<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 911 to 925.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/SuryapravaJune2.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/table-2.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/table-1.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/surveillancetechpic.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Abraham.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/SurveillanceinthenameofSecurity.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/copy_of_Surveillancetechgraph.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Surveillancetechgraph.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/surveillance-privacy-roundtable-invite.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/events/surveillance-privacy-roundtable"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/surveillance-and-privacy.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/home-images/SuryapravaJune2.jpg">
    <title>Suryaprava</title>
    <link>http://editors.cis-india.org/home-images/SuryapravaJune2.jpg</link>
    <description>
        &lt;b&gt;Suryaprava&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/SuryapravaJune2.jpg'&gt;http://editors.cis-india.org/home-images/SuryapravaJune2.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-06-04T04:23:54Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security">
    <title>Surveillance: Privacy Vs Security </title>
    <link>http://editors.cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security</link>
    <description>
        &lt;b&gt;The Foundation for Media Professionals is organizing a debate at the India International Centre, New Delhi on August 17, 2013. Shri Kapil Sibal will give the opening speech. Natgrid chief Raghu Raman is one of the debaters. Pranesh Prakash is participating in this event as a panelist.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This was &lt;a class="external-link" href="http://fmp.org.in/index.php/events"&gt;published by the Foundation for Media Professionals&lt;/a&gt; on their website. Also read the &lt;a class="external-link" href="http://fmp.org.in/index.php/events/eventDetail/51"&gt;blog post&lt;/a&gt; by Vivian Fernandes and Ninglun Hanghal.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the backdrop of the recent disclosures by US defense contractor Edward Snowden about the activity of the National Security Agency (NSA) and reports that NSA may have collaborated with India on surveillance program in the country that have raised concerns about privacy and right of citizens, Foundation for Media Professionals (FMP) in partnership with Friedrich Ebert Stiftung (FES) invited Pranesh Prakash to a panel discussion on "Surveillance: Privacy vs. Security".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Guest Speaker&lt;/b&gt;&lt;br /&gt;Kapil Sibal, Union Minister for Communications and Information Technology, Govt. of India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Panelists&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Pranesh Prakash, Policy Director, Centre for Internet and Society&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Dr. Usha Ramanathan, Independent Law Researcher&lt;/li&gt;
&lt;li&gt;Saikat Datta, Resident Editor, DNA&lt;/li&gt;
&lt;li&gt;Capt. Raghu Raman, National Intelligence Grid (Natgrid)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Moderator&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Paranjoy Guha Thakurta&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security'&gt;http://editors.cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-19T05:32:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/table-2.pdf">
    <title>Surveillance Technologies (Table 2)</title>
    <link>http://editors.cis-india.org/internet-governance/blog/table-2.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/table-2.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/table-2.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-05-09T10:22:41Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/table-1.pdf">
    <title>Surveillance Technologies (Table 1)</title>
    <link>http://editors.cis-india.org/internet-governance/blog/table-1.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/table-1.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/table-1.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-05-09T10:02:56Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/surveillancetechpic.jpg">
    <title>Surveillance Tec</title>
    <link>http://editors.cis-india.org/home-images/surveillancetechpic.jpg</link>
    <description>
        &lt;b&gt;Surveillance Tech&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/surveillancetechpic.jpg'&gt;http://editors.cis-india.org/home-images/surveillancetechpic.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-05-07T10:31:27Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Abraham.jpg">
    <title>Surveillance Talk</title>
    <link>http://editors.cis-india.org/home-images/Abraham.jpg</link>
    <description>
        &lt;b&gt;Surveillance Talk&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Abraham.jpg'&gt;http://editors.cis-india.org/home-images/Abraham.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-10-31T01:38:24Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats">
