Blogger Arrested for Sharing Anti-Hamas Meme Online

British blogger Pete North was arrested for sharing an anti-Hamas meme, raising concerns about police overreach and freedom of expression in the U.K.

Pete North, a 47-year-old blogger from Yorkshire, was detained by North Yorkshire Police for several hours after posting a controversial meme on social media. He was ultimately released without charge.

The incident occurred on September 25, when police arrived at North’s home to inform him that he was being arrested for sharing content that a member of their hate crime team found objectionable. In a video recorded by North, an officer stated he was being detained “on suspicion of publishing or distributing written material intended to stir up racial hatred.”

The meme in question, which North shared on X in August, featured a Palestinian flag alongside the words: “F— Palestine. F— Hamas. F— Islam. Want to protest? F— off to Muslim country and protest.”

North later confirmed to The Telegraph that while the meme contained offensive language, the police seemed particularly focused on the part directed at Hamas. He recounted the officer’s comments during his interview, stating, “Well, firstly, let’s start with the meme. You posted a meme that said f— Hamas.” North responded, affirming that he had indeed posted the meme, citing Hamas as a proscribed terrorist organization recognized internationally, including in the U.K.

During the questioning, North pressed the officer about his knowledge of Hamas and its actions, particularly the atrocities committed on October 7. According to North, the officer appeared unaware of these events, leaving him feeling frustrated. “He was totally oblivious,” North claimed.

After hours of questioning, North was released without any charges being filed. He expressed his belief that the police should not be involved in matters of political expression on social media. “I feel quite strongly that what political cartoons and memes I post on social media is none of the police’s business,” he stated.

North further emphasized that the police’s actions seemed aimed at intimidating individuals like himself into reconsidering their online expressions. “Nobody should be facing police inquiries for posting memes on Twitter,” he added. “The whole point of this exercise is not to win convictions. It’s to terrorize people like me into thinking twice about posting spicy memes.”

North Yorkshire Police confirmed the arrest, stating, “A 47-year-old man was arrested on suspicion of publishing or distributing written material intended to stir up racial hatred. He has been released under investigation while inquiries continue.” The police department has not yet provided further comments regarding the incident.

This case raises significant questions about the balance between freedom of expression and the enforcement of hate crime laws in the U.K., particularly in the context of rising tensions surrounding political discourse related to the Israel-Palestine conflict.

As discussions about hate speech and online expression continue to evolve, the implications of this arrest may resonate beyond North’s individual experience, potentially influencing how similar cases are handled in the future.

Source: Original article

Nepal’s Social Media Ban Highlights Vulnerabilities in Gig Economy

The recent ban on social media platforms in Nepal has highlighted the vulnerabilities of the gig economy, which plays a crucial role in the country’s economic landscape.

The global gig economy employs nearly 200 million people through digital platform-based companies such as Uber, Food Panda, Zomato, and Oyo. A significant portion of gig work also occurs on social media platforms like WhatsApp, WeChat, and Facebook. This connection between the gig economy and social media becomes particularly evident during instances of public unrest triggered by social media bans.

On September 4, Nepal implemented a ban on 26 social media platforms after issuing a week-long ultimatum. This decision was not only about curtailing freedom of speech but also about the potential loss of livelihoods in a nation where tourism contributes 6.7 percent to the national GDP, amounting to over two billion USD. The protests that followed underscored the growing importance of the gig economy in Nepal.

The tourism sector in Nepal was among the first to leverage the expansive reach of social media, as noted by the Nepal Economic Forum. Jiban Ghimire, managing director of Shangri-La Nepal Trek, expressed the gravity of the situation, stating, “For us, social media used to be a very popular tool for communication. That’s now gone, and it’s a nightmare-like situation. No communication, no business.”

While the social media ban is often cited as the catalyst for the protests, there has been a noticeable lack of analysis regarding the role of the social media-driven gig economy in these events. This oversight may hinder lawmakers’ ability to craft effective policies that address the realities of the gig economy in developing countries like Nepal. Understanding the burgeoning gig economy in South Asia, particularly in relation to social media, is essential for future policymaking.

The gig economy, also referred to as the sharing economy or collaborative consumption, is characterized by non-permanent and flexible freelancing jobs facilitated by online platforms that connect service providers with consumers. This sector can be considered a “third front” in the workforce, transforming not only how people work but also how they live globally.

