<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1761 to 1775.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/research-advisory-network-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/content-removal-on-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-comments-supporting-the-dns-industry-in-underserved-regions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-june-11-2014-sunita-sekhar-stay-connected-even-when-you-go-underground"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-comments-enhancing-icann-accountability"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-leslie-d-monte-june-5-2014-right-to-be-forgotten-poses-legal-dilemma-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/wsis-high-level-event-open-consultation-process"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-may-25-2014-purnima-sharma-digital-death-log-off-in-peace"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/research-advisory-network-meeting">
    <title>Research Advisory Network Meeting</title>
    <link>https://cis-india.org/news/research-advisory-network-meeting</link>
    <description>
        &lt;b&gt;All sessions will take place at the OECD Headquarters, located at 2 Rue André Pascal, 75016, Paris, France. Sunil Abraham is participating in the event.&lt;/b&gt;
        &lt;p&gt;For agenda and other details, &lt;a href="https://cis-india.org/internet-governance/blog/research-advisory-network-agenda.pdf" class="internal-link"&gt;click here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Hosting of the Event&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Organisation for Economic Co-operation and Development (OECD) has agreed to host this meeting of the Global Commission on Internet Governance’s Research Advisory Network (RAN). The OECD will provide meeting space and logistical support, and is committed to engaging the project in the development of evidence-based policy recommendations for the future of Internet governance.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Meeting Participant List&lt;/h2&gt;
&lt;h3&gt;Research Advisory Network Committees&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Sunil Abraham&lt;/li&gt;
&lt;li&gt;Subimal Bhattacharjee&lt;/li&gt;
&lt;li&gt;Bertrand de la Chapelle&lt;/li&gt;
&lt;li&gt;Laura DeNardis&lt;/li&gt;
&lt;li&gt;Patrik Fältström&lt;/li&gt;
&lt;li&gt;Paul Fehlinger&lt;/li&gt;
&lt;li&gt;Fen Hampson&lt;/li&gt;
&lt;li&gt;Clem Herman&lt;/li&gt;
&lt;li&gt;Konstaninos Komaitis&lt;/li&gt;
&lt;li&gt;Young-eum Lee&lt;/li&gt;
&lt;li&gt;Tim Maurer&lt;/li&gt;
&lt;li&gt;Emily Taylor&lt;/li&gt;
&lt;li&gt;Rolf Weber&lt;/li&gt;
&lt;li&gt;Andrew Wyckoff&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Special Guests&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;James Kaplan&lt;/li&gt;
&lt;li&gt;Bill Woodcock&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;OECD Staff&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Aaron Martin&lt;/li&gt;
&lt;li&gt;Anne Carblanc&lt;/li&gt;
&lt;li&gt;Sam Paltridge&lt;/li&gt;
&lt;li&gt;Alexia Gonzalez Fanfalone&lt;/li&gt;
&lt;li&gt;Lorrayne Porciuncula&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Commission Secretariat&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Caroline Baylon &lt;/li&gt;
&lt;li&gt;Eric Jardine &lt;/li&gt;
&lt;li&gt;Mark Raymond &lt;/li&gt;
&lt;li&gt;Aaron Shull &lt;/li&gt;
&lt;li&gt;Brenda Woods&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Research Advisory Network Biographies&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Sunil Abraham / @sunil_abraham&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham is the executive director of the Centre for Internet and Society (CIS). CIS is a five year old policy and academic research organization focusing on accessibility, access to knowledge, Internet governance, telecom, digital natives and digital humanities. He founded Mahiti in 1998, a social enterprise that provides technology to civil society for which he was elected an Ashoka fellow in 1999. Between June 2004 and June 2007, Sunil also managed the International Open Source Network, a project of UNDP serving 42 countries in the Asia-Pacific region.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Subimal Bhattacharjee / @subimal&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subimal Bhattacharjee is an independent consultant on defence and cyber issues, working primarily with government and private sector advisory panels in India. He is the former India country director for General Dynamics International Corporation. Subimal is a columnist and internationally respected speaker on issues of Internet governance and cyber security.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Bertrand de La Chapelle / &lt;/b&gt;&lt;a href="http://twitter.com/@bdelachapelle"&gt;&lt;b&gt;@bdelachapelle&lt;/b&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bertrand de La Chapelle is the Director of the Internet &amp;amp; Jurisdiction Project, a global multistakeholder dialogue process developing a due process framework to handle the diversity of national laws in cross-border online spaces. He served as a Director on the ICANN Board from 2010 to 2013. From 2006 to 2010, he was France’s Thematic Ambassador and Special Envoy for the Information Society, participating in all WSIS follow-up activities and Internet governance processes, including in particular the Internet Governance Forum (IGF), and was a Vice-Chair of ICANN’s Governmental Advisory Committee (GAC). Bertrand is a graduate of Ecole Polytechnique, Sciences Po Paris and Ecole Nationale d’Administration.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Laura DeNardis / @LauraDeNardis&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A scholar of Internet architecture and governance, Dr. Laura DeNardis is a CIGI senior fellow and professor at American University. She is an affiliated fellow at Yale Law School’s Information Society Project and previously served as its Executive Director. She is the Director of Research for the Global Commission on Internet Governance and is the author of The Global War for Internet Governance (Yale University Press 2014).&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Patrik Fältström / @patrikhson&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patrik Fältström is head of research and development at Netnod. Previously, he was a distinguished engineer at Cisco, technical specialist at Tele2, systems manager at the Royal Institute of Technology, researcher at Bunyip Information Systems and a programmer in the Royal Swedish Navy. He has been a member of numerous advisory groups and investigations related to the Internet, both public and private sector. Patrik holds an M.Sc. in mathematics from the University of Stockholm.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Paul Fehlinger / @PaulFehlinger&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Paul Fehlinger is the co-founder and manager of the Internet &amp;amp; Jurisdiction Project, a global multi-stakeholder dialogue process developing a due process framework to enable the coexistence of diverse national laws in cross-border online spaces. He started working on Internet governance at Sciences Po Paris and the Max Planck Institute for the Study of Societies. He is since actively engaged in the UN Internet Governance Forum, EuroDIG and other global Internet fora.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Fen Hampson&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fen Osler Hampson is a distinguished fellow and director of the Global Security &amp;amp; Politics Program at the Centre for International Governance Innovation (CIGI). He has served as director of the Norman Paterson School of International Affairs and is concurrently chancellor’s professor at Carleton University. He is the recipient of various awards and honours and is a frequent commentator and contributor to international media.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Clem Herman / @clemherman&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clem Herman is a senior lecturer in the Department of Computing and Communications at the UK Open University, and was previously director of the Manchester Women’s Electronic Village Hall (WEVH) pioneering the use of ICTs to empower women. She has published widely on gender issues in technology and is the founder and editor-in-chief of the International Journal of Gender Science and Technology.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Konstantinos Komaitis / @kkomaitis&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Konstantinos Komaitis is a policy advisor at the Internet Society, focusing primarily on the field of digital content and intellectual property. Before joining the Internet Society in July 2012, he was a senior lecturer at the University of Strathclyde in Glasgow. Konstantinos holds a Ph.D. in law and his thesis focused on issues of intellectual property and the Internet, with particular focus on the intersection of trademarks and domain names. He is the author of &lt;i&gt;The Current State of Domain Name Regulation.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Young-eum Lee&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Young-eum Lee is a professor in the Department of Media Arts and Sciences at Korea National Open University. She has been involved in various Internet governance policy making processes of the Korean domain name .kr at KISA (KRNIC), and has also been involved in global Internet governance activities at ICANN. Since 2003, she has been a council member of the ccNSO representing .kr in the Asia-Pacific region. Young-eum received her M.A. in Communication Science at Northwestern University and her doctorate in Communication from the University of Michigan.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Tim Maurer&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tim Maurer is a research fellow at the New America Foundation’s Open Technology Institute. He focuses on cyberspace and international affairs, namely Internet governance, cyber-security, and human rights online. In October 2013 and February 2014, he spoke about cyber-warfare at the United Nations. Tim’s research has been published and featured by national and international print, radio and television media, including Harvard University, Foreign Policy, CNN and Slate among others. He conducts academic research as a non-resident research fellow at the University of Toronto’s Citizen Lab.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Emily Taylor / @etaylaw&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Emily Taylor is a renowned expert in the field of Internet law and governance, and provides research services in areas including security, IPv6 deployment, internationalised domain names, the domain name industry, and global policy development. Her roles in the Internet sphere include &lt;a href="http://www.icann.org/en/about/aoc-review/whois/composition" target="_BLANK"&gt;chair of the WhoIs Review Committee for ICANN 2012&lt;/a&gt;, member of the Multistakeholder Advisory Group to the IGF (2006-2012), director of Synetergy (providing Sunrise Dispute resolution services to the largest gTLD applicant, Donuts), and several ongoing non-executive directorships.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Rolf H. Weber &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rolf H. Weber is professor for civil, commercial and European law at the University of Zurich Law School. Since 2008, he is the director of the Information and Communication Law Center at the University of Zurich, a member (now Vice-Chairman) of the Steering Committee of the Global Internet Governance Academic Network (GigaNet) as well as a member of the European Dialogue on Internet Governance (EuroDIG). Since 2009, he has been a member of the High-level Panel of Advisers of the Global Alliance for Information and Communication Technologies and Development (GAID) and author of frequent publications on Internet Governance.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Andrew Wyckoff &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Andrew W. Wyckoff is the director of the OECD’s Directorate for Science, Technology and Industry. Prior to the OECD, he was a program manager of the Information, Telecommunications and Commerce program of the US Congressional Office of Technology Assessment, an economist at the US National Science Foundation and a programmer at the Brookings Institution. Andrew holds a Master of Public Policy from the JFK School of Government, Harvard University.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Special Guest Biographies&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;James M. Kaplan&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;James M. Kaplan is a partner at McKinsey &amp;amp; Company in New York. He convenes McKinsey's global practices in IT infrastructure and cyber-security. He has assisted leading institutions in implementing cyber-security strategies, conducting cyber-war games, optimizing enterprise infrastructure environments and exploiting cloud technologies. James led McKinsey's collaboration with the World Economic Forum on "Risk &amp;amp; Responsibility in a Hyper-Connected World," which was presented at the Forum's recent Annual Meeting in Davos. He published on a variety of technology topics in the McKinsey Quarterly, the Financial Times, the Wall Street Journal and the Harvard Business Review Blog Network.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Bill Woodcock&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bill Woodcock is the executive director of Packet Clearing House, the international non-governmental organization that builds and supports critical Internet infrastructure, including Internet exchange points and the core of the domain name system. Since entering the Internet industry in 1985, Bill has helped establish more than one hundred and fifty Internet exchange points. In the early 1990s, Bill developed the anycast routing technique that now protects the domain name system. In 2002 he co-founded INOC-DBA, the security-coordination hotline system that interconnects the network operations centers of more than three thousand ISPs around the world.  And in 2007, Bill was one of the two international liaisons deployed by NSP-Sec to the Estonian CERT during the Russian cyber-attack.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/research-advisory-network-meeting'&gt;https://cis-india.org/news/research-advisory-network-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-03T06:39:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data">
    <title>Vodafone Report Explains Government Access to Customer Data</title>
    <link>https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data</link>
    <description>
        &lt;b&gt;Vodafone Group PLC, the world’s second largest mobile carrier, released a report on Friday, June 6 2014 disclosing to what extent governments can request their customers’ data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a href="http://www.vodafone.com/content/dam/sustainability/2014/pdf/vodafone_full_report_2014.pdf"&gt;The Law Enforcement Disclosure Report&lt;/a&gt;, a section of a larger annual Sustainability Report began by asserting that Vodafone "customers have a right to privacy which is enshrined in international human rights law and standards and enacted through national laws."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the report continues, Vodafone is incapable of fully protecting its customers right to privacy, because it is bound by the laws in the various countries in which it operates. "If we do not comply with a lawful demand for assistance, governments can remove our license to operate, preventing us from providing services to our customers," The report goes into detail about the laws in each of the 29 nations where the company operates.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vodafone’s report is one of the first published by a multinational service provider. Compiling such a report was especially difficult, according to the report, for a few reasons. Because no comparable report had been published before, Vodafone had to figure out for themselves, the “complex task” of what information they could legally publish in each country. This difficulty was compounded by the fact that Vodafone operates physical infrastructure and thus sets up a business in each of the countries where it provides services. This means that Vodafone is subject to the laws and operating licenses of each nation where it operates, unlike as a search engine such as Google, which can provide services across international borders but still be subject to United States law – where it is incorporated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report is an important step forward for consumer privacy. First, the Report shows that the company is aware of the conflict of interest between government authorities and its customers, and the pivotal position that the company can play in honoring the privacy of its users by providing information regarding the same in all cases where it legally can. Additionally, providing the user insight into challenges that the company faces when addressing and responding to law enforcement requests, the Report provides a brief overview of the legal qualifications that must be met in each country to access customer data. Also, Vodafone’s report has encouraged other telecom companies to disclose similar information to the public. For instance, Deutsche Telekom AG, a large European and American telecommunications company, said Vodafone’s report had led it consider releasing a report of it’s own.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Direct Government Access&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The report revealed that six countries had constructed secret wires or “pipes” which allowed them access to customers’ private data. This means that the governments of these six countries have immediate access to Vodafone’s network without any due process, oversight, or accountability for these opaque practices. Essentially, the report reveals, in order to operate in one of these jurisdictions, a communications company must ensure  that authorities have, real time and direct access to all personal customer data at any time, without any specific justification. The report does not name these six nations for legal reasons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These pipes exist, the direct access model exists,” Vodafone's group privacy officer, Stephen Deadman, told the Guardian. “We are making a call to end direct access as a means of government agencies obtaining people's communication data. Without an official warrant, there is no external visibility. If we receive a demand we can push back against the agency. The fact that a government has to issue a piece of paper is an important constraint on how powers are used."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Organization&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Vodafone’s Report lists the aggregate number of content requests they received in each country where it operates, and groups these requests into two major categories. The first is Lawful Interceptions, which is when the government directly listens in or reads the content of a communication. In the past, this type of action has been called wiretapping, but now includes reading the content of text messages, emails, and other communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second data point Vodafone provides for each country is the number of Communications Data requests they receive from each country. These are requests for the metadata associated with customer communications, such as the numbers they have been texting and the time stamps on all of their texts and calls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is worth noting that all of the numbers Vodafone reports are warrant statistics rather than target statistics. Vodafone, according to the report, has chosen to include the number of times a government sent a request to Vodafone to "intrude into the private affairs of its citizens, not the extent to which those warranted activities then range across an ever-expanding multiplicity of devices, accounts and apps."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Construction&lt;/h3&gt;
