<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 691 to 705.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/uk-dna-database-and-european-court-of-human-rights.ppt"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/truman-show-in-kerala"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-transformative-power-of-online-activism"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-november-20-2016-the-thrill-of-saving-india-from-cybercrime"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/files/technology-behind-big-data.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/events/lecture-by-hans"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/newslaundry-april-1-2014-somi-das-the-take-down-of-free-speech-online"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/www-tehelka-com-vol-9-issue-36-sep-8-2012-shougat-dasgupta-the-state-and-the-rage-of-the-cyber-demon"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/spies-we-trust"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-social-role-of-the-communications-and-the-strengthening-of-the-freedom-of-expression-panel-cultural-diversity-and-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/digital-natives/blog/silent-rise"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/siege-of-android"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/the-times-of-india-sandhya-soman-august-23-2015-the-seedy-underbelly-of-revenge-porn"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/uk-dna-database-and-european-court-of-human-rights.ppt">
    <title>The UK DNA Database and the European Court of Human Rights</title>
    <link>http://editors.cis-india.org/internet-governance/blog/uk-dna-database-and-european-court-of-human-rights.ppt</link>
    <description>
        &lt;b&gt;A presentation by Dr. Helen Wallace, Director, GeneWatch, UK&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/uk-dna-database-and-european-court-of-human-rights.ppt'&gt;http://editors.cis-india.org/internet-governance/blog/uk-dna-database-and-european-court-of-human-rights.ppt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-10-10T10:19:35Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/truman-show-in-kerala">
    <title>The Truman Show, in Kerala </title>
    <link>http://editors.cis-india.org/news/truman-show-in-kerala</link>
    <description>
        &lt;b&gt;A webcast now allows you to see the goings-on in the CMs office 24x7.The idea is to promote openness,but theres still some way to go for it to make a difference, writes Sankar Radhakrishnan in this article published in the Times of India on &lt;/b&gt;
        
&lt;p&gt;Its a little past 7.30 on a Monday morning.A woman in a green sari is vigorously dusting a large glass-topped table stacked with files.She pauses for a moment to straighten the chair behind the desk,before continuing to clean the table.It is an early morning ritual that happens in offices across the country every working day.&lt;/p&gt;
&lt;p&gt;What makes this dust-busting exercise different though is that it is happening in the office of the chief minister of Kerala and anyone in the world can view it by logging on to www.keralacm.gov.in.&amp;nbsp;It was on July 1 this year that Keralas chief minister Oommen Chandy installed a webcam in his office so that everything that happens there can be seen by the public 24x7.The idea,he says,is to promote openness in government.It shows the world what goes on in my office and that I have nothing to hide, he adds.&lt;/p&gt;
&lt;p&gt;There are actually two cameras,one that covers the chief ministers personal chamber and another that covers the office his personal staff work in.According to officials at the Centre For Development of Imaging Technology (C-DIT ),which operates the cameras,over 5,50,000 visitors had logged on to the video feed till August 29.&lt;/p&gt;
&lt;p&gt;Since the webcam operates 24x7,the images keep streaming from the CMs office irrespective of whether he is in it or not.In fact,it produces so much footage that no steps have been taken so far to record and archive the images.&lt;/p&gt;
&lt;p&gt;Sometimes,the video feed seems slightly voyeuristic.It does,for instance,feel a little odd to see the chief minister and his guests sit around the conference table in a corner of the room,sipping tea and nibbling on biscuits.It seems equally strange to see the cleaning lady at work apparently unaware of the fact that the world is her stage.&lt;/p&gt;
&lt;p&gt;Chandy,though,is very aware that the webcam alone will not solve all problems,including those relating to corruption.However,he insists it is a symbol of the openness his United Democratic Front government brings to Kerala.&lt;/p&gt;
&lt;p&gt;What happens when a confidential meeting takes place Is there anything that needs to be so confidential Chandy says.One reason the webcams do not have an audio feed is to maintain confidentiality and let people speak freely,he says.CPM leader and former Kerala finance minister TM Thomas Isaac,however,dismisses the webcam as a gimmick and a cosmetic change.He says it is meaningless for the government to talk of transparency when several of its ministers have serious corruption allegations against them.I dont see much coming out of this, he declares.&lt;/p&gt;
&lt;p&gt;Raghavan Suresh,director,Public Affairs Centre,Bangalore,says this is the first time hes heard of an Indian politician installing a webcam in his office.It is a positive step, he adds.According to Suresh,the webcam may not eliminate corruption since it can happen outside the chief ministers office as well,but it is a measure of transparency that should be appreciated.&lt;/p&gt;
&lt;p&gt;Sunil Abraham,executive director,Centre for Internet and Society,says the decision to install a webcam in the Kerala chief ministers office,though it is a token measure,is a good move.It brings in one level of disclosure as you get to know who his visitors are and who hangs around his office, he points out.&lt;/p&gt;
&lt;p&gt;However,Abraham is disappointed that audio feeds are not available.An arrangement that caters to the publics need to hear what is being said in the chief ministers office,while allowing confidential discussions to remain secret,should be worked out,he believes.&lt;/p&gt;
&lt;p&gt;I also hope it doesnt stay at the top of the pyramid but is extended to key ministries and departments, he says.&lt;/p&gt;
&lt;p&gt;Chandy himself says having a webcam has been an interesting experience.I sometimes get calls from people viewing the webcam telling me that all the lights in my office are on even though Im not in the office.At other times,I get calls saying all the lights are off and it is not possible to see if the webcam is working, he says with a laugh.For the record,lights in the office are now dimmed when the chief minister steps out.And once he leaves for the day,a single light is usually left on so people know the webcam is working,say C-DIT officials.&lt;/p&gt;
&lt;p&gt;The response to the webcast so far has mostly been positive,the chief minister says.The most encouraging news,perhaps,is that two of his cabinet colleagues want to install similar systems in their offices.Openness in governance,it seems,is just a webcam away at least in Kerala.&lt;/p&gt;
&lt;p&gt;Read the original article published in the Times of India &lt;a class="external-link" href="http://lite.epaper.timesofindia.com/mobile.aspx?article=yes&amp;amp;pageid=19&amp;amp;edlabel=TOIM&amp;amp;mydateHid=07-09-2011&amp;amp;pubname=&amp;amp;edname=&amp;amp;articleid=Ar01901&amp;amp;format=&amp;amp;publabel=TOI"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/truman-show-in-kerala'&gt;http://editors.cis-india.org/news/truman-show-in-kerala&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-09-23T13:42:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls">
    <title>The trouble with trolls</title>
    <link>http://editors.cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls</link>
    <description>
        &lt;b&gt;Social networking sites give trolls the ability to hide their real identity and cause grief to others. Here is what you need to do if you face an online attack.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Vishal Mathur was &lt;a class="external-link" href="http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html"&gt;published in Livemint&lt;/a&gt; on July 22, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Social networking sites give trolls the ability       to hide their real identity and cause grief to others. Here is       what you need to do if you face an online attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though       social networks were not designed with the intention of letting       someone anonymously abuse another online, the reality is that       people utilize the ability to hide behind online identities to       threaten other users. These could be veiled attacks, direct abuse,       or even threats to “cause bodily harm”.       What can you do if you’re trolled and threatened on any social       network? Follow our five-step guide.       Avoid conversation if you can       The responses could come in relation to something you may have       just posted online. Or perhaps it could be just a random trolling       attempt, to get a response from you. It is important to understand       and identify such intentions. And as difficult as it may be, do       not respond. Getting into a direct interaction with a bully only       makes things worse.       Report to the social network       You should report any instance of cyber bullying or harassment to       the host social network—the website or forum on which the       interaction happened. There are various methods of getting in       touch with the moderators—customer support email, contact       submission forms or even via phone, in certain locations. Describe       the problem in detail, and persist till the offending account is       blocked from the platform.       “Most social networks have systems that allow you to report       abusive content and users. However, there is great variance in the       speed with which they respond across different platforms,       jurisdictions, etc.,” says Sunil Abraham, executive director at       the Bangalore-based non-profit research organization Centre for       Internet and Society. New Delhi-based Anja Kovacs, project       director, at civil society organization Internet Democracy       Project, adds: “Blocking and reporting an account can be two ways       to stop harassment on some social networks, but on other       platforms, such as Twitter, it is possible for the person to       immediately make a new account under a different username, meaning       that these measures do not necessarily stop the harassment.”       Ankhi Das, director, public policy, India and South Asia at social       network Facebook, says: “Every reported piece of content is       reviewed. Serial offenders are notified for non-compliance.”       Facebook’s Community Standards, that prevent harassment and       offensive posts, have an 11-point categorization for reported       content—violence and threats, hate speech, graphic content,       bullying and harassment, to name some.       Raheel Khursheed, head of news, politics and government at Twitter       India, did not respond to our mail about how Twitter handles       trolls at the time of going to press.       On blogs and forums, it may be a bit easier to deal with trolling       and abuse. If it is your own blog, you can delete comments and       block users. If it is a forum, the administrator can do it for       you. But, with social networks having millions of users, it is not       possible to have one administrator managing it all. And it is not       just Facebook and Twitter, all social networks have a method by       which you can register your complaint. LinkedIn, for example,       automatically blocks a user who gets multiple “I don’t know”       responses to invitations to connect. There is a strong monitoring       policy where any reported content (recommendations or direct       messages) is examined and immediate warnings are sent out to       offending parties.       Keep a copy of the offensive posts       Be it a post, or a series of posts, direct message or even an       offending photograph, always save it for future reference. Never       assume that the matter will end soon, and always prepare for the       worst.       Don’t ignore privacy settings       Most people start using Facebook, Twitter and other social       networks without paying much attention to the privacy       settings—what content people can see on your page, and who can       directly contact you. Be conservative in sharing information—the       less you share, the lower the chances of someone picking on you.       “Avoid friending or linking to people whom you don’t know in real       life unless you are certain of the chain of trust that exists       between you and the unknown person,” says Abraham. New Delhi-based       cyber lawyer Apar Gupta, adds: “The privacy settings on most       social networking platforms allow users to prevent (restrict) the       audience for their posts as well as strangers from contacting       them. This will prevent most cases of online harassment.”       