<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 91 to 105.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/dna-may-28-2017-heena-khandelwal-tweets-from-the-afterlife"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/t20-germany-and-beyond-digital-economy"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/stockholm-internet-forum-2017"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/about/newsletters/may-2017-newsletter"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/news/fixing-copyright-for-education-sccr34-side-event"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/economic-times-may-29-2017-bharat-joshi-bbmp-faces-ire-for-publishing-pourakarmikas-aadhaar-details-on-website"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/inc42-may-23-2017-shweta-modgil-sharad-sharma-aplogises-for-trolling-aadhaar-critics"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/open-house-on-information-breaches"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-times-of-india-may-24-2017-shalina-pillai-anand-j-ispirts-sharad-sharma-sorry-i-trolled-aadhaar-critics"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/catch-news-may-25-2017-sharad-sharma-apos-case-shows-how-rampant-troll-culture-has-become-under-modi"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/dna-may-28-2017-heena-khandelwal-tweets-from-the-afterlife">
    <title>Tweets from the afterlife</title>
    <link>http://editors.cis-india.org/internet-governance/news/dna-may-28-2017-heena-khandelwal-tweets-from-the-afterlife</link>
    <description>
        &lt;b&gt; What happens to the digital legacy that celebrities leave behind after they die. Heena Khandelwal asks if their families must inherit their digital assets or can social media managers stake a claim.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Heena Khandelwal was &lt;a class="external-link" href="http://www.dnaindia.com/lifestyle/report-tweets-from-the-afterlife-2453225"&gt;published by DNA&lt;/a&gt; on May 28, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Famous personalities and celebrities with millions of followers on  social media platforms enjoy the stature comparable to high-value  brands. Their Facebook posts, tweets and Instagram images not only have  the potential to influence society but often become fodder for news,  online discussions and even prime time debates. But have you paused to  wonder what happens to their social media accounts in the event of their  death? What becomes of the huge bank of online data that they leave  behind? Do these digital assets naturally pass onto the next of kin, to  the digital platform or to a third party that managed the said account/s  in the first place?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While these are not new questions, the tussle over the social media  accounts of former president late Dr APJ Abdul Kalam between his family  and Kalam's former aide who managed his social media affairs, has thrown  the issue under the spotlight. Nearly two years after Kalam's sudden  demise, his family and Srijan Pal Singh find themselves on the opposing  sides. It all started when Singh began handling Kalam's Twitter and  Facebook accounts after his death on July 27, 2015. When the family  sought the account details, stating their rights over Kalam's digital  assets, Singh changed the username and the handle of his verified  Twitter account from @apjabdulkalam to @KalamCentre. At the time of  Kalam's death, his verified Twitter account (@apjabdulkalam) had nearly  1.5 million followers and 886 tweets. When this was renamed to  @KalamCentre, it stopped being a 'verified' handle. Singh did not hand  over the details of this account to the family but the details of a new  Twitter account that he'd created with the same handle, @apjabdulkalam,  which had barely 50 followers. Incidentally, Kalam's original Twitter  account had 829 tweets (at the time of going to press), implying that  some of Kalam's tweets have been deleted since his death. Regarding  Kalam's Facebook page (Facebook.com/kalamcentre), Singh maintains that  its username has always been Kalam Centre and that it doesn't belong to  the family.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These are digital assets of a former President of India. He (Singh)  is changing the legacy by changing the name and handle of his Twitter  account," says Kalam's grandnephew APJMJ Sheik Dawood, insisting that  the account details should be given to the family. "Everybody was  following Kalam and not anything or anybody else. He shouldn't have  changed the name or handle."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Singh contends that since he was the one who created and managed  Kalam's social media presence, he has sole rights over these assets. "Dr  Kalam's social media accounts were started to spread the message about  his ideologies. I am here to continue his mission... whoever handles his  accounts should be in sync with his ideologies," says the 32-year-old.  "I practically lived with him in the same house in the last few years of  his life and was very close to him. I understood him."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Trust in times of tweets&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ask if his  actions tantamount to misleading Kalam's followers and the public at  large, Singh is dismissive. "On March 18, 2017, we informed our (Kalam  Centre) users of the name change through a tweet, and so it is up to  them to follow who they like. There are already plenty of fan pages and  other accounts running in his name," says Singh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even as he defends his position, the fact that he was using Kalam's  verified account for nearly 20 months after his demise can be seen as a  breach of the right of reputation. "Posting or tweeting on behalf of a  deceased person is breaching their right of reputation," says Chinmayi  Arun, executive director, Centre for Communication Governance (CCG) at  National Law University, Delhi. Third party agents, according to Arun,  should refrain from impersonating their principals in the same manner  that secretaries and administrators refrain from impersonating their  employers. "In case of an individual's demise, the agents are expected  to handover everything to the heirs and this should also apply to  digital accounts," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On its part, Twitter India refused to comment when contacted and  pointed this reporter to the site's support page on deceased or  incapacitated users. The micro-blogging site makes it clear on its  website that it does not provide account access to anyone regardless of  their relationship with the deceased person, and added that "this policy  is about deactivating accounts, not transferring ownership of  accounts".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Emails to Facebook India's corporate communication head remained  unanswered. The social networking site states on its pages that it  neither approves the inheritance of a user's account nor permits using  an account following a user's demise. Instagram lists a similar policy  and states that an account can be memoralised or removed after the  user's demise.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Black, white &amp;amp; grey&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While social  networking sites' policies clearly mention that an individual user  account should be operated by the person him/herself, it is common  knowledge that celebrities often outsource the management of their  social media accounts to digital and social media agencies or to a  select team under their direct watch. They too tread nebulous waters.  Digital marketing agency, EveryMedia Technologies, which manages  celebrity accounts, states that although there is no clause regarding  the protocol to be followed in the case of a client's death, they would  do as per the social platform's guidelines after due consent from the  family. "Our contracts do not have a clause that states the way forward  in case of demise of the account holder and we hope such a day doesn't  come," says Gautam B Thakker, CEO, EveryMedia Technologies. "In the  event of such an unfortunate incident, the standard operating procedure  would be to convert the account into a legacy account and memorialise it  for fans and well-wishers or to deactivate and close it — whatever the  social platforms' and the client's family permits."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Daksh Juneja says of Avignyata Inc specifies that the work is based  on strict contracts, which never mention the course of action to be  taken in case of the personality's death. "There is no contractual  obligation towards the IPR rights for a celebratory client on both sides  but it's important to share the access of the social media pages with  the person's manager or a family member," says Juneja, the chief  operating officer of the Mumbai-based digital agency, which handles  social media accounts of Bollywood celebrities and sportsmen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supreme Court advocate and an expert in cyber law, Pavan Duggal,  points out that the terms and conditions of social networking sites  aren't clear. "Deactivating accounts can amount to loss of data, which  can be used for reference and research. I think more clarity is  required," says Duggal. "When a person has an account, only he/she  should access it. However, if a person has an agent, then (in the case  of death), the principle of agent applies."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Courtside view&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Given the reluctance of  social media platforms to engage and the lack of clarity as highlighted  in the case of Kalam's accounts points to several questions — from  handing over the digital accounts, intellectual property rights, right  to reputation as well as unambiguous policies by service providers.  Taking about Kalam's accounts, Duggal feels his family is the rightful  legal heir to his digital assets. "The family should approach the court  and file a case against Singh under the Information Technology Act and  under IPC section 408 — criminal breach of trust," he says. "They can  also reach out to service providers, and if they don't co-operate, they  too can be sued under the IT Act."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Duggal strongly believes that "if a person has died without  specifying, then his/her digital presence or accounts being a digital  property, should be treated as movable assets and should pass on to the  legal heir or representatives of the deceased person rather than to an  NGO".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Sunil Abraham, executive director at Centre for  Internet and Society, Twitter India should help settle the Kalam case  using its existing policy. "And if there is no space for a legacy  contact, they might consider resetting the password so that nobody has  access to it and then they can memorialise the account," says Abraham.  "Social media accounts are increasingly being enumerated under digital  assets in wills. Once the asset has been transferred to the heir, the  heir can choose to transfer the account to another person or  organisation for their services in maintaining the account. While this  is not explicitly provided for in the law, there is no prohibition  either."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;WHEN THEY DIED...&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Among the eminent  personalities whose social media accounts continue to be operational  after their demise are anti-apartheid leader and former president of  South Africa Nelson Mandela, pop star Michael Jackson and boxing legend  Muhammad Ali.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Mandela's account has been turned into a foundation, Ali's  account states that it pays tribute to the boxing legend. Jackson's  account mentions nothing about the fact that he died in 2009. Their  Twitter and Facebook pages witness a tweet or a post every few days.  Both Jackson and Ali also have verified accounts on Instagram; their  photos are posted every now and then.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among the celebrities whose accounts have been left inactive are  Bollywood actress Jiah Khan, television actress Pratyusha Banerjee and  British singer-songwriter George Michael. While Khan's last tweet (on  May 23, 2013) was an apology message for staying away from the social  networking site, Michael had shared his song Heartbreak a day before  Valentine's Day on February 12, 2016. Banerjee had tweeted  '#prayforparis #prayfortheworld' on November 15, 2015, showing her  support against the terrorist attack in Paris on November 13, 2015. This  was her last tweet before she was found hanging in her apartment in  Mumbai on April 1, 2016.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/dna-may-28-2017-heena-khandelwal-tweets-from-the-afterlife'&gt;http://editors.cis-india.org/internet-governance/news/dna-may-28-2017-heena-khandelwal-tweets-from-the-afterlife&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-06-06T12:46:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/t20-germany-and-beyond-digital-economy">
    <title>T20 Germany and Beyond: Digital Economy</title>
    <link>http://editors.cis-india.org/internet-governance/news/t20-germany-and-beyond-digital-economy</link>
    <description>
        &lt;b&gt;Elonnai Hickok participated in a round-table discussion organized by GIZ and EPF in Berlin from May 29 to 30, 2017.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Think20 (T20) is a network of research institutes and think tanks from the G20 countries. The T20 provides research-based policy advice to the G20, facilitates interaction among its members and the policy community, and communicates with the broader public about issues of global importance. &lt;a class="external-link" href="http://www.t20germany.org/"&gt;Click to read more&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/t20-germany-and-beyond-digital-economy'&gt;http://editors.cis-india.org/internet-governance/news/t20-germany-and-beyond-digital-economy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-06T15:25:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/stockholm-internet-forum-2017">
    <title>Stockholm Internet Forum 2017</title>
    <link>http://editors.cis-india.org/internet-governance/news/stockholm-internet-forum-2017</link>
    <description>
