<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 81 to 95.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/livemint-june-11-2017-shaikh-zoaib-saleem-are-biometrics-hack-proof"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/indian-express-kiran-jonnalgadda-june-10-2017-why-did-nandan-nilekani-praise-a-twitter-troll"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/livelaw-june-10-2017-simran-sahni-placements-at-nujs"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-hindu-yuthika-bhargava-june-9-2017-new-law-to-unlock-data-economy"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/files/consultative-meeting-for-digital-archive-lab.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/livemint-june-8-2017-shaikh-zoaib-saleem-explore-money-apps-but-watch-your-data"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/indian-express-june-1-2017-pranav-mukul-privacy-is-culture-specific-mncs-hit-by-aadhaar-says-trai-chief"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/electronic-frontier-foundation-jyoti-panday-june-1-2017-aadhaar-ushering-in-a-commercialized-era-of-surveillance-in-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/economic-times-june-2-2017-nidhi-sharma-centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/dna-may-28-2017-heena-khandelwal-tweets-from-the-afterlife"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/t20-germany-and-beyond-digital-economy"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/stockholm-internet-forum-2017"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/about/newsletters/may-2017-newsletter"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/livemint-june-11-2017-shaikh-zoaib-saleem-are-biometrics-hack-proof">
    <title>Are biometrics hack-proof?</title>
    <link>http://editors.cis-india.org/internet-governance/news/livemint-june-11-2017-shaikh-zoaib-saleem-are-biometrics-hack-proof</link>
    <description>
        &lt;b&gt;There are growing concerns over biometric security in India. We ask the experts if biometrics can really be hacked.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shaikh Zoaib Saleem was published by &lt;a class="external-link" href="http://www.livemint.com/Money/YD7dqEVRJbrqoAs3h4PuJO/Are-biometrics-hackproof.html"&gt;Livemint&lt;/a&gt; on June 11, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;There are growing concerns over biometric security. A compromised  password can be changed but not a stolen biometric. We ask experts about  biometrics security in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash, policy director, The Centre for Internet &amp;amp; Society &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Biometric  devices are not hack-proof. It depends on the ease with which this can  be done. In Malaysia, thieves who stole a car with a fingerprint-based  ignition system simply chopped off the owner's finger. When a biometric  attendance system was introduced at the Institute of Chemical Technology  (ICT) in Mumbai, students continued giving proxies by using moulds made  from Fevicol.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, researchers at NYU and Michigan  State University revealed that they were able to generate a  "MasterPrint", which is a "partial fingerprint that can be used to  impersonate a large number of users". While there are potential  safeguards, they require re-capturing everyone's biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even  other technologies like iris scanner, gait recognition, face  recognition, and others, are getting better, but all have problems. Our  laws haven't evolved either, leaving many unanswered questions: who can  demand your biometrics and under what circumstances? Can your biometrics  be captured without your consent? Who is liable for failure? What  remedies does one have?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an evolving area of  technology studies, and every day new kinds of attacks are discovered.  Further, they are probabilistic technologies unlike passwords. Given  this, if you seek a reliable identity verification system, it doesn't  make sense to deploy a system exclusively based on biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Umesh Panchal, vice-president, Biomatiques Identification Solutions &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Biometric  devices are instruments delivering added security check functions over  traditional methods and these devices can be hack-proof, if the process  of exploiting vulnerabilities to gain unauthorised access to systems or  resources, is taken care of. With liveliness detection, iris biometric  devices are far more hack-proof than fingerprint devices. Even Pentagon  has been hacked. Theoretically, a biometric device can internally store  or copy fingerprints or iris scans. Depending upon the use-case and  ecosystem, a biometric device can internally store templates. However,  the UID system (Unique Identification Authority of India) doesn’t permit  storage of any biometric data in any biometric devices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several  security measures can be incorporated to ensure strong transaction  security and end-to-end traceability to prevent misuse. This can be  achieved by implementing specification of authentication ecosystem.  These include deploying signed application, host and operator  authentication, usage of multi-factor authentication, SMS/email alerts,  encryption of sensitive data, biometric locking, device identification  with unique device identifier for analytics/fraud management,  eliminating use of stored biometrics and so on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a consumer, the device security is determined by the certification it holds from the competent certification authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bryce Boland, chief technology officer-Asia Pacific, FireEye&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Biometrics  take many forms. Most often people think biometrics are the actually  measured biological feature, but they are actually measurements of a  feature turned into a sequence of data that is compared against another  set of data. You don’t actually need the physical feature, you need the  measurements to generate the sequence of data to make a match. If you  can inject that data into a biometric, bypassing the reader, you can  potentially trick a biometric system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most successful biometric  implementations have a controlled enrolment process where identity  validation is undertaken, and have physically secured, tamperproof and  closely monitored readers. Systems like those used for passport  biometric enrolment with restricted deployments of readers at airports  are an example. Self-enrollment is prone to fraud. Widely distributed  readers are prone to tampering. Insecure paths from readers to central  credential repositories are prone to credential theft.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once  biometric information is stolen, it usually cannot be changed. So stolen  data can potentially be used for a long time, creating problems. This  isn’t the case for airport fingerprint readers, but it is a problem for  biometric devices in the hands of the public. The best way to check this  is to keep the system’s environment physically secured, tamperproof and  closely monitored.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajesh Babu, CEO, Mirox Cyber Security &amp;amp; Technology &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Biometrics  devices can be hacked. They have fingerprint sensors, which only check  the pattern. It is possible to recreate these patterns through various  techniques. Technically, it is difficult to recreate biometrics from a  high-resolution picture. However, by using other image rendering tools  we can recreate the patterns. Security experts and hackers have already  proved that they can bypass mobile fingerprint scanners using a  collection of high-resolution photographs taken from different angles  using standard photo cameras to make a latex replica print.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most  of the biometric scanners have a date set of all fingerprints and other  identities inside the device database. Not every manufacturer in India  undergoes enough security auditing. Most of the companies manufacture  low-cost biometric devices which are highly vulnerable. These devices  are imported from China and other countries but they do not conduct or  go through any security audits in our country. They may have kernel  level back doors, which are highly vulnerable and can lead to launch of  an any kind of attack, including compromising an organization’s network.  Only a handful of companies conduct audits of their products as part of  security practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Organizations and the government must have a  clear and concise Security Devices Policy based on standard applicable  laws and regulation framework.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/livemint-june-11-2017-shaikh-zoaib-saleem-are-biometrics-hack-proof'&gt;http://editors.cis-india.org/internet-governance/news/livemint-june-11-2017-shaikh-zoaib-saleem-are-biometrics-hack-proof&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-12T01:39:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/indian-express-kiran-jonnalgadda-june-10-2017-why-did-nandan-nilekani-praise-a-twitter-troll">
    <title>Why did Nandan Nilekani praise a Twitter troll?</title>
    <link>http://editors.cis-india.org/internet-governance/news/indian-express-kiran-jonnalgadda-june-10-2017-why-did-nandan-nilekani-praise-a-twitter-troll</link>
    <description>
        &lt;b&gt;As the Supreme Court upholds the linking of ‘Aadhar’ with PAN, questions around ex-UIDAI chairman Nandan Nilekani praising iSPIRT head Sharad Sharma Twitter troll and ‘Aadhar’s privacy properties will continue to be asked.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kiran Jonnalgadda was published in the &lt;b&gt;&lt;a class="external-link" href="http://indianexpress.com/article/opinion/why-did-nandan-nilekani-praise-a-twitter-troll-4697235/"&gt;Indian Express&lt;/a&gt;&lt;/b&gt; on June 10, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last month, Sharad Sharma, the head of the Indian Software Product  Industry Round Table (iSPIRT) Foundation, an organisation that promotes  Aadhaar to industry, was outed as the operator of at least two anonymous  Twitter troll accounts that viciously harassed and defamed critics of  Aadhaar. The shocking revelation was first met with denial by iSPIRT,  and then followed by what may be understood as a reticent apology from  Mr Sharma.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a bizarre sequence of events, the apology received praise from  several quarters. iSPIRT’s Guidelines and Compliance Committee (IGCC)  investigated Mr Sharma and the ‘Sudham’ team that coordinated the  trolling campaign. Two members of the investigating committee  subsequently resigned, although only one confirmed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The committee’s findings, confirming that Mr Sharma was responsible,  were summarised for the public by Mr Sharma himself, who then announced  that his role as a public spokesperson would now be handled  by Sanjay Jain. Mr Jain was once with the Unique Identification  Authority of India (UIDAI), launched by Nandan Nilekani, is currently a  director at Nandan Nilekani’s EkStep Foundation, and a close confidante  of Mr Sharma. The two have often pitched iSPIRT’s IndiaStack initiative  together.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an internal email questioning this decision, an iSPIRT member  asked whether Mr Jain was a part of the ‘Sudham’ team, and whether he  was also “at least partially culpable for the [troll] campaign and the  violation of the code of conduct.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The victims of the trolling have received no report, and the two  apologies posted by Mr Sharma were both for having “condoned uncivil  behaviour”, but not for personally orchestrating the attacks. Among  those who praised him was Nandan Nilekani, former chairman of UIDAI  and chief mentor of iSPIRT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critics have been pointing out for years that Aadhaar lacks  sufficient checks and balances, and that claims of benefits  are overstated. These concerns have been met with denial, condemnation  of critics, and often outright refusal to engage in debate. This has  unfortunately only served to alienate an even larger section of the  population, turning ordinary citizens into activists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We can gain an insight into how Aadhaar is promoted by examining  iSPIRT. The organisation was founded in 2013 by volunteers who had  been working together on the sidelines of the NASSCOM Product Conclave.  These volunteers felt the need for an independent grassroots  organisation to represent tech entrepreneurs who were building  products for India and the world. iSPIRT has grown phenomenally  influential over its few years, largely by the work of volunteers who  were truly interested in building a mutual assistance community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Level playing fields are a recurring topic. Just as there is a desire  to lower bureaucratic hurdles to give every entrepreneur a fair chance,  there is also the question of how a startup can compete against a  foreign competitor that has the advantage of a stronger home market.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://indianexpress.com/about/flipkart/"&gt;Flipkart&lt;/a&gt; and  Ola are two prominent examples in their fight to defend their market  share against Amazon and Uber, competitors armed with global experience,  more capital, and better trained talent. iSPIRT’s take is that for  Indian companies to thrive they must have a supportive ecosystem that  enables rapid growth, and so iSPIRT must step up as an “activist think  tank”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One aspect of this activism is IndiaStack, which seeks to help  startups by promoting a suite of ‘public goods’: Aadhaar and eKYC for id  verification, eSign and Digilocker for digital contracts and  certificates, and UPI for payments. If one accepts at face value that  these services are well intentioned, then IndiaStack is on a noble  quest. The details, unfortunately, are less pristine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iSPIRT is a private non-profit, but its volunteers include several  former members of UIDAI. The guidance and compliance committee (IGCC)  investigating the trolling included a current member of government.  iSPIRT helped build and evangelise the UPI (United Payments Interface)  platform and BHIM app for NPCI, but the level of involvement and terms  of the agreement are not public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For an organisation that claims to champion public goods, iSPIRT is  opaque on the level of influence they wield with government (Mr Sharma  once claimed some influence but no control), and on who exactly built  the various components of IndiaStack, within or outside of government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They showed a remarkable degree of influence when foisting UPI on a  change-resistant banking sector. They have funding from four banks  (IDFC, SBI, Bank of Baroda and Axis Bank) and from fintech startups.  Despite this level of responsibility, they also have no accountability  since they are a pro bono volunteer force, allowing them to distance  themselves from failures (UPI failures are NPCI’s problem and Aadhaar  failures are UIDAI’s problem, etc) and unpleasant incidents such as the  ‘Sudham’ trolling project. (No one has accepted responsibility for  operating a troll account.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the core of IndiaStack is ‘Aadhaar’, which as it currently stands  has serious concerns from its technical architecture to institutional  safeguards. Aadhaar lacks publicly verifiable audits, a data breach  disclosure policy, or an engagement process for researchers to report  concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For reasons best known to them, the promoters of ‘Aadhaar’ are in a  tearing hurry to impose it everywhere, in every aspect of an Indian’s  life, out of an apparent fear that it will die if adoption slows  down. This is eerily reminiscent of startup mantras like “fake it till  you make it” and “move fast and break things”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But ‘Aadhaar’ already has a billion enrollments and the backing of  legal measures pushed by the Union Government. There is no threat of  imminent demise. And yet, as the Twitter trolling shows, this fear  continues to exist for ‘Aadhaar’s proponents, so much so that critics  must be silenced at any cost.