In Nepal, the gig economy is primarily unorganized or semi-organized, with many workers relying on digital platforms to find jobs or offer services. Many gig workers operate from home-based enterprises and lack employer-provided social security. This is particularly true for small-time tour operators and individual tourist guides who depend on social media for their livelihoods.

When the social media ban was enacted, the tourism industry in Nepal was hit hardest. The ripple effects extended to related unorganized jobs in cafes, eateries, and transportation services. While the immediate impact on tourism has been widely reported, many associated effects remain overlooked.

Nata Travel and Adventures Pvt. Ltd, a travel agency based in Kathmandu, highlighted the ban’s immediate and profound consequences in a blog post on September 6. A representative from a trekking company in Thamel, a commercial neighborhood in Kathmandu, noted that “Eighty percent of our bookings used to come from Instagram DMs or TikTok videos.”

As Nepali policymakers reflect on the protests and the implications of the social media ban, they must recognize that their focus cannot solely be on policy innovation or control over platforms like Facebook, Instagram, WeChat, and TikTok. They need to grasp how social media is propelling the gig economy within families and communities across Nepal. A holistic approach is necessary, one that encompasses not just tourism but also the broader implications for the gig economy.

In an article for the Nepal Economic Forum, Sara Pradhan emphasized the need for the government to adapt its laws to foster employment opportunities and innovation in light of emerging jobs. She pointed out that Nepal could learn from its neighbors, India and Bangladesh, regarding legal classifications of workers, job benefits, and protections against exploitation.

Venus Upadhayaya, a MOFA 2025 Taiwan Fellow and Visiting Scholar at National Chung Hsing University in Central Taiwan, is conducting doctoral research on perspectives regarding the unorganized sector. Her insights contribute to understanding the complexities of the gig economy in Nepal and the challenges it faces.

As the situation unfolds, it is clear that the intersection of social media and the gig economy in Nepal is a critical area for policymakers to address. The future of many livelihoods hangs in the balance, underscoring the need for thoughtful and informed legislation that supports this evolving economic landscape.

Source: Original article

How to Safeguard Your Privacy While Staying at Hotels

Hotel privacy concerns are common among guests, but with a few precautions, travelers can enhance their security and peace of mind during their stay.

When it comes to hotel stays, privacy is a significant concern for many travelers. Carol from Wisconsin is just one example of guests who wonder about the potential for hidden cameras or security lapses during their trips. Fortunately, most hotels prioritize guest privacy, as it is fundamental to their business model. However, being proactive and taking a few smart steps can provide additional peace of mind while away from home.

While it is rare for hotels to install cameras in guest rooms, surveillance is typically limited to public areas such as lobbies, elevators, and hallways. Nevertheless, it is wise to familiarize yourself with how to check your surroundings and identify any potential issues before settling in.

One effective way to inspect your hotel room is by utilizing your smartphone. The device can assist in uncovering any suspicious gadgets that may be present. For those on longer trips or in high-security situations, investing in dedicated devices can offer added reassurance. These tools can complement a manual sweep of the room but should not be relied upon exclusively.

If you are concerned about hidden cameras during your hotel stay, various apps available for both iOS and Android claim to help detect such devices. However, the accuracy and costs of these applications can vary significantly.

From check-in to check-out, there are several straightforward precautions you can take to safeguard your privacy and maintain control over your personal information. One of the first steps is to call ahead and inquire about the hotel’s privacy policies and security measures.

Additionally, it is advisable to install robust antivirus protection on all your devices before your trip. This software can help block malware, phishing attempts, and other threats that often proliferate through hotel Wi-Fi networks.

Consider using anti-theft applications as well. Tools like iAlertU for MacBooks and PreyProject.com for Android and Windows laptops can provide extra layers of security. Some of these applications even send you a photo if someone tampers with your device, enhancing your peace of mind.

Your privacy is important, whether you are staying for just one night or an entire week. While most hotels respect their guests, the advancement of technology has made it easier for malicious actors to exploit trust. By following these tips and utilizing available apps and gadgets, you can maintain control over your personal safety and privacy during your hotel stay.

Would you feel more secure if hotels were required to disclose their guest privacy and security practices before booking? Share your thoughts with us at Cyberguy.com.

