<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 71 to 85.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/freedom-of-expression-on-the-internet-possibilities-and-challenges"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/news/2nd-international-conference-on-standardisation-patents-and-competition-issues"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/livemint-june-28-2017-jyotika-sood-utpal-bhaskar-golden-eye-ransomware-attack-hit-operations-at-pipavav-port-jnpt"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/second-india-china-think-tank-forum"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/dsci-best-practices-meet"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/bis-litd-17-privacy-panel-meeting"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/2nd-india-think-tank-forum"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/news/digital-accessibility"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/international-symposium-on-electronic-art-isea-2017"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/news/wsis-forum-2017"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/livemint-june-11-2017-shaikh-zoaib-saleem-are-biometrics-hack-proof"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/indian-express-kiran-jonnalgadda-june-10-2017-why-did-nandan-nilekani-praise-a-twitter-troll"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/livelaw-june-10-2017-simran-sahni-placements-at-nujs"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-hindu-yuthika-bhargava-june-9-2017-new-law-to-unlock-data-economy"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/files/consultative-meeting-for-digital-archive-lab.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/freedom-of-expression-on-the-internet-possibilities-and-challenges">
    <title>Freedom of Expression on the Internet : Possibilities and Challenges</title>
    <link>http://editors.cis-india.org/internet-governance/news/freedom-of-expression-on-the-internet-possibilities-and-challenges</link>
    <description>
        &lt;b&gt;Sharat Chandra Ram was a speaker at an international seminar organized by Bolivar Technological University, Cartagena in Colombia on June 29, 2017. The theme of the seminar was ‘Freedom of Expression on the Internet : Possibilities and Challenges”.

&lt;/b&gt;
        &lt;p&gt;For more info on the event, &lt;a class="external-link" href="http://www.unitecnologica.edu.co/noticias/libertad-de-expresion-en-internet-posibilidades-y-desafios"&gt;click here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/freedom-of-expression-on-the-internet-possibilities-and-challenges'&gt;http://editors.cis-india.org/internet-governance/news/freedom-of-expression-on-the-internet-possibilities-and-challenges&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-09T02:30:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/news/2nd-international-conference-on-standardisation-patents-and-competition-issues">
    <title>Preliminary Findings: Working Requirements for Complex Products under the Indian Patent System</title>
    <link>http://editors.cis-india.org/a2k/news/2nd-international-conference-on-standardisation-patents-and-competition-issues</link>
    <description>
        &lt;b&gt;Prof. Jorge L. Contreras gave a talk on a forthcoming paper "Preliminary Findings: Working Requirements for Complex Products under the Indian Patent System" at the "2nd International Conference on Standardisation, Patents and Competition Issues" held on June 10 and 11, 2017 in New Delhi. The conference was organized by O.P. Jindal Global University.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The paper contains findings a study by Rohini Lakshane of CIS and Prof Jorge Contreras, University of Utah on the Statements of Working  (Form 27) of the patents they found for their previous paper "Patents and  mobile devices in India: An empirical survey". &lt;a class="external-link" href="https://cis-india.org/a2k/files/working-requirements-for-complex-products-under-the-indian-patent-system"&gt;View the slide deck&lt;/a&gt;. See the &lt;a class="external-link" href="http://www.jgu.edu.in/jirico/conference-new-1.php"&gt;event website&lt;/a&gt;. To read the Research Methodology &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/methodology-statements-of-working-form-27-of-indian-mobile-device-patents"&gt;click here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/news/2nd-international-conference-on-standardisation-patents-and-competition-issues'&gt;http://editors.cis-india.org/a2k/news/2nd-international-conference-on-standardisation-patents-and-competition-issues&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Pervasive Technologies</dc:subject>
    

   <dc:date>2017-08-22T13:48:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/livemint-june-28-2017-jyotika-sood-utpal-bhaskar-golden-eye-ransomware-attack-hit-operations-at-pipavav-port-jnpt">
    <title>GoldenEye ransomware attack hit operations at Pipavav Port, JNPT</title>
    <link>http://editors.cis-india.org/internet-governance/news/livemint-june-28-2017-jyotika-sood-utpal-bhaskar-golden-eye-ransomware-attack-hit-operations-at-pipavav-port-jnpt</link>
    <description>
        &lt;b&gt;Shipping ministry says the GoldenEye ransomware attack at JNPT and Pipavav port may result in bunching of inbound and outbound cargo.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Jyotika Sood and Utpal Bhaskar was &lt;a class="external-link" href="http://www.livemint.com/Industry/mh9nxJNR2NRgFh5zKThhqK/Jawaharlal-Nehru-Port-Trust-said-to-be-affected-as-cyberatta.html"&gt;published in Livemint&lt;/a&gt; on June 28, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Operations  at one of three terminals at India’s largest container port, Jawaharlal  Nehru Port Trust (JNPT) run by AP Moller-Maersk, near Mumbai, were  disrupted by a global ransomware attack, the port said on Wednesday. The  version that caused the disruption has been dubbed GoldenEye by  security firm Bitdefender Labs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Operations at the Danish firm’s  terminal at Gujarat Pipavav Port were also affected, but by the Petya   variant of the ransomware.