&lt;p&gt;However, in many cases, laws in the various companies in which Vodafone operates prohibit Vodafone from publishing all or part of the aforementioned data. In fact, this is the rule rather than the exception. The majority of countries, including India, prohibit Vodafone from releasing the number of data requests they receive. Other countries publish the numbers themselves, so Vodafone has chosen not to reprint their statistics either. This is because Vodafone wants to encourage governments to take responsibility for informing their citizens of the statistics themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report also makes note of the process Vodafone went through to determine the legality of publishing these statistics. It was not always straightforward. For example, in Germany, when Vodafone’s legal team went to examine the legislation governing whether or not they could publish statistics on government data requests, they concluded that the laws were unclear, and asked German authorities for advice on how to proceed. They were informed that publishing any such statistics would be illegal, so they did not include any German numbers in their report. However, since that time, other local carriers have released similar statistics, and thus the situation remains unresolved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other companies have also recently released reports. Twitter, a microblogging website, Facebook, a social networking website, and Google a search engine with social network capabilities have all released comparable reports, but their reports differ from Vodafone’s in a number of ways. While Twitter, Google, and Facebook all specified the percent of requests granted, Vodafone released no similar statistics. However, Vodafone prepared discussions of the various legal constraints that each country imposed on telecom companies, giving readers an understanding of what was required in each country for authorities to access their data, a component that was left out of other recent reports. Once again, Vodafone’s report differed from those of Google Facebook and Twitter because while Vodafone opens businesses in each of the countries where it operates and is subject to their laws, Google, Facebook, and Twitter are all Internet companies and so are only governed by United States law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google disclosed that it received 27,427 requests over a six-month period ending in December, 2013, and also noted that the number of requests has increased consistently each six-month period since data began being compiled in 2009, when fewer than half as many requests were being made. On the other hand Google said that the percentage of requests it complied with (64% over the most recent period) had declined significantly since 2010, when it complied with 76% of requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google went into less detail when explaining the process non-American authorities had to go through to access data, but did note that a Mutual Legal Assistance Treaty was the primary way governments outside of the United States could force the release of user data. Such a treaty is an agreement between the United States and another government to help each other with legal proceedings. However, the report indicated that Google might disclose user information in situations when they were not legally compelled to, and did not go into detail about how or when it did that. Thus, given the difficulty of obtaining a Mutual Legal Assistance Treaty in addition to local warrants or subpoenas, it seems likely that Google complies with many more non-American data requests than it was legally forced to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook has only released two such reports so far, for the two six month periods in 2013, but they too indicated an increasing number of requests, from roughly 26,000 to 28,147. Facebook plans to continue issuing reports every six months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter has also seen an increase of 22% in government requests between this and the previous reporting period, six months ago. Twitter attributes this increase in requests to an increase in users internationally, and it does seem that the website has a similarly growing user base, according to charts released by Twitter. It is worth noting that while large nations such as the United States and India are responsible for the majority of government requests, smaller nations such as Bulgaria and Ecuador also order telecom and Internet companies to turn over data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Vodaphone’s Statistics&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Though Vodafone’s report didn’t print statistics for the majority of the countries the report covered, looking at the few numbers they did publish can shed some light on the behavior of governments in countries where publishing such statistics is illegal.  For the countries where Vodafone does release data, the numbers of government requests for Vodafone data were much higher than for Google data. For instance, Italy requested Vodafone data 605,601 times, while requesting Google data only 896 times. This suggests that other countries such as India could be looking at many more customers’ data through telecom companies like Vodafone than Internet companies like Google.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vodafone stressed that they were not the only telecom company that was being forced to share customers’ data, sometimes without warrants. In fact, such access was the norm in countries where authorities demanded it.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;India and the Reports&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India is one of the most proliferate requesters of data, second only to the United States in number of requests for data from Facebook and fourth after the United States, France and Germany in number of requests for data from Google. In the most recent six-month period, India requested data from Google 2,513 times, Facebook 3,598 times, and Twitter 19 times. The percentage of requests granted varies widely from country. For example, while Facebook complies with 79% of United States authorities’ requests, it only grants 50% of India’s requests. Google responds to 83% of US requests but only 66% of India’s.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook also provides data on the number of content restrictions each country requests. A content restriction request is where an authority asks Facebook to take down a particular status, photo, video, or other web content and no longer display it on their site. India, with 4,765 requests, is the country that most often asks Facebook to remove content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Vodafone’s report publishes no statistics on Indian data requests, because such disclosure would be illegal, it does discuss the legal considerations they are faced with. In India, the report explains, several laws govern Internet communications. The Information Technology Act (ITA) of 2000 is the parent legislation governing information technology in India. The ITA allows certain members of Indian national or state governments order an interception of a phone call or other communication in real time, for a number of reasons. According to the report, an interception can be ordered “if the official in question believes that it is necessary to do so in the: (a) interest of sovereignty and integrity of India; (b) the security of the State; (c) friendly relations with foreign states; (d) public order; or (e) the prevention of incitement of offences.” In short, it is fairly easy for a high-ranking official to order a wiretapping in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report goes on to detail Indian authorities’ abilities to request other customer data beyond a lawful interception. The Code of Criminal Procedure allows a court or police officer to ask Vodafone and other telecom companies to produce “any document or other thing” that the officer believes is necessary for any investigation. The ITA extends this ability to any information stored in any computer, and requires service providers to extend their full assistance to the government. Thus, it is not only legally simple to order a wiretapping in India; it is also very easy for authorities to obtain customer web or communication data at any time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear that Indian laws governing communication have very little protections in place for consumer privacy. However, many in India hope to change this reality. The Group of Experts chaired by Justice AP Shah, the Department of Personnel and Training, along with other concerned groups have been working towards the  drafting of a privacy legislation for India. According to the &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;, the legislation would fix the 50 or so privacy laws in India that are outdated and unable to protect citizen’s privacy when they use modern technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the Indian government is moving forward with a number of plans to further infringe the privacy of civilians. For example, the Central Monitoring System, a clandestine electronic surveillance program, gives India’s security agencies and income tax officials direct access to communications data in the country. The program began in 2007 and was announced publicly in 2009 to little fanfare and muted public debate. The system became operational in 2013.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Vodafone’s report indicates that it is concerned about protecting its customer’s privacy, and Vodafone’s disclosure report is an important step forward for consumer web and communication privacy. The report stresses that company practice and government policy need to come together to protect citizen’s privacy and –businesses cannot do it alone. However, the report reveals what companies can do to effect privacy reform. By challenging authorities abilities to access customer data, as well as publishing information about these powers, they bring the issue to the government’s attention and open it up to public debate. Through Vodafone’s report, the public can see why their governments are making surveillance decisions. Yet, in India, there is still little adoption of transparent business practices such as these. Perhaps if more companies were transparent about the level of government surveillance their customers were being subjected to, their practices and policies for responding to requests from law enforcement, and the laws and regulations that they are subject to - the public would press the government for stronger privacy safeguards and protections.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data'&gt;https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>joe</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-06-19T10:38:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how">
    <title>Multi-stakeholder Models of Internet Governance within States: Why, Who &amp; How?</title>
    <link>https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how</link>
    <description>
        &lt;b&gt;Internet governance, for long a global exercise, has found new awareness within national frameworks in recent times. Especially relevant for developing countries, effective national IG mechanisms are important to raise awareness and ensure multi-stakeholder participation at technical, infrastructural and public policy levels.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This post is a surface-level overview of national IG bodies, and is intended to inform introductory thoughts on national IG mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;A Short Introduction&lt;/strong&gt;&lt;i&gt; &lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The previous decade has seen a &lt;a href="http://www.intgovforum.org/cms/igf-initiatives"&gt;proliferation&lt;/a&gt; of regional, sub-regional and national initiatives for Internet governance (IG). Built primarily on the multi-stakeholder model, these initiatives aim at creating dialogue on issues of regional, local or municipal importance. In Asia, Bangladesh has instituted a national IGF, the Bangladesh IGF, with the &lt;a href="http://www.intgovforum.org/cms/2011/NationalregionalIGFreports/BANGLADESHIGF.2011.pdf"&gt;stated objective&lt;/a&gt; of creating a national multi-stakeholder forum that is specialized in Internet governance issues, and to facilitate informed dialogue on IG policy issues among stakeholders. India, too, is currently in the process of instituting such a forum. At this juncture, it is useful to consider the rationale and modalities of national IG bodies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet has long been considered a sphere of non-governmental, multi-stakeholder, decentralized, bottom-up governance space. The Declaration of Independence of Cyberspace, John Perry Barlow’s defiant articulation of the &lt;a href="https://projects.eff.org/~barlow/Declaration-Final.html"&gt;Internet’s freedom from governmental control&lt;/a&gt;, is a classic instance of this. The Internet is a “&lt;i&gt;vast ocean&lt;/i&gt;”, we claimed; “&lt;i&gt;no one owns it&lt;/i&gt;”.&lt;a href="#_ftn1"&gt;[1]&lt;/a&gt; Even today, members of the technical community insist that everyone ought to “&lt;i&gt;let techies do their job&lt;/i&gt;”: a plea, if you will, of the complexity of cyber-walls and –borders (or of their lack).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But as Prof. Milton Mueller argues in &lt;i&gt;Ruling the Root&lt;/i&gt;, the Internet has always been a contentious resource: battles over its governance (or specifically, the governance of the DNS root, both the &lt;a href="http://www.iana.org/domains/root/files"&gt;root-zone file&lt;/a&gt; and the &lt;a href="http://root-servers.org/"&gt;root servers&lt;/a&gt;) have leapt from the naïveté of the Declaration of Independence to a private-sector-led, contract-based exploitation of Internet resources. The creation of ICANN was a crucial step in this direction, following arbitrary policy choices by Verizon and entities managing the naming and numbering resources of the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The mushrooming of parallel tracks of Internet governance is further evidence of the malleability of the space. As of today, various institutions – inter-governmental and multi-stakeholder – extend their claims of governance. ICANN, the World Summit of Information Society, the World Conference on International Telecommunications, the Internet Governance Forum and the Working Group on Enhanced Cooperation under the ECOSOC Committee for Science, Technology and Development are a few prominent tracks. As of today, the WSIS process has absorbed various UN special bodies (the ITU, UNESCO, UNCTAD, UNDP are but a few), with the UNESCO instituting a &lt;a href="http://www.unesco.org/new/internetstudy"&gt;separate study&lt;/a&gt; on Internet-related issues. A proposal for a multilateral Committee on Internet-Related Policies remains &lt;a href="http://www.internetgovernance.org/2011/10/29/a-united-nations-committee-for-internet-related-policies-a-fair-assessment/"&gt;stillborn&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amongst these, the Internet Governance Forum (IGF) remains a strong contender for a truly multi-stakeholder process facilitating dialogue on IG. The IGF was set up following the recommendation of the Working Group of Internet Governance (WGIG), constituted after the Geneva phase of the WSIS.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;Rationale: Why Have National IG bodies?&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The issue of national multi-stakeholder cooperation/collaboration in IG is not new; it has been alive since the early 2000s. The &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt;, in paragraph 80, encourages the “&lt;i&gt;development of multi-stakeholder processes at the &lt;span&gt;national, regional and international levels&lt;/span&gt; to discuss and collaborate on the expansion and diffusion of the Internet as a means to support development efforts to achieve internationally agreed development goals and objectives, including the Millennium Development Goals&lt;/i&gt;” (emphasis supplied).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In its &lt;/span&gt;&lt;a href="http://www.wgig.org/docs/WGIGREPORT.pdf"&gt;June 2005 Report&lt;/a&gt;&lt;span&gt;, the Working Group on Internet Governance (WGIG) emphasizes that “&lt;/span&gt;&lt;i&gt;global Internet governance can only be effective if there is &lt;span&gt;coherence&lt;/span&gt; with &lt;span&gt;regional, subregional and national-level&lt;/span&gt; policies&lt;/i&gt;&lt;span&gt;”. Towards this end it recommends that “&lt;/span&gt;&lt;i&gt;coordination be established &lt;span&gt;among all stakeholders at the national level&lt;/span&gt; and &lt;span&gt;a multi-stakeholder national Internet governance steering committee or similar body&lt;/span&gt; be set up&lt;/i&gt;&lt;span&gt;” (emphasis supplied). The IGF, whose creation the WGIG recommended, has since been commended for its impact on the proliferation of national IGFs.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The rationale, then, was that multi-stakeholder steering committees at the national level would help to create a cohesive body to coordinate positions on Internet governance. In &lt;/span&gt;&lt;i&gt;Reforming Internet Governance&lt;/i&gt;&lt;span&gt;, WGIG member Waudo Siganga writes of the Internet Steering Committee of Brazil as a model, highlighting lessons that states (especially developing countries) may learn from CGI.br.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Brazilian Internet Steering Committee (CGI.br) was set up in 1995 and is responsible, &lt;/span&gt;&lt;i&gt;inter alia&lt;/i&gt;&lt;span&gt;, for the management of the .br domain, distribution of Internet addresses and administration of metropolitan Internet exchange points. CERT.br ensures network security and extends support to network administrators. Siganga &lt;/span&gt;&lt;a href="http://www.wgig.org/docs/book/Waudo-Siganga.html"&gt;writes&lt;/a&gt;&lt;span&gt; that CGI.br is a “&lt;/span&gt;&lt;i&gt;well-structured multistakeholder entity, having representation from government and democratically chosen representatives of the business sector, scientific and technological community and an Internet expert&lt;/i&gt;&lt;span&gt;”.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Why is CGI.br a model for other states? &lt;/span&gt;&lt;i&gt;First&lt;/i&gt;&lt;span&gt;, CGI.br exemplifies how countries can structure in an effective manner, a body that is involved in creating awareness about IG issues at the national level. Moreover, the multi-stakeholder nature of CGI.br shows how participation can be harnessed effectively to build capacity across domestic players. This also reflects the multi-stakeholder aspects of Internet governance at the global level, clarifying and implementing the WSIS standards (for instance). Especially in developing countries, where awareness and coordination for Internet governance is lacking at the national level, national IG committees can bridge the gap between awareness and participation. Such awareness can translate into local solutions for local issues, as well as contributing to an informed, cohesive stance at the global level.