<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2221 to 2235.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/first-post-feb-19-2013-danish-raza-why-was-the-gwalior-court-in-such-a-hurry-to-block-iipm-urls"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/omnishambles-of-uid-shrouded-in-its-rti-opacity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindubusinessline-feb-15-2013-chinmayi-arun-freedom-of-expression-gagged"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ndtv-video-the-social-network-feb-5-2013-hate-speech-ban-or-ignore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy-highlights-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ny-times-feb-8-2013-betwa-sharma-online-abuse-of-teen-girls-in-kashmir-leads-to-arrests"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-national-feb-6-2013-samanth-subramanian-censorship-and-sensibility-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comparison-of-indian-legislation-and-draft-principles-on-surveillance-of-communications"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/january-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/rti-on-complaints-under-it-act-section-79"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/deccan-herald-january-29-2013-an-innovative-concept-comes-to-the-fore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/data-retention-in-india"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/first-post-feb-19-2013-danish-raza-why-was-the-gwalior-court-in-such-a-hurry-to-block-iipm-urls">
    <title>Why was the Gwalior court in such a hurry to block IIPM URLs?</title>
    <link>https://cis-india.org/news/first-post-feb-19-2013-danish-raza-why-was-the-gwalior-court-in-such-a-hurry-to-block-iipm-urls</link>
    <description>
        &lt;b&gt;Is it really that easy to get courts to block online content as it appears from the latest case of the blocking of 73 URLs related to IIPM? Legally speaking, yes.

&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Danish Raza was &lt;a class="external-link" href="http://www.firstpost.com/india/why-was-the-gwalior-court-in-such-a-hurry-to-block-iipm-urls-630650.html"&gt;published in FirstPost on February 19, 2013&lt;/a&gt;. Snehashish Ghosh's analysis on blocked sites is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;In cases of defamation, violations of copyright and trademark law and  threats to national security, courts can direct the government agency  (CERT-in or Computer Emergency Response Team- India) to take down the  offending content. And these can be ex-parte orders. Meaning the person  or organisation posting the content online is not intimated every time  the material is blocked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Legality aside however, advocates of free speech say that such court  orders should be exceptions and not the rule. There is a perception that  the process in its current form – right from the filing of court case  to the content being taken offline- is opaque.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Traditionally the Internet has been viewed as a more liberal, open and  democratic platform as compared to traditional media. Through such  orders, says Delhi based advocate and expert on cyber law Apar Gupta,  courts seem to give out a warning that online content is not outside the  purview of the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The problem in this case however, is not the ‘warning’ itself. It is the  way that the warning is being given that is setting the wrong  precedent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The blocks on IIPM related URLs is based on an interim order passed by a  Gwalior court. The head of the institute, Arindam Chaudhuri &lt;a href="http://www.firstpost.com/tech/glad-defamatory-links-with-malicious-interests-removed-arindam-chaudhuri-627714.html" rel="nofollow" target="_blank"&gt;in an exclusive interview with &lt;/a&gt;&lt;i&gt;&lt;a href="http://www.firstpost.com/tech/glad-defamatory-links-with-malicious-interests-removed-arindam-chaudhuri-627714.html" rel="nofollow" target="_blank"&gt;Firstpost&lt;/a&gt;, &lt;/i&gt;said  that the case was filed last year by one his ‘channel partners’. He  added that the court had made him a party in the case only in January  and he would soon respond to court orders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three of the affected parties (&lt;i&gt;Careers 360, Caravan&lt;/i&gt; and &lt;i&gt;Kafila),&lt;/i&gt; however, said that they were never informed about the blocks, &lt;a href="http://www.livemint.com/Politics/roausYEth9b0TvZv4r0whN/Govt-orders-blocking-of-IIPMrelated-URLs.html" target="_blank"&gt;reported &lt;/a&gt;&lt;i&gt;&lt;a href="http://www.livemint.com/Politics/roausYEth9b0TvZv4r0whN/Govt-orders-blocking-of-IIPMrelated-URLs.html" target="_blank"&gt;Mint&lt;/a&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After the block orders, Shivam Vij, founder of the blog, &lt;i&gt;Kafila,&lt;/i&gt; &lt;a href="http://www.firstpost.com/tech/glad-defamatory-links-with-malicious-interests-removed-arindam-chaudhuri-627714.html" target="_blank"&gt;told &lt;/a&gt;&lt;i&gt;&lt;a href="http://www.firstpost.com/tech/glad-defamatory-links-with-malicious-interests-removed-arindam-chaudhuri-627714.html" target="_blank"&gt;Firstpost&lt;/a&gt;,&lt;/i&gt; “This is against the principle of natural justice. The court blocked  the URL of my blog without giving me a chance to defend myself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there are occasions warranting the urgent removal of content,  experts say similar exigency need not be shown in cases of defamatory  content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In his analysis of blocked URLs related to IIPM, Snehashish Ghosh from  the Centre for Internet and Society (CIS), a Bangalore based  organisation, &lt;a href="https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot" target="_blank" rel="nofollow"&gt;notes that according to the Bonnard Rule&lt;/a&gt;,  in a defamation case, interim injunction should not be awarded unless a  defence of justification by the defendant was certain to fail at trial  level. “Therefore, it appears that the (Gwalior) Court order has moved  away from the settled principles of law while awarding an interim  injunction for blocking of content related to IIPM”, says the report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commenting on court ordered blocks, Parminder Jeet Singh, executive  director of IT for change, a Bangalore based organisation which works on  internet governance issues, says, “When there is clear imminent danger  or threat to the society, as in case of possible rioting, immediate  removal of content without notifying and hearing the other party is  understandable. But defamatory content does not fall in this category.  Decisions on such largely civil matter should be taken with due deep  consideration, after listening to all parties. And by far the  considerations of free speech should have overwhelming weight in making  decisions.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Singh adds that “Even if it is considered necessary to remove any content, a fully transparent process has to be followed.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most common reason cited for not sending notices before removing the  content is the tiresome process of zeroing in on the one person or  authority responsible for posting the content, says Prabir Purkayastha  of Knowledge Commons, an organisation which promotes open source  information. “If you approach intermediaries such as Google or Yahoo,  they will rightly say that they can provide details only if they are  allowed to do as per international treaties,” says Purkayastha. But when  there is clarity on who put the content online, like in the IIPM case,  he says, “DoT cannot absolve itself from the responsibility of writing  at least an email to these entities.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of Tata Sons Ltd. vs Green Peace International, cited by  Ghosh of CIS, the Delhi High Court addressed the question whether  posting or publishing of libelous material on the Internet calls for a  different standard. Ghosh writes, “The court decided that there cannot  be a separate standard for the Internet while awarding temporary  injunction in defamation cases. The wider viewership or accessibility  compared to other medium does not alter the fact that it is a medium.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Purkayastha agrees. “Freedom of speech and expression and the restraints  on it, as enshrined in the constitution, should not depend on the  medium of expression. But due to the haste shown by courts in blocking  online content, it appears that courts seem be applying two sets of  standards with respect to Internet and traditional media,” he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/first-post-feb-19-2013-danish-raza-why-was-the-gwalior-court-in-such-a-hurry-to-block-iipm-urls'&gt;https://cis-india.org/news/first-post-feb-19-2013-danish-raza-why-was-the-gwalior-court-in-such-a-hurry-to-block-iipm-urls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-02-19T11:51:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/omnishambles-of-uid-shrouded-in-its-rti-opacity">
    <title>The Omnishambles of UID, shrouded in its RTI opacity</title>
    <link>https://cis-india.org/internet-governance/blog/omnishambles-of-uid-shrouded-in-its-rti-opacity</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society sponsored Colonel Mathew Thomas to hold a workshop at the fourth National Right to Information (RTI) organized by the National Campaign for People's Right to Information, held in Hyderabad from February 15 to 18, 2013. &lt;/b&gt;
        &lt;p&gt;Click below to see Colonel Mathew Thomas's presentation&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;&lt;a class="external-link" href="http://www.slideshare.net/praskrishna/omnishambles-of-uid-shoruded-in-its-opacity-17-feb-2013-1"&gt;Omnishambles of UID Shrouded in its Opacity&lt;/a&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="421" marginheight="0" marginwidth="0" scrolling="no" src="http://www.slideshare.net/slideshow/embed_code/16619783" width="512"&gt; &lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.slideshare.net/praskrishna/omnishambles-of-uid-shoruded-in-its-opacity-17-feb-2013-1"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;div&gt;&lt;b&gt;&lt;a class="external-link" href="http://www.slideshare.net/praskrishna/omnishambles-of-uid-shoruded-in-its-opacity-17-feb-2013-1"&gt; &lt;/a&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;&lt;a href="http://www.slideshare.net/praskrishna" target="_blank"&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/omnishambles-of-uid-shrouded-in-its-rti-opacity'&gt;https://cis-india.org/internet-governance/blog/omnishambles-of-uid-shrouded-in-its-rti-opacity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-02-19T11:04:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindubusinessline-feb-15-2013-chinmayi-arun-freedom-of-expression-gagged">
    <title>Freedom of Expression Gagged</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindubusinessline-feb-15-2013-chinmayi-arun-freedom-of-expression-gagged</link>
    <description>
        &lt;b&gt;The use of law to bully people into silence, called ‘heckler’s veto’, is not unique to India, writes Chinmayi Arun in this op-ed published in Business Line on February 15, 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;a class="external-link" href="http://www.thehindubusinessline.com/opinion/freedom-of-expression-gagged/article4419285.ece?homepage=true"&gt;Click&lt;/a&gt; to read the original published in the Business Line.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Freedom of expression in India is under threat. This year we have the Tamil Nadu government’s ban on Vishwaroopam, the Ashis Nandy FIR, the smothering of Kashmir’s first all girls rock band’s music, and the removal of semi-nude paintings of Hindu deities from an art gallery upon the police’s ‘suggestion’. Another Rushdie-banning controversy is upon us, and yet another Facebook user’s arrest has made the news.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clearly, our right to freedom of expression is under an ongoing siege. The onslaught comes in varied forms: bullying by members of society, informal government action with the overhanging threat of the law, and direct use of the law (and of a variety of legislations within it). Each form is encouraged, exacerbated even, by our problematic interpretation of freedom of expression principles. Our law allows a group of intolerant people to silence a speaker by creating a threat to public order or by threatening the speaker directly, and our state is proving utterly ineffectual in protecting speech from intolerance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Instruments Deployed&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India’s first Kashmiri all-girls band is tragic proof of horizontal attacks on speech – their music was silenced by the grandmufti’s declaring it ‘un-Islamic’, and the attendant social pressure that tends to follow. They were not protected from this horizontal attack. The Palghar incident also had echoes of horizontal pressure, which was used to directly bully Shaheen Dhada, via friends advising her to apologise and strangers slapping her, before the instrument of the law was used to bully her further.