<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 741 to 755.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/debating-ethics-dignity-and-respect-in-data-driven-life"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-wire-march-23-2016-reetika-khera-debate-five-aadhaar-myths-that-dont-stand-up-to-scrutiny"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-wire-may-19-2017-ajoy-ashirwad-mahaprahasta-debate-over-aadhaar-turns-nasty-as-critics-accuse-supporters-of-online-trolling"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/deadline-for-linking-bank-accounts-with-aadhaar-to-be-extended-to-31-march"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/ani-may-2-2018-data-usage-by-political-parties"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/data-retention-in-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/deccan-herald-january-20-2018-sunil-abraham-data-protection-we-can-innovate-leapfrog"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/data-protection-understanding-the-general-data-protection-regulation"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/data-protection-and-privacy-in-india-the-fundamental-right-way"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/india-legal-live-june-21-2018-data-privacy"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/data-privacy-forum"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/data-privacy-day-2016"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/data-privacy-day-2014"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/debating-ethics-dignity-and-respect-in-data-driven-life">
    <title>Debating Ethics: Dignity and Respect in Data Driven Life</title>
    <link>http://editors.cis-india.org/internet-governance/news/debating-ethics-dignity-and-respect-in-data-driven-life</link>
    <description>
        &lt;b&gt;Elonnai Hickok was a speaker in the panel "Move Slower and Fix Things" which was part of the 40th International Conference of Data Protection and Privacy Commissioners. The event was organized by International Conference of Data Protection and Privacy Commissioners (ICDPPC) from October 22 - 26, 2018 in Brussels. Elonnai participated in the event on October 24 and 25, 2018.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="https://www.privacyconference2018.org/en/conference/programme#day5"&gt;Click to read about the Programme here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/debating-ethics-dignity-and-respect-in-data-driven-life'&gt;http://editors.cis-india.org/internet-governance/news/debating-ethics-dignity-and-respect-in-data-driven-life&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-11-07T03:03:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-wire-march-23-2016-reetika-khera-debate-five-aadhaar-myths-that-dont-stand-up-to-scrutiny">
    <title>Debate: Five Aadhaar Myths that Don’t Stand Up to Scrutiny</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-wire-march-23-2016-reetika-khera-debate-five-aadhaar-myths-that-dont-stand-up-to-scrutiny</link>
    <description>
        &lt;b&gt;We need to reboot the Aadhaar debate by asking why we want to create a centralised biometric database of Indian residents in the first place.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Reetika Khera was published &lt;a class="external-link" href="http://thewire.in/2016/03/23/rebooting-the-aadhaar-debate-25578/"&gt;in the Wire&lt;/a&gt; on March 23, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A recent article, ‘&lt;span&gt;&lt;a href="http://thewire.in/2016/03/14/aadhaar-identification-simplified-myths-busted-24713/" target="_blank"&gt;&lt;span&gt;Identification simplified, myths busted’&lt;/span&gt;&lt;/a&gt;,&lt;/span&gt;&lt;span&gt; by Piyush Peshwani and Bhuwan Joshi (hereafter, Peshwani &amp;amp; Joshi) makes some questionable claims about the UID project. Peshwani &amp;amp; Joshi’s strategy appears to be to ignore those questions to which they do not have an answer (e.g., that Aadhaar is mostly redundant as far as NREGA, PDS, etc., are concerned). For others, they cherry-pick ‘facts’ without acknowledging the debates surrounding those facts. Here is a selection.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;#1: To get Aadhaar, you need a Proof of ID (PoID) and Proof of address (PoA)&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Peshwani &amp;amp; Joshi: “For many, Aadhaar is perhaps the first document of their existence – a robust proof of their identity and address that can be verified online. No more closed doors for them!”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Peshwani &amp;amp; Joshi: “The &lt;/span&gt;&lt;a href="https://uidai.gov.in/UID_PDF/Committees/UID_DDSVP_Committee_Report_v1.0.pdf" target="_blank"&gt;&lt;span&gt;&lt;span&gt;Demographic Data Standards and Verification Procedures committee&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt; prescribes a list of valid 18 proof of identity and 33 valid proof of address documents for getting an Aadhaar.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Fact&lt;/strong&gt;&lt;span&gt;: In fact, 99.97% of those who have Aadhaar, used PoID and PoA to get it. For those who have neither, there is an “introducer system”, but according to a reply to an RTI request, &lt;/span&gt;&lt;a href="http://thewire.in/2015/06/03/most-aadhar-cards-issued-to-those-who-already-have-ids-3108/" target="_blank"&gt;&lt;span&gt;&lt;span&gt;only 0.03% of those who have the Aadhaar number&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt; used this route.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;As far as closed doors are concerned, Aadhaar does not guarantee any benefits: work through NREGA, widow or old-age pensions or PDS rations. There are separate eligibility conditions for those programmes which continue to apply.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;#2 On costs&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Peshwani &amp;amp; Joshi: “Does it justify the cost? Yes, absolutely, &lt;/span&gt;&lt;a href="http://indianexpress.com/article/india/india-news-india/aadhaar-id-saving-indian-govt-about-usd-1-bln-per-annum-kaushik-basu/" target="_blank"&gt;&lt;span&gt;&lt;span&gt;according to the World Bank&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which said the initiative is estimated to be saving the Indian government about $1 billion annually by thwarting corruption, even as it underlined that digital technologies promote inclusion, efficiency and innovation.” &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Fact&lt;/strong&gt;&lt;span&gt;: Savings due to the use of Aadhaar have been disputed. The government has claimed it has saved Rs. 14,672 crore on LPG subsidies due to Aadhaar while they are likely lower – by a factor of 100 (see &lt;/span&gt;&lt;em&gt;&lt;a href="http://www.business-standard.com/article/economy-policy/aadhaar-linked-lpg-govt-says-rs-15-000-cr-saved-survey-says-only-rs-14-cr-in-fy15-116031800039_1.html"&gt;&lt;span&gt;&lt;span&gt;Business Standard&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/em&gt;&lt;span&gt; or &lt;/span&gt;&lt;em&gt;&lt;a href="http://blogs.wsj.com/indiarealtime/2016/03/21/is-the-indian-government-saving-as-much-as-it-says-on-gas-subsidies/" target="_blank"&gt;&lt;span&gt;&lt;span&gt;Wall Street Journal&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/em&gt;&lt;span&gt;). &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Peshwani &amp;amp; Joshi: “Even before the World Bank’s endorsement of Aadhaar, the Delhi-based National Institute of Public Finance and Policy (NIPFP) conducted a &lt;/span&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_uid_cba_paper.pdf" target="_blank"&gt;&lt;span&gt;&lt;span&gt;detailed cost-analysis study on Aadhaar&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in 2012… the study found that the Aadhaar project would yield an internal rate of return in real terms of 52.85% to the government.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Fact&lt;/strong&gt;&lt;span&gt;: The NIPFP cost-benefit was based on &lt;/span&gt;&lt;a href="http://www.epw.in/journal/2013/05/commentary/cost-benefit-analysis-uid.html" target="_blank"&gt;&lt;span&gt;&lt;span&gt;unrealistic assumptions&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt; – e.g., estimates of leakages that Aadhaar could plug were available for only two out of seven schemes; for the rest, they assumed leakage rates which are termed ‘conservative’, but are actually not.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In their response, the NIPFP &lt;/span&gt;&lt;span&gt;team&lt;/span&gt;&lt;span&gt; &lt;a href="http://www.epw.in/journal/2013/10/discussion/response-cost-benefit-analysis-uid.html" target="_blank"&gt;&lt;span&gt;admitted&lt;/span&gt;&lt;/a&gt; that “a full-fledged cost benefit analysis of Aadhaar is difficult” because “many gains from Aadhaar are difficult to quantify because they are intangible” and, “even if in specific schemes there may be tangible benefits, the information available on those schemes does not permit a precise quantification of those benefits.” &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;They went on to say that “The study has steered away from relying exclusively on analyses of isolated and small sample sets”. What evidence did the NIPFP study rely on? “For ASHAs, Janani Suraksha Yojana and scholarships, no analysis, large or small has been used. For the Indira Awaas Yojana, the three analyses relied on exclusively are a &lt;em&gt;Times of India&lt;/em&gt; news report, a press release based on a discussion in Parliament and a “Scheme Brief” by the Institute for Financial Management and Research (IFMR). Interestingly, the corruption estimate in the IFMR brief cross-refers to the Times of India article (apart from a CAG report)!” (&lt;/span&gt;&lt;a href="http://www.epw.in/journal/2013/10/discussion/nipfp-response.html" target="_blank"&gt;&lt;span&gt;&lt;span&gt;Khera, 2013&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;#3 De-duplication&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Peshwani &amp;amp; Joshi: “Aadhaar means no fake, ghost or duplicate beneficiaries. Double-dipping will become more and more difficult with Aadhaar, a number that is well de-duplicated with the use of biometrics.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Fact&lt;/strong&gt;&lt;span&gt;: De-duplication is one possible contribution of Aadhaar – but that needs biometrics, not a centralised biometric database. Local biometrics (used extensively in Andhra Pradesh before UID) mean that biometric data is stored by the concerned government department or on the local e-POS machine’s memory chip. It has the advantage that connectivity is not required (you are authenticated by the machine), errors and corrections can be correctly locally, making it more practical. The distinction between a local and centralised database is important (see #5 below). &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Further, no one has a reliable estimate of the duplication problem. Two government estimates of duplicates exist: the &lt;/span&gt;&lt;a href="http://petroleum.nic.in/docs/dhande.pdf" target="_blank"&gt;&lt;span&gt;&lt;span&gt;Dhande committee&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for LPG (2%) and in &lt;/span&gt;&lt;a href="http://scroll.in/article/747904/how-the-government-got-the-supreme-courts-approval-to-link-subsidy-schemes-with-aadhaar" target="_blank"&gt;&lt;span&gt;&lt;span&gt;NREGA job cards&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt; from the Government of Andhra Pradesh (also 2%).&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;#4 Exclusion&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Peshwani &amp;amp; Joshi: “As far as exclusion in delivery of other services due to biometric authentication accuracy is concerned, it is important to go beyond scratching the surface.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Fact&lt;/strong&gt;&lt;span&gt;: When the &lt;/span&gt;&lt;a href="http://www.governancenow.com/news/regular-story/ap-detects-glitches-aadhaar-linked-pds-distribution" target="_blank"&gt;&lt;span&gt;&lt;span&gt;PDS was integrated with Aadhaar&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;: “The Andhra Pradesh Food and Civil Supplies Corporation found that…nearly one-fifth ration card holders did not buy their ration.” Further, “When the government delved deeper in the issue, it was found that out of the 790 cases interviewed for the study, 400 reported exclusion. Out of the excluded cases, 290 were due to fingerprint mismatch and 93 were because of Aadhaar card mismatch. The remaining 17 cases were due to failure of E-PoS.” More &lt;/span&gt;&lt;a href="http://www.thehindu.com/opinion/op-ed/to-pass-biometric-identification-apply-vaseline-or-boroplus-on-fingers-overnight/article4200738.ece"&gt;&lt;span&gt;&lt;span&gt;here&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Moreover, Peshwani &amp;amp; Joshi pick one definition of ‘exclusion’ (due to biometric failure) when in fact, exclusion has a broader meaning. For instance, “In &lt;/span&gt;&lt;a href="http://www.ideasforindia.in/article.aspx?article_id=1599#sthash.dE8SWEik.dpuf" target="_blank"&gt;&lt;span&gt;&lt;span&gt;Chitradurga (Karnataka)&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, Rs.100-150 million in wages from 2014-15 were held up for a year. When payments were being processed, their job cards could not be traced in NREGAsoft. Upon enquiry, the district administration learnt field staff had deleted them to achieve ‘100% &lt;/span&gt;&lt;i&gt;&lt;span&gt;Aadhaar-&lt;/span&gt;&lt;/i&gt;&lt;span&gt;seeding’.