<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1751 to 1765.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-and-surveillance-roundtable-new-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-icann-50"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-policy-brief-iana-transition-fundamentals-and-suggestions-for-process-design"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/understanding-iana-transition"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/common-wealth-domain-name-system-forum-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/privacy-surveillance-roundtable"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/research-advisory-network-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/content-removal-on-facebook"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-and-surveillance-roundtable-new-delhi">
    <title>Privacy and Surveillance Roundtable</title>
    <link>https://cis-india.org/internet-governance/events/privacy-and-surveillance-roundtable-new-delhi</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society and the Cellular Operators Association of India invite you to a roundtable at the India International Centre, New Delhi on July 4, 2014.&lt;/b&gt;
        &lt;h3&gt;Background and Context to the Roundtables&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, lawful interception of communications may be conducted by the state in three ways: firstly, intercepting telephone calls and other telecommunications may take place under powers listed in the Telegraph Act, 1885 and procedure set out in the Telegraph Rules, 1951; secondly, intercepting written communications transmitted through the postal service or by private couriers may occur under the Post Office Act, 1898; and, thirdly, intercepting, de-crypting, and monitoring email messages and other electronic communications may take place under the Information Technology Act, 1950 and two sets of Rules issued in 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government’s intention to create a Central Monitoring System to automate the existing process of telephone tapping is significant for a number of reasons. It will bypass private telephone service providers; currently the active cooperation of TSPs is required and compelled in order to intercept and monitor a telephone conversation. This creates an extra layer of compliance activity for TSPs which is cumbersome and expensive. Interception orders from the state often do not comply with the procedure required by law. This uncertainty is compounded by the lack of an indemnity for TSPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, while the CMS will release TSPs from legal liability, it will leave the government free to conduct telephone interceptions in absolute secrecy and without a credible system of oversight and checks and balances. Amongst the world’s major democratic countries, India is alone in refusing to overhaul its telephone tapping regime. The legal requirements of probable cause, judicial sanction, and warrant-based interception – which are followed with exceptions in democracies around the world – are not adequately protected in India.  The same principles also apply to the interception of postal and electronic communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several intelligence and police agencies in India that conduct interceptions of communications without central coordination. Previous cases in the Supreme Court of India and a few Indian High Courts reveal many cases of improper and even illegal surveillance. The sheer number of interested state agencies, the concerns of inadequate oversight, the lack of a credible legal regime, the constant leaks of private communications, and the poor legal protection given to TSPs and ISPs must be legally addressed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information about the Roundtables&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Privacy and Surveillance Roundtables are a CIS initiative, in partnership with the Cellular Operators Association of India (COAI).  From June 2014 – November 2014, CIS and COAI will host seven Privacy and Surveillance Roundtable discussions across multiple cities in India. The Roundtables will be closed-door deliberations involving multiple stakeholders. Through the course of these discussions we aim to deliberate upon the current legal framework for surveillance in India, and discuss possible frameworks for surveillance in India. The provisions of the draft CIS Privacy Bill 2013, the International Principles on the Application of Human Rights to Communication Surveillance, and the Report of the Group of Experts on Privacy will be used as background material and entry points into the discussion. The recommendations and dialogue from each roundtable will be compiled and submitted to the Department of Personnel and training.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Report of the Group of Experts on Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In January 2012 Justice A.P. Shah formed a committee to create a report of recommendations for privacy legislation in India. The committee met seven times from January 2012 to September 2012.  The Report is made up of six chapters and begins by reviewing the international best practices around privacy and the relevant Indian jurisprudence. The Report then recommends nine National Privacy Principles to be adopted by each sector in India. The Nine National Privacy Principles reflect international standards, as well as taking into consideration the Indian context. Along with the National Privacy Principles, the Report lays out a regulatory framework for privacy including privacy commissioners at the regional and national level, self regulating organizations at the industry level, and a system of complaints. Finally the report demonstrates how the National Privacy Principles could be used to harmonize existing legislation and practices.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Draft CIS Citizens Privacy (Protection) Bill 2013&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been researching privacy in India since 2010 with the objective of raising public awareness, completing in depth research, and driving a privacy legislation in India. As part of this work, the Centre for Internet and Society has drafted the Privacy (Protection) Bill 2013. The Citizens Privacy Protection Bill contains provisions that speak to data protection, interception, and surveillance. The Bill also establishes the powers and functions of the privacy commissioner, and lays out offenses and penalties for contravention of the Act. The Bill represents a citizens’ version of a privacy legislation, and will be shared with civil society, industry, and government. It is hoped that the review and revision of the Bill will be a participatory process, and thus comments and feedback to it’s’ provisions will be included as annex’s to the Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The International Principles on the Application of Human Rights to Communication Surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These principles were defined in 2013 in response to rapidly changing technologies and surveillance practices. The principles are the outcome of a global consultation with civil society groups, industry and international experts in communications surveillance law, policy and technology, spearheaded by the Electronic Frontier Foundation US and Privacy International UK. As technologies that facilitate State surveillance of communications advance, States are failing to ensure that laws and regulations related to communications surveillance adhere to international human rights and adequately protect the rights to privacy and freedom of expression. These principles attempt to explain how international human rights law applies in the current digital environment, particularly in light of the increase in and changes to communications surveillance technologies and techniques. These principles can provide civil society groups, industry, States and others with a framework to evaluate whether current or proposed surveillance laws and practices are consistent with human rights.&lt;/p&gt;
&lt;h3&gt;Tentative Agenda&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.00&lt;br /&gt;11.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Introduction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00&lt;br /&gt;11.30&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30&lt;br /&gt;13.00&lt;/td&gt;
&lt;td&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00&lt;br /&gt;14.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00&lt;br /&gt;16.00&lt;/td&gt;
&lt;td&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.00&lt;br /&gt;16.15&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h3&gt;Resources&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf" class="external-link"&gt;CIS &lt;span class="highlightedSearchTerm"&gt;Privacy&lt;/span&gt; Protection Bill, 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://en.necessaryandproportionate.org/text"&gt;International Principles on the Application of Human Rights to Communication &lt;span class="highlightedSearchTerm"&gt;Surveillance&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;The Report of the Group of Experts on &lt;span class="highlightedSearchTerm"&gt;Privacy&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-and-surveillance-roundtable-new-delhi'&gt;https://cis-india.org/internet-governance/events/privacy-and-surveillance-roundtable-new-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-29T14:50:20Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-icann-50">
    <title>Report on ICANN 50</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-icann-50</link>
    <description>
        &lt;b&gt;Jyoti Panday attended ICANN 50 in London from 22-26 June. Below are some of the highlights from the meeting. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;From 22- 26 June, ICANN hosted its 50&lt;sup&gt;th&lt;/sup&gt; meeting in London, the largest congregation of participants, so far. In the wake of the IANA transition announcement, Internet governance was the flavor of the week. ICANN’s transparency and accountability measures emerged as much contested notions as did references to NETmundial. This ICANN meeting clearly demonstrated that questions as to the role of ICANN in internet governance need to be settled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;ATLAS II&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Coinciding with ICANN meeting was the 2&lt;sup&gt;nd&lt;/sup&gt; At-Large Summit, or ATLAS II, bringing together a network of regionally self organized and self supporting At-Large structures, representing individual Internet users throughout the world. The goal of the meeting was to discuss, reach consensus and draft reports around five issues organized around five issues organized around thematic groups of issues of concerns to the At-Large Community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The subjects for the thematic groups were selected by the representatives of ALSes, each summit participant was allocated to thematic groups according to his/her preferences. The groups included were:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Future of Multistakeholder models &lt;/li&gt;
&lt;li&gt;The Globalization of ICANN &lt;/li&gt;
&lt;li&gt;Global Internet: The User perspective &lt;/li&gt;
&lt;li&gt;ICANN Transparency and Accountability &lt;/li&gt;
&lt;li&gt;At-Large Community Engagement in ICANN &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Fahad Chehade Five Point Agenda &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN President, Mr Chehade in his address to the ICANN community covered five points which he felt were important for ICANN in planning its future role.  The first topic was the &lt;a href="http://icannwiki.com/IANA" title="IANA"&gt;IANA&lt;/a&gt; Stewardship and transition, and he stated that ICANN is committed to being a transparent organization and seeks to be more accountable to the community as the contract with the US government ends. Regarding the IANA transition, he remarked that ICANN had received thousands of comments and proposals regarding the transition of IANA stewardship and understood there would be much more discussion on this subject, and that a coordination group has been proposed of 27 members representing all different stakeholders in order to plot the course forward for IANA transition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His second topic was about ICANN globalization and hardening of operations. He said that ICANN has about 2-3 years to go before he is comfortable that ICANN operations are where they need to be. He applauded the new service channels which allows customer support in many different languages and time zones, and mentioned local language support that would add to the languages in which ICANN content is currently available. Chehade spent a few minutes discussing the future of WHOIS "Directory" technology and highlighted the initial report that a working group had put together, led by Jean-Francois Poussard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Next he covered the GDD, the Global Domains Division of ICANN and an update from that division on the New gTLD program. He mentioned the ICANN Auction, the contracts that had been signed, and the number of New gTLDs that had already been delegated to the Root. Internet Governance was Chehade's 4th topic of discussion, he applauded the NETmundial efforts, though he stressed that internet governance is one of the things that ICANN does and it will not be a high priority. He ended his speech with his last point, calling for more harmony within the ICANN community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;High Level Government Meeting&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During ICANN London, UK government hosted a high-level meeting, bringing together representatives from governments of the world to discuss Internet Governance and specifically the NTIA transition of the IANA contract.  Government representatives recognized that the stewardship of IANA should be a shared responsibility between governments and private sector groups, while other representatives stressed giving governments a stronger voice than other stakeholders. The consensus at the meeting held that the transition should not leave specific governments or interest groups with more control over the Internet, but that governments should have a voice in political issues in Internet Governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;GAC Communiqué&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;GAC Communique, is a report drafted by the &lt;/b&gt;Governmental Advisory Committee, advising the ICANN board on decisions involving policy and implementation. Highlights from the communiqué include:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The GAC advises the Board regarding the .africa string, saying it would like to see an expedited process, especially once the Independent Review Panel comes to a decision regarding the two applicants for the string. They reaffirm their decision that DotConnectAfrica's application should not proceed.&lt;/li&gt;
&lt;li&gt;The GAC mentioned the controversy surrounding .wine and .vin, where some European GAC representatives strongly felt that the applications for these strings should not proceed without proper safeguards for geographic names at the second level. However, the GAC was unable to reach consensus advice regarding this issue and thus did not relay any formal advice to the Board.&lt;/li&gt;
&lt;li&gt;The GAC requested safeguards in the New gTLDs for IGO (Inter-Governmental Organization) names at the second level, and specifically related such advice for names relating to Red Cross and Red Crescent. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil Society in ICANN and Internet Governance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NCUC, or the Noncommercial Users Constituency www.ncuc.org,  voice of civil society in ICANN’s policy processes on generic top level domain names and related matters, as well as other civil society actors from the ICANN community organized a workshop to provide an opportunity for open and vigorous dialogue between public interest advocates who are active both within and outside the ICANN community.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-icann-50'&gt;https://cis-india.org/internet-governance/blog/report-on-icann-50&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-10-12T05:42:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations">
    <title>PMA Policy and COAI Recommendations </title>
    <link>https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Ministry of Communications and Information Technology on the 10th of February, 2012 released a notification &lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt; in the Official Gazette outlining the Preferential Market Access &lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt; Policy for Domestically Manufactured Electronic Goods 2012. The Policy is applicable to procurement of telecom products by Government Ministries/Departments and to such electronics that had been deemed to having security concerns, thus making the policy applicable to private bodies in the latter half. The Notification reasoned that preferential access was to be given to domestically manufactured electronic goods predominantly for security reasons. Each Ministry or Department was to notify the products that had security implications, with reasons, after which the notified agencies would be required to procure the same from domestic manufacturers. This policy was also meant to be applicable to even procurement of electronic goods by Government Ministries/Agencies for Governmental purposes except Defence. Each Ministry would be required to notify its own percentage of such procurement, though it could not be less than 30%, and also had to specify the Value Addition that had to be made to a particular product to qualify it as a domestically manufactured product, with the policy again specifying the minimum standards. The policy was also meant for procurement of electronic hardware as a service from Managed Service Providers (MSPs).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The procurement was to be done as according to the policies of the each procuring agency. The tender was to be apportioned according to the procurement percentage notified and the preference part was to be allotted to the domestic manufacturer at the lowest bid price. If there were no bidders who were domestic manufacturers or if the tender was not severable, then it was to be awarded to the Foreign Manufacturer and the percentage adjusted as against other electronic procurement for that period.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Telecom equipment that qualifies as domestically manufactured telecom products for preferential market access include: encryption and UTM platforms, Core/Edge/Enterprise routers, Managed leased line network equipment, Ethernet Switches, IP based Soft Switches, Media gateways, Wireless/Wireline PABXs, CPE, 2G/3G Modems, Leased-line Modems, Set Top Boxes, SDH/Carrier Ethernet/Packet Optical Transport Eqiupments, DWDN systems, GPON equipments, Digital Cross connects, small size 2G/3G GSM based Base Station Systems, LTE based broadband wireless access systems, Wi-Fi based broadband wireless access systems, microwave radio systems, software defined radio cognitive radio systems, repeaters, IBS, and distributed antenna system, satellite based systems, copper access systems, network management systems, security and surveillance communication systems (video and sensors based), optical fiber cable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy also mentioned the creation of a self-certification system to declare domestic value addition to the vendor. The checks would be done by the laboratories accredited by the Department of Information Technology. The policy was to be in force for a period of 10 years and any dispute concerning the nature of product was to be referred to the Department of Information Technology.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;International and Domestic Response to the Policy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There was a large scale opposition, usually from international sectors, towards the mooting of this policy. Besides business houses, even organizations like those of the United States Trades Representatives criticized the policy as being harmful to the global market and in violation of the World Trade Organization Guidelines.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Criticism also poured in from domestic bodies in terms of recommendations towards modification of the policy largely on three grounds: (i) the high domestic value addition requirement and the method of calculation of the same, (ii) the lack of a link between manufacturing and security and (iii) application of the policy to the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Cellular Operations Association of India (COAI) in a letter dated March 15, 2012 to the Secretary of the Department Technology and Chairman of the Telecom Commission expressed its views on the telecom manufacturing in the country.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;The COAI stated that such a development had to be done realistically and holistically so that the whole eco-system was developed as a comprehensive whole. In that regard it also forwarded a study that had been commissioned by COAI and conducted by M/s. Booz and Company titled “Telecom Manufacturing Policy – Developing an Actionable Roadmap”. The report was a comprehensive study of the telecom industry and outlined the challenges and opportunities that lay on its development trajectory. It also talked about Government involvement in the development process. The Report while citing the market share of Indian Telecom Industry which would be around 3% &lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt; of the Global Market highlighted the fact that no country could be self-sufficient in technology. It further talked about the development of local clusters in order to cut costs and encourage manufacturing, while ensuring that the PMA Policy was consistent with the WTO Guidelines. It further recommended opening up of foreign investments and making capital available to ensure growth of innovation. Finally it highlighted the lack of a connection between manufacturing and security and instead stressed upon proper certification, checks and development of a comprehensive CIIP framework across all sensitive networks for security purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a further letter to the Joint Secretary of the Department of Information and Technology dated April 25, 2012 the COAI expressed some reservations concerning the draft guidelines that had been published along with the notification.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; While stressing upon the fact that a higher value addition would be impossible with the lack of basic manufacturing capabilities for the development of technological units, it also highlighted the need to redefine Bill of Materials which had been left ambiguous and subject to exploitation. It further highlighted the fact that allowing every Ministry to make its own specifications would lead to inconsistent definitions and an administrative challenge and hence such matters should be handled by a Central Body. Furthermore it opined that the calculation of BOMs and the Value Additions should be done using the concept of substantial transformation as has been given in the Booz Study. Furthermore, while discouraging the use of disincentives, it stated that one individual Ministry should be in charge of specifying such incentives to avoid confusion and for the sake of ease of business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another letter to a Member of the Department of Telecommunications dated July 12, 2012 the COAI stressed upon the futility of having high value additions as the same was impossible under the present scenario.