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Stakeholders: Populating a national IG body&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A national IG body – be in steering committee, IGF or other forum – should ideally involve all relevant stakeholders. As noted before, since inception, the Internet has not been subject to exclusive governmental regulation. The World Summit on Information Society recognized this, but negotiations amongst stakeholders resulted in the delegation of roles and responsibilities: the controversial and much-debated paragraph 35 of the &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt; reads:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;The private sector has had, and should continue to have, an important role in the development of the Internet, both in the technical and economic fields.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Civil society has also played an important role on Internet matters, especially at community level, and should continue to play such a role.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Intergovernmental organizations have had, and should continue to have, a facilitating role in the coordination of Internet-related public policy issues.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;International organizations have also had and should continue to have an important role in the development of Internet-related technical standards and relevant policies.&lt;/i&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This position remains endorsed by the WSIS process; the recent WSIS+10 High Level Event &lt;a href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;endorsed by acclamation&lt;/a&gt; the &lt;i&gt;WSIS+10 Vision for WSIS Beyond 2015&lt;/i&gt;, which “&lt;i&gt;respect mandates given by Tunis Agenda and respect for the multi-stakeholder principles&lt;/i&gt;”. In addition to government, the private sector and civil society, the technical community is identified as a distinct stakeholder group. Academia has also found a voice, as demonstrated by stakeholder-representation at NETmundial 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20framework%20for%20IG%20assessments%20-%20D%20Souter%20-%20final_0.pdf"&gt;study of the Internet Society&lt;/a&gt; (ISOC) on &lt;i&gt;Assessing National Internet Governance Arrangements&lt;/i&gt;, authored by David Souter, maps IG stakeholders at the global, regional and national levels. At the global level, primary stakeholders include ICANN (not-for-profit, private sector corporation involved in governance and technical coordination of the DNS), the IETF, IAB and W3C (technical standards), governments and civil society organizations, all of which participate with different levels of involvements at the IGF, ICANN, ITU, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the national/municipal level, the list of stakeholders is as comprehensive. &lt;strong&gt;Governmental stakeholders&lt;/strong&gt; include: (1) relevant Ministries (in India, these are the Ministry of Information and Broadcasting, and the Ministry of Communications and Information Technology – the Department of Electronics and Information Technology under the MCIT is particularly relevant), and (2) regulators, statutory and independent (the Telecom Regulatory Authority of India, for example). At the national level, these typically seek inputs from other stakeholders while making recommendations to governments, which then enact laws or make policy. In India, for instance, the &lt;a href="http://www.trai.gov.in/content/CONSULTATION/0_CONSULTATIONS.aspx"&gt;TRAI conducts consultations&lt;/a&gt; prior to making recommendations to the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within the &lt;strong&gt;private sector&lt;/strong&gt;, there may be companies (1) on the supply-side, such as infrastructure networks, telecommunications service companies, Internet Service Providers, search engines, social networks, cybercafés, etc., and (2) on the demand-side, online businesses, advertising/media, financial service providers, etc. who &lt;i&gt;use&lt;/i&gt; the Internet. There may also be &lt;strong&gt;national registries&lt;/strong&gt; managing ccTLDs, such as the Registro.br or the National Internet Exchange of India (NIXI). There may also the &lt;strong&gt;press and news corporations&lt;/strong&gt; representing both corporate and public interest under specific circumstances (media ownership and freedom of expression, for distinct examples).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Civil society organisations&lt;/strong&gt;, including consumer organisations, think-tanks and grassroots organisations, participate at various levels of policy-making in the formal institutional structure, and are crucial in representing users and public interest. The complexity of stakeholders may be seen from &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20framework%20for%20IG%20assessments%20-%20D%20Souter%20-%20final_0.pdf"&gt;Souter’s report&lt;/a&gt;, and this enumeration is but a superficial view of the national stakeholder-population.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Processes: Creating effective national IG bodies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;National IG bodies – be they steering committees, IGFs, consultative/working groups or other forums – may be limited by formal institutional governmental settings. While limited by the responsibility-gradient in paragraph 35 of the Tunis Agenda, an effective national IG body requires robust multi-stakeholder participation, as Souter notes, in technical governance, infrastructure and public policy issues. Its effectiveness also lies in governmental acquiescence of its expertise and recommendations; in short, in the translation of the IG body’s decisions into policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How do these stakeholders interact at the national level? In addition to the Brazilian example (CGI.br), an &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20study%20of%20IG%20in%20Kenya%20-%20D%20Souter%20%26%20M%20Kerretts-Makau%20-%20final.pdf"&gt;ISOC study&lt;/a&gt; by Souter and Monica Kerretts-Makau, &lt;i&gt;Internet Governance in Kenya: An Assessment&lt;/i&gt;, provides a detailed answer. At the &lt;strong&gt;technical level&lt;/strong&gt;, the registry KENIC manages the .ke domain, while the Kenya Computer Incident Response Team Coordination Centre coordinates national responses to incidents and collaborates internationally on cyber-security issues. A specific IPv6 Force to promote Kenya’s transition to IPv6 was also created.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the &lt;strong&gt;infrastructural level&lt;/strong&gt;, both the government and the private sector play important roles. Directly, ministries and government departments consult with infrastructure providers in creating policy. In India, for instance, the TRAI conducts multi-stakeholder consultations on issues such as telecom tariffs, colocation tariffs for submarine cable stations and mobile towers, etc. The government may also take a lead in creating infrastructure, such as the national optic fibre networks in &lt;a href="http://www.bbnl.nic.in/content/page/national-optical-fibre-networknofn.php"&gt;India&lt;/a&gt; and &lt;a href="https://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=11&amp;amp;ved=0CBsQFjAAOAo&amp;amp;url=http%3A%2F%2Fwww.kictanet.or.ke%2F%3Fp%3D1822&amp;amp;ei=avmeU_SaII6SuATi2ICoDA&amp;amp;usg=AFQjCNEgUIpb_kf2Fx-s7TJ2H-xl1rm9WA&amp;amp;sig2=HlpJp1UlVXRHTAOPh9W7Bg&amp;amp;bvm=bv.68911936,d.c2E&amp;amp;cad=rja"&gt;Kenya&lt;/a&gt;, as also creating investment opportunities such as liberalizing FDI. At the &lt;strong&gt;public policy level&lt;/strong&gt;, there may exist consultations initiated by government bodies (such as the TRAI or the Law Commission), in which other stakeholders participate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As one can see, government-initiated consultations by ministries, regulators, law commissions or specially constituted committees. Several countries have also set up national IGFs, which typically involve all major stakeholders in voluntary participation, and form a discussion forum for existing and emerging IG issues. National IGFs &lt;a href="http://www.internetgovernance.org/2009/08/28/another-mini-internet-governance-forum-in-the-u-s-a/"&gt;have been considered&lt;/a&gt; particularly useful to create awareness within the country, and may best address IG issues at the domestic policy level. However, Prof. Mueller &lt;a href="http://www.internetgovernance.org/2008/01/18/the-igf-and-networked-internet-governance/"&gt;writes&lt;/a&gt; that what is necessary is a “&lt;i&gt;reliable mechanism reliable mechanisms for consistently feeding the preferences expressed in these forums to actual global policy-making institutions like ICANN, RIRs, WIPO, and WTO which impact distributional outcomes&lt;/i&gt;”.&lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1"&gt;[1]&lt;/a&gt; M. Mueller, Ruling the Root: Internet Governance and the Taming of Cyberspace 57 (2002).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how'&gt;https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>National IGFs</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    

   <dc:date>2014-06-16T14:27:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act">
    <title>A Review of the Functioning of the Cyber Appellate Tribunal and Adjudicatory Officers under the IT Act</title>
    <link>https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act</link>
    <description>
        &lt;b&gt;Tribunals and quasi-judicial bodies are a regular feature of the Indian judicial system, as they provide for easier and less onerous methods for dispute resolution, especially disputes which relate to technical areas and often require technical knowledge and familiarity with specialised factual scenarios.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Further, quasi-judicial bodies do not have the same procedural restrictions as proper courts, which makes the adjudication of disputes easier. The Information Technology Act of India, which regulates several important aspects of electronic information, including the regulation of private electronic transactions as well as detailing civil and criminal offences relating to computers and electronic information, contemplates a specialised dispute resolution mechanism for disputes relating to the offences detailed under the Act. The Act provides for the establishment of quasi-judicial bodies, namely adjudicating officers under S.46, to hear disputes arising out of Chapter IX of the Act, namely, offences of a civil nature under S.43, 43A, 44 and 45 of the Act, as well as criminal offences described under Chapter XI of the Act. The adjudicating officer has the power to both award compensation as damages in a civil remedy, as well as impose penalties for the contravention of the Act,&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; and therefore has powers of both civil and criminal courts. The first appellate body provided in the Act, i.e. the authority that any party not satisfied by the decision of the adjudicating officer can appeal to, is the Cyber Appellate Tribunal, consisting of a Chairperson and any other members so prescribed by the Central Government.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;The second appeal, if a party is aggrieved by the decision of the Cyber Appellate Tribunal, may be filed before the High Court having jurisdiction, within 60 days from the date of communication of the order.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Functioning of the Offices of the State Adjudicating Officers and the Cyber Appellate Tribunal&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The office of the adjudicating officer is established under S.46 of the IT Act, which provides that the person appointed to such a post must be a government officer of a rank not below that of a Director or an equivalent rank, and must have experience both in the field of Information Technology as well as legal or judicial experience.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In most cases, the appointed adjudicating officer is the Principle Secretary to the Department of Information Technology in the state.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; The decisions of these adjudicating officers determine the scope and meaning of several provisions of the IT Act, and are instrumental in the development of the law in this field and filling a lacuna regarding the interpretation of these important provisions, particularly in areas such as data protection and privacy.&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;However, despite the large number of cyber-crime cases being registered across the country,&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;there is a lack of available judgements on the adjudication of disputes under Sections 43, 43A, 44 and 45 of the Act. Of all the states, only the websites of the Departments of Information Technology in Maharashtra,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;, Tamil Nadu&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;, New Delhi&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;, and Haryana&lt;a href="#fn11" name="fr11"&gt;[11] &lt;/a&gt;have reported judgements or orders of the Adjudicating Officers.  The adjudicating officer in Maharasthra, Rajesh Aggarwal, has done a particularly commendable job, having disposed of 51 cases under the IT Act, with 20 cases still pending.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first Cyber Appellate Tribunal set up by the Central Government is located at New Delhi. Although a second branch of the Tribunal was to be set up in Bangalore, no efforts seem to have been made in this regard.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; Further, the position of the Chairperson of the Appellate Tribunal, has been left vacant since 2011, after the appointed Chairperson attained the age of superannuation and retired. Although judicial and technical members have been appointed at various points, the tribunal cannot hold hearings without a chairperson. A total of 17 judgements have been passed by the Cyber Appellate Tribunal prior to the retirement of the chairperson, while the backlog of cases is continuously growing.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;Despite a writ petition being filed before the Karnataka High Court and the secretary of the Department of IT coming on record to state that the Chairperson would be appointed within 6 months (of September 2013), no action seems to have been taken in this regard, and the lacunae in the judicial mechanism under the IT Act continues. The proper functioning of adjudicating officers and the Cyber Appellate Tribunal is particularly necessary for the functioning of a just judicial system in light of the provisions of the Act (namely, Section 61) which bar the jurisdiction of ordinary civil courts in claims below the amount of Rs. 5 Crores, where the adjudicating officer or the CAT is empowered.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Analysis of Cases Filed under Section 43A&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 43A of the Information Technology Act was inserted by the 2008 Amendment, and is the principle provision governing protection of information held by intermediaries under the Act. Section 43A provides that “body corporates” handling “sensitive personal data” must implement reasonable security practices for the protection of this information. If it is negligent in providing or maintaining such reasonable security practices, the body corporate is to be held liable and must pay compensation for the loss occurred.&lt;a href="#fn15" name="fr15"&gt;[15] &lt;/a&gt;Rule 3 of the Draft Reasonable Security Practices Rules, defines sensitive personal data as including – passwords, user details as provided at the time of registration or thereafter, information related to financial information such as Bank account/ credit card /debit card /other payment instrument details of the users, physiological and mental health conditions, medical records and history, biometric information, information received by body corporate for processing, stored or processed under lawful contract or otherwise and call data records.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All the decisions of appointed adjudicators are available for an analysis of Section 43A are from the adjudicating officer in Maharashtra, Mr. Rajesh Tandon, who despite having no judicial experience, has very cogent analysis and knowledge of legal issues involved in the cases, which is commendable for a quasi-judicial officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One class of cases, constituting a major chunk of the claims, is where the complainant is claiming against a bank for the fraudulent transfer of funds from the claimants account to another account. In most of these cases, the adjudicating officer examined the compliance of the bank with “Know Your Customer” norms and guidelines framed by the Reserve Bank of India for prevention of banking fraud and, where such compliance was found to be lacking and information which allowed the bank accounts of the complainant was allowed to be accessed by fraudsters, the presumption is that the bank was negligent in the handling of “sensitive personal information”,&lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;by failing to provide for reasonable security practices and consequently was liable for compensation under S.43A, &lt;i&gt;notwithstanding &lt;/i&gt;that the complainant also contributed to compromising certain personal information by responding to phishing mails,&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; or divulging information to other third parties.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;These instances clearly fall within the scope of Section 43A, which protects “information related to financial information such as Bank account/ credit card /debit card /other payment instrument details of the users” as sensitive personal data from negligent handling by body corporates. The decisions of the adjudicating officer must be applauded for placing a higher duty of care on banks to protect informational privacy of its customers, given that they are in a position where they ought to be well equipped to deal with intimate financial information and holding them accountable for lack of proper mechanisms to counter bank fraud using stolen information, which reflects in the compensation which the banks have been liable to pay, not only as indemnification for losses, but also punitive damages.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Nirmalkumar Bhagerwal v IDBI Bank and Meenal Bhagerwal, &lt;/i&gt;the sensitive financial information of the complainant, namely, the bank statement, had been accessed by the complainants wife. In holding the bank to be liable for divulging the same, and that access to personal information by a spouse is also covered under S.43A, the officer seems to have imputed the loss of privacy on account of such negligence as ‘wrongful loss’ which deserves compensation. One anomalous decision of the officer was where the operator of an ATM was held liable for fraudulent credit card transactions in that Machine, due to “reasonable security practices” such as security personnel or CCTV footage, and therefore causing the loss of “sensitive personal data”. However, it is difficult to see how ATM operators can be held liable for failing to protect sensitive information from being divulged, when the case is simply of a person fraudulently using a credit card.