Get help from the law       In case social networks are not able to effectively block a user,       or are in some way unwilling to do so, take help from the       law-enforcement authorities. File an FIR in the nearest police       station. Unfortunately, the progress may not be very smooth. The       reality is that not every law-enforcement officer may know about       social networking sites. “You could try and go to the police, but       without support from the social network platform, they are often       at a loss to do much themselves,” warns Kovacs.       The police may look for hints of threat to cause bodily harm or       worse still, to life. In such cases, they may recommend the case       to the Cyber Crime Cell of the Central Bureau of Investigation.       “Generally, while the substantive offences do exist under law, the       process for having them enforced is deficient. These are deeper       structural problems of delay, investigation and conviction which       are prevalent across criminal justice or civil litigation,”       clarifies Gupta. Officials at the Cyber Crime Cell say they take       up cases after reference from the local police, who file the       report first and do a preliminary level of investigation.       But it is important to realize that only the police and the       law-enforcement agencies have the right to demand further details       about the perpetrator from the social networks, starting with       profile       details and Internet Protocol (IP) addresses, which will help       track the person down. Das clarifies: “Facebook has a       point-of-contact system through which the law-enforcement agencies       tell us what the actual case is, depending on severity. The police       may ask us to take down particular content, or even ask for user       information like IP info, to prevent real crime.”       According to Facebook’s Government Requests Report for       July-December 2013, the network restricted access to 4,765 pieces       of content after requests from the Indian government and       law-enforcement agencies.&lt;/p&gt;
&lt;div style="text-align: left; "&gt;Read more at: &lt;a href="http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html?utm_source=ref_article"&gt;http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html?utm_source=copy&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Though social networks were not designed with       the intention of letting someone anonymously abuse another online,       the reality is that people utilize the ability to hide behind       online identities to threaten other users. These could be veiled       attacks, direct abuse, or even threats to “cause bodily harm”.       What can you do if you’re trolled and threatened on any social       network? Follow our five-step guide. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Avoid conversation if you can &lt;/b&gt;&lt;br /&gt; The responses could come in relation to something you may have       just posted online. Or perhaps it could be just a random trolling       attempt, to get a response from you. It is important to understand       and identify such intentions. And as difficult as it may be, do       not respond. Getting into a direct interaction with a bully only       makes things worse. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Report to the social network &lt;/b&gt;&lt;br /&gt; You should report any instance of cyber bullying or harassment to       the host social network—the website or forum on which the       interaction happened. There are various methods of getting in       touch with the moderators—customer support email, contact       submission forms or even via phone, in certain locations. Describe       the problem in detail, and persist till the offending account is       blocked from the platform. “Most social networks have systems that       allow you to report abusive content and users. However, there is       great variance in the speed with which they respond across       different platforms, jurisdictions, etc.,” says Sunil Abraham,       executive director at the Bangalore-based non-profit research       organization Centre for Internet and Society. New Delhi-based Anja       Kovacs, project director, at civil society organization Internet       Democracy Project, adds: “Blocking and reporting an account can be       two ways to stop harassment on some social networks, but on other       platforms, such as Twitter, it is possible for the person to       immediately make a new account under a different username, meaning       that these measures do not necessarily stop the harassment.” Ankhi       Das, director, public policy, India and South Asia at social       network Facebook, says: “Every reported piece of content is       reviewed. Serial offenders are notified for non-compliance.”       Facebook’s Community Standards, that prevent harassment and       offensive posts, have an 11-point categorization for reported       content—violence and threats, hate speech, graphic content,       bullying and harassment, to name some. Raheel Khursheed, head of       news, politics and government at Twitter India, did not respond to       our mail about how Twitter handles trolls at the time of going to       press. On blogs and forums, it may be a bit easier to deal with       trolling and abuse. If it is your own blog, you can delete       comments and block users. If it is a forum, the administrator can       do it for you. But, with social networks having millions of users,       it is not possible to have one administrator managing it all. And       it is not just Facebook and Twitter, all social networks have a       method by which you can register your complaint. LinkedIn, for       example, automatically blocks a user who gets multiple “I don’t       know” responses to invitations to connect. There is a strong       monitoring policy where any reported content (recommendations or       direct messages) is examined and immediate warnings are sent out       to offending parties. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Keep a copy of the offensive posts &lt;/b&gt;&lt;br /&gt; Be it a post, or a series of posts, direct message or even an       offending photograph, always save it for future reference. Never       assume that the matter will end soon, and always prepare for the       worst. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Don’t ignore privacy settings &lt;/b&gt;&lt;br /&gt; Most people start using Facebook, Twitter and other social       networks without paying much attention to the privacy       settings—what content people can see on your page, and who can       directly contact you. Be conservative in sharing information—the       less you share, the lower the chances of someone picking on you.       “Avoid friending or linking to people whom you don’t know in real       life unless you are certain of the chain of trust that exists       between you and the unknown person,” says Abraham. New Delhi-based       cyber lawyer Apar Gupta, adds: “The privacy settings on most       social networking platforms allow users to prevent (restrict) the       audience for their posts as well as strangers from contacting       them. This will prevent most cases of online harassment.” &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Get help from the law &lt;/b&gt;&lt;br /&gt; In case social networks are not able to effectively block a user,       or are in some way unwilling to do so, take help from the       law-enforcement authorities. File an FIR in the nearest police       station. Unfortunately, the progress may not be very smooth. The       reality is that not every law-enforcement officer may know about       social networking sites. “You could try and go to the police, but       without support from the social network platform, they are often       at a loss to do much themselves,” warns Kovacs. The police may       look for hints of threat to cause bodily harm or worse still, to       life. In such cases, they may recommend the case to the Cyber       Crime Cell of the Central Bureau of Investigation. “Generally,       while the substantive offences do exist under law, the process for       having them enforced is deficient. These are deeper structural       problems of delay, investigation and conviction which are       prevalent across criminal justice or civil litigation,” clarifies       Gupta. Officials at the Cyber Crime Cell say they take up cases       after reference from the local police, who file the report first       and do a preliminary level of investigation. But it is important       to realize that only the police and the law-enforcement agencies       have the right to demand further details about the perpetrator       from the social networks, starting with profile details and       Internet Protocol (IP) addresses, which will help track the person       down. Das clarifies: “Facebook has a point-of-contact system       through which the law-enforcement agencies tell us what the actual       case is, depending on severity. The police may ask us to take down       particular content, or even ask for user information like IP info,       to prevent real crime.” According to Facebook’s Government       Requests Report for July-December 2013, the network restricted       access to 4,765 pieces of content after requests from the Indian       government and law-enforcement agencies.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls'&gt;http://editors.cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-28T05:42:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-transformative-power-of-online-activism">
    <title>The Transformative Power of Online Activism</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-transformative-power-of-online-activism</link>
    <description>
        &lt;b&gt;Rohini Lakshané was a panelist at this event organized by Hertie School of Governance on May 4, 2015.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Panelists&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Alissa Wahid,&lt;/b&gt; National coordinator of the GUSDURian Network Indonesia&lt;br /&gt;&lt;b&gt;Renata Avila, &lt;/b&gt;Member of Creative Commons Board of Directors and a member of the Web Index Science Council, Guatemala&lt;br /&gt;&lt;b&gt;Rohini Lakshané,&lt;/b&gt; Researcher at the Centre for Internet and Society, India&lt;br /&gt;&lt;b&gt;Georgia Popplewell,&lt;/b&gt; Writer and media producer from Trinidad and Tobago&lt;/p&gt;
&lt;p&gt;Moderation: &lt;b&gt;Dilek Kurban J.D., &lt;/b&gt;Marie Curie Fellow, Hertie School of Governance&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The lightning spread of communication technologies has enabled the dissemination of information and ideas that mainstream media have been unwilling or unable to publish. While the Internet empowers individuals to engage in advocating, mobilizing and reacting on behalf of the disempowered, it also raises significant issues of privacy and hate speech when used by the wrong people for the wrong reasons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Are we at a stage where we can argue that online activism challenges the balance of power between governments and citizens, giving rise to a new form of deliberative and participatory democracy? Or is the transformative power of virtual civil disobedience blown out of proportion? To what extent is the Internet a level playing field where gender, ethnicity or class do not matter? What kinds of legal and political instruments are available to governments and corporations in their efforts to control the Internet? This panel discussion will bring together four female jury members of The BOBS Award 2015 who will seek answers to these and other questions regarding Internet activism, citizen journalism and grassroots mobilization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;re:thinking tomorrow is a discussion series hosted by Deutsche Welle and the Hertie School of Governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For more information &lt;a class="external-link" href="http://www.hertie-school.org/mediaandevents/events/events-pages/04052015-the-transformative-power-of-online-activism/"&gt;see here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-transformative-power-of-online-activism'&gt;http://editors.cis-india.org/internet-governance/news/the-transformative-power-of-online-activism&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-06-18T16:00:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-november-20-2016-the-thrill-of-saving-india-from-cybercrime">
    <title>The thrill of saving India from cybercrime</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-november-20-2016-the-thrill-of-saving-india-from-cybercrime</link>
    <description>