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where trolling failed to work, subtler attacks are sure to follow. There have been some in the recent past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) is facing one such attack  for its report on the leak of 130 million Aadhaar numbers. The report  received wide coverage and was followed by new rules from MEITy  (ministry of Electronics &amp;amp; Information Technology) regarding the  handling of Aadhaar numbers, but instead of commending CIS for its role  in improving safeguards, UIDAI is accusing it of hacking, demanding the  identity of the researcher so that he or she may be individually  prosecuted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When Sameer Kochhar demonstrated that previously captured  fingerprints were being reused because Aadhaar’s API lacked technical  safeguards, UIDAI responded by prosecuting him. A News18 journalist was  also prosecuted for demonstrating how double application for enrollment  was possible using different names.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of September 30, 2017, ‘registered’ devices will be mandatory as  the current devices are not secure against fingerprint reuse, and an  unknown number of fingerprints have already been captured and stored.  This sort of forced technological upgrade will happen again as more  problems surface into public consciousness, with more researchers and  critics harassed for pointing these out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘Aadhaar’ pursues inherently contradictory goals. The process of  ‘inorganic seeding’, for instance, allows a database to be seeded with  ‘Aadhaar’ numbers, to help a service provider identify and eliminate  duplicates without the individual’s cooperation. (Inorganic seeding is  an official UIDAI scheme.) And yet, the law prohibits using and sharing  ‘Aadhaar’ numbers without the individual’s consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘Aadhaar’ aims to be an inclusive project, providing an identity for  everyone, and yet easily lends itself to being an instrument of  exclusion. There is technical exclusion when biometrics fail to match,  and there is institutional exclusion when Aadhaar is made mandatory and  an individual is then blacklisted from a service or denied Aadhaar  enrollment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aviation minister &lt;a href="http://indianexpress.com/about/jayant-sinha"&gt;Jayant Sinha&lt;/a&gt; recently announced a proposal to use digital id for just this  purpose. ‘Aadhaar’ in its current state makes it extraordinarily simple  for an organisation to demand it for authentication, but what of the  necessary safeguards to protect an individual’s rights? Or of ensuring  that grievance redressal mechanisms are in place and actually  functional? These are not solved by a technical API integration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just as we’ve seen with nuclear power, weak institutions which are  sensitive to criticism and fail to ensure effective oversight amplify  the risks of the underlying technology. Aadhaar’s supporting  institutions, whether government bodies like UIDAI or private bodies  like iSPIRT, are immature for the mandate they carry. All technology  improves with time, but weak institutions hamper their benefit to  society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the leading promoter of Aadhaar, founding chairman of UIDAI, and  chief mentor of iSPIRT, Mr Nilekani must step up and commit to improving  the institutions he commands, and take responsibility for their  failures. Condemning critics instead does not help build institutions.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/indian-express-kiran-jonnalgadda-june-10-2017-why-did-nandan-nilekani-praise-a-twitter-troll'&gt;http://editors.cis-india.org/internet-governance/news/indian-express-kiran-jonnalgadda-june-10-2017-why-did-nandan-nilekani-praise-a-twitter-troll&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-12T01:34:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/livelaw-june-10-2017-simran-sahni-placements-at-nujs">
    <title>Placements at NUJS: Class of 2017 Scores 100%</title>
    <link>http://editors.cis-india.org/internet-governance/news/livelaw-june-10-2017-simran-sahni-placements-at-nujs</link>
    <description>
        &lt;b&gt;The Campus Recruitment Committee of the Class of 2017, NUJS is proud to confirm that NUJS has once again topped the placement tally among the premier national law schools, in terms of number of jobs, for the year 2016-17 with the graduating class having secured offers for all its 78 members who partook in the recruitment process. &lt;/b&gt;
        &lt;p&gt;The blog post by Simran Sahni was published in &lt;a class="external-link" href="http://www.livelaw.in/placements-nujs-class-2017-scores-100/"&gt;Livelaw&lt;/a&gt; on June 10, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The number of students hired by the domestic law firms on Day Zero with a tally totaling 57, inclusive of the 24 accepted pre-placement offers (PPOs).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ‘Big 7’ firms contributed to 53 of these jobs and ICICI Bank recruited 4. New recruiters including Indus Partners and Singh &amp;amp; Associates hired from campus this year, picking three students each. Three students bagged offers from international law firms: Herbert Smith Freehills, Linklaters, and Allen &amp;amp; Overy respectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The salaries remain the same as last year with the average foreign firm package ranging from INR 38 lakhs to 44 lakhs for traineeships and the average domestic firm packages ranging from INR 8 lakhs to 18 lakhs. The firm with the highest domestic package was AZB and Partners, Mumbai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, more than six students this year have decided to pursue higher education. Students have received admission offers in LLM from Harvard Law School, Cambridge Faculty of Law, NYU Faculty of Law, London School of Economics and Graduate Institute Geneva respectively. Charting new courses, while one student opting for a master’s in management has been offered admission at the renowned London Business School, another joined as a policy officer at the Centre for Internet and Society in Bangalore. Interestingly, even the topper of the class opted out of placements this year and set a new record by being the third in the line of scholars from NUJS to secure the prestigious Rhodes scholarship to Oxford University. Similarly, students have also decided to take up the meritorious one year Young India Fellowship program at Ashoka University.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the current placement figures, NUJS beats all market trends to secure the highest number of job offers among premier law schools. The Class of 2017 also marginally trumps the record of the Class of 2016 in terms of total number of ‘Big 7’ jobs, even with a large chunk of the batch opting out of campus recruitment and pursing litigation, higher education, civil and judicial services and roles in think tanks and other non-profit organization's - the results of which shall be released by us as and when they come.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This entire feat would not have been possible without the support of the respected Vice Chancellor, Prof. P. Ishwara Bhat, CRC team and faculty advisor Ms. Vaneeta Patnaik, and all the faculty members at NUJS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NUJS has built an exceedingly steady placement record for itself over the years. The placement figures for the Class of 2017 of NUJS are now live on the website &lt;a class="external-link" href="http://sja.nujs.edu/newsroom/2017/06/07/placements-at-nujs-class-of-2017-scores-100"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/livelaw-june-10-2017-simran-sahni-placements-at-nujs'&gt;http://editors.cis-india.org/internet-governance/news/livelaw-june-10-2017-simran-sahni-placements-at-nujs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Placement</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-06-12T01:23:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-hindu-yuthika-bhargava-june-9-2017-new-law-to-unlock-data-economy">
    <title>New law to unlock data economy </title>
    <link>http://editors.cis-india.org/internet-governance/news/the-hindu-yuthika-bhargava-june-9-2017-new-law-to-unlock-data-economy</link>
    <description>
        &lt;b&gt;Proposal has been sent to PMO for approval. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Yuthika Bhargava was &lt;a class="external-link" href="http://www.thehindu.com/news/national/new-law-to-unlock-data-economy/article18951772.ece"&gt;published in the Hindu&lt;/a&gt; on June 9, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The government is mulling a new data protection law to protect  personal data of citizens, while also creating an enabling framework to  allow public data to be mined effectively. The move assumes significance  amid the debate over security of individuals’ private data, including  Aadhaar-linked biometrics, and the rising number of cyber-crimes in the  country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Ministry of Electronics and Information Technology  (MEIT) is working on a new data protection law. A proposal to this  effect has been sent to the Prime Ministers’ Office for approval,” a  senior ministry official told &lt;i&gt;The Hindu&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the PMO approves it, the ministry will set up a “cross-functional committee” on the issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We  want to include all stakeholders. It will be a high-level committee,  and all current and future requirements of the sector will be  discussed.”&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Two chief aims&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The official said: “We  are working with two main aims – to ensure that personal data of  individuals remain protected and is not misused, and to unlock the data  economy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The official explained that a lot of benefits can be derived from the data that is publicly available, by using technology and big data analytics. “The information can be used for the benefit of both individuals and companies,” the official said.&lt;br /&gt;&lt;br /&gt;“The underlying infrastructure of the digital economy is data. India is woefully unprepared to protect its citizens from the avalanche of companies that offer services in exchange for their data, with no comprehensive framework to protect users,” Software Freedom Law Centre (SFLC.in), a non-profit, said in an emailed reply.&lt;br /&gt;&lt;br /&gt;Currently, India does not have a separate law for data protection, and there is no body that specifically regulates data privacy.&lt;br /&gt;&lt;br /&gt;“There is nominally a data protection law in India in the form of the Reasonable Security Guidelines under Section 43A of the Information Technology Act. However, it is a toothless law and is never used. Even when data leaks such as the ones from the official Narendra Modi app or McDonald’s McDelivery app have happened, section 43A and its rules have not proven of use,” said Pranesh Prakash, policy director at CIS.&lt;br /&gt;&lt;br /&gt;Some redress for misuse of personal data by commercial entities is also available under the Consumer Protection Act enacted in 2015, according to information on the website of Privacy International, an NGO. As per the Act, the disclosure of personal information given in confidence is an unfair trade practice.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-hindu-yuthika-bhargava-june-9-2017-new-law-to-unlock-data-economy'&gt;http://editors.cis-india.org/internet-governance/news/the-hindu-yuthika-bhargava-june-9-2017-new-law-to-unlock-data-economy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-12T01:10:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/files/consultative-meeting-for-digital-archive-lab.pdf">
    <title>Consultative Meeting for a Digital Archive Lab</title>
    <link>http://editors.cis-india.org/internet-governance/files/consultative-meeting-for-digital-archive-lab.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/files/consultative-meeting-for-digital-archive-lab.pdf'&gt;http://editors.cis-india.org/internet-governance/files/consultative-meeting-for-digital-archive-lab.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-06-08T13:02:24Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/livemint-june-8-2017-shaikh-zoaib-saleem-explore-money-apps-but-watch-your-data">
    <title>Explore money apps but watch your data</title>
    <link>http://editors.cis-india.org/internet-governance/news/livemint-june-8-2017-shaikh-zoaib-saleem-explore-money-apps-but-watch-your-data</link>
    <description>
        &lt;b&gt;Financial apps may appear to be free but before you install them, read their privacy policies to know what you may be signing away.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shaikh Zoaib Saleem was published in &lt;a class="external-link" href="http://www.livemint.com/Money/qjtm4qje8GP4c9ENPKjP6M/Explore-money-apps-but-watch-your-data.html"&gt;Livemint&lt;/a&gt; on June 8, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="A5l" style="text-align: justify; "&gt;With  the increasing usage of smartphones and other smart devices, our use of  and dependence on mobile applications also increases. These apps, while  being installed on your device, ask for a lot of permissions. Most users  do not take a detailed look at all the permissions being granted to any  particular app’s publisher. Moreover, even fewer users look at the  privacy policies and terms of use of apps, which detail how the  publisher intends to utilize the data you share.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In most cases, the data collected is analysed and used for targeted  marketing campaigns by the apps’ publishers, based on the users’  profiles and habits. Read more about it here: &lt;i&gt;&lt;a href="http://bit.ly/2q3ByA3"&gt;bit.ly/2q3ByA3. &lt;/a&gt;&lt;/i&gt;While  this phenomena is spread across the board for all categories of apps,  we take a look at the privacy policies and terms of use of the top 10  Android financial apps in India (top 10 as of June 1, according to App  Annie, a mobile apps market research company based in California). The  10 apps are: PhonePe, BHIM, SBI Anywhere Personal, Kotak – 811 and  Mobile Banking, JioMoney Wallet, Money View Money Manager, State Bank  Buddy, Bank Balance Check, All Bank Balance Enquiry, iMobile by ICICI  Bank.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Collecting information&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The common  theme across privacy policies of these apps is that the information is  collected to enhance customer experience while using an app, respond to  customer complaints and resolve disputes. Another theme is tracking  consumer behaviour. For instance, PhonePe, in its privacy policy states,  “We may automatically track certain information about you based upon  your behaviour on our app. We use this information to do internal  research on our users’ demographics, interests, and behaviour to better  understand, protect and serve our users. This information is compiled  and analysed on an aggregated basis.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the privacy  policy of BHIM app says, “…once you give us your personal information,  you are not anonymous to us. We may automatically track certain  information about you based upon your behaviour on our app to the extent  we deem fit.” It further adds that if you choose to transact on the  app, then “we collect information about your transaction behaviour.” All  the apps collect some or the other information like device IDs and  location.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Sharing Information&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The  information gathered by the apps is not just used by these companies  themselves, but also shared with third parties, subsidiaries, parent  companies and agents of the companies. iMobile by ICICI Bank, for  instance, in its privacy policy states that the bank will limit the  collection and use of customer information only on a need-to-know basis  to deliver better service to the customers. “ICICI Bank may use and  share the information provided by the customers with its affiliates and  third parties for providing services and any service-related activities  such as collecting subscription fees for such services, and notifying or  contacting the customers regarding any problem with, or the expiration  of, such services. In this regard, it may be necessary to disclose the  customer information to one or more agents and contractors of ICICI Bank  and their sub-contractors, but such agents, contractors, and  sub-contractors will be required to agree to use the information  obtained from ICICI Bank only for these purposes,” the policy reads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly,  PhonePe in its privacy policy has said that the company may share  personal information with its other corporate entities and affiliates.  “We and our affiliates will share/sell some or all of your personal  information with another business entity should we (or our assets) plan  to merge with, or be acquired by that business entity, or  re-organization, amalgamation, restructuring of business. Should such a  transaction occur that other business entity (or the new combined  entity) will be required to follow this privacy policy with respect to  your personal information,” it reads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While installing, the Kotak  app seeks your “irrevocable consent” to its privacy policy, which, among  others things, states: “We may disclose the customer information to  third parties for following, among other purposes, and will make  reasonable efforts to bind them to obligation to keep the same secure  and confidential and an obligation to use the information for the  purpose for which the same is disclosed, and you hereby give your  irrevocable consent for the same.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;JioMoney Wallet, while  disclosing upfront that the publishing company and its affiliates do not  sell or rent personal information to any third-party entities, also  adds that the company “engages a number of vendors, consultants,  contractors and takes support of our group companies or affiliates. We  may provide our partners access to or share your personal information to  enable them to provide the services subscribed by you.” Terms and  conditions of the BHIM app state: “For the protection of both the  parties, and as a tool to correct misunderstandings, the user  understands, agrees and authorises NPCI, at its discretion, and without  further prior notice to the user, to monitor and record any or all  telephone conversations between the user(s) and NPCI only.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is  imperative to note that most of these apps announce it upfront in their  privacy policies that the policy could change anytime without prior  information to the users. At the same time, it should be noted that  sharing of some data is required for proper functioning of many apps.  While most app publishers may not misuse the data being gathered, you  should know exactly what data is being used.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash,  policy director at the Centre for Internet and Society said that their  research outputs show that laws to deal with misuse of personal data are  very weak in India. “We need a strong privacy law to address these  issues, of which we have proposed a citizens’ draft. Clearly, the  prevailing situation shows that the industry is not taking enough  initiative on self-regulation. At the same time, even the government  isn’t taking much interest in consumer protection.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/livemint-june-8-2017-shaikh-zoaib-saleem-explore-money-apps-but-watch-your-data'&gt;http://editors.cis-india.org/internet-governance/news/livemint-june-8-2017-shaikh-zoaib-saleem-explore-money-apps-but-watch-your-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-08T12:46:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/indian-express-june-1-2017-pranav-mukul-privacy-is-culture-specific-mncs-hit-by-aadhaar-says-trai-chief">
    <title>Privacy is culture specific, MNCs hit by Aadhaar, says TRAI chief</title>
    <link>http://editors.cis-india.org/internet-governance/news/indian-express-june-1-2017-pranav-mukul-privacy-is-culture-specific-mncs-hit-by-aadhaar-says-trai-chief</link>
    <description>
        &lt;b&gt;A clutch of petitions filed by those opposing what they call the unchecked use of Aadhaar is currently in the Supreme Court. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Pranav Mukul was published in the       &lt;a href="http://indianexpress.com/article/india/privacy-is-culture-specific-mncs-hit-by-aadhaar-says-trai-chief-4683613/"&gt;Indian  Express&lt;/a&gt; on June 1, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Questioning the anti-Aadhaar campaigns by       non-governmental organisations and civil society groups, Telecom       Regulatory Authority of India’s (TRAI) Chairman R S Sharma, who is       also the former Director General of Unique Identification       Authority of India (UIDAI), said that various multinational       companies were being affected by Aadhaar as it was in conflict       with their attempts to create their own database of users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It’s making a mountain out of a molehill. There       are motivated campaigns being launched. Various multinationals are       getting affected. There are companies, which are creating their       own identities. Someone has called it digital colonisation. The       fingerprint scanners on smartphones can be easily used for       authenticating Aadhaar but they don’t allow it. A lot of       fraudulent or benami transactions can go down because of Aadhaar,”       Sharma told The Indian Express. While he refused to elaborate on       these multinationals, the remarks are an apparent reference to       Silicon Valley giants such as &lt;a href="http://indianexpress.com/about/facebook/"&gt;Facebook&lt;/a&gt; and       &lt;a href="http://indianexpress.com/about/google/"&gt;Google&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sharma’s remarks come at a time when civil       society groups have flagged serious concerns on issues such as       privacy and accountability that arise from the Centre’s increasing       use of Aadhaar. A clutch of petitions filed by those opposing what       they call the unchecked use of Aadhaar is currently in the Supreme       Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, a Bengaluru-based NGO — Centre for       Internet &amp;amp; Society (CIS) — released a report suggesting 130       million Aadhaar numbers were leaked on government portals. CIS       later updated its report to say that there were no “leaks” or       “leakages” but a “public disclosure”. The UIDAI served a       show-cause notice to CIS, asking it to explain its claims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The TRAI chairman defended UIDAI’s decision to       send the notice to CIS and said that there were no leakages from       Aadhaar, or decryption of of biometric data from the UIDAI server.       At the same time, Sharma made a case for having a comprehensive       data protection law in the country. “There is a need for a larger       data protection law. In today’s digitally connected world, data       protection law is a must. Data security, its protocols, rules,       responsibilities, accountabilities, damage, payments,       compensations, all these issues must come in that law,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Aadhaar Act, itself, is very self-contained,       which takes into account all data protection and privacy issues,”       Sharma said, adding that privacy was a cultural concept. “Privacy       is a culture specific concept, which they are trying to import       here. Except for NGOs, has any individual or poor person       complained, or filed a case about privacy?” he asked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a recent interview to The Indian Express,       Minister of Law &amp;amp; Justice and Electronics &amp;amp; Information       Technology Ravi Shankar Prasad had tried to allay fears of any       loopholes in the Aadhaar security system and said “this systematic       campaign against Aadhaar comes as a surprise for me”. He said that       the voter ID information was also in public domain, but “I don’t       see any campaign there”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/indian-express-june-1-2017-pranav-mukul-privacy-is-culture-specific-mncs-hit-by-aadhaar-says-trai-chief'&gt;http://editors.cis-india.org/internet-governance/news/indian-express-june-1-2017-pranav-mukul-privacy-is-culture-specific-mncs-hit-by-aadhaar-says-trai-chief&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T13:57:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data">
    <title>New rules for govt agencies to ensure security of personal data</title>
    <link>http://editors.cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data</link>
    <description>
        &lt;b&gt;The new rules put the onus on government departments and agencies to safeguard personal data or information held by them.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was &lt;a href="http://www.livemint.com/Politics/iTcwgoIUnkEnGSqOvekhUL/New-rules-for-govt-agencies-to-ensure-security-of-personal-d.html"&gt;published by Livemint&lt;/a&gt; on June 2, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Government departments handling personal data or information will have to ensure that end-users are made aware of the data usage and collection and their consent is taken either in writing or electronically, according to new guidelines issued by the government for security of personal data. Sensitive personal data such as passwords, financial information (bank account, credit card, debit card and other payment instrument details), medical records and history, sexual orientation, physical and mental health, and biometric information cannot be stored by agencies without encryption, say the guidelines issued by the ministry of electronics and information technology (IT) on 22 May.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules put the onus on government departments and agencies to safeguard personal data or information held by them. To be sure, the Information Technology Act 2000 and Aadhaar Act 2016 have laid down most of these rules. The new guidelines seek answers to questions being asked on data protection under the Aadhaar Act. “If agency is storing Aadhaar number or sensitive personal information in database, data must be encrypted and stored. Encryption keys must be protected securely, preferably using Hardware Security Modules (HSMs). If simple spreadsheets are used, it must be password protected and securely stored,” according to the guidelines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In April, the IT Ministry issued a notification directing all government departments to remove any personal data published on their websites or through other avenues. The guidelines require regular audits to ensure effectiveness of data protection and also call for swift action on any breach of personal data. In cases where an Aadhaar number has to be printed, it should be truncated or masked. The guidelines say only the last four digits of the 12-digit unique identity number can be displayed or printed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a research report issued by Bengaluru-based think tank Centre for Internet and Society on 1 May, four government portals could have made public around 130-135 million Aadhaar numbers and around 100 million bank account numbers.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data'&gt;http://editors.cis-india.org/internet-governance/news/livemint-june-2-2017-komal-gupta-new-rules-for-govt-agencies-to-ensure-security-of-personal-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T13:51:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/electronic-frontier-foundation-jyoti-panday-june-1-2017-aadhaar-ushering-in-a-commercialized-era-of-surveillance-in-india">
    <title>Aadhaar: Ushering in a Commercialized Era of Surveillance in India</title>
    <link>http://editors.cis-india.org/internet-governance/news/electronic-frontier-foundation-jyoti-panday-june-1-2017-aadhaar-ushering-in-a-commercialized-era-of-surveillance-in-india</link>
    <description>
        &lt;b&gt;Since last year, Indian citizens have been required to submit their photograph, iris and fingerprint scans in order to access legal entitlements, benefits, compensation, scholarships, and even nutrition programs. Submitting biometric information is needed for the rehabilitation of manual scavengers, the training and aid of disabled people, and anti-retroviral therapy for HIV/AIDS patients. Soon police in the Alwar district of Rajasthan will be able to register criminals, and track missing persons through an app that integrates biometric information with the Crime and Criminal Tracking Network Systems (CCTNS).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Jyoti Panday was published by the &lt;a class="external-link" href="https://www.eff.org/deeplinks/2017/05/aadhaar-ushering-commercialized-era-surveillance-india"&gt;Electronic Frontier Foundation&lt;/a&gt; on June 1, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;These instances demonstrate how intrusive India’s controversial  national biometric identity scheme, better known as Aadhaar has grown.  Aadhaar is a 12-digit unique identity number (UID) issued by the  government after verifying a person’s biometric and demographic  information. As of April 2017, the Unique Identification Authority of  India (&lt;a href="https://uidai.gov.in/"&gt;UIDAI&lt;/a&gt;) has issued &lt;a href="http://www.financialexpress.com/opinion/why-centre-will-have-to-devise-a-comprehensive-aadhaar-bill-and-not-a-money-bill-to-address-challenges/680820/"&gt;1.14 billion&lt;/a&gt; UIDs covering nearly 87% of the population making Aadhaar, the largest  biometric database in the world. The government asserts that enrollment  reduces fraud in welfare schemes and brings greater social inclusion.  Welfare schemes that provide access to basic services for marginalized  and vulnerable groups are essential. However, unlike countries where  similar schemes have been implemented, invasive biometric collection is  being imposed as a condition for basic entitlements in India. The  privacy and surveillance risks associated with the scheme have caused  much dissension in India.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Identity and Privacy in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Initiated as an identity authentication tool, the critical problem  with Aadhaar is that it is being pushed as a unique identifier to access  a range of services. The government &lt;a href="http://www.dnaindia.com/india/report-alive-to-earlier-orders-that-aadhaar-should-be-voluntary-sc-2418854"&gt;continues to maintain&lt;/a&gt; that  the scheme is voluntary, and yet it has galvanized enrollment by  linking Aadhaar to over 50 schemes. Aadhaar has become the de-facto  identity document accepted at private, banks, schools, and hospitals.  Since Aadhaar is linked to the delivery of essential services,  authentication errors or deactivation &lt;a href="https://scroll.in/topic/38792/identity-project"&gt;has serious consequences&lt;/a&gt; including exclusion and denial of statutory rights. But more  importantly, using a unique identifier across a range of schemes and  services enables seamless combination and comparison of databases. By  using Aadhaar, &lt;a href="https://scroll.in/article/833080/aadhaar-amid-the-hullabaloo-about-privacy-the-more-pressing-issue-of-exclusion-has-been-forgotten"&gt;the government&lt;/a&gt; can  match existing records such as driving license, ration card, financial  history to the primary identifier to create detailed profiles. Aadhaar  may not be the only mechanism, but essentially, it's a surveillance tool  that the Indian government can use to surreptitiously identify and  track citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is worrying, particularly in context of the ambiguity regarding  privacy in India. The right to privacy for Indian citizens is not  enshrined in the Constitution. Although, the Supreme Court &lt;a href="https://thewire.in/7398/sorry-mr-attorney-general-we-do-actually-have-a-constitutional-right-to-privacy/"&gt;has located&lt;/a&gt; the right to privacy as implicit in the concept of “ordered liberty”  and held that it is necessary in order for citizens to effectively enjoy  all other fundamental rights. There is also no comprehensive national  framework that regulates the collection and use of personal  information. In 2012, Justice K.S. Puttaswamy&lt;a href="http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841"&gt; challenged&lt;/a&gt; Aadhaar in the Supreme Court of India on the grounds that it violates  the right to privacy. The Court passed an interim order restricting  compulsory linking of Aadhaar for benefits delivery, and referred the  clarification on privacy as a right to a larger bench. More than a year  later, the constitutional bench &lt;a href="http://indianexpress.com/article/opinion/columns/supreme-test-4642608/"&gt;is yet to be&lt;/a&gt; constituted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The delay in sorting out the nature and scope of privacy as right in  India has allowed the government to continue linking Aadhaar to as many  schemes as possible, perhaps with the intention of ensuring the scheme  becomes too big to be rolled back. In 2016, the government enacted the '&lt;a href="https://uidai.gov.in/images/the_aadhaar_act_2016.pdf"&gt;Aadhaar Act&lt;/a&gt;' passing the legislation without any debate, discussion or even approval of both houses of Parliament. In April this year, &lt;a href="http://www.hindustantimes.com/business-news/now-aadhaar-a-must-to-file-income-tax-returns-and-apply-for-pan-card/story-71CBEXGGD8yd9iFjUn4oNI.html"&gt;Aadhaar was made compulsory&lt;/a&gt; for filing income tax or PAN number application and the decision is being challenges in Supreme Court. &lt;a href="http://www.dnaindia.com/india/report-arguments-on-so-called-privacy-is-bogus-ag-rohtagi-defends-making-aadhaar-mandatory-for-pan-card-in-sc-2425525"&gt;Defending the State &lt;/a&gt;, the  Attorney-General of India claimed that the arguments on so-called  privacy and bodily intrusion is bogus, and citizens cannot have an  absolute right over their body! The State’s articulation is chilling,  especially in light of the &lt;a href="https://qz.com/463279/indias-dna-profiling-bill-may-become-one-of-the-worlds-most-intrusive-laws/"&gt;Human DNA Profiling Bill&lt;/a&gt; seeking  the right to collect biological samples and DNA indices of citizens.  