Source: Original article

Teens Engaging in ‘Meltmaxxing’ Trend Explained

TikTok’s latest trend, “meltmaxxing,” is a humorous phenomenon that has teenagers playfully embracing exaggerated facial expressions.

TikTok, the rapidly evolving social media platform, is often home to a plethora of trends that range from dangerous to downright amusing. The newest trend captivating teenagers’ attention is “meltmaxxing,” a quirky challenge designed to entertain by pushing the limits of comedic facial expressions.

Meltmaxxing involves participants documenting their progress as they attempt to become “100 percent melted.” The challenge begins at “0% melt,” where individuals present themselves with a normal smile. As participants move to 10 or 25 percent melt, they slightly tilt their heads back to form a double chin. The melting process continues incrementally—50 percent, 75 percent—as they increase the intensity of their chin formations until they reach full “meltmaxxing” mode, marked by exaggerated, humorous multiple chins.

One TikToker offered clarity, noting that meltmaxxing is distinct from videos suggesting individuals stand in the sun until dissolution. Instead, it is about playfully compressing one’s face to create a ridiculous, multi-chinned look, serving as a light-hearted joke. Despite comments suggesting risky scenarios like performing in front of parents or in public spaces, the trend is predominantly about harmless fun and acting silly. As one participant put it, this trend is purely for amusement and not meant to be taken seriously.

Meltmaxxing serves as a parody of the broader “maxxing” culture—a more intense and controversial online phenomenon where individuals strive to achieve an exaggerated degree of certain traits. In gaming, “maxxing” implies reaching the highest level of character development. This concept has been adopted in various other areas: “looksmaxxing,” wherein teens enhance their appearance to conform to societal norms of masculinity through grooming or even cosmetic procedures; “sleepmaxxing,” to optimize rest; “wealthmaxxing,” to accumulate more resources; and “healthmaxxing,” to pursue peak physical well-being.

Although teens today engage with often perplexing slang and behaviors unique to their digital landscape, meltmaxxing represents a relatively benign expression of creativity and humor. While such trends may befuddle older generations—characteristically so as each new slang-filled era arises—meltmaxxing appears to be a simple, if not silly, form of online socialization.

Those looking to further understand the nuances of Gen Z and Gen Alpha’s ever-evolving vernacular may find solace in comprehensive guides available online, designed to help navigate the digital discourse shaping today’s youth culture according to Parents.com.

Source: Original article

Google Under Attack Again: Why Users Must Upgrade to Passkeys Immediately

Google has confirmed yet another cyberattack targeting Gmail users, once more highlighting a serious flaw: attackers are exploiting Google’s own systems to compromise user accounts. This incident reinforces the growing urgency for users to strengthen their account security. As Google issues a renewed push to upgrade to a more secure login method, the company warns this step is no longer optional, but essential.

Earlier this month, Google had already raised alarms about the vulnerability of the majority of its users who still rely on basic password protection. The tech giant stated, “We want to move beyond passwords altogether,” urging its vast user base to adopt an advanced form of authentication known as passkeys. This message has become even more critical in the wake of this latest security breach.

Passkeys are designed to be “phishing-resistant and can log you in simply with the method you use to unlock your device (like your fingerprint or face ID) — no password required,” according to Google. This new method fundamentally links a user’s account security to the security of their hardware. With no passwords or two-factor authentication (2FA) codes involved, the opportunity for cybercriminals to steal login information or intercept codes is virtually eliminated.

While the focus may appear to be on Gmail, the implications are far broader. Following up on an earlier article about password vulnerabilities, Google reached out to emphasize that passkeys protect all services tied to a Google account — not just email. Therefore, failure to adopt passkeys doesn’t only leave Gmail exposed but also puts all associated services at significant risk.

Even if the majority of users have their accounts protected by passwords and 2FA, the shift to passkeys is still necessary. Despite efforts by Google, Microsoft, and others to make 2FA a mandatory practice, risks remain. For instance, attackers can trick users into voluntarily sharing their 2FA codes. This method was central to the most recent Gmail attack, where users were duped into handing over their codes rather than having them stolen through conventional means.

Recent news headlines have been dominated by reports of a data leak involving 16 billion records. Though alarming, this is not technically a new data breach. As Bleeping Computer clarified, “this is not a new data breach, or a breach at all. The websites involved were not recently compromised to steal these credentials.” Instead, this incident is a collection of older breaches, compiled into one massive dataset.