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;#5 Profiling and privacy violations&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Peshwani &amp;amp; Joshi: “A prominent criticism of Aadhaar is that it ‘profiles’ people.” …“Most of us have one or more identity/address documents, such as a passport, ration card, PAN card, driving licence, vehicle registration documents or a voter ID card. The government departments managing these already have our data. Aadhaar is no different. We give our data to banks, to insurance companies and to telecom companies for accounts, policies and mobile connections.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Fact&lt;/strong&gt;&lt;span&gt;: That’s like saying BJP can be more corrupt because the Congress was corrupt. Instead we need to engage more seriously with the work of &lt;/span&gt;&lt;a href="http://www.business-standard.com/article/opinion/aadhaar-is-actually-surveillance-tech-sunil-abraham-116031200790_1.html" target="_blank"&gt;&lt;span&gt;&lt;span&gt;Sunil Abraham&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;,&lt;/span&gt; &lt;a href="http://www.dnaindia.com/scitech/column-are-we-losing-the-right-to-privacy-and-freedom-of-speech-on-indian-internet-2187527" target="_blank"&gt;&lt;span&gt;&lt;span&gt;Amber Sinha&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and others at the &lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles" target="_blank"&gt;&lt;span&gt;&lt;span&gt;Centre of Internet and Society&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. There are crucial differences between Aadhaar and Social Security Number in the US, see &lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number"&gt;&lt;span&gt;&lt;span&gt;this&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;a href="http://bostonreview.net/world/malavika-jayaram-india-unique-identification-biometrics" target="_blank"&gt;&lt;span&gt;&lt;span&gt;Malavika Jayaram&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt; listed the UID project among a slew of “big brother” projects facilitating mass surveillance in India.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The debate on UID tends to begin with the premise that Aadhaar is necessary for ‘good governance’. Those claims of the UIDAI have long been demolished. &lt;/span&gt;&lt;span&gt;In a nutshell, Aadhaar cannot help identify the poor, its possession does not guarantee inclusion into government social welfare (go to #1). &lt;/span&gt;&lt;span&gt;It cannot reduce PDS or NREGA corruption as claimed in their early documents. Thankfully, &lt;/span&gt;&lt;a href="http://www.thehindu.com/opinion/blogs/blog-datadelve/article6861067.ece" target="_blank"&gt;&lt;span&gt;&lt;span&gt;PDS&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;–&lt;/span&gt;&lt;a href="http://www.thehindu.com/opinion/op-ed/learning-from-nrega/article6342811.ece" target="_blank"&gt;&lt;span&gt;&lt;span&gt;NREGA&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt; corruption has been on the decline without Aadhaar – more needs to be done. (More details? Try &lt;/span&gt;&lt;a href="http://www.ideasforindia.in/article.aspx?article_id=250" target="_blank"&gt;&lt;span&gt;&lt;span&gt;this&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://www.epw.in/journal/2011/09/perspectives/uid-project-and-welfare-schemes.html" target="_blank"&gt;&lt;span&gt;&lt;span&gt;this&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.)&lt;/span&gt;&lt;/p&gt;
&lt;div class="aligncenter wp-caption" id="attachment_25580" style="text-align: justify; "&gt;&lt;a href="http://i1.wp.com/128.199.141.55/wp-content/uploads/2016/03/Reduction-in-leakages-graphic.jpg"&gt;&lt;img class="wp-image-25580 size-full" width="880" alt="Bihar shows how much corruption in the PDS can be reduced without Aadhaar. Credit: Reetika Khera" height="516" src="http://i1.wp.com/128.199.141.55/wp-content/uploads/2016/03/Reduction-in-leakages-graphic.jpg?resize=917%2C538" /&gt;&lt;/a&gt;
&lt;p class="wp-caption-text"&gt;Bihar shows how much corruption in the PDS can be reduced without Aadhaar. Credit: Reetika Khera&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aadhaar is not required for &lt;/span&gt;&lt;a href="http://indiatogether.org/core-pds-smart-system-in-raipur-chhattisgarh-food-security-portability-government" target="_blank"&gt;&lt;span&gt;&lt;span&gt;portability&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of benefits or for cash transfers. Cash transfers need bank accounts. To get a bank account, you need a proof of ID and a proof of address (go to #1). &lt;/span&gt;&lt;span&gt;Aadhaar can help de-duplicate, but so can local biometrics (go to #3). &lt;/span&gt;&lt;span&gt;We need to “reboot” the Aadhaar debate, starting on the right terms – why exactly do we need to create a centralised biometric database of Indian residents?&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-wire-march-23-2016-reetika-khera-debate-five-aadhaar-myths-that-dont-stand-up-to-scrutiny'&gt;http://editors.cis-india.org/internet-governance/news/the-wire-march-23-2016-reetika-khera-debate-five-aadhaar-myths-that-dont-stand-up-to-scrutiny&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-01T15:48:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-wire-may-19-2017-ajoy-ashirwad-mahaprahasta-debate-over-aadhaar-turns-nasty-as-critics-accuse-supporters-of-online-trolling">
    <title>Debate over #Aadhaar Turns Nasty as Critics Accuse Supporters of Online Trolling</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-wire-may-19-2017-ajoy-ashirwad-mahaprahasta-debate-over-aadhaar-turns-nasty-as-critics-accuse-supporters-of-online-trolling</link>
    <description>
        &lt;b&gt;Internet Freedom Foundation’s Kiran Jonnalagadda has alleged that iSPIRT and its co-founder Sharad Sharma set up fake Twitter profiles to harass, intimidate Aadhaar critics.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Ajoy Ashirwad Mahaprahasta was published in the &lt;a class="external-link" href="https://thewire.in/137371/aadhaar-ispirt-trolling-sharad-sharma/"&gt;Wire&lt;/a&gt; on May 19, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;As bizarre as this may sound, one of  the founders of the Indian Software Products Industry Round Table  (iSPIRT) – an influential think-tank closely associated with the Unique Identification Authority of India (UIDAI) – Sharad Sharma, is battling allegations of trolling anti-Aadhar campaigners through fake Twitter profiles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kiran Jonnalagadda, one of the  founders of Internet Freedom Foundation (IFF), has alleged that a number  of fake profiles started to troll him online earlier this month in  response to his criticism of Aadhar on Twitter. Surprisingly, he said,  one of the profiles  –&lt;a href="https://twitter.com/Confident_India" rel="external nofollow" target="_blank" title="@confident_India"&gt;@confident_India&lt;/a&gt; – which trolled him was apparently operated by Sharma, considered highly influential within the IT and start-up industry and a governing council member of iSPIRT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is iSPIRT?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2013, a group of volunteers working with NASSCOM founded iSPIRT to represent the software products industry independently. It  is widely known that many of these same volunteers also helped the  UIDAI develop much of the initial Aadhaar infrastructure and ecosystem. &lt;a href="http://www.forbesindia.com/article/special/is-ispirt-an-alternative-to-nasscom/34763/1" rel="external nofollow" target="_blank" title="According to Forbes India"&gt;According to Forbes India&lt;/a&gt;, iSPIRT helps Indian software product companies “draft  and take policy proposals to government officials; create reusable  ‘playbooks’ from successful companies that can be applied by others; and  create ‘self-help communities’.” &lt;a href="http://www.ispirt.in/Our-Industry/SPI" rel="external nofollow" target="_blank" title="It aims to facilitate"&gt;It aims to facilitate&lt;/a&gt; Indian software product companies, which build affordable and  innovative technologies, get a footprint in sectors like health,  education, infrastructure and create conditions so that they get an  equal platform to compete with big multinationals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this mission, iSPIRT believes that  Aadhaar-based technologies, which Indian software product companies may  create, could help the Indian software product industry gain an  advantage over multinationals, which may be skeptical about using  Aadhaar. In other words, iSPIRT, one of the biggest advocates of  Aadhaar, sees a commercial advantage to the increasing use of Aadhaar  for many of the entrepreneurs associated with the Round Table. To this  end, iSPIRT runs two initiatives – ProductNation and IndiaStack, a  collection of open APIs for technology infrastructure projects like UPI  and Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the mission may sound fine,  many of the Aadhaar advocates within iSPIRT have had to face questions  from civil society, most of which have to do with the suspicion that  Aadhaar could compromise online privacy. This, over the past few months, has led to heated social media battles between iSPIRT and anti-Aadhaar campaigners.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  the debate took a darker  turn when Jonnalagadda uploaded a video showing that the  @Confident_India Twitter handle could be traced back to Sharma’s  personal mobile phone number on Twitter. Sharma, has since then,  apparently changed his number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It was only when I started to grow  suspicious of the handle that I thought of using Sharma’s phone number  to verify the account,” Jonnalagadda tells &lt;i&gt;The Wire. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;a href="https://medium.com/@jackerhack/inside-the-mind-of-indias-chief-tech-stack-evangelist-ca01e7a507a9" rel="external nofollow" target="_blank" title="an article  – “Inside the mind of India’s chief tech stack evangelist” – where he narrates the events"&gt;an article  – “Inside the mind of India’s chief tech stack evangelist” – where he narrates the events&lt;/a&gt;, he says “a flurry of newly created Twitter trolls accounts began heckling me about Aadhaar”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Around 10 such handles started making  unprovoked attacks on Jonnalagadda and another founder of IFF, Nikhil  Pahwa, accusing them of being guided by “greed, profit, and deceit” for  being in the “#AntiAadhaar brigade.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the argument continued, @confident_India called Jonnalgadda “pretentious” mouthing “highfalutin stuff” and “techno-babble”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“All these did not perturb me as it was a part of routine arguments,” says Jonnalagadda.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in what he calls a  “lightbulb moment”, he had the first inkling that Sharma could be  operating the account of @confident_India through this thread:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="https://i0.wp.com/thewire.in/wp-content/uploads/2017/05/Thread-1.png?ssl=1" class="shrinkToFit" height="659" src="https://i0.wp.com/thewire.in/wp-content/uploads/2017/05/Thread-1.png?ssl=1" width="520" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://i0.wp.com/thewire.in/wp-content/uploads/2017/05/Thread-1.png?ssl=1"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;“&lt;/b&gt;Sharad Sharma’s original  account doesn’t follow any of these people on the thread. The  conversation would not have shown on his timeline. Yet both  @confident_India and Sharad Sharma made the same argument,” says  Jonnalagadda.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then, he says, Sharma gave it out. A question addressed to Sharad Sharma ended up being answered by @confident_India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="https://i1.wp.com/thewire.in/wp-content/uploads/2017/05/Thread-2.png?ssl=1" class="shrinkToFit" height="659" src="https://i1.wp.com/thewire.in/wp-content/uploads/2017/05/Thread-2.png?ssl=1" width="393" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;@Confident_India also went on a tirade  against the IFF fellows and called them “JNUtype”, “ISISstooge” or  belonging to Lutyens Delhi, insinuating that the IFF fellows are  terrorists or largely belong to a certain social elite category of  people. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;img alt="https://i1.wp.com/thewire.in/wp-content/uploads/2017/05/Thread-3.png?ssl=1" class="shrinkToFit" height="659" src="https://i1.wp.com/thewire.in/wp-content/uploads/2017/05/Thread-3.png?ssl=1" width="514" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;When this prompted Jonnalagadda to  verify the account with Sharma’s number, it matched. He later posted the  video on his account. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;An email from &lt;i&gt;The Wire&lt;/i&gt; to Sharad Sharma remained unanswered at the time of writing. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However, soon after this alleged  expose kicked off a Twitter war between the two groups, Sharad responded  with a reply to Nikhil Pahwa’s tweet. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;img alt="https://i1.wp.com/thewire.in/wp-content/uploads/2017/05/Screen123.png?ssl=1" src="https://i1.wp.com/thewire.in/wp-content/uploads/2017/05/Screen123.png?ssl=1" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;iSPIRT also responded in various online forums. &lt;/span&gt;&lt;span&gt;“Sharad  Sharma, co-founder of iSPIRT, named in these allegations is in the US  for a medical emergency in his family. As of this morning, Eastern  Standard Time, Sharad has categorically denied these allegations. We  will further investigate the confusion around the alleged link of mobile  number and clarify all outstanding questions. For the moment, we are  prioritising the well-being of Sharad and his family,” &lt;/span&gt;&lt;a href="https://medium.com/@mtrajan/ispirt-response-to-kiran-jonnalagadda-3f977fb91df4" rel="external nofollow" target="_blank" title="says the organisation’s response"&gt;&lt;span&gt;says the organisation’s response&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“We want to categorically state that  the allegations against iSPIRT coordinating and/or promoting any troll  campaign are false and the evidence presented is a deliberate misreading  of our intent to engage with those speaking against India Stack” it  added. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Interestingly, however, what has  emerged out of the controversy is another allegation by the IFF that  iSPIRT had made trolling part of its policy to counter  Aadhaar’s “detractors.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;At a fellows meeting earlier this  year in February, iSPIRT charted out a “Detractors Matrix” in which they  categorised the anti-Aadhar campaigners into four categories, namely  “misinformed, fearful, and engaging”, “informed, fearful and engaging”,  “misinformed and trolling” and lastly, “informed yet trolling”. &lt;/span&gt;&lt;span&gt;In an internal iSPIRT presentation, &lt;a href="https://thewire.in/author/reetika-khera/" rel="noopener noreferrer" target="_blank" title="Reetika Khera"&gt;Reetika Khera&lt;/a&gt;,  IIT professor and a renowned economist, and Nikhil Pahwa, IFF’s  co-founder were shown as belonging to the last two categories. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;To counter Aadhaar critics on online  platforms, iSPIRT volunteers intended to group themselves into “archers”  and “swordsmen” who would challenge their theories on Twitter and  elsewhere.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;img alt="https://i2.wp.com/thewire.in/wp-content/uploads/2017/05/unnamed.png?ssl=1" src="https://i2.wp.com/thewire.in/wp-content/uploads/2017/05/unnamed.png?ssl=1" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;iSPIRT has acknowledged discussing  the “detractor matrix” in its reply to the allegation but dismissed it  being equivalent to trolling, as Jonnalagadda alleges. &lt;/span&gt;&lt;span&gt;Co-founder  of iSPIRT, ThiyagaRajan Maruthavanan, while responding to allegations  said that there was no official involvement on behalf of iSPIRT.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CIS allegations&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many of the pro-Aadhaar Twitter trolls, most noticeably  Confident_India, have also lashed out at other Internet rights  organisations. This includes the Bangalore-based Centre for Internet and  Society (CIS) which last month released &lt;a href="https://thewire.in/130948/aadhaar-card-details-leaked/" rel="noopener noreferrer" target="_blank" title="a report that claimed"&gt;a report that claimed&lt;/a&gt; that over 100 million Aadhaar numbers were publicly exposed by four  government websites. The Confident_India Twitter handle has &lt;a href="https://twitter.com/Confident_India/status/860461256393621506" rel="external nofollow" target="_blank" title="alleged"&gt;alleged&lt;/a&gt; that CIS has violated foreign funding regulations (under the Foreign  Contributions Regulations Act), that they are likely “funded by ISI” and  that because of their “advocacy efforts”, the organisation should be  shut down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should be noted that the Unique Identification Authority of India has also sent a sharp letter to CIS over its report and has suggested that some of the Aadhaar data that the report documented could not have been gotten through legal means.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-wire-may-19-2017-ajoy-ashirwad-mahaprahasta-debate-over-aadhaar-turns-nasty-as-critics-accuse-supporters-of-online-trolling'&gt;http://editors.cis-india.org/internet-governance/news/the-wire-may-19-2017-ajoy-ashirwad-mahaprahasta-debate-over-aadhaar-turns-nasty-as-critics-accuse-supporters-of-online-trolling&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T13:09:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth">
    <title>Dear Milind Deora, Prakash Javadekar Deserved The Truth</title>
    <link>http://editors.cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth</link>
    <description>
        &lt;b&gt;Milind Deora, the Minister of State for Communications, Information Technology and Shipping, isn’t your typical politician.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Rohin Dharmakumar was &lt;a class="external-link" href="http://forbesindia.com/blog/technology/dear-milind-deora-prakash-javadkar-deserved-the-truth/"&gt;published in Forbesindia Magazine &lt;/a&gt;on August 22, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;At just 36, he’s way younger than the average cabinet minister (&lt;a href="http://articles.timesofindia.indiatimes.com/2010-08-29/india/28316521_1_average-age-median-age-prime-minister"&gt;64&lt;/a&gt;) or Member of Parliament (&lt;a href="http://articles.timesofindia.indiatimes.com/2009-05-18/india/28196750_1_congress-mp-average-age-15th-lok-sabha"&gt;53&lt;/a&gt;). He’s also richer (&lt;a href="http://myneta.info/unionministers2011/candidate.php?candidate_id=76"&gt;Rs.17.5 crore&lt;/a&gt; compared to &lt;a href="http://www.firstpost.com/politics/parliament-at-60-how-rich-are-our-netas-311074.html"&gt;Rs.5.3 crore&lt;/a&gt; for the average M.P.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He’s got his own website - &lt;a href="http://www.milinddeora.in/"&gt;www.milinddeora.in&lt;/a&gt; -  which unlike most of his peer’s websites, is fairly well-designed and  constantly updated. He’s also an avid user of social networks like  Twitter (&lt;a href="https://twitter.com/milinddeora"&gt;@milinddeora&lt;/a&gt;) and &lt;a href="https://www.facebook.com/milind.deora.14"&gt;Facebook&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Oh, he’s also a Blues fan and a &lt;a href="http://blogs.wsj.com/indiarealtime/2011/05/11/mp-milind-deora-shreds-on-blues-guitar/"&gt;pretty good&lt;/a&gt; guitarist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, he’s the kind of politician or minister many Indians would like to vote for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And vote they do, in fact. Deora’s won the Mumbai (South) parliamentary constituency two times in a row, garnering &lt;a href="http://www.indian-elections.com/maharashtra/mumbai-south.html"&gt;nearly twice&lt;/a&gt; his next opponent’s votes during the 2009 elections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which is why it’s surprising, and saddening, to see Deora trot out a  patently false set of answers to how America’s global dragnet of  Internet surveillance is affecting the privacy of Indians.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On 16th August Deora responded to &lt;a href="http://rajyasabha.nic.in/"&gt;a question from Rajya Sabha M.P.&lt;/a&gt; and BJP Spokesperson Prakash Javadekar, asking the following:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;(a) whether it is a fact that India was the fifth  most tracked country by the United States intelligence, particularly on  the internet;&lt;/i&gt;&lt;br /&gt; &lt;i&gt; (b) if so, the details thereof;&lt;/i&gt;&lt;br /&gt; &lt;i&gt; (c) the impact of USA”s surveillance program-Prism and Boundless Information on the country; and&lt;/i&gt;&lt;br /&gt; &lt;i&gt; (d) the steps Government intends to take to protect country”s interests and the privacy of its citizens?&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Javadekar’s question was sorely needed in light of the near-daily  disclosures being made about the scarily omnipresent extent to which the  US Government spies on global Internet users through a myriad of ways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India, as Javadekar rightly pointed out, was indeed the &lt;a href="http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;fifth most monitored country&lt;/a&gt; under the “Boundless Informant” data mining tool that tracks the NSA’s  (the US’ lead communications spy agency) global surveillance efforts. In  just March 2013 alone, according to a leaked presentation on the tool,  the NSA collected 6.3 billion pieces of information from India. Suffice  it to say, the information would have come from Indian citizens,  businesses, ministries, bureaucrats and of course, members of Parliament  (most of who now use webmail and social network from the likes of  Google and Facebook).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The only countries that were spied upon more than us were Iran, Pakistan, Jordan and Egypt. Some sobering company, that!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One would thus expect Deora to be seized of the urgency and concern behind Javadekar’s questions. His answer was:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;(a) &amp;amp; (b) In June 2013, Media reports have  disclosed that India is the fifth largest target of United States  electronic surveillance programmes, in terms of interception of  communications on fibre cables and other infrastructure. As per media  reports, United States agencies used a number of methods to gather  intelligence including intercepting communication on fibre cables and  infrastructure, collecting information from servers of global internet  and Telecom Service Providers. Such companies include Google, Facebook,  Microsoft, Apple, Yahoo, AOL,Youtube, Paltalk and Skype.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Here we have a member of Parliament asks India’s Minister for  Communications &amp;amp; IT about the extent to which Indian citizens and  businesses are being spied upon by the US – ostensibly a friendly  country – and all the Minister could do was cite newspaper reports?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What about your own investigations Mr.Minister? What is the opinion  of your leading spy agencies like the NTRO, R&amp;amp;AW and IB? Are they  also relying on newspaper reports?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But wait, Deora does go on to provide a few more answers:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;(c) &amp;amp; (d) Government has expressed concerns over  reported United States monitoring of internet traffic from India.  Concerns with regard to violation of any Indian laws relating to privacy  of information of ordinary Indian citizen as well as intrusive data  capture deployed against Indian citizens or government infrastructure  have been conveyed to the United States. The issue of United States  Cyber surveillance activities was discussed during the Indo-US (India  United States ) strategic dialogue meeting held in New Delhi on  24.06.2013.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Whew. That was reassuring. We expressed “concerns with regard to  violation of any Indian laws relating to privacy of information” to the  US during a “strategic dialogue meeting”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Let me guess what the US side responded: “Sure. We’ll do that. Come back to us when you have a privacy law. Ha ha!”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Sunil Abraham, the director for the Center for Internet &amp;amp; Society points out in Forbes India, India has &lt;a href="http://forbesindia.com/article/recliner/freedom-from-monitoring-india-inc-should-push-for-privacy-laws/35911/1"&gt;no modern and comprehensive privacy law&lt;/a&gt;. And the government is working on a new one for only &lt;b&gt;the last three years&lt;/b&gt;:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;What would an ideal privacy law for India look like?  For one, it would protect the rights of all persons, regardless of  whether they are citizens or residents. Two, it would define privacy  principles. Three, it would establish the office of an independent and  autonomous privacy commissioner, who would be sufficiently empowered to  investigate and take action against both government and private  entities. Four, it would define civil and criminal offences, remedies  and penalties. And five, it would have an overriding effect on previous  legislation that does not comply with all the privacy principles.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;The Justice AP Shah Committee report, released in October 2012,  defined the Indian privacy principles as notice, choice and consent,  collection limitation, purpose limitation, access and correction,  disclosure of information, security, openness and accountability. The  report also lists the exemptions and limitations, so that privacy  protections do not have a chilling effect on the freedom of expression  and transparency enabled by the Right to Information Act.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;The Department of Personnel and Training has been working on a  privacy bill for the last three years. Two versions of the bill had  leaked before the Justice AP Shah Committee was formed. The next version  of the bill, hopefully implementing the recommendations of the Justice  AP Shah Committee report, is expected in the near future. In a  multi-stakeholder-based parallel process, the Centre for Internet and  Society (where I work), along with FICCI and DSCI, is holding seven  round tables on a civil society draft of the privacy bill and the  industry-led efforts on co-regulation.