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The instrument of the law can be used in invisible, informal ways, as Bangalore’s Chitrakala Parishath incident illustrates. Here, the pressure of police ‘suggestion’, carrying the implied threat of the force of the law, was used to ensure that semi-nude paintings of Hindu deities were removed from an exhibition. It appears that this police ‘suggestion’ was motivated by the fear that those paintings could trigger law and order problems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Vishwaroopam&lt;/i&gt; was banned using the law, specifically section 144 of the Code of Criminal Procedure, which empowers the government to issue orders “in urgent cases of nuisance or apprehended danger”. However, orders issued under section 144 would still need to observe the boundaries drawn for it in Article 19(2) of the Constitution.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Freedom and Public Order&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some may argue that controversial or offensive speech can legitimately be restricted since “public order” is one of the grounds for which our Constitution permits the restriction of the freedom of expression. However the original text of the Constitution did not include “public order” among its permissible grounds for restriction. This was inserted in the First Amendment of the Constitution, but was fortunately accompanied by the word ‘reasonable’ before restriction, thus ensuring that the freedom of expression can only be reasonably restricted under the exceptional circumstances listed in the Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This insertion of ‘public order’ came after the Supreme Court’s  invalidation of government pre-censorship of speech on public order  grounds in &lt;i&gt;Romesh Thapar v. State of Madras&lt;/i&gt; (1950), declaring  that the Constitution required that “nothing less than endangering the  foundations of the State or threatening its overthrow could justify  curtailment of the rights to freedom of speech and expression”.  Therefore, Parliament amended the Constitution to expand the grounds on  which the state could restrict speech, and included ‘public order’ among  the expanded grounds. The trouble with this is that the intolerant are  now able to create a public order problem to silence speakers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court of India, in &lt;i&gt;Babulal Parate vs State Of Maharashtra&lt;/i&gt; (1961) found that public order must be “maintained in advance in order  to ensure it”, and ruled that restriction of Article 19 freedoms of  expression and assembly in the interests of public order is permissible.  However, all such restrictions must continue to satisfy the  reasonability test laid down in the Constitution, providing our  judiciary with the opportunity to ensure that intolerance does not  continue to oppress speech.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Heckler's Veto&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The use of law to bully people into silence is not unique to India. Harry Kalven termed this ‘the hecklers’ veto’: if police action silences speakers for fear that the offended listeners might create a law and order problem, this effectively allows the listeners to veto what the speaker can say. There was a time when the heckler’s veto held sway in the United States and the United Kingdom. However, both countries’ legal principles have evolved to stop pandering to the intolerant, and it is time that India does the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Justice Hugo Black of the US Supreme Court, in his &lt;i&gt;Feiner v. New York &lt;/i&gt;(1951)  dissent, argued that the police must make all reasonable efforts to  protect the speaker’s constitutional right to speak before interfering  with this right. This dissenting opinion was later hailed as visionary.  The US Supreme Court subsequently gradually recognised the evils of the  heckler’s veto, which privileges and encourages intolerance. The United  Kingdom also progressively narrowed its reading of the Public Order Act  to ensure that speech is not restricted unless immediate violence is  feared, and is now decriminalising insults which are not directed at a  clearly identifiable victim.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Supreme Court’s judgment in the &lt;i&gt;Rangarajan v. P. Jagjivan Ram&lt;/i&gt; (1989) echoes Justice Black’s denouncement of the heckler’s veto. It  declares, “freedom of expression cannot be suppressed on account of  threat of demonstration and processions or threats of violence. That  would tantamount to …surrender to blackmail and intimidation. It is the  duty of the State to protect the freedom of expression since it is a  liberty guaranteed against the State. The State cannot plead its  inability to handle the hostile audience problem”. However other  judgments have shied away from confronting the fact that speech-related  public order problems created by intolerance, not by speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our legal system needs to take a firm, consistent stand against the  heckler’s veto. We need to stop mirroring the evils of outdated law in  fresh legislations like the Information Technology Act, and work instead  to remove law and practices that institutionalise intolerance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(The author teaches at National Law University, Delhi and is Fellow, Centre for Internet and Society.)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindubusinessline-feb-15-2013-chinmayi-arun-freedom-of-expression-gagged'&gt;https://cis-india.org/internet-governance/blog/the-hindubusinessline-feb-15-2013-chinmayi-arun-freedom-of-expression-gagged&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-02-18T08:55:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot">
    <title>Analyzing the Latest List of Blocked URLs by Department of Telecommunications (IIPM Edition)</title>
    <link>https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot</link>
    <description>
        &lt;b&gt;The Department of Telecommunications (DoT) in its order dated February 14, 2013 has issued directions to the Internet Service Providers (ISPs) to block seventy eight URLs. The block order has been issued as a result of a court order. Snehashish Ghosh does a preliminary analysis of the list of websites blocked as per the DoT order.&lt;/b&gt;
        
&lt;hr /&gt;
&lt;p&gt;Medianama has &lt;a class="external-link" href="http://www.medianama.com/wp-content/uploads/blocking-instruction-II-14-Feb-2013.pdf"&gt;published the DoT order&lt;/a&gt;, dated February 14, 2013, on its website.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;What has been blocked?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The block order contains seventy eight URLs. Seventy three URLs are related to the Indian Institute of Planning and Management (IIPM). &amp;nbsp;The other five URLs contain the term “highcourt”. The order also contains links from reputed news websites and news blogs including The Indian Express, Firstpost, Outlook, Times of India, Economic Times, Kafila and Caravan Magazine, and satire news websites Faking News and Unreal Times. The order also directs blocking of a public notice issued by the University Grants Commission (UGC).&lt;/p&gt;
&lt;p&gt;The block order does not contain links to any social media website. However, some content related to IIPM has been removed but it finds no mention in the block order. Pursuant to which order or direction such content has been removed remains unclear. For example, Google has removed search results for the terms &amp;lt;Fake IIPM&amp;gt; pursuant to Court orders and it carries the following notice:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;"In response to a legal request submitted to Google, we have removed 1 result(s) from this page. If you wish, you may &lt;/em&gt;&lt;a href="http://www.chillingeffects.org/notice.cgi?sID=432099"&gt;&lt;em&gt;read more about the request&lt;/em&gt;&lt;/a&gt;&lt;em&gt; at ChillingEffects.org."&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Are there any mistakes in the order?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The direction issued by the DoT is once again inaccurate and mired with errors. In effect, the DoT has blocked sixty one unique URLs and the block order contains numerous repetitions. By its order the DoT has directed the ISPs to block an entire blog [&lt;a class="external-link" href="http://iipmexposed.blogspot.in"&gt;http://iipmexposed.blogspot.in&lt;/a&gt;] along with URLs to various posts in the same blog.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Reasons for Blocking Websites&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="http://economictimes.indiatimes.com/tech/internet/directed-by-gwalior-court-government-blocks-70-urls-critical-of-iipm/articleshow/18523107.cms"&gt;According to news reports&lt;/a&gt;, the main reason for blocking of websites by the DoT is a Court order issued by a Court in Gwalior. The reason for issuing such a block order might have been a court proceeding with respect to defamation and removal of defamatory content thereof. However, the reasons for blocking of domain names containing the term ‘high court’, which is not at all related to the IIPM Court case&amp;nbsp; is unclear. The DoT by its order has also blocked a link in the website of a internet domain registrar which carried advertisement for the domain name [&lt;a class="external-link" href="http://www.highcourt.com"&gt;www.highcourt.com&lt;/a&gt;].&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Are the blocks legitimate?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The block order may have been issued by the DoT under Rule 10 of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Court order seems to be an interim injunction in a defamation suit. Generally, Courts exercise utmost caution while granting interim injunction in defamation cases.&amp;nbsp; According to the Bonnard Rule (Bonnard v. Perryman, [1891] 2 Ch 269) in a defamation case, “interim injunction should not be awarded unless a defence of justification by the defendant was certain to fail at trial level.” Moreover, in the case of Woodward and Frasier, Lord Denning noted “that it would be unjust to fetter the freedom of expression, when actually a full trial had not taken place, and that if during trial it is proved that the defendant had defamed the plaintiff, then should they be liable to pay the damages.” &amp;nbsp;&amp;nbsp;The Delhi High Court in &lt;em&gt;&lt;a href="http://www.indiankanoon.org/doc/562656/"&gt;Tata Sons Ltd. v. Green Peace International&lt;/a&gt;&lt;/em&gt; followed the Bonnard Rule and the Lord Denning’s judgements and ruled against the award of interim injunction for removal of defamatory content and stated:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“The Court notes that the rule in Bonnard is as applicable in regulating grant of injunctions in claims against defamation, as it was when the judgment was rendered more than a century ago. This is because the Courts, the world over, have set a great value to free speech and its salutary catalyzing effect on public debate and discussion on issues that concern people at large. The issue, which the defendant’s game seeks to address, is also one of public concern. The Court cannot also sit in value judgment over the medium (of expression) chosen by the defendant since in a democracy, speech can include forms such as caricature, lampoon, mime parody and other manifestations of wit.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Therefore, it appears that the Court order has moved away from the settled principles of law while awarding an interim injunction for blocking of content related to&amp;nbsp; IIPM. It is also interesting to note that in &lt;em&gt;Green Peace International&lt;/em&gt;, the Court also answered the question as to whether there should be different standard for posting or publication of defamatory content on the internet. It was observed by the Court that publication is a comprehensive term, ‘embracing all forms and medium – including the Internet’.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Blocking a Public Notice issued by a Statutory Body of Government of India&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The block order mentions a URL which contains a public notice issued by University Grants Commission (UGC) related to the derecognition of IIPM as a University. The blocking of a public notice issued by the statutory body of the Government of India is unprecedented. A public notice issued by a statutory body is a function of the State. It can only be blocked or removed by a writ order issued by the High Court or the Supreme Court and only if it offends the Constitution. However, so far, ISPs such as BSNL have not enforced the blocking of this URL.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Implementation of the order by the ISPs&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;As pointed out in my previous &lt;a href="https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii"&gt;blog post&lt;/a&gt; on blocking of websites, the ISPs have again failed to notify their consumers the reasons for the blocking of the URLs. This lack of transparency in the implementation of the block order has a chilling effect on freedom of speech.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot'&gt;https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-02-17T07:35:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ndtv-video-the-social-network-feb-5-2013-hate-speech-ban-or-ignore">