Mashable also weighed in, saying, “Some commentators were quick to call it the largest password leak in history, and in terms of raw records exposed, that’s mostly, technically true. However, these records did not come from a single breach — or even a new breach. Instead, they came from many smaller ones,” describing the incident as a “greatest hits” of previous hacks. Regardless of the origin, the fact remains that the data has resurfaced and poses an ongoing threat.

Security firm Kaspersky cautioned that “the journalists haven’t provided any evidence of existence of this database. Therefore, neither Kaspersky’s experts nor anyone else has managed to analyze it. Therefore, we cannot say whether yours – or anyone else’s – data is in there.” Despite the uncertainty, this incident should serve as a wake-up call for internet users to reevaluate their digital security practices.

Google’s own survey data paints a worrying picture: while “60% of U.S. consumers say they ‘use strong, unique passwords,’” fewer than half actually “enable 2FA.” The gap between perception and action is troubling. SMS-based 2FA, the most commonly used method, is fast and convenient. It autofills and often auto-deletes, requiring little user effort. However, it is also highly insecure — the weakest form of 2FA available.

Other forms of 2FA, such as authenticator apps, physical security keys, and trusted device sign-ins, offer stronger protection but are often seen as inconvenient. In contrast, passkeys offer a far superior experience. They are simpler to use than both passwords and SMS-based 2FA. A passkey combines a user’s login credentials into a single, seamless action secured by the device’s biometric system. The actual code remains hidden from the user and can’t be copied or shared — even unintentionally. Even if attackers obtain the underlying code, it won’t function outside the original user’s device.

Google is adamant that the security of email accounts is just one piece of the puzzle. “When you pair the ease and safety of passkeys with your Google Account, you can then use Sign in with Google to log in to your favorite websites and apps — limiting the number of accounts you have to maintain,” the company stated. This single sign-on approach reduces the number of credentials users need to track and, more importantly, the number of weak points available for hackers to target.

There are, of course, lingering concerns about big tech’s growing role in managing access to third-party services. Critics worry about the data power and influence such centralized systems can exert. Still, Google maintains that its system is more secure than traditional methods. The argument is that reducing the number of logins across platforms — even those not owned by Google — decreases the potential for breaches.

Kaspersky echoes this advice, despite admitting uncertainty about the recent data leak. The firm recommends immediate action: “Let’s set skepticism aside. Yes, we don’t reliably know what exactly this leak is, or whose data is in it. But that doesn’t mean you should do nothing. The first and best recommendation is to change your passwords.” While that’s a sensible first step, it’s far from a complete solution.

“Use passkeys wherever possible,” Kaspersky advises. “This is the modern passwordless method of logging into accounts, which is already supported by Google, iCloud, Microsoft, Meta and others.” The collective momentum of these major tech companies suggests that passkeys will soon become the default option for secure login.

With attackers now targeting even the supposedly more secure elements of account protection, such as 2FA, the need for a new standard has become evident. Passkeys provide not only a higher level of security but also ease of use, combining biometric authentication with encrypted login credentials unique to each device.

In conclusion, the latest attack on Gmail users is not just another reminder of the vulnerabilities that exist within digital security — it is a call to action. Google’s message is clear: to protect yourself and your data, it’s time to abandon passwords and outdated forms of 2FA. With passkeys offering stronger protection and greater convenience, upgrading is no longer a recommendation — it’s a necessity.

Police Probe BJP Leaders Over Controversial Social Media Post

Indian authorities are investigating senior figures from the ruling Bharatiya Janata Party (BJP) following a controversial social media post that has stirred accusations of anti-Muslim sentiment.

The contentious animated video portrays senior leaders from the opposition Congress party favoring Muslims over marginalized communities. The depiction sparked outrage, prompting swift action from law enforcement.

Shortly after the police initiated their inquiry, the Election Commission intervened, directing the social media platform X (formerly Twitter) to remove the video, citing a breach of Indian laws. Despite this, there has been no immediate response from either X or the BJP.

The Election Commission’s intervention came after its electoral officer in Karnataka, where the video originated, had previously instructed X to take down the post. However, this directive was not promptly executed. Notably, the video surfaced just days before voting in Karnataka, which concluded recently.

This is not the first instance of such divisive content from the BJP. Prime Minister Narendra Modi himself has echoed similar sentiments during campaign rallies, alleging preferential treatment towards Muslims by opposition parties.