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another class of cases, generally linked with the above cases, is complaints against cell phone providers for divulging information through falsely procured Sim Cards. In such instances, the officer has held that by negligently allowing the issuance of duplicate sim cards, the phone company has &lt;i&gt;led to the access of sensitive personal data and thus caused wrongful loss to the complainant.&lt;/i&gt; This interpretation of Section 43A is somewhat confusing. The officer seems to have interpreted the provisions of Section 43A to include &lt;i&gt;carriers&lt;/i&gt; of the information which was originally sent through the computer resource of the banking companies. In this way, they are imputed the status of “handlers” of sensitive personal information, and their communications infrastructure through which the information is sent is the “computer resource” which it operates for the purpose of the Act. Therefore, through their negligence, they are &lt;i&gt;abetting &lt;/i&gt;the offence under 43A.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, in the case of &lt;i&gt;Sanjay Govind Dhandhe v ICICI and Vodafone, &lt;/i&gt;the officer remarked that –“&lt;i&gt;A SIM card is a veritable key to person’s sensitive financial and personal information. Realizing this, there are clear guidelines issued by the DOT regarding the issuance of SIM cards. The IT Act also intends to ensure that electronic personal and sensitive data is kept secured and reasonable measures are used to maintain its confidentiality and integrity. It is extremely crucial that Telecom companies actively follow strict security procedures while issuing SIM cards, especially in wake of the fact that mobiles are being increasingly used to undertake financial transactions. In many a case brought before me, financial frauds have been committed by fraudsters using the registered mobile numbers of the banks’ account holders.&lt;/i&gt;” Therefore, intermediaries such as telecom companies, which peripherally handle the data, are also liable under the same standards for ensuring its privacy. The adjudicating officer has also held telephone companies liable for itemized phone bills as Call Data Records negligently divulged by them, which again clearly falls under the scope of the Reasonable Security Practices Rules.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Note:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"&lt;i&gt;Credentek v Insolutions (&lt;a href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_Credentek_Vs_Insolutions-28012014.pdf" target="_blank"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_Credentek_Vs_Insolutions-28012014.pdf&lt;/a&gt;) . This case&lt;/i&gt; holds  that banks and the National Payments Corporation of India were liable  under S. 43A for divulging information relating to transactions by their  customers to a software company which provides services to these banks  using the data, without first making them sign non-disclosure  agreements. The NCPI was fined a nominal amount of Rs. 10,000."&lt;/p&gt;
&lt;div&gt;
&lt;div class="h5"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Section 46, Information Technology Act, 2000.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Section 48 and 49 of the Information Technology Act, 2000 (Amended as of 2008).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Section 62, IT Act. However, The High Court may extend this period if there was sufficient cause for the delay.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. S. 46(3), Information Technology Act, &lt;i&gt;“No person shall be appointed as an adjudicating officer unless he possesses such experience in the field of Information Technology and Legal or Judicial experience as may be prescribed by the Central Government.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. From whatever data is available, the adjudicating officers in the states of Maharashtra, New Delhi, Haryana, Tamil Nadu and Karnataka are all secretaries to the respective state departments relating to IT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;See http://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra&lt;/i&gt;; Also &lt;i&gt;see &lt;/i&gt;the decision of the Karnataka adjudicating officer which held that body corporates are not persons under S.43 of the IT Act, and thus cannot be liable for compensation or even criminal action for offences under that Section, &lt;i&gt;available at&lt;/i&gt; &lt;a class="external-link" href="http://www.naavi.org/cl_editorial_13/adjudication_gpl_mnv.pdf"&gt;http://www.naavi.org/cl_editorial_13/adjudication_gpl_mnv.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;i&gt;Maharashtra Leads in War Against Cyber Crime&lt;/i&gt;, The Times of India, &lt;i&gt;available at &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/mumbai/Maharashtra-leads-in-war-against-cyber-crime/articleshow/30579310.cms"&gt;http://timesofindia.indiatimes.com/city/mumbai/Maharashtra-leads-in-war-against-cyber-crime/articleshow/30579310.cms&lt;/a&gt;. &lt;/i&gt;(18&lt;sup&gt;th&lt;/sup&gt; February, 2014).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. &lt;a class="external-link" href="https://it.maharashtra.gov.in/1089/IT-Act-Judgements"&gt;https://it.maharashtra.gov.in/1089/IT-Act-Judgements&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;a class="external-link" href="http://www.tn.gov.in/documents/atoz/J"&gt;http://www.tn.gov.in/documents/atoz/J&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. &lt;a class="external-link" href="http://www.delhi.gov.in/wps/wcm/connect/DoIT_IT/doit_it/it+home/orders+of+adjudicating+officer"&gt;http://www.delhi.gov.in/wps/wcm/connect/DoIT_IT/doit_it/it+home/orders+of+adjudicating+officer&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. &lt;a class="external-link" href="http://haryanait.gov.in/cyber.htm"&gt;http://haryanait.gov.in/cyber.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. &lt;i&gt;Bangalore Likely to host southern chapter of Cyber Appellate Tribunal, &lt;/i&gt;The Hinduk &lt;a class="external-link" href="http://www.thehindu.com/news/national/karnataka/bangalore-is-likely-to-host-southern-chapter-of-cyber-appellate-tribunal/article3381091.ece"&gt;http://www.thehindu.com/news/national/karnataka/bangalore-is-likely-to-host-southern-chapter-of-cyber-appellate-tribunal/article3381091.ece&lt;/a&gt; (2&lt;sup&gt;nd&lt;/sup&gt; May, 2013).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. &lt;a class="external-link" href="http://catindia.gov.in/Judgement.aspx"&gt;http://catindia.gov.in/Judgement.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Section 61 of the IT Act – ‘No court shall have jurisdiction to entertain any suit or proceeding in respect of any matter which an adjudicating officer appointed under this Act or the Cyber Appellate Tribunal constituted under this Act is empowered by or under this Act to determine and no injunction shall be granted by any court or other authority in respect of any action taken or to be taken in pursuance of any power conferred by or under this Act. Provided that the court may exercise jurisdiction in cases where the claim for injury or damage suffered by any person exceeds the maximum amount which can be awarded under this Chapter.&lt;i&gt;’&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Section 43A, Information Technology Act, 2000&lt;i&gt; – ‘&lt;/i&gt;Compensation for failure to protect data (Inserted vide ITAA 2006) Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected. (Change vide ITAA 2008)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Explanation: For the purposes of this section (i) "body corporate" means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities (ii) "reasonable security practices and procedures" means security practices and procedures designed to protect such information from unauthorized access, damage, use, modification, disclosure or impairment, as may be specified in an agreement between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit. (iii) "sensitive personal data or information" means such personal information as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Draft Reasonable Security Practices Rules under Section 43A of the IT Act, available at &lt;a class="external-link" href="http://www.huntonfiles.com/files/webupload/PrivacyLaw_Reasonable_Security_Practices_Sensitive_Personal_Information.pdf"&gt;http://www.huntonfiles.com/files/webupload/PrivacyLaw_Reasonable_Security_Practices_Sensitive_Personal_Information.pdf&lt;/a&gt;&lt;i&gt;. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. &lt;i&gt;Ravindra Gunale v Bank of Maharashtra,&lt;/i&gt; &lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RavindraGunale_Vs_BoM&amp;amp;amp;Vodafone_20022013.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RavindraGunale_Vs_BoM&amp;amp;Vodafone_20022013.PDF&lt;/a&gt;. &lt;i&gt;Ram Techno Pack v State Bank of India&lt;/i&gt;, &lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RamTechno_Vs_SBI-22022013.pdf"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RamTechno_Vs_SBI-22022013.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Srinivas Signs v IDBI, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_SreenivasSigns_Vs_IDBI-18022014.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_SreenivasSigns_Vs_IDBI-18022014.PDF&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Raju Dada Raut v ICICI Bank, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RajuDadaRaut_Vs_ICICIBank-13022013.pdf"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RajuDadaRaut_Vs_ICICIBank-13022013.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Pravin Parkhi v SBI Cards, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_PravinParkhi_Vs_SBICardsPayment-30122013.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_PravinParkhi_Vs_SBICardsPayment-30122013.PDF&lt;/a&gt;&lt;i&gt;. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. &lt;i&gt;Sourabh Jain v ICICI, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_SourabhJain_Vs_ICICI&amp;amp;amp;Idea-22022013.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_SourabhJain_Vs_ICICI&amp;amp;Idea-22022013.PDF&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. &lt;i&gt;Poona Automobiles v Punjab National Bank,&lt;/i&gt; &lt;a class="external-link" href="https://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_PoonaAuto_Vs_PNB-22022013.PDF"&gt;https://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_PoonaAuto_Vs_PNB-22022013.PDF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. &lt;i&gt;Amit Patwardhan v Bank of Baroda, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudicaton_AmitPatwardhan_Vs_BankOfBaroda-30122013.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudicaton_AmitPatwardhan_Vs_BankOfBaroda-30122013.PDF&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. &lt;i&gt;Ravindra Gunale v Bank of Maharashtra,&lt;/i&gt; &lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RavindraGunale_Vs_BoM&amp;amp;amp;Vodafone_20022013"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RavindraGunale_Vs_BoM&amp;amp;Vodafone_20022013&lt;/a&gt;; &lt;i&gt;Raju Dada Raut v ICICI Bank, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RajuDadaRaut_Vs_ICICIBank-13022013.pdf"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RajuDadaRaut_Vs_ICICIBank-13022013.pdf&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. &lt;i&gt;Rohit Maheshwari v Vodafone, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RohitMaheshwari_Vs_Vodafone&amp;amp;amp;ors-04022014.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RohitMaheshwari_Vs_Vodafone&amp;amp;ors-04022014.PDF&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act'&gt;https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-03T05:43:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/content-removal-on-facebook">
    <title>Content Removal on Facebook — A Case of Privatised Censorship?</title>
    <link>https://cis-india.org/internet-governance/blog/content-removal-on-facebook</link>
    <description>
        &lt;b&gt;Any activity on Facebook, be it creating an account, posting a picture or status update or creating a group or page, is bound by Facebook’s Terms of Service and Community Guidelines. These contain a list of content that is prohibited from being published on Facebook which ranges from hate speech to pornography to violation of privacy. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Facebook removes content largely on the basis of requests either by the government or by other users. The &lt;a href="https://www.facebook.com/help/365194763546571/"&gt;Help section&lt;/a&gt; of Facebook deals with warnings and blocking of content. It says that Facebook only removes content that violates Community Guidelines and not everything that has been reported.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I conducted an experiment to primarily look at Facebook’s process of content removal and also to analyse what kind of content they actually remove.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;I put up a status which contained personal information of a person on my Friend List (the information was false). I then asked several people (including the person about whom the status was made) to report the status — that of  being harassed  or for violation of  privacy rights. Seven people reported the status. Within half an hour of the reports being made, I received the following notification:&lt;br /&gt;"Someone reported your &lt;a href="https://www.facebook.com/sugarquill/posts/10152265929599232" target="_blank"&gt;post&lt;/a&gt; for containing harassment and &lt;a href="https://www.facebook.com/settings?tab=support&amp;amp;item_id=10152265934819232&amp;amp;notif_t=content_reported"&gt;1 other reason&lt;/a&gt;."&lt;br /&gt;&lt;br /&gt;The notification also contained the option to delete my post and said that Facebook would look into whether it violated their Community Guidelines.&lt;br /&gt;&lt;br /&gt;A day later, all those who had reported the status received notifications stating the following:&lt;br /&gt;&lt;br /&gt;"We reviewed the post you reported for harassment and found it doesn't violate our &lt;a href="https://www.facebook.com/communitystandards" target="_blank"&gt;Community Standards&lt;/a&gt;." &lt;br /&gt;&lt;br /&gt;I received a similar notification as well.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;I, along with around thirteen others, reported a Facebook page which contained pictures of my friend and a few other women with lewd captions in various regional languages. We reported the group for harassment and bullying and also for humiliating someone we knew. The report was made on 24 March, 2014. On 30 April, 2014, I received a notification stating the following:&lt;br /&gt;&lt;br /&gt;"We reviewed the page you reported for harassment and found it doesn't violate our &lt;a href="https://www.facebook.com/communitystandards" target="_blank"&gt;Community Standards&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Note: If you have an issue with something on the Page, make sure you report the content (e.g. a photo), not the entire Page. That way, your report will be more accurately reviewed."&lt;br /&gt;&lt;br /&gt;I then reported each picture on the page for harassment and received a series of notifications on 5 May, 2014 which stated the following:&lt;br /&gt;&lt;br /&gt;"We reviewed the photo you reported for harassment and found it doesn't violate our &lt;a href="https://www.facebook.com/communitystandards" target="_blank"&gt;Community Standards&lt;/a&gt;."&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;These incidents are in stark contrast with repeated attempts by Facebook to remove content which it finds objectionable. In 2013, a homosexual man’s picture protesting against the Supreme Court judgment in December was &lt;a href="http://www.ndtv.com/article/india/heated-debate-after-facebook-allegedly-deletes-photograph-of-gay-sikh-kissing-a-man-460219"&gt;taken down&lt;/a&gt;. In 2012, Facebook &lt;a href="http://www.blouinartinfo.com/news/story/816583/facebook-censors-pompidous-gerhard-richter-nude-fueling-fight"&gt;removed artwork&lt;/a&gt; by a French artist which featured a nude woman.  In the same year, Facebook &lt;a href="http://www.dailymail.co.uk/news/article-2146588/Heather-Patrick-Walker-Facebook-ban-pictures-baby-son-died.html"&gt;removed photographs&lt;/a&gt; of a child who was born with defect and banned the mother from accessing Facebook completely. Facebook also &lt;a href="http://www.huffingtonpost.com/2013/02/20/facebook-breast-cancer-tattoo-photo-double-mastectomy_n_2726118.html"&gt;removed a picture&lt;/a&gt; of a breast cancer survivor who posted a picture of a tattoo that she had following her mastectomy. Following this, however, Facebook issued an apology and stated that mastectomy photographs are not in violation of their Content Guidelines. Even in the sphere of political discourse and dissent, Facebook has cowered under government pressure and removed pages and content, as evidenced by the &lt;a href="http://www.firstpost.com/living/facebook-bows-to-pak-pressure-bans-rock-band-laal-anti-taliban-groups-1560009.html"&gt;ban&lt;/a&gt; on the progressive Pakistani band Laal’s Facebook page and other anti-Taliban pages. Following much social media outrage, Facebook soon &lt;a href="http://www.dawn.com/news/1111174/laals-facebook-page-now-accessible-to-pak-based-internet-users"&gt;revoked&lt;/a&gt; this ban. These are just a few examples of how harmless content has been taken down by Facebook, in a biased exercise of its powers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After incidents of content removal have been made public through news reports and complaints, Facebook often apologises for removing content and issues statements that the removal was an “error.” In some cases, they edit their policies to address specific kinds of content after a takedown (like the &lt;a href="http://www.guardian.co.uk/media/2008/dec/30/facebook-breastfeeding-ban"&gt;reversal of the breastfeeding ban&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, however, Facebook is notorious for refusing to take down content that is actually objectionable, partially evidenced by my own experiences listed above. There have been complaints about Facebook’s &lt;a href="http://www.theguardian.com/lifeandstyle/2013/feb/19/facebook-images-rape-domestic-violence"&gt;refusal to remove&lt;/a&gt; misogynistic content which glorifies rape and domestic violence through a series of violent images and jokes. One such page was removed finally, not because of the content but because the administrators had used fake profiles. When asked, a spokesperson said that censorship “was not the solution to bad online behaviour or offensive beliefs.” While this may be true, the question that needs answering is why Facebook decides to draw these lines only when it comes to certain kinds of ‘objectionable’ content and not others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All of these examples represent a certain kind of arbitrariness on the part of Facebook’s censorship policies. It seems that Facebook is far more concerned with removing content that will cause supposed public or governmental outrage or defy some internal morality code, rather than protecting the rights of those who may be harmed due to such content, as their Statement of Policies so clearly spells out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are many aspects of the review and takedown process that are hazy, like who exactly reviews the content that is reported and what standards they are made to employ. In 2012, it was revealed that Facebook &lt;a href="http://gawker.com/5885714/inside-facebooks-outsourced-anti-porn-and-gore-brigade-where-camel-toes-are-more-offensive-than-crushed-heads"&gt;outsourced&lt;/a&gt; its content reviews to oDesk and provided the reviewers with a 17-page manual which listed what kind of content was appropriate and what was not. A bare reading of the leaked document gives one a sense of Facebook’s aversion to sex and nudity and its neglect of other harm-inducing content like harassment through misuse of content that is posted and what is categorised as hate speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the process of monitoring the acceptability of content, Facebook takes upon itself the role of a private censor with absolutely no accountability or transparency in its working. A &lt;a href="https://fbcdn-dragon-a.akamaihd.net/hphotos-ak-xpa1/t39.2178-6/851563_293317947467769_1320502878_n.png"&gt;Reporting Guide&lt;/a&gt; was published to increase transparency in its content review procedures. The Guide reveals that Facebook provides for an option where the reportee can appeal the decision to remove content in “some cases.” However, the lack of clarity on what these cases are or what the appeal process is frustrates the existence of this provision as it can be misused. Additionally, Facebook reserves the right to remove content with or without notice depending upon the severity of the violation. There is no mention of how severe is severe enough to warrant uninformed content removal. In most of the above cases, the user was not notified that their content was found offensive and would be liable for takedown. Although Facebook publishes a transparency report, it only contains a record of takedowns following government requests and not those by private users of Facebook. The unbridled nature of the power that Facebook has over our personal content, despite clearly stating that all content posted is the user’s alone, threatens the freedom of expression on the site. A proper implementation of the policies that Facebook claims to employ is required along with a systematic record of the procedure that is used to remove content that is in consonance with natural justice.