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; There was a lack of manufacturing sector which had to be comprehensively developed backed by fiscal incentives and comprehensive policies. In spite of that, it stressed that no country could become self-reliant and that such policies, like the PMA, were reminiscent of the “license and permit raj” era. It further said that such policies should be consistent with WTO Guidelines and should not give undue preference to domestic manufacturers to the detriment of other manufacturers. Countering the security aspect, it said that the same had been addressed by the DoT License Amendment of May 31, 2011 whereby all equipments on the network would have to comply with the “Safe to Connect” standard, and stressed upon the lack of any link between manufacturing and security. Furthermore for calculation of Value Addition it suggested an alternative to the method proposed by the Government as the same would lead to disclosures of sensitive commercial information which were contained in the BOMs. The COAI said that the three stages as laid out in the Substantial Transformation (as mentioned in the Booz Study) should be used for calculating the VA. It made several proposals to develop the telecom manufacturing industry in India including provision of fiscal incentives, development of telecom clusters and comprehensive policies which led to harmonization with laws and creation of SEZs among other such benefits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In October 2012 the Government released a draft notification notifying products due to security consideration in furtherance of the PMA Policy.&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;The document outlined the minimum PMA and VA specification for a range of products. It also stated several security reasons for pursuing such a policy and stated that India had to be completely self-reliant for its active telecom products. It also contained data on the predicted growth of the telecom market in India. The COAI thereafter released a document commenting upon the draft notification of the Government.&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides highlighting the fact that the COAI still had not received a response to its former comments, it again stressed upon the lack of a link between security and manufacturing. It reiterated its point on the impossibility of a complete self-reliance on any nation’s part, and stressed upon the need of involving other stakeholders in the promulgation of such policies. It also made changes to the notified list of equipments, reclassifying it according to technology and only listing equipments which had volumes. Furthermore it also suggested changes towards the calculation of value addition to include materials sourced from local suppliers, in-house assemblage to be considered local material and the calculation to be done for complete order and not for each item in the order. It further recommended a study be conducted and the industry be involved while predicting demands as such were dated and needed revision. The Government thereafter released a revised notification&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; on October 5, 2012 but it did not contain much of the commented changes that the COAI had proposed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thereafter in April 2013, the DeitY released draft guidelines&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; for providing preference to domestically manufactured electronic products in Government Procurement in further of the second part of the PMA Policy. The guidelines besides containing definitions to several terms such as BOM also prescribed a minimum of 20% domestic procurement while leaving the specifications onto individual Ministries. It recommended the establishment of a technical committee by the concerned Ministry or Department that would recommend value addition to products. It followed a BOM based calculation of Value Addition while leaving the matter of certification to be dealt by DeitY certified laboratories that are notified for such purposes by the concerned Ministry/Department. DeitY was the nodal ministry for monitoring the implementation of the policy while particular monitoring was left to each Ministry or Department concerned. Among the annexures were indicative lists of generic and telecom products and a format for Self Certification regarding Domestic Value Addition in an Electronic Product.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI thereafter released a revised draft containing its own comments on April 15, 2013.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; The COAI pointed out faults in the definition of BOM. It highlighted the difficulty in splitting R&amp;amp;D according to countries, and also stressed upon the impractical usage of BOM in calculation of value addition as the same was confidential business information. As it had already suggested earlier, it reiterated the usage of the Substantial Transformation process for the calculation of Value Addition. While removing the lists of equipments mentioned, it further pointed out that the disqualification in the format for self-certification would be a very harsh disincentive and would result in driving away manufacturers. It suggested that there should be incentives for compliance instead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI along with the Association of Unified Telecom Service Providers of India sent a letter dated January 24, 2013 to the Secretary, DoT containing their inputs on Draft List of Security Sensitive Telecom Products for Preferential Market Access (PMA).&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; It again stressed upon the fact that security and manufacturing were not related and that the security aspect had been dealt by the “Safe to Connect” requirement mandated by the DoT License Amendment. It talked of the impossibility of arriving at VA figures until the same is defined to internationally accepted norms. Further it opined that if the Government had security concerns it should consider VA at a network level in the configurations as would be deployed in the network or its segments rather at element or subsystem levels as the latter would leave too many calculations open and the procurement entities will find it very difficult to ensure if they meet the PMA requirement or not. It further stressed upon the need to comply with WTO Guidelines while stressing upon the need to pay heed to certification standards than pursue the unavailable link between manufacturing and security through a PMA Policy. Finally it suggested a grouping of telecom products for the policy based on technology rather than individual products.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pursuant to a Round Table Conference Organized by the Department of Information and Technology, AUSPI and COAI sent another letter dated April 15, 2013 to the Secretary, Department of Information and Technology.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; It reiterated several points that both the AUSPI and COAI had been suggesting to the Government on the Telecom Manufacturing Policy. It cited the examples of other manufacturing nations to reiterate the fact that no country could be completely self-reliant in manufacturing electronics and such positions would only lead to creation of an environment that would not be conducive to global business. It further stressed upon the need to change the manner of calculation of VA while highlighting the fact that every Department should notify its list of products having security implications and the list of telecom equipment should be deleted from the draft guidelines being issued by DeitY to ensure better implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A major change came in on July 8, 2013 when the Prime Minister’s Office made a press release withdrawing the PMA policy for review and withholding all the notifications that had been issued in that regard.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; It said that  he revised proposal will incorporate a detailed provision for project / product / sector specific security standards, alternative modes of security certification, and a roadmap for buildup of domestic testing capacity. It further noted that the revised proposal on PMA in the private sector for security related products will not have domestic manufacturing requirements, percentage based or otherwise and that the revised proposal will incorporate a mechanism for a centralised clearing house mechanism for all notifications under the PMA Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI thereafter on November 7, 2013 sent a letter to the DoT containing feedback on the list of items slated for Government procurement.&lt;a href="#fn16" name="fr16"&gt;[16] &lt;/a&gt;It noted that there were 23 products on which PMA was applicable. It pointed out that there were no local manufacturers for many of the products notified. It also asked the Government to take steps to ensure that fiscal incentives were given to encourage manufacturing sector which was beset by several costs such as landing costs which acted as impediments to its development. It stressed upon the tiered development of the industry needed to ensure that a holistic and comprehensive growth is attained which would result in manufacturing of local products. It requested that the Government "focus on right enablers (incentives, ecosystem, infrastructure, taxation) as the outcome materializes once all of these converge."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI sent a further letter dated November 13, 2013 to the DoT concerning the investment required in the telecom manufacturing industry.&lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;It noted the projected required investment of 152bn USD in the telecom sector and that the Government had projected that 92% of the investment would have to come from the Private Sector. COAI, while stressing upon the need of the Government and the Private Industry to work in tandem with each other, suggested that the Government devise methods to attract investments in the telecom sectors from international telecom players and that the Telecom Equipment Manufacturing Council meet to review and revise methods for attracting such investments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pursuant to the PMO directive, DeitY released a revised PMA Policy on the 23rd of December, 2014.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; While there have been a few major changes, not all of recommendations by various bodies have been adhered to.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;The major changes in the revised policy included the exemption of the private sector from the policy and the removal of PMA Policy to equipments notified for security reasons. The manner of calculation of the domestic value addition has not been changed though there has been a reduction in the percentage of value addition needed to qualify a product as domestic product. Another addition has been of a two-tiered implementation mechanism for the Policy. Tier-I includes a National Planning and Monitoring Council for Electronic Products which would design a 10-year roadmap for the implementation of the policy including notification of the products and subsequent procurement. Under Tier-II, the Ministries and Departments will be issuing notifications specifying products and the technical qualifications of the same, after approval by the Council. The former notifications under the 2012 Policy, including the notification of 23 telecom products by Department of Telecom,&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; are still valid until revised further.&lt;a href="#fn21" name="fr21"&gt;[21] &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. No. 8(78)/2010-IPHW. Available at http://www.dot.gov.in/sites/default/files/5-10-12.PDF (accessed 03 June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Preferential Market Access&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See &lt;i&gt;The PMA Debate, &lt;/i&gt;DataQuest at http://www.dqindia.com/dataquest/feature/191001/the-pma-debate/page/1 (accessed June 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. The letter is available at http://www.coai.com/Uploads/MediaTypes/Documents/letter-to-dit-on-pma-notification.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Around $17bn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. The letter is available at http://www.coai.com/Uploads/MediaTypes/Documents/letter-to-dit-on-pma-notification.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. The letter is available at http://www.coai.com/Uploads/MediaTypes/Documents/coai-to-dot-on-enhancing-domestic-manufacturing-of-telecom-equipment-bas.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. The notification no. 18-07/2010-IP can be found at http://www.coai.com/Uploads/MediaTypes/Documents/DoT-draft-notification-on-Policy-for-preference-to-domestically-manufactured-telecom-products-in-procurement-October-2012.pdf  (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. The commented COAI draft can be found at http://www.coai.com/Uploads/MediaTypes/Documents/Annexure-1-Comments-on-draft-notification-by-DoT.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Available at http://www.coai.com/Uploads/MediaTypes/Documents/dots-notification-on-telecom-equipment-oct-5,-2012.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The draft guidelines can be found at http://www.coai.com/Uploads/MediaTypes/Documents/pma_draft-govt-procurement-guidelines-april-2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. The COAI commented draft can be found at http://www.coai.com/Uploads/MediaTypes/Documents/pma-draft-security-guidelines-15-april-2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/jac-007-to-dot-on-Januarys-list-of-telecom-products-final.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/jac-to-moc-on-pma.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. The press release can be found at http://www.coai.com/Uploads/MediaTypes/Documents/pmo-on-pma.pdfhttp://www.coai.com/Uploads/MediaTypes/Documents/pmo-on-pma.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/COAI-letter-to-DoT-on-Feedback-on-List-of-Items-for-Govt-Procurement.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/COAI-letter-to-DoT-on-Investments-Required-(TEMC)-Nov%2013-2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. The Notification No. 33(3)/2013-IPHW can be found at http://deity.gov.in/sites/upload_files/dit/files/Notification_Preference_DMEPs_Govt_%20Proc_23_12_2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. For more information, see http://electronicsb2b.com/policy-corner/revised-preferential-market-access-policy/# (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. The notification has been mentioned and discussed above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. A list of notifications dealing with electronic products except telecom products can be found on the website of DeitY at http://deity.gov.in/esdm/pma (accessed June, 2014).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations'&gt;https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>dipankar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-02T06:45:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design">
    <title>IANA Transition: Suggestions for Process Design</title>
    <link>https://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design</link>
    <description>
        &lt;b&gt;With analysis of community-input and ICANN processes, Smarika Kumar offers concrete suggestions for process design. She urges the Indian government to take a stronger position in matters of IANA transition. &lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Introduction:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;On 14 March 2014, the NTIA of the US Government &lt;a class="external-link" href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;announced&lt;/a&gt; its intention to transition key internet domain name functions to the global multistakeholder community. These key internet domain name functions comprise functions executed by Internet Assigned Numbers Authority (IANA), which is currently contracted to ICANN by the US government. The US Government delineated that the IANA transition proposal must have broad community support and should address the following four principles:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span&gt;Support and enhance the multistakeholder model;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Maintain the security, stability, and resiliency of the Internet DNS;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Meet the needs and expectation of the global customers and partners of the IANA services; and&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Maintain the openness of the Internet.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the US Government asked ICANN to convene a multistakeholder process to develop the transition plan for IANA. In April 2014, ICANN issued a &lt;a class="external-link" href="https://www.icann.org/en/system/files/files/iana-transition-scoping-08apr14-en.pdf"&gt;Scoping Document&lt;/a&gt; for this process which outlined the scope of the process, as well as, what ICANN thinks, should &lt;i&gt;not &lt;/i&gt;be a part of the process. In the spirit of ensuring broad community consensus, ICANN issued a &lt;a class="external-link" href="https://www.icann.org/resources/pages/draft-proposal-2014-04-08-en"&gt;Call for Public Input&lt;/a&gt;&lt;span&gt; on the Draft Proposal of the Principles, Mechanisms and Process to Develop a Proposal to Transition NTIA’s Stewardship of IANA Functions on 8 April 2014, upon which the Government of India made its &lt;a class="external-link" href="http://mm.icann.org/pipermail/ianatransition/attachments/20140507/8a49e95f/2014-4-16-India-Ministry-ICT.pdf"&gt;submission&lt;/a&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN is currently deliberating the process for the development of a proposal for transition of IANA functions from the US Government to the global multistakeholder community, a step which would have implications for internet users all over the world, including India. The outcome of this process will be a proposal for IANA transition. The Scoping Document and process for development of the proposal are extremely limited and exclusionary, hurried, and works in ways which could potentially further ICANN’s own interests instead of global public interests. Accordingly, the Government of India is recommended take a stand on the following key points concerning the suggested process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Submissions by the Government of India thus far, have however, failed to comment on the process being initiated by ICANN to develop a proposal for IANA transition. While the actual outcome of the process in form of a proposal for transition is an important issue for deliberation, we hold that it is of immediate importance that the Government of India, along with all governments of the world, &lt;span&gt;pay particular attention to the way ICANN is conducting the process itself&lt;/span&gt; to develop the IANA transition proposal. The scrutiny of this process is of immense significance in order to ensure that democratic and representative principles sought by the GoI in internet governance are being upheld within the process of developing the IANA transition proposal. How the governance of the IANA functions will be structured will be an outcome of this process. Therefore if one expects a democratic, representative and transparent governance of IANA functions as the outcome, it is &lt;span&gt;absolutely essential to ensure that the process itself is democratic, representative and transparent&lt;/span&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Issues and Recommendations:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Ensuring adequate representation and democracy of all stakeholders in the process for developing the proposal for IANA transition is essential to ensuring representative and democratic outcomes. Accordingly, one must take note of the following issues and recommendations concerning the process.&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Open, inclusive deliberation by global stakeholders must define the Scope of the Process for developing proposal for IANA transition:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The current Scoping Document was issued by ICANN to outline the scope of the process by which the proposal for IANA transition would be deliberated. The Scoping Document was framed unilaterally by ICANN, without involvement of the global stakeholder community, and excluding all governments of the world including USA. Although this concern was voiced by a number of submissions to the Public Call by ICANN on the Draft Proposal, such concern was not reflected in ICANN’s &lt;a class="external-link" href="https://www.icann.org/resources/pages/process-next-steps-2014-06-06-en"&gt;Revised Proposal&lt;/a&gt; of 6 June 2014. It merely states that the Scoping Document outlines the “&lt;i&gt;focus of this process&lt;/i&gt;.” Such a statement is not enough because the focus as well as the scope of the process needs to be decided in a democratic, unrepresentative and transparent manner by the global stakeholder community, including all governments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This unilateral approach to outline which aspects of IANA transition should be allowed for discussion, and which aspects should not, itself defeats the multistakeholder principle which ICANN and the US government claim the process is based on. Additionally, global community consensus which the US Govt. hopes for the outcome of such process, cannot be conceivable when the scope of such process is decided in a unilateral and undemocratic manner. Accordingly, the &lt;span&gt;current Scoping Document should be treated only as a draft&lt;/span&gt;, and should be made &lt;span&gt;open to public comment and discussion&lt;/span&gt; by the global stakeholder community in order that the scope of the process reflects concerns of global stakeholders, and not just of the ICANN or the US Government.