. USSD-based payments, which can be done using a basic feature phone, are among the biggest beneficiaries: the volume rose from just 7,000 in November to 1,02,000 in December, and value of transactions from over Rs 7,000 to over Rs 1 lakh. Prepaid payment instruments — mainly mobile wallets — rose from 59 million to 88 million in the same period (and value from Rs 1,300 crore to Rs 2,100 crore).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Aadhaar Pay is likely to ride the demonetisation wave if it is launched soon, certain concerns remain, as the list is how secure such a payment system will be. The UIDAI CEO says it is a paramount concern for the organisation, too. "We are using the latest technology to ensure the information stays encrypted end to-end, so that information is not leaked or misused. In the months to come, we will strengthen the security."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Wary About Security&lt;/b&gt; &lt;br /&gt; Sunil Abraham, executive director of the Centre for Internet and  Society, a think tank that has been analysing the Aadhaar project for  six years, outlines several reasons why Aadhaar-based biometrics is  inappropriate for authentication in payments, unlike card-based payments  that use cryptography.  &lt;br /&gt; &lt;br /&gt; "With biometrics, there is always  an error ratio. It is imprecise matching, whereas with cryptography  (smart cards), there is no false positive or  negative. You either have the key (PIN) or you don’t. It is also very  cheap to defeat biometric authentication — even an unlettered person can  do it," says Abraham. It would be easy enough, he says, to replicate  someone else’s fingerprint by pressing it against lukewarm wax and  filling the mould with glue to get a dummy finger. In contrast,  compromising a smart card requires more cost and effort, from  tech-savviness to machines such as a skimmer that will read the card.  "And once you are compromised,you are compromised forever. You can’t change it, like a debit card PIN."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Using  Aadhaar for authentication had proved to be a failure during the  exchange of currency notes following demonetisation, he adds, pointing  to how the poor and the middle class stood in queues for money while  stacks of new currency were recovered from the homes of businessmen and  bureaucrats. "When you have bank officials who are corrupt, giving them  your biometrics is giving them more ammunition for corruption." To catch  the criminals, law enforcement agencies had to resort to CCTV footage,a  relatively older technology, he says. Others point out that while it  may be secure, certain factors stand in the way of making  biometrics-based payment authentication a large-scale success. Amrish  Rau, CEO of PayU India, a payment gateway provider, cites a list of  reasons why it would inevitably take off but only in 5-10 years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"For  one, the technology is not yet good enough. There are also bandwidth  and data constraints in sending biometric data," says Rau. Even in more  mature markets, it has yet to find widespread acceptance, he says,  pointing to the slow adoption of Apple Pay and Samsung Pay in the US.  "It’s not the answer today.” This is in contrast to NITI Aayog CEO  Amitabh Kant’s recent remarks that cards and PoS machines would become  redundant by 2020 because Indians would be making payments using their  thumb (biometrics).  "... my view is that in the next two and a half years, India will make  all its debit cards, credit cards, all ATM machines, all PoS machines  totally irrelevant,” Kant had said at a Pravasi Bharatiya Divas session  in Bengaluru.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;UIDAI’s Pandey is more circumspect. “I wouldn’t say who would replace  what. But from the government’s side we are encouraging all modes of  digital payment. India has a diverse population and some people might  prefer using a card, others a wallet. Collectively, they will contribute  to a less-cash society.”&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint'&gt;http://editors.cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Money</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2017-01-16T03:14:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