Such anti-rights arguments are worth note because biometric tracking of  citizens isn't just government policy - it is also becoming big  business.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Role of Private Companies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Private companies supply hardware, software, programs, and the  biometric registration services for rolling out Aadhaar to India’s large  population. UIDAI’s Committee on Biometrics acknowledges that  biometrics data are national assets though American biometric technology  provider L-1 Identity Solutions, and consulting firms Accenture and  Ernst and Young can &lt;a href="https://www.bloombergquint.com/technology/2017/05/03/who-has-your-aadhaar-data"&gt;access and retain&lt;/a&gt; citizens' data. The Aadhaar Act introduces electronic  Know-Your-Customer (eKYC) that allows government agencies and private  companies to download data such as name, gender and date of birth from  the Aadhaar database at the time of authentication. Banks and telecom  companies using authentication process to download data and auto-fill  KYC forms and to profile users. Over the last few years, the number of  companies or applications built around profiling of citizens’ personally  sensitive data has grown exponentially.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A number of people linked with creating the UIDAI infrastructure have  founded iSPIRT, an organisation that is pushing for commercial uses of  Aadhaar. Private companies are using Aadhaar for authentication purposes  and background checks. Microsoft has &lt;a href="http://gadgets.ndtv.com/apps/news/skype-lite-for-android-launched-what-it-is-how-it-works-and-everything-else-you-need-to-know-1662147"&gt;announced&lt;/a&gt; SkypeLite integration with Aadhaar to verify users. Others, such as &lt;a href="https://www.trustid.in/"&gt;TrustId &lt;/a&gt;and &lt;a href="http://timesofindia.indiatimes.com/city/delhi/eko-partners-npci-to-allow-aadhaar-linked-money-transfers/articleshow/53046280.cms"&gt;Eko&lt;/a&gt; are  integrating rating systems into their authentication services and  tracking users through platforms they create. In essence such companies  are creating their own private database to track authenticated Aadhaar  users and they may sell this data to other companies. The growth of  companies that &lt;a href="https://scroll.in/article/823274/how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch"&gt;share and combine databases&lt;/a&gt; to profile users is an indication of the value of personal data and its  centrality for both large and small companies in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Integrating and linking large biometrics collections to each other,  which are then linked with traditional data points that private  companies hold such as geolocation or phone number enables constant  surveillance to take over. So far, there has been no parliamentary  discussion on the role of private companies. UIDAI remains the ultimate  authority in deciding the nature, level and cost of access granted to  private companies. For example, there is nothing in Aadhaar Act that  prevents Facebook from entering into an agreement with the Indian  government to make Aadhaar mandatory to access WhatsApp or any of its  other services. Facebook could also pay data brokers and aggregators to  create customer profiles to add to its ever growing data points for  tracking and profiling its users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Security Risks and Liability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A series of data leakages have raised concerns about which private  entities are involved, and how they handle personal and sensitive data.  In February, UIDAI registered a complaint against three companies for  storing and using biometric data for multiple transactions. Aadhaar  numbers of over 130 million people and bank account details of about 100  million people&lt;a href="http://www.thehindubusinessline.com/info-tech/aadhaar-data-leak-exposes-cyber-security-flaws/article9677360.ece"&gt; have been publicly displayed&lt;/a&gt; through government portals owing to poor security practices. A &lt;a href="https://sabrangindia.in/sites/default/files/aadhaarfinancialinfo_02b_1.pdf?498"&gt;recent report&lt;/a&gt; from Centre for Internet and Society (CIS) showed that a &lt;a href="https://thewire.in/133916/taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar/"&gt;simple tweaking of URL query parameters&lt;/a&gt; of  the National Social Assistance Programme (NSAP) website could unmask  and display private information of a fifth of India's population.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such data leaks pose a huge risk as compromised biometrics can never  be recovered. The Aadhaar Act establishes UIDAI as the primary custodian  of identity information, but &lt;a href="https://scroll.in/article/830589/under-the-right-to-information-law-aadhaar-data-breaches-will-remain-a-state-secret"&gt; is silent on the liability&lt;/a&gt; in  case of data breaches. The Act is also unclear about notice and  remedies for victims of identity theft and financial frauds and citizens  whose data has been compromised. UIDAI has continued to fix breaches  upon being notified, but maintains that storage in federated databases  ensures that no agency can track or profile individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After almost a decade of pushing a framework for mass collection of data, the Indian government has &lt;a href="http://www.dot.gov.in/sites/default/files/2017_05_26%20Circulation%20Letter%20for%20Security%20of%20Information.pdf"&gt;issued guidelines &lt;/a&gt; to  secure identity and sensitive personal data in India. The guidelines  could have come earlier, and given large data leaks in the past may also  be redundant. Nevertheless, it is reassuring to see practices for  keeping information safe and the idea of positive informed consent being  reinforced for government departments. To be clear, the guidelines are  meant for government departments and private companies using Aadhaar for  authentication, profiling and building databases fall outside its  scope. With political attitudes to corporations exploiting personal  information changing the world over, the stakes for establishing a  framework that limits private companies commercializing personal data  and tracking Indian citizens are as high as they have ever been.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/electronic-frontier-foundation-jyoti-panday-june-1-2017-aadhaar-ushering-in-a-commercialized-era-of-surveillance-in-india'&gt;http://editors.cis-india.org/internet-governance/news/electronic-frontier-foundation-jyoti-panday-june-1-2017-aadhaar-ushering-in-a-commercialized-era-of-surveillance-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T12:45:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/economic-times-june-2-2017-nidhi-sharma-centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites">
    <title>Centre brings in new safeguards following cases of Aadhaar data leaks on government websites</title>
    <link>http://editors.cis-india.org/internet-governance/news/economic-times-june-2-2017-nidhi-sharma-centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites</link>
    <description>
        &lt;b&gt;The Centre has put in new safeguards following a number of cases of Aadhaar data leaks on government websites. All ministries are being asked to encrypt all Aadhaar data and personal financial details. Also, officials are being "sensitised" about legal consequences of data breach. And every government department is to now have one official responsible for Aadhaar data protection.
&lt;/b&gt;
        &lt;p&gt;The article by Nidhi Sharma was published in the &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/economy/policy/centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites/articleshow/58952785.cms"&gt;Economic Times&lt;/a&gt; on June 2, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The ministry of electronics and information technology has written to all departments on better data security. ET has reviewed the new guidelines. Aadhaar, a 12-digit unique identity number issued on the basis of biometric data, is linked to a person's bank account and used by government agencies to directly transfer benefits of several social welfare schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior officials, who spoke off record, told ET all departments have been asked to immediately review their website content to check if personal data is on display.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Untitled-4" src="http://economictimes.indiatimes.com/img/58952889/Master.jpg" title="Untitled-4" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A set of 27 dos and 9 don'ts has been circulated on data handling. This includes instructions on masking Aadhaar data and bank details as well as encrypting data. The government has mandated regular audits to check safety of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ministry letter says, "It has come to notice there have been instances wherein personal identity or information of residents, along with Aadhaar numbers and demographic information, and other sensitive personal data ... have been published online."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letter also spells out legal consequences of such data breach and warns the government departments to check future leaks. "Publishing identity information, i.e. Aadhaar number along with demographic information is in clear contravention of the provisions of the Aadhaar Act 2016 and constitutes an offence punishable with imprisonment up to 3 years. Further, publishing of financial information including bank details, being sensitive personal data, is also in contravention of provision under IT Act 2000 with violations liable to pay damages by way of compensation to persons affected."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move to protect personal data comes after reports that data of 130 million Aadhaar cardholders has been leaked from four government websites. Reports, based on a study conducted by the Centre for Internet and Society (CIS) said Aadhaar numbers and details have been leaked.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/economic-times-june-2-2017-nidhi-sharma-centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites'&gt;http://editors.cis-india.org/internet-governance/news/economic-times-june-2-2017-nidhi-sharma-centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-06T15:41:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/dna-may-28-2017-heena-khandelwal-tweets-from-the-afterlife">
    <title>Tweets from the afterlife</title>
    <link>http://editors.cis-india.org/internet-governance/news/dna-may-28-2017-heena-khandelwal-tweets-from-the-afterlife</link>
    <description>
        &lt;b&gt; What happens to the digital legacy that celebrities leave behind after they die. Heena Khandelwal asks if their families must inherit their digital assets or can social media managers stake a claim.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Heena Khandelwal was &lt;a class="external-link" href="http://www.dnaindia.com/lifestyle/report-tweets-from-the-afterlife-2453225"&gt;published by DNA&lt;/a&gt; on May 28, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Famous personalities and celebrities with millions of followers on  social media platforms enjoy the stature comparable to high-value  brands. Their Facebook posts, tweets and Instagram images not only have  the potential to influence society but often become fodder for news,  online discussions and even prime time debates. But have you paused to  wonder what happens to their social media accounts in the event of their  death? What becomes of the huge bank of online data that they leave  behind? Do these digital assets naturally pass onto the next of kin, to  the digital platform or to a third party that managed the said account/s  in the first place?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While these are not new questions, the tussle over the social media  accounts of former president late Dr APJ Abdul Kalam between his family  and Kalam's former aide who managed his social media affairs, has thrown  the issue under the spotlight. Nearly two years after Kalam's sudden  demise, his family and Srijan Pal Singh find themselves on the opposing  sides. It all started when Singh began handling Kalam's Twitter and  Facebook accounts after his death on July 27, 2015. When the family  sought the account details, stating their rights over Kalam's digital  assets, Singh changed the username and the handle of his verified  Twitter account from @apjabdulkalam to @KalamCentre. At the time of  Kalam's death, his verified Twitter account (@apjabdulkalam) had nearly  1.5 million followers and 886 tweets. When this was renamed to  @KalamCentre, it stopped being a 'verified' handle. Singh did not hand  over the details of this account to the family but the details of a new  Twitter account that he'd created with the same handle, @apjabdulkalam,  which had barely 50 followers. Incidentally, Kalam's original Twitter  account had 829 tweets (at the time of going to press), implying that  some of Kalam's tweets have been deleted since his death. Regarding  Kalam's Facebook page (Facebook.com/kalamcentre), Singh maintains that  its username has always been Kalam Centre and that it doesn't belong to  the family.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These are digital assets of a former President of India. He (Singh)  is changing the legacy by changing the name and handle of his Twitter  account," says Kalam's grandnephew APJMJ Sheik Dawood, insisting that  the account details should be given to the family. "Everybody was  following Kalam and not anything or anybody else. He shouldn't have  changed the name or handle."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Singh contends that since he was the one who created and managed  Kalam's social media presence, he has sole rights over these assets. "Dr  Kalam's social media accounts were started to spread the message about  his ideologies. I am here to continue his mission... whoever handles his  accounts should be in sync with his ideologies," says the 32-year-old.  "I practically lived with him in the same house in the last few years of  his life and was very close to him. I understood him."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Trust in times of tweets&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ask if his  actions tantamount to misleading Kalam's followers and the public at  large, Singh is dismissive. "On March 18, 2017, we informed our (Kalam  Centre) users of the name change through a tweet, and so it is up to  them to follow who they like. There are already plenty of fan pages and  other accounts running in his name," says Singh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even as he defends his position, the fact that he was using Kalam's  verified account for nearly 20 months after his demise can be seen as a  breach of the right of reputation. "Posting or tweeting on behalf of a  deceased person is breaching their right of reputation," says Chinmayi  Arun, executive director, Centre for Communication Governance (CCG) at  National Law University, Delhi. Third party agents, according to Arun,  should refrain from impersonating their principals in the same manner  that secretaries and administrators refrain from impersonating their  employers. "In case of an individual's demise, the agents are expected  to handover everything to the heirs and this should also apply to  digital accounts," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On its part, Twitter India refused to comment when contacted and  pointed this reporter to the site's support page on deceased or  incapacitated users. The micro-blogging site makes it clear on its  website that it does not provide account access to anyone regardless of  their relationship with the deceased person, and added that "this policy  is about deactivating accounts, not transferring ownership of  accounts".