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div style="text-align: justify; "&gt;Which brings me to the final part of Deora’s response to Javadekar:&lt;/div&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;United States official responded that PRISM dealt  only with Meta Data (related to the direction and the flow of the  traffic) and only broad patterns of telephony and internet traffic are  monitored. United States Officials maintained that data content/content  of emails are not accessed or not monitored under these surveillance  programmes; therefore, it is not a violation of privacy. It was stated  by United States that its agencies need to get separate authorization  from Foreign Intelligence Surveillance Act (FISA) court, if they want to  access the content of any of the data intercepted by these surveillance  programmes.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Dear Mr.Minister, either you have been lied to by your friendly “United States Official”, or, well…&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, by limiting the answer to only PRISM, which happens to be  just one of the NSA’s secret tools for online surveillance, you are  willfully or inadvertently narrowing down Javadekar’s question which  specifically mentions other tools like Boundless Informant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Almost all of the big Internet companies revealed to be part of the NSA’s global spying mechanism have also &lt;a href="http://www.theatlanticwire.com/technology/2013/06/prism-companies-start-denying-knowledge-nsa-program-collecting-their-users-data/65996/"&gt;used the same tactic to tailor their denials&lt;/a&gt;.  I suppose they got the cue from the NSA, which loves using the “Under  This Program” dodge to derail specific questions about its secret  programs, &lt;a href="https://www.eff.org/deeplinks/2013/08/guide-deceptions-word-games-obfuscations-officials-use-mislead-public-about-nsa"&gt;according to the Electronic Frontier Foundation&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;Another tried and true technique in the NSA  obfuscation playbook is to deny it does one invasive thing or another  “under this program.” When it’s later revealed the NSA actually does do  the spying it said it didn’t, officials can claim it was just part of  another program not referred to in the initial answer.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In case you weren’t aware of the NSA’s obfuscation tactics Mr.Minister, here is another great piece on it from the Slate – &lt;a href="http://www.slate.com/articles/news_and_politics/politics/2013/07/nsa_lexicon_how_james_clapper_and_other_u_s_officials_mislead_the_american.html"&gt;“How to Decode the True Meaning of What NSA Officials Say”&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus when your friendly US official tells you that “only meta data  (related to the direction and the flow of the traffic) and only broad  patterns of telephony and internet traffic are monitored” under PRISM,  not “data content/content of emails”, he or she is technically right.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Because the NSA has other programs that capture all of that. For  instance, XKeyscore, which according to leaked presentations, it can  capture &lt;a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data"&gt;“nearly everything a typical user does on the internet”&lt;/a&gt;. This includes emails, visits to websites, web searches and Facebook chats &amp;amp; private messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Did you also know, Mr. Minister, that the XKeyscore surveillance program has &lt;a href="http://www.thehindu.com/news/international/world/nsas-xkeyscore-surveillance-program-has-servers-in-india/article4978248.ece"&gt;servers located inside India&lt;/a&gt;?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, you make a statement that is patently false. You say that US  spy agencies need authorizations from the secret Foreign Intelligence  Surveillance Courts (FISC) in order to access the data collected by  various surveillance programs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FISA courts almost always approve &lt;i&gt;any request&lt;/i&gt; made to them (they apparently &lt;a href="http://www.motherjones.com/mojo/2013/06/fisa-court-nsa-spying-opinion-reject-request"&gt;rejected just 11 requests out of 33,900&lt;/a&gt; made by the US government in the last 33 years), so that’s that for oversight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And in the NSA’s Orwellian world of doublespeak, large scale interception and storage of Internet communications &lt;a href="https://www.eff.org/nsa-spying/wordgames#collect"&gt;isn’t considered “collected”&lt;/a&gt; till such time one of their agents has had a chance to look at it.  Which means if you’re reading this post – the NSA’s secret servers over  the world and in India can coolly capture that and store it in vast  databases for posterity – without it ever registering as a “collection”  or requiring any approval from FISA courts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fact is, Mr.Minister, we “foreigners” (unless you belong to one of the four other countries that are part of the &lt;a href="http://www.theatlantic.com/politics/archive/2013/06/is-the-five-eyes-alliance-conspiring-to-spy-on-you/277190/"&gt;“Five Eyes” alliance&lt;/a&gt;, in which case you’ll be treated with a wee bit more caution) , that is, us, &lt;a href="http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls"&gt;are fair game&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;The intelligence data is being gathered under Section  702 of the of the Fisa Amendments Act (FAA), which gives the NSA  authority to target without warrant the communications of foreign  targets, who must be non-US citizens and outside the US at the point of  collection.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;The communications of Americans in direct contact with foreign  targets can also be collected without a warrant, and the intelligence  agencies acknowledge that purely domestic communications can also be  inadvertently swept into its databases. That process is known as  “incidental collection” in surveillance parlance.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;We expected better answers from you Mr.Minister – sorry, &lt;i&gt;expect&lt;/i&gt; better.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alas your recent answers don’t inspire much trust, for instance when you tell us constant surveillance is &lt;a href="http://www.medianama.com/2013/06/223-prism-milind-deora-cms-central-monitoring-system/"&gt;“good for us”&lt;/a&gt; and &lt;a href="http://www.livemint.com/Politics/rpWFiDJroLgpLQ6yKdR3pJ/Telcos-to-soon-link-with-government-monitoring-system.html"&gt;“will enhance the privacy of citizens”&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Or when you tell us that “Google Hangouts” – a service provided by &lt;a href="http://forbesindia.com/article/real-issue/is-google-gobbling-up-the-indian-internet-space/35641/0"&gt;a company that looms over nearly everything Indians do online&lt;/a&gt; – is &lt;a href="http://businesstoday.intoday.in/story/elections-2014-google-hangouts-is-proving-especially-popular/1/197250.html"&gt;a better medium to reach out to people than Parliament or Television&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We deserve the truth from you Mr.Minister. Just like Prakash Javadekar.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth'&gt;http://editors.cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-05T10:38:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/deadline-for-linking-bank-accounts-with-aadhaar-to-be-extended-to-31-march">
    <title>Deadline For Linking Bank Accounts With Aadhaar To Be Extended To 31 March </title>
    <link>http://editors.cis-india.org/internet-governance/news/deadline-for-linking-bank-accounts-with-aadhaar-to-be-extended-to-31-march</link>
    <description>
        &lt;b&gt;The government does away with the existing deadline of 31 December for linking of bank accounts with Aadhaar and PAN&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta and Ramya Nair was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/EtNWlheQgO5lhQXF7qVfyH/Deadline-for-linking-bank-accounts-with-Aadhaar-to-be-extend.html"&gt;Livemint&lt;/a&gt; on December 14, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The government on Wednesday extended the deadline for linking  of bank accounts with Aadhaar to 31 March, in line with its submission  to the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The earlier deadline was 31 December.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bank  account holders will have to furnish their 12-digit unique biometric  identity number and Permanent account number or PAN by 31 March or  within six months of opening the account, whichever is earlier, said a  statement from the finance ministry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This will provide temporary  relief to crores of bank account holders who had not linked their bank  accounts with the 12-digit unique identity number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, the  income tax department had extended the deadline for linking of Aadhaar  with the permanent account number to 31 March from 31 December.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  move comes a day before a Constitution bench of the Supreme Court   starts hearing the issue of stay against mandatory linking of Aadhaar  with bank accounts and mobile phone numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The statement added  that the bank account will cease to be operational in case of failure to  furnish Aadhaar and PAN as on 31 March or at the end of six months. The  account will become operational again only after the furnishing of  documents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is just a gesture from the government, seeking to  avoid the court granting an interim stay against the mandatory linkage  of Aadhaar with bank accounts. This apparent extension won’t truly help  ordinary people, who will continue being harassed through constant  messages urging them to provide their Aadhaar number to continue  receiving entitlements, services, and for access to one’s own money,”  said Pranesh Prakash, policy director at the Centre for Internet and  Society, a Bengaluru-based think tank.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/deadline-for-linking-bank-accounts-with-aadhaar-to-be-extended-to-31-march'&gt;http://editors.cis-india.org/internet-governance/news/deadline-for-linking-bank-accounts-with-aadhaar-to-be-extended-to-31-march&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-12-16T13:24:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/ani-may-2-2018-data-usage-by-political-parties">
    <title>Data Usage by Political Parties</title>
    <link>http://editors.cis-india.org/internet-governance/news/ani-may-2-2018-data-usage-by-political-parties</link>
    <description>
        &lt;b&gt;Sunil Abraham spoke to ANI regarding collection of data and its use by political parties for electoral gains.&lt;/b&gt;
        &lt;p style="text-align: center; "&gt;&lt;img src="http://editors.cis-india.org/home-images/SunilAbraham.jpg/@@images/19202b15-4087-4780-bfcb-05045600c705.jpeg" alt="Sunil" class="image-inline" title="Sunil" /&gt;&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;In law, if bio metrics, passwords &amp;amp; health info are collected, only then consent is needed. The more a political party has in its database, the more they can micro-target you. It'll be an influence: Sunil Abraham,cyber expert on date usage by political parties &lt;a href="https://twitter.com/hashtag/KarnatakaElections?src=hash&amp;amp;ref_src=twsrc%5Etfw"&gt;#KarnatakaElections&lt;/a&gt; &lt;a href="https://t.co/eUk478jJbB"&gt;pic.twitter.com/eUk478jJbB&lt;/a&gt;&lt;/p&gt;
— ANI (@ANI) &lt;a href="https://twitter.com/ANI/status/991329177973510149?ref_src=twsrc%5Etfw"&gt;1 May 2018&lt;/a&gt;&lt;/blockquote&gt;
&lt;hr /&gt;
&lt;p&gt;See the &lt;a class="external-link" href="https://twitter.com/ANI/status/991329177973510149?s=19"&gt;original here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/ani-may-2-2018-data-usage-by-political-parties'&gt;http://editors.cis-india.org/internet-governance/news/ani-may-2-2018-data-usage-by-political-parties&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-05-03T03:14:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/data-retention-in-india">
    <title>Data Retention in India</title>
    <link>http://editors.cis-india.org/internet-governance/blog/data-retention-in-india</link>
    <description>