        &lt;b&gt;Geeks seize the chance to help the government, defence forces and banks draw up fences against tech crimes.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The &lt;a class="external-link" href="http://www.thehindu.com/business/Industry/the-thrill-of-saving-india-from-cybercrime/article9367640.ece"&gt;article by Peerzada Abrar was published in the Hindu &lt;/a&gt;on November 20, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;Saket Modi loves long flights. The 26-year-old hacker  likes to do most of his reasoning while criss-crossing the world. It was  on one such flight from the United States to India that the co-founder  of cybersecurity start-up Lucideus Tech read about India's largest data  security breaches. While surfing the in-flight Internet he came to know  that the security of about 3.2 million debit cards had been compromised.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“I was not surprised but I started thinking about  how it would have happened. What was the ‘exploit’ used, how long was it  there,” said Mr. Modi. Soon after reaching New Delhi, he received  multiple requests from several banks and organisations to protect them  from the hacking incident, which is just one of the thousands of  cybercrimes that the country is facing.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In India,  there has been a surge of approximately 350 per cent of cybercrime cases  registered under the Information Technology (IT) Act, 2000 from the  year of 2011 to 2014, according to a joint study by The Associated  Chambers of Commerce and Industry of India and consulting firm  PricewaterhouseCoopers. The Indian Computer Emergency Response Team  (CERT-In) has also reported a surge in the number of incidents handled  by it, with close to 50,000 security incidents in 2015, noted the  Assocham-PwC joint study.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Ethical hackers&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Mr.  Modi is among a new breed of ethical hackers-turned-entrepreneurs who  are betting big on this opportunity. An ethical hacker is a computer  expert who hacks into a computer network on the behalf of its owner in  order to test or evaluate its security, rather than with malicious or  criminal intent.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“You cannot live in a world where  you think that you can't be hacked. It doesn’t matter who you are,” said  Mr. Modi who cofounded Lucideus four years ago. The company clocked  revenues of Rs.4 crore in the last fiscal. This compares with the Rs.2.5  lakh revenues in the first year. The New Delhi-based firm now counts  Reserve Bank of India, Ministry of Defence and Standard Chartered among  its top clients.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Mr. Modi, who is also a pianist,  discovered his skills for hacking into secure computer systems while  preparing for his board exams. He hacked into his school computer and  stole the chemistry question paper, after realising that he would not be  able to clear the test conducted by his school. However, a guilty  conscience compelled him to confess to his teacher who permitted him to  still take the test. The incident transformed him to use his skills to  protect and not misuse them. This year, Lucideus was hired by National  Payments Corporation of India (NPCI) along with other information  security specialists to protect its most ambitious project, the Unified  Payment Interface (UPI) platform, from cyber attacks. UPI aims to bring  digital banking to 1.2 billion people in the country. Lucideus has a  team of 70 people mostly fresh college graduates who do hacking with  authorisation.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The reason behind choosing Lucideus  was their young, energetic and knowledgeable team," said Bhavesh  Lakhani, chief technology officer of DSP BlackRock, one of the premier  asset management companies. Mr. Lakhani said that India is currently the  epicentre of financial and technological advancements which make it a  probable target of cyber-attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Hacking lifeline&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Indeed,  a new breed of cyber criminals has emerged, whose main aim is not just  financial gains but also cause disruption and chaos to businesses in  particular and the nation at large, according to the Assocham-PwC study.  Attackers can gain control of vital systems such as nuclear plants,  railways, transportation and hospitals. This can subsequently lead to  dire consequences such as power failures, water pollution or floods,  disruption of transportation systems and loss of life, noted the study.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The  hacker doesn’t care whether he is attacking an Indian or a U.S.  company. It is bread and butter for him and he wants to eat it wherever  he gets it from,” said Trishneet Arora, a 22-year-old ethical hacker. In  an office tucked away in Mohali, a commercial hub lying adjacent to the  city of Chandigarh in Punjab, Mr.Arora fights these cyberattacks on a  daily basis to protect his clients. His start-up TAC Security provides  an emergency service to customers who have been hacked or are  anticipating a cyberattack. It alerted a hospital in the U.S. after  detecting vulnerabilities in their computer network.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Mr.Arora  said that the hackers could have easily shut down the intensive care  unit which was connected to it and remotely killed the patients. TAC  said the data server of a bank in the UAE containing critical  information got hacked recently. The bank also lost access to the  server. TAC said that it not only helped the organisation to get back  access to the server but also traced the hacker’s identity.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A  school drop out, Mr.Arora founded TAC three years ago. But he initially  found it tough to convince enterprises about his special skills. “I was  a backbencher in the classroom and not good in studies, but I loved  playing video games and hacking,” he said. He conducted workshops on  hacking and provided his expertise to law enforcement agencies such as  the Central Bureau of Investigation and various State police  departments. His firm now provides its services to customers such as  Reliance Industries, dairy brand Amul and tractor manufacturer Sonalika.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“We  were surprised by their expertise,” said R.S. Sodhi, managing director  of Amul. “We wanted to be sure that the company’s vital IT  infrastructure is in the right hands – the big question was, ‘Who can  that be?’ In TAC, we found that team.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;TAC expects to cross revenues of $5 million (Rs.33 crore) and employ about 100 ethical hackers by next year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Budget woes&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Security  watchers such as Sunil Abraham, executive director of Bengaluru-based  think tank Centre for Internet and Society said that India’s  cybersecurity budget is woefully inadequate when compared to the  spending by other countries. In 2014-15, the government doubled its  cybersecurity budget by earmarking Rs.116 crore. “We require a budget of  $1 billion per annum or every two years to build the cybersecurity  infrastructure. The current cyber security policy has no such budget,”  said Mr. Abraham.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;According to Data Security Council  of India (DSCI), India's cybersecurity market is expected to grow  nine-fold to $35 billion by 2025, from about $4 billion. This would  mainly be driven by an ecosystem to promote the growth of indigenous  security product and services start-up companies.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The  Cyber Security Task Force (CSTF) set up by DSCI and industry body  Nasscom expects to create a trained base of one million certified and  skilled cybersecurity professionals. It also aims to build more than 100  successful security product companies from India. Investors who  normally focus on e-commerce ventures or public markets are now taking  note of this opportunity and are betting on such ventures. Amit  Choudhary, director, MotilalOswal Private Equity and an investor in  Lucideus, said he saw tremendous opportunity in the cybersecurity market  as hackers are shifting their focus from developed countries to  emerging countries like India.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“There is a huge  opportunity. The recent security breaches of a few Indian banks are an  example,” said Vijay Kedia an ace stock picker and an investor in TAC  Security. He said that organisations are still unaware of the widespread  damage that can be caused by hackers. “The next war will be a  ‘cyberwar’,” he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-november-20-2016-the-thrill-of-saving-india-from-cybercrime'&gt;http://editors.cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-november-20-2016-the-thrill-of-saving-india-from-cybercrime&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    

   <dc:date>2016-11-21T02:42:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/files/technology-behind-big-data.pdf">
    <title>The Technology Behind Big Data</title>
    <link>http://editors.cis-india.org/internet-governance/files/technology-behind-big-data.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/files/technology-behind-big-data.pdf'&gt;http://editors.cis-india.org/internet-governance/files/technology-behind-big-data.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-12-02T01:23:26Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/events/lecture-by-hans">
    <title>The Task of the Translator after Google</title>
    <link>http://editors.cis-india.org/events/lecture-by-hans</link>
    <description>
        &lt;b&gt;Hans Verghese Mathews, a distinguished fellow with the Centre for Internet and Society (CIS) will give a public lecture on April 30, 2011.&lt;/b&gt;
        
&lt;p&gt;The talk will consider again &amp;nbsp;― proceeding upon the increasing &amp;nbsp;'searchability' &amp;nbsp;of literary corpora that the Web will presumably allow ― &amp;nbsp;the special task assigned the translator by Walter Benjamin: which was the &amp;nbsp;'restitution' &amp;nbsp;of &amp;nbsp;'originals' &amp;nbsp;through the &amp;nbsp;'afterlives' &amp;nbsp;given them by their &amp;nbsp;'traducings' &amp;nbsp;into other languages. A reformulation of that task will be attempted: but the exercise will be conducted in an illustrative way, in the course of examining the approved translation into English of &lt;em&gt;El Aleph&lt;/em&gt;, one of the more famous among the early &lt;em&gt;ficciones&lt;/em&gt; of Borges.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Hans Varghese Mathews&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;img src="http://editors.cis-india.org/home-images/hans.jpg/image_preview" alt="Hans Verghese Mathews" class="image-inline image-inline" title="Hans Verghese Mathews" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Hans Varghese Mathews read philosophy as an undergraduate, at the University of Southern California, studying logic and aesthetics; and went on to obtain a doctorate in mathematics, from the University of Wisconsin, studying algebraic topology primarily, with mathematical logic and philosophy as subsidiary subjects. He has been a research associate with the Indian Statistical Institute, and has written extensively on visual art for Frontline; he currently directs mathematical modelling for an analytics firm, and is a contributing editor to the online journal Phalanx. He has an abiding interest in the formal understanding of painting and poetry; and a more recent and dominating interest in the mathematisation of the social sciences.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLWw04A.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLWw04A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/events/lecture-by-hans'&gt;http://editors.cis-india.org/events/lecture-by-hans&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2011-10-07T05:36:43Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/newslaundry-april-1-2014-somi-das-the-take-down-of-free-speech-online">
    <title>The Take Down of Free Speech Online</title>
    <link>http://editors.cis-india.org/news/newslaundry-april-1-2014-somi-das-the-take-down-of-free-speech-online</link>
    <description>