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ransomware typically logs users out of  their own systems and asks them to pay a ransom if they want to access  the encrypted data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The central server is in Europe which we  can’t control. It is not a problem aimed at India... we have become  collateral damage,” said a senior Indian government official involved in  cybersecurity operations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ransomware hit the integrated  transport and logistics firm’s global operations on Tuesday across its  75 terminals. It also impacted Chernobyl’s radiation monitoring system,  law firm DLA Piper, pharma firm Merck, a number of banks, an airport,  the Kiev metro, British advertising giant WPP and Russian oil firm  Rosneft, according to Bitdefender Labs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The IT  (information technology) department of JNPT became aware of the attack  at around 4.30pm on Tuesday. The Windows server started conking off and  the master file got encrypted and we couldn’t access any data. The  operations immediately came to a standstill,” said a JNPT official  requesting anonymity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;AP Moller-Maersk operates the Gateway  Terminals India (GTI) at JNPT which has a capacity to handle 1.8 million  standard container units. JNPT, which ships more than half the  containerized cargo passing through India’s ports, serves a vast  hinterland comprising all of northern and western India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While  DP World and JNPT terminals are operational, the Gateway Terminals India  operated by APM is completely shut,” said the JNPT official.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This  is the second major ransomware attack since May after hackers exploited  a loophole that was first identified by the US National Security  Agency, to create WannaCry, that affected several businesses in more  than 150 countries including India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ministry of corporate affairs and the Andhra Pradesh Police were affected, besides several large organizations..&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While  the terminal operator is taking steps to address the issues disrupting  operations, it is anticipated that there could be bunching of in-bound  and out-bound container cargo,” India’s shipping ministry said in a  statement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Maersk group, through its terminal and infrastructure business, has invested $800 million in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The  global attack has impacted APM terminal of the JNPT port. The  operations at the terminal have slowed down and are being entered  manually. We are trying to handle the crisis by diverting traffic to  other terminals,” JNPT chairman Anil Diggikar said, adding that JNPT’s  operations have not been affected to a great extent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said it would take around 24 hours to clear the backlog.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gujarat  Pipavav Port told stock exchanges that the ransomware did not have “any  major impact on the company at this point in time”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns have  been expressed about the safety of India’s infrastructure projects with  power generation and transmission projects figuring high on terrorist  threat lists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ravi Shankar Prasad, minister of electronics and  information technology, on Wednesday said advisories have been issued  and the government is keeping a close watch on developments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Indian Computer Emergency Response Team (CERT-In), the agency  coordinating efforts on cybersecurity issues, in a 27 June advisory  warned, “It has been reported that variants of Petya ransomware with  work-like capabilities are spreading.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such attacks pose a grave threat to the economy and businesses. Cybersecurity Ventures &lt;a href="http://bit.ly/2sfWYPd" target="_blank"&gt;predicts &lt;/a&gt;global annual cybercrime costs will grow from $3 trillion in 2015 to $6 trillion by 2021.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts believe India is ill-equipped to face such attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“These  cases of malware attacks highlight the need for proper planning of  cybersecurity at all levels, especially for the government  infrastructure networks,” said Pranesh Prakash, policy director at the  Centre for Internet and Society, a Bengaluru-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Transportation  and shipping companies are ill-prepared for cyberattacks,” added Amit  Jaju, executive director, fraud investigation and dispute services, EY.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  emergency playing out at the ports assumes significance, given India’s  Rs8 trillion investment plan until 2035 under the Sagarmala programme,  which involves the construction of new ports to harness the country’s  7,517km coastline and setting up of as many as 142 cargo terminals at  major ports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Indian companies lose approximately Rs40,000 crore  due to cybercrime every year. India is among the top 5 countries today  in terms of the frequency and the number of cyber attacks,” Jaju said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We  are not prepared at all. This is a question of cyber literacy because  the latest attack has reused the same Windows vulnerability that was  exploited by WannaCry ransomware last month and for which security  patches were released almost three months ago by Microsoft,” added  cybersecurity expert Mohit Kumar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Anirudh Laskar, Mayank Aggarwal, Shally Seth &amp;amp; Komal Gupta contributed to the story.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/livemint-june-28-2017-jyotika-sood-utpal-bhaskar-golden-eye-ransomware-attack-hit-operations-at-pipavav-port-jnpt'&gt;http://editors.cis-india.org/internet-governance/news/livemint-june-28-2017-jyotika-sood-utpal-bhaskar-golden-eye-ransomware-attack-hit-operations-at-pipavav-port-jnpt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-06T22:53:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/second-india-china-think-tank-forum">
    <title>Second India China Think-Tank Forum</title>
    <link>http://editors.cis-india.org/internet-governance/news/second-india-china-think-tank-forum</link>
    <description>