        &lt;b&gt;Elonnai Hickok participated in the Stockholm Internet Forum 2017 held in Stockholm from May 15 to 18, 2017. She spoke on the panel "Private sector and civil society collaboration to advance freedom online". The event was organized by Swedish International Development Cooperation Agency. &lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Pre-SIF 15 May at Sida HQ&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;Welcoming and informal lunch at Sida 12.00 – 14.00 &lt;/b&gt;(Location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pre-SIF regional sessions: 14.00 – 17.00 (breaks included) &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/?page_id=3951&amp;amp;preview=true"&gt;&lt;b&gt;MENA:&lt;/b&gt; Access, power and gender&lt;/a&gt; (Location: Hörsalen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/?page_id=3955&amp;amp;preview=true"&gt;&lt;b&gt;AFRICA:&lt;/b&gt; Inequality and the digital revolution in Africa&lt;/a&gt; (Location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-regional-session-latin-america/"&gt;&lt;b&gt;LATIN AMERICA:&lt;/b&gt; Human rights and technology in Latin America: Where to from here?&lt;/a&gt; (Location: Room 19, Asante)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-regional-session-eurasia/"&gt;&lt;b&gt;EURASIA:&lt;/b&gt; Media freedom and fact checking practices&lt;/a&gt; (Location: Room 18, Djenné)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-regional-session-south-east-asia/"&gt;&lt;b&gt;SOUTH EAST ASIA&lt;/b&gt;: Regional internet freedom unconference&lt;/a&gt; (Location: Room 23, Quirigua)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/study-visit-kista-science-city/"&gt;&lt;b&gt;STUDY VISIT: &lt;/b&gt;Kista Science City&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle: 17.00 – 18.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Dinner: 18.00 – 20.00&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Pre-SIF 16 May at Sida HQ&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-welcome-and-framing-access-and-power/"&gt;Welcome and framing access and power&lt;/a&gt; 09.00 – 11.30 &lt;/b&gt;(break included, location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pre-SIF Parallel sessions: 11.30 – 13.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-parallel-session-1a/"&gt;&lt;b&gt;1A&lt;/b&gt; From divides to dividends – DDP and SDG17&lt;/a&gt; (Location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-parallel-session-1b/"&gt;&lt;b&gt;1B&lt;/b&gt; Online threats: Operational response and kick-ass solutions&lt;/a&gt; (Location: Hörsalen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle and lunch: 13.00 – 15.00 &lt;/b&gt;(Location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pre-SIF Parallel sessions: 15.00 – 17.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-parallel-session-2a/"&gt;&lt;b&gt;2A &lt;/b&gt;Financial services in a digital era: Development, livelihoods and privacy&lt;/a&gt; (Location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-parallel-session-2b/"&gt;&lt;b&gt;2B&lt;/b&gt; Responsible data forum: Open source investigation for human rights&lt;/a&gt; (Location: Hörsalen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle: 17.00 – 18.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Dinner: 18.00 – 20.00&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;SIF 17 May at Münchenbryggeriet&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/opening-and-main-session-1/"&gt;&lt;b&gt;Opening and main session 1: 9.00 – 11.00 &lt;/b&gt;&lt;/a&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;Welcoming remarks by Sida Director General &lt;b&gt;Lennart Båge&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Speech by Swedish Minister of Culture and Democracy &lt;b&gt;Alice Bah Kuhnke&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Main session 1: Equal access – Distributed power&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The theme of SIF 2017 is “Access and Power” – a duality that can be  analysed in many different ways. It is not enough to have access to the  Internet, ICT’s and digital tools to achieve social justice and  development outcomes. The question of what people have access to and  what possibilities access gives also needs to be addressed. Access to  the Internet is more than technical aspects and solutions – there are  also dimensions related to rights, policy and power that need to be  addressed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At SIF we are keen on framing the current struggles and challenges in  order to formulate possible ways ahead. One way to approach this is to  discuss the co-relation between access and power. The first main session  on the various aspects of access and power, is designed to get the  conversation started.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Speech by State Secretary Annika Söder 11.00 – 11.15 &lt;/b&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Coffee break 11.15 – 11.45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Parallel sessions: 11.45 – 13.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-1a/"&gt;&lt;b&gt;#SIF1A &lt;/b&gt;Digital Identity&lt;/a&gt; (Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-1b/"&gt;&lt;b&gt;#SIF1B &lt;/b&gt;Community access – Helping the last 4 billion get connected&lt;/a&gt; (Location: Fogelström)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-1c/"&gt;&lt;b&gt;#SIF1C &lt;/b&gt;Gender based violence online: levelling the discussion&lt;/a&gt; (Location: Riddarsalen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle and lunch: 13.00 – 14.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Parallel sessions: 14.00 – 15.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-2a-open-sif/"&gt;&lt;b&gt;#SIF2A &lt;/b&gt;OPEN SIF&lt;/a&gt; (Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-2b/"&gt;&lt;b&gt;#SIF2B&lt;/b&gt; The promises and risks of the platform economy&lt;/a&gt; (Location: Fogelström)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-2c/"&gt;&lt;b&gt;#SIF2C&lt;/b&gt; The global shut down epidemic – From rights, tech and economic perspective&lt;/a&gt; (Location: Riddarsalen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Coffee break 15.30 – 16.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Breakout sessions: 16.00 – 17.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/breakout-session-1b/"&gt;&lt;b&gt;#SIFB1&lt;/b&gt; The (alternative) truth is out there&lt;/a&gt; (Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/breakout-session-2/"&gt;&lt;b&gt;#SIFB2&lt;/b&gt; Private sector and civil society collaboration to advance freedom online&lt;/a&gt; (Location: Galleriet)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/breakout-session-3/"&gt;&lt;b&gt;#SIFB3&lt;/b&gt; Access and human rights in the smart city&lt;/a&gt; (Location: Riddarsalen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/breakout-session-4/"&gt;&lt;b&gt;#SIFB4&lt;/b&gt; Empowering technologies in hostile environments&lt;/a&gt; (Location: Milles)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/breakout-session-5/"&gt;&lt;b&gt;#SIFB5&lt;/b&gt; Freedom Online Coalition: Open forum&lt;/a&gt; (Location: Fogelström)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://www.stockholminternetforum.se/may-17th-reflections-and-highlights-from-the-day/"&gt;Reflections and highlights from the day&lt;/a&gt;: 17.45 – 18.45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle and Dinner: 19.00 – 21.00&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;SIF 18 May at Münchenbryggeriet&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://www.stockholminternetforum.se/may-18th-welcome-and-keynote/"&gt;Welcome and keynote&lt;/a&gt;: 09.00 – 09.30 &lt;/b&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Parallel sessions: 09.30 – 11.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-3a-open-sif/"&gt;&lt;b&gt;#SIF3A &lt;/b&gt;OPEN SIF&lt;/a&gt; (Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-3b/"&gt;&lt;b&gt;#SIF3B &lt;/b&gt;Digital rights 2.0: challenges and opportunities to empowerment&lt;/a&gt; (Location: Fogelström)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-3c/"&gt;&lt;b&gt;#SIF3C &lt;/b&gt;Safe media in conflict and chaos&lt;/a&gt; (Location: Riddarsalen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Coffee break: 11.00 – 11.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/main-session-2-2/"&gt;&lt;b&gt;Main session 2: 11.30 – 13.00 &lt;/b&gt;&lt;/a&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;A positive outlook: Leave no one offline&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Half of the world’s population — specifically women, the poor and  marginalised populations in developing countries — are still being left  offline. What is needed to reach those still offline?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond access, there are still many obstacles to achieving a digital  inclusive society. Access to the Internet, ICT’s and digital tools is  not only a catalyst for economic growth but increasingly a means for  people to participate in today’s society.  Too often access is measured  by number of subscribers. This session will address access and power  from a multidimensional approach – including infrastructure,  affordability and contextual factors such as regulation and social and  power structures.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle and lunch: 13.00 – 14.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/sif-may-18th-closing-session/"&gt;&lt;b&gt;Closing session: 14.00 – 15.00 &lt;/b&gt;&lt;/a&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This session will focus on summarizing knowledge and experiences  shared at SIF17 and mapping the road ahead – identifying constraints but  also opportunities for equal access and Internet freedom in the strive  for global development and a digital inclusive society. The closing  session will be interactive with the participants being the centre of  the discussion.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Side happenings &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;During breaks you will have the opportunity to develop your digital  skills, participate in discussions and expand your knowledge at this  year’s side happenings.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;16 May at Sida HQ&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;11.00 – 17.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/side-happening-new-media-documentation-clinic-with-witness/"&gt;New media documentation clinic with Witness&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;(Location: Room 19 Asante)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.00 – 17.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/side-happening-developing-internet-universality-indicators-with-unesco-and-the-apc-internet-indicators-consortium/"&gt;Developing Internet universality indicators with UNESCO and the APC Internet indicators consortium&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;(Location: Room 21 Tsodilo)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;14.30 – 17.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/side-happening-local-access-and-community-based-networks-with-apc-and-isoc/"&gt;Local access and community based networks with APC and ISOC&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;(Location: Djenné)&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;17 – 18 May at Münchenbryggeriet&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;All day&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/side-happening-digital-security-clinic-with-access-now/"&gt;Digital security clinic with Access Now&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;(Location: Mässtorget)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/side-happening-healing-justice-pod-with-astraea-foundation/"&gt;Healing justice pod with Astraea Foundation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;(Location: Bergrummet)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/stockholm-internet-forum-2017'&gt;http://editors.cis-india.org/internet-governance/news/stockholm-internet-forum-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-06T13:43:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/about/newsletters/may-2017-newsletter">
    <title>May 2017 Newsletter</title>
    <link>http://editors.cis-india.org/about/newsletters/may-2017-newsletter</link>
    <description>
        &lt;b&gt;Welcome to the Centre for Internet &amp; Society (CIS) newsletter for May 2017. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dear readers,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1"&gt;compiled a report that highlighted four government projects run by various government departments&lt;/a&gt; that have made sensitive personal financial information and Aadhaar numbers public on the project websites.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Article 19 had put out a call for applications for its Internet of Rights Fellowship in February 2017. Vidushi Marda was &lt;a class="external-link" href="http://cis-india.org/internet-governance/news/vidushi-marda-selected-for-internet-of-rights-fellowship"&gt;selected for Internet of Rights Fellowship&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="http://cis-india.org/accessibility/blog/comments-on-the-draft-policy-on-it-accessibility-for-people-with-disabilities"&gt;gave inputs on a document on implementing digital accessibility&lt;/a&gt; to Ministry of Electronics and Information Technology on May 2, 2017. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The 34th session of                   the Standing Committee on Copyright and Related Rights                   (SCCR) was held in Geneva from May 1 to 5, 2017. Anubha Sinha participated in the                     event and a summary report is available &lt;a href="http://cis-india.org/a2k/blogs/34th-sccr-a-summary-report"&gt;here&lt;/a&gt;.                   She made statements on behalf of                     CIS on the &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-cis-statement-on-the-discussion-on-limitations-and-exceptions-for-libraries-and-archives"&gt;Discussion on Limitations and                     Exceptions for Libraries and Archives&lt;/a&gt; and on the                   &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-cis-statement-on-the-proposal-for-analysis-of-copyright-related-to-the-digital-environment"&gt;Proposal for Analysis of                     Copyright Related to the Digital Environment&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS-A2K’s widely well-regarded flagship skill building program, Train The Trainer and MediaWiki Training was conducted in Kolkata earlier this year. Tito Dutta &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mini-ttt-and-mwt-held-in-kolkata"&gt;captured the developments in a blog post&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Although it has made the topographic maps or the Open Series Maps available to general public, Survey of India’s (SoI) Nakshe portal will have to go through a variety of litmus test, as the initiative fails to implement the mandates of public sharing of  government data using open standards and open license as put forward by  the NMP 2005 and NDSAP 2012, said Sumandro Chattapadhyay &lt;a class="external-link" href="http://cis-india.org/openness/survey-of-india-open-series-maps-fails-to-implement-public-sharing-of-govt-data"&gt;in an interview with Geospatial World&lt;/a&gt; on May 02, 2017.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In an interview with &lt;a class="external-link" href="https://nettime.org/Lists-Archives/nettime-l-1705/msg00001.html"&gt;nettime.org&lt;/a&gt;, Geert Lovink discussed with Ramesh Srinivasan Tech Anthropology Today and "&lt;a class="external-link" href="http://cis-india.org/raw/tech-anthropology-today-collaborate-rather-than-fetishize-from-afar"&gt;how can we embrace the realities of communities too-often relegated to the margins"&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In an article &lt;a class="external-link" href="http://cis-india.org/telecom/blog/business-standard-may-3-2017-shyam-ponappa-policies-to-sustain-indias-market"&gt;published in the Business Standard&lt;/a&gt; on May 3, 2017, Shyam Ponappa examined whether policies can be better framed to harness the market potential. Why is so much investment flowing into India's securities markets?&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CIS in the news:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-wire-may-1-2015-130-million-aadhaar-numbers-were-made-public-says-new-report"&gt;130 Million Aadhaar Numbers Were Made Public, Says New Report&lt;/a&gt; (The Wire; May 1, 2017 and MensXP.com; May 5, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/bloomberg-quint-may-2-2017-mahima-kapoor-aadhaar-details-of-people-available-on-govt-sites"&gt;Aadhaar Details Of 13.5 Crore People Available On Government Sites&lt;/a&gt; (Mahima Kapoor; Bloomberg Quint; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report"&gt;Aadhaar numbers of 135 mn may have leaked, claims CIS report&lt;/a&gt; (Press Trust of India; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hindustan-times-may-2-2017-details-of-135-million-aadhaar-card-holders-may-have-leaked-claims-cis-report"&gt;Details of 135 million Aadhaar card holders may have leaked, claims CIS report&lt;/a&gt; (Hindustan Times; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/newslaundry-shruti-menon-may-2-2017-uidai-remains-silent-on-aadhaar-leaks-of-users-through-govt-portals"&gt;UIDAI remains silent on #Aadhaarleaks of 13 crore users through government portals&lt;/a&gt; (Shruti Menon; Newslaundry; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/amar-bazar-patrika-may-2-2017-13-crore-aadhaar-leaked-due-to-poor-security-in-4-govt-websites"&gt;১৩ কোটি আধার তথ্য ফাঁস চার সরকারি পোর্টাল থেকে! বিস্ফোরক দাবি রিপোর্টে&lt;/a&gt; (Amar Bazar Patrika; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/new-indian-express-may-2-2017-akram-mohammed-13-crore-aadhaar-numbers-on-four-government-websites-compromised"&gt;13 crore Aadhaar numbers on four government websites compromised: Report&lt;/a&gt; (Akram Mohammed; New Indian Express; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/dna-may-2-2017-report-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report"&gt;Aadhaar numbers of 135 mn may have leaked, claims CIS report&lt;/a&gt; (DNA; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people"&gt;Biggest blast on Aadhaar leak so far: govt sites leaked data of 13 crore people&lt;/a&gt; (Jikku Varghese Jacob; Manorama; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/scroll-may-2-2017-around-13-crore-aadhaar-numbers-easily-available-on-government-portals-says-report"&gt;Around 13 crore Aadhaar numbers easily available on government portals, says report&lt;/a&gt; (Scroll.in; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/one-india-may-2-2017-anusha-ravi-what-privacy-13-crore-aadhaar-numbers-accessible-on-governmental-portals"&gt;What privacy? 