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Accountability of ICANN must be linked to IANA Transition within Scope of the Process:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;ICANN Accountability must not run merely as a parallel process, since ICANN accountability has direct impact on IANA transition. The current Scoping Document states, “&lt;i&gt;NTIA exercises no operational role in the performance of the IANA functions. Therefore, ICANN’s role as the operator of the IANA functions is not the focus of the transition: it is paramount to maintain the security, stability, and resiliency of the DNS, and uninterrupted service to the affected parties&lt;/i&gt;.” However this rationale to exclude ICANN’s role as operator of IANA from the scope of the process is not sound because NTIA does choose to appoint ICANN as the operator of IANA functions, thereby playing a vicarious operational role in the performance of IANA functions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The explicit exclusion of ICANN’s role as operator of IANA functions from the scope of the process works to serve ICANN’s own interests by preventing discussions on those alternate models where ICANN does not play the operator role. Basically, this presumes that in absence of NTIA stewardship ICANN will control the IANA functions. Such presumption raises disturbing questions regarding ICANN’s accountability as the IANA functions operator. If discussions on ICANN’s role as operator of IANA functions is to be excluded from the process of developing the proposal for IANA transition, it also implies exclusion of discussions regarding ICANN’s accountability as operator of these functions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although ICANN announced a process to enhance its accountability on 6 May 2014, this was designed as a separate, parallel process and de-linked from the IANA transition process. As shown, ICANN’s accountability, its role as convenor of IANA transition process, and its role as current and/or potential future operator of IANA functions are intrinsically linked, and must not be discussed in separate, but parallel process. It is recommended that &lt;span&gt;ICANN accountability in the absence of NTIA stewardship, and ICANN’s role as the operator of IANA functions must be included within the Scoping Document&lt;/span&gt; as part of the scope of the IANA transition process. This is to ensure that no kind of IANA transition is executed without ensuring ICANN’s accountability as and if as the operator of IANA functions so that democracy and transparency is brought to the governance of IANA functions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Misuse or appearance of misuse of its convenor role by ICANN to influence outcome of the Process must not be allowed:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;ICANN has been designated the convenor role by the US Govt. on basis of its unique position as the current IANA functions contractor and the global co-ordinator for the DNS. However it is this unique position itself which creates a potential for abuse of the process by ICANN. As the current contractor of IANA functions, ICANN has an interest in the outcome of the process being conducive to ICANN. In other words, ICANN prima facie is an interested party in the IANA transition process, which may tend to steer the process towards an outcome favourable to itself. ICANN has already been attempting to set the scope of the process to develop the proposal for IANA transition unilaterally, thus abusing its position as convenor. ICANN has also been trying to separate the discussions on IANA transition and its own accountability by running them as parallel processes, as well as attempting to prevent questions on ICANN’s role as operator of IANA functions by excluding it from the Scoping Document. Such instances provide a strong rationale for defining the limitations of the role of ICANN as convenor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although ICANN’s Revised Proposal of 6 June 2014 stating that ICANN will have a neutral role, and the Secretariat will be independent of ICANN staff is welcome, additional safeguards need to be put in place to avoid conflicts of interest or appearance of conflicts of interest. The Revised Proposal itself was unilaterally issued, whereby ICANN incorporated some of the comments made on its Proposed Draft, in the revised Draft, but excluded some others without providing rationale for the same. For instance, comments regarding inclusion of ICANN’s role as the operator of IANA functions within the Scoping Document, were ignored by ICANN in its Revised Proposal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is accordingly suggested that &lt;span style="text-decoration: underline;"&gt;ICANN should limit its role to merely facilitating discussions&lt;/span&gt; and not extend it to reviewing or commenting on emerging proposals from the process. ICANN should further &lt;span style="text-decoration: underline;"&gt;not compile comments on drafts to create a revised draft&lt;/span&gt; at any stage of the process. Additionally, &lt;span style="text-decoration: underline;"&gt;ICANN staff must not be allowed to be a part of any group or committee&lt;/span&gt; which facilitates or co-ordinates the discussion regarding IANA transition.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Components of Diversity Principle should be clearly enunciated in the Draft Proposal:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Diversity Principle was included by ICANN in the Revised Proposal of 6 June 2014 subsequent to submissions by various stakeholders who raised concerns regarding developing world participation, representation and lack of multilingualism in the process. This is laudable. However, past experience with ICANN processes has shown that many representatives from developing countries as well as from stakeholder communities outside of the ICANN community are unable to productively involve themselves in such processes because of lack of multilingualism or unfamiliarity with its way of functioning. This often results in undemocratic, unrepresentative and non-transparent decision-making in such processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In such a scenario, merely mentioning diversity as a principle is not adequate to ensure abundant participation by developing countries and non-ICANN community stakeholders in the process. Concrete mechanisms need to be devised to include &lt;span style="text-decoration: underline;"&gt;adequate and fair geographical, gender, multilingual and developing countries’ participation&lt;/span&gt; and representation on all levels so that the process is not relegated merely to domination by North American or European entities. Accordingly, &lt;span style="text-decoration: underline;"&gt;all the discussions in the process should be translated&lt;/span&gt; into multiple native languages of participants &lt;i&gt;in situ&lt;/i&gt;, so that everyone participating in the process can understand what is going on. &lt;span style="text-decoration: underline;"&gt;Adequate time must be given for the discussion issues to be translated and circulated&lt;/span&gt; widely amongst all stakeholders of the world, before a decision is taken or a proposal is framed. To concretise its diversity principle, &lt;span style="text-decoration: underline;"&gt;ICANN should also set aside funds&lt;/span&gt; and develop a programme with community support for capacity building for stakeholders in developing nations to ensure their fruitful involvement in the process.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Co-ordination Group must be made representative of the global multistakeholder community:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Currently, the Co-ordination Group includes representatives from ALAC, ASO, ccNSO, GNSO, gTLD registries, GAC, ICC/BASIS, IAB, IETF, ISOC, NRO, RSSAC and SSAC. Most of these representatives belong to the ICANN community, and is not representative of the global multistakeholder community including governments. This is not representative of even a multistakeholder model which the US Govt. has announced for the transition; nor in the multistakeholder participation spirit of NETmundial.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is recommended that the Co-ordination Group then must be made democratic and representative to include larger global stakeholder community, including Governments, Civil Society, and Academia, with suitably diverse representation across geography, gender and developing nations. Adequate number of seats on the Committee must be granted to each stakeholder so that they can each co-ordinate discussions within their own communities and ensure wider and more inclusive participation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Framing of the Proposal must allow adequate time:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;All stakeholder communities must be permitted adequate time to discuss and develop consensus. Different stakeholder communities have different processes of engagement within their communities, and may take longer to reach a consensus than others. If democracy and inclusiveness are to be respected, then each stakeholder must be allowed enough time to reach a consensus within its own community, unlike the short time given to comment on the Draft Proposal. The process must not be rushed to benefit a few.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;Smarika Kumar is a graduate of the National Law Institute University, Bhopal, and a member of the Alternative Law Forum, a collective of lawyers aiming to &lt;span&gt;integrate alternative lawyering with critical research, alternative dispute resolution, pedagogic interventions and sustained legal interventions in social issues&lt;/span&gt;. Her &lt;span&gt;areas of interest include interdisciplinary research on the Internet, issues affecting indigenous peoples, eminent domain, traditional knowledge and pedagogy.&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design'&gt;https://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Smarika Kumar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Transparency and Accountability</dc:subject>
    

   <dc:date>2014-06-22T09:15:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-policy-brief-iana-transition-fundamentals-and-suggestions-for-process-design">
    <title>CIS Policy Brief: IANA Transition Fundamentals &amp; Suggestions for Process Design </title>
    <link>https://cis-india.org/internet-governance/blog/cis-policy-brief-iana-transition-fundamentals-and-suggestions-for-process-design</link>
    <description>
        &lt;b&gt;In March 2014, the US government announced that it would transfer oversight of IANA functions to an as-yet-indeterminate global multi-stakeholder body. This policy brief, written by Smarika Kumar and Geetha Hariharan, explains the process concisely.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Short Introduction:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In March 2014, the National Telecommunications and Information Administration (NTIA) &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;announced its intention&lt;/a&gt; to transition key Internet domain name functions to the global multi-stakeholder community. Currently, the NTIA oversees coordination and implementation of IANA functions through contractual arrangements with ICANN and Verisign, Inc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NTIA will not accept a government-led or inter-governmental organization to steward IANA functions. It requires the IANA transition proposal to have broad community support, and to be in line with the following principles: &lt;span&gt;(1) support and enhance the multi-stakeholder model; (2) maintain the security, stability, and resiliency of the Internet DNS; (3) meet the needs and expectation of the global customers &amp;amp; partners of IANA services; (4) maintain the openness of the Internet.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN was charged with developing a proposal for IANA transition. It initiated a &lt;a href="https://www.icann.org/resources/pages/draft-proposal-2014-04-08-en"&gt;call for public input&lt;/a&gt; in April 2014. Lamentably, the &lt;a href="https://www.icann.org/en/system/files/files/iana-transition-scoping-08apr14-en.pdf"&gt;scoping document&lt;/a&gt; for the transition did not include questions of ICANN’s own accountability and interests in IANA stewardship, &lt;a href="http://www.internetgovernance.org/2014/04/16/icann-anything-that-doesnt-give-iana-to-me-is-out-of-scope/"&gt;including&lt;/a&gt; whether it should continue to coordinate the IANA functions. Public Input received in May 2014 revolved around the composition of a Coordination Group, which would oversee IANA transition. &lt;span&gt;Now, ICANN will hold an open session on June 26, 2014 at ICANN-50 to gather community feedback on issues relating to IANA transition, including composition of the Coordination Group. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;CIS Policy Brief:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;CIS' Brief on IANA Transition Fundamentals explains the process further, and throws light on the Indian government's views. To read the brief, &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/iana-transition-descriptive-brief" class="internal-link"&gt;please go here&lt;/a&gt;&lt;/b&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Suggestions for Process Design &lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;As convenor of the IANA stewardship transition, ICANN has sought public comments on issues relating to the transition process. We suggest certain principles for open, inclusive and transparent process-design:&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Short Introduction:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In March 2014, the US government through National Telecommunications and Information Administration (NTIA) &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;announced its intention&lt;/a&gt; to transition key Internet domain name functions (IANA) to the global  multi-stakeholder community. The NTIA announcement states that it will  not accept a government-led or intergovernmental organization solution  to replace its own oversight of IANA functions. The Internet Corporation  for Assigned Names and Numbers (ICANN) was charged with developing a  Proposal for the transition.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;At ICANN-49 in Singapore (March 2014), ICANN rapidly gathered inputs  from its community to develop a draft proposal for IANA transition. It  then &lt;a href="https://www.icann.org/resources/pages/draft-proposal-2014-04-08-en"&gt;issued&lt;/a&gt; a call for public input on the Draft Proposal in April 2014. Some responses were incorporated to create a &lt;a href="https://www.icann.org/resources/pages/process-next-steps-2014-06-06-en"&gt;Revised Proposal&lt;/a&gt;, published on June 6, 2014.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Responses had called for transparent composition of an IANA transition  Coordination Group, a group comprising representatives of ICANN’s  Advisory Committees and Supporting Organizations, as well as Internet  governance organizations such as the IAB, IETF and ISOC. Also, ICANN was  asked to have a neutral, facilitative role in IANA transition. This is  because, as the current IANA functions operator, it has a vested  interest in the transition. Tellingly, ICANN’s &lt;a href="https://www.icann.org/en/system/files/files/iana-transition-%20scoping-08apr14-en.pdf"&gt;scoping document&lt;/a&gt; for IANA transition did not include questions of its own role as IANA functions operator.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;ICANN is currently deliberating the process to develop a Proposal for  IANA transition. At ICANN-50, ICANN will hold a governmental high-level  meeting and a public discussion on IANA transition, where comments and  concerns can be voiced. In addition, discussion in other Internet  governance fora is encouraged.&lt;/span&gt;&lt;/p&gt;
&lt;h3 class="column"&gt;CIS Policy Brief:&lt;/h3&gt;
&lt;div class="column"&gt;&lt;span style="text-align: justify; "&gt;CIS' Brief on IANA Transition Principles explains our recommendations for transition process-design. To read the brief, &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-policy-brief-ii-iana-transition-suggestions-for-process-design" class="internal-link"&gt;please go here&lt;/a&gt;&lt;/b&gt;.&lt;/span&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-policy-brief-iana-transition-fundamentals-and-suggestions-for-process-design'&gt;https://cis-india.org/internet-governance/blog/cis-policy-brief-iana-transition-fundamentals-and-suggestions-for-process-design&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-08T08:39:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/understanding-iana-transition">
    <title>Understanding IANA Stewardship Transition</title>
    <link>https://cis-india.org/internet-governance/blog/understanding-iana-transition</link>
    <description>
        &lt;b&gt;Smarika Kumar describes the process of the IANA stewardship transition, and enumerates what the NTIA announcement does and does not do. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;NTIA Announcement and ICANN-convened Processes:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On 14 March 2014, the National Telecommunications and Information Administration (NTIA) of the US Government &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;announced&lt;/a&gt; “&lt;i&gt;its intent to transition key Internet domain name functions to the global multistakeholder community&lt;/i&gt;”. These key Internet domain name functions refer to the Internet Assigned Numbers Authority (IANA) functions. For this purpose, the NTIA &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;asked&lt;/a&gt; the Internet Corporation for Assigned Names and Numbers (ICANN) to “&lt;i&gt;convene global stakeholders to develop a proposal to transition the current role played by NTIA in the coordination of the Internet’s domain name system (DNS)&lt;/i&gt;”. This was welcome news for the global Internet community, which has been criticising unilateral US Government oversight of Critical Internet Resources for many years now. NTIA further announced that IANA transition proposal must have broad community support and should address the following four principles:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Support and enhance the multistakeholder model;&lt;/li&gt;
&lt;li&gt;Maintain the security, stability, and resiliency of the Internet DNS;&lt;/li&gt;
&lt;li&gt;Meet the needs and expectation of the global customers and partners of the IANA services; and&lt;/li&gt;
&lt;li&gt;Maintain the openness of the Internet.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Subsequently, during ICANN49 in Singapore (March 23-27, 2014), ICANN held flurried discussions to gather initial community feedback from participants to come up with a Draft Proposal of the Principles, Mechanisms and Process to Develop a Proposal to Transition NTIA’s Stewardship of the IANA Functions on 8 April 2014, which was open to public comments until 8 May 2014, which was further extended to 31 May 2014. Responses by various stakeholders were collected in this very short period and some of them were incorporated into a Revised Proposal issued by ICANN on 6th June 2014. ICANN also unilaterally issued a Scoping Document defining the scope of the process for developing the proposal and also specifying what was not part of the scope. This Scoping Document came under severe criticism by various commentators, but was not amended.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN &lt;a href="https://www.icann.org/public-comments/enhancing-accountability-2014-05-06-en"&gt;also initiated&lt;/a&gt; a separate but parallel process to discuss enhancement of its accountability on 6 May 2014. This was launched upon widespread distress over the fact that ICANN had excluded its role as operator of IANA functions from the Scoping Document, as well as over questions of accountability raised by the community at ICANN49 in Singapore. In the absence of ICANN’s contractual relationship with NTIA to operate the IANA functions, it remains unclear how ICANN will stay accountable upon the transition. The accountability process looks to address the same through the ICANN community. The issue of ICANN accountability is then envisioned to be coordination within ICANN itself through an ICANN Accountability Working Group comprised of community members and a few subject matter experts.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What are the IANA Functions?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Internet Assigned Numbers Authority, or IANA functions consist of &lt;a href="https://www.icann.org/en/system/files/files/iana-transition-scoping-08apr14-en.pdf"&gt;three separate tasks&lt;/a&gt;:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Maintaining a central repository for protocol name and number registries used in many Internet protocols.&lt;/li&gt;
&lt;li&gt;Co-ordinating the allocation of Internet Protocol (IP) and Autonomous System (AS) numbers to the Regional Internet Registries, who then distribute IP and AS numbers to ISPs and others within their geographic regions.&lt;/li&gt;