As India progresses through a general election cycle, regulations prohibit political parties from exploiting religious issues for electoral gains. Nonetheless, critics argue that PM Modi and his Hindu nationalist party are resorting to blatant Islamophobia, flouting the electoral code of conduct.

India, with its substantial Muslim population of around 200 million, has witnessed a surge in anti-Muslim rhetoric since the BJP ascended to power in 2014.

The video, initially shared on the BJP’s social media platform in Karnataka, has garnered widespread attention, accumulating over nine million views on X. It depicts caricatures of prominent Congress leaders, Rahul Gandhi and Karnataka Chief Minister K Siddaramaiah, allegedly favoring Muslims over other marginalized groups.

Following a formal complaint lodged by the Congress party with the Election Commission, the Karnataka police registered a case against BJP President JP Nadda, the party’s Karnataka chief, BY Vijayendra, and the head of its IT department, Amit Malviya.

Criticism of the video has poured in from various quarters. Congress MP Manickam Tagore condemned the BJP’s tactics, urging the Election Commission to intervene and uphold the principles of unity in a democratic setup.

British academic Nitasha Kaul likened the video to propaganda reminiscent of 1930s Germany, emphasizing its violation of election regulations.

Opposition leaders and civil society groups have decried BJP’s campaign tactics as divisive and unacceptable. Trinamool Congress MP Saket Gokhale lamented the erosion of ethical standards in the ongoing election.

Congress leader Salman Anees Soz lamented the blatant anti-Muslim sentiment propagated by the BJP.

This incident follows a similar episode where the BJP posted a misleading video on Instagram accusing the Congress of favoring Muslims over non-Muslims, further exacerbating communal tensions.

Despite facing backlash, PM Modi continues to make controversial remarks, including accusations of “vote jihad” and insinuations aligning the Congress with Pakistan’s interests.

Critics argue that such rhetoric not only violates electoral norms but also exacerbates communal tensions in the diverse fabric of Indian society.

Twitter’s Move Against Manipulated Media: A Step Towards Accountability

In a notable turn of events, Twitter took action against Amit Malviya, the head of the Bharatiya Janata Party’s IT cell, by tagging one of his tweets as ‘manipulated media’. This marks a significant departure as it’s the first instance of Twitter applying restrictive measures against a prominent Indian political figure.

This move comes in the wake of Twitter’s recent policy adjustments aimed at curbing the dissemination of misinformation on its platform. One of the key changes introduced by Twitter is its heightened vigilance towards manipulated media, a policy that was initially outlined in November 2019.

The genesis of this policy can be traced back to Twitter’s recognition of the need to address a broader spectrum of deceptive media practices compared to its counterparts like Facebook. While Facebook primarily focused on combatting deepfakes—videos synthesized from scratch—Twitter’s approach was more encompassing. It took into account user feedback indicating a preference for contextualization over outright removal of manipulated media.

The precedent for such actions was set when Twitter flagged a video posted by then-US President Donald Trump in June 2020. Trump’s tweet featured a clip portraying two toddlers of different races hugging, with a CNN-like chyron falsely insinuating racism. This manipulation was promptly identified by journalists, who clarified that the original story was about the friendship between the children.

In contrast, the tweet by Malviya didn’t involve doctored media but rather an edited clip designed to distort reality. The edited footage, in response to a widely circulated image showing a policeman seemingly striking an elderly farmer during protests, was used by Malviya to propagate a narrative suggesting that the baton didn’t actually make contact with the farmer. Moreover, Malviya dismissed accusations of government violence against peaceful protesters as opposition propaganda.

However, a closer examination of the events, as elucidated by an Alt News article, reveals instances of police resorting to lathi charges against farmers, who retaliated with stone-pelting. Various news outlets reporting from the scene corroborated this, depicting scenes of violent police action in response to farmers breaking blockades.

Twitter’s decision to flag Malviya’s tweet as ‘manipulated media’ hinges on its policy’s emphasis on preventing deceptive usage of media content. The platform’s Synthetic and Manipulated Media policy stipulates that sharing media in a manner intended to mislead or deceive, thereby fostering confusion or misunderstanding, warrants intervention.