13 crore Aadhaar numbers accessible on government portals&lt;/a&gt; (Anusha Ravi; Oneindia; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/livemint-may-2-2017-komal-gupta-govt-may-have-made-135-million-aadhaar-numbers-public-cis-report"&gt;Govt may have made 135 million Aadhaar numbers public: CIS report&lt;/a&gt; (Komal Gupta; Livemint; May 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/times-of-india-may-5-2017-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report"&gt;Aadhaar numbers of 135 mn may have leaked, claims CIS report&lt;/a&gt; (The Times of India; May 2, 2017)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hindu-krishnadas-rajagopal-may-3-2017-aadhaar-data-leaks-not-from-uidai"&gt;Aadhaar data leaks not from UIDAI: Centre&lt;/a&gt; (Krishnadas Rajagopal; Hindu; May 3, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-register-richard-chirgwin-may-3-2017-135-million-indian-government-payment-card-details-leaked"&gt;135 MEELLION Indian government payment card details leaked&lt;/a&gt; (Richard Chirgwin; The Register; May 3, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/indian-express-may-3-2017-aadhaar-data-of-over-13-crore-people-exposed-new-report"&gt;Aadhaar data of over 13 crore people exposed: New report&lt;/a&gt; (Indian Express; May 3, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/india-times-bobin-abraham-may-3-2017-in-the-biggest-data-leak-info-of-13-crore-aadhaar-card-holders-has-been-compromised-and-is-available-online"&gt;In The Biggest Data Leak, Info Of 13 Crore Aadhaar Card Holders Has Been Compromised And Is Available Online&lt;/a&gt; (Bobins Abraham; The Times of India; May 3, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-4-2017-around-130-135-m-aadhaar-numbers-published-on-four-sites-alone"&gt;Around 130-135M Aadhaar Numbers published on 4 sites alone&lt;/a&gt; (Nikhil Pahwa; Medianama; May 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-rohith-jyothish-may-5-2017-aadhaar-the-largest-biometric-database-globally-but-it-is-leaky-by-design"&gt;Aadhaar's the largest biometric database globally but it is leaky by design&lt;/a&gt; (Rohith Jyotish; Global Voices; May 2, 2017 and Business Standard; May 5, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-news-minute-rakesh-mehar-may-4-2017-why-aadhaar-leaks-should-worry-you-and-is-biometrics-really-safe"&gt;Why Aadhaar leaks should worry you, and is biometrics really safe?&lt;/a&gt; (Rakesh Mehar; Newsminute; May 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/medianama-vivek-pai-may-4-2017-indian-govt-says-it-is-still-drafting-privacy-law"&gt;Indian Government says it is still drafting privacy law, but doesn’t give timelines&lt;/a&gt; (Vivek Pai; Medianama; May 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/aaj-tak-may-4-2017-135-million-aadhaar-number-leaked-by-govt-website-cis-report"&gt;आधार नंबर, नाम, पता, बैंक अकाउंट और दूसरी संवेदनशील जानकारियां लीक: CIS रिपोर्ट&lt;/a&gt; (Aaj Tak; May 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/ndtv-may-4-2017-manas-pratap-singh-government-knew-of-mega-aadhaar-leak-ministries-were-warned"&gt;With digitisation at the forefront, government departments need to be cautious about digital security&lt;/a&gt; (Manas Pratap Singh; NDTV; May 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/livemint-may-4-2017-aijaz-hussain-kashmir-telecom-firms-struggle-to-block-22-banned-social-media-sites"&gt;Kashmir: Telecom firms struggle to block 22 banned social media sites &lt;/a&gt;(Aijaz Hussain; Livemint; May 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/india-today-may-4-2017-aadhaar-data-of-130-millions-bank-account-details-leaked-from-govt-websites-report"&gt;Aadhaar data of 130 millions, bank account details leaked from govt websites: Report&lt;/a&gt; (India Today; May 4, 2017).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/bbc-news-soutik-biswas-may-4-2017-aadhaar-are-a-billion-identities-at-risk-on-indias-biometric-database"&gt;Aadhaar: Are a billion identities at risk on India's biometric database&lt;/a&gt; (Soutik Biswas; BBC News; May 4, 2017 and Rawlson King; Biometric Update.com; May 5, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/counterview-may-5-2017-135-million-aadhaar-details-100-million"&gt;135 million aadhaar details, 100 million bank accounts "leaked" from government websites: Researchers&lt;/a&gt; (Counterview; May 5, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-times-of-india-kim-arora-may-5-2017-suicide-videos-facebook-beefs-up-team-to-monitor-content"&gt;Suicide videos: Facebook beefs up team to monitor content&lt;/a&gt; (Kim Arora; The Times of India; May 5, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns"&gt;Aadhaar assurances fail to assuage privacy concerns&lt;/a&gt; (Anirban Sen; Livemint; May 5, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/newsminute-may-6-2017-a-13-year-olds-rape-in-tn-highlights-the-major-threat-online-sexual-grooming-poses-to-children"&gt;A 13-year-old's rape in TN highlights the major threat online sexual grooming poses to children&lt;/a&gt; (Priyanka Thirumurthy; May 6, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/new-indian-express-may-6-2017-experts-stress-on-need-for-enhanced-security"&gt;Experts stress on need for enhanced security&lt;/a&gt; (New Indian Express; May 6, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-wire-may-10-2017-shreyashi-roy-taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar"&gt;Taking Cognisance of the Deeply Flawed System That Is Aadhaar&lt;/a&gt; (Shreyashi Roy; Wire; May 10, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/deccan-herald-may-11-2017-plug-data-leak-before-imposing-aadhaar"&gt;Plug data leak before imposing Aadhaar&lt;/a&gt; (Deccan Herald; May 11, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-indian-express-may-11-2017-aadhaar-data-leak-take-precautions-while-sharing-info-on-websites-meity-tells-all-depts"&gt;Aadhaar data leak: Take precautions while sharing info on websites, MEITy tells all depts&lt;/a&gt; (Indian Express; May 11, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected"&gt;Aadhaar security: Here's how your private information can be protected&lt;/a&gt; (Sanjay Kumar Singh; Business Standard; May 11, 2017).&lt;/li&gt;
&lt;li&gt; &lt;a class="external-link" href="http://cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system"&gt;Online Trolls Attack Critics of India's Aadhaar State ID System&lt;/a&gt; (Rohith Jyothish; Global Voices; May 31, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/los-angeles-times-shashank-bengali-may-12-2017-india-is-building-a-biometric-database-for-1.3-billion-people-and-enrollment-is-mandatory"&gt;India is building a biometric database for 1.3 billion people — and enrollment is mandatory&lt;/a&gt; (Shashank Bengali; Los Angeles Times; May 12, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-may-13-2017-alnoor-peermohamed-and-raghu-krishnan-aadhaar-has-become-a-whipping-boy-nandan-nilekani"&gt;Watch: Aadhaar has become a whipping boy: Nandan Nilekani&lt;/a&gt; (Alnoor Peermohamed and Raghu Krishnan; Business Standard; May 13, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/x-conomy-benjamin-romano-may-16-2017-partnership-on-ai-adds-corporate-ngo-members-charts-initial-course"&gt;Partnership on AI Adds Corporate, NGO Members, Charts Initial Course&lt;/a&gt; (Benjamin Romano; Xconomy; May 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/newsminute-may-16-2017-soumya-chatterjee-wannacry-atms-not-to-shut-down-clarifies-rbi"&gt;WannaCry: ATMs not to shut down, clarifies RBI, but how safe are our machines?&lt;/a&gt; (Soumya Chatterjee; May 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/axios-may-16-2017-google-and-facebook-artificial-intelligence-group-adds-new-members"&gt;Google, Facebook's AI group adds new members&lt;/a&gt; (Jens Meyer; Axios; May 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/tech-republic-may-17-2017-22-companies-join-partnership-on-ai"&gt;22 companies join Partnership on AI, begin to study AI's impact on work and society&lt;/a&gt; (Alison DeNisco; TechRepublic; May 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/ciol-may-17-2017-intel-salesforce-ebay-sony-and-others-join-the-grand-ai-partnership-club"&gt;Intel, Salesforce, eBay, Sony and others join the grand AI partnership club&lt;/a&gt; (CIOL; May 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/new-indian-express-kiran-parashar-km-and-shruthi-hm-it-companies-in-bengaluru-on-high-alert-over-wannacry-ransomware"&gt;IT companies in Bengaluru on high alert over WannaCry ransomware&lt;/a&gt; (Kiran Parashar K M &amp;amp; Shruthi H M; New Indian Express; May 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/sd-times-may-17-partnership-on-ai-adds-new-organizations-to-its-network"&gt;Partnership on AI adds new organizations to its network&lt;/a&gt; (Madison Moore; Software Development Times; May 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/silicon-monica-tilves-may-17-2017-intel-ebay-sap-salesforce-sony-collaboration-aritificial-intelligence"&gt;Intel, eBay, SAP, Salesforce y Sony colaborarán en inteligencia artificial&lt;/a&gt; (Monica Tilves; Silicon; May 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/telecom-paper-may-17-2017-22-nieuwe-leden-voor-partnership-on-ai"&gt;22 nieuwe leden voor Partnership on AI &lt;/a&gt;(Telecom Paper; May 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-times-of-india-mahendra-singh-may-18-2017-provide-hacker-details-outfit-that-claimed-data-leak-told"&gt;Provide hacker details, outfit that claimed data leak told&lt;/a&gt; (Mahendra Singh; The Times of India; May 18, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/economic-times-may-18-2017-mahendra-singh-uidai-asks-centre-for-internet-and-society-to-provide-hacker-details"&gt;UIDAI asks Centre for Internet &amp;amp; Society to provide hacker details&lt;/a&gt; (Mahendra Singh; Economic Times; May 18, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-may-19-2017-hack-exposes-zomatos-weak-protection-of-customer-data-say-cyber-experts"&gt;Hack exposes Zomato's weak protection of customer data, say Cyber experts&lt;/a&gt; (Alnoor Peermohamed; Business Standard; May 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/bloomber-quint-may-19-2017-aayush-ailawadi-whats-hard-to-digest-about-the-zomato-hacking"&gt;What’s Hard To Digest About The Zomato Hacking&lt;/a&gt; (Aayush Ailawadi; Bloomberg Quint; May 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/financial-express-may-19-2017-pti-uidai-puts-posers-to-cis-over-aadhaar-data-leak-claim"&gt;UIDAI puts posers to CIS over Aadhaar data leak claim&lt;/a&gt; (Press Trust of India and Financial Express; May 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hindustan-times-samarth-bansal-faking-it-on-whatsapp-how-india-s-favourite-messaging-app-turned-into-a-rumour-mill"&gt;Faking it on WhatsApp: How India's favourite messaging app is turning into a rumour mill&lt;/a&gt; (Samarth Bansal; Hindustan Times; May 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-wire-may-19-2017-ajoy-ashirwad-mahaprahasta-debate-over-aadhaar-turns-nasty-as-critics-accuse-supporters-of-online-trolling"&gt;Debate over #Aadhaar Turns Nasty as Critics Accuse Supporters of Online Trolling&lt;/a&gt; (Ajoy Ashirwad Mahaprahasta; The Wire; May 19, 2017).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-times-of-india-may-19-2017-kim-arora-and-digbijay-mishra-hacker-steals-17-million-zomato-users-data-briefly-puts-it-on-dark-web"&gt;Hacker steals 17 million Zomato users’ data, briefly puts it on dark web&lt;/a&gt; (Kim Arora and Digbijay Mishra with inputs from Ranjani Ayyar; The Times of India; May 19, 2017).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar"&gt;UIDAI goes after org that disclosed government departments were releasing Aadhaar data&lt;/a&gt; (Nikhil Pahwa; May 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hoyen-tv-may-20-2017-cirilo-laguardia-developer-releases-wanna-cry-key-recovery-tool-for-windows-xp"&gt;Developer releases WannaCry key-recovery tool for Windows XP&lt;/a&gt; (Cirilo Laguardia; Hoyen TV; May 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/scroll-may-20-2017-anumeha-yadav-will-aadhaar-leaks-be-used-as-an-excuse-to-shut-out-scrutiny-of-welfare-schemes"&gt;Will Aadhaar leaks be used as an excuse to shut out scrutiny of welfare schemes?&lt;/a&gt; (Anumeha Yadav; Scroll.in; May 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call"&gt;Microsoft says WannaCry ransomware must be a wake-up call for governments&lt;/a&gt; (Journaldu Maghreb; May 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack"&gt;Noida cyber cell gives tips on preventing WannaCry attack&lt;/a&gt; (Juana McKenzie; World News Journal; May 20, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack"&gt;Chinese state media says U.S. should take some blame for cyber attack&lt;/a&gt; (Ellis Neal; Villages Suntimes; May 21, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager"&gt;Zomato hack: You need to enhance online security with a password manager&lt;/a&gt; (Sanjay Kumar Singh; Business Standard; May 23, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/inc42-may-23-2017-shweta-modgil-sharad-sharma-aplogises-for-trolling-aadhaar-critics"&gt;Sharad Sharma Apologises for Trolling Aadhaar Critics; Unmasking Ispirit's Controversial Trolling Program&lt;/a&gt; (Shweta Modgil; Inc 42; May 23, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-times-of-india-may-24-2017-shalina-pillai-anand-j-ispirts-sharad-sharma-sorry-i-trolled-aadhaar-critics"&gt;iSpirt's Sharad Sharma: Sorry, I trolled Aadhaar critics&lt;/a&gt; (Shalina Pillai and Anand J; The Times of India; May 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/catch-news-may-25-2017-sharad-sharma-apos-case-shows-how-rampant-troll-culture-has-become-under-modi"&gt;Sharad Sharma's case shows how rampant troll culture has become under Modi&lt;/a&gt; (Catch News; May 25, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders"&gt;Aadhaar Card: One Identity, Multiple Disorders&lt;/a&gt; (Gaurav Raj; India Saga; May 25, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/dna-may-28-2017-heena-khandelwal-tweets-from-the-afterlife"&gt;Tweets from the afterlife&lt;/a&gt; (Heena Khandelwal; DNA; May 28, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/economic-times-may-29-2017-bharat-joshi-bbmp-faces-ire-for-publishing-pourakarmikas-aadhaar-details-on-website"&gt;BBMP faces ire for publishing pourakarmikas' Aadhaar details on website&lt;/a&gt; (Bharat Joshi; Economic Times; May 29, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;CIS members wrote the following articles&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-quint-amber-sinha-and-aradhya-sethia-may-1-2017-aadhaar-case-beyond-privacy-an-issue-of-bodily-integrity"&gt;Aadhaar Case: Beyond Privacy, An Issue of Bodily Integrity&lt;/a&gt; (Amber Sinha and Aradhya Sethia; Quint; May 1, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-may-14-2017-digital-native-free-speech-you-must-be-joking"&gt;Digital native: Free speech? You must be joking!