        &lt;b&gt;The second India-China Think-Tank Forum was held in Beijing from June 22 to 27, 2017. The Forum was jointly organized by the Institute of Chinese Studies, the Indian Council of World Affairs, and the Chinese Academy of Social Sciences. Saikat Dutta represented an Indian think tank. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Forum was set up following an MoU between India and China during the visit of Prime Minister Narendra Modi in 2015. The idea of the forum is to explore contentious issues and new areas of cooperation between India and China as a Track 1.5 dialogue. &lt;a class="external-link" href="http://niasindiainchina.in/2017-06-25/the-second-india-china-think-tank-forum-was-held/"&gt;Read More&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/2nd-china-india-think-tank-forum-report"&gt;Click here&lt;/a&gt; for the report&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cybersecurity-threat-or-opportunity"&gt;Click&lt;/a&gt; to read Saikat Dutta's presentation&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/second-india-china-think-tank-forum'&gt;http://editors.cis-india.org/internet-governance/news/second-india-china-think-tank-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-07T02:43:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/dsci-best-practices-meet">
    <title>DSCI Best Practices Meet</title>
    <link>http://editors.cis-india.org/internet-governance/news/dsci-best-practices-meet</link>
    <description>
        &lt;b&gt;Udbhav Tiwari represented CIS on a Panel titled "Reposing Trust in Citizen Identity Systems" at the DSCI Best Practices Meet held at the ITC Gardenia on June 22 and 23, 2017 in Bangalore. &lt;/b&gt;
        &lt;p&gt;The event discussions featured around privacy and Aadhaar.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/dsci-best-practices-meet'&gt;http://editors.cis-india.org/internet-governance/news/dsci-best-practices-meet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-07T01:39:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/bis-litd-17-privacy-panel-meeting">
    <title>BIS LITD 17 Privacy Panel meeting</title>
    <link>http://editors.cis-india.org/internet-governance/news/bis-litd-17-privacy-panel-meeting</link>
    <description>
        &lt;b&gt;Udbhav Tiwari represented CIS at this meeting organized by National Law School of India University in Bangalore on June 21, 2017.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The bare-bones structure for what as discussed at the meeting can be found in the trailing email below. The standard itself is still in the drafting stage, which makes it confidential. I will share it on this thread once it hits the public draft stage, which should happen by September 2017. (approx)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/bis-litd-17-privacy-panel-meeting'&gt;http://editors.cis-india.org/internet-governance/news/bis-litd-17-privacy-panel-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-07T01:31:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/2nd-india-think-tank-forum">
    <title>2nd India Think Tank Forum</title>
    <link>http://editors.cis-india.org/internet-governance/news/2nd-india-think-tank-forum</link>
    <description>
        &lt;b&gt;Udbhav Tiwari participated in a panel titled "The New Cold War: Information and Cyber Wars" at the  Second India Think Tank Forum organized by ORF, the Think Tank Programme at UPenn and the McKinsey Institute between 19 to 21 June 2017 at Claridges in New Delhi. &lt;/b&gt;
        &lt;h3&gt;Agenda&lt;/h3&gt;
&lt;p&gt;June 19, 2017&lt;br /&gt;18.00 – 18.30 – Registration&lt;br /&gt;18.30 – 18.40 – Welcome Remarks&lt;br /&gt;18.45 – 20.00 – Big Politics: OBOR, India, and the Liberal International Order&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This panel will explore the emerging trends in geo-politics and the implications thereof on the liberal international order. It will explore the rise of China, in particular the ambitious Belt &amp;amp; Road Initiative and in its strategic and economic impact on Asia. It will discuss the role of the U.S. and Europe in what is now referred to as the Asian century. Lastly, it will discuss India’s role as a liberal actor in a rapidly changing global order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chair: Sanjaya Baru, Distinguished Fellow, USI&lt;br /&gt;Speakers:&lt;br /&gt;Indrani Bagchi, Diplomatic Editor, Times of India&lt;br /&gt;Lt. Gen. Aditya Singh, Senior Fellow, Delhi Policy Group&lt;br /&gt;Nitin Pai, co-Founder, Takshashila Institute&lt;br /&gt;Seshdari Vasan, Chennai Centre for China Studies, Chennai&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20.00 – 20.30 – Three Years of the Modi Government: Looking Back, Looking Ahead&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Conversation: Smt. Smriti Irani, Union Cabinet Minister for Textiles, Govt. of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20.30 - Dinner&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/2nd-india-think-tank-forum'&gt;http://editors.cis-india.org/internet-governance/news/2nd-india-think-tank-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-07T01:16:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/news/digital-accessibility">
    <title>Digital Accessibility </title>
    <link>http://editors.cis-india.org/accessibility/news/digital-accessibility</link>
    <description>
        &lt;b&gt;On June 17, 2017, Rakesh Paladugula, a web accessibility trainer and Nirmita Narasimhan made a presentation to scientists of the National Informatics Centre in their office in Bengaluru.&lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="http://editors.cis-india.org/home-images/PresentationatNIC1.png" alt="Presentation at NIC" class="image-inline" title="Presentation at NIC" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Pictured above: Nirmita Narasimhan explaining concepts of digital accessibility to a group of scientists at National Informatics Centre office in Bengaluru&lt;/i&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The presentation described what is digital accessibility, who it benefits, how to implement it in terms of policy and technology, standards for different domains of accessibility and focused specifically on making web sites accessible as per GIGW. The presentation was attended by around 40 scientists in person and approx. 40 from the districts of Karnataka via video conferencing. The discussion also revolved on key issues with Government web sites, available resources and tools to check for accessibility and tips on how to make them accessible. Some thought was also given to what could be the plan going forward to implement  GIGW and any capacity building requirements in this regard.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/news/digital-accessibility'&gt;http://editors.cis-india.org/accessibility/news/digital-accessibility&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2017-07-09T01:44:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/international-symposium-on-electronic-art-isea-2017">