        &lt;b&gt;As part of a study to access rate of compliance, in 2011, the Centre for Internet and Society Bangalore sent frivolous “take down” requests to seven prominent intermediaries. The study showed exactly how easy it is to take down online content. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published in &lt;a class="external-link" href="http://www.newslaundry.com/2014/04/01/the-take-down-of-free-speech-online/"&gt;Newslaundry&lt;/a&gt; on April 1, 2014. CIS research on Intermediary Liabilities is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;CIS found that six out of the seven intermediaries “&lt;a href="http://editors.cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet" target="_blank"&gt;over complied&lt;/a&gt;”  with the notices. Facts such as these about intermediary liability were  discussed in a panel discussion “Intermediary Liability &amp;amp; Freedom  of Expression in India” in Delhi on March 27, 2014 organised by Centre  for Communication Governance at National Law University in collaboration  with the Global Network Initiative.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The panel also included Professor Ranbir Singh, Vice Chancellor of NLU, Jermyn Brooks&lt;b&gt;&lt;i&gt; (&lt;/i&gt;&lt;/b&gt;Independent  Chair – Global Network Initiative, Washington DC), Shyam Divan (Senior  Advocate, Supreme Court of India) and SiddharthVaradarajan (Journalist).  They discussed proxy censorship by government through private players  and how e-business’ lose out on opportunities because of the current  legal framework in the country within which intermediaries have to  function.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to&lt;a href="http://www.indiankanoon.org/doc/1752240/" target="_blank"&gt; Section 2(1)(w) of The Information Technology Act, 2000,&lt;/a&gt; “intermediary”- with respect to any particular electronic message  -signifies any person who on behalf of another person receives, stores  or transmits that message or provides any service with respect to that  message.According to Rishab Dara, recipient of the Google policy  Fellowship 2011, in an article titled, &lt;a href="http://editors.cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet" target="_blank"&gt;Intermediary Liability in India: Chilling Effects on Free Expression on the Internet&lt;/a&gt;,  “intermediaries are widely recognised as essential cogs in the wheel of  exercising the right to freedom of expression on the Internet. Most  major jurisdictions around the world have introduced legislations for  limiting intermediary liability in order to ensure that this wheel does  not stop spinning”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The “safe harbor”or what is also known asIntermediary Liability Laws  according to Section 79 of the Information Technology Act are given  below:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Intermediaries not to be Liable in Certain Cases&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(1) Notwithstanding anything contained in any law for the time  being in force but subject to the provisions of sub-sections (2) and  (3), an intermediary shall not be liable for any third party  information, data, or communication link made available or hosted by  him. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; (2) The provisions of sub-section (1) shall apply if—&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(a)  the function of the intermediary is limited to providing access to a  communication system over which information made available by third  parties is transmitted or temporarily stored or hosted; or &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b) the intermediary does not—&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; (i) initiate the transmission,&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(ii) select the receiver of the transmission, and&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(iii) select or modify the information contained in the transmission;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(c)  the intermediary observes due diligence while discharging his duties  under this Act and also observes such other guidelines as the Central  Government may prescribe in this behalf.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(3) The provisions of sub-section (1) shall not apply if—&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(a)  the intermediary has conspired or abetted or aided or induced, whether  by threats or promise or othorise in the commission of the unlawful act;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b)  upon receiving actual knowledge, or on being notified by the  appropriate Government or its agency that any information, data or  communication link residing in or connected to a computer resource  controlled by the intermediary is being used to commit the unlawful act,  the intermediary fails to expeditiously remove or disable access to  that material on that resource without vitiating the evidence in any manner.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Act, the intermediary needs to act on a complaint within 36  hours of a take down notice -failing which they will be liable to legal  action if the case is taken to the court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shyam Divan spoke about  the absurdity of the 36-hour turnaround time that an intermediary has  between receiving a complaint and taking down the content. According to  him, without any kind of legal option to fall back on, intermediaries  decide to comply with such take down notices fearing “serious penalties  and possibility of prosecution” which results in “indirect censorship”.   He also said, “Domestic constitution in itself is not going to be  sufficient”.  “Meta-constitutions” which are transnational and have  uniform laws across countries could be a possible solution to the  current confusion as the internet is a global phenomenon and it would  ensure that “the extent of our online rights would not be limited to the  constitution of the country”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Giving the example of hate speech,  Siddharth Varadarajan, mentioned the Indian executive’s different  approaches towards different mediums. Referring to hate speeches made  during the 1993 Bombay riots by Shiv Sena leaders and those made during  the 2002 Gujarat riots, he said, “Hate speech never gets prosecuted when  made amid a physical crowd in a volatile situation.I can understand why  politicians won’t be prosecuted but why so much sensitivity on online  content. This paradox is worth reflecting on.Despite its limited reach,  the executive reacts in such a hyper-sensitive manner”.He adds that as  the editor of a news website one faces daily problems in taking  decisions on online content especially on comment moderation and whether  the website would be responsible for a certain comment made by a  reader. Echoing Shyam Divan’s views,he said that in India more than the  punishment, when a case is filed, the legal process itself becomes a  punishment, which forces Internet Service Providers to comply with  requests of blocking online content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Global Network Initiative  is a Washington-based organisation that provides a framework for  companies to deal with governments requesting censorship or surveillance  of online content, “rooted in international standards legal framework  also interesting people”. According to a report released by it,  “provided that the existing safe harbour regime is improved,  intermediaries can become a significant part of the economy and their  GDP contribution may increase to more than 1.3 per cent by 2015. The  potential corresponds to $41 billion by 2015”.Jermyn Brooks&lt;b&gt;&lt;i&gt;,&lt;/i&gt;&lt;/b&gt;Independent  Chair of GNI,argued that instead of focusing  all efforts on ensuring  that the Information Technology (Intermediaries Guidelines) Rules, 2011  gets struck down by Courts for its unconstitutionality, there should  also be a movement to effect policy changes through the amendment of the  law. According to him, such a proposition would be more lucrative for a  government looking for “re-invigoration of economic growth in India”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion was significant in the light that a number of cases  related to the IT Act and freedom of online speech will be heard in the  Supreme Court in the coming months. A petition by &lt;i&gt;Mouthshut.com &lt;/i&gt;challenges  the Information Technology (Intermediaries Guidelines) Rules 2011  “which effectively creates a notice and takedown regime for content  hosted by intermediaries”. Another important case up for hearing is a  petition by Member of Parliament Rajeev Chandrashekhar,“which also  challenges these rules on grounds that they are ambiguous, require  private parties to subjectively assess objectionable content, and that  they undermine the safe harbour exemptions from liability granted to  intermediaries by section 79 of the IT Act”. The People’s Union for  Civil Liberties (PUCL&lt;i&gt;) &lt;/i&gt;has challenged the Intermediaries  Guidelines rules as well as the Procedure and Safeguards for Blocking  for Access of Information by the Public Rules 2009. “This petition has  pointed to the lack of transparency in the blocking procedure, which  does not currently offer the public any notice or reasons for the  blocking.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The cases pending before the Supreme Court will have a significant  impact on the freedom of expression. We should never take our rights for  granted – the interpretation of these rights needs to be consistent  with their spirit”, said Professor Ranbir Singh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Citing the recent example of the &lt;a href="http://timesofindia.indiatimes.com/india/After-Penguin-another-publisher-recalls-Wendy-Donigers-book/articleshow/31426314.cms" target="_blank"&gt;Wendy Doniger&lt;/a&gt; episode, Varadarajan says, “If Penguin chooses to pack up at the  District court level, you know how Internet Service Providers would  react to take down notices…Specific targeting of online speech would  ultimately have a negative impact on the traditional media”. And that is  the crux of the matter. In the absence of intermediate liability not  being limited, online censorship and the curtailment of the freedom of  speech will become far easier and will only worsen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/newslaundry-april-1-2014-somi-das-the-take-down-of-free-speech-online'&gt;http://editors.cis-india.org/news/newslaundry-april-1-2014-somi-das-the-take-down-of-free-speech-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2014-04-06T05:19:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/www-tehelka-com-vol-9-issue-36-sep-8-2012-shougat-dasgupta-the-state-and-the-rage-of-the-cyber-demon">
    <title>The state. And the rage of the cyber demon</title>
    <link>http://editors.cis-india.org/news/www-tehelka-com-vol-9-issue-36-sep-8-2012-shougat-dasgupta-the-state-and-the-rage-of-the-cyber-demon</link>
    <description>
        &lt;b&gt;The Internet might be a Pandora’s box. But should the government be wasting time regulating the cacophony?&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Shougat Dasgupta's article was &lt;a class="external-link" href="http://www.tehelka.com/story_main53.asp?filename=Op080912State.asp"&gt;published&lt;/a&gt; in Tehelka, Vol 9, Issue 36, Dated September 8, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;SOME YEARS ago a cartoon was doing the rounds that caught in a few sharp strokes the selfimportance and self-righteousness of the Internet warrior. A man sits hunched at his computer, the keyboard lit with his fervour. Not looking away from the screen, he has a terse, impatient exchange with his partner off-panel: ‘Are you coming to bed?’ ‘I can’t. This is important.’ ‘What?’ ‘Someone is wrong on the Internet.’ It is the anonymous exchange that gives cyber debates their peculiar animus; that anonymity coupled with the low stakes, as is famously said of academic politics, is what makes the sniping so bitter and vicious. The complaints about social media like Twitter or the comment sections on blogs have mostly centred on the incivility of the discourse, on ‘trolls’ too eager to throw rotting vegetables at journalists, politicians, celebrities unused to such irreverence. But action taken by the government in the last fortnight to block content from over 300 websites and a dozen Twitter accounts imputes a far more vitiating effect on society than the mere puncturing of already overinflated egos.