        &lt;b&gt;As part of its privacy research, the Centre for Internet and Society has been researching upon data retention mandates from the Government of India and data retention practices by service providers. Globally, data retention has become a contested practice with regards to privacy, as many governments require service providers to retain more data for extensive time periods, for security purposes. Many argue that the scope of the retention is becoming disproportional to the purpose of investigating crimes. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;The Debate around Data Retention&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the EU, data retention &lt;i&gt;“refers to the storage of traffic and location data resulting from electronic communications (not data on the content of the communications)”&lt;/i&gt;.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The debate around data retention has many sides, and walks a fine line of balancing necessity with proportionality. For example, some argue that the actual retention of data is not harmful, and at least some data retention is necessary to assist law enforcement in investigations. Following this argument, the abuse of information is not found in the retention of data, but instead is found by who accesses the data and how it is used. Others argue that any blanket or &lt;i&gt;a priori &lt;/i&gt;data&lt;i&gt; &lt;/i&gt;retention requirements are increasingly becoming disproportional and can lead to harm and misuse. When discussing data retention it is also important to take into consideration what type of data is being collected and by what standard is access being granted. Increasingly, governments are mandating that service providers retain communication metadata for law enforcement purposes. The type of authorization required to access retained communication metadata varies from context to context. However, it is often lower than what is required for law enforcement to access the contents of communications. The retention and lower access standards to metadata is controversial because metadata can encompass a wide variety of information, including IP address, transaction records, and location information — all of which can reveal a great deal about an individual.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;Furthermore, the definition of metadata changes and evolves depending on the context and the type of information being generated by new technologies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Retention vs. Data Preservation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Countries have taken different stances on what national standards for data retention by service providers should be. For example, in 2006 the EU passed the Data Retention Directive which requires European Internet Service Providers to retain telecom and Internet traffic data from customers' communications for at least six months and upto two years. The stored data can be accessed by authorized officials for law enforcement purposes.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Despite the fact that the Directive pertains to the whole of Europe, in 2010 the German Federal Constitutional Court annulled the law that harmonized German law with the Data Retention Directive.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; Other European countries that have refused to adopt the Directive include the Czech Republic and Romania.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Instead of mandating the retention of data, Germany, along with the US, mandates the 'preservation' of data. The difference being that the preservation of data takes place through a specified request by law enforcement, with an identified data set. In some cases, like the US, after submitting a request for preservation, law enforcement must obtain a court order or subpoena for further access to the preserved information.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Data Retention in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, the government has established a regime of data retention. Retention requirements for service providers are found in the ISP and UASL licenses, which are grounded in the Indian Telegraph Act, 1885.&lt;/p&gt;
&lt;h3&gt;ISP License&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the ISP License,&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; there are eight categories of records that service providers are required to retain for security purposes that pertain to customer information or transactions. In some cases the license has identified how long records must be maintained, and in other cases the license only states that the records must be made available and provided. This language implies that records will be kept.&lt;/p&gt;
&lt;p&gt;According to the ISP License, each ISP must maintain:&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;span&gt; &lt;/span&gt;
&lt;li&gt;&lt;span&gt;&lt;b&gt;&lt;span&gt;Users and Services&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;: A log of all users connected and the service they are using, which must be available in real time to the Telecom Authority. (Section 34.12).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;b&gt;&lt;span&gt;Outward Logins or Telnet&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;: A log of every outward login or telnet through an ISPs computer must be available in real time to the Telecom Authority. (Section 34.12).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Packets&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; Copies of all packets originating from the Customer Premises Equipment of the ISP must be available in real time to the Telecom Authority. (Section 34.12).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Subscribers&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; A complete list of subscribers must be made available on the ISP website with password controlled access, available to authorized Intelligence Agencies at any time. (Section 34.12).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Internet Leased Line Customers&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; A complete list of Internet leased line customers and their sub-customers consisting of the following information: name of customer, IP address allotted, bandwidth provided, address of installation, date of installation/commissioning, and contact person with phone no./email. These must be made available on a password protected website (Section 34.14).  The password and login ID must be provided to the DDG (Security), DoT HQ and concerned DDG(VTM) of DoT on a monthly basis. The information should also be accessible to authorized government agencies (Section 34.14).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Diagram Records and Reasons&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; A record of complete network diagram of set-up at each of the internet leased line customer premises along with details of connectivity must be made available at the site of the service provider. All details of other communication links (PSTN, NLD, ILD, WLL, GSM, other ISP) plus reasons for taking the links by the customer must be recorded before the activation of the link. These records must be readily available for inspection at the respective premises of all internet leased line customers (Section 34.18).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; 
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Commercial Records&lt;/span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; All commercial records with regard to the communications exchanged on the network must be maintained for a year (Section 34.23).&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Location&lt;/span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt; The service provider should be able to provide the geographical location of any subscriber at a given point of time (Section 34.28(x).&lt;/p&gt;
&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;span&gt; &lt;/span&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Remote Activities&lt;/span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; A complete audit trail of the remote access activities pertaining to the network operated in India. These must be retained for a period of six months, and must be provided on request to the licensor or any other agency authorized by the licensor (Section 34.28 (xv).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;UASL License&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the UASL License&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;, &lt;span&gt;there are twelve categories of records that ISP’s are required to retain that pertain to costumer information or transactions for security purposes. In some cases the license has identified how long records must be maintained, and in other cases the license only states that the information must be provided and made available when requested. This language implies that records will be kept. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;According to the license, service providers must maintain and make available: &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Numbers&lt;/span&gt;&lt;/span&gt;&lt;span&gt;: &lt;/span&gt;&lt;/b&gt;&lt;span&gt;Called/calling party mobile/PSTN numbers when required. Telephone numbers of any call-forwarding feature when required (Section 41.10).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Interception records: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;Time, date and duration of interception when required (Section 41.10).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; 
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Location:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; Location of target subscribers. For the present, cell ID should be provided for location of the target subscriber when required (Section 41.10).&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;All call records:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; All call data records handled by the system when required (Section 41.10). This includes:&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Failed call records:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; Call data records of failed call attempts when required. (Section 41.10).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Roaming subscriber records&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;: Call data records of roaming subscribers when required. (Section 41.10)&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Commercial records: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;All commercial records with regards to the communications exchanged on the network must be retained for one year (Section 41.17).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Outgoing call records: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;A record of checks made on outgoing calls completed by customers who are making large outgoing calls day and night to various customers (Section 41.19(ii)).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Calling line Identification:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; A list of subscribers including address and details using calling line identification should be kept in a password protected website accessible to authorized government agencies (Section 41.19 (iv)).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; 
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Location:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; The service provider must be able to provide the geographical location of any subscriber at any point of time (Section 41.20(x)).&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Remote access activities:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;Complete audit trail of the remote access activities pertaining to the network operated in India for a period of six months (Section&lt;span&gt; &lt;/span&gt;41.20 (xv)).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;RTI Request to &lt;a href="http://editors.cis-india.org/internet-governance/blog/bsnl-rti" class="internal-link"&gt;BSNL&lt;/a&gt; and &lt;a href="http://editors.cis-india.org/internet-governance/blog/mtnl-rti-request.pdf" class="internal-link"&gt;MTNL&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;On September 10,&lt;sup&gt;&lt;/sup&gt; 2012, the Centre for Internet and Society sent an RTI to MTNL and BSNL with the following questions related to the respective data retention practices: &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;ul type="disc"&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Does      MTNL/BSNL store the following information/data:&lt;/span&gt;&lt;/li&gt;
&lt;ul type="circle"&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Text       message detail (To and from cell numbers, timestamps)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Text       message content (The text and/or data content of the SMS or MMS)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Call       detail records (Inbound and outbound phone numbers, call duration)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Bill       copies for postpaid and recharge/top-up billing details for prepaid&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Location       data (Based on cell tower, GPS, Wi-Fi hotspots or any combination       thereof)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;If it      does store data then&lt;/span&gt;&lt;/li&gt;
&lt;ul type="circle"&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;For what       period does MTNL/BSNL store: SMS and MMS messages, cellular and mobile       data, customer data?&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;What       procedures for retention does MTNL/BSNL have for: SMS and MMS messages,       cellular and mobile data, and customer data?&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;What       procedures for deletion of: SMS and MMS messages, cellular and mobile       data, and customer data?&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;What       security procedures are in place for SMS and MMS messages, cellular and       mobile data, and customer data?&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;h3&gt;BSNL Response&lt;/h3&gt;