    <title>Surveillance rises, privacy retreats</title>
    <link>http://editors.cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats</link>
    <description>
        &lt;b&gt;WikiLeaks founder Julian Assange and former US National Security Agency contractor Edward Snowden have, at considerable personal cost, revealed how surveillance has eroded the private space in a world driven by digital technology.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/opinion/surveillance-rises-privacy-retreats-115041200669_1.html"&gt;Business Standard&lt;/a&gt; on April 12, 2015. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In India, the extent of surveillance became evident after Union human resource development minister &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Smriti+Irani" target="_blank"&gt;Smriti Irani &lt;/a&gt;walked into the trial room of a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Fabindia" target="_blank"&gt;FabIndia &lt;/a&gt;outlet  in Goa last week, only to discover closed-circuit television (CCTV)  cameras pointed towards the trial room. The country woke up to the  porous divide between privacy and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now, senior officials of FabIndia find themselves embroiled in a case of  voyeurism and seven of them have taken interim anticipatory bail from a  district court. They claim the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Cctv+Cameras" target="_blank"&gt;CCTV cameras &lt;/a&gt;were in the retail area, not the trial room.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The FabIndia incident might have blown the lid on how flimsily our  privacy is protected but there is no doubt that India is slowly but  surely moving towards a surveillance regime, both in the private and the  public spheres.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“After the Snowden episode, there are only two kinds of nations: Ones  that know they are being watched, and others that don’t,” said Pavan  Duggal, an advocate at the  Supreme Court of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite the surge in surveillance, there are hardly any specific laws governing this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A few laws&lt;/b&gt;&lt;br /&gt; In 2000, India enacted the Information Technology Act, primarily to  bring e-commerce under legal framework. After the Mumbai terrorist  attack in 2008, the Act was amended, to give the government sweeping  powers for mass surveillance.&lt;br /&gt; &lt;br /&gt; In the context of private surveillance, the 2008 amendment added two definitions: (a) communication device; (b) intermediary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A communication device, according to the law, means cell phones,  personal digital assistance, or a combination of both or any other  device used to communicate, send or transmit any text, video, audio, or  image. An intermediary was defined as any person who, on behalf of  another person, stores or transmits message or provides any service with  respect to that message.&lt;br /&gt; &lt;br /&gt; Rules regarding CCTV surveillance are governed by the IT Act, 2008, as  CCTVs are considered to be communication devices, with computerised  memory. However, the laws in relation to a communication device and  intermediary deal mostly with third-party data sharing.&lt;br /&gt; &lt;br /&gt; “&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Article+21" target="_blank"&gt;Article 21 &lt;/a&gt;of  the Constitution guards the right to privacy as a Fundamental Right. We  do not have an explicit Act in this regard, but Section 43A of the IT  Act, 2000, along with the IT Rules, 2011, protects data privacy in  India,” said Prashant Mali, a cyber law and cyber security lawyer.&lt;br /&gt; &lt;br /&gt; There were no amendments of the laws governing CCTVs.&lt;br /&gt; &lt;br /&gt; However, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Section+66e" target="_blank"&gt;Section 66E &lt;/a&gt;of  the IT Act, states: “Whoever, intentionally or knowingly, captures,  publishes or transmits, the image of a private area of any person,  without his or her consent, under circumstances violating the privacy of  that person, shall be punished with imprisonment, which may extend to  three years, or with a fine not exceeding Rs 2 lakh, or both, with  explanation.”&lt;br /&gt; &lt;br /&gt; “The IT Act is not a privacy enabling law. Hence, the challenges to  privacy in surveillance are not fully addressed in it,” said Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internationally, there are more stringent laws governing CCTV cameras.  For example, in the UK, there is a prescribed code. A person filmed by a  surveillance camera can seek the footage. In the US, too, there are  state-specific laws which prohibit the unauthorised installation or use  of cameras in private places, like restrooms and trial rooms.&lt;br /&gt; &lt;br /&gt; “Privacy laws must be compliant with international practices. Laws  governing CCTVs should be more comprehensive. It should not be specific  to voyeurism,” said Sunil Abraham, the executive director of  Bengaluru-based research organisation, the Centre for Internet and  Society.