    <title>Hate speech: ban or ignore?</title>
    <link>https://cis-india.org/news/ndtv-video-the-social-network-feb-5-2013-hate-speech-ban-or-ignore</link>
    <description>
        &lt;b&gt;The Social Network discusses the hate speeches: whether they should be banned or ignored. Why does the state take action against some and not against some others. This on a day when Togadia and Owaisi were simultaneously trending on the social media.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This discussion was aired on NDTV on February 5, 2013&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director, Centre for Internet and Society, and Shivam Vij of Kafila.com joined NDTV in the studio while actor and standup comic Sanjay Rajoura joined via webcam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh said that the talk of banning these videos is foolish. He added, I don't think that is a solution. But the issue is one of criminal prosecution – whether that should happen or not, and with regard to the interesting dichotomy that Shivam pointed out some people are calling for somethings to be banned but not others. I think that kind of hypocrisy should be pointed out. I am happy that these small incidents of hate mongering are actually being blown out of proportion on social media because it actually gets people to react...to say wait a second...that is not right I might have a certain leanings towards Hindutva but that kind of speech is not what I support, or I might have a certain leanings towards what is called "pseudo-secularism" but that kind of speech is not what I support. So getting out that discussion out is important.&lt;/p&gt;
&lt;p&gt;If we were on one hand a society where we had communal peace and then social media were focusing on these small kinds of incidents and blowing it out of proportion then that would be a problem.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a class="external-link" href="http://www.ndtv.com/video/player/the-social-network/hate-speech-ban-or-ignore/264125"&gt;Watch the full discussion aired on NDTV&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ndtv-video-the-social-network-feb-5-2013-hate-speech-ban-or-ignore'&gt;https://cis-india.org/news/ndtv-video-the-social-network-feb-5-2013-hate-speech-ban-or-ignore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-02-13T09:40:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir">
    <title>Anonymous joins protests against Internet shutdown in Kashmir</title>
    <link>https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir</link>
    <description>
        &lt;b&gt;Hacktivist group Anonymous joined thousands of others to protest the shutdown of internet services in Kashmir for the fourth consecutive day by authorities after the hanging of Afzal Guru, a key accused in the Parliament attack case.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Indu Nandakumar's article was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2013-02-12/news/37059201_1_twitter-accounts-guy-fawkes-masks-internet-services"&gt;published in the Economic Times&lt;/a&gt; on February 12, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Anonymous, which shot to fame in India after it brought down the websites of the &lt;a href="http://economictimes.indiatimes.com/topic/Supreme%20Court"&gt;Supreme Court&lt;/a&gt; and &lt;a href="http://economictimes.indiatimes.com/topic/Congress%20Party"&gt;Congress Party&lt;/a&gt; last year, on Tuesday expressed its support to the people of Kashmir until the ban on internet and media services are lifted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We stand with # Kashmiras it comes to the end of its 3rd day under  curfew. The comms blockade will fall. We are with you. # KashmirNow," a  message posted on one of the &lt;a href="http://economictimes.indiatimes.com/topic/Twitter"&gt;Twitter&lt;/a&gt; accounts of Anonymous read.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another Twitter account of the same group said, "#OpKashmir - Lift the media and internet blackout in #Kashmir".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile internet services were suspended across Kashmir Valley on Saturday after the hanging of &lt;a href="http://economictimes.indiatimes.com/topic/Afzal%20Guru"&gt;Afzal Guru&lt;/a&gt; in New Delhi. Online protests gathered steam by evening and thousands  took to Twitter to express their anger censorships and blockades.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A senior official from the Department of Telecom, which had last year  ordered the blocking of several Twitter accounts and websites, said  internet services were blocked to avoid any further escalation of  violence in Kashmir. But internet experts said a ban of communication  services do not result in peace, instead it curtails the basic right of  citizens to exchange messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Government can ban certain class  of messages and certain class of users, but definitely not a blanket ban  of all services," said &lt;a href="http://economictimes.indiatimes.com/topic/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;, &lt;a href="http://economictimes.indiatimes.com/topic/executive%20director"&gt;executive director&lt;/a&gt; of Bangalore-based research organisation, the &lt;a href="http://economictimes.indiatimes.com/topic/Centre%20for%20Internet"&gt;Centre for Internet&lt;/a&gt; and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Essential commodities such as medicines, newspapers etc too are in  short supply in Kashmir, where three people died and over 50 were  injured in clashes since Saturday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anonymous has also been  posting photographs from the region. One of the Twitter accounts of the  group, @ anon_warlockon Tuesday tweeted, "A gag has been put on  everything, information at best is trickling down".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last year, Anonymous, known for its use of &lt;a href="http://economictimes.indiatimes.com/topic/Guy%20Fawkes"&gt;Guy Fawkes&lt;/a&gt; masks, had organised rallies across Indian cities to protest internet censorship after India's &lt;a href="http://economictimes.indiatimes.com/topic/Department%20of%20Telecom"&gt;Department of Telecom&lt;/a&gt; blocked over 250 websites and 30 Twitter accounts for posting communal  images and videos that led to people from Northeast exit Bangalore and a  few other Indian cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Internet service providers in the Valley were asked by officials in the &lt;a href="http://economictimes.indiatimes.com/topic/Ministry%20of%20Home%20Affairs"&gt;Ministry of Home Affairs&lt;/a&gt; to switch off connectivity on Saturday morning. There has been no  further communication from the Ministry until now and we don't expect  any withdrawal in the next few days," a senior industry executive with  direct knowledge of the matter told ET. He added that any decision on  withdrawal of the ban will be taken only after the MHA and intelligence  officials take stock of the situation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centre of Internet's  Abraham said he was not sure if messages on social media were being  taken seriously by the government. "Research shows that during the times  of public disruption, ban of communication services will only make  things worse. &lt;a href="http://economictimes.indiatimes.com/topic/Enlightened"&gt;Enlightened&lt;/a&gt; governments should know this and act accordingly."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir'&gt;https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-01T04:46:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks">
    <title>Indian net service providers too play censorship tricks </title>
    <link>https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks</link>
    <description>
        &lt;b&gt;The study by a Canadian university has found that some major Indian ISPs have deployed web-censorship and filtering technology.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The article by T Ramachandran was &lt;a class="external-link" href="http://www.thehindu.com/news/national/indian-net-service-providers-too-play-censorship-tricks/article4394415.ece"&gt;published in the Hindu&lt;/a&gt; on February 9, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;Your internet service provider (ISP) could be blocking some content. A  study conducted by a Canadian university has found that some major  Indian ISPs have deployed web-censorship and filtering technology widely  used in China and some West Asian countries.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The findings, published on January 15, were the result of a search for  censorship software and hardware on public networks like those operated  by ISPs.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A research team at Citizen Lab, an interdisciplinary laboratory based at  the Munk School of Global Affairs, University of Toronto, found a  software-hardware combo package called PacketShaper being used in many  parts of the world, including India.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The study identified the presence of four PacketShaper installations on  the networks of three major ISPs in India during the period of study in  late 2012. These ISPs had been earlier “implicated in filtering to some  degree,” the report said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The deployment of such traffic management technologies by ISPs could  threaten privacy, freedom of expression and competition, said Sunil  Abraham, Executive Director of the Bangalore-based NGO, Centre for  Internet and Society.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;He said tools like PacketShaper could be used by ISPs for two types of  censorship —“to block entire websites or choke traffic on certain  services or destinations in a highly granular fashion.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The U.S.-based producers of the technology, Blue Coat Systems, are quite  open about the product features on the company’s website. They say it  could be used to control and weed out undesirable content. It could also  be used to slow down or speed up the operation of programmes and  content flow to achieve the goals set by the operators of the networks.&lt;/p&gt;
&lt;h3 class="body" style="text-align: justify; "&gt;Transparency is the key&lt;/h3&gt;
&lt;p class="body" style="text-align: justify; "&gt;Technology experts said such products could be used to exercise  legitimate control over the internet traffic and prioritise the use of  bandwidth and resources, if used ethically.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“If done in a transparent manner that does not discriminate against  different actors within a class it does benefit the collective interest  of the ISP’s clients. However, it could also be used to engage in hidden  censorship against legitimate speech and also for anti-competitive  behaviour,” said Mr. Abraham.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The study focussed on countries where concerns exist over “compliance  with international human rights law, legal due process, freedom of  speech, surveillance, and censorship.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks'&gt;https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-02-13T04:20:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/privacy-highlights-in-india">
    <title>2012: Privacy Highlights in India</title>
    <link>https://cis-india.org/internet-governance/privacy-highlights-in-india</link>
    <description>