&lt;p&gt;BSNL replied by stating that it stores at least three types of information including:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol type="1"&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;IP session information -      connection start end time, bytes in and out (three years offline)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;MAC address of the modem/router/device (three years offline)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Bill copies for post paid and recharge/top up billing details      for prepaid. Billing information of post paid Broadband are available in      CDR system under ITPC, prepaid voucher details (last six months).&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;MTNL Response&lt;/h3&gt;
&lt;p&gt;MTNL replied by stating that it stores at least () types of information including:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol type="1"&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Text message details (to and from cell number, timestamps) in      the form of CDRs&lt;span&gt; &lt;/span&gt;(one year)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Call detail records including inbound and outbound phone      numbers and call duration (one year)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Bill copies from postpaid (one year) &lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Recharge details for prepaid (three months) &lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Location of the mobile number if it has used the MTNL      GSM/3GCDMA network (one year)&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;It is interesting that BSNL stores information that is beyond the required time period required in both the ISP and the UASL licenses. The responses to the RTI showed that each service provider also stores different types of information. This could or could not be the actual case, as each question could have been interpreted differently by the responding officer.&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;Conclusion &lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt; &lt;span&gt;The responses to the RTI from BSNL and MTNL are a step towards understanding data retention practices in India, but there are still many aspects about data retention in India which are unclear including:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;What constitutes a ‘commercial record’ which must be stored for one year by service providers?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;How much data is retained by service providers on an annual basis?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;What is the cost involved in retaining data? For the service provider? For the public?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;How frequently is retained information accessed by law enforcement? What percentage of the data is accessed by law enforcement?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;How many criminal and civil cases rely on retained data?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;What is the authorization process for access to retained records? Are these standards for access the same for all types of retained data?&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;Having answers to these questions would be useful for determining if the Indian data retention regime is proportional and effective. It would also be useful in determining if it would be meaningful to maintain a regime of data retention or switch over to a more targeted regime of data preservation. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;Though it can be simple to say that a regime of data preservation is the most optimal choice as it gives the individual the greatest amount of immediate privacy protection, &lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;A regime of data preservation would mean that all records would be treated like an interception, where the police or security agencies would need to prove that a crime was going to take place or is in the process of taking place and then request the ISP to begin retaining specific records. This approach to solving crime would mean that the police would never use retained data or historical data as part of an investigation – to either solve a case or to take the case to the next level.&lt;span&gt; &lt;/span&gt;If Indian law enforcement is at a point where they are able to concisely identify a threat and then begin an investigation is a hard call to make. It is also important to note that though preservation of data can reduce the risk to individual privacy as it is not possible for law enforcement to track individuals based off of their historical data and access large amounts of data about an individual, preservation does not mean that there is no possibility for abuse. Other factors such as:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;Any request for preservation and access to records must be legitimate and proportional&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Accessed and preserved records must be used only for the purpose indicated &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;Accessed and preserved records can only be shared with authorized authorities&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;Any access to preserved records that do not pertain to an investigation must be deleted &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;These factors must be enforced through the application of penalties for abuse of the system. These factors can also be applied to not only a data preservation regime, but also a data retention regime and are focused on preventing the actual abuse of data after retained. That said, before an argument for either data retention or data preservation can be made for India it is important to understand more about data retention practices in India and use of retained data by Indian law enforcement and access controls in place. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;European Commission – Press  Release. Commission Takes Germany to Court Requesting that Fines be  Imposed. May 31st 2012. Available at:  &lt;a class="external-link" href="http://bit.ly/14qXW6o"&gt;http://bit.ly/14qXW6o&lt;/a&gt;. Last accessed:  January 21st 2013&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].Draft International Principles on Communications Surveillance and Human Rights: &lt;a class="external-link" href="http://bit.ly/UpGA3D"&gt;http://bit.ly/UpGA3D&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. European Commission – Press Release. Commission Takes Germany to Court Requesting that Fines be Imposed. May 31&lt;sup&gt;st&lt;/sup&gt; 2012. Available at:  &lt;a class="external-link" href="http://bit.ly/14qXW6o"&gt;http://bit.ly/14qXW6o&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_IP-12-530_en.htm"&gt;&lt;/a&gt;. Last accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. European Commission – Press Release. Commission Takes Germany to Court Requesting that Fines be Imposed. May 31&lt;sup&gt;st&lt;/sup&gt; 2012. Available at:  &lt;a class="external-link" href="http://bit.ly/14qXW6o"&gt;http://bit.ly/14qXW6o&lt;/a&gt;. Last accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013.&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Tiffen, S. Sweden passes controversial data retention directive. DW. March 22 2012. Available at: &lt;a class="external-link" href="http://bit.ly/WOfzaX"&gt;http://bit.ly/WOfzaX&lt;/a&gt;. Last Accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013.&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;].  Kristina, R. The European Union's Data Retention Directive and the  United State's Data Preservation Laws: Fining the Better Model. 5  Shilder J.L. Com. &amp;amp; Tech. 13 (2009) available at: &lt;a class="external-link" href="http://bit.ly/VoQxQ9"&gt;http://bit.ly/VoQxQ9&lt;/a&gt;. Last accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;].  Government of India. Ministry of Communications &amp;amp; IT Department of  Telecommunications. License Agreement for Provision of Internet  Services.&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].  Government of India. Ministry of Communications &amp;amp; IT Department of  Telecommunications. License Agreement for Provision of Unified Access  Services after Migration from CMTS. Amended December 3&lt;sup&gt;rd&lt;/sup&gt; 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/data-retention-in-india'&gt;http://editors.cis-india.org/internet-governance/blog/data-retention-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:51:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/deccan-herald-january-20-2018-sunil-abraham-data-protection-we-can-innovate-leapfrog">
    <title>Data Protection: We can innovate, leapfrog</title>
    <link>http://editors.cis-india.org/internet-governance/blog/deccan-herald-january-20-2018-sunil-abraham-data-protection-we-can-innovate-leapfrog</link>
    <description>
        &lt;b&gt;About 27% of India's population is still illiterate or barely literate. Most privacy policies and terms of services for web and mobile applications are in English and therefore it is only 10% of us who can actually read them before we provide our consent.&lt;/b&gt;
        &lt;p&gt;The article was published in the &lt;a class="external-link" href="http://www.deccanherald.com/content/655018/data-protection-we-can-innovate.html"&gt;Deccan Herald&lt;/a&gt; on January 20, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if we can read them, we may not have the necessary legal training to understand them. According to a tweet thread by Pat Walshe (@privacymatters), the Tetris app, a popular video game, has a privacy policy that details the third-party advertising companies that they share data with. These third-parties include "123 Ad Networks; 13 Online Analytics companies; 62 Mobile Advertising Networks; 14 Mobile Analytics companies. The linked privacy policies for Tetris run to 407,000 words, compared to 450,000 words for the entire 'Lord of the Rings trilogy'." The child aged four and above that plays the game and her parents need an intermediary to deal with the corporations hiding behind Tetris.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike the European Union, which has more than 37 years of history when it comes to data protection law, India is starting with a near blank slate after the Supreme Court confirmed that privacy is a constitutionally-guaranteed fundamental right in the Puttaswamy case judgement. While we would want to maintain adequacy and compatibility with the EU General Data Protection Regulation (GDPR) because it has become the global standard, we must realise that there is an opportunity for leapfrogging. This article attempts to introduce the reader to three different visions for intermediaries that have emerged within the Indian data protection debate around the accountability principle. I will also provide a brief sketch of an idea that we are developing at the Centre for Internet and Society. This is an incomplete list as there must be more proposals for regulatory innovation around the accountability principle that I am currently unaware of.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;n Account Aggregators: The 'India Stack' ecosystem that has been built around the Aadhaar programme first proposed intermediaries called Account Aggregators. Account Aggregators manage consent artifacts. India Stack has traditionally been described as having four layers -- presenceless, paperless, cashless and consent. The consent layer is supposed to feature Account Aggregators. If, for example, a data subject wanting an insurance policy visits an insurance portal, the portal would collect personal information and a consent artifact from her and pass it on to multiple insurance companies. These insurance companies would send personalised bids to the portal, which would be displayed on a comparative grid to enable empowered selection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data structure consent artifact has been provided in the Master Direction from RBI titled "Non-Banking Financial Company Account Aggregator Directions," published in September 2016. How does this work? The fields includes (i) identity and optional contact information; (ii) nature of the financial information requested; (iii) purpose; (iv) the identity of the recipients, if any; (v) URL/address for notifications when the consent artifact is used; (vi) consent artifact creation date, expiry date, identity and signature/digital signature of the Account Aggregator; and (vii) any other attribute as may be prescribed by the RBI. While Account Aggregators make it frictionless for the grant of consent and also for the harvesting of consent by data controllers, it does not make it easy for you to manage and revoke your consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;n Data Trusts: Most recently, Na.Vijayashankar, a Bengaluru-based cybersecurity and cyberlaw expert, has proposed intermediaries called 'Data Trusts' registered with the regulator and who (i) will work as escrow agents for the personal data (which would be classified by type for different degrees of protection); (ii) will make privacy notices accessible by translating them into accessible language and formats; (iii) disclose data minimally to different data controllers based on the purpose limitation; (iv) issue tokens or pseudonymous identifiers and monetise the data for the benefit of the data subject. To ensure that Data Trusts truly protect the interests of the data subject, Vijayashankar proposes three requirements: (a) public performance reviews (b) audits by the regulator and (c) "an arms-length relationship with the data collectors." In his proposal, Data Trusts are firms with "the ability to process a real-time request from the data subject to supply appropriate data to the data collector."