&lt;br /&gt; &lt;br /&gt; The government has been working on a Privacy (Protection) Bill, which  provides safeguards on personal data of individuals and sets conditions  under which surveillance is allowed. It is expected that the Bill will  lead to the creation of the offices of privacy commissioner and data  protection commissioner. However, it is mostly silent on laws governing  CCTV usage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In India, the concern over enacting privacy laws, implementing them and  our understanding of privacy are low, compared to the global context.  The Privacy Protection Bill, 2013 is pending before Parliament. When  this gets enacted, our laws would be at par with those in the West,”  said Mali. “But doubts remain about their implementation.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Government surveillance&lt;/b&gt;&lt;br /&gt; Amendments to the IT Act in 2008 gave the government wide powers of  interception, encryption and blocking. The amendment introduced Section  66A, which made sending “offensive” messages through a computer or any  other communication device, such as a cell phone or a tablet, a  punishable offense.&lt;br /&gt; &lt;br /&gt; The Supreme Court recently struck down the provision as infringing the constitutional right of freedom of speech.&lt;br /&gt; &lt;br /&gt; “Every nation is under the classical dilemma to balance national  security with privacy and freedom of expression. Always, when there is a  conflict between the two, national security wins hands down. However,  apart from international consensus, we need customise national  solutions,” said Duggal.&lt;br /&gt; &lt;br /&gt; Today, some of the biggest government projects based on the powers  vested to it under the IT Act. It has enabled the progression of  surveillance procedures like the Central Monitoring System (CMS) and  National Intelligence Grid (Natgrid), enabled through information on  Aadhar card or unique identification number.&lt;br /&gt; &lt;br /&gt; The CMS gives the government access to records of any mobile to landline  calls, to read private emails, texts, and even browsing history through  telecom operators. Natgrid could make the information available to  nearly 11 central agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is reported that the CMS can monitor close to 900 million people at  one go. There is neither confirmation nor denial from the government,”  said Duggal. However, compared to the US and China, that practice  blanket surveillance, India is still considered a low-surveillance  category nation.&lt;br /&gt; &lt;br /&gt; “India is still low on surveillance. In India, we have targeted  surveillance. At any given point in time, less than 200,000 phone calls  are being intercepted. Not more than a couple of lakh of surveillance  orders are given by both state and central governments,” said Abraham.&lt;br /&gt; &lt;br /&gt; Surely, with so many surveillance devices around,  it is a closely watched world like never before.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;SALIENT FEATURES ON PRIVACY IN THE IT ACT, 2008&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Communication Device: Cell phones, personal digital assistance, or  combination of both or any other device used to communicate, send or  transmit any text, video, audio, or image&lt;/li&gt;
&lt;li&gt; Intermediary: Any person, who on behalf of another person, stores or transmits messages or provides any service&lt;/li&gt;
&lt;li&gt; Sections 66A to 66F: Added to Section 66, prescribing punishment  for offences such as sending obscene messages, identity theft, cheating  by impersonation using computer resources, violation of privacy and  cyber terrorism&lt;/li&gt;
&lt;li&gt; Section 69: Amended to give power to the state to issue directions  for interception or monitoring or decryption of any information through  any computer resource&lt;/li&gt;
&lt;li&gt; Sections 69A and B: These grant power to the state to issue  directions for blocking public access of any information through any  computer resource and to authorise to monitor and collect traffic data  or information through any computer resource for cyber security.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats'&gt;http://editors.cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-05-02T06:43:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/SurveillanceinthenameofSecurity.jpg">
    <title>Surveillance in the name of Security</title>
    <link>http://editors.cis-india.org/home-images/SurveillanceinthenameofSecurity.jpg</link>
    <description>
        &lt;b&gt;Surveillance in the name of Security&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/SurveillanceinthenameofSecurity.jpg'&gt;http://editors.cis-india.org/home-images/SurveillanceinthenameofSecurity.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-12-11T13:47:11Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice">
    <title>Surveillance in India: Policy and Practice</title>
    <link>http://editors.cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice</link>