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/content-removal-on-facebook'&gt;https://cis-india.org/internet-governance/blog/content-removal-on-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jessie</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-16T05:23:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-comments-supporting-the-dns-industry-in-underserved-regions">
    <title>Comments to ICANN Supporting the DNS Industry in Underserved Regions  </title>
    <link>https://cis-india.org/internet-governance/blog/cis-comments-supporting-the-dns-industry-in-underserved-regions</link>
    <description>
        &lt;b&gt;Towards exploring ideas and strategies to help promote the domain name industry in regions that have typically been underserved, ICANN published a call for public comments on May 14, 2014. In particular, ICANN sought comments related to existing barriers to Registrar Accreditation and operation and suggestions on how these challenges might be mitigated. CIS contributed to the comments on this report, which will be used to determine next steps to support the domain name industry in underserved regions.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Domain names and the DNS are used in virtually every aspect of the Internet, and without the DNS, the Internet as we know it, would not exist. The DNS root zone has economic value and  ICANN's contract with Verisign delineates the selling of domain names via only ICANN accredited registrars. By the indirect virtue of its control of the root, ICANN has the power and capacity to influence the decisions of entities involved in the management and operations of the DNS, including registrars.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Too far, too many?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We acknowledge some of the efforts for improvements, in particular with reference to barriers to participation in DNS-related business in regions such as Africa and the Middle East, including the creation of a fellowship program, and increased availability of translated materials. However, despite these efforts, the gaps in the distribution of the DNS registrars and registries across the world has become an issue of heightened concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is particularly true, in light of the distribution of registrars and given that, of the 1124 ICANN-accredited registrars, North America has a total of 765 registrars. US and Canada together, have more than double the number of registrars than the rest of the world taken collectively. To put things further into perspective, of the total number of registrars 725 are from the United States alone, and 7 from the 54 countries of Africa.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A barrier to ICANN's capacity building initiatives has been the lack of trust, given the general view that, ICANN focuses on policies that favour entrenched incumbents from richer countries. Without adequate representation from poorer countries, and adequate representation from the rest of the world's Internet population, there is no hope of changing these policies or establishing trust. The entire region of Latin America and the Caribbean, comprising of a population of 542.4 million internet users&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftn1"&gt;[1]&lt;/a&gt; in 2012, has only 22 registrars spread across a total of 10 countries. In Europe, covering a population of 518.5 million internet users&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftn2"&gt;[2]&lt;/a&gt;, are 158 registrars and 94 of those are spread across Germany, UK, France, Spain and Netherlands. The figures paint the most dismal picture with respect to South Asia, in particular India, where just 16 registrars cater to the population of internet users that is expected to reach 243 million by June 2014&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftn3"&gt;[3]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While we welcome ICANN's research and outreach initiatives with regard to the DNS ecosystem in underserved regions, without the crucial first step of clarifying the metrics that constitute an underserved region, these efforts might not bear their intended impact. ICANN cannot hope to identify strategies towards bridging the gaps that exist in the DNS  ecosystem, without going beyond the current ICANN community, which, while nominally being 'multistakeholder' and open to all, grossly under-represents those parts of the world that aren't North America and Western Europe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of registries in the developing world is another significant issue that needs to be highlighted and addressed. The top 5 gTLD registries are in the USA and it is important that users and the community feels that the fees being collected are equivalent compensation for the services they provide. As registries operate in captive markets that is allocated by ICANN, we invite ICANN to improve its financial accountability, by enabling its stakeholders to assess the finances collected on these registrations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Multistakeholderism—community and consensus &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As an organization that holds itself a champion of the bottom-up policy development process, and, as a private corporation fulfilling a public interest function, ICANN, is in a unique position to establish new norms of managing common resources. In theory and under ICANN’s extensive governance rules, the board is a legislative body that is only supposed to approve the consensus decisions of the community and the staff wield executive control. However in reality, both board and the staff have been criticised for decisions that are not backed by the community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The formal negotiations between ICANN and Registrar Stakeholder Group Negotiating Team (Registrar NT) over the new Registrar Accreditation Agreement (RAA), is an example of processes that have a multistakeholder approach but fail on values of deliberation and pluralistic decision making.&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftn4"&gt;[4]&lt;/a&gt; ICANN staff insisted on including a "proposed Revocation (or "blow up") Clause that would have given them the ability to unilaterally terminate all registrar accreditations" and another proposal seeking to provide ICANN Board ability to unilaterally amend the RAA (identical to proposal inserted in the gTLD registry agreement - a clause met with strong opposition not only from the Registry Stakeholder Group but from the broader ICANN community).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both proposals undermine the multistakeholder approach of the ICANN governance framework, as they seek more authority for the Board, rather than the community or protections for registrars and more importantly, registrants. The proposed amendments to the RAA were not issues raised by Law Enforcement, GAC or the GNSO but by the ICANN staff and received considerable pushback from the Registrar Stakeholder Group Negotiating Team (Registrar NT). The bottom-up policy making process at ICANN has also been questioned with reference to the ruling on vertical integration between registries and registrars, where the community could not even approach consensus.&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftn5"&gt;[5]&lt;/a&gt; Concerns have also been raised about the extent of the power granted to special advisory bodies handpicked by the ICANN president, the inadequacy of existing accountability mechanisms for providing a meaningful and external check on Board decisions and the lack of representation of underserved regions on these special bodies. ICANN must evolve its accountability mechanisms, to go beyond the opportunity to provide comments on proposed policy, and extend to a role for stakeholders in decision making, which is presently a privilege reserved for staff rather than bottom-up consensus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN was created as a consensus based organisation that would enable the Internet, its stakeholders and beneficiaries to move forward in the most streamlined, cohesive manner.&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftn6"&gt;[6]&lt;/a&gt; Through its management of the DNS, ICANN is undertaking public governance duties, and it is crucial that it upholds the democratic values entrenched in the multistakeholder framework. Bottom up policy making extends beyond passive participation and has an impact on the direction of the policy. Presently, while anyone can comment on policy issues, only a few have a say in which comments are integrated towards outcomes and action. We would like to stress not just improving and introducing checks and balances within the ICANN ecosystem, but also, integrating accountability and transparency practices at all levels of decision making.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bridging the gap&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We welcome the Africa Strategy working group and the public community process that was initiated by ICANN towards building domain name business industry in Africa, and, we are sure there will be lessons that will applicable to many other underserved regions. In the context of this report CIS, wants to examine the existing criteria of the accreditation process. As ICANN's role evolves and its revenues grow across the DNS and the larger Internet landscape, it is important in our view, that ICANN review and evolve it's processes for accreditation and see if they are as relevant today, as they were when launched.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The relationship between ICANN and every accredited registrar is governed by the individual RAA, which set out the obligations of both parties, and, we recommend simplifying and improving them. The RAA language is complex, technical and not relevant to all regions and presently, there are no online forms for the accreditation process. While ICANN's language will be English, the present framing has an American bias—we recommend—creating an online application process and simplifying the language keeping it contextual to the region. It would also be helpful, if ICANN invested in introducing some amount of standardization across forms, this would reduce the barrier of time and effort it takes to go through complex legal documents and contribute to the growth of DNS business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The existing accreditation process for registrars requires applicants to procure US$70,000 or more for the ICANN accreditation to become effective. The applicants are also required to obtain and maintain for the length of accreditation process, a commercial general liability insurance with a policy limit of US$500,000 or more. The working capital and the insurance are quite high and create a barrier to entrance of underserved regions in the DNS ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With lack of appropriate mechanisms registrars resort to using US companies for insurance, creating more foreign currency pressures on themselves. The commercial general liability insurance requirement for the registrars is not limited to their functioning as a registrar perhaps not the most appropriate option. &lt;span&gt;ICANN should, and must, increase efforts towards helping registrars find suitable insurance providers and scaling down the working capital. Solutions may lie in exploring variable fee structures adjusted against profits, and derived after considering factors such as cost of managing domain names and sub-domain names, expansion needs, ICANN obligations and services, financial capacities of LDCs and financial help pledged to disadvantaged groups or countries.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Presently, the start-up capital required is too high for developing countries, and this is reflected in the number of registries in these areas. Any efforts to improve the DNS ecosystem in underserved regions, must tackle this by scaling down the capital in proportion to the requirements of the region.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another potential issue that ICANN should consider, is that users getting sub-domain names from local registrars located in their own country, are usually taxed on the transaction, however, online registration through US registrars spares users from paying taxes in their country.&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftn7"&gt;[7]&lt;/a&gt; This could create a reverse incentive for registering domain sub-names online from US registrars. ICANN should push forward on efforts to ensure that registrars are sustainable by providing incentives for registering in underserved regions and help towards maintain critical mass of the registrants. The Business Constituency (BC)—the voice of commercial Internet users within ICANN, could play a role in this and ICANN should endeavour to either, expand the BC function or create a separate constituency for the representation of  underserved regions.&lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftnref1"&gt;[1]&lt;/a&gt; Internet Users and Population stats 2012. http://www.internetworldstats.com/stats2.htm&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftnref2"&gt;[2]&lt;/a&gt; Internet Users and Population stats 2012. http://www.internetworldstats.com/stats4.htm&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftnref3"&gt;[3]&lt;/a&gt; Times of India IAMAI Report. http://timesofindia.indiatimes.com/tech/tech-news/India-to-have-243-million-internet-users-by-June-2014-IAMAI/articleshow/29563698.cms&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftnref4"&gt;[4]&lt;/a&gt; Mar/07/2013 - Registrar Stakeholder Group Negotiating Team (Registrar NT) Statement Regarding ICANN RAA Negotiations.http://www.icannregistrars.org/calendar/announcements.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftnref5"&gt;[5]&lt;/a&gt; Kevin Murphy, Who runs the internet? An ICANN 49 primer. http://domainincite.com/16177-who-runs-the-internet-an-icann-49-primer&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftnref6"&gt;[6]&lt;/a&gt; Stephen Ryan, Governing Cyberspace: ICANN, a Controversial Internet Standards Body http://www.fed-soc.org/publications/detail/governing-cyberspace-icann-a-controversial-internet-standards-body&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftnref7"&gt;[7]&lt;/a&gt; Open Root-Financing LDCs in the WSIS process. See: http://www.open-root.eu/about-open-root/news/financing-ldcs-in-the-wsis-process&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-comments-supporting-the-dns-industry-in-underserved-regions'&gt;https://cis-india.org/internet-governance/blog/cis-comments-supporting-the-dns-industry-in-underserved-regions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IG4all</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    

   <dc:date>2014-07-04T06:48:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-june-11-2014-sunita-sekhar-stay-connected-even-when-you-go-underground">
    <title>Stay connected even when you go underground</title>
    <link>https://cis-india.org/news/the-hindu-june-11-2014-sunita-sekhar-stay-connected-even-when-you-go-underground</link>
    <description>
        &lt;b&gt;CMRL may soon start making arrangements to ensure good mobile connectivity on the underground stretch.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The &lt;a class="external-link" href="http://www.thehindu.com/news/cities/chennai/chen-infra/stay-connected-even-when-you-go-underground/article6105262.ece"&gt;article by Sunita Sekhar was published in the Hindu&lt;/a&gt; on June 12, 2014. Nishant Shah gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;A really erratic mobile network connection is something  all of us have probably experienced, while on the move, every now and  then.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;If your mobile phone signal can fail you on the road, have you thought what it will be like when you ride underground?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Perhaps  it is time to put that thought into your head. Not very many years from  now, it is likely you will be riding the Chennai Metro underground.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Folks at Chennai Metro Rail Ltd. (CMRL) have, however, already thought of this, to their credit.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;CMRL may soon start making arrangements to ensure good mobile connectivity on the underground stretch.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“We  are considering various options to boost mobile network underground. It  is important we provide such a service,” says a CMRL official. Chennai  Metro, built at a cost of Rs. 14,600 crore, 45 km across the city, will  have 24 km underground. Of the 32 stations, 19 will be underground.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;CMRL  has drawn the idea from Delhi Metro Rail Corporation (DMRC), a  principal consultant. Sometime back, Delhi Metro Rail had installed  additional cellular towers at its underground stations to improve mobile  connectivity.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The value of such a facility will  surface especially during a crisis, according to Nishant Shah of Centre  for Internet and Society.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Connectivity becomes crucial when something untoward —  be it breakdown of infrastructure or even sexual harassment — occurs on  the underground stretch. It needs to be recorded or documented  immediately,” he says.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Janaki Pillai of Ability  Foundation says connectivity is particularly critical for the hearing  impaired, who often use the messaging and WhatsApp services.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“But  the question of them using the underground stations and the need for  mobile connectivity arises only when the stations are accessible.  Whether I choose to use it or not is different, but the service should  be available and the choice should be mine,” she says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-june-11-2014-sunita-sekhar-stay-connected-even-when-you-go-underground'&gt;https://cis-india.org/news/the-hindu-june-11-2014-sunita-sekhar-stay-connected-even-when-you-go-underground&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-04T15:15:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-comments-enhancing-icann-accountability">