&lt;/a&gt; (Nishant Shah; Indian Express; May 14, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-may-28-2017-digital-native-look-before-you-digitally-leap"&gt;Digital native: Look before you (digitally) leap&lt;/a&gt; (Nishant Shah; Indian Express; May 28, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility &amp;amp; Inclusion&lt;/a&gt; &lt;br /&gt; ------------------------------------- 	&lt;br /&gt; India has an estimated 70 million persons with disabilities who don't    have access to read printed materials due to some form of physical,    sensory, 	cognitive or other disability. As part of our endeavour to    make available accessible content for persons with disabilities, we are    developing a text-to-speech software in 15 languages with support from    the Hans Foundation. The progress made so far in the project can be    accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/comments-on-the-draft-policy-on-it-accessibility-for-people-with-disabilities"&gt;Comments on the draft Policy on IT Accessibility for People with Disabilities&lt;/a&gt; (Nirmita Narasimhan; May 19, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;-----------------------------------&lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt;Our    Access to Knowledge programme currently consists of two projects. The    Pervasive Technologies project, conducted under a grant from the    International Development Research Centre (IDRC), aims to conduct    research on the complex interplay between low-cost pervasive    technologies and intellectual property, in order to encourage the    proliferation and development of such technologies as a social good. The    Wikipedia project, which is under a 	grant from the Wikimedia    Foundation, is for the growth of Indic language communities and projects    by designing community collaborations and partnerships 	that recruit    and cultivate new editors and explore innovative approaches to  building   projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Copyright&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-a-summary-report"&gt;34th SCCR: A Summary Report&lt;/a&gt; (Anubha Sinha; May 15, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-cis-statement-on-the-proposal-for-analysis-of-copyright-related-to-the-digital-environment"&gt;34th SCCR: CIS Statement on the Proposal for Analysis of Copyright Related to the Digital Environment&lt;/a&gt; (Anubha Sinha; May 15, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-cis-statement-on-the-discussion-on-limitations-and-exceptions-for-libraries-and-archives"&gt;34th SCCR: CIS Statement on the Discussion on Limitations and Exceptions for Libraries and Archives&lt;/a&gt; (Anubha Sinha; May 15, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-observer-statements-on-proposal-for-analysis-of-copyright-related-to-the-digital-environment"&gt;34th SCCR: Observer Statements on Proposal for Analysis of Copyright related to the Digital Environment&lt;/a&gt; (Anubha Sinha; May 30, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-observer-statements-on-limitations-and-exceptions-for-educational-and-research-institutions-and-persons-with-other-disabilities"&gt;34th SCCR: Observer Statements on Limitations and Exceptions for Educational and Research Institutions&lt;/a&gt; (Anubha Sinha; May 30, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/34th-sccr-observer-statements-on-limitations-and-exceptions-for-libraries-and-archives"&gt;34th SCCR: Observer Statements on Limitations and Exceptions for Libraries and Archives&lt;/a&gt; (Anubha Sinha; May 30, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/fixing-copyright-for-education-sccr34-side-event"&gt;Fixing Copyright for Education&lt;/a&gt; (SCCR34 Side Event) (Hosted by Communia, EIFL, Creative Commons, and PIJIP; May 5, 2017). Anubha Sinha was a speaker. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by    organizing more than 100 outreach events and catalysed the release of    encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0)    license in four Indian languages (21 books in Telugu, 13 in Odia, 4    volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book    on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/wiki-loves-mayabazaar"&gt;Wiki Loves Mayabazaar&lt;/a&gt; (Pavan Santhosh; May 1, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/marathi-wikipedia-symposium-at-gokhale-institute-of-politics-economics"&gt;Marathi Wikipedia Symposium at Gokhale Institute Of Politics &amp;amp; Economics&lt;/a&gt; (Subodh Kulkarni; May 1, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/digitisation-wikimedia-commons-and-wikisource-orientation-workshop-at-vigyan-ashram-pabal-pune-district"&gt;Digitisation, Wikimedia Commons and Wikisource Orientation Workshop at Vigyan Ashram, Pabal, Pune District&lt;/a&gt; (Subodh Kulkarni; May 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/thematic-edit-a-thon-at-j-p-naik-centre-for-education-development-pune"&gt;Thematic Edit-a-thon at J.P.Naik Centre for Education &amp;amp; Development, Pune&lt;/a&gt; (Subodh Kulkarni; May 10, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/train-the-trainer-2017"&gt;Train The Trainer 2017&lt;/a&gt; (Manasa Rao; May 10, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/continuing-community-engagement-communities-of-interest-and-quarrying"&gt;Continuing community engagement: Communities of interest and Quarrying&lt;/a&gt; (Manasa Rao; May 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/preliminary-research-result-on-wikipedia-gender-gap-in-india"&gt;Preliminary research result on Wikipedia gender gap in India&lt;/a&gt; (Ting-Yi Chang; May 22, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mediawiki-training-2017"&gt;MediaWiki Training 2017&lt;/a&gt; (Tito Dutta and Ananth Subray; May 23, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mini-ttt-and-mwt-held-in-kolkata"&gt;Mini TTT and MWT held in Kolkata&lt;/a&gt; (Tito Dutta; May 23, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Note: The workshops for the above blog posts were held earlier but the reports were published during the month of May&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;►Openness&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Our  work in the Openness programme   focuses on open data, especially open  government data, open access,  open  education resources, open knowledge  in Indic languages, open  media, and  open technologies and standards -  hardware and software. We  approach  openness as a cross-cutting  principle for knowledge  production and  distribution, and not as a  thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/survey-of-india-open-series-maps-fails-to-implement-public-sharing-of-govt-data"&gt;SoI’s Open Series Maps Fails to Implement Public Sharing of Govt Data&lt;/a&gt; (Geospatial World; May 4, 2017). Sumandro Chattapadhyay was interviewed.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;b&gt;----------------------------------- &lt;/b&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;b&gt; -----------------------------------&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As  part of its research on privacy and   free speech, CIS is engaged with  two different projects. The first  one  (under a grant from Privacy  International and IDRC) is on  surveillance  and freedom of expression  (SAFEGUARDS). The second one  (under a grant  from MacArthur Foundation)  is on restrictions that the  Indian government  has placed on freedom of  expression online.&lt;/p&gt;
&lt;p&gt;►Freedom of Speech and Expression&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/comments-from-the-centre-for-internet-and-society-on-renewal-of-net-registry-agreement"&gt;Comments from the Centre for Internet and Society on Renewal of .NET Registry Agreement&lt;/a&gt; (Vidushi Marda with inputs from Pranesh Prakash and Sunil Abraham; May 31, 2017). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/events/communication-design-and-visualising-information"&gt;Communication Design and Visualising Information&lt;/a&gt; (CIS, Bengaluru; May 5, 2017). Saumyaa conducted a session on the broad principles of communication design and visualising information. &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/world-press-freedom-day-2017"&gt;World Press Freedom Day 2017&lt;/a&gt; (UNESCO and the Digital Empowerment Foundation; New Delhi; May 3, 2017). Udbhav Tiwari participated in the event.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/consilience-2017-a-conference-on-artificial-intelligence-law"&gt;Consilience 2017 - A Conference on Artificial Intelligence &amp;amp; Law&lt;/a&gt; (Organized by National Law School of India University; May 20, 2017). Vidushi Marda was a panelist.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;►Privacy&lt;/p&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;a class="external-link" href="http://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report"&gt;Comments on the Statistical Disclosure Control Report&lt;/a&gt; (Srinivs Kodali and Amber Sinha; May 2, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1"&gt;(Updated) Information Security Practices of Aadhaar (or lack thereof): A documentation of public availability of Aadhaar Numbers with sensitive personal financial information&lt;/a&gt; (Amber Sinha and Srinivas Kodali; May 1, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Events Organized&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/events/firstfridayatcis-amutha-arunachalam-stand-shielded-of-digital-rights-may-05"&gt;Stand Shielded of Digital Rights&lt;/a&gt; (CIS; New Delhi; May 5, 2017). Amutha Arunachalam gave a talk.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/events/meeting-on-proactive-disclosure-and-personal-data-delhi-may-13"&gt;Meeting on Proactive Disclosure and Personal Data&lt;/a&gt; (CIS; New Delhi; May 13, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/4th-national-standards-conclave-evolving-a-comprehensive-national-strategy-for-standards-sectoral-and-regional-inclusiveness"&gt;4th National Standards Conclave Evolving a Comprehensive National Strategy for Standards Sectoral and Regional Inclusiveness&lt;/a&gt; (Organized by Ministry of Commerce and Industry and the Confederation of Indian Industry; May 1 - 2, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/stockholm-internet-forum-2017"&gt;Stockholm Internet Forum 2017&lt;/a&gt; (Organized by Swedish International Development Cooperation Agency; Stockholm; May 15 to 18, 2017). Elonnai Hickok was a panelist in the session, "Private sector and civil society collaboration to advance freedom online".&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/open-house-on-information-breaches"&gt;Open house on information breaches&lt;/a&gt; (Organized by Has Geek; Bengaluru; May 26, 2017). Udbhav Tiwari was a speaker.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/t20-germany-and-beyond-digital-economy"&gt;T20 Germany and Beyond: Digital Economy&lt;/a&gt; (Organized by GIZ and EPF; May 29 - 30, 2017). Elonnai Hickok participated in a round-table discussion.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;-----------------------------------&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt; -----------------------------------&lt;b&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt; &lt;/b&gt;CIS is involved in promoting access and accessibility to   telecommunications services and resources, and has provided inputs to   ongoing policy discussions 	and consultation papers published by TRAI.   It has prepared reports on unlicensed spectrum and accessibility of   mobile phones for persons with disabilities 	and also works with the   USOF to include funding projects for persons with disabilities in its   mandate:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/telecom/blog/business-standard-may-3-2017-shyam-ponappa-policies-to-sustain-indias-market"&gt;Policies to Sustain India's Market&lt;/a&gt; (Shyam Ponappa; Business Standard; May 3, 2017 and Organizing India Blogspot; May 4, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;-----------------------------------&lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary    research initiative driven by an emerging need to understand the    reconfigurations of 	social practices and structures through the    Internet and digital media technologies, and vice versa. It aims to    produce local and contextual 	accounts of interactions, negotiations,    and resolutions between the Internet, and socio-material and    geo-political processes:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/tech-anthropology-today-collaborate-rather-than-fetishize-from-afar"&gt;Tech Anthropology Today: Collaborate, Rather than Fetishize from Afar&lt;/a&gt; (Geert Lovink and Ramesh Srinivasan; nettime.org; May 16, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/consultative-meeting-for-a-digital-archive-lab"&gt;Consultative Meeting for a Digital Archive Lab&lt;/a&gt; (Organized by Ambedkar University, New Delhi; May 20, 2017). P.P. Sneha participated in the meeting.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation    that undertakes interdisciplinary research on internet and digital    technologies from 	policy and academic perspectives. The areas of focus    include digital accessibility for persons with disabilities,  access   to knowledge, intellectual 	property rights, openness (including  open   data, free and open source software, open standards, open access,  open   educational resources, and open video), 	internet governance,    telecommunication reform, digital privacy, and cyber-security. The    academic research at CIS seeks to understand the reconfigurations 	of    social and cultural processes and structures as mediated through the    internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div style="text-align: justify; "&gt;Please  help us defend consumer and   citizen rights on the Internet! Write a  cheque in favour of 'The Centre   for Internet and Society' and mail it  to us at No. 	194, 2nd 'C'  Cross,  Domlur, 2nd Stage, Bengaluru - 5600  71.&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;We  invite researchers, practitioners,   artists, and theoreticians, both  organisationally and as individuals,  to  engage with us on topics  related internet 	and society, and improve  our  collective understanding  of this field. To discuss such  possibilities,  please write to Sunil  Abraham, Executive Director, at 	  sunil@cis-india.org (for policy  research), or Sumandro Chattapadhyay,   Research Director, at  sumandro@cis-india.org (for academic research),   with an 	indication of  the form and the content of the collaboration  you  might be interested  in. To discuss collaborations on Indic  language  Wikipedia projects, 	 write to Tanveer Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;i&gt;CIS  is grateful to its primary   donor the Kusuma Trust founded by Anurag  Dikshit and Soma Pujari,   philanthropists of Indian origin for its core  funding and 	support for   most of its projects. CIS is also grateful to  its other donors,   Wikimedia Foundation, Ford Foundation, Privacy  International, UK, Hans  	 Foundation, MacArthur Foundation, and IDRC for  funding its various   projects&lt;/i&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/about/newsletters/may-2017-newsletter'&gt;http://editors.cis-india.org/about/newsletters/may-2017-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2017-06-17T02:46:03Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system">
    <title>Online Trolls Attack Critics of India's Aadhaar State ID System </title>
    <link>http://editors.cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system</link>
    <description>
        &lt;b&gt;India's biometric state ID system has been leaking citizens’ data for months. When this information surfaced in April 2017, it stoked fears that the system could be used as an instrument of surveillance against Indian residents.&lt;/b&gt;
        &lt;p&gt;The blog post by Rohith Jyothish was &lt;a class="external-link" href="https://advox.globalvoices.org/2017/05/31/online-trolls-attack-critics-of-indias-aadhaar-state-id-system/"&gt;published by Global Voices&lt;/a&gt; on May 31, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://uidai.gov.in/about-uidai/about-uidai.html"&gt;Unique Identity Authority of India (UIDAI)&lt;/a&gt;, which administrates the system known as &lt;a href="https://en.wikipedia.org/wiki/Aadhaar"&gt;Aadhaar&lt;/a&gt; (meaning foundation in Hindi) &lt;a href="http://indianexpress.com/article/opinion/columns/criticism-without-aadhaar-4653369/v"&gt;maintains&lt;/a&gt; that it only collects minimal personal data and stores it securely. But critics have firmly expressed &lt;a href="https://advox.globalvoices.org/2017/05/05/is-indias-aadhaar-system-an-instrument-for-surveillance/"&gt;doubts&lt;/a&gt; about these claims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The implications of these leaks, and of any system flaw in Aadhaar  technology, are substantial, especially for Indians who depend on the  Aadhaar system in order to authenticate their identities when they use  any number of government services. The Aadhaar system has become the &lt;a href="https://globalvoices.org/2017/05/02/the-worlds-largest-biometric-database-is-leaking-indian-citizens-data-but-keeps-on-growing/"&gt;gatekeeper of state systems&lt;/a&gt; and services ranging from voting to financial savings to food subsidies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The digital sphere is now starting to see a pushback against Aadhaar  critics through articles and blogposts that describe concerned citizens  and privacy experts as the ‘&lt;a href="https://yourstory.com/2017/05/5-questions-for-the-anti-aadhaar-brigade/"&gt;anti-Aadhaar brigade&lt;/a&gt;‘ and &lt;a href="https://yourstory.com/2017/05/aadhaar-debate-5-more-questions-for-critics/"&gt;accuse them&lt;/a&gt; of publishing “half-truths” and “spread[ing] confusion to advance their own interests.” One such &lt;a href="https://uidai.gov.in/images/news/5_questions_for_the_anti_Aadhaar_brigade_08052017.pdf"&gt;article&lt;/a&gt; was even featured on the UIDAI website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the most &lt;a href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1"&gt;well-researched critiques&lt;/a&gt; of the system have come from the &lt;a href="http://cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt; (CIS), an inter-disciplinary research organisation in Bangalore that  has now become a target of the pro-Aadhaar lobby. Shortly after CIS  released a report that pointed out security flaws in the Aadhaar  ecosystem, the UIDAI &lt;a href="http://timesofindia.indiatimes.com/india/provide-hacker-details-outfit-that-claimed-data-leak-told/articleshow/58725132.cms"&gt;accused&lt;/a&gt; the organization of hacking into the Aadhaar system themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, CIS had investigated databases of four specific government websites. Three were available publicly, the fourth one was &lt;a href="https://thewire.in/131698/before-aadhaar-pan-card-verdict-debate-over-bodily-autonomy-and-living-a-dignified-life/"&gt;accessible&lt;/a&gt; by simply changing one of the URL parameters. Following the accusation from UIDAI, CIS &lt;a href="http://tech.firstpost.com/news-analysis/uidais-questioning-of-cis-over-aadhaar-leaks-brings-the-sanctity-of-investigative-activities-into-question-377244.html"&gt;clarified&lt;/a&gt; that  the Aadhaar numbers along with other sensitive personal financial  information like bank account details were made available by government  websites themselves, putting a sizeable portion of Indian citizens at  risk of financial fraud.&lt;/p&gt;