        &lt;b&gt;In this blog post, Elonnai Hickok summarizes the top privacy moments of 2012 in India. In doing so she lists out the major ones like the Report of Group of Experts on Privacy, the RIM Standoff, the Nira Radia controversy, the Centralized Monitoring System, Unmanned Aerial Vehicles, NATGRID, CCTNS, the growth of CCTVs, the leaked DNA Profiling Bill, and the UID project.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;The Report of Group of Experts on Privacy:&lt;/b&gt; In October 2012 the "Report of Group of Experts on Privacy" was published by a governmental committee chaired by Justice A.P. Shah. The report contains recommendations for comprehensive privacy legislation, including defining nine privacy principles, establishing a regulatory framework consisting of privacy commissioners at the regional and central level, and self regulatory organizations, and analyzing the present challenges to privacy in India.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before the report was published, two draft privacy bills had been leaked to the public, and a concept paper drafted in 2010. The report received mixed reviews from the media, including questions about the relationship between the Right to Information and the Right to Privacy. Before the publishing of the Report, Prime Minister Manmohan Singh recognized that disclosures under the RTI Act could, in some instances, violate individual privacy. In a statement to the public, the Prime Minister stated &lt;i&gt;"citizens&lt;ins cite="mailto:Author" datetime="2012-11-16T15:34"&gt;’&lt;/ins&gt; right to know should definitely be circumscribed if disclosure of information encroaches upon someone's personal privacy.  But where to draw the line is a complicated question"&lt;/i&gt;.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three months before the report was published, the EU had publicly stated that current data protection provisions in India are not sufficient enough, and that India is not considered to be 'data secure'.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; If the recommendations in the report are turned into legislation, among other things, individuals in India will have a right to privacy and a right to redress for violations of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Governmental Interception&lt;/b&gt;: In early 2013 it was revealed that the Ministry of Home Affairs ordered interception of 10,000 phones and 1300 email ids during October 2012 to December 2012.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; Continuing its efforts to access all communications, in May 2012, the Government of India gave service providers a month to develop a method for intercepting calls using VoIP services.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; In February 2012 the Telecom Department proposed a new set of security guidelines that would allow for real time interception of communications and the tracking of the location of users. Among other things, the proposal establishes telecom security assurance and testing labs for the purpose of testing and certifying telecom equipment.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Additionally, in October of 2012, Bharti Airtel refused to wiretap telephones for RAW. The Department of Telecommunications eventually ordered Bharti Airtel to comply with the order, which they did.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; The events around interception in 2012 show that the Indian government is still trying to gain access to as much information as possible. The constant push for real time access by the government is concerning, as many safeguards are missing from the Indian interception regime such as, penalty to security agencies for unauthorized interception and avenues of redress for the individual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The RIM Standoff&lt;/b&gt;: Since 2008, the Indian government has been negotiating with RIM access to BlackBerry communications. Over the years, a number of solutions have been proposed by RIM and the GoI, yet a final agreement was never reached. Continuing the negotiations, In October 2012, RIM agreed to set up a server in Mumbai, which would allow security agencies to access Blackberry Messenger services.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; Blackberry also provided a solution that would allow access to Blackberry Internet Services.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; Following this, the Government of India mandated that Telecom Service Providers must incorporate the Blackberry interception solution, or risk being forced to shut their service by December 31, 2012. In compliance with this order, many service providers have set time frames for incorporation of the interception solution including and installed the necessary software.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; It is important to note that the lawful access solutions provided do not extend to the Blackberry Enterprise Server.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; Though it seems that the BlackBerry controversy might be resolved, the solution does not appear to be a long term solution, as BES communications are still not accessible, and the solution is not universal for all international providers. Thus, the Indian government will have to negotiate individually with each provider and service that they currently cannot access communications of.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Nira Radia Controversy:&lt;/b&gt; Continuing the Nira Radia controversy, which began in 2008-2009, in September 2012 the Supreme Court ordered the Income Tax Department to transcribe the 5,831 recorded conversations that were originally intercepted by the department. In January this year, the Supreme Court of India ordered that a "random check" be run through the Radia Tapes to check for instances of possible criminality.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; This case has become an important moment for privacy in India, as it intersects the dilemma between the right to privacy and public interest. Since 2010, Ratan Tata has been claiming that his right to privacy was violated by the publishing of the leaked tapes.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; The Supreme Court’s final decision will be important for drawing another contour of how the right to privacy is shaped in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Centralized Monitoring System&lt;/b&gt;: In 2012 the Telecom Ministry set aside Rs. 400 crore for the Central Monitoring System, which is projected to be finished by August 2014.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; The project, which first began in 2007, is envisioned to allow security agencies to bypass service providers and intercept communications on their own. The system is designed to have regional databases and a central database which will be accessible to law enforcement and security agencies. Privacy concerns related to the project include how the system will incorporate current legal regulations for interception in India, as a system that bypasses service providers essentially means that every communication can be read by law enforcement. Furthermore, it is not clear exactly who, and on what conditions will officials be allowed and authorized to access and use the system. The exact capabilities of the system have also not been identified. For example, will the CMS be able to intercept VoIP calls, will it be able to decrypt messages, and will it employ techniques such as Deep Packet Inspection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Unmanned Aerial Vehicles (UAVs):&lt;/b&gt; Since the late 90’s the Defense Research Development Organisation (DRDO) has been developing UAV’s for military purposes, and before this, India was acquiring UAV’s from Israel.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; Since that time there has been an increase in domestic companies and institutes developing UAVs, and an increase in the procurement of the technology by state police for generic reasons purposes as crowd control, traffic management, and security. For example, in August of 2012 the city of Mumbai used the UAV "Netra", as part of their security protocol during the Raj Thackeray rally to capture and send real time images back to the police. Netra is manufactured by the company Idea Forge.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; The Mumbai police also used the Netra in September 2012 after the Azad Maidan riots, and again on New Year’s Eve to monitor and track crime such as sexual harassment.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt; Similarly, Chennai city police are looking to procure from Anna University a UAV developed by the Madras Institute of Technology. The UAV will be used to assist in traffic monitoring and control.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; The increased procurement and use of UAV’s by state police is concerning as there is no clear legal regulation over the deployment of the vehicles. Thus, they have shifted from being used as a tool by the military, and are being used for monitoring traffic, crowd monitoring, etc. Furthermore, the process for authorization for use of the vehicles is not clear, and it is not clear how the captured information is protected and handled. Though UAV’s are clearly a useful tool for the military, for military purposes, the permitted use of them by other actors should be defined and regulated. The use of UAV’s for generic purposes could place individual privacy at risk, because of the amount of information and the level of detail that the vehicles are able to capture without the knowledge of the individual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The National Intelligence Grid (NATGRID):&lt;/b&gt; Plans for the NATGRID project, which was first piloted after the Mumbai attacks, has been continuing forward through 2012 and is envisioned to be operational sometime in 2013. During 2012, a detailed project report was submitted for the project, and in June the government approved Rs. 1,100 crore for purchase of technological equipment.&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; NATGRID is a project that envisions networking 21 databases for purposes of crime investigation including tax, health, and travel information. The information will be accessible to 11 security agencies and law enforcement agencies. Though it has been clarified that NATGRID will ensure that privacy is protected, the design of NATGRID is one that could create potential risks – as it brings together large amounts of personal data for easy access by security agencies. In doing so it could potentially eliminate the steps security agencies must take currently to access information – such as submitting a request and obtaining permission for access. Furthermore, it is unclear how current legal protections such as secrecy clauses in banking legislation will be incorporated and upheld by the NATGRID system. Other questions that the project raises include – though currently there are only eleven agencies listed that will have access to NATGRID – will this list expand? Without a policy in place how will this standard and other standards be enforced?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Crime and Criminal Tracking Network &amp;amp; System (CCTNS): &lt;/b&gt;Though the CCTNS project has been in the works since 2009, a call for companies to develop the technology for the system was taken in early 2012, and pilot projects were launched later that year. The CCTNS is being headed by the National Crime Records Bureau, and will allow for the sharing of crime related information on a national level, in real time. In 2012, the system was allocated 2,000 crores by the government, and currently 2,000 police stations and other offices have been connected under the system.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, police in Chhattisgarh,&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; Uttarakhand&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt; and Odisha have all been connected to the CCTNS system.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt; Though it will be beneficial for the police to have access to a networked system, it has not been made clear yet what type of security system the project will adopt to ensure that the information is not compromised or accessed without authorization. It has also not been clarified what information will be placed on the database, and will all records be accessible to any individual accessing the system. Because the project is still in pilot stages it is hard to tell if it could put individual privacy at risk. Hopefully, before the project is realized in its full, many of the details will be clarified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Growth of CCTVs:&lt;/b&gt; Throughout 2012 the use of CCTV’s has continued to grow across India. For example, the Maharashtra government has undertaken a "CCTV surveillance project" in which it is in the process of taking bids for.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt; The state of Karnataka is also planning on installing CCTV cameras in Bangalore and other major cities to help detect incidents of crime.&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt; While the Delhi Transport Department is contemplating installing CCTVs in buses,&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt; and the Indian Rail Authorities have also decided to install CCTVs throughout stations to increase security.&lt;a href="#fn27" name="fr27"&gt;[27]&lt;/a&gt; There still does not exist regulation of the use of CCTV cameras, thus it is unclear who can operate a CCTV camera, which departments of the government can mandate for the installation of CCTVs, if public notice must be given that a CCTV camera is in use, and who can access the footage from a CCTV.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Study on Privacy Perceptions&lt;/b&gt;: In a study that came out in December 2012 by Ponnurangam K, among other things, it was found that 75 per cent of participants never read the privacy policy on a website – including social networking sites, participants also thought that there was a privacy legislation in place in India, and that individuals in India are most concerned about financial privacy.&lt;a href="#fn28" name="fr28"&gt;[28]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The National Counter Terrorism Centre (NCTC):&lt;/b&gt; The NCTC was originally created in response to the Mumbai terror attacks, under the Unlawful Prevention Act, 1967. The NCTC was meant to be realized in 2012, but in March, plans for the Centre were put on hold, because of the controversial nature of the project.