    <title>CIS Comments: Enhancing ICANN Accountability</title>
    <link>https://cis-india.org/internet-governance/blog/cis-comments-enhancing-icann-accountability</link>
    <description>
        &lt;b&gt;On May 6, 2014, ICANN published a call for public comments on "Enhancing ICANN Accountability". This comes in the wake of the IANA stewardship transition spearheaded by ICANN and related concerns of ICANN's external and internal accountability mechanisms. Centre for Internet and Society contributed to the call for comments.&lt;/b&gt;
        &lt;h3&gt;&lt;strong&gt;Introduction:&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On March 14, 2014, the US National Telecommunications and Information Administration &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;announced its intent&lt;/a&gt; to transition key Internet domain name functions to the global multi-stakeholder Internet governance community. ICANN was tasked with the development of a proposal for transition of IANA stewardship, for which ICANN subsequently &lt;a href="https://www.icann.org/resources/pages/draft-proposal-2014-04-08-en"&gt;called for public comments&lt;/a&gt;. At NETmundial, ICANN President and CEO Fadi Chehadé acknowledged that the IANA stewardship transition and improved ICANN accountability were &lt;a href="http://www.internetcommerce.org/issuance-of-netmundial-multistakeholder-statement-concludes-act-one-of-2014-internet-governance-trifecta/"&gt;inter-related issues&lt;/a&gt;, and &lt;a href="http://blog.icann.org/2014/05/icanns-accountability-in-the-wake-of-the-iana-functions-stewardship-transition/"&gt;announced&lt;/a&gt; the impending launch of a process to strengthen and enhance ICANN accountability in the absence of US government oversight. The subsequent call for public comments on “Enhancing ICANN Accountability” may be found &lt;a href="https://www.icann.org/resources/pages/enhancing-accountability-2014-05-06-en"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Suggestions for improved accountability:&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the event, Centre for Internet and Society (“CIS”) wishes to limit its suggestions for improved ICANN accountability to matters of reactive or responsive transparency on the part of ICANN to the global multi-stakeholder community. We propose the creation and implementation of a robust “freedom or right to information” process from ICANN, accompanied by an independent review mechanism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article III of ICANN Bye-laws note that “&lt;i&gt;ICANN and its constituent bodies shall operate to the maximum extent feasible in an open and transparent manner and consistent with procedures designed to ensure fairness&lt;/i&gt;”. As part of this, Article III(2) note that ICANN shall make publicly available information on, &lt;i&gt;inter alia&lt;/i&gt;, ICANN’s budget, annual audit, financial contributors and the amount of their contributions, as well as information on accountability mechanisms and the outcome of specific requests and complaints regarding the same. Such accountability mechanisms include reconsideration (Article IV(2)), independent review of Board actions (Article IV(3)), periodic reviews (Article IV(4)) and the Ombudsman (Article V).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, ICANN’s Documentary Information Disclosure Policy (“DIDP”) sets forth a process by which members of the public may request information “&lt;i&gt;not already publicly available&lt;/i&gt;”. ICANN &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;may respond&lt;/a&gt; (either affirmatively or in denial) to such requests within 30 days. Appeals to denials under the DIDP are available under the reconsideration or independent review procedures, to the extent applicable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While ICANN has historically been prompt in its response to DIDP Requests, CIS is of the view that absent the commitments in the AoC following IANA stewardship transition, it would be desirable to amend and strengthen Response and Appeal procedures for DIDP and other, broader disclosures. Our concerns stem from the fact that, &lt;i&gt;first&lt;/i&gt;, the substantive scope of appeal under the DIDP, on the basis of documents requested, is unclear (say, contracts or financial documents regarding payments to Registries or Registrars, or a detailed, granular break-up of ICANN’s revenue and expenditures); and &lt;i&gt;second&lt;/i&gt;, that grievances with decisions of the Board Governance Committee or the Independent Review Panel cannot be appealed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore, CIS proposes a mechanism based on “right to information” best practices, which results in transparent and accountable governance at governmental levels.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, we propose that designated members of ICANN staff shoulder responsibility to respond to information requests. The identity of such members (information officers, say) ought to be made public, including in the response document.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, an independent, third party body should be constituted to sit in appeal over information officers’ decisions to provide or decline to provide information. Such body may be composed of nominated members from the global multi-stakeholder community, with adequate stakeholder-, regional- and gender-representation. However, such members should not have held prior positions in ICANN or its related organizations. During the appointed term of the body, the terms and conditions of service ought to remain beyond the purview of ICANN, similar to globally accepted principles of an independent judiciary. For instance, the Constitution of India forbids any disadvantageous alteration of privileges and allowances of judges of the &lt;a href="http://www.constitution.org/cons/india/p05125.html"&gt;Supreme Court&lt;/a&gt; and &lt;a href="http://www.constitution.org/cons/india/p06221.html"&gt;High Courts&lt;/a&gt; during tenure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt;, and importantly, punitive measures ought to follow unreasonable, unexplained or illegitimate denials of requests by ICANN information officers. In order to ensure compliance, penalties should be made continuing (a certain prescribed fine for each day of information-denial) on concerned officers. Such punitive measures are accepted, for instance, in Section 20 of India’s Right to Information Act, 2005, where the review body may impose continuing penalties on any defaulting officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Finally&lt;/i&gt;, exceptions to disclosure should be finite and time-bound. Any and all information exempted from disclosure should be clearly set out (and not merely as categories of exempted information). Further, all exempted information should be made public after a prescribed period of time (say, 1 year), after which any member of the public may request for the same if it continues to be unavailable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS hopes that ICANN shall deliver on its promise to ensure and enhance its accountability and transparency to the global multi-stakeholder community. To that end, we hope our suggestions may be positively considered.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;Comment repository&lt;/strong&gt;:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;All comments received by ICANN during the comment period (May 6, 2014 to June 6, 2014) may be found &lt;a href="http://forum.icann.org/lists/comments-enhancing-accountability-06may14/"&gt;at this link&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-comments-enhancing-icann-accountability'&gt;https://cis-india.org/internet-governance/blog/cis-comments-enhancing-icann-accountability&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IANA</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    

   <dc:date>2014-06-10T13:03:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-leslie-d-monte-june-5-2014-right-to-be-forgotten-poses-legal-dilemma-in-india">
    <title>Right to be forgotten poses a legal dilemma in India</title>
    <link>https://cis-india.org/news/livemint-leslie-d-monte-june-5-2014-right-to-be-forgotten-poses-legal-dilemma-in-india</link>
    <description>
        &lt;b&gt;The “right to be forgotten” judgment has raised a controversy, while some argue that it upholds an individual’s privacy, others say it leaves a lot of room for interpretation. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Leslie D' Monte was &lt;a class="external-link" href="http://www.livemint.com/Industry/5jmbcpuHqO7UwX3IBsiGCM/Right-to-be-forgotten-poses-a-legal-dilemma-in-India.html"&gt;published in Livemint&lt;/a&gt; on June 5, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Medianama.com&lt;/i&gt; has become perhaps the first Indian website to be  asked by an individual to remove a link, failing which the user would  approach &lt;a href="http://www.livemint.com/Search/Link/Keyword/Google%20Inc."&gt;Google Inc.&lt;/a&gt; to delete the link under the “right to be forgotten” provision granted  by a European court. There’s one hitch: India doesn’t have any legal  provision to entertain or process such request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In his request to the media website, the individual cited a landmark 13  May judgment by the Court of Justice of the European Union (EU), which  said users could ask search engines like Google or Bing to remove links  to web pages that contain information about them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the judgement, the user is also free to approach “the  competent authorities in order to obtain, under certain conditions, the  removal of that link from the list of results” if the search engines do  not comply.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“...this individual told us of a plan to appeal to Google on the basis  of the judgment of the European Court of Justice, and asked us to either  convert the public post into a non-indexable post, such that it may not  be surfaced by search engines, or to modify the individual’s name,  place and any references to his/her employer in the post that we’ve  written, so that it cannot be linked directly to the individual,” said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Nikhil%20Pahwa"&gt;Nikhil Pahwa&lt;/a&gt;&lt;/span&gt;, founder of &lt;i&gt;medianama.com&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pahwa did not reveal the identity of the individual, who made the  request on 31 May. Medianama, according to Pahwa, had written about the  individual “a few years ago, protesting against attacks on his/her  freedom of speech.” It did not give details. The media website reported  about the request on 2 June.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under legal pressure, the individual eventually relented and retracted the request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The individual, Pahwa said, requested &lt;i&gt;medianama.com&lt;/i&gt; to retain  only his last name on the web page, cautioning that if the website does  not do so, he would submit the URL (uniform resource locator or address  of that link) of that web page to Google in a “right to be forgotten”  request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This, Pahwa said, “might hurt our search ranking, or lead to a blanket removal of our website from Google’s search index.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is a tricky one, and we’ve declined this request,” said Pahwa. He  added that “the implications for media are immense, since digital data,  which is a recording of online history, will be affected.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The EU ruling came after a Spanish national complained in 2010 that  searching his name in Google threw up links to two newspaper webpages  which reported a property auction to recover social security debt he  once owed, even though the information had become irrelevant since the  proceedings had since been resolved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the ruling, Google put up an online form (mintne.ws/1oYVP5Y), inviting users in Europe to submit their requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“...we will assess each individual request and attempt to balance the  privacy rights of the individual with the public’s right to know and  distribute information,” the form reads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“When evaluating your request, we will look at whether the results include outdated information about you, as well as whether there’s a public interest in the information—for  example, information about financial scams, professional malpractice,  criminal convictions, or public conduct of government officials...”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A Google spokesman said on Tuesday that the company had received over 41,000 requests to be forgotten so far.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the first day itself, Google had received 12,000 requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Almost a third of the requests were in relation to accusations of  fraud, 20% were in relation to violent/serious crimes, and around 12%  regarded child pornography arrests. More than 1,500 of these requests  are believed to have come from people in the UK. An ex-politician  seeking re-election, a paedophile and a GP (general practitioner) were  among the British applicants”, according to a 2 June report in&lt;i&gt;The Telegraph&lt;/i&gt; of London.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The “right to be forgotten” judgment has raised a controversy. While  some argue that it upholds an individual’s privacy, others say it leaves  a lot of room for interpretation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an interview to &lt;i&gt;Mint &lt;/i&gt;on 26 May, &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Anupam%20Chander"&gt;Anupam Chander&lt;/a&gt;&lt;/span&gt;,  director of the California International Law Center, reasoned that if a  person could simply scrub all the bad information about him from being  searchable on the Internet, she/he could do so by claiming that such  information was “no longer relevant”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Do we want search engines to then judge whether information remains  “relevant” or is somehow “inadequate” under the threat of liability for  leaving information accessible? An Internet sanitized of accessible  negative information will only tell half the truth,” he argued.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ruling is not binding on India and applies only to EU countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to legal experts, the country has no provision for a right to be forgotten, either in the Information Technology (IT) Act 2000 (amended in 2008) or  the IT Rules, 2011. India, for that matter, does not even have a privacy  act as yet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In India, we do not have a concept of the right to be Forgotten. It’s a  very Western concept,” said Pavan Duggal, a cyberlaw expert and Supreme  Court advocate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still, intermediaries like search engines and Internet services  providers, under the country’s IT Act and IT Rules, have the obligation  to exercise due diligence if an aggrieved party sends them a written  notice, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;,  executive director of the Centre for Internet and Society, an Internet  rights lobby group, “right to be forgotten” cases should pass the  “public interest” test.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Privacy protection should not have a chilling effect on transparency.  The question is: Does the content (which a user wants to be removed)  serve a public interest that outweighs the harm that it is doing to the  individual concerned? If no public interest is being served, there is no  point in knowing what the content is all about. The complication with  the EU ruling is that it wants intermediaries and over-the-top providers  to play the role of judges,” said Abraham.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-leslie-d-monte-june-5-2014-right-to-be-forgotten-poses-legal-dilemma-in-india'&gt;https://cis-india.org/news/livemint-leslie-d-monte-june-5-2014-right-to-be-forgotten-poses-legal-dilemma-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-09T10:02:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy">
    <title>CIS Cybersecurity Series (Part 14) – Menaka Guruswamy</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy</link>
    <description>
        &lt;b&gt;CIS interviews Menaka Guruswamy, lawyer at the Supreme Court of India, as part of the Cybersecurity Series.&lt;/b&gt;
        &lt;div&gt;&lt;em&gt;"The courts have rarely used privacy to stop the Indian state from getting into someone's business. So jurisprudentially, it is a weak challenge when you mount a rights based or a privacy right challenge against surveillance by the state. Because the answer of the state to that has always been, and as has been Obama's answer in the United States, that there are national security concerns. And usually national security will trump individual privacy."&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Centre for Internet and Society presents its fourteenth installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Menaka Guruswamy practices law at the Supreme Court of India. She was a Rhodes Scholar at Oxford University, and a Gammon Fellow at Harvard Law School, and a gold medalist from the National Law School of India. She has law degrees from all three schools, with a focus on Constitutional Law and Public International Law.&amp;nbsp;Guruswamy has worked at the Office of the Attorney General of India, the highest office that represents the federal government of India in the Supreme Court of India.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
http://youtu.be/GCDD6Z-UrGI