    <description>
        &lt;b&gt;The National Institute of Public Finance and Policy organized a brainstorming session on net neutrality on February 8, 2017 and a public seminar on surveillance in India the following day on February 9, 2017 in New Delhi. Pranesh Prakash gave a talk. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Pranesh presented a narrative of the current state of surveillance law, our knowledge of current surveillance practices (including noting where programmes like Natgrid, CMS, etc. fit in), and charted a rough map of reforms needed and outstanding policy research questions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Pranesh Prakash&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash is a Policy Director at - and was part of the founding team of - the Centre for Internet and Society, a non-profit organisation that engages in research and policy advocacy. He is also the Legal Lead at Creative Commons India and an Affiliated Fellow at the Yale Law School's Information Society Project, and has been on the Executive Committee of the NCUC at ICANN. In 2014, he was selected by Forbes India for its inaugural "30 under 30"​ list of young achievers, and in 2012 he was recognized as an Internet Freedom Fellow by the U.S. government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His research interests converge at the intersections of technology, culture, economics, law, and justice. His current work focuses on interrogating, promoting, and engaging with policymakers on the areas of access to knowledge (primarily copyright reform), 'openness' (including open government data, open standards, free/libre/open source software, and open access), freedom of expression, privacy, digital security, and Internet governance. He is a prominent voice on these issues, with the newspaper Mint calling him “one of the clearest thinkers in this area”, and his research having been quoted in the Indian parliament. He regularly speaks at national and international conferences on these topics. He has a degree in arts and law from the National Law School in Bangalore, and while there he helped found the Indian Journal of Law and Technology, and was part of its editorial board for two years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/workshop-on-net-neutrality"&gt;Click here&lt;/a&gt; to see the agenda for the brainstorming session on net neutrality.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video &lt;br /&gt; &lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/6KfyQ7y6TNE" width="560"&gt;&lt;/iframe&gt;&lt;/h3&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice'&gt;http://editors.cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2017-03-15T01:05:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/copy_of_Surveillancetechgraph.png">
    <title>Surveillance Graph</title>
    <link>http://editors.cis-india.org/home-images/copy_of_Surveillancetechgraph.png</link>
    <description>
        &lt;b&gt;Surveillance Graph&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/copy_of_Surveillancetechgraph.png'&gt;http://editors.cis-india.org/home-images/copy_of_Surveillancetechgraph.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-05-07T10:23:18Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Surveillancetechgraph.png">
    <title>Surveillance Graph</title>
    <link>http://editors.cis-india.org/home-images/Surveillancetechgraph.png</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Surveillancetechgraph.png'&gt;http://editors.cis-india.org/home-images/Surveillancetechgraph.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-05-07T10:20:42Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance">
    <title>Surveillance Camp: Privatized State Surveillance</title>
    <link>http://editors.cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance</link>
    <description>
        &lt;b&gt;This is the second in a series of posts mapping global surveillance challenges discussed at EFF’s Surveillance Camp in Rio de Janeiro, Brazil.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Katitza Rodriguez's blog post was &lt;a class="external-link" href="https://www.eff.org/deeplinks/2013/01/surveillance-camp-privatize-state-surveillance"&gt;published by the Electronic Frontier Foundation&lt;/a&gt; on their website on January 28, 2013. Elonnai Hickok is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In December 2012, EFF organized a&lt;a href="https://www.eff.org/issues/surveillance-human-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/issues/surveillance-human-rights"&gt;Surveillance and Human Rights Camp&lt;/a&gt; in Brazil that brought together the expertise of a diverse group of people concerned about state electronic surveillance in Latin American and other countries. Among other concerns, participants spotlighted the many ways in which the private sector is increasingly playing a role in state surveillance. Here are a few examples:&lt;/p&gt;