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Emails to Facebook India's corporate communication head remained  unanswered. The social networking site states on its pages that it  neither approves the inheritance of a user's account nor permits using  an account following a user's demise. Instagram lists a similar policy  and states that an account can be memoralised or removed after the  user's demise.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Black, white &amp;amp; grey&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While social  networking sites' policies clearly mention that an individual user  account should be operated by the person him/herself, it is common  knowledge that celebrities often outsource the management of their  social media accounts to digital and social media agencies or to a  select team under their direct watch. They too tread nebulous waters.  Digital marketing agency, EveryMedia Technologies, which manages  celebrity accounts, states that although there is no clause regarding  the protocol to be followed in the case of a client's death, they would  do as per the social platform's guidelines after due consent from the  family. "Our contracts do not have a clause that states the way forward  in case of demise of the account holder and we hope such a day doesn't  come," says Gautam B Thakker, CEO, EveryMedia Technologies. "In the  event of such an unfortunate incident, the standard operating procedure  would be to convert the account into a legacy account and memorialise it  for fans and well-wishers or to deactivate and close it — whatever the  social platforms' and the client's family permits."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Daksh Juneja says of Avignyata Inc specifies that the work is based  on strict contracts, which never mention the course of action to be  taken in case of the personality's death. "There is no contractual  obligation towards the IPR rights for a celebratory client on both sides  but it's important to share the access of the social media pages with  the person's manager or a family member," says Juneja, the chief  operating officer of the Mumbai-based digital agency, which handles  social media accounts of Bollywood celebrities and sportsmen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supreme Court advocate and an expert in cyber law, Pavan Duggal,  points out that the terms and conditions of social networking sites  aren't clear. "Deactivating accounts can amount to loss of data, which  can be used for reference and research. I think more clarity is  required," says Duggal. "When a person has an account, only he/she  should access it. However, if a person has an agent, then (in the case  of death), the principle of agent applies."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Courtside view&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Given the reluctance of  social media platforms to engage and the lack of clarity as highlighted  in the case of Kalam's accounts points to several questions — from  handing over the digital accounts, intellectual property rights, right  to reputation as well as unambiguous policies by service providers.  Taking about Kalam's accounts, Duggal feels his family is the rightful  legal heir to his digital assets. "The family should approach the court  and file a case against Singh under the Information Technology Act and  under IPC section 408 — criminal breach of trust," he says. "They can  also reach out to service providers, and if they don't co-operate, they  too can be sued under the IT Act."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Duggal strongly believes that "if a person has died without  specifying, then his/her digital presence or accounts being a digital  property, should be treated as movable assets and should pass on to the  legal heir or representatives of the deceased person rather than to an  NGO".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Sunil Abraham, executive director at Centre for  Internet and Society, Twitter India should help settle the Kalam case  using its existing policy. "And if there is no space for a legacy  contact, they might consider resetting the password so that nobody has  access to it and then they can memorialise the account," says Abraham.  "Social media accounts are increasingly being enumerated under digital  assets in wills. Once the asset has been transferred to the heir, the  heir can choose to transfer the account to another person or  organisation for their services in maintaining the account. While this  is not explicitly provided for in the law, there is no prohibition  either."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;WHEN THEY DIED...&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Among the eminent  personalities whose social media accounts continue to be operational  after their demise are anti-apartheid leader and former president of  South Africa Nelson Mandela, pop star Michael Jackson and boxing legend  Muhammad Ali.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Mandela's account has been turned into a foundation, Ali's  account states that it pays tribute to the boxing legend. Jackson's  account mentions nothing about the fact that he died in 2009. Their  Twitter and Facebook pages witness a tweet or a post every few days.  Both Jackson and Ali also have verified accounts on Instagram; their  photos are posted every now and then.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among the celebrities whose accounts have been left inactive are  Bollywood actress Jiah Khan, television actress Pratyusha Banerjee and  British singer-songwriter George Michael. While Khan's last tweet (on  May 23, 2013) was an apology message for staying away from the social  networking site, Michael had shared his song Heartbreak a day before  Valentine's Day on February 12, 2016. Banerjee had tweeted  '#prayforparis #prayfortheworld' on November 15, 2015, showing her  support against the terrorist attack in Paris on November 13, 2015. This  was her last tweet before she was found hanging in her apartment in  Mumbai on April 1, 2016.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/dna-may-28-2017-heena-khandelwal-tweets-from-the-afterlife'&gt;http://editors.cis-india.org/internet-governance/news/dna-may-28-2017-heena-khandelwal-tweets-from-the-afterlife&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-06-06T12:46:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/t20-germany-and-beyond-digital-economy">
    <title>T20 Germany and Beyond: Digital Economy</title>
    <link>http://editors.cis-india.org/internet-governance/news/t20-germany-and-beyond-digital-economy</link>
    <description>
        &lt;b&gt;Elonnai Hickok participated in a round-table discussion organized by GIZ and EPF in Berlin from May 29 to 30, 2017.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Think20 (T20) is a network of research institutes and think tanks from the G20 countries. The T20 provides research-based policy advice to the G20, facilitates interaction among its members and the policy community, and communicates with the broader public about issues of global importance. &lt;a class="external-link" href="http://www.t20germany.org/"&gt;Click to read more&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/t20-germany-and-beyond-digital-economy'&gt;http://editors.cis-india.org/internet-governance/news/t20-germany-and-beyond-digital-economy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-06T15:25:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/stockholm-internet-forum-2017">
    <title>Stockholm Internet Forum 2017</title>
    <link>http://editors.cis-india.org/internet-governance/news/stockholm-internet-forum-2017</link>
    <description>
        &lt;b&gt;Elonnai Hickok participated in the Stockholm Internet Forum 2017 held in Stockholm from May 15 to 18, 2017. She spoke on the panel "Private sector and civil society collaboration to advance freedom online". The event was organized by Swedish International Development Cooperation Agency. &lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Pre-SIF 15 May at Sida HQ&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;Welcoming and informal lunch at Sida 12.00 – 14.00 &lt;/b&gt;(Location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pre-SIF regional sessions: 14.00 – 17.00 (breaks included) &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/?page_id=3951&amp;amp;preview=true"&gt;&lt;b&gt;MENA:&lt;/b&gt; Access, power and gender&lt;/a&gt; (Location: Hörsalen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/?page_id=3955&amp;amp;preview=true"&gt;&lt;b&gt;AFRICA:&lt;/b&gt; Inequality and the digital revolution in Africa&lt;/a&gt; (Location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-regional-session-latin-america/"&gt;&lt;b&gt;LATIN AMERICA:&lt;/b&gt; Human rights and technology in Latin America: Where to from here?&lt;/a&gt; (Location: Room 19, Asante)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-regional-session-eurasia/"&gt;&lt;b&gt;EURASIA:&lt;/b&gt; Media freedom and fact checking practices&lt;/a&gt; (Location: Room 18, Djenné)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-regional-session-south-east-asia/"&gt;&lt;b&gt;SOUTH EAST ASIA&lt;/b&gt;: Regional internet freedom unconference&lt;/a&gt; (Location: Room 23, Quirigua)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/study-visit-kista-science-city/"&gt;&lt;b&gt;STUDY VISIT: &lt;/b&gt;Kista Science City&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle: 17.00 – 18.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Dinner: 18.00 – 20.00&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Pre-SIF 16 May at Sida HQ&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-welcome-and-framing-access-and-power/"&gt;Welcome and framing access and power&lt;/a&gt; 09.00 – 11.30 &lt;/b&gt;(break included, location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pre-SIF Parallel sessions: 11.30 – 13.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-parallel-session-1a/"&gt;&lt;b&gt;1A&lt;/b&gt; From divides to dividends – DDP and SDG17&lt;/a&gt; (Location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-parallel-session-1b/"&gt;&lt;b&gt;1B&lt;/b&gt; Online threats: Operational response and kick-ass solutions&lt;/a&gt; (Location: Hörsalen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle and lunch: 13.00 – 15.00 &lt;/b&gt;(Location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pre-SIF Parallel sessions: 15.00 – 17.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-parallel-session-2a/"&gt;&lt;b&gt;2A &lt;/b&gt;Financial services in a digital era: Development, livelihoods and privacy&lt;/a&gt; (Location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-parallel-session-2b/"&gt;&lt;b&gt;2B&lt;/b&gt; Responsible data forum: Open source investigation for human rights&lt;/a&gt; (Location: Hörsalen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle: 17.00 – 18.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Dinner: 18.00 – 20.00&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;SIF 17 May at Münchenbryggeriet&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/opening-and-main-session-1/"&gt;&lt;b&gt;Opening and main session 1: 9.00 – 11.00 &lt;/b&gt;&lt;/a&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;Welcoming remarks by Sida Director General &lt;b&gt;Lennart Båge&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Speech by Swedish Minister of Culture and Democracy &lt;b&gt;Alice Bah Kuhnke&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Main session 1: Equal access – Distributed power&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The theme of SIF 2017 is “Access and Power” – a duality that can be  analysed in many different ways. It is not enough to have access to the  Internet, ICT’s and digital tools to achieve social justice and  development outcomes. The question of what people have access to and  what possibilities access gives also needs to be addressed. Access to  the Internet is more than technical aspects and solutions – there are  also dimensions related to rights, policy and power that need to be  addressed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At SIF we are keen on framing the current struggles and challenges in  order to formulate possible ways ahead. One way to approach this is to  discuss the co-relation between access and power. The first main session  on the various aspects of access and power, is designed to get the  conversation started.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Speech by State Secretary Annika Söder 11.00 – 11.15 &lt;/b&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Coffee break 11.15 – 11.45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Parallel sessions: 11.45 – 13.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-1a/"&gt;&lt;b&gt;#SIF1A &lt;/b&gt;Digital Identity&lt;/a&gt; (Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-1b/"&gt;&lt;b&gt;#SIF1B &lt;/b&gt;Community access – Helping the last 4 billion get connected&lt;/a&gt; (Location: Fogelström)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-1c/"&gt;&lt;b&gt;#SIF1C &lt;/b&gt;Gender based violence online: levelling the discussion&lt;/a&gt; (Location: Riddarsalen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle and lunch: 13.00 – 14.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Parallel sessions: 14.00 – 15.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-2a-open-sif/"&gt;&lt;b&gt;#SIF2A &lt;/b&gt;OPEN SIF&lt;/a&gt; (Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-2b/"&gt;&lt;b&gt;#SIF2B&lt;/b&gt; The promises and risks of the platform economy&lt;/a&gt; (Location: Fogelström)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-2c/"&gt;&lt;b&gt;#SIF2C&lt;/b&gt; The global shut down epidemic – From rights, tech and economic perspective&lt;/a&gt; (Location: Riddarsalen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Coffee break 15.30 – 16.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Breakout sessions: 16.00 – 17.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/breakout-session-1b/"&gt;&lt;b&gt;#SIFB1&lt;/b&gt; The (alternative) truth is out there&lt;/a&gt; (Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/breakout-session-2/"&gt;&lt;b&gt;#SIFB2&lt;/b&gt; Private sector and civil society collaboration to advance freedom online&lt;/a&gt; (Location: Galleriet)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/breakout-session-3/"&gt;&lt;b&gt;#SIFB3&lt;/b&gt; Access and human rights in the smart city&lt;/a&gt; (Location: Riddarsalen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/breakout-session-4/"&gt;&lt;b&gt;#SIFB4&lt;/b&gt; Empowering technologies in hostile environments&lt;/a&gt; (Location: Milles)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/breakout-session-5/"&gt;&lt;b&gt;#SIFB5&lt;/b&gt; Freedom Online Coalition: Open forum&lt;/a&gt; (Location: Fogelström)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://www.stockholminternetforum.se/may-17th-reflections-and-highlights-from-the-day/"&gt;Reflections and highlights from the day&lt;/a&gt;: 17.45 – 18.45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle and Dinner: 19.00 – 21.00&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;SIF 18 May at Münchenbryggeriet&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://www.stockholminternetforum.se/may-18th-welcome-and-keynote/"&gt;Welcome and keynote&lt;/a&gt;: 09.00 – 09.30 &lt;/b&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Parallel sessions: 09.30 – 11.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-3a-open-sif/"&gt;&lt;b&gt;#SIF3A &lt;/b&gt;OPEN SIF&lt;/a&gt; (Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-3b/"&gt;&lt;b&gt;#SIF3B &lt;/b&gt;Digital rights 2.0: challenges and opportunities to empowerment&lt;/a&gt; (Location: Fogelström)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-3c/"&gt;&lt;b&gt;#SIF3C &lt;/b&gt;Safe media in conflict and chaos&lt;/a&gt; (Location: Riddarsalen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Coffee break: 11.00 – 11.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/main-session-2-2/"&gt;&lt;b&gt;Main session 2: 11.30 – 13.00 &lt;/b&gt;&lt;/a&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;A positive outlook: Leave no one offline&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Half of the world’s population — specifically women, the poor and  marginalised populations in developing countries — are still being left  offline. What is needed to reach those still offline?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond access, there are still many obstacles to achieving a digital  inclusive society. Access to the Internet, ICT’s and digital tools is  not only a catalyst for economic growth but increasingly a means for  people to participate in today’s society.  Too often access is measured  by number of subscribers. This session will address access and power  from a multidimensional approach – including infrastructure,  affordability and contextual factors such as regulation and social and  power structures.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle and lunch: 13.00 – 14.