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;iframe src="//www.youtube.com/embed/GCDD6Z-UrGI" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2014-07-21T10:39:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/wsis-high-level-event-open-consultation-process">
    <title>WSIS+10 High-Level Event: Open Consultation Process</title>
    <link>https://cis-india.org/news/wsis-high-level-event-open-consultation-process</link>
    <description>
        &lt;b&gt;Jyoti Panday represented the Centre for Internet and Society (CIS) at the WSIS+10 High-Level Event:Open Consultation Process held in Geneva from May 28 to 31, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Fifth Physical Meeting marked Phase Six of the Open Consultation Process for the WSIS+10 High-Level Event (HLE) to be held in Geneva from June 10 to 13, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting saw the culmination of the multistakeholder review process on the WSIS+10 Statement on the Implementation of the WSIS Outcomes and the WSIS+10 Vision for WSIS Beyond 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS made interventions on text related to increasing women's participation, freedom of expression, media rights, data privacy, network security and human rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS also endorsed text on action line 'Media' which reaffirmed committment to freedom of expression, data privacy and media rights offline and online including protection of sources, publishers and journalists.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/wsis-final-agreed-draft.pdf" class="internal-link"&gt;Download the final agreed draft&lt;/a&gt; of the WSIS+10 Statement on the Implementation of WSIS Outcomes that will be deliberated upon and agreed at the HLE, for your reference.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/wsis-high-level-event-open-consultation-process'&gt;https://cis-india.org/news/wsis-high-level-event-open-consultation-process&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-04T10:14:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age">
    <title>Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India</title>
    <link>https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age</link>
    <description>
        &lt;b&gt;The development of information technology has transformed the way in which individuals make everyday transactions and communicate with the world around us. These interactions and transactions are recorded and stored – constantly available for access by the individual and the company through which the service was used.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;For example, the ubiquitous smartphone, above and beyond a communication device, is a device which can maintain a complete record of the communications data, photos, videos and documents, and a multitude of other deeply personal information, like application data which includes location tracking, or financial data of the user. As computers and phones increasingly allow us to keep massive amounts of personal information accessible at the touch of a button or screen (a standard smartphone can hold anything between 500 MB to 64 GB of data), the increasing reliance on computers as information-silos also exponentially increases the harms associated with the loss of control over such devices and the information they contain. This vulnerability is especially visceral in the backdrop of law enforcement and the use of coercive state  power to maintain security, juxtaposed with the individual’s right to secure their privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;American Law - The Fourth Amendment Protection against Unreasonable Search and Seizure&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The right to conduct a search and seizure of persons or places is an essential part of investigation and the criminal justice system. The societal interest in maintaining security is an overwhelming consideration which gives the state a restricted mandate to do all things necessary to keep law and order, which includes acquiring all possible information for investigation of criminal activities, a restriction which is based on recognizing the perils of state-endorsed coercion and its implication on individual liberty. Digitally stored information, which is increasingly becoming a major site of investigative information, is thus essential in modern day investigation techniques. Further, specific crimes which have emerged out of the changing scenario, namely, crimes related to the internet, require investigation almost exclusively at the level of digital evidence. The role of courts and policy makers, then, is to balance the state’s mandate to procure information with the citizens’ right to protect it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The scope of this mandate is what is currently being considered before the Supreme Court of the United States, which begun hearing arguments in the cases Riley v. California,&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;and United States v Wurie,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;on the 29&lt;sup&gt;th&lt;/sup&gt; of April, 2014. At issue is the question of whether the police should be allowed to search the cell phones of individuals upon arrest, without obtaining a specific warrant for such search. The cases concern instances where the accused was arrested on account of a minor infraction and a warrantless search was conducted, which included the search of cell phones in their possession. The information revealed in the phones ultimately led to the evidence of further crimes and the conviction of the accused of graver crimes. The appeal is for a suppression of the evidence so obtained, on grounds that the search violates the Fourth Amendment of the American Constitution. Although there have been a plethora of conflicting decisions by various lower courts (including the judgements in &lt;i&gt;Wurie &lt;/i&gt;and &lt;i&gt;Riley&lt;/i&gt;),&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;the Federal Supreme Court will be for the first time deciding upon the issue of whether cell phone searches should require a higher burden under the Fourth Amendment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the core of the issue are considerations of individual privacy and the right to limit the state’s interference in private matters. The fourth amendment in the Constitution of the United States expressly grants protection against unreasonable searches and seizure,&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;however, without a clear definition of what is unreasonable, it has been left to the courts to interpret situations in which the right to non-interference would trump the interests of obtaining information in every case, leading to vast and varied jurisprudence on the issue. The jurisprudence stems from the wide fourth amendment protection against unreasonable government interference, where the rule is generally that any &lt;i&gt;warrantless &lt;/i&gt;search is unreasonable, unless covered by certain exceptions. The standard for the protection under the Fourth Amendment is a subjective standard, which is determined as per the state of the bind of the individual, rather than any objective qualifiers such as physical location; and extends to all situations where individuals have a &lt;i&gt;reasonable expectation of privacy&lt;/i&gt;, i.e., situations where individuals can legitimately expect privacy, which is a subjective test, not purely dependent upon the physical space being searched.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore, the requirement of reasonableness is generally only fulfilled when a search is conducted subsequent to obtaining a warrant from a &lt;i&gt;neutral magistrate, &lt;/i&gt;by demonstrating &lt;i&gt;probable cause &lt;/i&gt;to believe that evidence of any unlawful activity would be found upon such search. A warrant is, therefore, an important limitation on the search powers of the police. Further, the protection excludes roving or general searches and requires &lt;i&gt;particularity &lt;/i&gt;of the items to be searched&lt;i&gt;.&lt;/i&gt; The restriction derives its power from the exclusionary rule, which bars evidence obtained through unreasonable search or seizure, obtained directly or through additional warrants based upon such evidence, from being used in subsequent prosecutions. However, there have evolved several exceptions to the general rule, which includes cases where the search takes place upon the lawful arrest of an accused, a practice which is justified by the possibility of hidden weapons upon the accused or of destruction of important evidence.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The appeal, if successful, would provide an exception to the rule that any search upon lawful arrest is always reasonable, by creating a caveat for the search of computer devices like smartphones. If the court does so, it would be an important recognition of the fact that evolving technologies have transmuted the concept of privacy to beyond physical space, and legal rules and standards that applied to privacy even twenty years ago, are now anachronistic in an age where individuals can record their entire lives on an iPhone. Searching a person nowadays would not only lead to the recovery of calling cards or cigarettes, but phones and computers which can be the digital record of a person’s life, something which could not have been contemplated when the laws were drafted. Cell phone and computer searches are the equivalent of searches of thousands of documents, photos and personal records, and the expectation of privacy in such cases is much higher than in regular searches. Courts have already recognized that cell phones and laptop computers are objects in which the user may have a reasonable expectation of privacy by making them analogous to a “closed container” which the police cannot search and hence coming under the protection of the Fourth Amendment.&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, cell phones and computers also hold data which could be instrumental in investigating criminal activity, and with technologies like remote wipes of computer data available, such data is always at the risk of destruction if delay is occurred upon the investigation. As per the oral arguments, being heard now, the Court seems to be carving out a specific principle applicable to new technologies. The Court is likely to introduce subtleties specific to the technology involved – for example, it may seek to develop different principles for smartphones (at issue in &lt;i&gt;Riley) &lt;/i&gt;and the more basic kind of cell-phones (at issue in &lt;i&gt;Wurie&lt;/i&gt;), or it may recognize that only certain kinds of information may be accessed,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;or may even evolve a rule that would allow seizure, but not a search, of the cell phone before a search warrant can be obtained.&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;Recognizing that transformational technology needs to be reflected in technology-specific legal principles is an important step in maintaining a synchronisation between law and technology and the additional recognition of a higher threshold adopted for digital evidence and privacy would go a long way in securing digital privacy in the future.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Search and Seizure in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Indian jurisprudence on privacy is a wide departure from that in the USA. Though it is difficult to strictly compartmentalize the many facets of the right to privacy, there is no express or implicit mention of such a right in the Indian Constitution. Although courts have also recognized the importance of procedural safeguards in protecting against unreasonable governmental interference, the recognition of the intrinsic right to privacy as non-interference, which may be different from the instrumental rights that criminal procedure seeks to protect (such as misuse of police power), is sorely lacking. The general law providing for the state’s power of search and seizure of evidence is found in the Code of Criminal Procedure, 1973.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 93 provides for the general procedure of search. Section 93 allows for a magistrate to issue a warrant for the search of any “document or thing”, including a warrant for general search of an area, where it believes it is required for the purpose of investigation. The &lt;i&gt;particularity &lt;/i&gt;of the search warrant is not a requirement under S. 93(2), and hence a warrant may be for general or roving search of a place. Section 100, which further provides for the search of a closed place, includes certain safeguards such as the presence of witnesses and the requirement of a warrant before a police officer may be allowed ingress into the closed place. However, under S. 165 and S. 51 of the code, the requirements of a search warrant are exempted. S. 165 dispenses with the warrant requirement and provides for an &lt;i&gt;officer in charge&lt;/i&gt; &lt;i&gt;of a police station, &lt;/i&gt;or any other officer duly authorized by him,&lt;i&gt; &lt;/i&gt;to conduct the search of any place as long as he has &lt;i&gt;reasonable grounds&lt;/i&gt; to believe that such search would be for the purpose of an investigation and a belief that a search warrant cannot be obtained without &lt;i&gt;undue delay&lt;/i&gt;. Further, the officer conducting such search must &lt;i&gt;as far as possible&lt;/i&gt; note down the reasons for such belief in writing prior to conducting the search. Section 51 provides another express exception to the requirement of search warrants, by allowing the search of a person arrested lawfully provided that the arrested person &lt;i&gt;may not or cannot be admitted to bail&lt;/i&gt;, and requires any such seized items to be written in a search memo. As long as these conditions are fulfilled, the police has an unqualified authority to search a person upon arrest. Therefore, where the arrestee can be admitted to bail as per the warrant, or, in cases of warrantless arrest, as per the law, the search and seizure of such person may not be regular, and the evidence so collected would be subject to greater scrutiny by the court. However, besides these minimal protections, there is no additional procedural protection of individual privacy, and the search powers of the police are extremely wide and discretionary. In fact, there is a specific absence of the exclusionary rule as a protection as well, which means that, unlike under the Fourth Amendment, the non-compliance with the procedural requirements of search &lt;i&gt;would not by itself vitiate the proceedings&lt;/i&gt; or suppress the evidence so found, but would only amount to an irregularity which must be simply another factor considered in evaluating the evidence.&lt;a href="#fn10" name="fr10"&gt;[10] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The extent of the imputation of the Fourth Amendment protection against unreasonable governmental interference in the Indian constitution is also uncertain. A direct imputation of the Fourth Amendment into the Indian Constitution has been disregarded by the Supreme Court.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt;Though the allusions to the Fourth Amendment have mostly been invoked on facts where unreasonable intrusions &lt;i&gt;into the homes&lt;/i&gt; of persons were challenged, the indirect imputation of the right to privacy into the right under Article 21 of the Constitution, invoking the right to privacy as a right to non-interference and a right to live with dignity, would suggest that the considerations for privacy under the Constitution are not merely objective, or physical, but depend on the subjective facts of the situation, i.e. its effect on the right to live with dignity (analogous to the reasonable expectation of privacy test laid down in &lt;i&gt;Katz&lt;/i&gt;).&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; Further, the court has specifically struck down provisions for search and seizure which confer particularly wide and discretionary powers on the executive without judicial scrutiny, holding that searches must be subject to the doctrine of proportionality, and that a provision &lt;i&gt;probable cause &lt;/i&gt;to effect any search.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;The Fourth Amendment protection against unreasonable interference in private matters by the state is a useful standard to assess privacy, since it imputes a concept of privacy as an intrinsic right as well as an instrumental one, i.e. privacy as non-interference is a good in itself, notwithstanding the rights it helps achieve, like the freedom of movement or speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regarding digital privacy in particular, Indian law and policy has failed to stand up to the challenges that new technologies pose to privacy and has in fact been regressive, by engaging in surveillance of communications and by allowing governmental access to digital records of online communications (including emails, website logs, etc.) without judicial scrutiny and accountability.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; In an age of transformative technology and of privacy being placed at a much greater risk, laws which were once deemed reasonable are now completely inadequate in guaranteeing freedom and liberty as encapsulated by the right to privacy. The disparity is even more pronounced in cases of investigation of cyber-crimes which rely almost exclusively on digital evidence, such as those substantively enumerated under the Information Technology Act, but investigated under the general procedure laid down in the Code of Criminal Procedure, which is already mentioned. The procedures for investigation of cyber-crimes and the search and seizure of digital evidence require special consideration and must be brought in line with changing norms. Although S.69 and 69B lay down provisions for investigation of certain crimes,&lt;a href="#fn15" name="fr15"&gt;[15] &lt;/a&gt;which requires search upon an order by &lt;i&gt;competent authority,&lt;/i&gt; i.e. the Secretary to the Department of IT in the Government of India, the powers of search and seizure are also present in several other rules, such as rule 3(9) of the Information Technology (Due diligence observed by intermediaries guidelines) Rules, 2011 which allows access to information from intermediaries by a simple written order by &lt;i&gt;any agency or person who are lawfully authorised for investigative, protective, cyber security or intelligence activity&lt;/i&gt;; or under rule 6 of the draft Reasonable Security Practices Rules, 2011 framed under Section 43A of the Information Technology Act, where &lt;i&gt;any government agency &lt;/i&gt;may, for the prevention, detection, investigation, prosecution, and punishment of offences, obtain any personal data from an intermediate “body corporate” which stores such data. The rules framed for investigation of digital evidence, therefore, do not inspire much confidence where safeguarding privacy is concerned. In the absence of specific guidelines or amendments to the procedures of search and seizure of digital evidence, the inadequacies of applying archaic standards leads to unreasonable intrusions of individual privacy and liberties – an incongruity which requires remedy by the courts and legislature of the country.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;a class="external-link" href="http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-132_h315.pdf"&gt;http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-132_h315.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a class="external-link" href="http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-212_86qd.pdf"&gt;http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-212_86qd.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. In Wurie, the motion to supress was allowed, while in Riley it was denied. Also see US v Jacob Finley, US v Abel Flores-Lopez where the motion to suppress was denied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. The Fourth Amendment to the Constitution of the United States of America: &lt;i&gt;"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Katz v United States, 389 U.S. 347, 352 (1967).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Stephen Saltzer, American Criminal Procedure&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. United States v Chan, 830 F. Supp. 531,534 (N.D. Cal. 1993).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. A factor considered in &lt;i&gt;US v Abel Flores-Lopez, &lt;/i&gt;where the court held that the search of call history in a cell phone did not constitute a sufficient infringement of privacy to require the burden of a warrant.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. The decision in Smallwood v. Florida, No. SC11-1130, before the Florida Supreme Court, made such a distinction.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. State Of Maharashtra v. Natwarlal Damodardas Soni, AIR 1980 SC 593; Radhakrishnan v State of UP, 1963 Supp. 1 S.C.R. 408&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. M.P. Sharma v Satish Chandra, AIR 1954 SC 300&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Kharak Singh v State of UP, (1964) 1 SCR 332; Gobind v State of Madhya Pradesh, 1975 AIR 1378&lt;/p&gt;