&lt;li&gt;Processing root zone change requests for Top Level Domains (TLDs) and making the Root Zone WHOIS database consisting of publicly available information for all TLD registry operators.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The first two of the abovementioned functions are operated by ICANN in consonance with policy developed at the Internet Engineering Task Force (IETF) and Address Supporting Organisation (ASO) respectively, both of which exist under the ICANN umbrella.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The performance of last of these functions is distributed between ICANN and Verisign. NTIA has a Cooperative Agreement with Verisign to perform the related root zone management functions. The related root zone management functions are the management of the root zone “zone signing key” (ZSK), as well as implementation of changes to and distribution of the DNS authoritative root zone file, which is the authoritative registry containing the lists of names and addresses for all top level domains.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, the US Government oversees this entire set of operations by contracting with ICANN as well as Verisign to execute the IANA functions. Though the US Government does not interfere generally in operations of either ICANN or Verisign in their role as operators of IANA functions, it cannot be denied that it exercises oversight on both the operators of IANA functions, through these contracts.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Import of the NTIA Announcement:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The NTIA announcement of 14th March intends to initiate the withdrawal of such oversight of IANA functions by the NTIA in order to move towards global multistakeholder governance. NTIA has asked ICANN to initiate a process to decide upon what such global multistakeholder governance of IANA functions may look like. The following diagram presents the current governance structure of IANA functions and the areas that the NTIA announcement seeks to change:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/internet-governance/blog/Untitled.png/@@images/160cccd1-af49-43fe-aeb2-a60153b6a07c.png" alt="NTIA Announcement" class="image-inline" title="NTIA Announcement" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IANA Oversight Mechanism (&lt;a class="external-link" href="https://www.icann.org/en/system/files/files/iana-transition-scoping-08apr14-en.pdf"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What does the NTIA Announcement NOT DO?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The NTIA announcement DOES NOT frame a model for governance of IANA functions once it withdraws its oversight role.  NTIA has asked ICANN to convene a process, which would figure the details of IANA transition and propose an administrative structure for IANA functions once the NTIA withdraws its oversight role. But what this new administrative structure would look like has not itself been addressed in the NTIA announcement. As per the NTIA announcement, the new administrative structure is yet to be decided by a global multistakeholder community in accordance with the four principles outlined by the NTIA through a process, which ICANN shall convene.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NTIA announcement DOES NOT limit discussions and participation in IANA transition process to within the ICANN community. NTIA has asked ICANN to convene “global stakeholders to develop a proposal to transition” IANA functions. This means all global stakeholders participation, including that of Governments and Civil Society is sought for the IANA transition process. ICANN has been asked “to work collaboratively with the directly affected parties, including the Internet Engineering Task Force (IETF), the Internet Architecture Board (IAB), the Internet Society (ISOC), the Regional Internet Registries (RIRs), top level domain name operators, VeriSign, and other interested global stakeholders”, in the NTIA announcement. This however does not signify that discussions and participation in development of proposal for IANA transition needs to be limited to the ICANN community or the technical community.  In fact, ICANN has itself said that the list of events provided as “Timeline of Events” in &lt;a href="https://www.icann.org/resources/pages/draft-proposal-2014-04-08-en"&gt;its Draft Proposal&lt;/a&gt; of 8 April 2014 for engagement in development of a proposal for IANA transition is &lt;a href="https://www.icann.org/resources/pages/process-next-steps-2014-06-06-en"&gt;non-exhaustive&lt;/a&gt;. This means proposal for IANA transition can be developed by different stakeholders, including governments and civil society in different fora appropriate to their working, including at the IGF and WSIS+10.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NTIA announcement DOES NOT mean devolution of IANA functions administration upon ICANN. NTIA chooses ICANN and Verisign to operate the IANA functions. If NTIA withdraws from its role, the question whether ICANN or Verisign should operate the IANA functions at all becomes an open one, and should be subject to deliberation. By merely asking ICANN to convene the process, the NTIA announcement in no way assigns any administration of IANA functions to ICANN. It must be remembered that the NTIA announcement says that key Internet domain name functions shall transition to the global multistakeholder community, and not the ICANN community.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NTIA announcement DOES NOT prevent the possibility of removal of ICANN from its role as operator of IANA functions. While ICANN has tried to frame the Scoping Document in a language to prevent any discussions on its role as operator of IANA functions, the question whether ICANN should continue in its operator role remains an open one. There are at least 12 submissions made in response to ICANN’s Draft Proposal by varied stakeholders, which in fact, call for the separation of ICANN’s role as policy maker (through IETF, ASO, gNSO, ccNSO), and ICANN’s role as the operator of IANA functions.  Such calls for separation come from private sector, civil society, as well as the technical community, among others. Such separation was also &lt;a href="http://netmundial.org/netmundial-multistakeholder-statement/"&gt;endorsed&lt;/a&gt; in the final NETmundial outcome document (paragraph 27). Governments have, in general, expressed no opinion on such separation in response to ICANN’s Draft Proposal. It is however urged that governments express their opinion in favour of such separation to prevent consolidation of both policy making and implementation within ICANN, which would lead to increased potential situations for the ICANN Board to abuse its powers.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;Smarika Kumar is a graduate of the National Law Institute University, Bhopal, and a member of the Alternative Law Forum, a collective of lawyers aiming to &lt;span&gt; integrate alternative lawyering with critical research, alternative dispute resolution, pedagogic interventions and sustained legal interventions in social issues&lt;/span&gt;. Her &lt;span&gt;areas of interest include interdisciplinary research on the Internet, issues affecting indigenous peoples, eminent domain, traditional knowledge and pedagogy. &lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/understanding-iana-transition'&gt;https://cis-india.org/internet-governance/blog/understanding-iana-transition&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Smarika Kumar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>NTIA Announcement</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-06-22T03:23:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/common-wealth-domain-name-system-forum-2014">
    <title>Commonwealth Domain Name System Forum 2014 </title>
    <link>https://cis-india.org/news/common-wealth-domain-name-system-forum-2014</link>
    <description>
        &lt;b&gt;This event took place on 19 June 2014 from 09:00-17:30 BST at ICANN50 | London in the Viscount room. It was organized by the CTO, hosted by ICANN, and supported by Nominet and the Public Interest Registry.&lt;/b&gt;
        &lt;p&gt;Pranesh Prakash was a panelist for this event. The detailed &lt;a href="https://cis-india.org/internet-governance/blog/domain-name-system-forum.pdf" class="internal-link"&gt;brochure of the event can be downloaded here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/common-wealth-domain-name-system-forum-2014'&gt;https://cis-india.org/news/common-wealth-domain-name-system-forum-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-03T09:27:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report">
    <title>WSIS+10 High Level Event: A Bird's Eye Report</title>
    <link>https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report</link>
    <description>
        &lt;b&gt;The WSIS+10 High Level was organised by the ITU and collaborative UN entities on June 9-13, 2014. It aimed to evaluate the progress on implementation of WSIS Outcomes from Geneva 2003 and Tunis 2005, and to envision a post-2015 Development Agenda. Geetha Hariharan attended the event on CIS' behalf.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;The World Summit on Information Society (WSIS) +10 &lt;/span&gt;&lt;a href="http://www.itu.int/wsis/implementation/2014/forum/"&gt;High Level Event&lt;/a&gt;&lt;span&gt; (HLE) was hosted at the ITU Headquarters in Geneva, from June 9-13, 2014. The HLE aimed to review the implementation and progress made on information and communication technology (ICT) across the globe, in light of WSIS outcomes (&lt;/span&gt;&lt;a href="http://www.itu.int/wsis/index-p1.html"&gt;Geneva 2003&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://www.itu.int/wsis/index-p2.html"&gt;Tunis 2005&lt;/a&gt;&lt;span&gt;). Organised in three parallel tracks, the HLE sought to take stock of progress in ICTs in the last decade (High Level track), initiate High Level Dialogues to formulate the post-2015 development agenda, as well as host thematic workshops for participants (Forum track).&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The High Level Track:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/internet-governance/blog/copy2_of_HighLevelTrack.jpg/@@images/be5f993c-3553-4d63-bb66-7cd16f8407dc.jpeg" alt="High Level Track" class="image-inline" title="High Level Track" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Opening Ceremony, WSIS+10 High Level Event &lt;/i&gt;(&lt;a class="external-link" href="https://twitter.com/ITU/status/334587247556960256/photo/1"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The High Level track opened officially on June 10, 2014, and culminated with the endorsement by acclamation (as is ITU tradition) of two &lt;a href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;Outcome Documents&lt;/a&gt;. These were: (1) WSIS+10 Statement on the Implementation of WSIS Outcomes, taking stock of ICT developments since the WSIS summits, (2) WSIS+10 Vision for WSIS Beyond 2015, aiming to develop a vision for the post-2015 global information society. These documents were the result of the WSIS+10 &lt;a href="http://www.itu.int/wsis/review/mpp/"&gt;Multi-stakeholder Preparatory Platform&lt;/a&gt; (MPP), which involved WSIS stakeholders (governments, private sector, civil society, international organizations and relevant regional organizations).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;strong&gt;MPP&lt;/strong&gt; met in six phases, convened as an open, inclusive consultation among WSIS stakeholders. It was not without its misadventures. While ITU Secretary General Dr. Hamadoun I. Touré consistently lauded the multi-stakeholder process, and Ambassador Janis Karklins urged all parties, especially governments, to “&lt;i&gt;let the UN General Assembly know that the multi-stakeholder model works for Internet governance at all levels&lt;/i&gt;”, participants in the process shared stories of discomfort, disagreement and discord amongst stakeholders on various IG issues, not least human rights on the Internet, surveillance and privacy, and multi-stakeholderism. Richard Hill of the Association for Proper Internet Governance (&lt;a href="http://www.apig.ch/"&gt;APIG&lt;/a&gt;) and the Just Net Coalition writes that like NETmundial, the MPP was rich in a diversity of views and knowledge exchange, but stakeholders &lt;a href="http://www.ip-watch.org/2014/06/16/what-questions-did-the-wsis10-high-level-event-answer/"&gt;failed to reach consensus&lt;/a&gt; on crucial issues. Indeed, Prof. Vlamidir Minkin, Chairman of the MPP, expressed his dismay at the lack of consensus over action line C9. A compromise was agreed upon in relation to C9 later.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some members of civil society expressed their satisfaction with the extensive references to human rights and rights-centred development in the Outcome Documents. While governmental opposition was seen as frustrating, they felt that the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;MPP had sought and achieved a common understanding&lt;/span&gt;&lt;/strong&gt;, a sentiment &lt;a href="https://twitter.com/covertlight/status/476748168051580928"&gt;echoed&lt;/a&gt; by the ITU Secretary General. Indeed, even Iran, a state that had expressed major reservations during the MPP and felt itself unable to agree with the text, &lt;a href="https://twitter.com/covertlight/status/476748723750711297"&gt;agreed&lt;/a&gt; that the MPP had worked hard to draft a document beneficial to all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns around the MPP did not affect the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;review of ICT developments&lt;/span&gt;&lt;/strong&gt; over the last decade. High Level Panels with Ministers of ICT from states such as Uganda, Bangladesh, Sweden, Nigeria, Saudi Arabia and others, heads of the UN Development Programme, UNCTAD, Food and Agriculture Organisation, UN-WOMEN and others spoke at length of rapid advances in ICTs. The focus was largely on ICT access and affordability in developing states. John E. Davies of Intel repeatedly drew attention to innovative uses of ICTs in Africa and Asia, which have helped bridge divides of affordability, gender, education and capacity-building. Public-private partnerships were the best solution, he said, to affordability and access. At a ceremony evaluating implementation of WSIS action-lines, the Centre for Development of Advanced Computing (C-DAC), India, &lt;a href="https://twitter.com/covertlight/status/476748723750711297"&gt;won an award&lt;/a&gt; for its e-health application MOTHER.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Outcome Documents themselves shall be analysed in a separate post. But in sum, the dialogue around Internet governance at the HLE centred around the success of the MPP. Most participants on panels and in the audience felt this was a crucial achievement within the realm of the UN, where the Tunis Summit had delineated strict roles for stakeholders in paragraph 35 of the &lt;/span&gt;&lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt;&lt;span&gt;. Indeed, there was palpable relief in Conference Room 1 at the &lt;/span&gt;&lt;a href="http://www.cicg.ch/en/"&gt;CICG&lt;/a&gt;&lt;span&gt;, Geneva, when on June 11, Dr. Touré announced that the Outcome Documents would be adopted without a vote, in keeping with ITU tradition, even if consensus was achieved by compromise.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The High Level Dialogues:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/internet-governance/blog/HighLevelDialogues.jpg/@@images/3c30d94f-7a65-4912-bb42-2ccd3b85a18d.jpeg" alt="High Level Dialogues" class="image-inline" title="High Level Dialogues" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Prof. Vladimir Minkin delivers a statement.&lt;/i&gt; (&lt;a class="external-link" href="https://twitter.com/JaroslawPONDER/status/476288845013843968/photo/1"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The High Level Dialogues on developing a post-2015 Development Agenda, based on WSIS action lines, were active on June 12. Introducing the Dialogue, Dr. Touré lamented the Millennium Development Goals as a “&lt;i&gt;lost opportunity&lt;/i&gt;”, emphasizing the need to alert the UN General Assembly and its committees as to the importance of ICTs for development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As on previous panels, there was &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;intense focus on access, affordability and reach in developing countries&lt;/span&gt;&lt;/strong&gt;, with Rwanda and Bangladesh expounding upon their successes in implementing ICT innovations domestically. The world is more connected than it was in 2005, and the ITU in 2014 is no longer what it was in 2003, said speakers. But we lack data on ICT deployment across the globe, said Minister Knutssen of Sweden, recalling the gathering to the need to engage all stakeholders in this task. Speakers on multiple panels, including the Rwandan Minister for CIT, Marilyn Cade of ICANN and Petra Lantz of the UNDP, emphasized the need for ‘smart engagement’ and capacity-building for ICT development and deployment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A crucial session on cybersecurity saw Dr. Touré envision a global peace treaty accommodating multiple stakeholders. On the panel were Minister Omobola Johnson of Nigeria, Prof. Udo Helmbrecht of the European Union Agency for Network and Information Security (ENISA), Prof. A.A. Wahab of Cybersecurity Malaysia and Simon Muller of Facebook. The focus was primarily on building laws and regulations for secure communication and business, while child protection was equally considered.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of laws/regulations for cybersecurity (child pornography and jurisdictional issues, for instance), or other legal protections (privacy, data protection, freedom of speech) in rapidly connecting developing states was noted. But the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;question of cross-border surveillance and wanton violations of privacy went unaddressed&lt;/span&gt;&lt;/strong&gt; except for the customary, unavoidable mention. This was expected. Debates in Internet governance have, in the past year, been silently and invisibly driven by the Snowden revelations. So too, at WSIS+10 Cybersecurity, speakers emphasized open data, information exchange, data ownership and control (the &lt;a href="https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties"&gt;right to be forgotten&lt;/a&gt;), but did not openly address surveillance. Indeed, Simon Muller of Facebook called upon governments to publish their own transparency reports: A laudable suggestion, even accounting for Facebook’s own undetailed and truncated reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a nutshell, the post-2015 Development Agenda dialogues repeatedly emphasized the importance of ICTs in global connectivity, and their impact on GDP growth and socio-cultural change and progress. The focus was on taking this message to the UN General Assembly, engaging all stakeholders and creating an achievable set of action lines post-2015.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Forum Track:&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/blog/copy_of_ForumTrack.jpg/@@images/dfcce68a-18d7-4f1e-897b-7208bb60abc9.jpeg" alt="Forum Track" class="image-inline" title="Forum Track" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Participants at the UNESCO session on its Comprehensive Study on Internet-related Issues&lt;/i&gt; (&lt;a class="external-link" href="https://twitter.com/leakaspar/status/476690921644646400/photo/1"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The HLE was organized as an extended version of the WSIS Forum, which hosts thematic workshops and networking opportunities, much like any other conference. Running in parallel sessions over 5 days, the WSIS Forum hosted sessions by the ITU, UNESCO, UNDP, ICANN, ISOC, APIG, etc., on issues as diverse as the WSIS Action Lines, the future of Internet governance, the successes and failures of &lt;a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/"&gt;WCIT-2012&lt;/a&gt;, UNESCO’s &lt;a href="http://www.unesco.org/new/internetstudy"&gt;Comprehensive Study on Internet-related Issues&lt;/a&gt;, spam and a taxonomy of Internet governance.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Detailed explanation of each session I attended is beyond the scope of this report, so I will limit myself to the interesting issues raised.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At ICANN’s session on its own future (June 9), Ms. Marilyn Cade emphasized the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;importance of national and regional IGFs&lt;/span&gt;&lt;/strong&gt; for both issue-awareness and capacity-building. Mr. Nigel Hickson spoke of engagement at multiple Internet governance fora: “&lt;i&gt;Internet governance is not shaped by individual events&lt;/i&gt;”. In light of &lt;a href="http://www.internetgovernance.org/2014/04/16/icann-anything-that-doesnt-give-iana-to-me-is-out-of-scope/"&gt;criticism&lt;/a&gt; of ICANN’s apparent monopoly over IANA stewardship transition, this has been ICANN’s continual &lt;a href="https://www.icann.org/resources/pages/process-next-steps-2014-06-06-en"&gt;response&lt;/a&gt; (often repeated at the HLE itself). Also widely discussed was the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;role of stakeholders in Internet governance&lt;/span&gt;&lt;/strong&gt;, given the delineation of roles and responsibilities in the Tunis Agenda, and governments’ preference for policy-monopoly (At WSIS+10, Indian Ambassador Dilip Sinha seemed wistful that multilateralism is a “&lt;i&gt;distant dream&lt;/i&gt;”).&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This discussion bore greater fruit in a session on Internet governance ‘taxonomy’. The session saw &lt;a href="https://www.icann.org/profiles/george-sadowsky"&gt;Mr. George Sadowsky&lt;/a&gt;, &lt;a href="http://www.diplomacy.edu/courses/faculty/kurbalija"&gt;Dr. Jovan Kurbalija&lt;/a&gt;, &lt;a href="http://www.williamdrake.org/"&gt;Mr. William Drake&lt;/a&gt; and &lt;a href="http://www.itu.int/wsis/implementation/2014/forum/agenda/session_docs/170/ThoughtsOnIG.pdf"&gt;Mr. Eliot Lear&lt;/a&gt; (there is surprisingly no official profile-page on Mr. Lear) expound on dense structures of Internet governance, involving multiple methods of classification of Internet infrastructure, CIRs, public policy issues, etc. across a spectrum of ‘baskets’ – socio-cultural, economic, legal, technical. Such studies, though each attempting clarity in Internet governance studies, indicate that the closer you get to IG, the more diverse and interconnected the eco-system gets. David Souter’s diagrams almost capture the flux of dynamic debate in this area (please see pages 9 and 22 of &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20framework%20for%20IG%20assessments%20-%20D%20Souter%20-%20final_0.pdf"&gt;this ISOC study&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There were, for most part, insightful interventions from session participants. Mr. Sadowsky questioned the effectiveness of the Tunis Agenda delineation of stakeholder-roles, while Mr. Lear pleaded that techies be let to do their jobs without interference. &lt;a href="http://internetdemocracy.in/"&gt;Ms. Anja Kovacs&lt;/a&gt; raised pertinent concerns about &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;including voiceless minorities in a ‘rough consensus’ model&lt;/span&gt;&lt;/strong&gt;. Across sessions, &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;questions of mass surveillance, privacy and data ownership rose&lt;/span&gt;&lt;/strong&gt; from participants. The protection of human rights on the Internet – especially freedom of expression and privacy – made continual appearance, across issues like spam (&lt;a href="http://www.itu.int/ITU-D/CDS/sg/rgqlist.asp?lg=1&amp;amp;sp=2010&amp;amp;rgq=D10-RGQ22.1.1&amp;amp;stg=1"&gt;Question 22-1/1&lt;/a&gt; of ITU-D Study Group 1) and cybersecurity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The HLE was widely attended by participants across WSIS stakeholder-groups. At the event, a great many relevant questions such as the future of ICTs, inclusions in the post-2015 Development Agenda, the value of muti-stakeholder models, and human rights such as free speech and privacy were raised across the board. Not only were these raised, but cognizance was taken of them by Ministers, members of the ITU and other collaborative UN bodies, private sector entities such as ICANN, technical community such as the ISOC and IETF, as well as (obviously) civil society.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Substantively, the HLE did not address mass surveillance and privacy, nor of expanding roles of WSIS stakeholders and beyond. Processually, the MPP failed to reach consensus on several issues comfortably, and a compromise had to be brokered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;But perhaps a big change at the HLE was the positive attitude to multi-stakeholder models from many quarters, not least the ITU Secretary General Dr. Hamadoun Touré. His repeated calls for acceptance of multi-stakeholderism left many members of civil society surprised and tentatively pleased. Going forward, it will be interesting to track the ITU and the rest of UN’s (and of course, member states’) stances on multi-stakeholderism at the ITU Plenipot, the WSIS+10 Review and the UN General Assembly session, at the least.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report'&gt;https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WSIS+10</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Multi-stakeholder</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Access</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2014-06-20T15:57:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/privacy-surveillance-roundtable">
    <title>Privacy and Surveillance Roundtable</title>
    <link>https://cis-india.org/events/privacy-surveillance-roundtable</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society and the Cellular Operators Association of India
in collaboration with the Council for Fair Business Practices invite you to a "Privacy Roundtable" at IMC Building, IMC Marg, Churchgate, Mumbai on June 28, 2014, 10.00 a.m. to 4.00 p.m.
&lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Details&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00 – 11:00&lt;/td&gt;
&lt;td&gt;Introduction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00 - 11:30&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30 - 13:00&lt;/td&gt;
&lt;td&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00 - 14:00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00 - 16.00&lt;/td&gt;
&lt;td&gt;Discussion &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.00 - 16.15&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Background and Context to the Roundtables&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, lawful interception of communications may be conducted by the state in three ways: firstly, intercepting telephone calls and other telecommunications may take place under powers listed in the Telegraph Act, 1885 and procedure set out in the Telegraph Rules, 1951; secondly, intercepting written communications transmitted through the postal service or by private couriers may occur under the Post Office Act, 1898; and, thirdly, intercepting, de-crypting, and monitoring email messages and other electronic communications may take place under the Information Technology Act, 1950 and two sets of Rules issued in 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government’s intention to create a Central Monitoring System to automate the existing process of telephone tapping is significant for a number of reasons. It will bypass private telephone service providers; currently the active cooperation of TSPs is required and compelled in order to intercept and monitor a telephone conversation. This creates an extra layer of compliance activity for TSPs which is cumbersome and expensive. Interception orders from the state often do not comply with the procedure required by law. This uncertainty is compounded by the lack of an indemnity for TSPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, while the CMS will release TSPs from legal liability, it will leave the government free to conduct telephone interceptions in absolute secrecy and without a credible system of oversight and checks and balances. Amongst the world’s major democratic countries, India is alone in refusing to overhaul its telephone tapping regime. The legal requirements of probable cause, judicial sanction, and warrant-based interception – which are followed with exceptions in democracies around the world – are not adequately protected in India.  The same principles also apply to the interception of postal and electronic communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several intelligence and police agencies in India that conduct interceptions of communications without central coordination. Previous cases in the Supreme Court of India and a few Indian High Courts reveal many cases of improper and even illegal surveillance. The sheer number of interested state agencies, the concerns of inadequate oversight, the lack of a credible legal regime, the constant leaks of private communications, and the poor legal protection given to TSPs and ISPs must be legally addressed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information about the Roundtables&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Privacy and Surveillance Roundtables are a CIS initiative, in partnership with the Cellular Operators Association of India (COAI).  From June 2014 – November 2014, CIS and COAI will host seven Privacy and Surveillance Roundtable discussions across multiple cities in India. The Roundtables will be closed-door deliberations involving multiple stakeholders. Through the course of these discussions we aim to deliberate upon the current legal framework for surveillance in India, and discuss possible frameworks for surveillance in India. The provisions of the draft CIS Privacy Bill 2013, the International Principles on the Application of Human Rights to Communication Surveillance, and the Report of the Group of Experts on Privacy will be used as background material and entry points into the discussion. The recommendations and dialogue from each roundtable will be compiled and submitted to the Department of Personnel and training.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Report of the Group of Experts on Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In January 2012 Justice A.P. Shah formed a committee to create a report of recommendations for privacy legislation in India. The committee met seven times from January 2012 to September 2012.  The Report is made up of six chapters and begins by reviewing the international best practices around privacy and the relevant Indian jurisprudence. The Report then recommends nine National Privacy Principles to be adopted by each sector in India. The Nine National Privacy Principles reflect international standards, as well as taking into consideration the Indian context. Along with the National Privacy Principles, the Report lays out a regulatory framework for privacy including privacy commissioners at the regional and national level, self regulating organizations at the industry level, and a system of complaints. Finally the report demonstrates how the National Privacy Principles could be used to harmonize existing legislation and practices.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Draft CIS Citizens Privacy (Protection) Bill 2013&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been researching privacy in India since 2010 with the objective of raising public awareness, completing in depth research, and driving a privacy legislation in India. As part of this work, the Centre for Internet and Society has drafted the Privacy (Protection) Bill 2013. The Citizens Privacy Protection Bill contains provisions that speak to data protection, interception, and surveillance. The Bill also establishes the powers and functions of the privacy commissioner, and lays out offenses and penalties for contravention of the Act. The Bill represents a citizens’ version of a privacy legislation, and will be shared with civil society, industry, and government. It is hoped that the review and revision of the Bill will be a participatory process, and thus comments and feedback to it’s’ provisions will be included as annex’s to the Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The International Principles on the Application of Human Rights to Communication Surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These principles were defined in 2013 in response to rapidly changing technologies and surveillance practices. The principles are the outcome of a global consultation with civil society groups, industry and international experts in communications surveillance law, policy and technology, spearheaded by the Electronic Frontier Foundation US and Privacy International UK. As technologies that facilitate State surveillance of communications advance, States are failing to ensure that laws and regulations related to communications surveillance adhere to international human rights and adequately protect the rights to privacy and freedom of expression. These principles attempt to explain how international human rights law applies in the current digital environment, particularly in light of the increase in and changes to communications surveillance technologies and techniques. These principles can provide civil society groups, industry, States and others with a framework to evaluate whether current or proposed surveillance laws and practices are consistent with human rights.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Tentative schedule for the Roundtables:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Mumbai – June 28th&lt;/li&gt;
&lt;li&gt;New Delhi – July 4th&lt;/li&gt;
&lt;li&gt;Ahmedabad/Hyderabad – August 1st&lt;/li&gt;
&lt;li&gt;Bangalore – September 5th&lt;/li&gt;
&lt;li&gt;New Delhi – October 3rd&lt;/li&gt;
&lt;li&gt;Chennai – October 24th&lt;/li&gt;
&lt;li&gt;New Delhi – November 7th&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Resources&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf" class="external-link"&gt;Draft CIS Privacy Bill 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://en.necessaryandproportionate.org/text"&gt;International Principles on the Application of Human Rights and Communication Surveillance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/privacy-surveillance-roundtable'&gt;https://cis-india.org/events/privacy-surveillance-roundtable&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-20T05:26:10Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online">
    <title>UN Human Rights Council urged to protect human rights online</title>
    <link>https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online</link>
    <description>
        &lt;b&gt;63 civil society groups urged the UN Human Rights Council to address global challenges to freedom of expression, privacy and other human rights on the Internet. Centre for Internet &amp; Society joined in the statement, delivered on behalf of the 63 groups by Article 19. 
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The 26th session of the United Nations Human Rights Council (UNHRC) is currently ongoing (June 10-27, 2014). &lt;span&gt;On June 19, 2014, 63 civil society groups joined together to urge the United Nations Human Rights Council to protect human rights online and address global challenged to their realization. Centre for Internet &amp;amp; Society joined in support of the statement ("&lt;strong&gt;the Civil Society Statement&lt;/strong&gt;"), which was delivered by Article 19 on behalf of the 63 groups.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its consensus resolution &lt;a class="external-link" href="http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/20/8"&gt;A/HRC/20/8 (2012)&lt;/a&gt;, the UNHRC affirmed that the "&lt;span&gt;&lt;i&gt;same rights that people have offline must also be protected online, in particular freedom of expression, which is applicable regardless of frontiers and through any media of one’s choice&lt;/i&gt;". India, a current member of the UNHRC, stood in support of resolution 20/8. The protection of human rights online was also a matter of popular agreement at &lt;a class="external-link" href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;NETmundial 2014&lt;/a&gt;, which similarly emphasised the importance of protecting human rights online in accordance with international human rights obligations. Moreover, the WSIS+10 High Level Event, organised by the ITU in collaboration with other UN entities, emphasized the criticality of expanding access to ICTs across the globe, including infrastructure, affordability and reach.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Civil Society Statement at HRC26 highlights the importance of retaining the Internet as a global resource - a democratic, free and pluralistic platform. However, the recent record of freedom of expression and privacy online have resulted in a deficit of trust and free, democratic participation. &lt;a class="external-link" href="http://www.nytimes.com/2014/03/21/world/europe/turkish-officials-block-twitter-in-leak-inquiry.html"&gt;Turkey&lt;/a&gt;, &lt;a class="external-link" href="http://www.bbc.com/news/blogs-trending-25756864"&gt;Malaysia&lt;/a&gt;, &lt;a class="external-link" href="http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/05/27/thailands-cybercoup/"&gt;Thailand&lt;/a&gt;, &lt;a class="external-link" href="http://www.theguardian.com/world/2014/jun/02/egypt-police-monitor-social-media-dissent-facebook-twitter-protest"&gt;Egypt&lt;/a&gt; and &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/Facebook-under-fire-for-blocking-pages-in-Pakistan/articleshow/36194872.cms"&gt;Pakistan&lt;/a&gt; have blocked web-pages and social media content, while Edward Snowden's &lt;a class="external-link" href="https://www.eff.org/deeplinks/2014/05/looking-back-one-year-after-edward-snowden-disclosures-international-perspective"&gt;revelations&lt;/a&gt; have heightened awareness of human rights violations on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At a time when governance of the Internet and its institutions is evolving, a human rights centred perspective is crucial. Openness and transparency - both in the governance of Internet institutions and rights online - are crucial to continuing growth of the Internet as a global, democratic and free resource, where freedom of expression, privacy and other rights are respected regardless of location or nationality. In particular, the Civil Society Statement calls attention to &lt;a class="external-link" href="https://en.necessaryandproportionate.org/take-action/EFF"&gt;principles of necessity and proportionality&lt;/a&gt; to regulate targeted interception and collection of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UNHRC, comprising 47 member states, is called upon to address these global challenges. Guided by resolutions A/HRC/20/8 and &lt;a class="external-link" href="http://www.un.org/ga/search/view_doc.asp?symbol=A/C.3/68/L.45/Rev.1"&gt;A/RES/68/167&lt;/a&gt;, the WSIS+10 High Level Event &lt;a class="external-link" href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;Outcome Documents&lt;/a&gt; (especially operative paragraphs 2, 8 and 11 of the Vision Document) and the &lt;a class="external-link" href="http://www.ohchr.org/EN/Issues/DigitalAge/Pages/DigitalAgeIndex.aspx"&gt;forthcoming report&lt;/a&gt; of the UN High Commissioner for Human Rights regarding privacy in the digital age, the UNHRC as well as other states may gather the opportunity and intention to put forth a strong case for human rights online in our post-2015 development-centred world.&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Civil Society Statement:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The full oral statement can be accessed &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/unhrc-civil-society-statement-26th-session" class="internal-link"&gt;here&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online'&gt;https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>UNHRC</dc:subject>
    

   <dc:date>2014-06-19T13:28:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/research-advisory-network-meeting">
    <title>Research Advisory Network Meeting</title>
    <link>https://cis-india.org/news/research-advisory-network-meeting</link>
    <description>
        &lt;b&gt;All sessions will take place at the OECD Headquarters, located at 2 Rue André Pascal, 75016, Paris, France. Sunil Abraham is participating in the event.&lt;/b&gt;
        &lt;p&gt;For agenda and other details, &lt;a href="https://cis-india.org/internet-governance/blog/research-advisory-network-agenda.pdf" class="internal-link"&gt;click here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Hosting of the Event&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Organisation for Economic Co-operation and Development (OECD) has agreed to host this meeting of the Global Commission on Internet Governance’s Research Advisory Network (RAN). The OECD will provide meeting space and logistical support, and is committed to engaging the project in the development of evidence-based policy recommendations for the future of Internet governance.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Meeting Participant List&lt;/h2&gt;
&lt;h3&gt;Research Advisory Network Committees&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Sunil Abraham&lt;/li&gt;
&lt;li&gt;Subimal Bhattacharjee&lt;/li&gt;
&lt;li&gt;Bertrand de la Chapelle&lt;/li&gt;
&lt;li&gt;Laura DeNardis&lt;/li&gt;
&lt;li&gt;Patrik Fältström&lt;/li&gt;
&lt;li&gt;Paul Fehlinger&lt;/li&gt;
&lt;li&gt;Fen Hampson&lt;/li&gt;
&lt;li&gt;Clem Herman&lt;/li&gt;
&lt;li&gt;Konstaninos Komaitis&lt;/li&gt;
&lt;li&gt;Young-eum Lee&lt;/li&gt;
&lt;li&gt;Tim Maurer&lt;/li&gt;
&lt;li&gt;Emily Taylor&lt;/li&gt;
&lt;li&gt;Rolf Weber&lt;/li&gt;
&lt;li&gt;Andrew Wyckoff&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Special Guests&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;James Kaplan&lt;/li&gt;
&lt;li&gt;Bill Woodcock&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;OECD Staff&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Aaron Martin&lt;/li&gt;
&lt;li&gt;Anne Carblanc&lt;/li&gt;
&lt;li&gt;Sam Paltridge&lt;/li&gt;
&lt;li&gt;Alexia Gonzalez Fanfalone&lt;/li&gt;
&lt;li&gt;Lorrayne Porciuncula&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Commission Secretariat&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Caroline Baylon &lt;/li&gt;
&lt;li&gt;Eric Jardine &lt;/li&gt;
&lt;li&gt;Mark Raymond &lt;/li&gt;
&lt;li&gt;Aaron Shull &lt;/li&gt;
&lt;li&gt;Brenda Woods&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Research Advisory Network Biographies&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Sunil Abraham / @sunil_abraham&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham is the executive director of the Centre for Internet and Society (CIS). CIS is a five year old policy and academic research organization focusing on accessibility, access to knowledge, Internet governance, telecom, digital natives and digital humanities. He founded Mahiti in 1998, a social enterprise that provides technology to civil society for which he was elected an Ashoka fellow in 1999. Between June 2004 and June 2007, Sunil also managed the International Open Source Network, a project of UNDP serving 42 countries in the Asia-Pacific region.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Subimal Bhattacharjee / @subimal&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subimal Bhattacharjee is an independent consultant on defence and cyber issues, working primarily with government and private sector advisory panels in India. He is the former India country director for General Dynamics International Corporation. Subimal is a columnist and internationally respected speaker on issues of Internet governance and cyber security.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Bertrand de La Chapelle / &lt;/b&gt;&lt;a href="http://twitter.com/@bdelachapelle"&gt;&lt;b&gt;@bdelachapelle&lt;/b&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bertrand de La Chapelle is the Director of the Internet &amp;amp; Jurisdiction Project, a global multistakeholder dialogue process developing a due process framework to handle the diversity of national laws in cross-border online spaces. He served as a Director on the ICANN Board from 2010 to 2013. From 2006 to 2010, he was France’s Thematic Ambassador and Special Envoy for the Information Society, participating in all WSIS follow-up activities and Internet governance processes, including in particular the Internet Governance Forum (IGF), and was a Vice-Chair of ICANN’s Governmental Advisory Committee (GAC). Bertrand is a graduate of Ecole Polytechnique, Sciences Po Paris and Ecole Nationale d’Administration.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Laura DeNardis / @LauraDeNardis&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A scholar of Internet architecture and governance, Dr. Laura DeNardis is a CIGI senior fellow and professor at American University. She is an affiliated fellow at Yale Law School’s Information Society Project and previously served as its Executive Director. She is the Director of Research for the Global Commission on Internet Governance and is the author of The Global War for Internet Governance (Yale University Press 2014).&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Patrik Fältström / @patrikhson&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patrik Fältström is head of research and development at Netnod. Previously, he was a distinguished engineer at Cisco, technical specialist at Tele2, systems manager at the Royal Institute of Technology, researcher at Bunyip Information Systems and a programmer in the Royal Swedish Navy. He has been a member of numerous advisory groups and investigations related to the Internet, both public and private sector. Patrik holds an M.Sc. in mathematics from the University of Stockholm.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Paul Fehlinger / @PaulFehlinger&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Paul Fehlinger is the co-founder and manager of the Internet &amp;amp; Jurisdiction Project, a global multi-stakeholder dialogue process developing a due process framework to enable the coexistence of diverse national laws in cross-border online spaces. He started working on Internet governance at Sciences Po Paris and the Max Planck Institute for the Study of Societies. He is since actively engaged in the UN Internet Governance Forum, EuroDIG and other global Internet fora.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Fen Hampson&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fen Osler Hampson is a distinguished fellow and director of the Global Security &amp;amp; Politics Program at the Centre for International Governance Innovation (CIGI). He has served as director of the Norman Paterson School of International Affairs and is concurrently chancellor’s professor at Carleton University. He is the recipient of various awards and honours and is a frequent commentator and contributor to international media.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Clem Herman / @clemherman&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clem Herman is a senior lecturer in the Department of Computing and Communications at the UK Open University, and was previously director of the Manchester Women’s Electronic Village Hall (WEVH) pioneering the use of ICTs to empower women. She has published widely on gender issues in technology and is the founder and editor-in-chief of the International Journal of Gender Science and Technology.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Konstantinos Komaitis / @kkomaitis&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Konstantinos Komaitis is a policy advisor at the Internet Society, focusing primarily on the field of digital content and intellectual property. Before joining the Internet Society in July 2012, he was a senior lecturer at the University of Strathclyde in Glasgow. Konstantinos holds a Ph.D. in law and his thesis focused on issues of intellectual property and the Internet, with particular focus on the intersection of trademarks and domain names. He is the author of &lt;i&gt;The Current State of Domain Name Regulation.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Young-eum Lee&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Young-eum Lee is a professor in the Department of Media Arts and Sciences at Korea National Open University. She has been involved in various Internet governance policy making processes of the Korean domain name .kr at KISA (KRNIC), and has also been involved in global Internet governance activities at ICANN. Since 2003, she has been a council member of the ccNSO representing .kr in the Asia-Pacific region. Young-eum received her M.A. in Communication Science at Northwestern University and her doctorate in Communication from the University of Michigan.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Tim Maurer&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tim Maurer is a research fellow at the New America Foundation’s Open Technology Institute. He focuses on cyberspace and international affairs, namely Internet governance, cyber-security, and human rights online. In October 2013 and February 2014, he spoke about cyber-warfare at the United Nations. Tim’s research has been published and featured by national and international print, radio and television media, including Harvard University, Foreign Policy, CNN and Slate among others. He conducts academic research as a non-resident research fellow at the University of Toronto’s Citizen Lab.