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/sif-may-18th-closing-session/"&gt;&lt;b&gt;Closing session: 14.00 – 15.00 &lt;/b&gt;&lt;/a&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This session will focus on summarizing knowledge and experiences  shared at SIF17 and mapping the road ahead – identifying constraints but  also opportunities for equal access and Internet freedom in the strive  for global development and a digital inclusive society. The closing  session will be interactive with the participants being the centre of  the discussion.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Side happenings &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;During breaks you will have the opportunity to develop your digital  skills, participate in discussions and expand your knowledge at this  year’s side happenings.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;16 May at Sida HQ&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;11.00 – 17.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/side-happening-new-media-documentation-clinic-with-witness/"&gt;New media documentation clinic with Witness&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;(Location: Room 19 Asante)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.00 – 17.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/side-happening-developing-internet-universality-indicators-with-unesco-and-the-apc-internet-indicators-consortium/"&gt;Developing Internet universality indicators with UNESCO and the APC Internet indicators consortium&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;(Location: Room 21 Tsodilo)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;14.30 – 17.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/side-happening-local-access-and-community-based-networks-with-apc-and-isoc/"&gt;Local access and community based networks with APC and ISOC&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;(Location: Djenné)&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;17 – 18 May at Münchenbryggeriet&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;All day&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/side-happening-digital-security-clinic-with-access-now/"&gt;Digital security clinic with Access Now&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;(Location: Mässtorget)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/side-happening-healing-justice-pod-with-astraea-foundation/"&gt;Healing justice pod with Astraea Foundation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;(Location: Bergrummet)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/stockholm-internet-forum-2017'&gt;http://editors.cis-india.org/internet-governance/news/stockholm-internet-forum-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-06T13:43:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/about/newsletters/may-2017-newsletter">
    <title>May 2017 Newsletter</title>
    <link>http://editors.cis-india.org/about/newsletters/may-2017-newsletter</link>
    <description>
        &lt;b&gt;Welcome to the Centre for Internet &amp; Society (CIS) newsletter for May 2017. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dear readers,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1"&gt;compiled a report that highlighted four government projects run by various government departments&lt;/a&gt; that have made sensitive personal financial information and Aadhaar numbers public on the project websites.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Article 19 had put out a call for applications for its Internet of Rights Fellowship in February 2017. Vidushi Marda was &lt;a class="external-link" href="http://cis-india.org/internet-governance/news/vidushi-marda-selected-for-internet-of-rights-fellowship"&gt;selected for Internet of Rights Fellowship&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="http://cis-india.org/accessibility/blog/comments-on-the-draft-policy-on-it-accessibility-for-people-with-disabilities"&gt;gave inputs on a document on implementing digital accessibility&lt;/a&gt; to Ministry of Electronics and Information Technology on May 2, 2017. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The 34th session of                   the Standing Committee on Copyright and Related Rights                   (SCCR) was held in Geneva from May 1 to 5, 2017. Anubha Sinha participated in the                     event and a summary report is available &lt;a href="http://cis-india.org/a2k/blogs/34th-sccr-a-summary-report"&gt;here&lt;/a&gt;.                   She made statements on behalf of                     CIS on the &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-cis-statement-on-the-discussion-on-limitations-and-exceptions-for-libraries-and-archives"&gt;Discussion on Limitations and                     Exceptions for Libraries and Archives&lt;/a&gt; and on the                   &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-cis-statement-on-the-proposal-for-analysis-of-copyright-related-to-the-digital-environment"&gt;Proposal for Analysis of                     Copyright Related to the Digital Environment&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS-A2K’s widely well-regarded flagship skill building program, Train The Trainer and MediaWiki Training was conducted in Kolkata earlier this year. Tito Dutta &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mini-ttt-and-mwt-held-in-kolkata"&gt;captured the developments in a blog post&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Although it has made the topographic maps or the Open Series Maps available to general public, Survey of India’s (SoI) Nakshe portal will have to go through a variety of litmus test, as the initiative fails to implement the mandates of public sharing of  government data using open standards and open license as put forward by  the NMP 2005 and NDSAP 2012, said Sumandro Chattapadhyay &lt;a class="external-link" href="http://cis-india.org/openness/survey-of-india-open-series-maps-fails-to-implement-public-sharing-of-govt-data"&gt;in an interview with Geospatial World&lt;/a&gt; on May 02, 2017.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In an interview with &lt;a class="external-link" href="https://nettime.org/Lists-Archives/nettime-l-1705/msg00001.html"&gt;nettime.org&lt;/a&gt;, Geert Lovink discussed with Ramesh Srinivasan Tech Anthropology Today and "&lt;a class="external-link" href="http://cis-india.org/raw/tech-anthropology-today-collaborate-rather-than-fetishize-from-afar"&gt;how can we embrace the realities of communities too-often relegated to the margins"&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In an article &lt;a class="external-link" href="http://cis-india.org/telecom/blog/business-standard-may-3-2017-shyam-ponappa-policies-to-sustain-indias-market"&gt;published in the Business Standard&lt;/a&gt; on May 3, 2017, Shyam Ponappa examined whether policies can be better framed to harness the market potential. Why is so much investment flowing into India's securities markets?&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CIS in the news:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-wire-may-1-2015-130-million-aadhaar-numbers-were-made-public-says-new-report"&gt;130 Million Aadhaar Numbers Were Made Public, Says New Report&lt;/a&gt; (The Wire; May 1, 2017 and MensXP.com; May 5, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/bloomberg-quint-may-2-2017-mahima-kapoor-aadhaar-details-of-people-available-on-govt-sites"&gt;Aadhaar Details Of 13.5 Crore People Available On Government Sites&lt;/a&gt; (Mahima Kapoor; Bloomberg Quint; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report"&gt;Aadhaar numbers of 135 mn may have leaked, claims CIS report&lt;/a&gt; (Press Trust of India; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hindustan-times-may-2-2017-details-of-135-million-aadhaar-card-holders-may-have-leaked-claims-cis-report"&gt;Details of 135 million Aadhaar card holders may have leaked, claims CIS report&lt;/a&gt; (Hindustan Times; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals"&gt;UIDAI remains silent on #Aadhaarleaks of 13 crore users through government portals&lt;/a&gt; (Shruti Menon; Newslaundry; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/amar-bazar-patrika-may-2-2017-13-crore-aadhaar-leaked-due-to-poor-security-in-4-govt-websites"&gt;১৩ কোটি আধার তথ্য ফাঁস চার সরকারি পোর্টাল থেকে! বিস্ফোরক দাবি রিপোর্টে&lt;/a&gt; (Amar Bazar Patrika; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/new-indian-express-may-2-2017-akram-mohammed-13-crore-aadhaar-numbers-on-four-government-websites-compromised"&gt;13 crore Aadhaar numbers on four government websites compromised: Report&lt;/a&gt; (Akram Mohammed; New Indian Express; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/dna-may-2-2017-report-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report"&gt;Aadhaar numbers of 135 mn may have leaked, claims CIS report&lt;/a&gt; (DNA; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people"&gt;Biggest blast on Aadhaar leak so far: govt sites leaked data of 13 crore people&lt;/a&gt; (Jikku Varghese Jacob; Manorama; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/scroll-may-2-2017-around-13-crore-aadhaar-numbers-easily-available-on-government-portals-says-report"&gt;Around 13 crore Aadhaar numbers easily available on government portals, says report&lt;/a&gt; (Scroll.in; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/one-india-may-2-2017-anusha-ravi-what-privacy-13-crore-aadhaar-numbers-accessible-on-governmental-portals"&gt;What privacy? 13 crore Aadhaar numbers accessible on government portals&lt;/a&gt; (Anusha Ravi; Oneindia; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/livemint-may-2-2017-komal-gupta-govt-may-have-made-135-million-aadhaar-numbers-public-cis-report"&gt;Govt may have made 135 million Aadhaar numbers public: CIS report&lt;/a&gt; (Komal Gupta; Livemint; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/times-of-india-may-5-2017-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report"&gt;Aadhaar numbers of 135 mn may have leaked, claims CIS report&lt;/a&gt; (The Times of India; May 2, 2017)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hindu-krishnadas-rajagopal-may-3-2017-aadhaar-data-leaks-not-from-uidai"&gt;Aadhaar data leaks not from UIDAI: Centre&lt;/a&gt; (Krishnadas Rajagopal; Hindu; May 3, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-register-richard-chirgwin-may-3-2017-135-million-indian-government-payment-card-details-leaked"&gt;135 MEELLION Indian government payment card details leaked&lt;/a&gt; (Richard Chirgwin; The Register; May 3, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/indian-express-may-3-2017-aadhaar-data-of-over-13-crore-people-exposed-new-report"&gt;Aadhaar data of over 13 crore people exposed: New report&lt;/a&gt; (Indian Express; May 3, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/india-times-bobin-abraham-may-3-2017-in-the-biggest-data-leak-info-of-13-crore-aadhaar-card-holders-has-been-compromised-and-is-available-online"&gt;In The Biggest Data Leak, Info Of 13 Crore Aadhaar Card Holders Has Been Compromised And Is Available Online&lt;/a&gt; (Bobins Abraham; The Times of India; May 3, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-4-2017-around-130-135-m-aadhaar-numbers-published-on-four-sites-alone"&gt;Around 130-135M Aadhaar Numbers published on 4 sites alone&lt;/a&gt; (Nikhil Pahwa; Medianama; May 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-rohith-jyothish-may-5-2017-aadhaar-the-largest-biometric-database-globally-but-it-is-leaky-by-design"&gt;Aadhaar's the largest biometric database globally but it is leaky by design&lt;/a&gt; (Rohith Jyotish; Global Voices; May 2, 2017 and Business Standard; May 5, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-news-minute-rakesh-mehar-may-4-2017-why-aadhaar-leaks-should-worry-you-and-is-biometrics-really-safe"&gt;Why Aadhaar leaks should worry you, and is biometrics really safe?&lt;/a&gt; (Rakesh Mehar; Newsminute; May 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/medianama-vivek-pai-may-4-2017-indian-govt-says-it-is-still-drafting-privacy-law"&gt;Indian Government says it is still drafting privacy law, but doesn’t give timelines&lt;/a&gt; (Vivek Pai; Medianama; May 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/aaj-tak-may-4-2017-135-million-aadhaar-number-leaked-by-govt-website-cis-report"&gt;आधार नंबर, नाम, पता, बैंक अकाउंट और दूसरी संवेदनशील जानकारियां लीक: CIS रिपोर्ट&lt;/a&gt; (Aaj Tak; May 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/ndtv-may-4-2017-manas-pratap-singh-government-knew-of-mega-aadhaar-leak-ministries-were-warned"&gt;With digitisation at the forefront, government departments need to be cautious about digital security&lt;/a&gt; (Manas Pratap Singh; NDTV; May 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/livemint-may-4-2017-aijaz-hussain-kashmir-telecom-firms-struggle-to-block-22-banned-social-media-sites"&gt;Kashmir: Telecom firms struggle to block 22 banned social media sites &lt;/a&gt;(Aijaz Hussain; Livemint; May 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/india-today-may-4-2017-aadhaar-data-of-130-millions-bank-account-details-leaked-from-govt-websites-report"&gt;Aadhaar data of 130 millions, bank account details leaked from govt websites: Report&lt;/a&gt; (India Today; May 4, 2017).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/bbc-news-soutik-biswas-may-4-2017-aadhaar-are-a-billion-identities-at-risk-on-indias-biometric-database"&gt;Aadhaar: Are a billion identities at risk on India's biometric database&lt;/a&gt; (Soutik Biswas; BBC News; May 4, 2017 and Rawlson King; Biometric Update.com; May 5, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/counterview-may-5-2017-135-million-aadhaar-details-100-million"&gt;135 million aadhaar details, 100 million bank accounts "leaked" from government websites: Researchers&lt;/a&gt; (Counterview; May 5, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-times-of-india-kim-arora-may-5-2017-suicide-videos-facebook-beefs-up-team-to-monitor-content"&gt;Suicide videos: Facebook beefs up team to monitor content&lt;/a&gt; (Kim Arora; The Times of India; May 5, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns"&gt;Aadhaar assurances fail to assuage privacy concerns&lt;/a&gt; (Anirban Sen; Livemint; May 5, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/newsminute-may-6-2017-a-13-year-olds-rape-in-tn-highlights-the-major-threat-online-sexual-grooming-poses-to-children"&gt;A 13-year-old's rape in TN highlights the major threat online sexual grooming poses to children&lt;/a&gt; (Priyanka Thirumurthy; May 6, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/new-indian-express-may-6-2017-experts-stress-on-need-for-enhanced-security"&gt;Experts stress on need for enhanced security&lt;/a&gt; (New Indian Express; May 6, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-wire-may-10-2017-shreyashi-roy-taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar"&gt;Taking Cognisance of the Deeply Flawed System That Is Aadhaar&lt;/a&gt; (Shreyashi Roy; Wire; May 10, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/deccan-herald-may-11-2017-plug-data-leak-before-imposing-aadhaar"&gt;Plug data leak before imposing Aadhaar&lt;/a&gt; (Deccan Herald; May 11, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-indian-express-may-11-2017-aadhaar-data-leak-take-precautions-while-sharing-info-on-websites-meity-tells-all-depts"&gt;Aadhaar data leak: Take precautions while sharing info on websites, MEITy tells all depts&lt;/a&gt; (Indian Express; May 11, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected"&gt;Aadhaar security: Here's how your private information can be protected&lt;/a&gt; (Sanjay Kumar Singh; Business Standard; May 11, 2017).&lt;/li&gt;