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kapil Sibal, Minister for Communications &amp;amp; Information Technology, has said in interviews that the government’s intent was to “protect the victims” from these “mischievous acts happening through these sites and blogs”. There is, by now, little doubt that the threats and fake pictures of slain Muslims spread through mobile phones and social media, “disseminating misinformation” in the minister’s phrase, helped exacerbate tensions and fears. There is equally little doubt that what action the government took was both late and clumsy: blocking blogs that debunked the rumours and morphed images that the government held responsible for causing panic; blocking web pages of international news organisations such as The Telegraph and Al-Jazeera; blocking Twitter accounts of journalists, the government’s political opponents, accounts parodying the prime minister, even people who tweeted mostly about information technology and cricket. Like a giant in clown shoes chasing a sprite, the government has looked lumbering and foolish, led a merry dance by light-footed ‘netizens’, while the rest of us pointed and laughed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Can the government’s actions be at all justified? Appearing on NDTV’s ‘We the People’, R Chandrashekhar, Secretary, Department of Information Technology, argued that “once a law enforcement agency has made an assessment you act first and then make corrections as you go along”. In essence, extraordinary times call for extraordinary measures, which along with concern for ‘national security’ is trotted out by every democratic government accused of ignoring civil liberties. Congress spokesperson Manish Tewari, on the same programme, claimed that the “mandate of section 69a of the Information Technology Act and the rules with regard to safeguards and blocking is fairly clear and rule 9 allows the government, if it thinks that there’s an expedient situation in order to protect the sovereignty of the State or public order, to go ahead with this blocking on an interim basis”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We will discuss the section being referred to and the 2011 guidelines for intermediaries later but for now let’s accept the government’s argument that it acted in the face of a clear and present danger, to borrow from Oliver Wendell Holmes, the famous 19th-century US Supreme Court Justice. Kharan Thapar, citing another of Holmes’s shopworn phrases, wrote that “[ j]ust as it’s not acceptable to shout fire in a crowded cinema hall for the fun of it, it cannot be permitted to deliberately frighten helpless innocent people who, for whatever reason, believe you and panic”. Thapar is making the point that free speech is not without its responsibilities. He does so, however, using a long discredited cliché and compounds this error with condescension, refusing to grant people (“helpless”, “innocent”, like babies) their full agency. Besides, the government only acted from 18 August to limit text messaging, already months after initial images of supposed Burmese atrocities against Muslims had been widely circulated to stir anger. It also chose to block webpages and Twitter handles, some for spurious, even mystifying reasons. The result has been embarrassment. Acting arbitrarily in the name of communal harmony to prevent damage after terrible damage has already been done, does little to convince the people you are supposedly protecting that you have the situation in hand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has left itself open to being serially lectured about free speech by the US government, by journalists (particularly Kanchan Gupta, whose apparently blocked Twitter account has made him a patron saint of free speech), by hysterical twitterers (ok, ‘tweeple’) drawing an entirely ridiculous parallel to the Emergency, and most egregiously by Narendra Modi. Presumably, Modi, by blackening his display picture was not commenting on the black irony of a man who bans books mourning constraints on freedom of speech. Pranesh Prakash of the Bengaluru-based Centre for Internet and Society (CIS), a trenchant critic of the government’s recent blocks (social media not coal) and the “horrendously drafted” legislation that permits the leeway for such indiscriminate action, says that “people [were] losing a sense of reality”.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img align="middle" height="268" src="http://www.tehelka.com/channels/Op-ed/2012/September/08/images/Illustration.jpg" width="185" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;He points to the criticism of the government’s blocking of parodies of the prime minister’s Twitter account. “An underreported part of this whole controversy,” he says,“is Twitter’s own terms of service and one parody account in particular violates those terms.” He confesses to “having to look quite closely” to tell the PMO account from PMO, which substitutes a zero for the letter ‘o’. Also, according to sources, a letter sent last year by the government to the likes of Google and Facebook asking them to screen for offensive content specifically excepted parody and satire. If accurate, this underscores that the Prime Minister’s Office did not have a problem with parody but a genuine, if peculiar, fear of misinformation stemming from the six accounts it asked Twitter to remove.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;NONE OF this is to say that the government, in its haste, acted with reason. Certainly, it has since last year been working assiduously to exert at least some control over online content. The rules from April last year updating sections of the Information Technology Act, 2000, requires “due diligence” from companies like Twitter, or Facebook, to not “host, display, upload, modify, publish, transmit, update or share any information that… is grossly harmful, harassing, blasphemous, defamatory, obscene, pornographic, paedophilic, libellous, invasive of another’s privacy, hateful, or racially, ethnically objectionable, disparaging, relating or encouraging money laundering or gambling, or otherwise unlawful in any manner whatever…” Disparaging? Encouraging gambling? Well, gambling, at least in casinos, is lawful in Goa and Sikkim. No wonder Kapil Sibal felt he was on firm legal ground when he complained in December about “derogatory pictures” of Sonia Gandhi and Manmohan Singh that the government had culled from Facebook accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash, of the CIS, describes the Information Technology Act, particularly sections 69a and 66 as “having issues and being badly worded”. The powers it gives the government are too intrusive and that the prison sentences for offenders “are greater than those for death by negligence”. What he finds most troubling is how little transparency exists around issues of censorship; how, for instance, there is no easily accessible central list of banned books. “How,” he asks, “are people even supposed to know if their website or Twitter account is blocked if the government won’t issue proper notices and lists?” Our democratically elected government appears fond of the aristocratic maxim to never contradict, never explain, never apologise, as if hauteur and bluster are adequate substitutes for communication and we are subjects rather than citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Seen in isolation, the blocking of websites and rationing of text messages is just a comical bungle by an unwieldy, Luddite administration. In the context of the last 12 months though, the government’s recent actions are a logical extension of its drive to bring the Internet to heel. The unregulated nature of the Internet is a particular bugbear of this government. It had already made a proposal to the United Nations in October last year, at the 66th session of the General Assembly, for the institution of a Committee for Internet- Related Policies. This 50-nation body would be tasked not to control the Internet, “or allow Governments to have the last word in regulating the Internet, but to make sure that the Internet is governed not unilaterally, but in an open, democratic, inclusive and participatory manner, with the participation of all stakeholders”. For all the incompetence the government has displayed, both most recently and in previous attempts to censor Internet content, it asks an important question about the future of Internet regulation, about the need for multilateral debate and international consensus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TEHELKA, as cyber chatter about the blocked sites grew increasingly frenzied, asked its online readers to define the forum provided by social media. Most agreed that Twitter, for instance, was a public space, a place to give vent to private thoughts publicly with, if wanted or needed, the comfort of anonymity. The metaphor used is often that of a public square or town hall. I’ve always thought of Twitter as a carnival — a space, as defined by the Russian literary theorist Mikhail Bakhtin, where the existing social order is overturned, where social pieties are profaned. Twitter, like carnival, appeared to me an exhilarating space. This is utterly naïve. The fact is that Twitter is not a public space, it is privately owned and its investors are in the business of revenue generation and profit. This means Twitter’s terms of service are subject to change, as is its cooperation with governments over the private information it controls and owns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rahul Bose, the actor, told me in a conversation about social media that he thinks individual freedom is increasingly an “illusion”, that the very idea has become “laughable”. We live our lives, particularly our online lives, under the unblinking gaze of government: “You don’t need a close circuit camera at Flora Fountain to know you’re being watched, that every piece of information is on a file somewhere.” (This is probably not quite true of our dozy government.) It is indisputable that private entities such as Facebook and Twitter hold enormous amounts of information about individuals. In that light, surely, the Indian government is correct about the need for multilateral oversight of a system currently beholden in significant ways to the United States. ICANN, the Internet Corporation for Assigned Names and Numbers, for instance, still makes only a token gesture at global participation and any question of greater United Nations involvement is generally met with US suspicion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Arguably, the Indian government doesn’t go far enough in its call for greater inclusivity in the governance of the Internet. The academic Jeremy Malcolm, an influential figure in discussions about Internet governance, has written that the World Summit on the Information Society has “established at the level of principle that governance of the Internet should be a transparent, democratic and multilateral process, with the participation of governments, private sector, civil society and international organisations, in their respective roles”. More immediate, perhaps, is the question of how a democratic country, committed to free speech, should regard social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not a discussion confined to India. During the August 2012 London riots, David Cameron threatened to ban people suspected of planning criminal activity from using Facebook, Twitter, and Blackberry Messenger. In words similar to those used by Sibal, Cameron spoke about reminding these companies of their responsibilities. In an interview with TEHELKA, Congress General Secretary Digvijaya Singh held close to the party line, insisting that “anything that incites violence is problematic, as is anything that is factually incorrect, and must be removed”. He envisages a future where online exchanges are governed by the same rules as public life, governed by similar cultural codes and basic civility. This is, it has to be said, an optimistic view of public life.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are, as discussed earlier, as many different ways to see online exchanges as there are Internet users. The Internet’s shapelessness, its Moby Dick-like vast blankness, makes it impossible to apply the same standards to conversation on Twitter or Facebook, even if it is in print and in public, as you might apply to a magazine article. Pranesh Prakash points out that “while some people may see Twitter as akin to friends talking in the pub, others use the service as a bulletin board”. When I propose to Prakash the idea of an ombudsman to monitor online dialogue in the same way an independent press commission might monitor newspaper reports, he makes a cogent rebuttal: “There is no ombudsman for regular speech, or to outline what you can or cannot say from a podium. Besides, there are laws that deal with defamation, slander and unless there is a requirement for an extra-legal authority I cannot see the need for an ombudsman.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much of the debate over the last couple of weeks has devolved, as so much debate in all our media, mainstream or online, does, into grandstanding — in this instance about ‘freedom of speech’ versus the national security imperative. This is to miss the woods for the trees. For all its heavy-handedness, the Indian government is correct to be concerned about oversight of the Internet and correct that not enough stakeholders are currently involved in its governance. Cant about freedom of speech cannot change the fact that the government is also correct that in a precariously held together democracy comprising various, widely different cultures and religions, certain standards of respectful speech are necessary. Of course, we can and should argue those standards and there needs to be a national conversation about the strictures of Internet legislation in India. Still, let us not pretend that the mob mentality of political discourse on the Internet is not a cause for worry and is not, as are all mobs, subject to manipulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;With inputs from Ajachi Chakrabarti&lt;/i&gt;. &lt;br /&gt;Shougat Dasgupta is an Assistant Editor with Tehelka.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/www-tehelka-com-vol-9-issue-36-sep-8-2012-shougat-dasgupta-the-state-and-the-rage-of-the-cyber-demon'&gt;http://editors.cis-india.org/news/www-tehelka-com-vol-9-issue-36-sep-8-2012-shougat-dasgupta-the-state-and-the-rage-of-the-cyber-demon&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-09-03T11:03:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/spies-we-trust">