&lt;p&gt;The &lt;a href="https://en.wikipedia.org/wiki/Press_Trust_of_India"&gt;Press Trust of India&lt;/a&gt; (India's largest news agency) &lt;a href="http://www.thehindubusinessline.com/news/national/unique-identification-authority-of-india-puts-posers-to-centre-for-internet-and-society-over-aadhaar-data-leak-claim/article9707647.ece"&gt;referred&lt;/a&gt; to it as a “flip-flop”, which was contested by researchers at CIS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Independent technology news platform Medianama &lt;a href="http://www.medianama.com/2017/05/223-uidai-cis-india-aadhaar/"&gt;reported&lt;/a&gt; that the accusation by the UIDAI is regrettably consistent with  previous actions in which they filed a case against a journalist for&lt;a href="http://www.medianama.com/2017/03/223-uidai-fir-aadhaar/" rel="bookmark" title="UIDAI files FIR against journalist for exposing flaws in Aadhaar enrolment"&gt; exposing flaws&lt;/a&gt; in Aadhaar's enrollment mechanism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A website called ‘&lt;a href="http://supportaadhaar.com/"&gt;Support Aadhaar&lt;/a&gt;‘ and its &lt;a href="https://twitter.com/SupportAadhaar"&gt;Twitter handle&lt;/a&gt; sought to collate opinions supporting Aadhaar and quell those speaking against it. However, most of their &lt;a href="http://supportaadhaar.com/facts-myths/"&gt;messages&lt;/a&gt; appear  to evade or deflect the concerns that critics have raised by touting  the benefits of the system and portraying critics as having a poor  understanding of the benefits of technology.&lt;/p&gt;
&lt;p&gt;Many Twitter users have also begun noticing patterns in the pro-Aadhaar posts:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, several critics of Aadhaar have repeatedly been trolled by anonymous handles on Twitter. These ‘sock puppet’ accounts seemed to be targeting those who criticise Aadhaar on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the most active trolls issued an open challenge to reveal their identity with just their Aadhaar number. Technology entrepreneur Kiran Jonnalagadda accepted the challenge and &lt;a href="https://medium.com/@jackerhack/inside-the-mind-of-indias-chief-tech-stack-evangelist-ca01e7a507a9"&gt;found that&lt;/a&gt; ‘@Confident_India’, one of the many anonymous troll Twitter handles, is Sharad Sharma, the co-founder and director of &lt;a href="http://ispirt.in/"&gt;iSPIRT Foundation&lt;/a&gt; (Indian Software Product Industry Roundtable), the software lobby that built the backbone of the Aadhaar ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sharma accidentally tweeted a denial from the troll account which has  since been deleted. He then tweeted again from his personal handle which  was captured.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iSPIRT &lt;a href="https://medium.com/@mtrajan/ispirt-response-to-kiran-jonnalagadda-3f977fb91df4"&gt;officially denied&lt;/a&gt; allegations  by Jonnalgadda that the “evidence presented is a deliberate misreading  of our intent to engage with those speaking against &lt;a href="https://en.wikipedia.org/wiki/India_Stack"&gt;India Stack&lt;/a&gt;.” India Stack is the digital infrastructure that has been built over Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But several other Twitter users have confirmed that Sharma's phone number is linked to ‘@Confident_India’. By their own admission, iSPIRT seemed to have an &lt;a href="https://thewire.in/137371/aadhaar-ispirt-trolling-sharad-sharma/"&gt;officially sanctioned project&lt;/a&gt; intended  to systematically challenge anti-Aadhaar campaigners in online  platforms. But they refuse to term these actions as “trolling”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Sharma later &lt;a href="https://thewire.in/139188/sharad-sharma-aadhaar-trolling/"&gt;made an apology for trolling&lt;/a&gt; and called it a “lapse of judgement”. CIS Executive Director Sunil Abraham seemed to appreciate the message. He tweeted: Bravo to &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/sharads"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;sharads&lt;/span&gt;&lt;/a&gt; for this! All of us at &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/cis_india"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;cis_india&lt;/span&gt;&lt;/a&gt; look fwd to collaborating with &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/Product_Nation"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;Product_Nation&lt;/span&gt;&lt;/a&gt; &amp;amp; &lt;a class="h-card customisable profile PrettyLink" dir="ltr" href="https://twitter.com/sharads"&gt;&lt;span class="PrettyLink-prefix"&gt;@&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;sharads&lt;/span&gt;&lt;/a&gt; to serve Indian s/w sector. &lt;a class="customisable link" dir="ltr" href="https://t.co/TEz0fxnloo" rel="nofollow noopener" target="_blank" title="https://twitter.com/sharads/status/866943195678035968"&gt;&lt;span class="u-hiddenVisually"&gt;https://&lt;/span&gt;twitter.com/sharads/status&lt;span class="u-hiddenVisually"&gt;/866943195678035968 &lt;/span&gt;…&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iSPIRT is an initiative which finds far-reaching support from several IT  industry leaders in India. What is worrying is that there is still no  clarification from iSPIRT on the identities of the other anonymous  trolls and their position on trolling against genuine concerns raised by  citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than a week after the trolling revelations, iSPIRT announced on its website, the results of an investigation carried out by an Internal Guidelines and Compliance Committee over the allegations against Sharma of operating the anonymous handles, ‘@Confident_India’ and ‘@Indiaforward2′. Jonnalgadda was one of the trolling victims who testified in the internal meeting. A summary of the investigation was posted bafflingly by the accused himself in which he says that project Sudham has been dissolved and that he has been told to not make public appearances on behalf of iSPIRT for four months while he remains Director and the face of the organisation. FactorDaily reported that iSPIRT members on the condition of anonymity said that Pallav Nadhani (Founder, Chief Executive, FusionCharts) and Naveen Tewari (Co-founder, InMobi) who quit iSPIRT were upset with their excessive focus on India Stack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One wonders whether this kind of behavior would be treated differently if it took place offline. Is intimidating those who appear to be ‘detractors’ the most effective way of dealing with criticism? Why is a software lobby taking it upon themselves to defend the idea of Aadhaar and India Stack through such means?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many are hoping that experts on both sides of the issue can find a way to debate questions around the privacy and security of Aadhaar's technology — that affect some 1.3 billion people — in a more democratic way.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system'&gt;http://editors.cis-india.org/internet-governance/news/global-voices-rohith-jyothish-may-31-2017-online-troll-attack-critics-of-indias-aadhaar-state-id-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T13:34:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/news/fixing-copyright-for-education-sccr34-side-event">
    <title>Fixing Copyright for Education (SCCR34 Side Event)</title>
    <link>http://editors.cis-india.org/a2k/news/fixing-copyright-for-education-sccr34-side-event</link>
    <description>
        &lt;b&gt;This event, hosted by Communia, EIFL, Creative Commons, and PIJIP, provided an overview of legal trends and developments concerning education, and presented the reality of education today. Anubha Sinha was a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The speakers described legal challenges faced by educators using new technologies, and discussed how copyright limitations and exceptions can be adapted to be fit for education in the digital age. It was held in Geneva as a side event at WIPO’s 34th Standing Committee on Copyright and Related Rights&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Speakers:&lt;/i&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Sean Flynn,&lt;/b&gt; Program on Information Justice and  Intellectual Property, American University Washington College of Law.  “Opening User Rights for Educational Uses.” &lt;a href="http://infojustice.org/wp-content/uploads/2017/05/Flynn-Empirical-Research-Impact-of-Copyright-User-Rights-in-Digital-Environment.pptx"&gt;Presentation&lt;/a&gt; | &lt;a href="http://infojustice.org/survey"&gt;Data&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Chichi Umesi,&lt;/b&gt; First Secretary, Mission Of Nigeria to the United Nations in Geneva. “The Importance of Education for Developing Countries.”&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Teresa Nobre,&lt;/b&gt; Legal Expert on Copyright, Communia. “Mapping Obstacles to Educational Uses in Europe.” &lt;a href="https://rightcopyright.eu/wp-content/uploads/2017/04/15casesin15countries_FinalReport.pdf"&gt;Final report&lt;/a&gt; | &lt;a href="https://rightcopyright.eu/wp-content/uploads/2017/04/15casesin15countries_infographics.pdf"&gt;Infographic&lt;/a&gt; | &lt;a href="http://infojustice.org/wp-content/uploads/2017/05/nobre-15-cases-in-15-countries-WIPO-presentation.pdf"&gt;Presentation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Delia Browne,&lt;/b&gt; Education Lead, Creative Commons  Australia / Director, National Copyright Unit (Schools and TAFEs)  Australia. “Tales from Australian Copyright Law Reform Debate.” &lt;a href="http://infojustice.org/wp-content/uploads/2017/05/Browne-Fix-Copyright-4-Education-An-Australian-Perspective.pptx"&gt;Presentation&lt;/a&gt; | Background documents: &lt;a href="http://www.smartcopying.edu.au/law-reform/myth-fair-use-would-harm-australian-authors"&gt;Myth: Fair use would harm Australian authors&lt;/a&gt; | &lt;a href="http://www.smartcopying.edu.au/law-reform/myth-fair-use-decimated-educational-publishing-in-canada"&gt;Myth: Fair use decimated educational publishing in Canada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Anubha Sinha&lt;/b&gt;, Centre for Internet and Society – India. “Access to Education Wins in Oxbridge Clash with Indian Photocopier.” &lt;a href="http://cis-india.org/a2k/publications/exceptions-limitations-education"&gt;Background document (by Lawrence Laing)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/news/fixing-copyright-for-education-sccr34-side-event'&gt;http://editors.cis-india.org/a2k/news/fixing-copyright-for-education-sccr34-side-event&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2017-06-07T00:48:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/economic-times-may-29-2017-bharat-joshi-bbmp-faces-ire-for-publishing-pourakarmikas-aadhaar-details-on-website">
    <title>BBMP faces ire for publishing pourakarmikas' Aadhaar details on website</title>
    <link>http://editors.cis-india.org/internet-governance/news/economic-times-may-29-2017-bharat-joshi-bbmp-faces-ire-for-publishing-pourakarmikas-aadhaar-details-on-website</link>
    <description>
        &lt;b&gt;The Bruhat Bengaluru Mahanagara Palike (BBMP) has published the Aadhaar details and other personal information of thousands of its pourakarmikas - civic workers who sweep streets and collect waste door-to-door.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This has angered activists who believe it could be misused. BBMP claims it was done to bring transparency in the city's solid waste management. &lt;i&gt;The article by Bharat Joshi was published in the &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/politics-and-nation/bbmp-faces-ire-for-publishing-pourakarmikas-aadhaar-details-on-website/articleshow/58889617.cms"&gt;Economic Times&lt;/a&gt; on May 29, 2017&lt;/i&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar number, provident fund number, employee state insurance  (ESIC) number and residential addresses of thousands of pourakarmikas  are available ward-wise on the civic body's website. ET accessed as many  as 4,215 Aadhaar numbers and 5,744 PF and ESI numbers of pourakarmikas  from 58 wards. The number could be much higher across the city's 198  wards. An ESI number grants access to personal details of an employee on  the esic.nic.in website, such as father's name and date of birth.  &lt;br /&gt; &lt;br /&gt; The city has over 30,000 pourakarmikas, most of them Dalit women and  employed by contractors. The disclosure of their Aadhaar numbers comes  at a time when the Modi administration's push for wider application of  the unique identification number has triggered a nationwide debate on &lt;a href="http://economictimes.indiatimes.com/topic/privacy" target="_blank"&gt;privacy&lt;/a&gt;.  &lt;br /&gt; &lt;br /&gt; "(Disclosure) happens because authorities don't read the law," Supreme  Court advocate KV Dhananjay said. "There is every possibility of  misuse, especially identity theft. What hackers do is they start  aggregating such information because the Aadhaar is used as a platform  for transfer of benefits. And with Aadhaar set to become the anchor for  many things, the BBMP should immediately remove those details."  &lt;br /&gt; &lt;br /&gt; A recent report by city-based Centre for Internet and Society flagged  four government agencies for publishing Aadhaar and other financial  data. It blamed the Unique Identification Authority of India (UIDAI) for  turning a blind eye to the lack of standards prescribed for how other  agencies deal with data, such cases of massive public disclosure and  "the myriad ways in which it could be used for mischief."  &lt;br /&gt; &lt;br /&gt; Earlier this month, UIDAI chief executive officer Ajay Bhushan Pandey  wrote to chief secretaries of all states, reminding them that publishing  an Aadhaar number is prohibited under Sections 29(2), 29(3) and 29(4)  of the Aadhaar Act, 2016. "Our intention was not to cause anyone any  harm," BBMP Joint Commissioner (solid waste management) Sarfaraz Khan  said. The idea was to prevent contractors from taking payments against  non-existent pourakarmikas. "We're also planning to make public details  of which exact street a pourakarmika is working on."  &lt;br /&gt; &lt;br /&gt; He added that he would discuss the disclosure with the Commissioner,  "If there is any violation, the Aadhaar numbers will be removed."  &lt;br /&gt; &lt;br /&gt; This points to the need for BBMP to have a policy on data and privacy,  said Vinay K Sreenivasa of the Alternative Law Forum. "Of what use is  an Aadhaar number to the BBMP? Names and photographs would have sufficed  to ensure transparency."  &lt;br /&gt; &lt;br /&gt; &lt;b&gt;ET Follow-up on Scare in Malleswaram&lt;/b&gt; &lt;br /&gt; BBMP Joint Commissioner Sarfaraz Khan was unaware that publishing  Aadhaar data is a punishable offence. However, the election wing of the  BBMP has ordered a probe after ET reported how a certain Hanumantharaju,  claiming to be a municipal official, collected Aadhaar details from  residents of the Atma KT Apartment in Malleswaram.  &lt;br /&gt; &lt;br /&gt; Residents also filed a complaint with the Malleswaram police. "We called  the man's mobile number but a woman picked up. Further investigation is  underway and BBMP is also checking its records," a police officer said.   &lt;br /&gt; &lt;br /&gt; Residents also plan to submit a representation to  Malleswaram MLA CN Ashwathnarayan. "We have taken this seriously and are  awaiting a report from the Malleswaram BBMP revenue office," Assistant  Commissioner (election) TR Shobha told ET.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/economic-times-may-29-2017-bharat-joshi-bbmp-faces-ire-for-publishing-pourakarmikas-aadhaar-details-on-website'&gt;http://editors.cis-india.org/internet-governance/news/economic-times-may-29-2017-bharat-joshi-bbmp-faces-ire-for-publishing-pourakarmikas-aadhaar-details-on-website&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-06T14:27:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/inc42-may-23-2017-shweta-modgil-sharad-sharma-aplogises-for-trolling-aadhaar-critics">