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt; The Centre was meant to bring Indian intelligence agencies under one umbrella, and analyze and store information related to terrorism. The proposed body has been highly controversial, as states object to the powers given to the Centre and see it as intruding on their powers and jurisdiction. If passed, the NCTC will have the powers of arrest, search and seizure, and the ability to access information from other intelligence agencies.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Leaked DNA Profiling Bill:&lt;/b&gt; In 2012, a version of the DNA Profiling Bill, originally drafted in 2007, was leaked to the public. The Bill is being piloted by the department of biotechnology, and seeks to establish DNA databases at the regional and central level for forensic purposes, yet the Bill does not establish strong protections for the privacy of DNA samples taken and important technical standards for ensuring that DNA samples are not misused or tampered with.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; What will happen to the Bill in 2013 is yet to be seen, but hopefully it will not be passed without the appropriate safeguards incorporated into its provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Unique Identification Project and the National Population Registrar:&lt;/b&gt; Throughout 2012, the UID has continued to carry out enrollments across the country, and sign MoU's with private sector companies for the adoption of the UID platform. Parallel to the UID project, the NPR project is also being implemented. The NPR seeks to provide every citizen of India with an identity that will be stored in an identity database maintained by the Registrar General and Census Commissioner of India.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; According to the NPR scheme, individuals who had already enrolled with the UID and given their biometrics would not need to re-submit their biometrics with the NPR. Yet, this has not been the case, and instead individuals are now being required to provide their biometrics for enrollment with the UID and the NPR.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy has been raised as a concern of the UID since the start of the project. For both the UID and the NPR now the transaction record will be stored by agencies, and whether it will be possible to track individuals across databases using their NPR or UID  identity?&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. The Report of Group of Experts on Privacy. See &lt;a class="external-link" href="http://bit.ly/VqzKtr"&gt;http://bit.ly/VqzKtr&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Tikku, A., "RTI doesn’t trample upon privacy, says expert panel", Hindustan Times, October 29, 2012, available at &lt;a class="external-link" href="http://bit.ly/TNAzRF"&gt;http://bit.ly/TNAzRF&lt;/a&gt;, last accessed on January 8, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Sen, A. India protests European Union study of data laws. Economic Times. July 9, 2012, available at &lt;a class="external-link" href="http://bit.ly/Y9ahHs"&gt;http://bit.ly/Y9ahHs&lt;/a&gt;, last accessed on January 8, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Harismran, J., Thomas, J. "Home Ministry ordered 10k wire taps in last 90 days, order tapping of 1300 email Ids", The Economic Times, January 3,&lt;sup&gt;&lt;/sup&gt; 2013, available at &lt;a class="external-link" href="http://bit.ly/TKk7yN"&gt;http://bit.ly/TKk7yN&lt;/a&gt;, last accessed on January 7th 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;].The Economic Times, "Provide solution to intercept VoIP within a month: Govt", May 6, 2012, available at &lt;a class="external-link" href="http://bit.ly/VQDQ4k"&gt;http://bit.ly/VQDQ4k&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. The Economic Times, "New policy for real time interception to security agencies", February 1, 2012, available at &lt;a class="external-link" href="http://bit.ly/11DrlvB"&gt;http://bit.ly/11DrlvB&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. The Economic Times, "RAW irked as Airtel keeps its request for phone tapping on hold", October 21, 2012, available at &lt;a class="external-link" href="http://bit.ly/12IujhF"&gt;http://bit.ly/12IujhF&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Reyes, D., "RIM installs BlackBerry server in Mumbai", CrackBerry, February 23, 2012, available at &lt;a class="external-link" href="http://bit.ly/yBQsSo"&gt;http://bit.ly/yBQsSo&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Economic Times, "DoT makes telecom operators fall in line on Blackberry issue", December 30, 2012, available at &lt;a class="external-link" href="http://bit.ly/1169ufn"&gt;http://bit.ly/1169ufn&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Economic Times, "MTNL, BSNL fail to give dates for Blackberry interception", October 29, 2012, available at &lt;a class="external-link" href="http://bit.ly/1169ufp"&gt;http://bit.ly/1169ufp&lt;/a&gt;, last accessed on January 7, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The Economic Times, "Telecom companies agreed to provide real-time intercept facilities for BlackBerry smartphones", December 31, 2012, available at &lt;a class="external-link" href="http://bit.ly/Y9gjYt"&gt;http://bit.ly/Y9gjYt&lt;/a&gt;, last accessed on January 7, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Mahapatra, D., "SC to examine Radia tapes for criminality", Times of India, January 9, &lt;sup&gt;&lt;/sup&gt; 2013, available at &lt;a class="external-link" href="http://bit.ly/VD7eWX"&gt;http://bit.ly/VD7eWX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Times of India, "Ratan Tata softens stand on Radia tapes", August 23, 2012, available at &lt;a class="external-link" href="http://bit.ly/158CZxl"&gt;http://bit.ly/158CZxl&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. The Economic Times, "Govt. to place phone tapping system worth Rs. 400 cr by 2014", March 21, 2012, available at &lt;a class="external-link" href="http://bit.ly/V2P9q6"&gt;http://bit.ly/V2P9q6&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Monsonis, G., "UAVs gaining currency with Indian Armed Forces", Indian Defence Review, October 30, 2012, available at &lt;a class="external-link" href="http://bit.ly/KVYyIr"&gt;http://bit.ly/KVYyIr&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Mumbai Mirror, "Raj Thackeray’s mega rally: Unmanned Aerial Vehicle kept an eye on Azed Maidan", Economic Times, August 22, 2012, available at &lt;a class="external-link" href="http://bit.ly/PYTGAG"&gt;http://bit.ly/PYTGAG&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;].Ali, A. &amp;amp; Narayan. V., "Netra cameras to keep a close watch , over New Year’s Eve hotspots", Times of India, December 31, 2012, available at &lt;a class="external-link" href="http://bit.ly/Z7orxt"&gt;http://bit.ly/Z7orxt&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Venugopal, V., "It flies, it swoops, it records and monitors", The Hindu, December 20, 2012, available at &lt;a class="external-link" href="http://bit.ly/V89sLo"&gt;http://bit.ly/V89sLo&lt;/a&gt;, last accessed January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. The Economic Times, "Cabinet Committee on Security approves Rs. 1,100 crore for NATGRID", June 14, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Mohan, V., "Centre launches pilot project to track criminals", The Times of India, January 5, 2013, available at &lt;a class="external-link" href="http://bit.ly/UPk2fh"&gt;http://bit.ly/UPk2fh&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. The Pioneer, "Civil Lines Police Station gets connected with CCTNS", January 2012, available at &lt;a class="external-link" href="http://bit.ly/VRXKGJ"&gt;http://bit.ly/VRXKGJ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. CIOL Bureau, "CCTNS to be made public through internet: Dehradun DGP", January 4, 2012, available at &lt;a class="external-link" href="http://bit.ly/X4JISx"&gt;http://bit.ly/X4JISx&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. The Hindu, "Odisha to launch CCTNS on January 12", January 7, 2013, available at &lt;a class="external-link" href="http://bit.ly/Vd9Ay1"&gt;http://bit.ly/Vd9Ay1&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Padmakshan, M., "Maharashtra plans to invite new bids for CCTV surveillance project", September 18, 2012, available at &lt;a class="external-link" href="http://bit.ly/VRYrQm"&gt;http://bit.ly/VRYrQm&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Ashoka, R., "Karnataka to install CCTV cameras in Bangalore, major cities", Economic Times. July 26, 2012, available at &lt;a class="external-link" href="http://bit.ly/11Dxt6Z"&gt;http://bit.ly/11Dxt6Z&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Economic Times, "Buses to come with CCTV cameras for safety of women: Delhi government", December 17, 2012, available at &lt;a class="external-link" href="http://bit.ly/158Gtjo"&gt;http://bit.ly/158Gtjo&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. Economic Times, "Railways to step by security apparatus at stations", February 15, 2012, available at &lt;a class="external-link" href="http://bit.ly/11DxSX8"&gt;http://bit.ly/11DxSX8&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. Times of India, "Most Indians ignorant about privacy issues on Facebook, Twitter: Study", December 10, 2012, available at &lt;a class="external-link" href="http://bit.ly/X4KVt1"&gt;http://bit.ly/X4KVt1&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Kumar, H., "Does India Need a National Counter Terrorism Center?", The New York Times, India Ink, February 28, 2012, available at &lt;a class="external-link" href="http://nyti.ms/A5VU5P"&gt;http://nyti.ms/A5VU5P&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Times of India. CM to attend National Counter- Terrorism Centre Meet in Delhi. May 4, 2012, available at &lt;a class="external-link" href="http://bit.ly/12IDoH9"&gt;http://bit.ly/12IDoH9&lt;/a&gt;, last accessed on January 8, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Hickok, E., "Rethinking DNA Profiling in India", Economic Political Weekly, October 27, 2012, available at &lt;a class="external-link" href="http://bit.ly/TUrH7j"&gt;http://bit.ly/TUrH7j&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. Department of Information Technology, "National Population Register", available at &lt;a class="external-link" href="http://bit.ly/12rzyOh"&gt;http://bit.ly/12rzyOh&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. Pandit, A., "NPR must even if you have Aadhar number", Times of India, October 31, 2012, available at &lt;a class="external-link" href="http://bit.ly/Y9oXGq"&gt;http://bit.ly/Y9oXGq&lt;/a&gt;, last accessed on January 8, 2013.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy-highlights-in-india'&gt;https://cis-india.org/internet-governance/privacy-highlights-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-02-12T12:39:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ny-times-feb-8-2013-betwa-sharma-online-abuse-of-teen-girls-in-kashmir-leads-to-arrests">
    <title>Online Abuse of Teen Girls in Kashmir Leads to Arrests</title>
    <link>https://cis-india.org/news/ny-times-feb-8-2013-betwa-sharma-online-abuse-of-teen-girls-in-kashmir-leads-to-arrests</link>
    <description>
        &lt;b&gt;Online abuse and a fatwa aimed at a rock band of Muslim teenage girls in Kashmir have led to arrests and a threat of a lawsuit. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Betwa Sharma was &lt;a class="external-link" href="http://india.blogs.nytimes.com/2013/02/08/online-abuse-of-teen-girls-in-kashmir-leads-to-arrests/"&gt;published&lt;/a&gt; in the New York Times on February 8, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Three men were arrested this week for posting threatening messages on  the Facebook page of Praagaash, an amateur rock band in Indian-occupied  Kashmir made of up Muslim girls. “The investigation is ongoing,” said  Manoj Pandita, spokesman for the Jammu and Kashmir police, indicating  that more arrests may follow.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The three men were charged under Section 66A of the Information  Technology Act, which applies to “offensive” messages being sent through  communication services, and Section 506 of the Ranbir Penal Code, which  applies to criminal intimidation. Mr. Pandita said that it had been  easy to track the I.P. addresses of the Facebook users.&lt;span id="more-55629"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A prominent human rights lawyer, Parvez Imroz of the Jammu and  Kashmir Coalition of Civil Society, is planning to sue the top religious  leader in Kashmir, who called for the fatwa, for “demonizing Kashmir  before the international community” and for “running a parallel judicial  system in the valley.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Imroz told India Ink that human rights organizations like his  needed support from the international community to highlight their  concerns, and such fatwas reflected badly on the Kashmiri society. “He  is diverting attention away from real issues of human rights to  nonissues like music and purdah,” Mr. Imroz said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fatwa against the band was issued by the Grand Mufti Bashiruddin Ahmad.