    <title>The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance</title>
    <link>http://editors.cis-india.org/internet-governance/spies-we-trust</link>
    <description>
        &lt;b&gt;Christopher Soghoian's dissertation was submitted to the faculty of the Graduate School in partial fulfillment of the requirements for the degree "Doctor of Philosophy" in the School of Informatics, Department of Computer Science, Indiana University
&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/spies-we-trust'&gt;http://editors.cis-india.org/internet-governance/spies-we-trust&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-07-31T04:47:48Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint">
    <title>The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint</title>
    <link>http://editors.cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint</link>
    <description>
        &lt;b&gt;Paying for your groceries and other goods by using your biometrics instead of an e-wallet, debit card or cash seems to be the next phase in the Centre’s ambitious push to shift the country to a “less cash” economy, as its mandarins term it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Indulekha Aravind was &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/economy/policy/the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint/articleshow/56542475.cms"&gt;published in the Economic Times&lt;/a&gt; on 15 January 2017. Sunil Abraham was &lt;a class="external-link" href="http://economictimes.indiatimes.com/et-now/experts/sunil-abraham-on-aadhaars-misuse-during-demonetisation/videoshow/56544492.cms"&gt;consulted for this&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajay  Bhushan Pandey, CEO of the Unique Identification Authority of India  (UIDAI), says it will be rolling out Aadhaar-enabled payment system, or  Aadhaar Pay, for merchants in the next few weeks. This will be an app  for merchants that enables them to receive payments through biometric  authentication of the customer, provided their bank accounts are linked  to their Aadhaar number. "A pilot is under way in fair price shops in  Andhra Pradesh where shopkeepers are accepting payments from PDS  beneficiaries. The results are very encouraging," says Pandey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The idea takes off from the existing Aadhaar-enabled payment system (AEPS) used by bank business correspondents (BCs) in rural areas to disburse and accept cash, using micro ATMs. "We are trying to tweak this so that a similar device can be used by a local merchant," says Pandey. Adoption will depend on two factors: merchants’ acceptance of it and whether they can use an app rather than a micro ATM. The biggest advantage through this method of payment, says Pandey, is that the customer will not need a credit or debit card, or even a smartphone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint" class="gwt-Image" src="http://img.etimg.com/photo/56542603/page-19-1.jpg" title="The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  limits for transactions using AEPS, such as the number of daily  transactions, will be left to the discretion of the banks. In the long  term, the AEPS will be migrated to the BHIM (Bharat Interface for Money)  platform but the rollout of Aadhaar Pay will happen before that. Post  demonetisation, banking BC’s number of transactions using AEPS has leapt  from 4-5 lakh to 14-15 lakh, says Pandey. According to Reserve Bank of  India data on electronic payment systems, the total volume of such  transactions  jumped from 671 million in November 2016 to 957 million in December. USSD-based payments, which can be done using a basic feature phone, are among the biggest beneficiaries: the volume rose from just 7,000 in November to 1,02,000 in December, and value of transactions from over Rs 7,000 to over Rs 1 lakh. Prepaid payment instruments — mainly mobile wallets — rose from 59 million to 88 million in the same period (and value from Rs 1,300 crore to Rs 2,100 crore).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Aadhaar Pay is likely to ride the demonetisation wave if it is launched soon, certain concerns remain, as the list is how secure such a payment system will be. The UIDAI CEO says it is a paramount concern for the organisation, too. "We are using the latest technology to ensure the information stays encrypted end to-end, so that information is not leaked or misused. In the months to come, we will strengthen the security."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Wary About Security&lt;/b&gt; &lt;br /&gt; Sunil Abraham, executive director of the Centre for Internet and  Society, a think tank that has been analysing the Aadhaar project for  six years, outlines several reasons why Aadhaar-based biometrics is  inappropriate for authentication in payments, unlike card-based payments  that use cryptography.  &lt;br /&gt; &lt;br /&gt; "With biometrics, there is always  an error ratio. It is imprecise matching, whereas with cryptography  (smart cards), there is no false positive or  negative. You either have the key (PIN) or you don’t. It is also very  cheap to defeat biometric authentication — even an unlettered person can  do it," says Abraham. It would be easy enough, he says, to replicate  someone else’s fingerprint by pressing it against lukewarm wax and  filling the mould with glue to get a dummy finger. In contrast,  compromising a smart card requires more cost and effort, from  tech-savviness to machines such as a skimmer that will read the card.  "And once you are compromised,you are compromised forever. You can’t change it, like a debit card PIN."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Using  Aadhaar for authentication had proved to be a failure during the  exchange of currency notes following demonetisation, he adds, pointing  to how the poor and the middle class stood in queues for money while  stacks of new currency were recovered from the homes of businessmen and  bureaucrats. "When you have bank officials who are corrupt, giving them  your biometrics is giving them more ammunition for corruption." To catch  the criminals, law enforcement agencies had to resort to CCTV footage,a  relatively older technology, he says. Others point out that while it  may be secure, certain factors stand in the way of making  biometrics-based payment authentication a large-scale success. Amrish  Rau, CEO of PayU India, a payment gateway provider, cites a list of  reasons why it would inevitably take off but only in 5-10 years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"For  one, the technology is not yet good enough. There are also bandwidth  and data constraints in sending biometric data," says Rau. Even in more  mature markets, it has yet to find widespread acceptance, he says,  pointing to the slow adoption of Apple Pay and Samsung Pay in the US.  "It’s not the answer today.” This is in contrast to NITI Aayog CEO  Amitabh Kant’s recent remarks that cards and PoS machines would become  redundant by 2020 because Indians would be making payments using their  thumb (biometrics).  "... my view is that in the next two and a half years, India will make  all its debit cards, credit cards, all ATM machines, all PoS machines  totally irrelevant,” Kant had said at a Pravasi Bharatiya Divas session  in Bengaluru.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;UIDAI’s Pandey is more circumspect. “I wouldn’t say who would replace  what. But from the government’s side we are encouraging all modes of  digital payment. India has a diverse population and some people might  prefer using a card, others a wallet. Collectively, they will contribute  to a less-cash society.”&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint'&gt;http://editors.cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Money</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2017-01-16T03:14:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-social-role-of-the-communications-and-the-strengthening-of-the-freedom-of-expression-panel-cultural-diversity-and-freedom-of-expression">
    <title>The Social Role of the Communications and the Strengthening of the Freedom of Expression Panel - "Cultural Diversity and Freedom of Expression"</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-social-role-of-the-communications-and-the-strengthening-of-the-freedom-of-expression-panel-cultural-diversity-and-freedom-of-expression</link>
    <description>
        &lt;b&gt;Internet Governance Forum (IGF) 2015 will be held at Jao Pessoa in Brazil from November 10 to 13, 2015. The theme of IGF 2015 is Evolution of Internet Governance: Empowering Sustainable Development. The Ministry of Culture and the Ministry of Communications of Brazil is organizing a panel on Cultural Diversity and Freedom of Expression on November 9, 2015, from 6.30 p.m. to 8.30 p.m., in the Sala de Concerto Maestro Jose Siqueria, located in the city of Jao Pessoa, Brazil. Sunil Abraham will be a panelist. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The experience of Internet as a global network has generated paradoxes in relation to the nationally established values and those practiced by companies providers of applications. In general, the challenge lies in fundamental civil rights balance such as freedom of expression and the personality's rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the 2005 UNESCO Convention on the Protection and Promotion of the Diversity of Cultural Expressions enables the countries to adopt national policies directed to the protection of their cultural diversity, terms of use and codes of conduct are globally uniform and establish common rules to users around the world, which may affect cultural diversity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to address these issues the Ministry of Culture and the Ministry of Communications, Brazil are organizing this event at IGF 2015.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;About IGF 2015&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Internet Governance Forum (IGF) is a multistakeholder, democratic and  transparent forum which facilitates discussions on public policy issues  related to key elements of Internet governance. IGF provides enabling  platform for discussions among all stakeholders in the Internet  governance ecosystem, including all entities accredited by the World  Summit on the Information Society (WSIS), as well as other institutions  and individuals with proven expertise and experience in all matters  related to Internet governance.&lt;br /&gt;&lt;br /&gt;After consulting the wider  Internet community and discussing the overarching theme of the 2015 IGF  meeting, the Multistakeholder Advisory Group decided to retain the title  “Evolution of Internet Governance: Empowering Sustainable Development”.  This theme will be supported by eight sub-themes that will frame the  discussions at the João Pessoa meeting&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-social-role-of-the-communications-and-the-strengthening-of-the-freedom-of-expression-panel-cultural-diversity-and-freedom-of-expression'&gt;http://editors.cis-india.org/internet-governance/news/the-social-role-of-the-communications-and-the-strengthening-of-the-freedom-of-expression-panel-cultural-diversity-and-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-27T01:48:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/digital-natives/blog/silent-rise">
    <title>The silent rise of the Digital Native</title>
    <link>http://editors.cis-india.org/digital-natives/blog/silent-rise</link>
    <description>
        &lt;b&gt;In late August, this year, the world shook for many when they went online (on their computers, PDAs, iPads, laptops) and realised that the comfortable zone of talking, chatting, sharing and doing just about everything else, had suddenly, without a warning, changed overnight (or afternoon, or morning, depending upon the time-zone they lived in). With a single change in its privacy and location settings, Facebook, home to billions of internet hours consisting of relationships, friendships, professional networks, social gaming, entertainment trivia, memories and exchanges, allowed its users to geo-tag themselves when on-the-move.