    <title>Sharad Sharma Apologises for Trolling Aadhaar Critics; Unmasking Ispirit's Controversial Trolling Program</title>
    <link>http://editors.cis-india.org/internet-governance/news/inc42-may-23-2017-shweta-modgil-sharad-sharma-aplogises-for-trolling-aadhaar-critics</link>
    <description>
        &lt;b&gt;Last weekend I was at Aditi Mittal’s standup comedy show in Mumbai where she made a cheeky remark that stayed with me – “Do you guys know what India’s soft power is today? It is trolling!” &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Shweta Modgil was &lt;a class="external-link" href="https://inc42.com/buzz/sharad-sharma-trolling-aadhaar/"&gt;published by Inc 42&lt;/a&gt; on May 23, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;While she was poking fun at the Snapchat-Snapdeal-Evan Spiegel controversy, in a bizarre coincidence those words came back to haunt me three days later. That was when one of biometric authentication system Aadhaar’s most vocal critics, Kiran Jonnalagadda, co-founder of Internet Freedom Foundation (IFF), an advocacy group, revealed in a series of tweets that @Confident_India, one of the anonymous accounts arguing in favour of Aadhaar and attacking its critics on Twitter, was being operated by none other than Sharad Sharma, the founder of software products think tank iSPIRT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the time, &lt;b&gt;Sharad had completely denied that he was tweeting from an anonymous account&lt;/b&gt;. But today, on Twitter, Sharad apologised for the anonymous trolling &lt;a class="external" href="https://twitter.com/sharads/status/866943195678035968/photo/1" rel="noopener noreferrer nofollow" target="_blank"&gt;on Twitter&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a tweet, Sharad stated that “There was a lapse of judgement on my part. I condoned tweets with uncivil comments. So I’d like to unreservedly apologise to everybody who was hurt by them.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added that “Anonymity seemed easier than propriety, and tired as I was by personal events and attacks on iSPIRT’s reputation, I slipped.” Furthermore, he stated that he would not be part of anything like this again or allow such behaviour to continue. He also revealed that an iSPIRT Guidelines and Compliance Committee (IGCC) has been set up to investigate the matter and recommend corrective action.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;On Catching a Troll&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On 17 May, Kiran tweeted out a revelation, which shook a lot of people – “Have we caught an Aadhaar troll?” Kiran used Twitter’s account reset option on Confident_India with Sharad Sharma’s number to see if it is was accepted. And, as per a screenshot posted by him, it did.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was further corroborated by many other Twitter users. Medianama’s Nikhil Pahwa (and co-founder of IFF) also confirmed the same, tweeting that the troll account does link to Sharad Sharma.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a &lt;a class="external-link" href="https://medium.com/@jackerhack/inside-the-mind-of-indias-chief-tech-stack-evangelist-ca01e7a507a9"&gt;detailed&lt;/a&gt; Medium post, Kiran then revealed how he investigated the rise of anonymous Twitter accounts and trolls responding to critics of Aadhaar. But what he revealed next was the shocking part – that at the 27th Fellows meeting of the think tank, a plan was hatched to respond to critics of India Stack which involved the use of trolls. A group called Sudham, created earlier, divided people who were broadcasting different views on Aadhaar, into different categories and then underlined various proposals on dealing with them. One of the groups called “archers” was entrusted to carry out the mainstream debate, while another group of “swordsmen” was entrusted to challenge people who were categorised as informed yet “trolling.” Swordsmen would do this by coordinating on WhatsApp with quick responses and in numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="http://editors.cis-india.org/home-images/WhatCanYoDo.jpg" alt="Trolled" class="image-inline" title="Trolled" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kiran got a hold of the presentation and also shared how one controversial slide also showed a detractor matrix.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is this slide which Kiran uses to illustrate the fact that: “ iSPIRT has an officially sanctioned trolling program where the trolls coordinate on WhatsApp and attack together on Twitter, exactly the behaviour seen in all the tweets above—and I’ve only covered the leader’s tweets. There are at least a dozen known troll accounts that attack in packs.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;First Denial&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Back when the information was first revealed, Sharad Sharma responded by denying that he was tweeting from the &lt;a class="external" href="https://twitter.com/Confident_India" rel="nofollow" target="_blank"&gt;@&lt;b&gt;Confident_India&lt;/b&gt;&lt;/a&gt; Twitter account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He further added that he was in for a family emergency in the US. And that he was clueless as to why his number was linked with that account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, interestingly, what roused the investigator’s suspicions was that Sharad shared the same denial from another troll account @indiaforward2 – which was captured by another Twitter user before it was deleted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The denial from Sharad’s true account came half an hour later. But the damage had been done and all fingers pointed in the direction of Sharad Sharma engaging in trolling from those accounts. Kiran then wrote another damning post on Sharad’s &lt;a class="external-link" href="https://medium.com/@jackerhack/sharad-sharmas-dubious-denial-b0b9aa6c6b8f"&gt;dubious denial&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As can be guessed, all the tweets related to this matter from Sharad’s and Indiaforward’s accounts have been deleted. The last tweet from Confident India’s account on 17 May professed that he is not Sharad Sharma.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, iSPIRT finally &lt;a class="external-link" href="https://medium.com/@mtrajan/ispirt-response-to-kiran-jonnalagadda-3f977fb91df4"&gt;responded&lt;/a&gt; to Kiran’s revelations on Medium –“We want to categorically state that the allegations against iSPIRT coordinating and/or promoting any troll campaign are false and the evidence presented is a deliberate misreading of our intent to engage with those speaking against India Stack.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The post further explained that in its Fellows meeting held in February and April 2017, it did address the issue of the chatter around India Stack. It says, “Our volunteer, Tanuj Bhojwani, led the discussion and we outlined our strategy for dealing with our detractors. The slide in question is clearly titled “Detractor Matrix.” The slide outlines how we classify those speaking against India Stack, and how we are engaging with them. We called one category of people “informed yet trolling (IYT),” a category of people deliberately misleading people, despite understanding the nuance behind the debate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The post admitted that the think tank encouraged volunteers to respond to these IYT Twitter handles directly from their own personal handles. However, at no point did it endorse or recommend anonymous trolling.&lt;br /&gt;&lt;br /&gt;“We are aware that some volunteers and their friends have created an anonymous campaign to Support Aadhaar. This is not a troll campaign, but an informational one. It is also not an iSPIRT campaign.”&lt;br /&gt;&lt;br /&gt;It concluded with: “Kiran’s motivated misrepresentation of the slides perhaps speaks to his biases against iSPIRT.” The post added that it plans to investigate the confusion around the alleged mobile number and account link and clarify all outstanding questions.&lt;br /&gt;&lt;br /&gt;Meanwhile coming back to trolling from where we started. Though Sharad’s apology did not say directly whether he operated the two Twitter accounts — @Confident_ India and @Indiaforward2 — which he was suspected of using for trolling- he signs off by saying that he requests “those who I have disappointed to look at this as an exception.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Aadhaar Controversy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While the series of incidents raises many doubts over an esteemed organisation such as iSPIRT, the controversy over Aadhaar, India’s massive biometric identification programme, has been raging for many months now.&lt;br /&gt;&lt;br /&gt;Over the last few months, it has come under fire for not addressing the privacy concerns of an individual and leaking individual data. Aadhaar critics have pointed out that it is more a mass surveillance tool, can lead to identity thefts, and linking basic services with it spells doom.&lt;br /&gt;&lt;br /&gt;&lt;a class="external-link" href="http://timesofindia.indiatimes.com/business/india-business/aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report/articleshow/58529002.cms"&gt;This month&lt;/a&gt;, a CIS (Centre for Internet and Society ) report revealed that Aadhaar numbers and personal information of as many as 135 million Indians could have been leaked from four government portals, due to lack of IT security practices. The report claimed that the absence of “proper controls” in populating the databases could have disastrous results as it may divulge sensitive information about individuals, including details about the address, photographs, and financial data. It also added that as many as 100 Mn bank account numbers could have been “leaked.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, on May 16, the CIS &lt;a class="external-link" href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof/view"&gt;updated its report&lt;/a&gt; and clarified that although the term ‘leak’ was originally used 22 times in its report, &lt;b&gt;it is at “best characterised as an illegal data disclosure or publication and not a breach or a leak.&lt;/b&gt;” It also claimed that some of its findings were “misunderstood or misinterpreted” by the media and that it never suggested that the biometric database had been breached.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, the Aadhaar-issuing authority UIDAI has asked CIS to explain its sensational claim that 13 crore Aadhaar numbers were “leaked” and provide details of servers where they are stored. The UIDAI also wants CIS to clarify what kind of “sensitive data” is still with the Centre or anyone else. The UIDAI has strongly denied any breach of its database and has asked CIS to provide details such as the servers where the downloaded “sensitive data” is stored.&lt;br /&gt;&lt;br /&gt;While the security of the above-mentioned Aadhaar data is still being debated, the government’s push towards making it compulsory across industries has become a major topic of debate in India.&lt;br /&gt;&lt;br /&gt;From linking bank accounts, to PAN numbers, to obtaining free gas connections under the Pradhan Mantri Ujjwala Yojana, to linking scholarships to linking Aadhaar numbers to social welfare schemes for electronically disbursing money to specific beneficiaries, or the Aadhaar-enabled Payment System (AEPS), the government has been pushing on with Aadhaar to make it a mandatory ID rather than the voluntary one it was envisaged to be originally. India still does not have a data protection and privacy law and making Aadhaar mandatory in such a country is not without risks.&lt;br /&gt;&lt;br /&gt;Given the fact that the UIDAI cannot afford to carry out authentication-based rollouts across schemes in haste as the failure rate of AEPS can lead to denial of direct benefits, it makes more sense to retain Aadhaar as a voluntary authenticator, at least until the government solves on-ground issues around Aadhaar-based authentication. Because any failure can erode public faith in Aadhaar as the beneficiary would not get his rightful ration over authentication failure— and, to that extent, in the government itself. So, for beneficiaries who depend on public distribution systems (PDS) for rice, sugar, kerosene or oil, authentication failure is a serious problem.&lt;br /&gt;&lt;br /&gt;It is to this effect that PILs (public interest litigation suits) have been filed in the Supreme Court stating that making Aadhaar compulsory is illegal and would virtually convert citizens into “slaves” as they would be under the government’s surveillance all the time. The Supreme Court had itself stated in August 2015 that Aadhaar cards will not be mandatory for availing benefits of government’s welfare schemes and had also barred authorities from sharing personal biometric data collected for enrollment under the scheme.&lt;br /&gt;&lt;br /&gt;Last month too, it lambasted the Narendra Modi-led BJP government at the Centre for making Aadhaar card a mandatory prerequisite to avail government services. The court will examine all applications against Aadhaar on June 27 2017, while the government remains steadfast on not extending the deadline of June 30 by which various schemes such as the grant of scholarships, Sarva Shiksha Abhiyan and various other social welfare schemes were to seek mandatory Aadhaar number.&lt;br /&gt;&lt;br /&gt;While the debate rages on, controversies keep on piling up. Recently, linking people living with HIV/ AIDS with Aadhaar cards has allegedly driven away patients from hospitals and antiretroviral therapy (ATR) centres in Madhya Pradesh. As per health department sources, the MP State AIDS Control Society made Aadhaar card number compulsory from February this year for those affected by the virus to get free medicines and treatment in accordance with the Central government’s policy making Aadhaar mandatory to avail benefits of any government scheme.&lt;br /&gt;&lt;br /&gt;However, this led to negative fallout as many patients and suspected victims started avoiding ATR centres and district hospitals after the new rule came into effect. The patients feared that the compulsory submission of Aadhaar card to get free medicines and medical check-ups could lead to the disclosure of their identity, inviting social stigma.&lt;br /&gt;&lt;br /&gt;While there is no denying the fact that, in a welfare state, technology can play a big role in enabling the state to hand out entitlements more efficiently and distribute public services at scale. But doing the same at the cost of an individual citizen’s privacy and resting it all on one mandatory number whose authentication is still not completely foolproof, is hardly the way a welfare state would like to operate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/inc42-may-23-2017-shweta-modgil-sharad-sharma-aplogises-for-trolling-aadhaar-critics'&gt;http://editors.cis-india.org/internet-governance/news/inc42-may-23-2017-shweta-modgil-sharad-sharma-aplogises-for-trolling-aadhaar-critics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-26T01:08:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/open-house-on-information-breaches">
    <title>Open house on information breaches</title>
    <link>http://editors.cis-india.org/internet-governance/news/open-house-on-information-breaches</link>
    <description>