    <title>International Symposium on Electronic Art (ISEA 2017)</title>
    <link>http://editors.cis-india.org/internet-governance/news/international-symposium-on-electronic-art-isea-2017</link>
    <description>
        &lt;b&gt;Sharat Chandra Ram was part of a 90 minute academic panel at ISEA 2017 organized by the University of Caldas, Manizales in Columbia. The event was held from June 11 to 16, 2017.&lt;/b&gt;
        &lt;div&gt;The Panel was titled - “&lt;b&gt;Biocreation of Informatics: Rethinking Data Ecosystems in the Network Economy&lt;/b&gt;. The Panel consisted of 4 papers:&lt;/div&gt;
&lt;div&gt;1. &lt;b&gt;Pilar Saenz&lt;/b&gt; - Karisma Foundation, Bogota -&lt;b&gt; Data and Public Policy&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;2. &lt;b&gt;Offray Vladimir Luna&lt;/b&gt; - HackBo &amp;amp; University of Caldas  - &lt;b&gt;Civic Media and Data (H)ac(K)tivism&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;3. &lt;b&gt;Jose Cuartas&lt;/b&gt; - Los Libertadores &amp;amp; University of Caldas  - &lt;b&gt;Democratisation of Data and Internet of Things&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;4. Sharath Chandra Ram - Signal Territories, Infrastructures and Intermediaries&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/international-symposium-on-electronic-art-isea-2017'&gt;http://editors.cis-india.org/internet-governance/news/international-symposium-on-electronic-art-isea-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-07T01:49:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/news/wsis-forum-2017">
    <title>WSIS Forum 2017</title>
    <link>http://editors.cis-india.org/accessibility/news/wsis-forum-2017</link>
    <description>
        &lt;b&gt;WSIS Forum 2017 was held 12-16 June in Geneva, and included the participation of more than 85 high-level government and civil society representatives, as well as 500 remote interventions and thousands following the webcast. The forum was chaired by Mr Jean Philbert Nsengimana, Minister of Youth and ICT, Government of Rwanda, and co-organized by ITU, UNESCO, UNCTAD and UNDP, in close collaboration with all UN agencies. Nirmita Narasimhan participated in the forum.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The moderator, &lt;b&gt;Ms Andrea Saks&lt;/b&gt; (Chair,  Telecommunication Standardisation Sector (ITU-T) Joint Coordination  Activity on Accessibility and Human Factors (JCA-AHF)), welcomed the  audience and introduced the five panellists, two of whom were remote  participants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first speaker, participating remotely from India, was &lt;b&gt;Ms Nirmita Narasimhan&lt;/b&gt;,  Policy Director, Centre of Internet and Society (CIS). Narasimhan heads  the CIS accessibility inclusion programme and specialises in policy  research and advocacy related to technology access for persons with  disabilities. Narasimhan focused on a &lt;a class="ext" href="https://www.itu.int/en/ITU-D/Digital-Inclusion/Persons-with-Disabilities/Documents/Making%20Mobile-English.pdf"&gt;report&lt;span class="ext"&gt;&lt;span class="element-invisible"&gt; (link is external)&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; jointly prepared by ITU and CIS, on how to leverage ICTs in an  accessible manner to ensure that persons with disabilities and other  vulnerable groups are included in planning and responding to disasters  and situations involving emergency situations.  She raised four stages  of &lt;a class="ext" href="http://cis-india.org/accessibility/blog/emergency-services-report.pdf"&gt;preparedness&lt;span class="ext"&gt;&lt;span class="element-invisible"&gt; (link is external)&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; for disaster management: (1) early warning planning including creating  awareness, education, and training material as well as setting up  technological infrastructure; (2) alerts as to when a disaster is  happening and where to go for help; (3) recovery, what happens after the  disaster; and (4) mitigation which leads back to planning and  preparedness. Full report &lt;a class="external-link" href="https://dig.watch/sessions/inclusive-icts-disaster-and-emergency-preparedness-persons-disabilities-and-those-specific"&gt;here&lt;/a&gt;. More information on the event &lt;a class="external-link" href="https://www.itu.int/net4/wsis/forum/2017/"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/news/wsis-forum-2017'&gt;http://editors.cis-india.org/accessibility/news/wsis-forum-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2017-07-18T02:00:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/livemint-june-11-2017-shaikh-zoaib-saleem-are-biometrics-hack-proof">
    <title>Are biometrics hack-proof?</title>
    <link>http://editors.cis-india.org/internet-governance/news/livemint-june-11-2017-shaikh-zoaib-saleem-are-biometrics-hack-proof</link>
    <description>
        &lt;b&gt;There are growing concerns over biometric security in India. We ask the experts if biometrics can really be hacked.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shaikh Zoaib Saleem was published by &lt;a class="external-link" href="http://www.livemint.com/Money/YD7dqEVRJbrqoAs3h4PuJO/Are-biometrics-hackproof.html"&gt;Livemint&lt;/a&gt; on June 11, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;There are growing concerns over biometric security. A compromised  password can be changed but not a stolen biometric. We ask experts about  biometrics security in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash, policy director, The Centre for Internet &amp;amp; Society &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Biometric  devices are not hack-proof. It depends on the ease with which this can  be done. In Malaysia, thieves who stole a car with a fingerprint-based  ignition system simply chopped off the owner's finger. When a biometric  attendance system was introduced at the Institute of Chemical Technology  (ICT) in Mumbai, students continued giving proxies by using moulds made  from Fevicol.