&lt;/b&gt;
        &lt;div&gt;
&lt;p&gt;Much energy, rumour and panic has gone into the introduction of this feature. The interweb has been abuzz with people wearing tin-foil hats (or the digital equivalent of it) and shouting as loud as they can, about the old paranoia of Big Brother in new settings like Facebook. It is of almost no consequence that the feature is not really indulging in any private tracking but was offering an interesting mix of bringing together the everyday physicality of life on to the Facebook feed.&lt;/p&gt;
&lt;p&gt;Geo-tagging, a term which refers to your ability to expose your location (voluntarily) using mapping visualisation tools that can triangulate your position using GPS or IP address systems, while accessing internet platforms or games, is being widely used by users of technology who enjoy blurring the lines between real life and virtual reality.&lt;/p&gt;
&lt;p&gt;Facebook’s Places feature allowed users, accessing Facebook from their mobile phones, to ‘check-in’ to places near them, calculated on the position of their mobile phones, thus making it available for them to share where they are (or were) with their friends. While the panicwallahs who were going blue in their face have started breathing again, there is something in this panic about being located and marked, that needs further probing. I am aware of the possibilities of abuse it might lend itself to, if, say, for instance, I had stalkers (I have none, though), or if somebody accusing me of stealing their pig and my lawyer can prove that I (or at least my phone) was in a particular location at the time the crime was being committed.&lt;/p&gt;
&lt;p&gt;To many, this might seem some sort of an exaggerated reaction. How can people be so interested in trivial things like these? How can people have time to actually be doing ‘all this stuff’? To those digitally dissonant I offer a tilt of the head but to the Digital Natives who occupy, seamlessly, their social networking sites, their everyday material life, their MMORPGs (games, in shorthand), their blogs, their photo accounts and their multiple distributed digital selves, these things are important.&lt;/p&gt;
&lt;p&gt;You might not have heard of the phrase Digital Natives, but they are here and among us. The generation that grew up with digital technologies as a part of their social (and in some case, biological) DNA relate to technologies differently. Rather than external prostheses or tools of function, technologies are their ways of being.&lt;/p&gt;
&lt;p&gt;The oldest Digital Native has turned 30 this year, and the youngest Digital Native is still gestating, visible only in sonograms and medical records that document its presence. Digital Natives are everywhere and they might be producing knowledge that you and I read off Wikipedia. They might be playing games and immersing themselves in fantasy universes. They might be forming communities that transcend geographies and lifestyles. They might be orchestrating political campaigns that affect the fates of nations. They might be changing the notions of ownership and property even as we read this. They are embroiled in new technologies, they move from the physical to the virtual with effortless ease. They are slowly but relentlessly changing the contours of the worlds we all occupy. Digital Natives are here to stay and it is time we start listening to them, about who they are, what they do, how they think of themselves and how they are shaping the futures of the days to come.&lt;/p&gt;
&lt;p&gt;Read the original in&amp;nbsp;&lt;a class="external-link" href="http://www.dnaindia.com/opinion/report_the-silent-rise-of-the-digital-native_1446308"&gt;Daily News and Analysis&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/digital-natives/blog/silent-rise'&gt;http://editors.cis-india.org/digital-natives/blog/silent-rise&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-04T10:31:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/siege-of-android">
    <title>The Siege of Android: How Google Lost The OS War</title>
    <link>http://editors.cis-india.org/news/siege-of-android</link>
    <description>
        &lt;b&gt;In a narrative beginning in 2016 and ending today, Forbes India recalls how the once irrepressible Google lost the mobile OS war
&lt;/b&gt;
        
&lt;h3&gt;Black Forest&lt;/h3&gt;
&lt;p&gt;August 12, 2016: In spite of glowing reviews, it may be too late for ‘Black Forest’, version 9.0 of Google’s Android operating system (OS), to turn Google’s ship around. In the last 12 months, Android’s market share among smart devices has fallen from 35.4 percent to a shade below 20 percent globally. It is now just a few percentage points ahead of BlackBerry’s BBX OS, while Microsoft Windows Phone and Apple iOS are both significantly ahead.&lt;/p&gt;
&lt;p&gt;But as Andy Rubin, the man in charge of Android at Google, got off the phone in his office at Mountain View, California, even those percentage points seemed ephemeral. He had been talking to the head of Samsung’s mobile devices division in Suwon, South Korea. “I hate to say this to you, Andy, but it is now becoming untenable for us to support both Android and Windows at the same time,” he had said.&lt;/p&gt;
&lt;p&gt;In less than two months, Samsung would announce that all of its smart devices would run exclusively on Windows. Though Android’s relative share vis-à-vis Microsoft Windows had been falling steadily since 2012, it still accounted for nearly 30 percent of all Samsung smart devices.&lt;/p&gt;
&lt;h3&gt;Win-kia&lt;/h3&gt;
&lt;p&gt;September 21, 2015: Research firm Gartner today announced that Microsoft Windows Phone had become the largest smart device OS globally. “Aided in large part by Nokia’s volumes in Asia and Africa, and by increasing adoption by device makers, Windows has surpassed our own expectations,” said the firm in a report.&lt;/p&gt;
&lt;p&gt;The Microsoft-Nokia alliance, dubbed ‘Win-kia’, has surprised most analysts since its launch in late 2011. Though nowhere comparable in power to the Microsoft-Intel (‘Win-tel’) collaboration, Win-kia has been credited with upending the mobile OS playing field in just a few years.&lt;/p&gt;
&lt;p&gt;While Nokia’s wide range of phones and deep distribution and retail experience in emerging markets allowed Windows Phone to capture a large part of the entry and mid-level smartphone market, Microsoft’s carrot-and-stick approach had done the trick with other device makers.&lt;/p&gt;
&lt;p&gt;Each Android-run smart device meant royalties of $7-9 to Microsoft, insisted its suited, hard-nosed lawyer army. The only way to bring that down, they would say, is if the manufacturers committed to using Windows on a certain percentage of devices. The more the commitment, the less the royalty.&lt;/p&gt;
&lt;p&gt;Already burdened under royalty payments ranging from $11-15 per device to Apple, Oracle and a bunch of other big and small companies, most manufacturers quietly acceded.&lt;/p&gt;
&lt;h3&gt;The Tipping Point&lt;/h3&gt;
&lt;p&gt;June 13, 2014: The Independent Mobile App Developers Association (I-MADA) is miffed at Google. “Google has quite clearly failed to step up and shield small developers from frivolous lawsuits, as a result of which much of our money and efforts is being spent on court cases instead of developing better apps,” said the body in a press release today. According to the statistics attached, Android developers attracted nearly 60 percent of all patent infringement lawsuits.&lt;/p&gt;
&lt;p&gt;As the app economy has grown in value to nearly $32 billion worldwide, companies and patent trolls have increasingly gone after independent developers instead of the device or operating system makers.&lt;/p&gt;
&lt;p&gt;But while Apple, Microsoft and BlackBerry were quick to defend their respective app developers in most cases, Google has been slow. Faced with a combined patent onslaught in areas like video encoding, touchscreens, wireless communication and email synchronisation, Google’s response has been strangely sluggish.&lt;/p&gt;
&lt;p&gt;In March, it chose to remove significant features like mobile video and real-time email out of Android, choosing instead to let independent developers write apps for those. This strategy was similar to what many Linux distros chose. By having consumers download potentially infringing features directly from third party developers, the targets for lawsuits could be spread across millions of users. Unfortunately for Google, the lawyers went after the most successful app developers. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;Google’s other strategy of forming a defensive Android patents pool with companies like HTC, Samsung and Motorola has had patchy success because the pool has, by some estimates, only between 5-12 percent of ‘essential’ patents around mobile technology. That is hardly enough ammunition to fight the likes of Apple, Nokia and Microsoft. In spite of this, Android continues to be the dominant mobile OS.&lt;/p&gt;
&lt;h3&gt;The Ghost of ‘Pi’&lt;/h3&gt;
&lt;p&gt;February 18, 2013: Android royalties bring in nearly $2.7 billion annually for Microsoft, said its worldwide head of intellectual property. In comparison, Google, after years of developing Android and building a worldwide ecosystem, earns just $4.4 billion from running ads on the platform.&lt;/p&gt;
&lt;p&gt;This presents a serious challenge to Google CEO Larry Page who took over from Eric Schmidt in April 2011.&lt;/p&gt;
&lt;p&gt;[Fact: In one of the most important events for Google after Page’s appointment — the June 2011 auction of over 6,000 patents and patent applications held by Nortel — Page fumbled in style.&lt;/p&gt;
&lt;p&gt;In a hard-fought battle, Google bid confusing amounts like $1,902,160,540, $2,614,972,128 and $3.14159 billion — all mathematical constants (Brun’s constant, Meissel-Mertens constant and Pi respectively).&lt;/p&gt;
&lt;p&gt;While Google may have retained its geek cred, it lost the patents to a consortium made up of arch-competitors Apple, Microsoft and RIM among others who bid $4.5 billion. All while it had nearly $40 billion in cash on its balance sheet.&lt;/p&gt;
&lt;p&gt;"I have worked in the tech sector for over two decades. Microsoft and Apple have always been at each other’s throats, so when they get into bed together you have to start wondering what’s going on," said David Drummond, Google’s legal head in a blog post after losing the auction. Already the company with the fewest patents with which to defend itself against attacks, Google was forced to scramble after the loss. To compensate, it acquired 1,000 patents from IBM the very next month.]&lt;/p&gt;
&lt;p&gt;Google acquired many more patents over the last two years but all of them are considered less critical, and hence less valuable, for mobile communication.&lt;/p&gt;