&lt;li&gt; &lt;a class="external-link" href="http://cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system"&gt;Online Trolls Attack Critics of India's Aadhaar State ID System&lt;/a&gt; (Rohith Jyothish; Global Voices; May 31, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/los-angeles-times-shashank-bengali-may-12-2017-india-is-building-a-biometric-database-for-1.3-billion-people-and-enrollment-is-mandatory"&gt;India is building a biometric database for 1.3 billion people — and enrollment is mandatory&lt;/a&gt; (Shashank Bengali; Los Angeles Times; May 12, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-may-13-2017-alnoor-peermohamed-and-raghu-krishnan-aadhaar-has-become-a-whipping-boy-nandan-nilekani"&gt;Watch: Aadhaar has become a whipping boy: Nandan Nilekani&lt;/a&gt; (Alnoor Peermohamed and Raghu Krishnan; Business Standard; May 13, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/x-conomy-benjamin-romano-may-16-2017-partnership-on-ai-adds-corporate-ngo-members-charts-initial-course"&gt;Partnership on AI Adds Corporate, NGO Members, Charts Initial Course&lt;/a&gt; (Benjamin Romano; Xconomy; May 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/newsminute-may-16-2017-soumya-chatterjee-wannacry-atms-not-to-shut-down-clarifies-rbi"&gt;WannaCry: ATMs not to shut down, clarifies RBI, but how safe are our machines?&lt;/a&gt; (Soumya Chatterjee; May 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/axios-may-16-2017-google-and-facebook-artificial-intelligence-group-adds-new-members"&gt;Google, Facebook's AI group adds new members&lt;/a&gt; (Jens Meyer; Axios; May 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/tech-republic-may-17-2017-22-companies-join-partnership-on-ai"&gt;22 companies join Partnership on AI, begin to study AI's impact on work and society&lt;/a&gt; (Alison DeNisco; TechRepublic; May 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/ciol-may-17-2017-intel-salesforce-ebay-sony-and-others-join-the-grand-ai-partnership-club"&gt;Intel, Salesforce, eBay, Sony and others join the grand AI partnership club&lt;/a&gt; (CIOL; May 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/new-indian-express-kiran-parashar-km-and-shruthi-hm-it-companies-in-bengaluru-on-high-alert-over-wannacry-ransomware"&gt;IT companies in Bengaluru on high alert over WannaCry ransomware&lt;/a&gt; (Kiran Parashar K M &amp;amp; Shruthi H M; New Indian Express; May 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/sd-times-may-17-partnership-on-ai-adds-new-organizations-to-its-network"&gt;Partnership on AI adds new organizations to its network&lt;/a&gt; (Madison Moore; Software Development Times; May 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/silicon-monica-tilves-may-17-2017-intel-ebay-sap-salesforce-sony-collaboration-aritificial-intelligence"&gt;Intel, eBay, SAP, Salesforce y Sony colaborarán en inteligencia artificial&lt;/a&gt; (Monica Tilves; Silicon; May 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/telecom-paper-may-17-2017-22-nieuwe-leden-voor-partnership-on-ai"&gt;22 nieuwe leden voor Partnership on AI &lt;/a&gt;(Telecom Paper; May 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-times-of-india-mahendra-singh-may-18-2017-provide-hacker-details-outfit-that-claimed-data-leak-told"&gt;Provide hacker details, outfit that claimed data leak told&lt;/a&gt; (Mahendra Singh; The Times of India; May 18, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/economic-times-may-18-2017-mahendra-singh-uidai-asks-centre-for-internet-and-society-to-provide-hacker-details"&gt;UIDAI asks Centre for Internet &amp;amp; Society to provide hacker details&lt;/a&gt; (Mahendra Singh; Economic Times; May 18, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-may-19-2017-hack-exposes-zomatos-weak-protection-of-customer-data-say-cyber-experts"&gt;Hack exposes Zomato's weak protection of customer data, say Cyber experts&lt;/a&gt; (Alnoor Peermohamed; Business Standard; May 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/bloomber-quint-may-19-2017-aayush-ailawadi-whats-hard-to-digest-about-the-zomato-hacking"&gt;What’s Hard To Digest About The Zomato Hacking&lt;/a&gt; (Aayush Ailawadi; Bloomberg Quint; May 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim"&gt;UIDAI puts posers to CIS over Aadhaar data leak claim&lt;/a&gt; (Press Trust of India and Financial Express; May 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hindustan-times-samarth-bansal-faking-it-on-whatsapp-how-india-s-favourite-messaging-app-turned-into-a-rumour-mill"&gt;Faking it on WhatsApp: How India's favourite messaging app is turning into a rumour mill&lt;/a&gt; (Samarth Bansal; Hindustan Times; May 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-wire-may-19-2017-ajoy-ashirwad-mahaprahasta-debate-over-aadhaar-turns-nasty-as-critics-accuse-supporters-of-online-trolling"&gt;Debate over #Aadhaar Turns Nasty as Critics Accuse Supporters of Online Trolling&lt;/a&gt; (Ajoy Ashirwad Mahaprahasta; The Wire; May 19, 2017).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-times-of-india-may-19-2017-kim-arora-and-digbijay-mishra-hacker-steals-17-million-zomato-users-data-briefly-puts-it-on-dark-web"&gt;Hacker steals 17 million Zomato users’ data, briefly puts it on dark web&lt;/a&gt; (Kim Arora and Digbijay Mishra with inputs from Ranjani Ayyar; The Times of India; May 19, 2017).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar"&gt;UIDAI goes after org that disclosed government departments were releasing Aadhaar data&lt;/a&gt; (Nikhil Pahwa; May 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hoyen-tv-may-20-2017-cirilo-laguardia-developer-releases-wanna-cry-key-recovery-tool-for-windows-xp"&gt;Developer releases WannaCry key-recovery tool for Windows XP&lt;/a&gt; (Cirilo Laguardia; Hoyen TV; May 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/scroll-may-20-2017-anumeha-yadav-will-aadhaar-leaks-be-used-as-an-excuse-to-shut-out-scrutiny-of-welfare-schemes"&gt;Will Aadhaar leaks be used as an excuse to shut out scrutiny of welfare schemes?&lt;/a&gt; (Anumeha Yadav; Scroll.in; May 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call"&gt;Microsoft says WannaCry ransomware must be a wake-up call for governments&lt;/a&gt; (Journaldu Maghreb; May 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack"&gt;Noida cyber cell gives tips on preventing WannaCry attack&lt;/a&gt; (Juana McKenzie; World News Journal; May 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack"&gt;Chinese state media says U.S. should take some blame for cyber attack&lt;/a&gt; (Ellis Neal; Villages Suntimes; May 21, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager"&gt;Zomato hack: You need to enhance online security with a password manager&lt;/a&gt; (Sanjay Kumar Singh; Business Standard; May 23, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/inc42-may-23-2017-shweta-modgil-sharad-sharma-aplogises-for-trolling-aadhaar-critics"&gt;Sharad Sharma Apologises for Trolling Aadhaar Critics; Unmasking Ispirit's Controversial Trolling Program&lt;/a&gt; (Shweta Modgil; Inc 42; May 23, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-times-of-india-may-24-2017-shalina-pillai-anand-j-ispirts-sharad-sharma-sorry-i-trolled-aadhaar-critics"&gt;iSpirt's Sharad Sharma: Sorry, I trolled Aadhaar critics&lt;/a&gt; (Shalina Pillai and Anand J; The Times of India; May 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/catch-news-may-25-2017-sharad-sharma-apos-case-shows-how-rampant-troll-culture-has-become-under-modi"&gt;Sharad Sharma's case shows how rampant troll culture has become under Modi&lt;/a&gt; (Catch News; May 25, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders"&gt;Aadhaar Card: One Identity, Multiple Disorders&lt;/a&gt; (Gaurav Raj; India Saga; May 25, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/dna-may-28-2017-heena-khandelwal-tweets-from-the-afterlife"&gt;Tweets from the afterlife&lt;/a&gt; (Heena Khandelwal; DNA; May 28, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/economic-times-may-29-2017-bharat-joshi-bbmp-faces-ire-for-publishing-pourakarmikas-aadhaar-details-on-website"&gt;BBMP faces ire for publishing pourakarmikas' Aadhaar details on website&lt;/a&gt; (Bharat Joshi; Economic Times; May 29, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;CIS members wrote the following articles&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-quint-amber-sinha-and-aradhya-sethia-may-1-2017-aadhaar-case-beyond-privacy-an-issue-of-bodily-integrity"&gt;Aadhaar Case: Beyond Privacy, An Issue of Bodily Integrity&lt;/a&gt; (Amber Sinha and Aradhya Sethia; Quint; May 1, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-may-14-2017-digital-native-free-speech-you-must-be-joking"&gt;Digital native: Free speech? You must be joking!&lt;/a&gt; (Nishant Shah; Indian Express; May 14, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-may-28-2017-digital-native-look-before-you-digitally-leap"&gt;Digital native: Look before you (digitally) leap&lt;/a&gt; (Nishant Shah; Indian Express; May 28, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility &amp;amp; Inclusion&lt;/a&gt; &lt;br /&gt; ------------------------------------- 	&lt;br /&gt; India has an estimated 70 million persons with disabilities who don't    have access to read printed materials due to some form of physical,    sensory, 	cognitive or other disability. As part of our endeavour to    make available accessible content for persons with disabilities, we are    developing a text-to-speech software in 15 languages with support from    the Hans Foundation. The progress made so far in the project can be    accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/comments-on-the-draft-policy-on-it-accessibility-for-people-with-disabilities"&gt;Comments on the draft Policy on IT Accessibility for People with Disabilities&lt;/a&gt; (Nirmita Narasimhan; May 19, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;-----------------------------------&lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt;Our    Access to Knowledge programme currently consists of two projects. The    Pervasive Technologies project, conducted under a grant from the    International Development Research Centre (IDRC), aims to conduct    research on the complex interplay between low-cost pervasive    technologies and intellectual property, in order to encourage the    proliferation and development of such technologies as a social good. The    Wikipedia project, which is under a 	grant from the Wikimedia    Foundation, is for the growth of Indic language communities and projects    by designing community collaborations and partnerships 	that recruit    and cultivate new editors and explore innovative approaches to  building   projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Copyright&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-a-summary-report"&gt;34th SCCR: A Summary Report&lt;/a&gt; (Anubha Sinha; May 15, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-cis-statement-on-the-proposal-for-analysis-of-copyright-related-to-the-digital-environment"&gt;34th SCCR: CIS Statement on the Proposal for Analysis of Copyright Related to the Digital Environment&lt;/a&gt; (Anubha Sinha; May 15, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-cis-statement-on-the-discussion-on-limitations-and-exceptions-for-libraries-and-archives"&gt;34th SCCR: CIS Statement on the Discussion on Limitations and Exceptions for Libraries and Archives&lt;/a&gt; (Anubha Sinha; May 15, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-observer-statements-on-proposal-for-analysis-of-copyright-related-to-the-digital-environment"&gt;34th SCCR: Observer Statements on Proposal for Analysis of Copyright related to the Digital Environment&lt;/a&gt; (Anubha Sinha; May 30, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-observer-statements-on-limitations-and-exceptions-for-educational-and-research-institutions-and-persons-with-other-disabilities"&gt;34th SCCR: Observer Statements on Limitations and Exceptions for Educational and Research Institutions&lt;/a&gt; (Anubha Sinha; May 30, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-observer-statements-on-limitations-and-exceptions-for-libraries-and-archives"&gt;34th SCCR: Observer Statements on Limitations and Exceptions for Libraries and Archives&lt;/a&gt; (Anubha Sinha; May 30, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/fixing-copyright-for-education-sccr34-side-event"&gt;Fixing Copyright for Education&lt;/a&gt; (SCCR34 Side Event) (Hosted by Communia, EIFL, Creative Commons, and PIJIP; May 5, 2017). Anubha Sinha was a speaker. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by    organizing more than 100 outreach events and catalysed the release of    encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0)    license in four Indian languages (21 books in Telugu, 13 in Odia, 4    volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book    on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/wiki-loves-mayabazaar"&gt;Wiki Loves Mayabazaar&lt;/a&gt; (Pavan Santhosh; May 1, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/marathi-wikipedia-symposium-at-gokhale-institute-of-politics-economics"&gt;Marathi Wikipedia Symposium at Gokhale Institute Of Politics &amp;amp; Economics&lt;/a&gt; (Subodh Kulkarni; May 1, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/digitisation-wikimedia-commons-and-wikisource-orientation-workshop-at-vigyan-ashram-pabal-pune-district"&gt;Digitisation, Wikimedia Commons and Wikisource Orientation Workshop at Vigyan Ashram, Pabal, Pune District&lt;/a&gt; (Subodh Kulkarni; May 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/thematic-edit-a-thon-at-j-p-naik-centre-for-education-development-pune"&gt;Thematic Edit-a-thon at J.P.Naik Centre for Education &amp;amp; Development, Pune&lt;/a&gt; (Subodh Kulkarni; May 10, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/train-the-trainer-2017"&gt;Train The Trainer 2017&lt;/a&gt; (Manasa Rao; May 10, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/continuing-community-engagement-communities-of-interest-and-quarrying"&gt;Continuing community engagement: Communities of interest and Quarrying&lt;/a&gt; (Manasa Rao; May 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/preliminary-research-result-on-wikipedia-gender-gap-in-india"&gt;Preliminary research result on Wikipedia gender gap in India&lt;/a&gt; (Ting-Yi Chang; May 22, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mediawiki-training-2017"&gt;MediaWiki Training 2017&lt;/a&gt; (Tito Dutta and Ananth Subray; May 23, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mini-ttt-and-mwt-held-in-kolkata"&gt;Mini TTT and MWT held in Kolkata&lt;/a&gt; (Tito Dutta; May 23, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Note: The workshops for the above blog posts were held earlier but the reports were published during the month of May&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;►Openness&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Our  work in the Openness programme   focuses on open data, especially open  government data, open access,  open  education resources, open knowledge  in Indic languages, open  media, and  open technologies and standards -  hardware and software. We  approach  openness as a cross-cutting  principle for knowledge  production and  distribution, and not as a  thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/survey-of-india-open-series-maps-fails-to-implement-public-sharing-of-govt-data"&gt;SoI’s Open Series Maps Fails to Implement Public Sharing of Govt Data&lt;/a&gt; (Geospatial World; May 4, 2017). Sumandro Chattapadhyay was interviewed.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;b&gt;----------------------------------- &lt;/b&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;b&gt; -----------------------------------&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As  part of its research on privacy and   free speech, CIS is engaged with  two different projects. The first  one  (under a grant from Privacy  International and IDRC) is on  surveillance  and freedom of expression  (SAFEGUARDS). The second one  (under a grant  from MacArthur Foundation)  is on restrictions that the  Indian government  has placed on freedom of  expression online.&lt;/p&gt;