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;n Learned Intermediaries: The Takshashila Institution published a paper titled Beyond Consent: A New Paradigm for Data Protection, authored by Rahul Matthan, partner at the law firm Trilegal. Learned Intermediaries would perform mandatory audits on all data controllers above a particular threshold. Like Vijayashankar, Matthan also requires these intermediaries to be certified by an appropriate authority. The main harm that he focuses on is, bias or discrimination. He proposes three stages of audit which are designed for the age of Big Data and Artificial Intelligence: "(i) Database Query Review; (ii) Black Box Audits; and (iii) Algorithm Review". Matthan also tentatively considers a rating system. Learned Intermediaries are a means to address information asymmetry in the market by making data subjects more aware. The impact of churn on their bottom-lines, it is hoped, will force data controllers to behave in an accountable manner, protecting rights and mitigating harms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;n Consent Brokers: Finally, I have proposed the model of a 'Consent Broker' by modifying the concept of the Account Aggregator. Like the Account Aggregator proposal, we would want a competitive set of consent brokers who will manage consent artifacts for data subjects. However, I believe there should be a 1:1 relationship between data subjects and consent brokers so that the latter compete for the business of data subjects. Like Vijayashankar, I believe that the consent broker must have an "arms-length distance" from data controllers and must be prohibited from making any money from them. Consent brokers could also be trusted to take proactive actions for the data subjects, such as access and correction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need of the hour is the production of regulatory innovations and robust discussions around them for all the nine privacy principles in the Justice AP Shah committee report -- notice, choice and consent, collection limitation, purpose limitation, access and correction, disclosure of information, security, openness and accountability.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/deccan-herald-january-20-2018-sunil-abraham-data-protection-we-can-innovate-leapfrog'&gt;http://editors.cis-india.org/internet-governance/blog/deccan-herald-january-20-2018-sunil-abraham-data-protection-we-can-innovate-leapfrog&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-22T01:45:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/data-protection-understanding-the-general-data-protection-regulation">
    <title>Data Protection: Understanding the General Data Protection Regulation</title>
    <link>http://editors.cis-india.org/internet-governance/blog/data-protection-understanding-the-general-data-protection-regulation</link>
    <description>
        &lt;b&gt;As recently as May 27, 2016, the General Data Protection Regulation (REGULATION (EU) 2016/679) (hereinafter referred to as GDPR) was adopted. The Data Protection Directive (1995/46/EC) (hereinafter referred to as DPD) will be replaced by this Regulation.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It will come into force on 25th May 2018 and it is expected that under this Regulation data privacy will be strengthened. Substantive and procedural changes have been introduced and for compliance, industries and law enforcement agencies will have to adjust the ways in which they have operated thus far. &lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/GDPR_IndustrySheet_07.pdf"&gt;Click here to read the report&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/data-protection-understanding-the-general-data-protection-regulation'&gt;http://editors.cis-india.org/internet-governance/blog/data-protection-understanding-the-general-data-protection-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aditi Chaturvedi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-04T16:12:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses">
    <title>Data protection experts slam state for sending mass SMSes</title>
    <link>http://editors.cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses</link>
    <description>
        &lt;b&gt;Experts in the field of data protection, privacy law and media have criticised the West Bengal government's mass SMS sent to individuals, companies and media houses through private mobile networks last Friday. Lara Choksey reports this in an article published in the Statesman on March 25, 2012.&lt;/b&gt;
        
&lt;p&gt;The government's use of private data in order to spread political messages is ethically dubious and dangerous, say some.&amp;nbsp; The SMS indirectly refers to The Telegraph's publication of the Poonam Pandey tweet, warning against the transmission of “provocative and indecent photographs for hurting the religious sentiments of people and disrupting communal harmony.” It urges recipients to “frustrate the designs of … unscrupulous people and maintain peace and communal harmony,” and is signed by “Mamata Banerjee, Chief Minister”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Speaking to The Statesman on Saturday, Mumbai-based media lecturer Ms Geeta Seshu identified two issues with the government sending out political messages through mobile phone networks.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Firstly, from an ethical standpoint, the unchecked freedom of mobile phone companies to hand out private data is “completely wrong”, she said.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Secondly, the use of government funds for such dissemination needs to be transparent. If the state government has used public funds to distribute its message through a mobile phone network, then this information should be readily available, said Ms Seshu.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Telecom Regulation Authority of India's (Trai) unsolicited commercial communications regulations allow unsolicited advertising through mobile phone networks.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Mr Apar Gupta, partner of Delhi-based law firm Advani and Co., explained, “The regulations are not wide enough to prohibit communications from a political party.” He observed, “Using SMS messages is a very efficient propaganda tool because so many people have access to mobile phones.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Mobile phone networks such as Vodafone make it clear in their privacy policies that the personal data of its customers “may be used for inclusion in any telephone or similar directory or directory enquiry service provided or operated by us or by a third party” (source Vodafone website).&lt;/p&gt;
&lt;p&gt;Any third party&amp;nbsp; ~ governmental or corporate ~ can therefore access the company's directory of private mobile numbers at the discretion of the network in question.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is not yet clear which government department coordinated the SMS, or what funds were used to cover the costs. Representatives from the ministry of information and cultural affairs were not able to shed a light on the matter. “I know that a message was sent out,” said the I &amp;amp; CA director Umapada Chatterjee, "But it was not sent from this department. I do not know that information.”&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Some commentators did not condemn the government's SMS. Delhi High Court lawyer and cyber law expert, Mr Praveen Dalal, criticised the publication of the Poonam Pandey tweet on the grounds of it violating the due diligence guidelines of the Cyber Law of India. He commented, “If casual and careless publications … continue, there would be no other option left for the government but to regulate their affairs in a more intrusive manner.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, executive director of the Centre for Internet and Society, Mr Sunil Abraham, called the state government's use of unsolicited SMS a “clear abuse of the powers afforded by elected office.” Mr Abraham explained that elected representatives would be justified in such measures, and in utilising public funds, in the event of a disaster, or when public order, public health or national security are compromised.&lt;/p&gt;
&lt;p&gt;“However in this case, the government is abusing the provisions of the law and using this incident as a pretext to threaten media professionals with surveillance and to intimidate for the purposes of reigning in free speech,” he told The Statesman. The chief minister was unavailable to make a comment on the matter.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.thestatesman.net/index.php?option=com_content&amp;amp;view=article&amp;amp;id=404338&amp;amp;catid=73"&gt;Read the original published in the Statesman&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses'&gt;http://editors.cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-27T03:46:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/data-protection-and-privacy-in-india-the-fundamental-right-way">
    <title>Data Protection and Privacy in India: The (Fundamental) Right Way</title>
    <link>http://editors.cis-india.org/internet-governance/news/data-protection-and-privacy-in-india-the-fundamental-right-way</link>
    <description>
        &lt;b&gt;Amber Sinha attended a roundtable conference on data protection and privacy on October 30, 2017 at India Habitat Centre in New Delhi. The close-door event was organised by the  Indian Council for Research on International Economic Relations.&lt;/b&gt;
        &lt;p&gt;Participants at the conference discussed:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Role of consent in data protection, how it should be configured in India&lt;/li&gt;
&lt;li&gt;Conflicts between the data minimization principle and big data&lt;/li&gt;
&lt;li&gt;Governance approaches to data protection&lt;/li&gt;
&lt;li&gt;Propertarian view of data&lt;/li&gt;
&lt;li&gt;Need for capacity building in India and institutions who should be involved in the data protection regime, and&lt;/li&gt;
&lt;li&gt;Cross border data flows and data localisation&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/data-protection-and-privacy-in-india-the-fundamental-right-way'&gt;http://editors.cis-india.org/internet-governance/news/data-protection-and-privacy-in-india-the-fundamental-right-way&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-27T14:01:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/india-legal-live-june-21-2018-data-privacy">
    <title>Data Privacy: Footprints on the Web</title>
    <link>http://editors.cis-india.org/internet-governance/news/india-legal-live-june-21-2018-data-privacy</link>
    <description>
        &lt;b&gt;Technology has made data protection a hot button issue. Now, a group of eminent citizens, mostly lawyers, have formulated a draft privacy bill, a legal framework that protects the individual’s right to privacy, but it faces legal jurisdiction issues &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Sujit Bhar was published in &lt;a class="external-link" href="http://www.indialegallive.com/constitutional-law-news/acts-and-bills-news/data-privacy-footprints-on-the-web-50261"&gt;IndiaLegal&lt;/a&gt; on June 21, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Lack of data privacy is a modern day peril. Quite like the individual’s right to privacy—one that has been raised to the level of a Fundamental Right by the Supreme Court—data privacy today is prime, because technology has made our lives fully dependant on associated data. Hence, by extension of the same logic and arguments that the top court used for personal privacy, data privacy should be protected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The methodology to be adopted, though, is not as easy to determine given the lack of legislation in the field, the improbability of existing technology to ensure complete privacy and because of legal jurisdiction issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, to what extent data privacy can and should be allowed is a legal argument that needs to be supported by other fields of knowledge. The Supreme Court decision to award privacy as a Fundamental Right will act as a plinth in determining this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To that end a group of eminent citizens, mostly lawyers, came together and formulated a draft privacy bill with the objective of slicing through banal arguments that would ensue if this was to wait for public re-reference/debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proponents—Apar Gupta, Gautam Bhatia, Kritika Bhardwaj, Maansi Verma, Naman M Aggarwal, Praavita Kashyap, Prasanna S, Raman Jit Singh Chima, Ujwala Uppaluri and Vrinda Bhandari—have tried to develop their own privacy bill, based on the foundation of the Privacy (Protection) Bill, 2013, “which was drafted over a series of roundtables and inputs conducted by the Centre for Internet and Society, Bangalore”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In doing so the group started from what it calls “seven privacy principles”, derived from various constitutional and expert texts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Principle 1: Individual rights are at the centre of privacy and data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This says that “the individual and her rights are primary. The law on privacy must empower you by advancing your right to privacy…”including “your right to autonomy and dignity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Principle 2: A data protection law must be based on privacy principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here reference is made to the report of the Justice AP Shah Committee of Experts. It’s a method that has been left flexible, to accommodate fast developing technology. There is a reference to Moore’s Law in this. Moore’s Law has remained one of the most overwhelmingly true laws of the IT industry. Originating in 1970, it says that processor speeds, or overall processing power for computers “will double every two years”. While that has remained true till now, with the development of multiple core processors, this law too has seemingly run its course. With the world changing at such a fast pace, if the data privacy bill/law does not remain flexible, it would also be quickly consigned to a museum of laws. Hence this flexible approach will be crucial.