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, researchers at NYU and Michigan  State University revealed that they were able to generate a  "MasterPrint", which is a "partial fingerprint that can be used to  impersonate a large number of users". While there are potential  safeguards, they require re-capturing everyone's biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even  other technologies like iris scanner, gait recognition, face  recognition, and others, are getting better, but all have problems. Our  laws haven't evolved either, leaving many unanswered questions: who can  demand your biometrics and under what circumstances? Can your biometrics  be captured without your consent? Who is liable for failure? What  remedies does one have?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an evolving area of  technology studies, and every day new kinds of attacks are discovered.  Further, they are probabilistic technologies unlike passwords. Given  this, if you seek a reliable identity verification system, it doesn't  make sense to deploy a system exclusively based on biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Umesh Panchal, vice-president, Biomatiques Identification Solutions &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Biometric  devices are instruments delivering added security check functions over  traditional methods and these devices can be hack-proof, if the process  of exploiting vulnerabilities to gain unauthorised access to systems or  resources, is taken care of. With liveliness detection, iris biometric  devices are far more hack-proof than fingerprint devices. Even Pentagon  has been hacked. Theoretically, a biometric device can internally store  or copy fingerprints or iris scans. Depending upon the use-case and  ecosystem, a biometric device can internally store templates. However,  the UID system (Unique Identification Authority of India) doesn’t permit  storage of any biometric data in any biometric devices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several  security measures can be incorporated to ensure strong transaction  security and end-to-end traceability to prevent misuse. This can be  achieved by implementing specification of authentication ecosystem.  These include deploying signed application, host and operator  authentication, usage of multi-factor authentication, SMS/email alerts,  encryption of sensitive data, biometric locking, device identification  with unique device identifier for analytics/fraud management,  eliminating use of stored biometrics and so on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a consumer, the device security is determined by the certification it holds from the competent certification authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bryce Boland, chief technology officer-Asia Pacific, FireEye&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Biometrics  take many forms. Most often people think biometrics are the actually  measured biological feature, but they are actually measurements of a  feature turned into a sequence of data that is compared against another  set of data. You don’t actually need the physical feature, you need the  measurements to generate the sequence of data to make a match. If you  can inject that data into a biometric, bypassing the reader, you can  potentially trick a biometric system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most successful biometric  implementations have a controlled enrolment process where identity  validation is undertaken, and have physically secured, tamperproof and  closely monitored readers. Systems like those used for passport  biometric enrolment with restricted deployments of readers at airports  are an example. Self-enrollment is prone to fraud. Widely distributed  readers are prone to tampering. Insecure paths from readers to central  credential repositories are prone to credential theft.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once  biometric information is stolen, it usually cannot be changed. So stolen  data can potentially be used for a long time, creating problems. This  isn’t the case for airport fingerprint readers, but it is a problem for  biometric devices in the hands of the public. The best way to check this  is to keep the system’s environment physically secured, tamperproof and  closely monitored.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajesh Babu, CEO, Mirox Cyber Security &amp;amp; Technology &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Biometrics  devices can be hacked. They have fingerprint sensors, which only check  the pattern. It is possible to recreate these patterns through various  techniques. Technically, it is difficult to recreate biometrics from a  high-resolution picture. However, by using other image rendering tools  we can recreate the patterns. Security experts and hackers have already  proved that they can bypass mobile fingerprint scanners using a  collection of high-resolution photographs taken from different angles  using standard photo cameras to make a latex replica print.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most  of the biometric scanners have a date set of all fingerprints and other  identities inside the device database. Not every manufacturer in India  undergoes enough security auditing. Most of the companies manufacture  low-cost biometric devices which are highly vulnerable. These devices  are imported from China and other countries but they do not conduct or  go through any security audits in our country. They may have kernel  level back doors, which are highly vulnerable and can lead to launch of  an any kind of attack, including compromising an organization’s network.  Only a handful of companies conduct audits of their products as part of  security practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Organizations and the government must have a  clear and concise Security Devices Policy based on standard applicable  laws and regulation framework.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/livemint-june-11-2017-shaikh-zoaib-saleem-are-biometrics-hack-proof'&gt;http://editors.cis-india.org/internet-governance/news/livemint-june-11-2017-shaikh-zoaib-saleem-are-biometrics-hack-proof&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-12T01:39:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/indian-express-kiran-jonnalgadda-june-10-2017-why-did-nandan-nilekani-praise-a-twitter-troll">
    <title>Why did Nandan Nilekani praise a Twitter troll?</title>
    <link>http://editors.cis-india.org/internet-governance/news/indian-express-kiran-jonnalgadda-june-10-2017-why-did-nandan-nilekani-praise-a-twitter-troll</link>
    <description>