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In his fatwa, Mr. Ahmad advised women to only sing inside the house  to other female members of the family, and wear a veil whenever they  left the house. “They must stay within limits,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the band’s first live performance in December, Aneeqa  Khalid, Noma Nazir and Farah Deeba, 10th-grade students who are 15 and  16 years old, became the target of abuse and threats on Facebook by  people who accused them of being un-Islamic because they had performed  in public, especially before men. &lt;a href="https://plus.google.com/photos/112765019253836299953/albums/5839954496440638817" target="_blank"&gt;Some commenters&lt;/a&gt; called them “sluts” and “prostitutes;” others suggested that they should be raped.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The band Praagaash, which means “darkness into light,” &lt;a href="http://india.blogs.nytimes.com/2013/02/05/muslim-girls-quit-rock-band-after-national-controversy/" target="_blank"&gt;disbanded following a national controversy&lt;/a&gt; surrounding these threatening messages. The threats were condemned by many, including the state’s chief minister.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To many Kashmiris, both the fatwa and the arrests by the government  are unnecessary. Some say that the controversy erupted after the state’s  chief minister, Omar Abdullah, got involved by expressing his support  for the band on Twitter and then calling for investigation against those  writing the threatening messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Nobody here had a problem with the rock band,” said Aala Fazili, a  doctorate student at Kashmir University, pointing out that the band’s  performance in December had not led to any protests or physical threats  against them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Fazili, 32, added that people shouldn’t be arrested for writing  abusive posts on Facebook. “You cannot call an abuse a threat,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Pandita, the Kashmir police spokesman, said the investigators  were making a distinction between a threat and abuse on the basis of  “gravity.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, from the Center for Internet and Society in  Bangalore, asked whether people who hold protests calling for the death  of the author Salman Rushdie should also be arrested for making threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I would hold that no expression of violent thoughts, online or  offline, should be made criminal, even if it is repugnantly  misogynistic, unless it takes the form of a credible threat that causes  harm, or is harassment that constitutes harm,” he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ny-times-feb-8-2013-betwa-sharma-online-abuse-of-teen-girls-in-kashmir-leads-to-arrests'&gt;https://cis-india.org/news/ny-times-feb-8-2013-betwa-sharma-online-abuse-of-teen-girls-in-kashmir-leads-to-arrests&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-06T03:51:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-national-feb-6-2013-samanth-subramanian-censorship-and-sensibility-in-india">
    <title>Censorship and sensibility in India</title>
    <link>https://cis-india.org/news/the-national-feb-6-2013-samanth-subramanian-censorship-and-sensibility-in-india</link>
    <description>
        &lt;b&gt;The past few weeks in India have seen films, an all-girl rock band, a fashion show, a Booker prize-winning novelist and a reputed academic become targets of harassment, legal action or threats of violence.

&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Samanth Subramanian was &lt;a class="external-link" href="http://www.thenational.ae/news/world/censorship-and-sensibility-in-india"&gt;published&lt;/a&gt; in the National on February 6, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The most prominent case involved &lt;i&gt;Vishwaroopam&lt;/i&gt;, a Tamil film  that will be released in Tamil Nadu on Friday after a two-week delay.  The film was blocked by the state government after some Muslim groups  protested that it depicted Muslims in poor light. The director, Kamal  Haasan, had to agree to cut seven scenes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The culture of taking  offence has acquired an epidemic proportion, and we are moving in a  direction where nothing, it seems, is a safe topic," said Salil  Tripathi, who wrote the 2009 book &lt;i&gt;Offence: The Hindu Case&lt;/i&gt;, on how Hindu fundamentalists have succeeded in censoring and banning many cultural works and teachings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"If  India doesn't step back from this abyss, it will begin to resemble the  dictatorships where people speak in coded language, where real thoughts  go underground," Mr Tripathi added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Sunday, a fashion show in the southern city of Visakhapatnam was  cancelled after the Vishwa Hindu Parishad (VHP), a right-wing Hindu  group, protested against women modelling dresses bearing images of Hindu  deities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Delhi, an art gallery had to temporarily shut down on  Monday after the VHP called for a ban on a retrospective of the modern  nude because the exhibit included "indecent pictures". The VHP's women's  wing, the Durga Vahini, harrassed women who were smoking and drinking  in a restaurant in Mangalore last week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, on Sunday, a  Muslim cleric in Kashmir a fatwa against Pragaash, an all-girl high  school rock band that was deemed "un-Islamic". The band has dissolved,  although Omar Abdullah, the chief minister of Jammu and Kashmir,  defended them last weekend on Twitter, saying: "I hope these talented  young girls will not let a handful of morons silence them."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last  week, the author Salman Rushdie cancelled a visit to a literary festival  in Kolkata, citing security concerns after protests by Muslim groups.  The fair's organisers subsequently denied having invited him. Yesterday,  the Indian Christian Republican Party complained to the police that &lt;i&gt;Kadal&lt;/i&gt;, a new movie set in a Tamil Catholic fishing community, shows a framed picture of Jesus Christ being thrown to the floor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These instances have sparked widespread criticism of what an editorial last week in &lt;i&gt;The Hindu &lt;/i&gt;newspaper called India's "flourishing outrage industry". In the &lt;i&gt;International Herald Tribune,&lt;/i&gt; the columnist Manu Joseph called modern India "a paradise for those who take offence".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian constitution guarantees freedom of speech and expression,  but it is not without caveat. The constitution allows for "reasonable  restrictions" on this right, in the interests of "public order, decency  or morality".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the Indian Penal Code contains two laws that have been invoked repeatedly to cramp free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section  295A punishes those who "outrage [the] religious feelings of any class"  by spoken, written or visual means, with a fine or a prison term of up  to three years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 505(2) promises a similar punishment to  those who make "statements creating or promoting enmity, hatred or  ill-will between classes" on grounds of religion, caste, language or  race.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nikhil Mehra, a lawyer who practises in the Supreme Court, said both laws are antiquated holdovers from colonial India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The  problem is that these laws are so broadly worded that cases can be  impossible to quash, because it is difficult for a judge to take the  view that some piece of speech does not promote enmity between groups,"  Mr Mehra said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I'd say there's no chance that these laws will be  struck off the books," he said. "Politically, nobody will do it, because  we have such a huge vacuum of leadership that nobody has the guts to  step up and suggest such changes."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy  director at the Bangalore-based Centre for Internet and Society, has  extensively analysed cases where these laws are applied in conjunction  with India's information technology act, which governs online speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Given  India's history of communal violence, it would be extraordinary for  courts to directly criticise such laws," Mr Prakash said. But these laws  are two among many "patently unconstitutional laws" in India's statute  books, he pointed out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"How could it be constitutional to prevent  the free broadcast of news over radio, for instance, or to prohibit  speech online that causes 'annoyance'?" Mr Prakash said. "Not only are  antiquated and speech-restricting laws not being struck off, more such  laws are being added to the statute books all the time."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An  example, he said, was section 66a of the information technology act,  which aims to curtail "offensive messages" online but is often used to  target dissidents and even posts on social media.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-national-feb-6-2013-samanth-subramanian-censorship-and-sensibility-in-india'&gt;https://cis-india.org/news/the-national-feb-6-2013-samanth-subramanian-censorship-and-sensibility-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-06T04:09:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comparison-of-indian-legislation-and-draft-principles-on-surveillance-of-communications">
    <title>A Comparison of Indian Legislation to Draft International Principles on Surveillance of Communications</title>
    <link>https://cis-india.org/internet-governance/blog/comparison-of-indian-legislation-and-draft-principles-on-surveillance-of-communications</link>
    <description>
        &lt;b&gt;This blog post is a comparison of the relevant Indian legislations allowing governmental access to communications and the Draft International Principles on Surveillance of Communications. The principles, first drafted in October 2012 and developed subsequently seeks to establish an international standard for surveillance of communications in the context of human rights. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is contributing feedback to the drafting of the principles. The principles are still in draft form and the most recent version along with the preamble to the principles can be accessed at: &lt;a class="external-link" href="http://necessaryandproportionate.net/"&gt;http://necessaryandproportionate.net/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The Principles:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt;&lt;b&gt;Principle - Legality&lt;/b&gt;&lt;b&gt;:&lt;/b&gt;&lt;i&gt; Any limitation to the right to privacy must be prescribed by law. Neither the Executive nor the Judiciary may adopt or implement a measure that interferes with the right to privacy without a previous act by the Legislature that results from a comprehensive and participatory process. Given the rate of technological change, laws enabling limitations on the right to privacy should be subject to periodic review by means of a participatory legislative or regulatory process. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In India there are two predominant legislations with subsequent Rules and Licenses that allow for access to communications by law enforcement and the government. Though the basic power of interception of communications are prescribed by law, the Rules and Licenses build off of these powers and create procedural requirements, and requirements for assistance.&lt;/p&gt;
&lt;li&gt;&lt;b&gt;The Indian Telegraph Act, 1885&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; &lt;i&gt;The Indian Telegraph Amendment Rules 2007: &lt;/i&gt;These&lt;i&gt; &lt;/i&gt;Rules are grounded in section 419A of the Indian Telegraph Act and establish procedures and safeguards for the interception of communications. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;License Agreement for Provision of Unified Access Services After Migration from CMTS (UASL)&lt;/i&gt;: This license is grounded in the Telegraph Act, and details what types of assistance service providers must provide to law enforcement and the government. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;License Agreement for Provision of Internet Services&lt;/i&gt;: This license is grounded in the Telegraph Act, and details what types of assistance service providers must provide to law enforcement and the government. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;The Information Technology Act, 2000&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Procedure and Safeguards for Interception, Monitoring, and Decryption of Information Rules 2009:&lt;/i&gt; These Rules were notified in 2009 and allow authorized governmental agencies to intercept, monitor, and decrypt information generated, transmitted, received, or stored in any computer resource. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Procedure and safeguard for Monitoring and Collecting Traffic Data or Information Rules 2009:&lt;/i&gt; These Rules were notified in 2009 and allow authorized agencies to monitor and collect traffic data or information that is generated, transmitted, received or stored in any computer resource.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2. &lt;/b&gt;&lt;b&gt;Principle - Legitimate Purpose&lt;/b&gt;:&lt;i&gt; Laws should only allow access to communications or communications metadata by authorized public authorities for investigative purposes and in pursuit of a legitimate purpose, consistent with a free and democratic society.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are no specific provisions requiring that access by law enforcement must be for a legitimate purpose and consistent with a free and democratic society. Instead, Indian legislation defines and lays out specific circumstances for which access would be allowed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Below are the circumstances for which access is allowed by each Act, Rule, and License:&lt;/p&gt;