&lt;h2&gt;Where they Stand&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;"In areas like mobile communication, patents can mean several layers of fiction and nonsense. But somebody in the chain has to assume that risk."&lt;br /&gt;&lt;/em&gt;&lt;strong&gt;Sunil Abraham, Executive Director, Center for Internet and Society&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;"Whenever new technologies come up where the stakes are high, people will use patents to gain a competitive advantage. Patents are not meant to be put on the shelves, but are strategic weapons in a competitive fight. When it comes to Android, I think there will be an arrangement in place between various players and peace, but that will take a few years."&lt;br /&gt;&lt;/em&gt;&lt;strong&gt;Ruud Peters, Global Head of IP and Standards, Royal Philips&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&lt;em&gt;"In developing countries like India, every Rs.1,000 ($23) changes the dynamics. And because most Indian operators don’t subsidise smartphones, any increase in patent royalties will come directly from consumer pockets. Today, an entry level Android phone is around Rs.5,500, but if that becomes Rs.7,500, that can affect the overall smartphone and Internet ecosystem."&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Rahul Sharma, co-founder and Executive Director, Micromax&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;Updates&lt;/h2&gt;
&lt;div&gt;
&lt;div&gt;Our writer adds -&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;A lot of our readers have been upset and confused by this article. A few additional points might make things clearer:&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;This article was part of our “What If” series, a section that analyses hypothetical scenarios around developing business scenarios. These articles mostly concentrate on the impact of a hypothetical event, not the likelihood of it.&lt;/li&gt;&lt;li&gt;That said, the article amplifies real life events(Gartner predicting Windows Phone 7’s rise to a number 2 position; Google fumbling its bid for Nortel’s patents; Android makers like HTC settling with Microsoft on royalties estimated at $5 per phone; multiple patent lawsuits against Android device makers) and quotes from individuals to manufacture a doomsday scenario.&lt;/li&gt;&lt;li&gt;One could argue that such a doomsday scenario has now come to pass, thanks to Motorola’s 17,000 patents in Google’s hands. But there’s now a new set of problems that will face larger Android partners like HTC and Samsung – how will Google go from being their most critical partner to being a major competitor too? Analysts and experts are already suggesting that such companies might try to hedge their risk therefore by adopting Windows Phone 7 more aggressively in their portfolio.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Because we’re a fortnightly magazine, articles can sometimes miss a major event around an issue after it has been written and published. That was true in this case because the article was written on 5th of August and appeared in the magazine which hit stands on 12th August. Google acquired Motorola on 15th August. Clearly, we (and most of the world) didn’t see Google making this rather significant and drastic move to protect Android coming.&lt;/li&gt;&lt;li&gt;None of this means we were right, because we weren’t aiming to be right. Instead this article was about constructing and presenting a scenario by connecting together various events affecting the Android ecosystem, in order to challenge our readers minds.&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="pullquote"&gt;This article by Rohin Dharmakumar was published in Business.in. The original story can be read &lt;a class="external-link" href="http://business.in.com/article/what-if/the-siege-of-android-how-google-lost-the-os-war/27672/1"&gt;here&lt;/a&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/siege-of-android'&gt;http://editors.cis-india.org/news/siege-of-android&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-19T06:46:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/the-times-of-india-sandhya-soman-august-23-2015-the-seedy-underbelly-of-revenge-porn">
    <title>The seedy underbelly of revenge porn</title>
    <link>http://editors.cis-india.org/internet-governance/blog/the-times-of-india-sandhya-soman-august-23-2015-the-seedy-underbelly-of-revenge-porn</link>
    <description>
        &lt;b&gt;Intimate photos posted by angry exes are becoming part of an expanding online body of dirty work.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sandhya Soman was published in the &lt;a class="external-link" href="http://timesofindia.indiatimes.com/home/sunday-times/deep-focus/The-seedy-underbelly-of-revenge-porn/articleshow/48627922.cms?from=mdr"&gt;Times of India&lt;/a&gt; on August 23, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT" style="float:left; "&gt;Three  lakh 'Likes' aren't easy to come by. But Geeta isn't gloating. She's  livid, and waiting for the day a video-sharing site will take down the  popular clip of her having sex with her vengeful ex-husband. "Every  other day somebody calls or messages to say they've seen me," says  Geeta.&lt;br /&gt; &lt;br /&gt; She is not alone. Two weeks ago, law student Shrutanjaya  Bhardwaj Whatsapped women he knew asking if any of them had come across  cases of online sexual harassment. In a few hours, his phone was filled  with tales of harassment by ex-boyfriends and strangers. Instances  ranged from strangers publishing morphed photographs on Facebook, to  ex-husbands and boyfriends circulating intimate photos and videos on  porn sites. Of the 40 responses, around 25 were cases of abuse by former  partners. "I have heard friends talking about the problem, but never  realized it was this bad," says Bhardwaj.&lt;br /&gt; &lt;br /&gt; These days, revenge  is best served online - it travels faster and has potential for greater  damage. But despite the widespread nature of the crime, many targets  hesitate to complain for fear of being shamed and blamed. "A 15-year-old  girl is going to worry about how her parents will react if she talks  about it," says Chinmayi Arun, research director, Centre for  Communication Governance at Delhi National Law University. There is also  fear of harassment by the police, says Rohini Lakshane, researcher,  Centre for Internet and Society. Worst of all is the waiting. "Even if a  police complaint is filed, it takes ages to find out who shot it, who  uploaded it and where it is circulated. Such content is mirrored across  many sites," she says.&lt;br /&gt; &lt;br /&gt; Geeta is familiar with the routine. Her  harassment started with photographs sent to family, friends and  colleagues. After an acrimonious divorce, several videos were released  in 2013. "There were some 25-30 videos on various sites.&lt;br /&gt; &lt;br /&gt; After  an FIR was filed, the police wrote to websites and some of the links  were removed," says Geeta, who has been flagging content on a popular  site, which has not yet responded to her privacy violation report. "My  face is seen clearly on it. People even come up to me in restaurants  saying they've seen it. How do I get on with my life?" asks a distraught  Geeta. She also recently filed an affidavit supporting the  controversial porn ban PIL in a last-ditch effort to erase the abuse  that began after her divorce.&lt;br /&gt; &lt;br /&gt; The cyber cell officer in charge  of her case says he had got websites to shut down several URLs but was  thwarted by the repeal of section 66A of the IT Act that dealt with  offensive messages sent electronically. When asked why section 67 (cyber  pornography) of the same act and various sections in the criminal law  couldn't be used, the officer says that only 66A is applicable to the  evidence he has. "I asked for more links and she sent them to me. We'll  see if other sections can be applied," he says. Lawyers and activists,  argue that existing laws are good enough like sections 354A (sexual  harassment), 354C (voyeurism), 354D (stalking) and 509 (outraging  modesty) of the IPC.&lt;br /&gt; &lt;br /&gt; Though there are no official statistics  for what is popularly referred to as 'revenge' porn, there is a flood of  such images online. Lakshane, who studied consent in amateur  pornography for the NGO-run EroTICs India project in 2014, found  clandestinely shot clips to exhibitionist ones where faces are blurred  or cropped.&lt;br /&gt; &lt;br /&gt; Social activist Sunita Krishnan has raised the red  flag over several video clips, including two that show gang rape, which  were circulated on Whatsapp. Some of the content she came across showed  familiarity between the man and woman, indicating an existing  relationship. In one clip, the man says: "How dare you go with that  fellow. What you did it to him, do it to me."&lt;br /&gt; &lt;br /&gt; Most home-grown  clips end up on desi sites with servers abroad, making it difficult to  take down content. Some do have a policy of asking for consent of people  in the frame. But Lakshane, who wanted to test this policy, says when  she approached one website that has servers abroad saying that she had a  sexually explicit video, the reply was a one-liner asking her to send  it. "They didn't ask for any consent emails," she says. In lieu of  payment, they offered her a free account on another file-sharing site,  which seemed to partner with the site. With no financial links to those  submitting videos, sites like these make money out of subscriptions from  consumers, or ads.&lt;br /&gt; &lt;br /&gt; A few months ago, the CBI arrested a man  from Bengaluru for uploading porn clips, using high-end editing software  and cameras. Kaushik Kuonar allegedly headed a syndicate and was  supposed to be behind the rape clips reported by Krishnan. "I am  skeptical of the idea of amateur porn being randomly available across  the Internet. There seem to be people like the man in Bengaluru who are  apparently sourcing, distributing and making money out of it," says  Chinmayi Arun. "He had 474 clips, including some of rape," adds  Krishnan.&lt;br /&gt; &lt;br /&gt; Social media companies, meanwhile, say they're  working with authorities to prevent such violations. Facebook  spokesperson says the company removes content that violates its  community standards. It also works with the women and child development  ministry to help women stay safe online. Google, Microsoft, Twitter and  Reddit have promised to remove links to revenge porn on request, while  countries like Japan and Israel have made it illegal.&lt;br /&gt; &lt;br /&gt; In India,  the National Commission for Women started a consultation on online  harassment but is yet to submit a report. In the absence of clarity,  activists like Krishnan endorse the banning of porn sites. Not all agree  with sweeping solutions. Lakshane says sometimes a court order helps to  get tech companies to act faster on requests as in the case of a 2012  sex tape scandal where Google removed search results to 360 web pages.  Also, the term 'revenge' porn, she says, is a misnomer as the videos are  meant to shame women. "These are not movies where actors get paid.  Somebody else is making money off this gross violation of privacy." &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/the-times-of-india-sandhya-soman-august-23-2015-the-seedy-underbelly-of-revenge-porn'&gt;http://editors.cis-india.org/internet-governance/blog/the-times-of-india-sandhya-soman-august-23-2015-the-seedy-underbelly-of-revenge-porn&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-09-27T14:25:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