        &lt;b&gt;On May 26, 2017 at the Has Geek open house participants discussed the state of information security in India the legal and regulatory measures that companies must comply with, and consumers should be aware of. Udbhav Tiwari was a speaker at the event organized by Has Geek in Bengaluru.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sandesh Anand–InfoSec professional at Cigital was the other speaker. Alok Prasanna Kumar, former Supreme Court advocate and Senior Resident Fellow at the Vidhi Centre for Legal policy, moderated the discussion. Udbhav spoke about Breach Notifications and the legal and regulatory positions  behind it in India. His presentation from the event can be found here: &lt;a href="https://goo.gl/51GDba"&gt;https://goo.gl/51GDba&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/open-house-on-information-breaches'&gt;http://editors.cis-india.org/internet-governance/news/open-house-on-information-breaches&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T00:41:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-times-of-india-may-24-2017-shalina-pillai-anand-j-ispirts-sharad-sharma-sorry-i-trolled-aadhaar-critics">
    <title>iSpirt's Sharad Sharma: Sorry, I trolled Aadhaar critics</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-times-of-india-may-24-2017-shalina-pillai-anand-j-ispirts-sharad-sharma-sorry-i-trolled-aadhaar-critics</link>
    <description>
        &lt;b&gt;Sharad Sharma, the man who is seen as one of the critical backbones of India's digital drive, profusely apologized on Tuesday for anonymously trolling those arguing for better privacy and security standards in Aadhaar.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shalina Pillai and Anand J was published in the &lt;a class="external-link" href="http://timesofindia.indiatimes.com/people/ispirts-sharad-sharma-sorry-i-trolled-aadhaar-critics/articleshow/58817320.cms"&gt;Times of India&lt;/a&gt; on May 24, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The apology came a few days after &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Kiran-Jonnalagadda"&gt;Kiran Jonnalagadda&lt;/a&gt;,  co-founder of developer community platform HasGeek and one of those who  were at the receiving end of the trolling, used internet tools to  discover the faces behind the trolling.   &lt;br /&gt; &lt;br /&gt; The trolls allegedly included several other members of iSpirt, the  software product association co-founded by Sharma and which leads  IndiaStack, a set of technologies that can be used to digitise many  everyday processes used by common people. The issue has divided India's  nascent startup community like never before, and coming soon after the  division over the arrest of &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Stayzilla"&gt;Stayzilla&lt;/a&gt; co-founder Yogendra Vasupal, there are many who now worry for the  ecosystem.This may also explain the apology by Sharma, who has been at  the forefront of building this ecosystem.   &lt;br /&gt; &lt;br /&gt; In the apology mail that he tweeted, Sharma said: "There was a lapse  of judgment on my part. I condoned tweets with uncivil comments. So I  would like to unreservedly apologise to everybody who was hurt by them.  Anonymity seemed easier than propriety, and tired as I was by personal  events and attack on iSpirt's reputation, I slipped. I won't be part of  anything like this again nor passively allow such behaviour to happen,  even in the worst of times."   &lt;br /&gt; &lt;br /&gt; &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Nandan-Nilekani"&gt;Nandan Nilekani&lt;/a&gt; tweeted in response to Sharma's apology that it was brave of him to do  so. Several others in iSpirt also backed Sharma after the public apology  . There was a surge of tweets in response to Sharma's and Nilekani's  tweets, some welcoming the turn of events and others saying it wasn't  enough. Jonnalagadda is among those who are not satisfied. "There were  several individuals at iSpirt behind these trolls and Sharma's apology  is not enough," he told TOI.   &lt;br /&gt; &lt;br /&gt; Aadhaar, aggressively pushed by the government, is being fiercely  questioned by privacy and security advocates. Though most of these  activists say they are asking for implementation of safeguards, the  Twitter hashtags used by some of them include #antiaadhaar,  #destroyaadhaar and #attackaadhaar, which seem to suggest they are  entirely opposed to the authentication mechanism.   &lt;br /&gt; &lt;br /&gt; Both sides have used intemperate and often abusive language on social  media -many using anonymous names. The latest flashpoint was a report by  the Centre for Internet and Society (CIS) released earlier this month  that said some 135 million Aadhaar numbers were leaked through  government databases. There have also been accusations that private  companies that verify Aadhaar credentials often get access to the full  Aadhaar information of individuals. These provoked the proAadhaar  trolls. Jonnalagadda, Nikhil Pahwa, co-founder of the Internet Freedom  Foundation, which works on issues including net neutrality, and free  expression and privacy on the internet, and Sunil Abraham of CIS were  under particular attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the iSpirt fellows and volunteers TOI spoke to had little  remorse. "I am not saying iSpirt should have done what it did. But I can  imagine why iSpirt reacted like this as we all have been under constant  personal attack for a year now," said an iSpirt fellow, who did not  want to be identified. Jas Gulati, co-founder and CEO at &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Nowfloats"&gt;Nowfloats&lt;/a&gt; and a volunteer at iSprit, said iSpirt was an open organisation. "Sharad was upfront about it and I think it's very positive."   &lt;br /&gt; &lt;br /&gt; The Aadhaar privacy advocates, including Jonnalagadda and Pahwa, are  clear they value iSpirt, but say it was undermining itself by its  actions. One pointed to a February meeting of iSpirt where they created a  programme called Sudham that distributed prominent Aadhaar critiques  into four quadrants -`Misinformed, fearful and engaging', `Informed,  fearful and engaging', `Misinformed and trolling' and `Informed and  trolling' -and assigned different members to deal with each quadrant.  Some of those who were assigned responsibilities appear to have taken  their job too seriously .   &lt;br /&gt; &lt;br /&gt; Pahwa told TOI, "The work done by the Product Nation initiative at  iSpirt is what makes it an important organization. But when people raise  questions of IndiaStack and Aadhaar, many in that team respond with  venom. iSpirt is unique, in that it is a thinktank that plays the role  of an activist and lobbyist with a high degree of influence with the  government and so they must develop processes for better governance,  transparency and accountability ."   &lt;br /&gt; &lt;br /&gt; Anand Venkatanarayanan, a senior engineer at &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/NetApp"&gt;NetApp&lt;/a&gt; and independent Aadhaar researcher, said iSpirt should not be judged  based on what Sharma did. "What we are trying to do is strengthen the  Aadhaar system. Currently, they do not even have a process to report  bugs. Large companies all have SOPs (standard operating procedures) to  deal with issues. UIDAI does not," he said, noting that his views are  personal and not that of his employer's.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-times-of-india-may-24-2017-shalina-pillai-anand-j-ispirts-sharad-sharma-sorry-i-trolled-aadhaar-critics'&gt;http://editors.cis-india.org/internet-governance/news/the-times-of-india-may-24-2017-shalina-pillai-anand-j-ispirts-sharad-sharma-sorry-i-trolled-aadhaar-critics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-26T00:13:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders">
    <title>Aadhaar Card: One Identity, Multiple Disorders</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders</link>
    <description>
        &lt;b&gt;It is still hazy to see the desperation of the union government to imposing the Aadhaar Card mandatory when matters related to Aadhaar Card are already sub judice. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was blog post by Gaurav Raj was &lt;a class="external-link" href="http://theindiasaga.com/politics-governance/aadhaar-card-one-identity-multiple-disorders"&gt;published by India Saga&lt;/a&gt; on May 25, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The constitutionality of Aadhaar is yet to be decided by the Supreme Court, however, the enrolment of Aadhaar has reached the mark of more than one billion. Recently, the government declared Aadhaar mandatory to file Income Tax Return (ITR) while the Supreme Court is opined not to treat Aadhaar mandatory, but voluntarily. Now it is imperative of the government to confide the citizens that the Aadhaar information- demography and biometrics-are in safe hands, a debate which has been heating up, and the contempt of the court’s decision by the government is for greater good. But the uproar against the speculation of identity revelation threat and possible misuse of Aadhaar details by the government-corporate nexus, plausible reasons to doubt the security of privacy, which is a fundamental right of Indian citizen. Ironically, after the Finance Minister Arun Jaitley defended the ‘Aadhaar Money Bill controversy’ filed by former congress MP Jairam Ramesh in the court, the Supreme Court is in dilemma and yet to decide whether ‘Right to Privacy' is a fundamental right or not.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why Aadhaar Card Mandatory?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nandan Nilekani, the co-founder of Infosys and the ideologue of Aadhaar, said that Aadhaar will change the PDS system in India since it ensures no ghost or fake beneficiaries to avail unentitled benefits of the various welfare schemes and subsidies. Nilekani also says that there might be margin of error up to 5 per cent in distributing the subsidies or benefits of various welfare schemes to the masses. The top-honcho technocrat has also defended Aadhaar that any breach of privacy of citizens is not possible as the Unique Identification Authority of India (UIDAI) is efficient to secure the public data under CIDR.&lt;br /&gt;&lt;br /&gt;The government claims that the corruption-mounted Public Distribution System (PDS) in India is reformed due to the introduction of the 12 digit unique identification number. More than 40000 crore have been saved in the form of exchequer due to curb of fake and ghost beneficiaries in the PDS system. Now if we believe Nilekani claim of 5% error, then more than 5 crore beneficiaries would be losing their benefits due the error in the biometric identification. The Infosys co-founder later said that if there is a margin of error then ‘One Time Password’ (OTP) comes in. However, he didn’t define what if there is a congestion of network in the remotest Indian villages where phone signals are rare? Standing on the PDS shop waiting for food grains and network, is certainly not an ideal way to avail the benefits of the government welfare schemes. In 2011, activist and writer Ruchika Gupta said in an interview to Tahalka, “The UID cannot address the bulk of delivery problems in the two of the biggest social sectors programmes like MGNREGA and PDS. Linking UID with social sector legislation is completely baseless.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;PAN Card Linked with Aadhaar Card?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The government has directed the Reserve Bank of India to make Aadhaar mandatory for Income Tax Return filing. Currently, there are approximately 24.37 crores PAN holders in India, however 3.8 crore people file income tax return every year. There have been cases of people owned not more than one but 100 PAN Cards with them. PAN cards in India are mostly used by the citizens as a proof of identity. The government believes that PAN card linking with Aadhaar will curb the tax evasion.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How Safe Is Your Data In This Panopticon Model Of Mass Surveillance?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the late 18th century, the well-known English social reformer and jurist Jeremy Bentham wanted to build a ‘panoptican’ for a mass surveillance of the prisoners in England. He advocated designing an institutional building be used to keep an eye on all the jail inmates by a single watchman. Very similarly, India is witnessing the biggest surveillance program ever under the name of single identity and availing benefits of governments’ schemes. Another logic behind enrolment of Aadhaar is the ‘national security’. National security? How can any government ensure national security backing Aadhaar, when international companies have been hired in consortium to collect residents’ biometric and demography details? In 2010, Accenture, Mahindra-Satyam Morpho and L1 identity solutions were pooled in by UIDAI for leveraging de-duplication exercise of Aadhaar and data collection.  L1 Identity Solutions’ top brasses are the former Director CIA George Tenet and former Homeland Security deputy secretary Adm James. With its headquarters in Connecticut, this company is one of the biggest defence contractors specialised in facial recognition and biometrics. L1 Identity Solutions and Accenture work in a close affinity to US intelligence agencies. This is an age of information. Corporate houses and big telecom players are dying to get details of consumers. Obvious are the concerns about the safety and security of the people’s data. It is feared that the database can be used for various marketing and business purposes.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;CIDR, A Single Database Of People’s Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Central Identities Data Repository (CIDR) is a data management and storing agency in India which is initiated for the Aadhaar project. It is regulated by the statutory body of Unique Identification Authority of India (UIDAI). This centralised database is probably one of the biggest repositories on this planet.&lt;br /&gt;&lt;br /&gt;In 2010, experts had claimed that more than a thousand government sites and portals were attacked more than 4000 times by China alone in one year. In April 2011, 77 million Sony Playstations and digital media delivery service Qriocity were hacked which resulted into a shutdown of the network for a week. The London School of Economics also reported that a central database of vulnerable to hacking and other terrorist and cyber crime activities. Recently Wannacry Ransomware virus hits the globe. More than 99 countries were affected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Building one single repository for billions of Aadhaar Card data seems to be a big risk in the most vulnerable country where dat breach is at most.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Leak Crisis&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;UIDAI has so far spent approximately 5982.62 crores for more than a billion enrolments of Aadhaar Cards. 1615.34 crores have been spent between the financial year 2015-2016. Centre for Internet and Society, Bengaluru-based organization (CIS) has learned that data of more than 130 million Aadhaar card holders has been leaked from four government websites. They are National Social Assistance Programme, National Rural Employment Guarantee Scheme, Chandranna Bima Scheme and Daily Online Payments Reports of NREGA. It also includes Bank details and other confidential details of millions of residents.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What is Next?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Lok Sabha has passed the Aadhaar Bill as Money Bill. Mukul Rohatgi said in the Supreme Court that according to Article 110 of the constitution, there is use of consolidated funds of India so the bill is a Money bill. Chief Justice Khehar said, “Your object might be good but whether it is a ‘Money Bill’ or not is the question.” Justice Ramana referred to a 2014 judgment passed by the Apex court that courts had no jurisdiction over procedurals matters of legislative.” In response P. Chidambram, the counsel for Jairam Ramesh said, “This petition is not about a procedural matter. There has been substantive infraction.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders'&gt;http://editors.cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-26T00:01:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/catch-news-may-25-2017-sharad-sharma-apos-case-shows-how-rampant-troll-culture-has-become-under-modi">
    <title>Sharad Sharma's case shows how rampant troll culture has become under Modi</title>
    <link>http://editors.cis-india.org/internet-governance/news/catch-news-may-25-2017-sharad-sharma-apos-case-shows-how-rampant-troll-culture-has-become-under-modi</link>
    <description>
        &lt;b&gt;Sharad Sharma's case shows how rampant troll culture has become under Modi.