&lt;li&gt;&lt;b&gt;The TA Rules 2007&lt;/b&gt;: Interception is allowed in the following circumstances: &lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;On the occurrence of any public emergency&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;In the interest of the public safety&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;In the interests of the sovereignty and integrity of India&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;The security of the state&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Friendly relations with foreign states&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Public order&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Preventing incitement to the commission of an offence&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Interception and Monitoring Rules&lt;/b&gt;: Interception, monitoring, and decryption of communications is allowed in the following circumstances:&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;In the interest of the sovereignty or integrity of India, &lt;/li&gt;
&lt;li&gt;Defense of India&lt;/li&gt;
&lt;li&gt;Security of the state&lt;/li&gt;
&lt;li&gt;Friendly relations with foreign states&lt;/li&gt;
&lt;li&gt;Public order &lt;/li&gt;
&lt;li&gt;Preventing incitement to the commission of any cognizable offence relating to the above &lt;/li&gt;
&lt;li&gt;For investigation of any offence &lt;/li&gt;
&lt;/ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ITA Monitoring of Traffic Data Rules:&lt;/b&gt; Monitoring of traffic data and collection of information is allowed for the following purposes related to cyber security: &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Forecasting of imminent cyber incidents &lt;/li&gt;
&lt;li&gt;Monitoring network application with traffic data or information on computer resources &lt;/li&gt;
&lt;li&gt;Identification and determination of viruses or computer contaminant &lt;/li&gt;
&lt;li&gt;Tracking cyber security breaches or cyber security incidents &lt;/li&gt;
&lt;li&gt;Tracking computer resource breaching cyber security or spreading virus’s or computer contaminants &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Identifying or tracking of any person who has breached, or is suspected of having breached or being likely to breach cyber security. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Undertaking forensic of the concerned computer resource as a part of investigation or internal audit of information security practices in the computer resource.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accessing stored information for enforcement of any provisions of the laws relating to cyber security for the time being in force.&lt;/li&gt;
&lt;li&gt;Any other matter relating to cyber security. &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;b&gt;UASL License&lt;/b&gt;: Assistance must be provided to the government for the following reasons and times: &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Reasons defined in the Telegraph Act. &lt;b&gt;(Section 41.20 (xix))&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;National Security. &lt;b&gt;(Section 41.20 (xvii))&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To counteract espionage, subversive act, sabotage, or any other unlawful activity. (Section 41.1)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Trace nuisance, obnoxious or malicious calls, messages or communications transported through his/her equipment. &lt;b&gt;(Section 40.4)&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;In the interests of security. &lt;b&gt;(Section 41.7)&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;For security reasons. &lt;b&gt;(Section 41.20 (iii))&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;b&gt;ISP License: &lt;/b&gt;Assistance must be provided to the government for the following reasons and times:&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;To counteract espionage, subversive act, sabotage, or any other unlawful activity. &lt;b&gt;(Section 34.1)&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;In the interests of security. &lt;b&gt;(Section 34.4)&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;For security reasons. &lt;b&gt;(Section 34.28 (iii))&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Reasons defined in the Telegraph Act. &lt;b&gt;(Section 35.2)&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt;&lt;b&gt;Principle - Necessity&lt;/b&gt;: &lt;i&gt;Laws allowing access to communications or communications metadata by authorized public authorities should limit such access to that which is strictly and demonstrably necessary, in the sense that an overwhelmingly positive justification exists, and justifiable in a democratic society in order for the authority to pursue its legitimate purposes, and which the authority would otherwise be unable to pursue. The onus of establishing this justification, in judicial as well as in legislative processes, is on the government.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; Relevant Indian legislation do not contain provisions mandating that access to communications must be demonstrably necessary, and do not give details of the criteria that authorizing authorities should use to determine if a request is a valid or not. Relevant Indian legislation does require that all directions contain reasons for the direction. Additionally, excluding the ITA &lt;i&gt;Procedure and safeguard for Monitoring and Collecting Traffic Data or Information Rules&lt;/i&gt;, relevant Indian legislation requires that all other means for acquiring the information must be taken into consideration before a direction for access can be granted.&lt;/p&gt;
&lt;p&gt;Below are summaries of the relevant provisions:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;TA Rules 2007&lt;/b&gt;: Any order for interception issued by the competent authority must contain reasons for the direction &lt;b&gt;(Section 2).&lt;/b&gt; While issuing orders for direction, all other means for acquiring the information must be taken into consideration, and directions can only be issued if it is not possible to acquire the information by any other reasonable means &lt;b&gt;(Section 3).&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ITA Interception and Monitoring Rules: &lt;/b&gt;Any direction issued by the competent authority must contain reasons for such direction &lt;b&gt;(Section 7). &lt;/b&gt;The competent authority must consider the possibility of acquiring the necessary information by other means and the direction can be issued only when it is not possible to acquire the information any other reasonable means &lt;b&gt;(Section 8).&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ITA Traffic Monitoring Rules:&lt;/b&gt; Any direction issued by the competent authority must contain reasons for the direction &lt;b&gt;(Section 3(3)).&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;UASL &amp;amp; ISP License: &lt;/b&gt;As laid out in the Telegraph Act and subsequent Rules.&lt;b&gt; &lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;4. &lt;/b&gt;&lt;b&gt;&lt;i&gt;Principle - Adequacy&lt;/i&gt;&lt;/b&gt;&lt;i&gt;:&lt;/i&gt; &lt;i&gt;Public authorities should restrain themselves from adopting or implementing any measure of intrusion allowing access to communications or communications metadata that is not appropriate for fulfillment of the legitimate purpose that justified establishing that measure. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are provisions that require direction for access to be specific, but there are no provisions that specifically prohibit government agencies from collecting and accessing information that is not appropriate for fulfillment of the stated purpose of the direction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt;&lt;b&gt;Principle - Competent Authority&lt;/b&gt;: &lt;i&gt;Authorities capable of making determinations relating to communications or communications metadata must be competent and must act with independence and have adequate resources in exercising the functions assigned to them.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation it is required that directions for access to be authorized by "competent authorities". The most common authority for authorizing orders for access is the Secretary to the Government of India in the Ministry of Home Affairs, but authorization can also come from other officials depending on the circumstance. The fact that authorization for access to communications content is not from a judge has been a contested topic, as in many countries a judicial order is the minimum requirement for access to communication content.  It is unclear from the legislation if adequate resources are assigned to the competent authorities.&lt;/p&gt;
&lt;p&gt;Below are summaries of relevant provisions:&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The TA Rules 2007&lt;/b&gt;: Under the Telegraph Act the authorizing authorities are:            
&lt;ul&gt;
&lt;li&gt;The Secretary to the Government of India in the Ministry of Home Affairs at the Central Level&lt;/li&gt;
&lt;li&gt;The Secretary to the State Government in charge of the Home Department in the case of the State Government. &lt;/li&gt;
&lt;li&gt;In unavoidable circumstances an order for interception may only be made by an officer not below the rank of a Joint Secretary to the Government of India who has been authorized by the Union Home Secretary or the State Secretary.&lt;/li&gt;
&lt;li&gt;In remote areas or for operational reasons where obtaining prior directions for interception is not feasible the head or the second senior most officer of the authorized security agency at the Central level and the officers authorized in this behalf and not below the rank of Inspector of General Police. &lt;b&gt;(Section 1(2))&lt;/b&gt;. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Interception and Monitoring Rules: &lt;/b&gt;Under the ITA Rules related to the interception, monitoring, and decryption of communications, the competent authorities for authorizing directions are:            
&lt;ul&gt;
&lt;li&gt;The Secretary in the Ministry of Home Affairs in case of the Central Government.&lt;/li&gt;
&lt;li&gt;The Secretary in charge of the Home Department, in case of a State Government or Union Territory. &lt;/li&gt;
&lt;li&gt;In unavoidable circumstances any officer not below the rank of the Joint Secretary to the Government of India who has been authorized by the competent authority. &lt;/li&gt;
&lt;li&gt;In remote areas or for operational reasons where obtaining prior directions is not feasible, the head or the second senior most officer of the security and law enforcement agency at the Central level or the officer authorized and not below the rank of the inspector General of Police or an officer of equivalent rank at the State or Union territory level. &lt;b&gt;(Section 3)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Monitoring and Collecting Traffic Data Rules:&lt;/b&gt; Under the ITA Rules related to the monitoring and collecting of traffic data, the competent authorities who can issue and authorize directions are:           
&lt;ul&gt;