        &lt;b&gt;As the Supreme Court upholds the linking of ‘Aadhar’ with PAN, questions around ex-UIDAI chairman Nandan Nilekani praising iSPIRT head Sharad Sharma Twitter troll and ‘Aadhar’s privacy properties will continue to be asked.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kiran Jonnalgadda was published in the &lt;b&gt;&lt;a class="external-link" href="http://indianexpress.com/article/opinion/why-did-nandan-nilekani-praise-a-twitter-troll-4697235/"&gt;Indian Express&lt;/a&gt;&lt;/b&gt; on June 10, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last month, Sharad Sharma, the head of the Indian Software Product  Industry Round Table (iSPIRT) Foundation, an organisation that promotes  Aadhaar to industry, was outed as the operator of at least two anonymous  Twitter troll accounts that viciously harassed and defamed critics of  Aadhaar. The shocking revelation was first met with denial by iSPIRT,  and then followed by what may be understood as a reticent apology from  Mr Sharma.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a bizarre sequence of events, the apology received praise from  several quarters. iSPIRT’s Guidelines and Compliance Committee (IGCC)  investigated Mr Sharma and the ‘Sudham’ team that coordinated the  trolling campaign. Two members of the investigating committee  subsequently resigned, although only one confirmed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The committee’s findings, confirming that Mr Sharma was responsible,  were summarised for the public by Mr Sharma himself, who then announced  that his role as a public spokesperson would now be handled  by Sanjay Jain. Mr Jain was once with the Unique Identification  Authority of India (UIDAI), launched by Nandan Nilekani, is currently a  director at Nandan Nilekani’s EkStep Foundation, and a close confidante  of Mr Sharma. The two have often pitched iSPIRT’s IndiaStack initiative  together.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an internal email questioning this decision, an iSPIRT member  asked whether Mr Jain was a part of the ‘Sudham’ team, and whether he  was also “at least partially culpable for the [troll] campaign and the  violation of the code of conduct.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The victims of the trolling have received no report, and the two  apologies posted by Mr Sharma were both for having “condoned uncivil  behaviour”, but not for personally orchestrating the attacks. Among  those who praised him was Nandan Nilekani, former chairman of UIDAI  and chief mentor of iSPIRT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critics have been pointing out for years that Aadhaar lacks  sufficient checks and balances, and that claims of benefits  are overstated. These concerns have been met with denial, condemnation  of critics, and often outright refusal to engage in debate. This has  unfortunately only served to alienate an even larger section of the  population, turning ordinary citizens into activists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We can gain an insight into how Aadhaar is promoted by examining  iSPIRT. The organisation was founded in 2013 by volunteers who had  been working together on the sidelines of the NASSCOM Product Conclave.  These volunteers felt the need for an independent grassroots  organisation to represent tech entrepreneurs who were building  products for India and the world. iSPIRT has grown phenomenally  influential over its few years, largely by the work of volunteers who  were truly interested in building a mutual assistance community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Level playing fields are a recurring topic. Just as there is a desire  to lower bureaucratic hurdles to give every entrepreneur a fair chance,  there is also the question of how a startup can compete against a  foreign competitor that has the advantage of a stronger home market.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://indianexpress.com/about/flipkart/"&gt;Flipkart&lt;/a&gt; and  Ola are two prominent examples in their fight to defend their market  share against Amazon and Uber, competitors armed with global experience,  more capital, and better trained talent. iSPIRT’s take is that for  Indian companies to thrive they must have a supportive ecosystem that  enables rapid growth, and so iSPIRT must step up as an “activist think  tank”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One aspect of this activism is IndiaStack, which seeks to help  startups by promoting a suite of ‘public goods’: Aadhaar and eKYC for id  verification, eSign and Digilocker for digital contracts and  certificates, and UPI for payments. If one accepts at face value that  these services are well intentioned, then IndiaStack is on a noble  quest. The details, unfortunately, are less pristine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iSPIRT is a private non-profit, but its volunteers include several  former members of UIDAI. The guidance and compliance committee (IGCC)  investigating the trolling included a current member of government.  iSPIRT helped build and evangelise the UPI (United Payments Interface)  platform and BHIM app for NPCI, but the level of involvement and terms  of the agreement are not public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For an organisation that claims to champion public goods, iSPIRT is  opaque on the level of influence they wield with government (Mr Sharma  once claimed some influence but no control), and on who exactly built  the various components of IndiaStack, within or outside of government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They showed a remarkable degree of influence when foisting UPI on a  change-resistant banking sector. They have funding from four banks  (IDFC, SBI, Bank of Baroda and Axis Bank) and from fintech startups.  Despite this level of responsibility, they also have no accountability  since they are a pro bono volunteer force, allowing them to distance  themselves from failures (UPI failures are NPCI’s problem and Aadhaar  failures are UIDAI’s problem, etc) and unpleasant incidents such as the  ‘Sudham’ trolling project. (No one has accepted responsibility for  operating a troll account.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the core of IndiaStack is ‘Aadhaar’, which as it currently stands  has serious concerns from its technical architecture to institutional  safeguards. Aadhaar lacks publicly verifiable audits, a data breach  disclosure policy, or an engagement process for researchers to report  concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For reasons best known to them, the promoters of ‘Aadhaar’ are in a  tearing hurry to impose it everywhere, in every aspect of an Indian’s  life, out of an apparent fear that it will die if adoption slows  down. This is eerily reminiscent of startup mantras like “fake it till  you make it” and “move fast and break things”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But ‘Aadhaar’ already has a billion enrollments and the backing of  legal measures pushed by the Union Government. There is no threat of  imminent demise. And yet, as the Twitter trolling shows, this fear  continues to exist for ‘Aadhaar’s proponents, so much so that critics  must be silenced at any cost.