&lt;h3 class="western"&gt;Voluntary Agreements Between Law Enforcement and Private Companies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Often law enforcement agencies will approach companies asking for voluntary disclosure of information for investigative purposes. Those requests may look and sound more like &lt;a href="http://blog.privacylawyer.ca/2011/11/dealing-with-police-letters-of-request.html"&gt;threats&lt;/a&gt;, with a great deal of &lt;a href="http://blog.privacylawyer.ca/2011/11/police-pipeda-requests-for-customer.html"&gt;moral pressure&lt;/a&gt; applied on the companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This voluntary assistance remains out of the public eye and shrouded in secrecy, as notification of state access is never given to the individual concerned, is not codified in law, and is not clearly disclosed in the company's terms of service or user agreement. Currently there is minimal, if any, oversight over such voluntary cooperation, so the scope of assistance provided is not well-documented.&lt;/p&gt;
&lt;h4 class="western"&gt;Canada&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Canadian ISPs &lt;a href="http://www.canlii.org/en/on/onca/doc/2012/2012onca660/2012onca660.html"&gt;have jointly decided&lt;/a&gt; to provide identifying data about &lt;a href="http://www.cippic.ca/agents_of_the_state"&gt;Canadian Internet users&lt;/a&gt; to law enforcement in child exploitation investigations. In fact, &lt;a href="http://www.cba.org/cba/newsletters-sections/pdf/2011-11-privacy1.pdf"&gt;several Canadian ISPs&lt;/a&gt; have developed a formal protocol in conjunction with various law enforcement agencies to be used when those authorities are seeking identification information associated with a given IP address at a specific date and time. Since the adoption of this protocol, some ISPs have expanded their information sharing practices to cover customer identification data in other contexts, such as &lt;a href="http://www.cippic.ca/sites/default/files/AgentsoftheState-Roundtable_Presentation.ppt"&gt;online harassment cases&lt;/a&gt;.&lt;/p&gt;
&lt;h3 class="western"&gt;Law Enforcement Approaching Service Providers Without Legally-Required Authorization&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A growing concern is the number of law enforcement officers skirting the law by asking service providers to simply fork over information without any sort of search warrant. Even when legal procedures, such as a search warrant, exist, police increasingly request information without obtaining a legal authorization. Nevertheless, they often expect full compliance from service providers.&lt;/p&gt;
&lt;h4 class="western"&gt;Chile&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;In 2008, a Chilean website called&lt;a href="http://huelga.cl/"&gt; &lt;/a&gt;&lt;a href="http://huelga.cl/"&gt;Huelga.cl&lt;/a&gt; (“strike” in English) was approached by the Cyber Crime Section of the Chilean Police. The site is an online space for coordinating union actions. The agency demanded that the webmaster hand over data related to pseudonymous user accounts, such as IP addresses, records of previous connections, real names, and physical addresses. The targeted users had left comments on a website about an ongoing strike.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this case, because police did not have a court order to back up the request for information,&lt;a href="http://huelga.cl/"&gt; &lt;/a&gt;&lt;a href="http://huelga.cl/"&gt;Huelga.cl&lt;/a&gt; took a stand by resisting police pressure and refusing to hand over the data without a fight. For legal assistance, they turned to Derechos Digitales, a Chilean online human rights nonprofit organization, and managed to resist the request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another case, the Regional Director of the Chilean Department of Labor, the agency responsible for ensuring the enforcement of labor laws, sent&lt;a href="http://www.derechosdigitales.org/wp-content/uploads/Respuesta-a-DT.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.derechosdigitales.org/wp-content/uploads/Respuesta-a-DT.pdf"&gt;a letter&lt;/a&gt; to Huelga.cl simply demanding the removal of “inappropriate content” from their website along with the disclosure of user information, but it was only for administrative purposes as opposed to serious criminal investigations. Huegal.cl again &lt;a href="http://www.derechosdigitales.org/2010/09/20/huelga-cl-resiste-presion-de-direccion-del-trabajo-por-entregar-informacion-de-usuarios/"&gt;refused to&lt;/a&gt; comply and instead, made the director’s demands public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is not always the case that service providers can resist extralegal government requests, find legal advice or have enough economic resources to fight against those demands as Huelga.cl did. Huelga.cl should be praised for speaking up and managing to make the request from law enforcement public.&lt;/p&gt;
&lt;h3 class="western"&gt;Governments Pressure Private Sector&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Governments frequently impose heavy fines for non-compliance with their requests for data access. This form of coercion acts as a mechanism of enforcement over service providers and can raise serious concerns for free expression. The service provider is left with little incentive or option to resist illegitimate requests from the government when they are threatened with heavy fines.&lt;/p&gt;