&lt;p&gt;►Freedom of Speech and Expression&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/comments-from-the-centre-for-internet-and-society-on-renewal-of-net-registry-agreement"&gt;Comments from the Centre for Internet and Society on Renewal of .NET Registry Agreement&lt;/a&gt; (Vidushi Marda with inputs from Pranesh Prakash and Sunil Abraham; May 31, 2017). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/events/communication-design-and-visualising-information"&gt;Communication Design and Visualising Information&lt;/a&gt; (CIS, Bengaluru; May 5, 2017). Saumyaa conducted a session on the broad principles of communication design and visualising information. &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/world-press-freedom-day-2017"&gt;World Press Freedom Day 2017&lt;/a&gt; (UNESCO and the Digital Empowerment Foundation; New Delhi; May 3, 2017). Udbhav Tiwari participated in the event.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/consilience-2017-a-conference-on-artificial-intelligence-law"&gt;Consilience 2017 - A Conference on Artificial Intelligence &amp;amp; Law&lt;/a&gt; (Organized by National Law School of India University; May 20, 2017). Vidushi Marda was a panelist.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;►Privacy&lt;/p&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;a class="external-link" href="http://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report"&gt;Comments on the Statistical Disclosure Control Report&lt;/a&gt; (Srinivs Kodali and Amber Sinha; May 2, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1"&gt;(Updated) Information Security Practices of Aadhaar (or lack thereof): A documentation of public availability of Aadhaar Numbers with sensitive personal financial information&lt;/a&gt; (Amber Sinha and Srinivas Kodali; May 1, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Events Organized&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/events/firstfridayatcis-amutha-arunachalam-stand-shielded-of-digital-rights-may-05"&gt;Stand Shielded of Digital Rights&lt;/a&gt; (CIS; New Delhi; May 5, 2017). Amutha Arunachalam gave a talk.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/events/meeting-on-proactive-disclosure-and-personal-data-delhi-may-13"&gt;Meeting on Proactive Disclosure and Personal Data&lt;/a&gt; (CIS; New Delhi; May 13, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/4th-national-standards-conclave-evolving-a-comprehensive-national-strategy-for-standards-sectoral-and-regional-inclusiveness"&gt;4th National Standards Conclave Evolving a Comprehensive National Strategy for Standards Sectoral and Regional Inclusiveness&lt;/a&gt; (Organized by Ministry of Commerce and Industry and the Confederation of Indian Industry; May 1 - 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/stockholm-internet-forum-2017"&gt;Stockholm Internet Forum 2017&lt;/a&gt; (Organized by Swedish International Development Cooperation Agency; Stockholm; May 15 to 18, 2017). Elonnai Hickok was a panelist in the session, "Private sector and civil society collaboration to advance freedom online".&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/open-house-on-information-breaches"&gt;Open house on information breaches&lt;/a&gt; (Organized by Has Geek; Bengaluru; May 26, 2017). Udbhav Tiwari was a speaker.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/t20-germany-and-beyond-digital-economy"&gt;T20 Germany and Beyond: Digital Economy&lt;/a&gt; (Organized by GIZ and EPF; May 29 - 30, 2017). Elonnai Hickok participated in a round-table discussion.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;-----------------------------------&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt; -----------------------------------&lt;b&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt; &lt;/b&gt;CIS is involved in promoting access and accessibility to   telecommunications services and resources, and has provided inputs to   ongoing policy discussions 	and consultation papers published by TRAI.   It has prepared reports on unlicensed spectrum and accessibility of   mobile phones for persons with disabilities 	and also works with the   USOF to include funding projects for persons with disabilities in its   mandate:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/telecom/blog/business-standard-may-3-2017-shyam-ponappa-policies-to-sustain-indias-market"&gt;Policies to Sustain India's Market&lt;/a&gt; (Shyam Ponappa; Business Standard; May 3, 2017 and Organizing India Blogspot; May 4, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;-----------------------------------&lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary    research initiative driven by an emerging need to understand the    reconfigurations of 	social practices and structures through the    Internet and digital media technologies, and vice versa. It aims to    produce local and contextual 	accounts of interactions, negotiations,    and resolutions between the Internet, and socio-material and    geo-political processes:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/tech-anthropology-today-collaborate-rather-than-fetishize-from-afar"&gt;Tech Anthropology Today: Collaborate, Rather than Fetishize from Afar&lt;/a&gt; (Geert Lovink and Ramesh Srinivasan; nettime.org; May 16, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/consultative-meeting-for-a-digital-archive-lab"&gt;Consultative Meeting for a Digital Archive Lab&lt;/a&gt; (Organized by Ambedkar University, New Delhi; May 20, 2017). P.P. Sneha participated in the meeting.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation    that undertakes interdisciplinary research on internet and digital    technologies from 	policy and academic perspectives. The areas of focus    include digital accessibility for persons with disabilities,  access   to knowledge, intellectual 	property rights, openness (including  open   data, free and open source software, open standards, open access,  open   educational resources, and open video), 	internet governance,    telecommunication reform, digital privacy, and cyber-security. The    academic research at CIS seeks to understand the reconfigurations 	of    social and cultural processes and structures as mediated through the    internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div style="text-align: justify; "&gt;Please  help us defend consumer and   citizen rights on the Internet! Write a  cheque in favour of 'The Centre   for Internet and Society' and mail it  to us at No. 	194, 2nd 'C'  Cross,  Domlur, 2nd Stage, Bengaluru - 5600  71.&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;We  invite researchers, practitioners,   artists, and theoreticians, both  organisationally and as individuals,  to  engage with us on topics  related internet 	and society, and improve  our  collective understanding  of this field. To discuss such  possibilities,  please write to Sunil  Abraham, Executive Director, at 	  sunil@cis-india.org (for policy  research), or Sumandro Chattapadhyay,   Research Director, at  sumandro@cis-india.org (for academic research),   with an 	indication of  the form and the content of the collaboration  you  might be interested  in. To discuss collaborations on Indic  language  Wikipedia projects, 	 write to Tanveer Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;i&gt;CIS  is grateful to its primary   donor the Kusuma Trust founded by Anurag  Dikshit and Soma Pujari,   philanthropists of Indian origin for its core  funding and 	support for   most of its projects. CIS is also grateful to  its other donors,   Wikimedia Foundation, Ford Foundation, Privacy  International, UK, Hans  	 Foundation, MacArthur Foundation, and IDRC for  funding its various   projects&lt;/i&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/about/newsletters/may-2017-newsletter'&gt;http://editors.cis-india.org/about/newsletters/may-2017-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2017-06-17T02:46:03Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system">
    <title>Online Trolls Attack Critics of India's Aadhaar State ID System </title>
    <link>http://editors.cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system</link>
    <description>
        &lt;b&gt;India's biometric state ID system has been leaking citizens’ data for months. When this information surfaced in April 2017, it stoked fears that the system could be used as an instrument of surveillance against Indian residents.&lt;/b&gt;
        &lt;p&gt;The blog post by Rohith Jyothish was &lt;a class="external-link" href="https://advox.globalvoices.org/2017/05/31/online-trolls-attack-critics-of-indias-aadhaar-state-id-system/"&gt;published by Global Voices&lt;/a&gt; on May 31, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://uidai.gov.in/about-uidai/about-uidai.html"&gt;Unique Identity Authority of India (UIDAI)&lt;/a&gt;, which administrates the system known as &lt;a href="https://en.wikipedia.org/wiki/Aadhaar"&gt;Aadhaar&lt;/a&gt; (meaning foundation in Hindi) &lt;a href="http://indianexpress.com/article/opinion/columns/criticism-without-aadhaar-4653369/v"&gt;maintains&lt;/a&gt; that it only collects minimal personal data and stores it securely. But critics have firmly expressed &lt;a href="https://advox.globalvoices.org/2017/05/05/is-indias-aadhaar-system-an-instrument-for-surveillance/"&gt;doubts&lt;/a&gt; about these claims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The implications of these leaks, and of any system flaw in Aadhaar  technology, are substantial, especially for Indians who depend on the  Aadhaar system in order to authenticate their identities when they use  any number of government services. The Aadhaar system has become the &lt;a href="https://globalvoices.org/2017/05/02/the-worlds-largest-biometric-database-is-leaking-indian-citizens-data-but-keeps-on-growing/"&gt;gatekeeper of state systems&lt;/a&gt; and services ranging from voting to financial savings to food subsidies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The digital sphere is now starting to see a pushback against Aadhaar  critics through articles and blogposts that describe concerned citizens  and privacy experts as the ‘&lt;a href="https://yourstory.com/2017/05/5-questions-for-the-anti-aadhaar-brigade/"&gt;anti-Aadhaar brigade&lt;/a&gt;‘ and &lt;a href="https://yourstory.com/2017/05/aadhaar-debate-5-more-questions-for-critics/"&gt;accuse them&lt;/a&gt; of publishing “half-truths” and “spread[ing] confusion to advance their own interests.” One such &lt;a href="https://uidai.gov.in/images/news/5_questions_for_the_anti_Aadhaar_brigade_08052017.pdf"&gt;article&lt;/a&gt; was even featured on the UIDAI website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the most &lt;a href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1"&gt;well-researched critiques&lt;/a&gt; of the system have come from the &lt;a href="http://cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt; (CIS), an inter-disciplinary research organisation in Bangalore that  has now become a target of the pro-Aadhaar lobby. Shortly after CIS  released a report that pointed out security flaws in the Aadhaar  ecosystem, the UIDAI &lt;a href="http://timesofindia.indiatimes.com/india/provide-hacker-details-outfit-that-claimed-data-leak-told/articleshow/58725132.cms"&gt;accused&lt;/a&gt; the organization of hacking into the Aadhaar system themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, CIS had investigated databases of four specific government websites. Three were available publicly, the fourth one was &lt;a href="https://thewire.in/131698/before-aadhaar-pan-card-verdict-debate-over-bodily-autonomy-and-living-a-dignified-life/"&gt;accessible&lt;/a&gt; by simply changing one of the URL parameters. Following the accusation from UIDAI, CIS &lt;a href="http://tech.firstpost.com/news-analysis/uidais-questioning-of-cis-over-aadhaar-leaks-brings-the-sanctity-of-investigative-activities-into-question-377244.html"&gt;clarified&lt;/a&gt; that  the Aadhaar numbers along with other sensitive personal financial  information like bank account details were made available by government  websites themselves, putting a sizeable portion of Indian citizens at  risk of financial fraud.&lt;/p&gt;
&lt;p&gt;The &lt;a href="https://en.wikipedia.org/wiki/Press_Trust_of_India"&gt;Press Trust of India&lt;/a&gt; (India's largest news agency) &lt;a href="http://www.thehindubusinessline.com/news/national/unique-identification-authority-of-india-puts-posers-to-centre-for-internet-and-society-over-aadhaar-data-leak-claim/article9707647.ece"&gt;referred&lt;/a&gt; to it as a “flip-flop”, which was contested by researchers at CIS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Independent technology news platform Medianama &lt;a href="http://www.medianama.com/2017/05/223-uidai-cis-india-aadhaar/"&gt;reported&lt;/a&gt; that the accusation by the UIDAI is regrettably consistent with  previous actions in which they filed a case against a journalist for&lt;a href="http://www.medianama.com/2017/03/223-uidai-fir-aadhaar/" rel="bookmark" title="UIDAI files FIR against journalist for exposing flaws in Aadhaar enrolment"&gt; exposing flaws&lt;/a&gt; in Aadhaar's enrollment mechanism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A website called ‘&lt;a href="http://supportaadhaar.com/"&gt;Support Aadhaar&lt;/a&gt;‘ and its &lt;a href="https://twitter.com/SupportAadhaar"&gt;Twitter handle&lt;/a&gt; sought to collate opinions supporting Aadhaar and quell those speaking against it. However, most of their &lt;a href="http://supportaadhaar.com/facts-myths/"&gt;messages&lt;/a&gt; appear  to evade or deflect the concerns that critics have raised by touting  the benefits of the system and portraying critics as having a poor  understanding of the benefits of technology.&lt;/p&gt;
&lt;p&gt;Many Twitter users have also begun noticing patterns in the pro-Aadhaar posts:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, several critics of Aadhaar have repeatedly been trolled by anonymous handles on Twitter. These ‘sock puppet’ accounts seemed to be targeting those who criticise Aadhaar on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the most active trolls issued an open challenge to reveal their identity with just their Aadhaar number. Technology entrepreneur Kiran Jonnalagadda accepted the challenge and &lt;a href="https://medium.com/@jackerhack/inside-the-mind-of-indias-chief-tech-stack-evangelist-ca01e7a507a9"&gt;found that&lt;/a&gt; ‘@Confident_India’, one of the many anonymous troll Twitter handles, is Sharad Sharma, the co-founder and director of &lt;a href="http://ispirt.in/"&gt;iSPIRT Foundation&lt;/a&gt; (Indian Software Product Industry Roundtable), the software lobby that built the backbone of the Aadhaar ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sharma accidentally tweeted a denial from the troll account which has  since been deleted. He then tweeted again from his personal handle which  was captured.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iSPIRT &lt;a href="https://medium.com/@mtrajan/ispirt-response-to-kiran-jonnalagadda-3f977fb91df4"&gt;officially denied&lt;/a&gt; allegations  by Jonnalgadda that the “evidence presented is a deliberate misreading  of our intent to engage with those speaking against &lt;a href="https://en.wikipedia.org/wiki/India_Stack"&gt;India Stack&lt;/a&gt;.” India Stack is the digital infrastructure that has been built over Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But several other Twitter users have confirmed that Sharma's phone number is linked to ‘@Confident_India’. By their own admission, iSPIRT seemed to have an &lt;a href="https://thewire.in/137371/aadhaar-ispirt-trolling-sharad-sharma/"&gt;officially sanctioned project&lt;/a&gt; intended  to systematically challenge anti-Aadhaar campaigners in online  platforms. But they refuse to term these actions as “trolling”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Sharma later &lt;a href="https://thewire.in/139188/sharad-sharma-aadhaar-trolling/"&gt;made an apology for trolling&lt;/a&gt; and called it a “lapse of judgement”. CIS Executive Director Sunil Abraham seemed to appreciate the message. He tweeted: Bravo to &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/sharads"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;sharads&lt;/span&gt;&lt;/a&gt; for this! All of us at &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/cis_india"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;cis_india&lt;/span&gt;&lt;/a&gt; look fwd to collaborating with &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/Product_Nation"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;Product_Nation&lt;/span&gt;&lt;/a&gt; &amp;amp; &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/sharads"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;sharads&lt;/span&gt;&lt;/a&gt; to serve Indian s/w sector. &lt;a class="customisable link" dir="ltr" href="https://t.co/TEz0fxnloo" rel="nofollow noopener" target="_blank" title="https://twitter.com/sharads/status/866943195678035968"&gt;&lt;span class="u-hiddenVisually"&gt;https://&lt;/span&gt;twitter.com/sharads/status&lt;span class="u-hiddenVisually"&gt;/866943195678035968 &lt;/span&gt;…&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iSPIRT is an initiative which finds far-reaching support from several IT  industry leaders in India. What is worrying is that there is still no  clarification from iSPIRT on the identities of the other anonymous  trolls and their position on trolling against genuine concerns raised by  citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than a week after the trolling revelations, iSPIRT announced on its website, the results of an investigation carried out by an Internal Guidelines and Compliance Committee over the allegations against Sharma of operating the anonymous handles, ‘@Confident_India’ and ‘@Indiaforward2′. Jonnalgadda was one of the trolling victims who testified in the internal meeting. A summary of the investigation was posted bafflingly by the accused himself in which he says that project Sudham has been dissolved and that he has been told to not make public appearances on behalf of iSPIRT for four months while he remains Director and the face of the organisation. FactorDaily reported that iSPIRT members on the condition of anonymity said that Pallav Nadhani (Founder, Chief Executive, FusionCharts) and Naveen Tewari (Co-founder, InMobi) who quit iSPIRT were upset with their excessive focus on India Stack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One wonders whether this kind of behavior would be treated differently if it took place offline. Is intimidating those who appear to be ‘detractors’ the most effective way of dealing with criticism? Why is a software lobby taking it upon themselves to defend the idea of Aadhaar and India Stack through such means?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many are hoping that experts on both sides of the issue can find a way to debate questions around the privacy and security of Aadhaar's technology — that affect some 1.3 billion people — in a more democratic way.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system'&gt;http://editors.cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T13:34:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