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Emily Taylor / @etaylaw&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Emily Taylor is a renowned expert in the field of Internet law and governance, and provides research services in areas including security, IPv6 deployment, internationalised domain names, the domain name industry, and global policy development. Her roles in the Internet sphere include &lt;a href="http://www.icann.org/en/about/aoc-review/whois/composition" target="_BLANK"&gt;chair of the WhoIs Review Committee for ICANN 2012&lt;/a&gt;, member of the Multistakeholder Advisory Group to the IGF (2006-2012), director of Synetergy (providing Sunrise Dispute resolution services to the largest gTLD applicant, Donuts), and several ongoing non-executive directorships.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Rolf H. Weber &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rolf H. Weber is professor for civil, commercial and European law at the University of Zurich Law School. Since 2008, he is the director of the Information and Communication Law Center at the University of Zurich, a member (now Vice-Chairman) of the Steering Committee of the Global Internet Governance Academic Network (GigaNet) as well as a member of the European Dialogue on Internet Governance (EuroDIG). Since 2009, he has been a member of the High-level Panel of Advisers of the Global Alliance for Information and Communication Technologies and Development (GAID) and author of frequent publications on Internet Governance.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Andrew Wyckoff &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Andrew W. Wyckoff is the director of the OECD’s Directorate for Science, Technology and Industry. Prior to the OECD, he was a program manager of the Information, Telecommunications and Commerce program of the US Congressional Office of Technology Assessment, an economist at the US National Science Foundation and a programmer at the Brookings Institution. Andrew holds a Master of Public Policy from the JFK School of Government, Harvard University.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Special Guest Biographies&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;James M. Kaplan&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;James M. Kaplan is a partner at McKinsey &amp;amp; Company in New York. He convenes McKinsey's global practices in IT infrastructure and cyber-security. He has assisted leading institutions in implementing cyber-security strategies, conducting cyber-war games, optimizing enterprise infrastructure environments and exploiting cloud technologies. James led McKinsey's collaboration with the World Economic Forum on "Risk &amp;amp; Responsibility in a Hyper-Connected World," which was presented at the Forum's recent Annual Meeting in Davos. He published on a variety of technology topics in the McKinsey Quarterly, the Financial Times, the Wall Street Journal and the Harvard Business Review Blog Network.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Bill Woodcock&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bill Woodcock is the executive director of Packet Clearing House, the international non-governmental organization that builds and supports critical Internet infrastructure, including Internet exchange points and the core of the domain name system. Since entering the Internet industry in 1985, Bill has helped establish more than one hundred and fifty Internet exchange points. In the early 1990s, Bill developed the anycast routing technique that now protects the domain name system. In 2002 he co-founded INOC-DBA, the security-coordination hotline system that interconnects the network operations centers of more than three thousand ISPs around the world.  And in 2007, Bill was one of the two international liaisons deployed by NSP-Sec to the Estonian CERT during the Russian cyber-attack.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/research-advisory-network-meeting'&gt;https://cis-india.org/news/research-advisory-network-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-03T06:39:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data">
    <title>Vodafone Report Explains Government Access to Customer Data</title>
    <link>https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data</link>
    <description>
        &lt;b&gt;Vodafone Group PLC, the world’s second largest mobile carrier, released a report on Friday, June 6 2014 disclosing to what extent governments can request their customers’ data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a href="http://www.vodafone.com/content/dam/sustainability/2014/pdf/vodafone_full_report_2014.pdf"&gt;The Law Enforcement Disclosure Report&lt;/a&gt;, a section of a larger annual Sustainability Report began by asserting that Vodafone "customers have a right to privacy which is enshrined in international human rights law and standards and enacted through national laws."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the report continues, Vodafone is incapable of fully protecting its customers right to privacy, because it is bound by the laws in the various countries in which it operates. "If we do not comply with a lawful demand for assistance, governments can remove our license to operate, preventing us from providing services to our customers," The report goes into detail about the laws in each of the 29 nations where the company operates.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vodafone’s report is one of the first published by a multinational service provider. Compiling such a report was especially difficult, according to the report, for a few reasons. Because no comparable report had been published before, Vodafone had to figure out for themselves, the “complex task” of what information they could legally publish in each country. This difficulty was compounded by the fact that Vodafone operates physical infrastructure and thus sets up a business in each of the countries where it provides services. This means that Vodafone is subject to the laws and operating licenses of each nation where it operates, unlike as a search engine such as Google, which can provide services across international borders but still be subject to United States law – where it is incorporated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report is an important step forward for consumer privacy. First, the Report shows that the company is aware of the conflict of interest between government authorities and its customers, and the pivotal position that the company can play in honoring the privacy of its users by providing information regarding the same in all cases where it legally can. Additionally, providing the user insight into challenges that the company faces when addressing and responding to law enforcement requests, the Report provides a brief overview of the legal qualifications that must be met in each country to access customer data. Also, Vodafone’s report has encouraged other telecom companies to disclose similar information to the public. For instance, Deutsche Telekom AG, a large European and American telecommunications company, said Vodafone’s report had led it consider releasing a report of it’s own.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Direct Government Access&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The report revealed that six countries had constructed secret wires or “pipes” which allowed them access to customers’ private data. This means that the governments of these six countries have immediate access to Vodafone’s network without any due process, oversight, or accountability for these opaque practices. Essentially, the report reveals, in order to operate in one of these jurisdictions, a communications company must ensure  that authorities have, real time and direct access to all personal customer data at any time, without any specific justification. The report does not name these six nations for legal reasons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These pipes exist, the direct access model exists,” Vodafone's group privacy officer, Stephen Deadman, told the Guardian. “We are making a call to end direct access as a means of government agencies obtaining people's communication data. Without an official warrant, there is no external visibility. If we receive a demand we can push back against the agency. The fact that a government has to issue a piece of paper is an important constraint on how powers are used."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Organization&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Vodafone’s Report lists the aggregate number of content requests they received in each country where it operates, and groups these requests into two major categories. The first is Lawful Interceptions, which is when the government directly listens in or reads the content of a communication. In the past, this type of action has been called wiretapping, but now includes reading the content of text messages, emails, and other communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second data point Vodafone provides for each country is the number of Communications Data requests they receive from each country. These are requests for the metadata associated with customer communications, such as the numbers they have been texting and the time stamps on all of their texts and calls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is worth noting that all of the numbers Vodafone reports are warrant statistics rather than target statistics. Vodafone, according to the report, has chosen to include the number of times a government sent a request to Vodafone to "intrude into the private affairs of its citizens, not the extent to which those warranted activities then range across an ever-expanding multiplicity of devices, accounts and apps."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Construction&lt;/h3&gt;
&lt;p&gt;However, in many cases, laws in the various companies in which Vodafone operates prohibit Vodafone from publishing all or part of the aforementioned data. In fact, this is the rule rather than the exception. The majority of countries, including India, prohibit Vodafone from releasing the number of data requests they receive. Other countries publish the numbers themselves, so Vodafone has chosen not to reprint their statistics either. This is because Vodafone wants to encourage governments to take responsibility for informing their citizens of the statistics themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report also makes note of the process Vodafone went through to determine the legality of publishing these statistics. It was not always straightforward. For example, in Germany, when Vodafone’s legal team went to examine the legislation governing whether or not they could publish statistics on government data requests, they concluded that the laws were unclear, and asked German authorities for advice on how to proceed. They were informed that publishing any such statistics would be illegal, so they did not include any German numbers in their report. However, since that time, other local carriers have released similar statistics, and thus the situation remains unresolved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other companies have also recently released reports. Twitter, a microblogging website, Facebook, a social networking website, and Google a search engine with social network capabilities have all released comparable reports, but their reports differ from Vodafone’s in a number of ways. While Twitter, Google, and Facebook all specified the percent of requests granted, Vodafone released no similar statistics. However, Vodafone prepared discussions of the various legal constraints that each country imposed on telecom companies, giving readers an understanding of what was required in each country for authorities to access their data, a component that was left out of other recent reports. Once again, Vodafone’s report differed from those of Google Facebook and Twitter because while Vodafone opens businesses in each of the countries where it operates and is subject to their laws, Google, Facebook, and Twitter are all Internet companies and so are only governed by United States law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google disclosed that it received 27,427 requests over a six-month period ending in December, 2013, and also noted that the number of requests has increased consistently each six-month period since data began being compiled in 2009, when fewer than half as many requests were being made. On the other hand Google said that the percentage of requests it complied with (64% over the most recent period) had declined significantly since 2010, when it complied with 76% of requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google went into less detail when explaining the process non-American authorities had to go through to access data, but did note that a Mutual Legal Assistance Treaty was the primary way governments outside of the United States could force the release of user data. Such a treaty is an agreement between the United States and another government to help each other with legal proceedings. However, the report indicated that Google might disclose user information in situations when they were not legally compelled to, and did not go into detail about how or when it did that. Thus, given the difficulty of obtaining a Mutual Legal Assistance Treaty in addition to local warrants or subpoenas, it seems likely that Google complies with many more non-American data requests than it was legally forced to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook has only released two such reports so far, for the two six month periods in 2013, but they too indicated an increasing number of requests, from roughly 26,000 to 28,147. Facebook plans to continue issuing reports every six months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter has also seen an increase of 22% in government requests between this and the previous reporting period, six months ago. Twitter attributes this increase in requests to an increase in users internationally, and it does seem that the website has a similarly growing user base, according to charts released by Twitter. It is worth noting that while large nations such as the United States and India are responsible for the majority of government requests, smaller nations such as Bulgaria and Ecuador also order telecom and Internet companies to turn over data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Vodaphone’s Statistics&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Though Vodafone’s report didn’t print statistics for the majority of the countries the report covered, looking at the few numbers they did publish can shed some light on the behavior of governments in countries where publishing such statistics is illegal.  For the countries where Vodafone does release data, the numbers of government requests for Vodafone data were much higher than for Google data. For instance, Italy requested Vodafone data 605,601 times, while requesting Google data only 896 times. This suggests that other countries such as India could be looking at many more customers’ data through telecom companies like Vodafone than Internet companies like Google.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vodafone stressed that they were not the only telecom company that was being forced to share customers’ data, sometimes without warrants. In fact, such access was the norm in countries where authorities demanded it.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;India and the Reports&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India is one of the most proliferate requesters of data, second only to the United States in number of requests for data from Facebook and fourth after the United States, France and Germany in number of requests for data from Google. In the most recent six-month period, India requested data from Google 2,513 times, Facebook 3,598 times, and Twitter 19 times. The percentage of requests granted varies widely from country. For example, while Facebook complies with 79% of United States authorities’ requests, it only grants 50% of India’s requests. Google responds to 83% of US requests but only 66% of India’s.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook also provides data on the number of content restrictions each country requests. A content restriction request is where an authority asks Facebook to take down a particular status, photo, video, or other web content and no longer display it on their site. India, with 4,765 requests, is the country that most often asks Facebook to remove content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Vodafone’s report publishes no statistics on Indian data requests, because such disclosure would be illegal, it does discuss the legal considerations they are faced with. In India, the report explains, several laws govern Internet communications. The Information Technology Act (ITA) of 2000 is the parent legislation governing information technology in India. The ITA allows certain members of Indian national or state governments order an interception of a phone call or other communication in real time, for a number of reasons. According to the report, an interception can be ordered “if the official in question believes that it is necessary to do so in the: (a) interest of sovereignty and integrity of India; (b) the security of the State; (c) friendly relations with foreign states; (d) public order; or (e) the prevention of incitement of offences.” In short, it is fairly easy for a high-ranking official to order a wiretapping in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report goes on to detail Indian authorities’ abilities to request other customer data beyond a lawful interception. The Code of Criminal Procedure allows a court or police officer to ask Vodafone and other telecom companies to produce “any document or other thing” that the officer believes is necessary for any investigation. The ITA extends this ability to any information stored in any computer, and requires service providers to extend their full assistance to the government. Thus, it is not only legally simple to order a wiretapping in India; it is also very easy for authorities to obtain customer web or communication data at any time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear that Indian laws governing communication have very little protections in place for consumer privacy. However, many in India hope to change this reality. The Group of Experts chaired by Justice AP Shah, the Department of Personnel and Training, along with other concerned groups have been working towards the  drafting of a privacy legislation for India. According to the &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;, the legislation would fix the 50 or so privacy laws in India that are outdated and unable to protect citizen’s privacy when they use modern technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the Indian government is moving forward with a number of plans to further infringe the privacy of civilians. For example, the Central Monitoring System, a clandestine electronic surveillance program, gives India’s security agencies and income tax officials direct access to communications data in the country. The program began in 2007 and was announced publicly in 2009 to little fanfare and muted public debate. The system became operational in 2013.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Vodafone’s report indicates that it is concerned about protecting its customer’s privacy, and Vodafone’s disclosure report is an important step forward for consumer web and communication privacy. The report stresses that company practice and government policy need to come together to protect citizen’s privacy and –businesses cannot do it alone. However, the report reveals what companies can do to effect privacy reform. By challenging authorities abilities to access customer data, as well as publishing information about these powers, they bring the issue to the government’s attention and open it up to public debate. Through Vodafone’s report, the public can see why their governments are making surveillance decisions. Yet, in India, there is still little adoption of transparent business practices such as these. Perhaps if more companies were transparent about the level of government surveillance their customers were being subjected to, their practices and policies for responding to requests from law enforcement, and the laws and regulations that they are subject to - the public would press the government for stronger privacy safeguards and protections.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data'&gt;https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>joe</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-06-19T10:38:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how">
    <title>Multi-stakeholder Models of Internet Governance within States: Why, Who &amp; How?</title>
    <link>https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how</link>
    <description>