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Principle 3: A strong privacy commission must be created to enforce the privacy principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is the part of establishing an oversight authority, “a strong body to ensure that the data protection rights are put into practice and enforced”. This structure has been treated for something “that works in principle and in practice.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is one part that says that this proposed “Privacy Commission”, has been “provided wide powers of investigation, adjudication, rule-making and enforcement. The Commission should adopt an approach that builds accountability for the rights of users by having powers to impose penalties that are proportionate to the harm and build deterrence.” This, obviously, means that it will be stepping onto the toes of other laws and that would be a rough road to navigate. However, as the group’s own philosophy says that the problem with technology oriented legislation is that it takes catching up with the progress of technology. To overcome this, the group wants to “make sure that the Privacy Code is not outdated” and hence wants to make sure that the “Privacy Commission can exercise rule making powers to give effect to the data protection principles under the regulation”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other part of the philosophy is of acknowledging and addressing public complaints. Hence the legal rigidity of regular acts would be dismissed. How this can work with enforcement agencies, though, will remain a matter of debate. The draft bill says that the “Privacy Commission must serve as the forum for the redressal of the general public’s grievances”, and that “Privacy Commissions should have the ability to investigate (independently through the office of a Director General), hold hearings and pass orders with directions and fines”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That could be legal nightmare, because unlike a simple code, the bill has to pass through parliament to become an act, and legislators are the ones who have final say in remodelling an existing law. How much power they would agree to delegate is anybody’s guess.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, the draft also calls for the courts to welcome public opinion. There seems to be a slight hitch in the wording, which says that “…while the Privacy Commission serves as the forum for redressal, the public should retain the remedies of approaching the civil courts (even in instances where harm is suffered by a group of people) and of filing police complaints directly”. That questions even the oversight authority of the commission. There is another objective—a hope, one would say—that the Privacy Commission must have jurisdiction over the government, as it does over the private sector. The Privacy Commission should have overriding power and superintendence over all legal entities in matter of data protection and privacy”. While this sounds good on paper, the issue of national security can override all. At this point, according to a cyber security expert, there is talk within the Indian government on how to deal with the social media messaging app WhatsApp. Technically, as the company points out, messaging through an app is encrypted (military grade encryption, it is said) end-to-end. Hence terrorist groups have zeroed in on this as a common idea exchange platform. There could possibly be restrictive legislation on this. That could strike at the heart of data privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government’s reaction, though, could become counter-productive. This could be visible in what the Justice Srikrishna-led Committee of Experts possibly could recommend.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Principle 4: The government should respect user privacy. Technically, if this bill, in its current form, has to go through parliament, members of both houses should be willing to accept that it will have no snooping powers, ever. The way the government fought tooth and nail against personal privacy in court—and the Aadhaar verdict is still awaited—this proposal seems unlikely to have an easy passage. The draft says: “It is imperative that the government, its arms, bodies and programmes be compliant with the privacy protection principles through a data protection law.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a caveat within this, saying: “We support the use of digital technologies for public benefit. However, they should not be privileged over fundamental rights.” The proposal also says: “The government is responsible for the delivery of many essential services to the public of India. These services must not be withheld from an individual, due to such individual not sharing data with the government. Withholding services on the pretext of requirement of collection of data effectively amounts to extortion of consent. Individuals cannot be forced to trade away their data and citizenship at the altar of being permitted to use government services and access legal entitlements on welfare.” This will have to wait its validation or dismissal through the Aadhaar verdict.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Principle 5: A complete privacy code comes with surveillance reform&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is another tricky issue for any government. It talks about how the Snowden revelations “brought to public knowledge that our personal data is collected in an indiscriminate manner by governments”. The draft calls this collection procedure “dragnet surveillance”, because it “contravenes the principles of necessity, proportionality and purpose limitation”. Necessity and proportionality have been argued in detail during the Aadhaar debate in court and till that verdict is out, it would, possibly, not be right to delve into this, though a recommendation for procedural safeguards might run into the same wall as in the case of encrypted software in social media apps. The draft accepts the possibility of “individual interception and surveillance”, but says “this should be severely limited in substance and practice through procedural safeguards”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Principle 6: The right to information needs to be strengthened and protected&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This basically refers to the Right to Information Act and seems completely justified, with Information Commissioners being “exempted from interference or control by the Privacy Commissioner”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Principle 7: International protections and harmonisation to protect the open internet must be incorporated&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another contentious issue, being fuelled by the loss of face by Facebook in its effort to introduce graded access (with paywalls).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The group widens its scope in stating that “we need to be guided by the &lt;a href="http://www.indialegallive.com/topic/supreme-court"&gt;Supreme Court’s&lt;/a&gt; Right to Privacy decision and make reference to the European Union’s General Data Protection Regulation”. More interestingly, the group admits that every law will have certain exceptions. It says: “…but without clear wording sometimes exceptions swallow up the rule. We adopted a three part test in our drafting process in which any exceptions to these privacy principles should be: (a) worded clearly; (b) limited in purpose, necessary and proportionate to the aim; and (c) accompanied by sufficient procedural safeguards”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the face of it, the overall draft represents a novel and upright way of thinking, and if some of this is accepted while the government mulls the Justice Srikrishna Committee’s recommendations (expected late this month), it would be a good beginning.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/india-legal-live-june-21-2018-data-privacy'&gt;http://editors.cis-india.org/internet-governance/news/india-legal-live-june-21-2018-data-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-06-25T16:48:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/data-privacy-forum">
    <title>Data Privacy Forum</title>
    <link>http://editors.cis-india.org/internet-governance/news/data-privacy-forum</link>
    <description>
        &lt;b&gt;Amber Sinha took part in the Data Privacy Forum organized by the Asian Business Law Institute on February 7, 2018.   The forum was held at the Supreme Court of Singapore.


&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The forum was organised to discuss the findings of a compendium       of country reports on cross border data flow regulations in       countries from Asia and Australia, and the way forward. The forum       had attendance from 18 countries and had about 90 participants.       Elonnai Hickok and Amber Sinha were the reporters for India. Amber was a speaker on the first panel on “Adoption and reform of data protection laws in Asia: how legal systems adapt to global developments and regulatory competition”.&lt;/p&gt;
&lt;p&gt;Click to &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/data-privacy-forum"&gt;read more&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/data-privacy-forum'&gt;http://editors.cis-india.org/internet-governance/news/data-privacy-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-03-01T01:31:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/data-privacy-day-2016">
    <title>Data Privacy Day 2016</title>
    <link>http://editors.cis-india.org/internet-governance/news/data-privacy-day-2016</link>
    <description>
        &lt;b&gt;The Bangalore chapter of Data Privacy Day was organized by Data Security Council of India on January 28, 2016 at Electronic City in Bangalore. Sunil Abraham was a panelist.&lt;/b&gt;
        &lt;h3&gt;Agenda&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="http://editors.cis-india.org/home-images/DSCI.jpg/@@images/db4d4755-b12d-47fc-85fa-bf728f2b82b8.jpeg" alt="DSCI" class="image-inline" title="DSCI" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/data-privacy-day-2016'&gt;http://editors.cis-india.org/internet-governance/news/data-privacy-day-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-29T15:34:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/data-privacy-day-2014">
    <title>Data Privacy Day 2014</title>
    <link>http://editors.cis-india.org/news/data-privacy-day-2014</link>
    <description>
        &lt;b&gt;January 28 is annually celebrated as Data Privacy Day (DPD). Data Security Council of India (DSCI) organized the annual meeting J N Tata Hall, Bldg 1, Infosys Campus, Infosys Ltd., Electronics City, Bangalore. Elonnai Hickok was a panelist.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Programme Details&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;2:30 - 3:00 p.m.: Keynote address by Srinath Batni, Member of the Board, Infosys&lt;/li&gt;
&lt;li&gt;3:00 - 4:30 p.m.: Panel Discussion on "Privacy today and tomorrow in Indian and Global Context"&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Panelists:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;M D Sharath, Deputy Superintendent of Police, Cyber Crimes Division, CID Headquarters, Karnataka Police&lt;/li&gt;
&lt;li&gt;Srinivas Poosarla, Associate Vice President and Head (Global), Privacy &amp;amp; Data Protection, Infosys Ltd&lt;/li&gt;
&lt;li&gt;Joshi Joseph, Senior Information Risk Manager, ING Vyasa Bank&lt;/li&gt;
&lt;li&gt;Na.Vijayashankar (Naavi), Information Assurance Consultant&lt;/li&gt;
&lt;li&gt;Elonnai Hickok, Policy &amp;amp; Advocacy Associate, Centre for Internet &amp;amp; Society (CIS)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;IT Product / Internet services company&lt;br /&gt;&lt;br /&gt;Panel will be moderated by Rahul Jain, Principal Consultant, DSCI&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;4:30- 5:00 p.m.: Presentation on Privacy by Rahul Jain, Principal Consultant, DSCI&lt;/li&gt;
&lt;li&gt;5:00- 5:30 p.m.: High Tea&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;For more info on the event &lt;a class="external-link" href="http://www.dsci.in/events/about/1697"&gt;see here&lt;/a&gt;.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/data-privacy-day-2014'&gt;http://editors.cis-india.org/news/data-privacy-day-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-04T05:34:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