&lt;h4 class="western"&gt;Brazil&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;In 2012, a judge from northern Brazil &lt;a href="http://diariodonordeste.globo.com/materia.asp?codigo=1028611"&gt;froze Google's accounts&lt;/a&gt; and imposed a fine on the company for refusing to remove three anonymous blogs or reveal contact details of the bloggers.  The content of the blogs &lt;a href="http://thenextweb.com/la/2011/08/20/google-fined-in-brazil-for-refusing-to-reveal-bloggers-identities/"&gt;state&lt;/a&gt;&lt;a href="http://thenextweb.com/la/2011/08/20/google-fined-in-brazil-for-refusing-to-reveal-bloggers-identities/"&gt;d&lt;/a&gt; the mayor of Varzea Alegre of corruption and embezzlement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While some companies might be able to withstand governmental pressure, alarms were raised that this won’t be the case for smaller companies that lack resources and influence. This is particularly true in contexts where heavy fines for noncompliance are written into legislation, and companies are not given legal avenues to appeal or fight the fine.&lt;/p&gt;
&lt;h3 class="western"&gt;Foreign Governments Access To Individuals’ Data in the Cloud&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Governments are increasingly seeking to negotiate access or interceptation capabilities to user data with companies that do not lie within their jurisdictions. This form of access is complicated because it is not always clear which country’s laws apply or to what extent. Because of the complex nature of these requests, governments often look for "easy" solutions that call for voluntary disclosure of information or simply allow full access to the user data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, government officials in India have been pushing  for real time interception capabilities for all BlackBerry services. In response to the demands from the Indian Government, after a number of unsatisfactory proposals, in 2012 RIM set up a NOC in &lt;a href="http://crackberry.com/rim-installs-blackberry-server-mumbai"&gt;Mumbai&lt;/a&gt;, providing security agencies with access to &lt;a href="http://articles.economictimes.indiatimes.com/2012-12-30/news/36063501_1_lawful-access-lawful-interception-vendors-blackberry-internet-service"&gt;BlackBerry Messenger services&lt;/a&gt;, and created a solution for access to Blackberry Internet Services. In addition to asking RIM for real time access to communications, the Government of India had required Service Providers in India to adopt the solution provided by RIM by end of 2012 or risk being shut down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Elonnai Hickok from the &lt;a href="http://editors.cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt; in Bangalore, India, the discussions between &lt;a href="http://articles.economictimes.indiatimes.com/2012-10-29/news/34798663_1_interception-solution-blackberry-interception-blackberry-services"&gt;RIM and the Indian Government&lt;/a&gt; is just one example of how governments are trying to negotiate their interests in light of the challenges posed by communications stored in the cloud and in multiple jurisdictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Internet is technically borderless, in reality, state actors impose their sovereignty onto online environments with increasing frequency. The &lt;a href="https://www.eff.org/document/cloudy-jurisdiction-addressing-thirst-cloud-data-domestic-legal-processes"&gt;exercise of sovereignty&lt;/a&gt; over shared spaces can subject individuals to the laws of another country without any awareness on their part that this has happened. This in effect transforms the surveillance efforts of one country into privacy risks for all the world’s citizens.&lt;/p&gt;
&lt;h3 class="western"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;State agencies and law enforcement are increasingly outsourcing investigations to private companies who are not under the same sort of judicial oversight as official law enforcement entities would be. The increasingly close and non-transparent connection between the private sector and law enforcement needs to be addressed, as it poses a risk to the rights and freedoms of the individual.  Of major concern to all Camp participants was the notion that private companies are routinely complying with the requests of law enforcement in the absence of due process. We encourage further research and documentation of this phenomenon. To highlight on this issue, we will be blogging next about the privatization of public security in Latin America.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance'&gt;http://editors.cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-01-29T06:51:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/surveillance-privacy-roundtable-invite.pdf">
    <title>Surveillance and Privacy Law Roundtable Invite</title>