While Twitter’s efforts to hold political leaders accountable for misleading content have garnered praise, questions linger regarding the consistency of its application. Internationally, the last instance of Twitter invoking its ‘synthesized or manipulated media’ clause against political figures dates back to September 2019, when it restricted tweets from journalists and government accounts in Cuba following President Miguel Diaz-Canel’s address regarding an energy crisis exacerbated by US sanctions. This move drew criticism, with concerns raised over potential censorship and selective enforcement of platform manipulation policies.

In the Indian context, despite evidence suggesting widespread misuse of social media for propagating misinformation, Twitter’s response has been perceived as inadequate. Reports indicate the existence of thousands of fake accounts amplifying fake news, particularly associated with major political parties like the BJP and Congress. Despite such findings, Twitter has yet to take decisive action comparable to its response in other regions.

Furthermore, Twitter’s compliance with government directives, such as the removal of tweets critical of the Indian government in Kashmir and the withholding of Kashmiri accounts in India, has sparked controversy. Critics argue that such actions raise questions about Twitter’s commitment to free expression and its impartiality in addressing sensitive geopolitical issues.

Moreover, Twitter has faced criticism for its perceived inaction against instances of online abuse, particularly those rooted in misogyny and casteism. This perceived bias has prompted some users to explore alternative platforms like Mastodon in protest.

Twitter’s move to flag Amit Malviya’s tweet as ‘manipulated media’ signifies a step towards holding political figures accountable for deceptive content. However, questions persist regarding the platform’s consistency in enforcing such policies, especially in contexts like India where the spread of misinformation is a pressing concern.

Truth Social Shares Plummet, Trump’s Stake Loses Billions in Value

Shares of Truth Social, the social media platform launched by former President Trump’s company, Trump Media & Technology Group, have experienced a significant downturn in the past couple of weeks following its initial surge.

According to recent reports, the company’s shares plunged by 8% on Monday, following a 12% drop on Friday. This downward trend has pushed the stock to its lowest level since its trading debut on March 26, indicating a volatile market performance with notable fluctuations.

This decline has had a substantial impact on the value of Trump’s stake in the company. As the majority stakeholder, Trump saw the value of his shares plummet from a peak of over $6 billion during the trading debut to approximately $2.9 billion as of Monday.

Despite this significant valuation, analysts have raised concerns regarding the company’s financial standing. Trump Media & Technology Group reported a loss of $58 million in the previous year, coupled with a modest revenue of just over $4 million. Such figures have prompted skepticism about the inflated value attributed to Trump’s stake.

Moreover, Trump’s ability to offload his shares is restricted until September under the current agreement. However, he retains the option to request permission from the board of Trump Media to divest some of his stake ahead of schedule. Notably, the board comprises individuals with close ties to Trump, including his son, Donald J. Trump Jr., and former administration officials.

Despite warnings from analysts about the detachment of the company’s stock value from its actual financial performance, support for Truth Social persists among individual investors. Many of these investors are believed to be ardent supporters of Trump, contributing to the sustained trading activity of the company’s shares.

Misinformation Fuels Surge in Food Bank Usage Among International Students in Canada

In London, Ontario, a surge in visits to the local food bank, particularly by international students, has been fueled by a misunderstanding of how Canadian food banks operate, compounded by misleading information circulating on social media. Glen Pearson, co-executive director of the London Food Bank, reported a 43% increase in visits at the beginning of the school year, with a noticeable rise in requests from post-secondary students, many of whom were international students from Fanshawe College.

According to Pearson, the surge in demand was exacerbated by social media posts, including a YouTube video in Malayalam, a language spoken in southern India. The video suggested that Canadian food banks could provide a regular supply of free food, contrary to their intended purpose as emergency resources. Pearson expressed concern about the sudden increase, stating, “It caused some concern as to whether or not we would have enough supply.”

This situation is not unique to London. A food bank in Brampton had to close its doors to international students due to overwhelming demand that the food bank couldn’t meet. The London Food Bank’s experience prompted a response from Fanshawe College administration, leading to an email sent to all students to clarify the proper role of food banks. Once informed, students were apologetic for the misunderstanding.

John Riddell of the Fanshawe Student Union acknowledged the need to counter misinformation circulating among students. He clarified that while there might be a misunderstanding about the purpose of food bank resources, there is a significant number of students in legitimate need of support. Fanshawe College operates a food bank for students called The Sharing Shop, providing grocery gift cards to students in need a few times a year. Referrals can be obtained from campus learning advisers.