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where trolling failed to work, subtler attacks are sure to follow. There have been some in the recent past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) is facing one such attack  for its report on the leak of 130 million Aadhaar numbers. The report  received wide coverage and was followed by new rules from MEITy  (ministry of Electronics &amp;amp; Information Technology) regarding the  handling of Aadhaar numbers, but instead of commending CIS for its role  in improving safeguards, UIDAI is accusing it of hacking, demanding the  identity of the researcher so that he or she may be individually  prosecuted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When Sameer Kochhar demonstrated that previously captured  fingerprints were being reused because Aadhaar’s API lacked technical  safeguards, UIDAI responded by prosecuting him. A News18 journalist was  also prosecuted for demonstrating how double application for enrollment  was possible using different names.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of September 30, 2017, ‘registered’ devices will be mandatory as  the current devices are not secure against fingerprint reuse, and an  unknown number of fingerprints have already been captured and stored.  This sort of forced technological upgrade will happen again as more  problems surface into public consciousness, with more researchers and  critics harassed for pointing these out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘Aadhaar’ pursues inherently contradictory goals. The process of  ‘inorganic seeding’, for instance, allows a database to be seeded with  ‘Aadhaar’ numbers, to help a service provider identify and eliminate  duplicates without the individual’s cooperation. (Inorganic seeding is  an official UIDAI scheme.) And yet, the law prohibits using and sharing  ‘Aadhaar’ numbers without the individual’s consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘Aadhaar’ aims to be an inclusive project, providing an identity for  everyone, and yet easily lends itself to being an instrument of  exclusion. There is technical exclusion when biometrics fail to match,  and there is institutional exclusion when Aadhaar is made mandatory and  an individual is then blacklisted from a service or denied Aadhaar  enrollment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aviation minister &lt;a href="http://indianexpress.com/about/jayant-sinha"&gt;Jayant Sinha&lt;/a&gt; recently announced a proposal to use digital id for just this  purpose. ‘Aadhaar’ in its current state makes it extraordinarily simple  for an organisation to demand it for authentication, but what of the  necessary safeguards to protect an individual’s rights? Or of ensuring  that grievance redressal mechanisms are in place and actually  functional? These are not solved by a technical API integration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just as we’ve seen with nuclear power, weak institutions which are  sensitive to criticism and fail to ensure effective oversight amplify  the risks of the underlying technology. Aadhaar’s supporting  institutions, whether government bodies like UIDAI or private bodies  like iSPIRT, are immature for the mandate they carry. All technology  improves with time, but weak institutions hamper their benefit to  society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the leading promoter of Aadhaar, founding chairman of UIDAI, and  chief mentor of iSPIRT, Mr Nilekani must step up and commit to improving  the institutions he commands, and take responsibility for their  failures. Condemning critics instead does not help build institutions.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/indian-express-kiran-jonnalgadda-june-10-2017-why-did-nandan-nilekani-praise-a-twitter-troll'&gt;http://editors.cis-india.org/internet-governance/news/indian-express-kiran-jonnalgadda-june-10-2017-why-did-nandan-nilekani-praise-a-twitter-troll&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-12T01:34:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/livelaw-june-10-2017-simran-sahni-placements-at-nujs">
    <title>Placements at NUJS: Class of 2017 Scores 100%</title>
    <link>http://editors.cis-india.org/internet-governance/news/livelaw-june-10-2017-simran-sahni-placements-at-nujs</link>
    <description>
        &lt;b&gt;The Campus Recruitment Committee of the Class of 2017, NUJS is proud to confirm that NUJS has once again topped the placement tally among the premier national law schools, in terms of number of jobs, for the year 2016-17 with the graduating class having secured offers for all its 78 members who partook in the recruitment process. &lt;/b&gt;
        &lt;p&gt;The blog post by Simran Sahni was published in &lt;a class="external-link" href="http://www.livelaw.in/placements-nujs-class-2017-scores-100/"&gt;Livelaw&lt;/a&gt; on June 10, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The number of students hired by the domestic law firms on Day Zero with a tally totaling 57, inclusive of the 24 accepted pre-placement offers (PPOs).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ‘Big 7’ firms contributed to 53 of these jobs and ICICI Bank recruited 4. New recruiters including Indus Partners and Singh &amp;amp; Associates hired from campus this year, picking three students each. Three students bagged offers from international law firms: Herbert Smith Freehills, Linklaters, and Allen &amp;amp; Overy respectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The salaries remain the same as last year with the average foreign firm package ranging from INR 38 lakhs to 44 lakhs for traineeships and the average domestic firm packages ranging from INR 8 lakhs to 18 lakhs. The firm with the highest domestic package was AZB and Partners, Mumbai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, more than six students this year have decided to pursue higher education. Students have received admission offers in LLM from Harvard Law School, Cambridge Faculty of Law, NYU Faculty of Law, London School of Economics and Graduate Institute Geneva respectively. Charting new courses, while one student opting for a master’s in management has been offered admission at the renowned London Business School, another joined as a policy officer at the Centre for Internet and Society in Bangalore. Interestingly, even the topper of the class opted out of placements this year and set a new record by being the third in the line of scholars from NUJS to secure the prestigious Rhodes scholarship to Oxford University. Similarly, students have also decided to take up the meritorious one year Young India Fellowship program at Ashoka University.