&lt;/b&gt;
        &lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="https://in.news.yahoo.com/sharad-sharma-apos-case-shows-175500605.html"&gt;Catch News&lt;/a&gt; on May 25, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Noam Chomsky once said: “Propaganda is to a democracy what violence is to a dictatorship”.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;This  couldn't be more true than in the Indian context. Abusive right-wing  trolls, in this sense, can be seen as stormtroopers of the Narendra Modi  government.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;They  are no different from political goons, using every means at their  disposal – intimidation, abuse, hacking attempts, sexual harassment – to  silence voices that speak against the regime.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Try  tweeting about human rights violations in Kashmir or police atrocities  against in Bastar, invariably an anonymous troll will appear and call  you “anti-national”. Even criticising government schemes or raising  questions about industrial houses supposedly close to the government,  can invite abuse.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Some of the trolls are paid, some are ideologically driven while many are just plain frustrated.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;But  what happens when you come to know that the anonymous troll calling you  an ISI agent, is actually the high profile founder of a company working  with the government?&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Meet  Sharad Sharma, co-founder of iSpirt, a think tank that closely worked  with Aadhaar. Sharma has been exposed as the man behind the  twitter-handle @confident_India- that used to troll all Aadhar critics  on the micro-blogging website.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;He has apologised from his original twitter account, calling it “a lapse  of judgment” and that 'anonymity seemed easier than propriety'.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Through his anonymous twitter handle, Sharma constantly accused Center  for Internet and Society (CIS), of being foreign-funded and violating  the FCRA (Foreign Contribution Regulation Act) laws, without giving any  proof.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;In  a recently published study, CIS had alleged that Aadhaar numbers of  over 13 crore people and bank account details of about 10 crore people  were leaked through government portals due to to poor security measures,  putting them at risk of financial fraud and identity theft.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;accepted the data breach in the Supreme Court." data-reactid="36"&amp;gt;Later, the government &lt;a href="http://indianexpress.com/article/india/govt-admits-aadhaar-data-leak-critics-cite-civil-liberties-4639819/" rel="nofollow noopener" target="_blank"&gt;accepted &lt;/a&gt;the data breach in the Supreme Court.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Given  Sharma's proximity with the government, it is quite possible that he  was aware of the leaks himself. Yet to defend the government on social  media, he chose the FCRA card against CIS, providing a hint of what  could be in store for the public advocacy group.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Kiran  Jonnalagadda, founder of the Freedom Foundation, who first exposed that  it was Sharad Sharma anonymously using the @Confident_ India handle,  says that “FCRA threats are a way to stop people from questioning  Aadhar".&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;FCRA  seems to have been a useful tool for the NDA government against  organisations that question government policies. In April this year, the  government suspended registration of environmental advocacy NGO  Greenpeace. While the government is well within its right to use the  FCRA law against those who violate it, but if a law is used only against  those who speak against the regime, questions are likely to be raised.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;While  Sharma has apologised for trolling the government's critics by accusing  them of foreign exchange violations and being CIA stooges, there are  several handles that go to the extent of giving giving rape and death  threats to those who dare to speak against the establishment.&lt;/p&gt;
&lt;h4 class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;When PM follows trolls&lt;/h4&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Recently,  Trinamool Congress MP, Derek O’Brien accused Prime Minister Narendra  Modi of encouraging hatred by following people who run hate campaigns on  social media.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;“26  Twitter handles that give out rape threats, communal threats are  followed by the Prime Minister (Narendra Modi),” O‘Brien said in the  Rajya Sabha.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;In  a recently published book, “ I am a troll” journalist Swati Chaturvedi  has given an account of a former BJP volunteer Sadhavi Khosla who  alleged that the BJP's social media cell was responsible for putting  pressure on e-commerce company Snapdeal to drop actor Aamir Khan as its  brand ambassador after the latter made strong comments on the  intolerance issue.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;It  would be wrong to say that only BJP and Modi have (mis)used social  media trolls to harass their critics. Parties like AAP and Congress also  have a significant presence of anonymous twitter handles as well. But  pro-Modi trolls are unmatched in the kind of threats and abuse they  indulge in.&lt;/p&gt;
&lt;p class="Mt(0.8em)--sm Mb(0)--sm Mb(1.0em) canvas-text canvas-atom" style="text-align: justify; "&gt;Unfortunately,  trolls aren't taken to task for their behaviour. Even Sharma, after  being caught, received a pat on the back from none less than Nandan  Nilekani, for coming clean.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/catch-news-may-25-2017-sharad-sharma-apos-case-shows-how-rampant-troll-culture-has-become-under-modi'&gt;http://editors.cis-india.org/internet-governance/news/catch-news-may-25-2017-sharad-sharma-apos-case-shows-how-rampant-troll-culture-has-become-under-modi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-06-07T12:29:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager">
    <title>Zomato hack: You need to enhance online security with a password manager</title>
    <link>http://editors.cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager</link>
    <description>
        &lt;b&gt;Hacking incident at Zomato underlines need to employ different passwords for different accounts.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sanjay Kumar Singh was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/companies/zomato-hack-you-need-to-enhance-online-security-with-a-password-manager-117052201261_1.html"&gt;Business Standard&lt;/a&gt; on May 23, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, food-tech company &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zomato" target="_blank"&gt;Zomato &lt;/a&gt;suffered  a security breach where 17 million user records were stolen, including  email addresses and passwords. Such hacking incidents can have wider  consequences, including, in the gravest of scenarios, financial losses.  They emphasise the need for people to adopt newer protection mechanisms,  such as &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;managers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Zomato's case, the passwords are said to be hashed, which means they  were converted into unintelligible characters. However, experts say  that depending on the hashing protocol used, hashes can be re-engineered  to generate the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password.&lt;/a&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div style="float: left; "&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The hacking of one account can have wider ramifications. "By hacking one account, hackers get access to your email ID and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password.&lt;/a&gt; To save themselves the bother of remembering many passwords, users often use the same &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;in all their accounts. So, the hackers get access to your email and other accounts. Sometimes, they use your email account to reset the passwords in your other accounts," explains Shomiron Das Gupta of NetMonastery, a threat management provider. He adds that people often store sensitive information, including their net banking and credit card numbers and passwords within their email accounts. Also, on a website like Amazon, you can only view the last four digits of your credit card number. Other websites may not blur this information, in which case hackers would get access to this and other sensitive information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts recommend you create complex passwords and use different ones  for different accounts. Since generating complex passwords and  remembering them all is difficult, you should use a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager. Some of the good ones are LastPass, 1Password, Dashlane and TrueKey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;Password &lt;/a&gt;managers  can generate long and complex passwords that are difficult to  replicate. They also remember on your behalf the passwords on all the  sites and apps you use. Also, hackers sometimes steal passwords by  inserting a malware that copies keystrokes. Since a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager  inputs the password, you don't have to type them in, thereby doing away  with the risk of your keystrokes being captured and stolen.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="p-content"&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div style="float: left; "&gt;&lt;img align="left" alt="graph" class="imgCont" height="352" src="http://bsmedia.business-standard.com/_media/bs/img/article/2017-05/22/full/1495477165-3235.jpg" style="float: left; " title="graph" width="220" /&gt;&lt;/div&gt;
A &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager is a secure vault that stores all your passwords. You get access to the vault with a master &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password.&lt;/a&gt; Instead of remembering many passwords, you have to remember just one.&lt;/div&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Browsers like &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Google+Chrome" target="_blank"&gt;Google Chrome &lt;/a&gt;and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mozilla+Firefox" target="_blank"&gt;Mozilla Firefox &lt;/a&gt;also offer &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;managers. However, if you wish to use your &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager across browsers and apps, use a third-party one like those mentioned above. And while a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager  that is stored locally is safer, one that is cloud-based is more  convenient, since you can use it across devices having internet  connection. &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;Password &lt;/a&gt;managers also offer two-factor authentication. They either send a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;to your phone or generate it on your device. Unless your device also gets stolen, the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager is difficult to break into.&lt;/p&gt;
&lt;p&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for whether &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;managers  are themselves safe, experts concede they are a prime target for  hackers who know that the information stored within will be valuable.  "The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager is safe provided you set a strong master &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password.&lt;/a&gt; Your &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;should  have at least 13 characters of which two should be small, two should be  in capital, two should be random numbers, and two should be special  characters. Using a word that is not there in the dictionary will  enhance its strength. Keep changing your master &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;every  three-six months," says Udbhav Tiwari, policy officer at the Centre for  Internet and Society, Bengaluru. Since their primary job is to provide  security, most &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;managers do have strong security practices, he adds.&lt;/p&gt;
&lt;p&gt;&lt;span class="p-content"&gt;Most &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;managers offer a free account but you have to pay to use their advanced security features.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager'&gt;http://editors.cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-23T15:54:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack">
    <title>Chinese state media says U.S. should take some blame for cyber attack</title>
    <link>http://editors.cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack</link>
    <description>
        &lt;b&gt;"WannaCry is far and away the most severe malware attack so far in 2017, and the spread of this troubling ransomware is far from over". Since the global attack was launched on Friday, several thousand more computers were discovered to be infected, particularly in Asia as the work day began on Monday. "We've seen that the slowdown of the infection rate over Friday night, after a temporary fix around it, has now been overcome by a second variation the criminals have released".&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Ellis Neal was published in the &lt;a class="external-link" href="http://thevillagessuntimes.com/2017/05/21/chinese-state-media-says-u-s-should-take-some-blame-for/"&gt;Villages Suntimes&lt;/a&gt; on May 21, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Microsoft called the incident a "wake-up" call for governments and customers to take security seriously, but in a letter to the Times Sir David Omand, GCHQ director from 1996 to 1997, pins the blame squarely on the technology firm for failing to maintain support for its ageing Windows XP platform. If they wanted their files decrypted, the program said all they had to do was pay $300 worth of Bitcoin to the specified address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, a cyber security expert working with the Centre for Internet  and Society, Udbhav Tiwari working on vulnerabilities such as these,  said as most ATMs in the country especially of the public-sector banks  run on outdated operating systems, or are not updated regularly, they  can be easily compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When Microsoft sells its operating  system software it does so through a licence agreement that states the  company is not liable for any security breaches, thus shielding it from  any legal complaints, &lt;a href="https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/" target="_blank"&gt;points out&lt;/a&gt; Michael Scott, a professor at Southwestern Law School.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft  has blamed the U.S. government for creating the software code that was  used by hackers to launch the cyber-attacks. USA and European officials  did not rule out North Korea as a possible suspect in the cyberattack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://blogs.microsoft.com/on-the-issues/2017/05/14/need-urgent-collective-action-keep-people-safe-online-lessons-last-weeks-cyberattack/"&gt;In a blog post&lt;/a&gt;,  Microsoft admonished governments around the world for keeping software  vulnerabilities to themselves, instead of reporting them to the  developers. EternalBlue and DoublePulsar, two tools the NSA used to  infiltrate computer networks, were stolen from the agency and &lt;a href="https://techcrunch.com/2017/04/14/the-shadow-brokers-april-exploits-swift-windows/"&gt;leaked online in April as part of a massive data dump by the Shadow Brokers hacker group&lt;/a&gt;. An investigation is on-going regarding how the codes got out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  cyber experts have warned of a huge risk in near future as most  institutions and individuals in Bangladesh use pirated software. We can  not expect criminal hackers to be held accountable for their actions,  but we should hold our government agencies accountable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since  China and Russian Federation are two of the countries where a major  share of computers are running pirated Windows, these are also the  countries with the biggest rate of &lt;b&gt;WannaCry&lt;/b&gt; infections, as stated by F-Secure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Malware  cases have been spreading in recent years as the malicious software  trend has been gaining ground, with new forms of ransomware hitting the  scene.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack'&gt;http://editors.cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T01:12:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack">
    <title> Noida cyber cell gives tips on preventing WannaCry attack </title>
    <link>http://editors.cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack</link>
    <description>
        &lt;b&gt;The attackers targeted a weakness found in older versions of Microsoft Windows.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Juana McKenzie was published in the &lt;a class="external-link" href="http://theworldnewsjournal.com/2017/05/20/noida-cyber-cell-gives-tips-on-preventing-wannacry-attack/"&gt;World News Journal&lt;/a&gt; on May 20, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Since late last week, the WannaCry cyber scourge has blocked  customers the world over from accessing their data - unless they paid a  ransom using Bitcoin. Here's what you should do to protect yourself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third,  and perhaps more important: like the emperor's new clothes, even this  new-fangled ransomware isn't as sophisticated as it's cracked up to be.  If you're unsure about the legitimacy of something, delete it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When  Microsoft sells software it does so through a licensing agreement that  states the company is not liable for any security breaches, said Michael  Scott, a professor at Southwestern Law School.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It pays to know the proper file extensions that are available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If  you happen to come across files such as worklog.doc.exe, or  financial_statement.xls.scr, do not open them as the files are most  likely malicious.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;'And this most recent attack represents a  completely unintended but disconcerting link between the two most  serious forms of cyber security threats in the world today -  nation-state action and organised criminal action'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then there's the USA government, whose Windows hacking tools were &lt;a href="https://www.theguardian.com/media/2017/mar/07/wikileaks-publishes-biggest-ever-leak-of-secret-cia-documents-hacking-surveillance"&gt;leaked&lt;/a&gt; to the internet and got into the hands of cybercriminals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  a cyber security expert working with the Centre for Internet and  Society, Udbhav Tiwari working on vulnerabilities such as these, said as  most ATMs in the country especially of the public-sector banks run on  outdated operating systems, or are not updated regularly, they can be  easily compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No. This strain of ransomware was &lt;a href="http://www.reuters.com/article/us-cyber-attack-puzzle-idUSKCN18C12S" target="_blank"&gt;spread&lt;/a&gt; from device to device by taking advantage of an old security hole in some versions of Microsoft's Windows operating system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft &lt;a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx"&gt;released a patch for this vulnerability&lt;/a&gt; in March and, on the heels of the attack Friday, even took the unusual  step of releasing fixes for older versions of Windows that are no longer  supported, such as Windows XP, Windows Server 2013, and Windows 8. This  included the &lt;a href="https://arstechnica.com/security/2017/04/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet/" target="_blank"&gt;release&lt;/a&gt; of the patch in March and an update on Friday to &lt;a href="https://www.microsoft.com/en-us/windows/windows-defender"&gt;Windows Defender&lt;/a&gt; to detect the WannaCrypt attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As there are different types of ransomware, there is no single, easy solution to restore your computer if it has been &lt;a href="http://www.bbc.com/news/technology-39920141"&gt;infected&lt;/a&gt;.  Enterprises need to test patches before installing them to ensure that  they don't have compatibility issues with existing applications and  break existing workflows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security experts have hailed Microsoft's  decision to publicly call out the U.S. government and the NSA's  decision to stockpile cyberweapons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"As software has become ever  more complex, interdependent and interconnected, our reputation as a  company has in turn become more vulnerable", Gates &lt;a href="https://blogs.microsoft.com/on-the-issues/2017/05/14/need-urgent-collective-action-keep-people-safe-online-lessons-last-weeks-cyberattack/" target="_blank"&gt;wrote&lt;/a&gt; in an email to employees identifying trustworthy computing as  Microsoft's top priority. Such software will act as the first line of  defence by blocking auto downloads and actively scan for suspected  threats on the PC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The culprit was "ransomware" known as WanaCryptOr 2.0, or &lt;b&gt;WannaCry&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Europol  said a special task force at its European Cybercrime Centre was  "specially created to assist in such investigations and will play an  important role in supporting the investigation".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kaspersky said it  was seeking to develop a decryption tool "as soon as possible". If the  ransomware has locked your entire PC, as &lt;b&gt;WannaCry&lt;/b&gt; has done, combating it is more hard. Backups often are also out of date and missing critical information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cloud  storage services such as Google Drive, Microsoft OneDrive, Dropbox and  Box offer large amount of storage space for a monthly or yearly  subscription fee.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack'&gt;http://editors.cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T01:18:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