        &lt;b&gt;Internet governance, for long a global exercise, has found new awareness within national frameworks in recent times. Especially relevant for developing countries, effective national IG mechanisms are important to raise awareness and ensure multi-stakeholder participation at technical, infrastructural and public policy levels.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This post is a surface-level overview of national IG bodies, and is intended to inform introductory thoughts on national IG mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;A Short Introduction&lt;/strong&gt;&lt;i&gt; &lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The previous decade has seen a &lt;a href="http://www.intgovforum.org/cms/igf-initiatives"&gt;proliferation&lt;/a&gt; of regional, sub-regional and national initiatives for Internet governance (IG). Built primarily on the multi-stakeholder model, these initiatives aim at creating dialogue on issues of regional, local or municipal importance. In Asia, Bangladesh has instituted a national IGF, the Bangladesh IGF, with the &lt;a href="http://www.intgovforum.org/cms/2011/NationalregionalIGFreports/BANGLADESHIGF.2011.pdf"&gt;stated objective&lt;/a&gt; of creating a national multi-stakeholder forum that is specialized in Internet governance issues, and to facilitate informed dialogue on IG policy issues among stakeholders. India, too, is currently in the process of instituting such a forum. At this juncture, it is useful to consider the rationale and modalities of national IG bodies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet has long been considered a sphere of non-governmental, multi-stakeholder, decentralized, bottom-up governance space. The Declaration of Independence of Cyberspace, John Perry Barlow’s defiant articulation of the &lt;a href="https://projects.eff.org/~barlow/Declaration-Final.html"&gt;Internet’s freedom from governmental control&lt;/a&gt;, is a classic instance of this. The Internet is a “&lt;i&gt;vast ocean&lt;/i&gt;”, we claimed; “&lt;i&gt;no one owns it&lt;/i&gt;”.&lt;a href="#_ftn1"&gt;[1]&lt;/a&gt; Even today, members of the technical community insist that everyone ought to “&lt;i&gt;let techies do their job&lt;/i&gt;”: a plea, if you will, of the complexity of cyber-walls and –borders (or of their lack).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But as Prof. Milton Mueller argues in &lt;i&gt;Ruling the Root&lt;/i&gt;, the Internet has always been a contentious resource: battles over its governance (or specifically, the governance of the DNS root, both the &lt;a href="http://www.iana.org/domains/root/files"&gt;root-zone file&lt;/a&gt; and the &lt;a href="http://root-servers.org/"&gt;root servers&lt;/a&gt;) have leapt from the naïveté of the Declaration of Independence to a private-sector-led, contract-based exploitation of Internet resources. The creation of ICANN was a crucial step in this direction, following arbitrary policy choices by Verizon and entities managing the naming and numbering resources of the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The mushrooming of parallel tracks of Internet governance is further evidence of the malleability of the space. As of today, various institutions – inter-governmental and multi-stakeholder – extend their claims of governance. ICANN, the World Summit of Information Society, the World Conference on International Telecommunications, the Internet Governance Forum and the Working Group on Enhanced Cooperation under the ECOSOC Committee for Science, Technology and Development are a few prominent tracks. As of today, the WSIS process has absorbed various UN special bodies (the ITU, UNESCO, UNCTAD, UNDP are but a few), with the UNESCO instituting a &lt;a href="http://www.unesco.org/new/internetstudy"&gt;separate study&lt;/a&gt; on Internet-related issues. A proposal for a multilateral Committee on Internet-Related Policies remains &lt;a href="http://www.internetgovernance.org/2011/10/29/a-united-nations-committee-for-internet-related-policies-a-fair-assessment/"&gt;stillborn&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amongst these, the Internet Governance Forum (IGF) remains a strong contender for a truly multi-stakeholder process facilitating dialogue on IG. The IGF was set up following the recommendation of the Working Group of Internet Governance (WGIG), constituted after the Geneva phase of the WSIS.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;Rationale: Why Have National IG bodies?&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The issue of national multi-stakeholder cooperation/collaboration in IG is not new; it has been alive since the early 2000s. The &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt;, in paragraph 80, encourages the “&lt;i&gt;development of multi-stakeholder processes at the &lt;span&gt;national, regional and international levels&lt;/span&gt; to discuss and collaborate on the expansion and diffusion of the Internet as a means to support development efforts to achieve internationally agreed development goals and objectives, including the Millennium Development Goals&lt;/i&gt;” (emphasis supplied).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In its &lt;/span&gt;&lt;a href="http://www.wgig.org/docs/WGIGREPORT.pdf"&gt;June 2005 Report&lt;/a&gt;&lt;span&gt;, the Working Group on Internet Governance (WGIG) emphasizes that “&lt;/span&gt;&lt;i&gt;global Internet governance can only be effective if there is &lt;span&gt;coherence&lt;/span&gt; with &lt;span&gt;regional, subregional and national-level&lt;/span&gt; policies&lt;/i&gt;&lt;span&gt;”. Towards this end it recommends that “&lt;/span&gt;&lt;i&gt;coordination be established &lt;span&gt;among all stakeholders at the national level&lt;/span&gt; and &lt;span&gt;a multi-stakeholder national Internet governance steering committee or similar body&lt;/span&gt; be set up&lt;/i&gt;&lt;span&gt;” (emphasis supplied). The IGF, whose creation the WGIG recommended, has since been commended for its impact on the proliferation of national IGFs.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The rationale, then, was that multi-stakeholder steering committees at the national level would help to create a cohesive body to coordinate positions on Internet governance. In &lt;/span&gt;&lt;i&gt;Reforming Internet Governance&lt;/i&gt;&lt;span&gt;, WGIG member Waudo Siganga writes of the Internet Steering Committee of Brazil as a model, highlighting lessons that states (especially developing countries) may learn from CGI.br.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Brazilian Internet Steering Committee (CGI.br) was set up in 1995 and is responsible, &lt;/span&gt;&lt;i&gt;inter alia&lt;/i&gt;&lt;span&gt;, for the management of the .br domain, distribution of Internet addresses and administration of metropolitan Internet exchange points. CERT.br ensures network security and extends support to network administrators. Siganga &lt;/span&gt;&lt;a href="http://www.wgig.org/docs/book/Waudo-Siganga.html"&gt;writes&lt;/a&gt;&lt;span&gt; that CGI.br is a “&lt;/span&gt;&lt;i&gt;well-structured multistakeholder entity, having representation from government and democratically chosen representatives of the business sector, scientific and technological community and an Internet expert&lt;/i&gt;&lt;span&gt;”.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Why is CGI.br a model for other states? &lt;/span&gt;&lt;i&gt;First&lt;/i&gt;&lt;span&gt;, CGI.br exemplifies how countries can structure in an effective manner, a body that is involved in creating awareness about IG issues at the national level. Moreover, the multi-stakeholder nature of CGI.br shows how participation can be harnessed effectively to build capacity across domestic players. This also reflects the multi-stakeholder aspects of Internet governance at the global level, clarifying and implementing the WSIS standards (for instance). Especially in developing countries, where awareness and coordination for Internet governance is lacking at the national level, national IG committees can bridge the gap between awareness and participation. Such awareness can translate into local solutions for local issues, as well as contributing to an informed, cohesive stance at the global level.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Stakeholders: Populating a national IG body&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A national IG body – be in steering committee, IGF or other forum – should ideally involve all relevant stakeholders. As noted before, since inception, the Internet has not been subject to exclusive governmental regulation. The World Summit on Information Society recognized this, but negotiations amongst stakeholders resulted in the delegation of roles and responsibilities: the controversial and much-debated paragraph 35 of the &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt; reads:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;The private sector has had, and should continue to have, an important role in the development of the Internet, both in the technical and economic fields.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Civil society has also played an important role on Internet matters, especially at community level, and should continue to play such a role.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Intergovernmental organizations have had, and should continue to have, a facilitating role in the coordination of Internet-related public policy issues.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;International organizations have also had and should continue to have an important role in the development of Internet-related technical standards and relevant policies.&lt;/i&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This position remains endorsed by the WSIS process; the recent WSIS+10 High Level Event &lt;a href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;endorsed by acclamation&lt;/a&gt; the &lt;i&gt;WSIS+10 Vision for WSIS Beyond 2015&lt;/i&gt;, which “&lt;i&gt;respect mandates given by Tunis Agenda and respect for the multi-stakeholder principles&lt;/i&gt;”. In addition to government, the private sector and civil society, the technical community is identified as a distinct stakeholder group. Academia has also found a voice, as demonstrated by stakeholder-representation at NETmundial 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20framework%20for%20IG%20assessments%20-%20D%20Souter%20-%20final_0.pdf"&gt;study of the Internet Society&lt;/a&gt; (ISOC) on &lt;i&gt;Assessing National Internet Governance Arrangements&lt;/i&gt;, authored by David Souter, maps IG stakeholders at the global, regional and national levels. At the global level, primary stakeholders include ICANN (not-for-profit, private sector corporation involved in governance and technical coordination of the DNS), the IETF, IAB and W3C (technical standards), governments and civil society organizations, all of which participate with different levels of involvements at the IGF, ICANN, ITU, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the national/municipal level, the list of stakeholders is as comprehensive. &lt;strong&gt;Governmental stakeholders&lt;/strong&gt; include: (1) relevant Ministries (in India, these are the Ministry of Information and Broadcasting, and the Ministry of Communications and Information Technology – the Department of Electronics and Information Technology under the MCIT is particularly relevant), and (2) regulators, statutory and independent (the Telecom Regulatory Authority of India, for example). At the national level, these typically seek inputs from other stakeholders while making recommendations to governments, which then enact laws or make policy. In India, for instance, the &lt;a href="http://www.trai.gov.in/content/CONSULTATION/0_CONSULTATIONS.aspx"&gt;TRAI conducts consultations&lt;/a&gt; prior to making recommendations to the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within the &lt;strong&gt;private sector&lt;/strong&gt;, there may be companies (1) on the supply-side, such as infrastructure networks, telecommunications service companies, Internet Service Providers, search engines, social networks, cybercafés, etc., and (2) on the demand-side, online businesses, advertising/media, financial service providers, etc. who &lt;i&gt;use&lt;/i&gt; the Internet. There may also be &lt;strong&gt;national registries&lt;/strong&gt; managing ccTLDs, such as the Registro.br or the National Internet Exchange of India (NIXI). There may also the &lt;strong&gt;press and news corporations&lt;/strong&gt; representing both corporate and public interest under specific circumstances (media ownership and freedom of expression, for distinct examples).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Civil society organisations&lt;/strong&gt;, including consumer organisations, think-tanks and grassroots organisations, participate at various levels of policy-making in the formal institutional structure, and are crucial in representing users and public interest. The complexity of stakeholders may be seen from &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20framework%20for%20IG%20assessments%20-%20D%20Souter%20-%20final_0.pdf"&gt;Souter’s report&lt;/a&gt;, and this enumeration is but a superficial view of the national stakeholder-population.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Processes: Creating effective national IG bodies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;National IG bodies – be they steering committees, IGFs, consultative/working groups or other forums – may be limited by formal institutional governmental settings. While limited by the responsibility-gradient in paragraph 35 of the Tunis Agenda, an effective national IG body requires robust multi-stakeholder participation, as Souter notes, in technical governance, infrastructure and public policy issues. Its effectiveness also lies in governmental acquiescence of its expertise and recommendations; in short, in the translation of the IG body’s decisions into policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How do these stakeholders interact at the national level? In addition to the Brazilian example (CGI.br), an &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20study%20of%20IG%20in%20Kenya%20-%20D%20Souter%20%26%20M%20Kerretts-Makau%20-%20final.pdf"&gt;ISOC study&lt;/a&gt; by Souter and Monica Kerretts-Makau, &lt;i&gt;Internet Governance in Kenya: An Assessment&lt;/i&gt;, provides a detailed answer. At the &lt;strong&gt;technical level&lt;/strong&gt;, the registry KENIC manages the .ke domain, while the Kenya Computer Incident Response Team Coordination Centre coordinates national responses to incidents and collaborates internationally on cyber-security issues. A specific IPv6 Force to promote Kenya’s transition to IPv6 was also created.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the &lt;strong&gt;infrastructural level&lt;/strong&gt;, both the government and the private sector play important roles. Directly, ministries and government departments consult with infrastructure providers in creating policy. In India, for instance, the TRAI conducts multi-stakeholder consultations on issues such as telecom tariffs, colocation tariffs for submarine cable stations and mobile towers, etc. The government may also take a lead in creating infrastructure, such as the national optic fibre networks in &lt;a href="http://www.bbnl.nic.in/content/page/national-optical-fibre-networknofn.php"&gt;India&lt;/a&gt; and &lt;a href="https://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=11&amp;amp;ved=0CBsQFjAAOAo&amp;amp;url=http%3A%2F%2Fwww.kictanet.or.ke%2F%3Fp%3D1822&amp;amp;ei=avmeU_SaII6SuATi2ICoDA&amp;amp;usg=AFQjCNEgUIpb_kf2Fx-s7TJ2H-xl1rm9WA&amp;amp;sig2=HlpJp1UlVXRHTAOPh9W7Bg&amp;amp;bvm=bv.68911936,d.c2E&amp;amp;cad=rja"&gt;Kenya&lt;/a&gt;, as also creating investment opportunities such as liberalizing FDI. At the &lt;strong&gt;public policy level&lt;/strong&gt;, there may exist consultations initiated by government bodies (such as the TRAI or the Law Commission), in which other stakeholders participate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As one can see, government-initiated consultations by ministries, regulators, law commissions or specially constituted committees. Several countries have also set up national IGFs, which typically involve all major stakeholders in voluntary participation, and form a discussion forum for existing and emerging IG issues. National IGFs &lt;a href="http://www.internetgovernance.org/2009/08/28/another-mini-internet-governance-forum-in-the-u-s-a/"&gt;have been considered&lt;/a&gt; particularly useful to create awareness within the country, and may best address IG issues at the domestic policy level. However, Prof. Mueller &lt;a href="http://www.internetgovernance.org/2008/01/18/the-igf-and-networked-internet-governance/"&gt;writes&lt;/a&gt; that what is necessary is a “&lt;i&gt;reliable mechanism reliable mechanisms for consistently feeding the preferences expressed in these forums to actual global policy-making institutions like ICANN, RIRs, WIPO, and WTO which impact distributional outcomes&lt;/i&gt;”.&lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1"&gt;[1]&lt;/a&gt; M. Mueller, Ruling the Root: Internet Governance and the Taming of Cyberspace 57 (2002).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how'&gt;https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>National IGFs</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    

   <dc:date>2014-06-16T14:27:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act">
    <title>A Review of the Functioning of the Cyber Appellate Tribunal and Adjudicatory Officers under the IT Act</title>
    <link>https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act</link>
    <description>
        &lt;b&gt;Tribunals and quasi-judicial bodies are a regular feature of the Indian judicial system, as they provide for easier and less onerous methods for dispute resolution, especially disputes which relate to technical areas and often require technical knowledge and familiarity with specialised factual scenarios.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Further, quasi-judicial bodies do not have the same procedural restrictions as proper courts, which makes the adjudication of disputes easier. The Information Technology Act of India, which regulates several important aspects of electronic information, including the regulation of private electronic transactions as well as detailing civil and criminal offences relating to computers and electronic information, contemplates a specialised dispute resolution mechanism for disputes relating to the offences detailed under the Act. The Act provides for the establishment of quasi-judicial bodies, namely adjudicating officers under S.46, to hear disputes arising out of Chapter IX of the Act, namely, offences of a civil nature under S.43, 43A, 44 and 45 of the Act, as well as criminal offences described under Chapter XI of the Act. The adjudicating officer has the power to both award compensation as damages in a civil remedy, as well as impose penalties for the contravention of the Act,&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; and therefore has powers of both civil and criminal courts. The first appellate body provided in the Act, i.e. the authority that any party not satisfied by the decision of the adjudicating officer can appeal to, is the Cyber Appellate Tribunal, consisting of a Chairperson and any other members so prescribed by the Central Government.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;The second appeal, if a party is aggrieved by the decision of the Cyber Appellate Tribunal, may be filed before the High Court having jurisdiction, within 60 days from the date of communication of the order.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Functioning of the Offices of the State Adjudicating Officers and the Cyber Appellate Tribunal&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The office of the adjudicating officer is established under S.46 of the IT Act, which provides that the person appointed to such a post must be a government officer of a rank not below that of a Director or an equivalent rank, and must have experience both in the field of Information Technology as well as legal or judicial experience.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In most cases, the appointed adjudicating officer is the Principle Secretary to the Department of Information Technology in the state.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; The decisions of these adjudicating officers determine the scope and meaning of several provisions of the IT Act, and are instrumental in the development of the law in this field and filling a lacuna regarding the interpretation of these important provisions, particularly in areas such as data protection and privacy.&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;However, despite the large number of cyber-crime cases being registered across the country,&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;there is a lack of available judgements on the adjudication of disputes under Sections 43, 43A, 44 and 45 of the Act. Of all the states, only the websites of the Departments of Information Technology in Maharashtra,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;, Tamil Nadu&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;, New Delhi&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;, and Haryana&lt;a href="#fn11" name="fr11"&gt;[11] &lt;/a&gt;have reported judgements or orders of the Adjudicating Officers.  The adjudicating officer in Maharasthra, Rajesh Aggarwal, has done a particularly commendable job, having disposed of 51 cases under the IT Act, with 20 cases still pending.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first Cyber Appellate Tribunal set up by the Central Government is located at New Delhi. Although a second branch of the Tribunal was to be set up in Bangalore, no efforts seem to have been made in this regard.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; Further, the position of the Chairperson of the Appellate Tribunal, has been left vacant since 2011, after the appointed Chairperson attained the age of superannuation and retired. Although judicial and technical members have been appointed at various points, the tribunal cannot hold hearings without a chairperson. A total of 17 judgements have been passed by the Cyber Appellate Tribunal prior to the retirement of the chairperson, while the backlog of cases is continuously growing.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;Despite a writ petition being filed before the Karnataka High Court and the secretary of the Department of IT coming on record to state that the Chairperson would be appointed within 6 months (of September 2013), no action seems to have been taken in this regard, and the lacunae in the judicial mechanism under the IT Act continues. The proper functioning of adjudicating officers and the Cyber Appellate Tribunal is particularly necessary for the functioning of a just judicial system in light of the provisions of the Act (namely, Section 61) which bar the jurisdiction of ordinary civil courts in claims below the amount of Rs. 5 Crores, where the adjudicating officer or the CAT is empowered.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Analysis of Cases Filed under Section 43A&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 43A of the Information Technology Act was inserted by the 2008 Amendment, and is the principle provision governing protection of information held by intermediaries under the Act. Section 43A provides that “body corporates” handling “sensitive personal data” must implement reasonable security practices for the protection of this information. If it is negligent in providing or maintaining such reasonable security practices, the body corporate is to be held liable and must pay compensation for the loss occurred.&lt;a href="#fn15" name="fr15"&gt;[15] &lt;/a&gt;Rule 3 of the Draft Reasonable Security Practices Rules, defines sensitive personal data as including – passwords, user details as provided at the time of registration or thereafter, information related to financial information such as Bank account/ credit card /debit card /other payment instrument details of the users, physiological and mental health conditions, medical records and history, biometric information, information received by body corporate for processing, stored or processed under lawful contract or otherwise and call data records.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All the decisions of appointed adjudicators are available for an analysis of Section 43A are from the adjudicating officer in Maharashtra, Mr. Rajesh Tandon, who despite having no judicial experience, has very cogent analysis and knowledge of legal issues involved in the cases, which is commendable for a quasi-judicial officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One class of cases, constituting a major chunk of the claims, is where the complainant is claiming against a bank for the fraudulent transfer of funds from the claimants account to another account. In most of these cases, the adjudicating officer examined the compliance of the bank with “Know Your Customer” norms and guidelines framed by the Reserve Bank of India for prevention of banking fraud and, where such compliance was found to be lacking and information which allowed the bank accounts of the complainant was allowed to be accessed by fraudsters, the presumption is that the bank was negligent in the handling of “sensitive personal information”,&lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;by failing to provide for reasonable security practices and consequently was liable for compensation under S.43A, &lt;i&gt;notwithstanding &lt;/i&gt;that the complainant also contributed to compromising certain personal information by responding to phishing mails,&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; or divulging information to other third parties.