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the current placement figures, NUJS beats all market trends to secure the highest number of job offers among premier law schools. The Class of 2017 also marginally trumps the record of the Class of 2016 in terms of total number of ‘Big 7’ jobs, even with a large chunk of the batch opting out of campus recruitment and pursing litigation, higher education, civil and judicial services and roles in think tanks and other non-profit organization's - the results of which shall be released by us as and when they come.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This entire feat would not have been possible without the support of the respected Vice Chancellor, Prof. P. Ishwara Bhat, CRC team and faculty advisor Ms. Vaneeta Patnaik, and all the faculty members at NUJS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NUJS has built an exceedingly steady placement record for itself over the years. The placement figures for the Class of 2017 of NUJS are now live on the website &lt;a class="external-link" href="http://sja.nujs.edu/newsroom/2017/06/07/placements-at-nujs-class-of-2017-scores-100"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/livelaw-june-10-2017-simran-sahni-placements-at-nujs'&gt;http://editors.cis-india.org/internet-governance/news/livelaw-june-10-2017-simran-sahni-placements-at-nujs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Placement</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-06-12T01:23:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-hindu-yuthika-bhargava-june-9-2017-new-law-to-unlock-data-economy">
    <title>New law to unlock data economy </title>
    <link>http://editors.cis-india.org/internet-governance/news/the-hindu-yuthika-bhargava-june-9-2017-new-law-to-unlock-data-economy</link>
    <description>
        &lt;b&gt;Proposal has been sent to PMO for approval. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Yuthika Bhargava was &lt;a class="external-link" href="http://www.thehindu.com/news/national/new-law-to-unlock-data-economy/article18951772.ece"&gt;published in the Hindu&lt;/a&gt; on June 9, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The government is mulling a new data protection law to protect  personal data of citizens, while also creating an enabling framework to  allow public data to be mined effectively. The move assumes significance  amid the debate over security of individuals’ private data, including  Aadhaar-linked biometrics, and the rising number of cyber-crimes in the  country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Ministry of Electronics and Information Technology  (MEIT) is working on a new data protection law. A proposal to this  effect has been sent to the Prime Ministers’ Office for approval,” a  senior ministry official told &lt;i&gt;The Hindu&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the PMO approves it, the ministry will set up a “cross-functional committee” on the issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We  want to include all stakeholders. It will be a high-level committee,  and all current and future requirements of the sector will be  discussed.”&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Two chief aims&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The official said: “We  are working with two main aims – to ensure that personal data of  individuals remain protected and is not misused, and to unlock the data  economy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The official explained that a lot of benefits can be derived from the data that is publicly available, by using technology and big data analytics. “The information can be used for the benefit of both individuals and companies,” the official said.&lt;br /&gt;&lt;br /&gt;“The underlying infrastructure of the digital economy is data. India is woefully unprepared to protect its citizens from the avalanche of companies that offer services in exchange for their data, with no comprehensive framework to protect users,” Software Freedom Law Centre (SFLC.in), a non-profit, said in an emailed reply.&lt;br /&gt;&lt;br /&gt;Currently, India does not have a separate law for data protection, and there is no body that specifically regulates data privacy.&lt;br /&gt;&lt;br /&gt;“There is nominally a data protection law in India in the form of the Reasonable Security Guidelines under Section 43A of the Information Technology Act. However, it is a toothless law and is never used. Even when data leaks such as the ones from the official Narendra Modi app or McDonald’s McDelivery app have happened, section 43A and its rules have not proven of use,” said Pranesh Prakash, policy director at CIS.&lt;br /&gt;&lt;br /&gt;Some redress for misuse of personal data by commercial entities is also available under the Consumer Protection Act enacted in 2015, according to information on the website of Privacy International, an NGO. As per the Act, the disclosure of personal information given in confidence is an unfair trade practice.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-hindu-yuthika-bhargava-june-9-2017-new-law-to-unlock-data-economy'&gt;http://editors.cis-india.org/internet-governance/news/the-hindu-yuthika-bhargava-june-9-2017-new-law-to-unlock-data-economy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-12T01:10:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/files/consultative-meeting-for-digital-archive-lab.pdf">
    <title>Consultative Meeting for a Digital Archive Lab</title>
    <link>http://editors.cis-india.org/internet-governance/files/consultative-meeting-for-digital-archive-lab.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/files/consultative-meeting-for-digital-archive-lab.pdf'&gt;http://editors.cis-india.org/internet-governance/files/consultative-meeting-for-digital-archive-lab.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-06-08T13:02:24Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