Similarly, Western’s University Students’ Council (USC) manages a food bank that offers food hampers to students demonstrating need through an online request form. Bianca Gouveia, vice-president of student services at USC, highlighted the high demand for their services, with nearly 600 hamper requests this year. The USC transitioned from in-person visits to an online request form in September to better handle the increasing number of requests.

Gouveia acknowledged the financial challenges faced by students, stating, “Students are feeling pressure on all fronts for the cost of living.” The surge in food bank usage among students reflects the broader struggles many Canadians, including students, face due to rising costs of essentials such as housing and food.

A combination of rising living costs and misinformation, particularly on social media, has led to a significant increase in international students seeking assistance from food banks in London and other parts of Canada. Efforts by college administrations and student unions to clarify the purpose of food banks have been essential in addressing the issue. While dispelling misinformation, it remains crucial to recognize and address the legitimate needs of students facing financial challenges in Canada.

Indian Parliament Passes Landmark Data Protection Bill

The Rajya Sabha (the upper house of the Indian Parliament) on Wednesday, August 9th  passed the Digital Personal Data Protection Bill (DPDPB), 2023 by voice vote. The Bill will now become law after President Draupadi Murmu grants her assent.

From hefty penalties ranging from a minimum of ₹50 crore to a maximum of ₹250 crore on social media platforms for violating rules to enabling digital markets to grow more responsibly while safeguarding citizens’ data, the Data Protection Bill was passed by the Lok Sabha (the lower house of the Indian Parliament) on August 7.

In the Upper House, the Bill was presented for passage by Minister for Electronics and Information Technology, Ashwini Vaishnaw.

Industry leaders on Wednesday hailed the passing of the Digital Protection Data Protection (DPDP) Bill 2023 by the Parliament, saying India is rapidly digitising and hence the bill stands as a crucial and long-awaited piece of legislation which upholds an individual’s right to safeguard their digital privacy.

Minister of State for Electronics and IT, Rajeev Chandrasekhar, tweeted that he feels deeply privileged at being given an opportunity by Prime Minister Narendra Modi “to help achieve this important step to protect our citizens rights and support innovation economy and governance”.

“My engagement on the issue of privacy started in 2010 and led to me filing a case in the Supreme Court as a petitioner that fought and succeeded in order that Privacy is a fundamental right,” he said.

“More than a decade on, India and Indians under PM Modi have a global standard Digital Personal Data Protection law,” the minister posted.

Union Telecom Minister Ashwini Vaishnaw moved the Digital Personal Data Protection Bill, 2023 for consideration and passing in the Rajya Sabha after the Lok Sabha had already passed it.

Ruchir Shukla, MD, Safehouse Tech said that the bill is set to establish an international benchmark for data protection frameworks. “While online safety for institutions have been prioritised thus far, this bill will ensure safeguarding individuals in the digital world too,” Shukla said.

The Data Protection Bill will assess penalties based on the nature and severity of the breach, with potential fines of up to ₹250 crore for instances of data breaches, failure to protect personal data, or failure to inform the Board and users of a breach.

The Bill will apply to the processing of digital personal data within India where such data is collected online, or collected offline and is digitised. It will also apply to such processing outside the country, if it is for offering goods or services in India.

Personal data may be processed only for a lawful purpose upon consent of an individual. Consent may not be required for specified legitimate uses such as voluntary sharing of data by the individual or processing by the state for permits, licences, benefits, and services.

Data fiduciaries will be obligated to maintain the accuracy of data, keep data secure, and delete data once its purpose has been met.

The Bill grants certain rights to individuals, including the right to obtain information, seek correction and erasure, and grievance redressal.

The Centre may exempt government agencies from the application of provisions of the Bill in the interest of specified grounds such as security of the state, public order, and prevention of offences.

According to Manish Sehgal, Partner, Risk Advisory, Deloitte India, the Bill will enhance the privacy cognisance of Indian citizens by empowering them with their privacy rights through transformative accountability measures to be adopted by the enterprises. The Bill brings in the much-needed legal framework to foster trust in digital markets. On one hand, it protects the privacy of Indian digital citizens and on the other, it enables digital markets to grow more responsibly.

In the event of a data breach, companies are mandated to promptly inform the Data Protection Board (DPB) and the affected users. Processing data of minors and individuals with guardians must be done only with the consent of guardians, according to the Bill.

-+=