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;These instances clearly fall within the scope of Section 43A, which protects “information related to financial information such as Bank account/ credit card /debit card /other payment instrument details of the users” as sensitive personal data from negligent handling by body corporates. The decisions of the adjudicating officer must be applauded for placing a higher duty of care on banks to protect informational privacy of its customers, given that they are in a position where they ought to be well equipped to deal with intimate financial information and holding them accountable for lack of proper mechanisms to counter bank fraud using stolen information, which reflects in the compensation which the banks have been liable to pay, not only as indemnification for losses, but also punitive damages.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Nirmalkumar Bhagerwal v IDBI Bank and Meenal Bhagerwal, &lt;/i&gt;the sensitive financial information of the complainant, namely, the bank statement, had been accessed by the complainants wife. In holding the bank to be liable for divulging the same, and that access to personal information by a spouse is also covered under S.43A, the officer seems to have imputed the loss of privacy on account of such negligence as ‘wrongful loss’ which deserves compensation. One anomalous decision of the officer was where the operator of an ATM was held liable for fraudulent credit card transactions in that Machine, due to “reasonable security practices” such as security personnel or CCTV footage, and therefore causing the loss of “sensitive personal data”. However, it is difficult to see how ATM operators can be held liable for failing to protect sensitive information from being divulged, when the case is simply of a person fraudulently using a credit card.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another class of cases, generally linked with the above cases, is complaints against cell phone providers for divulging information through falsely procured Sim Cards. In such instances, the officer has held that by negligently allowing the issuance of duplicate sim cards, the phone company has &lt;i&gt;led to the access of sensitive personal data and thus caused wrongful loss to the complainant.&lt;/i&gt; This interpretation of Section 43A is somewhat confusing. The officer seems to have interpreted the provisions of Section 43A to include &lt;i&gt;carriers&lt;/i&gt; of the information which was originally sent through the computer resource of the banking companies. In this way, they are imputed the status of “handlers” of sensitive personal information, and their communications infrastructure through which the information is sent is the “computer resource” which it operates for the purpose of the Act. Therefore, through their negligence, they are &lt;i&gt;abetting &lt;/i&gt;the offence under 43A.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, in the case of &lt;i&gt;Sanjay Govind Dhandhe v ICICI and Vodafone, &lt;/i&gt;the officer remarked that –“&lt;i&gt;A SIM card is a veritable key to person’s sensitive financial and personal information. Realizing this, there are clear guidelines issued by the DOT regarding the issuance of SIM cards. The IT Act also intends to ensure that electronic personal and sensitive data is kept secured and reasonable measures are used to maintain its confidentiality and integrity. It is extremely crucial that Telecom companies actively follow strict security procedures while issuing SIM cards, especially in wake of the fact that mobiles are being increasingly used to undertake financial transactions. In many a case brought before me, financial frauds have been committed by fraudsters using the registered mobile numbers of the banks’ account holders.&lt;/i&gt;” Therefore, intermediaries such as telecom companies, which peripherally handle the data, are also liable under the same standards for ensuring its privacy. The adjudicating officer has also held telephone companies liable for itemized phone bills as Call Data Records negligently divulged by them, which again clearly falls under the scope of the Reasonable Security Practices Rules.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Note:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"&lt;i&gt;Credentek v Insolutions (&lt;a href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_Credentek_Vs_Insolutions-28012014.pdf" target="_blank"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_Credentek_Vs_Insolutions-28012014.pdf&lt;/a&gt;) . This case&lt;/i&gt; holds  that banks and the National Payments Corporation of India were liable  under S. 43A for divulging information relating to transactions by their  customers to a software company which provides services to these banks  using the data, without first making them sign non-disclosure  agreements. The NCPI was fined a nominal amount of Rs. 10,000."&lt;/p&gt;
&lt;div&gt;
&lt;div class="h5"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Section 46, Information Technology Act, 2000.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Section 48 and 49 of the Information Technology Act, 2000 (Amended as of 2008).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Section 62, IT Act. However, The High Court may extend this period if there was sufficient cause for the delay.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. S. 46(3), Information Technology Act, &lt;i&gt;“No person shall be appointed as an adjudicating officer unless he possesses such experience in the field of Information Technology and Legal or Judicial experience as may be prescribed by the Central Government.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. From whatever data is available, the adjudicating officers in the states of Maharashtra, New Delhi, Haryana, Tamil Nadu and Karnataka are all secretaries to the respective state departments relating to IT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;See http://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra&lt;/i&gt;; Also &lt;i&gt;see &lt;/i&gt;the decision of the Karnataka adjudicating officer which held that body corporates are not persons under S.43 of the IT Act, and thus cannot be liable for compensation or even criminal action for offences under that Section, &lt;i&gt;available at&lt;/i&gt; &lt;a class="external-link" href="http://www.naavi.org/cl_editorial_13/adjudication_gpl_mnv.pdf"&gt;http://www.naavi.org/cl_editorial_13/adjudication_gpl_mnv.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;i&gt;Maharashtra Leads in War Against Cyber Crime&lt;/i&gt;, The Times of India, &lt;i&gt;available at &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/mumbai/Maharashtra-leads-in-war-against-cyber-crime/articleshow/30579310.cms"&gt;http://timesofindia.indiatimes.com/city/mumbai/Maharashtra-leads-in-war-against-cyber-crime/articleshow/30579310.cms&lt;/a&gt;. &lt;/i&gt;(18&lt;sup&gt;th&lt;/sup&gt; February, 2014).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. &lt;a class="external-link" href="https://it.maharashtra.gov.in/1089/IT-Act-Judgements"&gt;https://it.maharashtra.gov.in/1089/IT-Act-Judgements&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;a class="external-link" href="http://www.tn.gov.in/documents/atoz/J"&gt;http://www.tn.gov.in/documents/atoz/J&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. &lt;a class="external-link" href="http://www.delhi.gov.in/wps/wcm/connect/DoIT_IT/doit_it/it+home/orders+of+adjudicating+officer"&gt;http://www.delhi.gov.in/wps/wcm/connect/DoIT_IT/doit_it/it+home/orders+of+adjudicating+officer&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. &lt;a class="external-link" href="http://haryanait.gov.in/cyber.htm"&gt;http://haryanait.gov.in/cyber.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. &lt;i&gt;Bangalore Likely to host southern chapter of Cyber Appellate Tribunal, &lt;/i&gt;The Hinduk &lt;a class="external-link" href="http://www.thehindu.com/news/national/karnataka/bangalore-is-likely-to-host-southern-chapter-of-cyber-appellate-tribunal/article3381091.ece"&gt;http://www.thehindu.com/news/national/karnataka/bangalore-is-likely-to-host-southern-chapter-of-cyber-appellate-tribunal/article3381091.ece&lt;/a&gt; (2&lt;sup&gt;nd&lt;/sup&gt; May, 2013).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. &lt;a class="external-link" href="http://catindia.gov.in/Judgement.aspx"&gt;http://catindia.gov.in/Judgement.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Section 61 of the IT Act – ‘No court shall have jurisdiction to entertain any suit or proceeding in respect of any matter which an adjudicating officer appointed under this Act or the Cyber Appellate Tribunal constituted under this Act is empowered by or under this Act to determine and no injunction shall be granted by any court or other authority in respect of any action taken or to be taken in pursuance of any power conferred by or under this Act. Provided that the court may exercise jurisdiction in cases where the claim for injury or damage suffered by any person exceeds the maximum amount which can be awarded under this Chapter.&lt;i&gt;’&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Section 43A, Information Technology Act, 2000&lt;i&gt; – ‘&lt;/i&gt;Compensation for failure to protect data (Inserted vide ITAA 2006) Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected. (Change vide ITAA 2008)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Explanation: For the purposes of this section (i) "body corporate" means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities (ii) "reasonable security practices and procedures" means security practices and procedures designed to protect such information from unauthorized access, damage, use, modification, disclosure or impairment, as may be specified in an agreement between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit. (iii) "sensitive personal data or information" means such personal information as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Draft Reasonable Security Practices Rules under Section 43A of the IT Act, available at &lt;a class="external-link" href="http://www.huntonfiles.com/files/webupload/PrivacyLaw_Reasonable_Security_Practices_Sensitive_Personal_Information.pdf"&gt;http://www.huntonfiles.com/files/webupload/PrivacyLaw_Reasonable_Security_Practices_Sensitive_Personal_Information.pdf&lt;/a&gt;&lt;i&gt;. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. &lt;i&gt;Ravindra Gunale v Bank of Maharashtra,&lt;/i&gt; &lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RavindraGunale_Vs_BoM&amp;amp;amp;Vodafone_20022013.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RavindraGunale_Vs_BoM&amp;amp;Vodafone_20022013.PDF&lt;/a&gt;. &lt;i&gt;Ram Techno Pack v State Bank of India&lt;/i&gt;, &lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RamTechno_Vs_SBI-22022013.pdf"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RamTechno_Vs_SBI-22022013.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Srinivas Signs v IDBI, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_SreenivasSigns_Vs_IDBI-18022014.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_SreenivasSigns_Vs_IDBI-18022014.PDF&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Raju Dada Raut v ICICI Bank, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RajuDadaRaut_Vs_ICICIBank-13022013.pdf"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RajuDadaRaut_Vs_ICICIBank-13022013.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Pravin Parkhi v SBI Cards, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_PravinParkhi_Vs_SBICardsPayment-30122013.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_PravinParkhi_Vs_SBICardsPayment-30122013.PDF&lt;/a&gt;&lt;i&gt;. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. &lt;i&gt;Sourabh Jain v ICICI, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_SourabhJain_Vs_ICICI&amp;amp;amp;Idea-22022013.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_SourabhJain_Vs_ICICI&amp;amp;Idea-22022013.PDF&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. &lt;i&gt;Poona Automobiles v Punjab National Bank,&lt;/i&gt; &lt;a class="external-link" href="https://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_PoonaAuto_Vs_PNB-22022013.PDF"&gt;https://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_PoonaAuto_Vs_PNB-22022013.PDF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. &lt;i&gt;Amit Patwardhan v Bank of Baroda, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudicaton_AmitPatwardhan_Vs_BankOfBaroda-30122013.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudicaton_AmitPatwardhan_Vs_BankOfBaroda-30122013.PDF&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. &lt;i&gt;Ravindra Gunale v Bank of Maharashtra,&lt;/i&gt; &lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RavindraGunale_Vs_BoM&amp;amp;amp;Vodafone_20022013"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RavindraGunale_Vs_BoM&amp;amp;Vodafone_20022013&lt;/a&gt;; &lt;i&gt;Raju Dada Raut v ICICI Bank, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RajuDadaRaut_Vs_ICICIBank-13022013.pdf"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RajuDadaRaut_Vs_ICICIBank-13022013.pdf&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. &lt;i&gt;Rohit Maheshwari v Vodafone, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RohitMaheshwari_Vs_Vodafone&amp;amp;amp;ors-04022014.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RohitMaheshwari_Vs_Vodafone&amp;amp;ors-04022014.PDF&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act'&gt;https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-03T05:43:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/content-removal-on-facebook">
    <title>Content Removal on Facebook — A Case of Privatised Censorship?</title>
    <link>https://cis-india.org/internet-governance/blog/content-removal-on-facebook</link>
    <description>
        &lt;b&gt;Any activity on Facebook, be it creating an account, posting a picture or status update or creating a group or page, is bound by Facebook’s Terms of Service and Community Guidelines. These contain a list of content that is prohibited from being published on Facebook which ranges from hate speech to pornography to violation of privacy. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Facebook removes content largely on the basis of requests either by the government or by other users. The &lt;a href="https://www.facebook.com/help/365194763546571/"&gt;Help section&lt;/a&gt; of Facebook deals with warnings and blocking of content. It says that Facebook only removes content that violates Community Guidelines and not everything that has been reported.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I conducted an experiment to primarily look at Facebook’s process of content removal and also to analyse what kind of content they actually remove.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;I put up a status which contained personal information of a person on my Friend List (the information was false). I then asked several people (including the person about whom the status was made) to report the status — that of  being harassed  or for violation of  privacy rights. Seven people reported the status. Within half an hour of the reports being made, I received the following notification:&lt;br /&gt;"Someone reported your &lt;a href="https://www.facebook.com/sugarquill/posts/10152265929599232" target="_blank"&gt;post&lt;/a&gt; for containing harassment and &lt;a href="https://www.facebook.com/settings?tab=support&amp;amp;item_id=10152265934819232&amp;amp;notif_t=content_reported"&gt;1 other reason&lt;/a&gt;."&lt;br /&gt;&lt;br /&gt;The notification also contained the option to delete my post and said that Facebook would look into whether it violated their Community Guidelines.&lt;br /&gt;&lt;br /&gt;A day later, all those who had reported the status received notifications stating the following:&lt;br /&gt;&lt;br /&gt;"We reviewed the post you reported for harassment and found it doesn't violate our &lt;a href="https://www.facebook.com/communitystandards" target="_blank"&gt;Community Standards&lt;/a&gt;." &lt;br /&gt;&lt;br /&gt;I received a similar notification as well.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;I, along with around thirteen others, reported a Facebook page which contained pictures of my friend and a few other women with lewd captions in various regional languages. We reported the group for harassment and bullying and also for humiliating someone we knew. The report was made on 24 March, 2014. On 30 April, 2014, I received a notification stating the following:&lt;br /&gt;&lt;br /&gt;"We reviewed the page you reported for harassment and found it doesn't violate our &lt;a href="https://www.facebook.com/communitystandards" target="_blank"&gt;Community Standards&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Note: If you have an issue with something on the Page, make sure you report the content (e.g. a photo), not the entire Page. That way, your report will be more accurately reviewed."&lt;br /&gt;&lt;br /&gt;I then reported each picture on the page for harassment and received a series of notifications on 5 May, 2014 which stated the following:&lt;br /&gt;&lt;br /&gt;"We reviewed the photo you reported for harassment and found it doesn't violate our &lt;a href="https://www.facebook.com/communitystandards" target="_blank"&gt;Community Standards&lt;/a&gt;."&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;These incidents are in stark contrast with repeated attempts by Facebook to remove content which it finds objectionable. In 2013, a homosexual man’s picture protesting against the Supreme Court judgment in December was &lt;a href="http://www.ndtv.com/article/india/heated-debate-after-facebook-allegedly-deletes-photograph-of-gay-sikh-kissing-a-man-460219"&gt;taken down&lt;/a&gt;. In 2012, Facebook &lt;a href="http://www.blouinartinfo.com/news/story/816583/facebook-censors-pompidous-gerhard-richter-nude-fueling-fight"&gt;removed artwork&lt;/a&gt; by a French artist which featured a nude woman.  In the same year, Facebook &lt;a href="http://www.dailymail.co.uk/news/article-2146588/Heather-Patrick-Walker-Facebook-ban-pictures-baby-son-died.html"&gt;removed photographs&lt;/a&gt; of a child who was born with defect and banned the mother from accessing Facebook completely. Facebook also &lt;a href="http://www.huffingtonpost.com/2013/02/20/facebook-breast-cancer-tattoo-photo-double-mastectomy_n_2726118.html"&gt;removed a picture&lt;/a&gt; of a breast cancer survivor who posted a picture of a tattoo that she had following her mastectomy. Following this, however, Facebook issued an apology and stated that mastectomy photographs are not in violation of their Content Guidelines. Even in the sphere of political discourse and dissent, Facebook has cowered under government pressure and removed pages and content, as evidenced by the &lt;a href="http://www.firstpost.com/living/facebook-bows-to-pak-pressure-bans-rock-band-laal-anti-taliban-groups-1560009.html"&gt;ban&lt;/a&gt; on the progressive Pakistani band Laal’s Facebook page and other anti-Taliban pages. Following much social media outrage, Facebook soon &lt;a href="http://www.dawn.com/news/1111174/laals-facebook-page-now-accessible-to-pak-based-internet-users"&gt;revoked&lt;/a&gt; this ban. These are just a few examples of how harmless content has been taken down by Facebook, in a biased exercise of its powers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After incidents of content removal have been made public through news reports and complaints, Facebook often apologises for removing content and issues statements that the removal was an “error.” In some cases, they edit their policies to address specific kinds of content after a takedown (like the &lt;a href="http://www.guardian.co.uk/media/2008/dec/30/facebook-breastfeeding-ban"&gt;reversal of the breastfeeding ban&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, however, Facebook is notorious for refusing to take down content that is actually objectionable, partially evidenced by my own experiences listed above. There have been complaints about Facebook’s &lt;a href="http://www.theguardian.com/lifeandstyle/2013/feb/19/facebook-images-rape-domestic-violence"&gt;refusal to remove&lt;/a&gt; misogynistic content which glorifies rape and domestic violence through a series of violent images and jokes. One such page was removed finally, not because of the content but because the administrators had used fake profiles. When asked, a spokesperson said that censorship “was not the solution to bad online behaviour or offensive beliefs.” While this may be true, the question that needs answering is why Facebook decides to draw these lines only when it comes to certain kinds of ‘objectionable’ content and not others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All of these examples represent a certain kind of arbitrariness on the part of Facebook’s censorship policies. It seems that Facebook is far more concerned with removing content that will cause supposed public or governmental outrage or defy some internal morality code, rather than protecting the rights of those who may be harmed due to such content, as their Statement of Policies so clearly spells out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are many aspects of the review and takedown process that are hazy, like who exactly reviews the content that is reported and what standards they are made to employ. In 2012, it was revealed that Facebook &lt;a href="http://gawker.com/5885714/inside-facebooks-outsourced-anti-porn-and-gore-brigade-where-camel-toes-are-more-offensive-than-crushed-heads"&gt;outsourced&lt;/a&gt; its content reviews to oDesk and provided the reviewers with a 17-page manual which listed what kind of content was appropriate and what was not. A bare reading of the leaked document gives one a sense of Facebook’s aversion to sex and nudity and its neglect of other harm-inducing content like harassment through misuse of content that is posted and what is categorised as hate speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the process of monitoring the acceptability of content, Facebook takes upon itself the role of a private censor with absolutely no accountability or transparency in its working. A &lt;a href="https://fbcdn-dragon-a.akamaihd.net/hphotos-ak-xpa1/t39.2178-6/851563_293317947467769_1320502878_n.png"&gt;Reporting Guide&lt;/a&gt; was published to increase transparency in its content review procedures. The Guide reveals that Facebook provides for an option where the reportee can appeal the decision to remove content in “some cases.” However, the lack of clarity on what these cases are or what the appeal process is frustrates the existence of this provision as it can be misused. Additionally, Facebook reserves the right to remove content with or without notice depending upon the severity of the violation. There is no mention of how severe is severe enough to warrant uninformed content removal. In most of the above cases, the user was not notified that their content was found offensive and would be liable for takedown. Although Facebook publishes a transparency report, it only contains a record of takedowns following government requests and not those by private users of Facebook. The unbridled nature of the power that Facebook has over our personal content, despite clearly stating that all content posted is the user’s alone, threatens the freedom of expression on the site. A proper implementation of the policies that Facebook claims to employ is required along with a systematic record of the procedure that is used to remove content that is in consonance with natural justice.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/content-removal-on-facebook'&gt;https://cis-india.org/internet-governance/blog/content-removal-on-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jessie</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-16T05:23:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