    <link>http://editors.cis-india.org/internet-governance/blog/surveillance-privacy-roundtable-invite.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/surveillance-privacy-roundtable-invite.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/surveillance-privacy-roundtable-invite.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-08-25T09:24:31Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/events/surveillance-privacy-roundtable">
    <title>Surveillance and Privacy Law Roundtable </title>
    <link>http://editors.cis-india.org/events/surveillance-privacy-roundtable</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, COAI and Vahura invite you to a privacy roundtable at the India International Centre in New Delhi on September 1, 2014.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/surveillance-privacy-roundtable-invite.pdf" class="internal-link"&gt;Download the Invite &lt;/a&gt;(PDF, 1207 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recent legislative developments regarding privacy law in India&lt;/b&gt;&lt;br /&gt;In 2010, the European Union commissioned an assessment of the adequacy of Indian data protection laws in light of the transfer of personal data of European data subjects into India for processing. That assessment made adverse findings on the adequacy and preparedness of Indian privacy law to safeguard personal data. Consequently, in 2011, the Department of Personnel and Training (DoPT) proposed draft privacy legislation called the ‘Right to Privacy Bill, 2011’. The DoPT Bill contained provisions for the regulation of personal data, interception of communications, visual surveillance and direct marketing. Simultaneously, the Ministry of Communications and Information Technology issued the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 to give effect to section 43A of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Justice Shah Group of Experts on Privacy and the National Privacy Principles&lt;/b&gt;&lt;br /&gt;Aware of the need for privacy laws to enable economic growth, the Planning Commission constituted a Group of Experts under the chairmanship of Justice Ajit P. Shah to make specific proposals for future Indian privacy law. The Group of Experts submitted its Report to the Planning Commission in October 2012 wherein it proposed the adoption of nine National Privacy Principles. These are the principles of notice, choice and consent, collection limitation, purpose limitation, disclosure of information, security, openness, and accountability. The Report recommended the application of these principles in future privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Surveillance law in India&lt;/b&gt;&lt;br /&gt;The cases of &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of Uttar Pradesh&lt;/i&gt; (1963) and &lt;i&gt;Gobind&lt;/i&gt; v. &lt;i&gt;State of Madhya Pradesh&lt;/i&gt; (1975) first brought the questions of permissibility and limits of surveillance to the Supreme Court for judicial review. The regime governing the interception of telecommunications is contained in section 5(2) of the Indian Telegraph Act, 1885 read with rule 419A of the Indian Telegraph Rules, 1951. The Telegraph Rules were twice amended to give effect to certain procedural safeguards laid down by the Supreme Court in &lt;i&gt;PUCL&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; (1996). In addition, further subordinate legislation issued to fulfil the provisions of sections 69(2) and 69B(3) of the Information Technology Act permit the interception and monitoring of electronic communications to collect traffic data and to intercept, monitor, and decrypt such communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;About these roundtable consultations&lt;/b&gt;&lt;br /&gt;These roundtable consultations are hosted by the Centre for Internet &amp;amp; Society (CIS), COAI and Vahura. They are a series of national roundtables to focus on surveillance regulation and interception of communications in relation to telecom service providers, internet service providers, internet access providers, and internet-based service providers. These roundtables are designed to elicit comments on legal proposals to regulate surveillance. The text of these legal proposals has been drafted at CIS and continues to be modified to reflect the opinions and consensus at each roundtable consultation. The objective of these meetings is gain a stakeholder-based, participatory, and democratic consensus on the future of Indian surveillance and privacy law.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/events/surveillance-privacy-roundtable'&gt;http://editors.cis-india.org/events/surveillance-privacy-roundtable&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-08-25T15:08:33Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/surveillance-and-privacy.pdf">
    <title>Surveillance and Privacy </title>
    <link>http://editors.cis-india.org/internet-governance/blog/surveillance-and-privacy.pdf</link>
    <description>
        &lt;b&gt;Presented by Sunil Abraham at LirneAsia event on March 9, 2014 in Gurgaon.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/surveillance-and-privacy.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/surveillance-and-privacy.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-04-03T06:02:27Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