&lt;p class="Footnote" style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. &lt;i&gt;District Registrar and Collector&lt;/i&gt; v. &lt;i&gt;Canara Bank, &lt;/i&gt;AIR 2005 SC 186&lt;i&gt;, &lt;/i&gt;which related to S.73 of the Andhra Pradesh Stamps Act which allowed ‘any person’ to enter into ‘any premises’ for the purpose of conducting a search.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. S. 69 and 69B of the Information Technology (Amendment) Act, 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Procedures and Safeguards for Monitoring and collecting traffic data or information rules 2009, &lt;i&gt;available at &lt;/i&gt;&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009" class="external-link"&gt;http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age'&gt;https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-02T06:45:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-may-25-2014-purnima-sharma-digital-death-log-off-in-peace">
    <title>Digital death: Log off in peace</title>
    <link>https://cis-india.org/news/the-times-of-india-may-25-2014-purnima-sharma-digital-death-log-off-in-peace</link>
    <description>
        &lt;b&gt;From email and e-banking to shopping and social media sites, Indians have expanded their online footprint. Now, a small but rising number are planning for their digital death.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Purnima Sharma was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/Digital-deathLog-off-in-peace/articleshow/35579831.cms"&gt;published in the Times of India&lt;/a&gt; on May 25, 2014. Nishant Shah is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A few days after his son Yousmann's death in a road accident, Kongposh Bazaz began searching for the 19-year-old's Facebook password. "There was such an outpouring of grief on his wall that I felt the need to 'speak' to my son's friends on his behalf, telling them to be strong," he says. Facebook does not hand over access to a person's account even when they die but fortunately, Yousmann had shared his password with a close friend who gave it to Bazaz. "Like any teenager, he did not share it with his parents," says the 51-year-old publisher, revealing that while he has memorialized his son's Facebook page, he would prefer that his own online accounts were closed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As  we build our lives in a virtual world, there's a growing concern about  what happens to our online presence after death. In the West, some  people are writing out digital wills, spelling out how their virtual  life should be handled post-mortem . In India, too, a small number is  taking an interest in their digital afterlife. Sandeep Nerlekar, MD and  CEO Terentia Consultants, an estate planning firm that handles both  online (through a portal &lt;a class="smarterwiki-linkify" href="http://www.onlinewill"&gt;www.onlinewill&lt;/a&gt; .co.in) and digital wills, says, "Now, even social networking sites are becoming part of one's assets."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah, director, Research, at the Bangalore-based Centre for Internet and Society, says that though the trend is nascent, people have started including their digital accounts in their wills. "However, it is evident, that as more and more of our lives get mediated by digital devices, and as we live on the cloud, we are going to have to find legal and personal options of making sure that important data gets transmitted beyond our lives, and stored, archived and managed in responsible ways for those who find value in it."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in a country where only a small percentage writes wills for physical assets, it's not something a lot of people are thinking about proactively. Sudha Sarin, Delhi-based communications specialist, says "It doesn't get priority, like your financial assets," she says. At some point, she intends to leave a list of all her online account-ids and passwords in a place where her sons can find them easily. "This will give them access to my friends list so that they can be informed. And, in turn, let people who knew me reach out to them at such a time," she says. But she will want her family to close her accounts a couple of months after. "I wouldn't want my accounts to just sit out there. It's a way of closure," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sarin faced these questions of mortality after she lost her sister Geeta to cancer three months ago. She has decided to memorialize Geeta's Facebook page. Facebook doesn't allow family members access to data/passowords etc but kin can either delete or "memorialize" the accounts of the deceased. Sarin believes she's taken a decision her sister would have supported. "Reading her posts and seeing her pictures act like a balm - it's a catharsis of sorts," she says.&lt;br /&gt;&lt;br /&gt;American blogger Evan Caroll, who runs The Digital Beyond which talks about digital afterlife, writes that people need to start planning for what is to be done with their email, online banking and trading, social media , photo-sharing , online billpay and blogs after death. In an email interview with TOI, he suggests a simple conversation with one's heirs, using online services like SecureSafe that let users store passwords to pass along when they are gone or speaking to one's lawyer.&lt;br /&gt;&lt;br /&gt;Companies have different policies on what to do with accounts of those deceased. Last year, Google introduced a stepby-step process allowing users to plan what they want done with their account, and in some cases they provide the contents of an email account which hasn't left specific instructions after a "careful review" . Yahoo and Facebook currently have no service akin to a virtual will, but offer the option of closing down a deceased person's email accounts and social media profiles , though only after receiving verification of death. Arunav Sinha, director, corporate communications , India, China &amp;amp; South East Asia of Yahoo, says that virtual legacy planning is a personal prerogative in India today. "We can't hand over any data to anyone, as per the terms of our service. Requests for access have to come through a legal process and with the relevant documentation," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Caroll says there is no standard way in which online accounts are handled once you're gone. "People too have varied responses - while some look at it as a place to remember and grieve, others believe it's strange to continue the online profile."&lt;br /&gt;&lt;br /&gt;Rekha Aggarwal, advocate, Supreme Court, has started suggesting to clients that they keep their online accounts in mind too. "Talking about myself, I've already passed on my password to my son in case of any eventuality. I've told him to close my accounts because I don't want to be left hanging in the virtual world."&lt;br /&gt;&lt;br /&gt;But there are many for whom "the sense of digital life beyond death is exciting ," points out Nishant Shah. "I know of people who actually leave a last message to be posted on social media by their friends or family. There are some whose accounts are now transparently run by their partners or families." '&lt;br /&gt;&lt;br /&gt;Accessing a deceased person's account is something Pooja Dager isn't comfortable with. The 37-year-old HR manager has "not even tried to venture into that territory" after her husband's passing. "Only his bank accounts were transferred to my son's name, that's it. The others I try not to think about. I just let them be," she adds.&lt;br /&gt;&lt;br /&gt;But as internet users age, many more people will have to confront these issues.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Making a digial will&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Take an inventory of your online accounts and plan a way for your heirs to access your 'memories' such as photos, movies and emails Give instructions whether you want your page(s) closed or if you'd like someone to answer your friends' posts on your behalf, maybe for a few months You might even like to incorporate details of your digital assets in your will. Consult your attorney for advice.&lt;br /&gt;&lt;b&gt;Evan Carroll, The Digital Beyond&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-may-25-2014-purnima-sharma-digital-death-log-off-in-peace'&gt;https://cis-india.org/news/the-times-of-india-may-25-2014-purnima-sharma-digital-death-log-off-in-peace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-28T07:24:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police">
    <title> India needs better cyber police</title>
    <link>https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police</link>
    <description>
        &lt;b&gt;On Wednesday, one of the largest online shopping and auction portals, eBay, revealed that earlier this year, cybercriminals accessed details of 145 million of its customers.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was &lt;a class="external-link" href="http://www.business-standard.com/article/international/india-needs-better-cyber-police-114052201689_1.html"&gt;published in the Business Standard&lt;/a&gt; on May 23, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Even though eBay's customers' financial details are said to be safe, the  incident is being termed a "historic breach" given the enormity of the  data compromised.  Globally, eBay is being criticised not just for its  laxity in securing the digital perimeter but also for reacting too late.  The company has said that it first came to know of the breach "two  weeks" ago. Records that have been accessed contain passwords as well as  email addresses, birth dates, mailing addresses and other personal  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The situation is worse when it comes to reporting such instances in &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=India" target="_blank"&gt;India&lt;/a&gt;, say &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Cyber+Security" target="_blank"&gt;cyber security&lt;/a&gt; experts. The Indian Information Technology Act requires companies to  adopt "reasonable security measures" to protect consumers' sensitive  personal information such as passwords and financial details. It also  makes companies duty bound to report breaches and also defines  liabilities in case a firm is found not to be adhering to best data  security practices. However, implementation is patchy and most such  instances go unreported.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pavan Duggal, an advocate specialising in cyber security, says most  users do not come to know if there has been a breach. "Awareness is also  low among consumers about the legal recourse available in case their  data has been compromised," he adds. Unlike in the West, lack of a  proper data protection and privacy law in India is to be blamed for  this. "Companies, too, are inclined not to report such instances as they  fear being negatively impacted in the market," he points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case of a breach, a user can contact the adjudicating officer, which  is the state infotech secretary, for legal recourse. However, the onus  is on the user to prove the breach. In the US, a consumer can get a  subpoena (court order) issued against a company that makes it duty bound  to provide details of the breach. "In India, the regime is too lax. It  is very difficult to notify the government," says Sunil Abraham,  executive director of the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There are stringent compliance requirements in countries such as the US. The laws in India need to come tougher if we want companies to become more serious about this," adds Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;eBay has advised consumers, many of whom could be Indians, to immediately change their passwords. While people  tend to use the same password across many sites, emails and phones  numbers act as verifying tools for several financial transactions and  could be misused. Moreover, unlike India, the US does not require  additional authentication apart from credit card and CVV number, which  makes transactions slightly more vulnerable. "It may be a good idea to  include a one-time password as a security layer," says Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over 200 million Indians are online. The Indian &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=E-commerce" target="_blank"&gt;e-commerce&lt;/a&gt; market is estimated at $2 billion (Rs 12,000 crore) and is expected to cross $20 billion over the next four years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There is no such thing as 100 per cent protection in the digital world.  The choice is between transacting online or not," says Akhilesh Tuteja,  executive director of consulting firm KPMG. "Technology is becoming so  sophisticated that what was good yesterday is not good today." A bigger  dialogue is needed on people treating theft of digital assets just as  they would physical assets, he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The last big breach was reported at software maker Adobe Systems in  October 2013, when it was uncovered that hackers accessed about 152  million user accounts. Last December Target said some 40 million payment  card numbers and another 70 million customer records were hacked into.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police'&gt;https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-06-04T07:56:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas">
    <title>Students lead the way with apps for ideas</title>
    <link>https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas</link>
    <description>
        &lt;b&gt;At 1am, the lights are still on in 15-year-old Pratik's room at his house on 80 Feet Road, Indiranagar. The NPS-Koramangala student is busy typing code on his laptop for his latest app called Resolve.&lt;/b&gt;
        &lt;p&gt;The article &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/bangalore/Students-lead-the-way-with-apps-for-ideas/articleshow/35399402.cms"&gt;published in the Times of India&lt;/a&gt; on May 21, 2014 quotes Nishant Shah.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT" style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pratik epitomizes Gen X. Coding and decoding, these school children, barely into their teens, are developing apps drawing attention worldwide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I learnt coding by myself with the help of the internet. The world wants things simplified and that's why apps are a hit. The first app I made was a calculator because my dad was unhappy with the one on his phone. My work was initially rejected, but I knew that would happen. But I continued working. When I went to a Microsoft conference, they told me youngsters have ideas to change the world and we have the time," said Pratik.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He was felicitated with a Nokia Lumia 1520 at the Windows Azure Conference 2014 for his work in developing apps for Windows and Windows Phone store.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rahul Yedida, a Class 12 student at the National Centre for Excellence, has around 18,000 downloads for the app he and his friend created. "I wasn't too happy with the amount of Maths homework. I started wondering whether an app could do it. At the same time, I had learnt a new language and wanted to test my skills. That's how I started working on it," said Rahul.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Programming is fun. Seeing a computer work the way you want it to gives you special joy," said Vaisakh M, Rahul's co-developer. They sent a letter to Bill Gates about the app and got a reply lauding their achievement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Quote hanger&lt;br /&gt;&lt;/b&gt;* During my free time, I read about programming which helps me when I write programs. My friends in the colony join me when I watch videos about it. They do programs in other languages. I play games and used to wonder how they're made. My dad promised to get me a laptop if I start programming and that's how it started.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Thrisha Mohan| 12, Vidyashilp Academy, now working on a jewellery app&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;* Apps are the cool things to do now. With the kind of access possible thanks to smart phones, they have gone to the masses. I wouldn't be surprised at the number of apps being created. When an app is created in a college dormitory, 1,000 students in the college will download it. That's instant gratification. The ecosystem is such that with social networking sites, you become an instant hero. The question is: How many can be successful and have a long life?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;S Sadagopan | director, IIIT-B&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;* Apps are more relevant for those growing up with interfaces which are mobile and wearable. We also need to realise there is a growing generation of people whose first point of access to the digital as well as to the connected worlds of the internet is through mobile devices. And apps are a natural way of interaction. It is a positive trend because it allows users to think of themselves not only as 'users' but as active producers of the digital world. They look beyond platforms made available by multi-national companies or private enterprises, and it allows them to build communities of interaction and learning between them. We need to make sure they are safe and not susceptible to invasive presence of others who might exploit their presence on the web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Nishant Shah | director- research, The Centre for Internet and Society&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas'&gt;https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-28T09:24:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