&lt;li&gt;The Secretary to the Government of Indian in the Department of Information Technology under the Ministry of Communications and Information Technology. &lt;b&gt;(Section 2(d))&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;An employee of an intermediary may complete the following if it is in relation to the services that he is providing including: accessing stored information from computer resource for the purpose of implementing information security practices in the computer resource, determining any security breaches, computer contaminant or computer virus, undertaking forensic of the concerned computer resource as a part of investigation or internal audit. Accessing or analyzing information from a computer resource for the purpose of tracing a computer resource or any person who has contravened or is suspected of having contravened or being likely to contravene any provisions of the Act that is likely to have an adverse impact on the services provided by the intermediary. &lt;b&gt;(Section 9 (2))&lt;/b&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;UASL &amp;amp; ISP License: &lt;/b&gt;As laid out in the Telegraph Act and subsequent Rules.&lt;b&gt; &lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt;&lt;b&gt;Principle - Proportionality&lt;/b&gt;:&lt;i&gt; Public authorities should only order the preservation and access to specifically identified, targeted communications or communications metadata on a case-by-case basis, under a specified legal basis. Competent authorities must ensure that all formal requirements are fulfilled and must determine the validity of each specific attempt to access or receive communications or communications metadata, and that each attempt is proportionate in relation to the specific purposes of the case at hand. Communications and communications metadata are inherently sensitive and their acquisition should be regarded as highly intrusive. As such, requests should &lt;b&gt;at a minimum&lt;/b&gt; establish a) that there is a very high degree of probability that a serious crime has been or will be committed; b) and that evidence of such a crime would be found by accessing the communications or communications metadata sought; c) other less invasive investigative techniques have been exhausted; and d) that a plan to ensure that the information collected will be only that information reasonably related to the crime and that any excess information collected will be promptly destroyed or returned. Neither the scope of information types, the number or type of persons whose information is sought, the amount of data sought, the retention of that data held by the authorities, nor the level of secrecy afforded to the request should go beyond what is demonstrably necessary to achieve a specific investigation. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation&lt;/b&gt;: In relevant Indian legislation there are no comprehensive provisions that ensure proportionality of the surveillance of communications but there are provisions that contribute to ensuring proportionality. These include provisions requiring: time frames for how long law enforcement can retain accessed and collected material, directions to be issued only after there are no other means for acquiring the information, requests to contain reasons for the order, the duration for which an order can remain in force to be limited, and requests to be for specified purpose based on a particular set of premises. All of these provisions are found in the Telegraph Rules issued in 2007 and the ITA &lt;i&gt;Procedures and Safeguards for Interception, Monitoring, and Decryption of Information Rules&lt;/i&gt;. None of these requirements are found in the UASL or ISP licenses, and many are missing from the ITA &lt;i&gt;Safeguards for Monitoring and Collecting Traffic Data or Information Rules&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the above are steps to ensuring proportionality, Indian legislation does not provide details of how the proportionality of requests would be measured as recommended by the principle. For example, it is not required that requests for access demonstrate that evidence of the crime would be found by accessing the communications or communications metadata sought, and that information only related directly to the crime will be collected. Furthermore, Indian legislation does not place restrictions on the amount of data sought, nor the level of secrecy afforded to the request.&lt;/p&gt;
&lt;p&gt;Below is a summary of the relevant provisions:&lt;/p&gt;
&lt;li&gt;&lt;b&gt;TA Rules 2007: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Service providers shall destroy record pertaining to directions for interception of message within two months of discontinuing the interception. &lt;b&gt;(Section 19)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Directions for interception should only be issued only when it is not possible to acquire the information by any other reasonable means. &lt;b&gt;(Section 3)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The interception must be of a message or class of message from and too one particular person that is specified or described in the order or one particular set of premises specified or described in the order. &lt;b&gt;(Section 4)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The direction for interception will remain in force for a period of 60 days, or 180 days if the directions are renewed. &lt;b&gt;(Section 6)&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt; ITA Interception and Monitoring Rules:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Any direction issued by the competent authority must contain reasons for such direction. &lt;b&gt;(Section 7)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The competent authority must consider all other possibilities of acquiring the information by other means, and the direction can only be issued when it is not possible to acquire the information by any other reasonable means. &lt;b&gt;(Section 8)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The direction of interception, monitoring, or decryption of any information generated, transmitted, received, or stored in any computer resource etc., as may be specified or described in the direction. &lt;b&gt;(Section 9)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The directions for interception, monitoring, or decryption will remain in force for a period of 60 days, or 180 days if the directions are renewed. &lt;b&gt;(Section 10)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Traffic and Monitoring Rules&lt;/b&gt;:            
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Any direction issued by the competent authority must contain reasons for such direction. &lt;b&gt;(Section 3(3))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Every record including electronic records pertaining to such directions for monitoring or collection of traffic data shall be destroyed after the expiry of nine months by the designated officer. Except when the information is needed for an ongoing investigation, the person in charge of a computer resource shall destroy records within a period of six months of discontinuing the monitoring. &lt;b&gt;(Section 8)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt;&lt;b&gt;Principle - Due process&lt;/b&gt;:&lt;i&gt; Due process requires that governments must respect and guarantee an individual’s human rights, that any interference with such rights must be authorized in law, and that the lawful procedure that governs how the government can interfere with those rights is properly enumerated and available to the general public.(9) While criminal investigations and other considerations of public security and safety may warrant limited access to information by public authorities, the granting of such access must be subject to guarantees of procedural fairness. Every request for access should be subject to prior authorization by a competent authority, except when there is imminent risk of danger to human life.(10)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In the relevant Indian legislation the only guarantee for due process is that every request for access must be subject to prior authorization by a competent authority.&lt;/p&gt;
&lt;li&gt;&lt;b&gt; TA Rules 2007:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;All orders for interception must be issued by the Secretary to the Government of India in the Ministry of Home Affairs. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Interception and Monitoring Rules&lt;/b&gt;:            
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;All orders for interception must be issued by the Secretary to the Government of India in the Ministry of Home Affairs. &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Monitoring of Traffic Rules:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The Secretary to the Government of India in the Department of Information Technology under the Ministry of Communications and Information Technology is the competent authority for authorizing orders.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. &lt;/b&gt;&lt;b&gt;Principle - User notification&lt;/b&gt;:&lt;i&gt; Notwithstanding the notification and transparency requirements that governments should bear, service providers should notify a user that a public authority has requested his or her communications or communications metadata with enough time and information about the request so that a user may challenge the request. In specific cases where the public authority wishes to delay the notification of the affected user or in an emergency situation where sufficient time may not be reasonable, the authority should be obliged to demonstrate that such notification would jeopardize the course of investigation to the competent judicial authority reviewing the request. In such cases, it is the responsibility of the public authority to notify the individual affected and the service provider as soon as the risk is lifted or after the conclusion of the investigation, whichever is sooner.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are no provisions that require the government or service providers to notify the user that a public authority has requested his or her communication data.&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9. &lt;/b&gt;&lt;b&gt;Principle - Transparency about use of government surveillance&lt;/b&gt;: &lt;i&gt;The access capabilities of public authorities and the process for access should be prescribed by law and should be transparent to the public. The government and service providers should provide the maximum possible transparency about the access by public authorities without imperiling ongoing investigations and with enough information so that individuals have sufficient knowledge to fully comprehend the scope and nature of the law, and when relevant, challenge it. Service providers must also publish the procedure they apply to deal with data requests from public authorities.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are no requirements that access capabilities of the government and the process for access must be transparent to the public. Nor are service providers required to publish the procedure applied to handle data requests from public authorities.&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10. &lt;/b&gt;&lt;b&gt;&lt;i&gt;Principle - Oversight&lt;/i&gt;&lt;/b&gt;&lt;i&gt;:&lt;/i&gt; &lt;i&gt;An independent oversight mechanism should be established to ensure transparency of lawful access requests. This mechanism should have the authority to access information about public authorities' actions, including, where appropriate, access to secret or classified information, to assess whether public authorities are making legitimate use of their lawful capabilities, and to publish regular reports and data relevant to lawful access. This is in addition to any oversight already provided through another branch of government such as parliament or a judicial authority. This mechanism must provide – at minimum – aggregate information on the number of requests, the number of requests that were rejected, and a specification of the number of requests per service provider and per type of crime. (11)&lt;/i&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are requirements for a review committee to be established.&lt;i&gt; &lt;/i&gt;The review committee must meet on a bi-monthly basis and review directions to ensure that they are in accordance with the prescribed law. Currently, it is unclear from the legislation if the review committees have the authority to access information about public authorities’ actions, and currently the review committee does not publish aggregate information about the number of requests, the number of requests that were rejected, and a specification of the number of requests per service provider and per type of crime. These standards are recommended by the principle.&lt;/p&gt;
&lt;p&gt;The relevant provisions are summarized below:&lt;/p&gt;
&lt;li&gt;&lt;b&gt;TA Rules 2007&lt;/b&gt;:            
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A review committee will be constituted by a state government that consists of a chief secretary, secretary of law, secretary to the state government. The review committee shall meet at least once in two months. If the committee finds that directions are not in accordance with the mandated provisions, then the committee can order the destruction of the directions. &lt;b&gt;(Section 17)&lt;/b&gt;.&lt;b&gt; &lt;/b&gt;Any order issued by the competent authority must contain reasons for such directions and a copy be forwarded to the concerned review committee within a period of seven working days. &lt;b&gt;(Section 2)&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Interception and Monitoring Rules: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Any direction issued by the competent authority must be forwarded to the review committee within a period of seven working days from issuing. The review committee is the same as constituted under rule 419A of the Indian Telegraph Rules, 1951. The review committee must meet bi-monthly and determine whether directions are in accordance with the ITA Act. If the review committee finds that the directions are not in accordance with the Act, it may issue an order for the destruction of the copies of accessed information and set aside the directions. &lt;b&gt;(Section 22)&lt;/b&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Traffic Monitoring Rules: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Any direction issued by the competent authority must be forwarded to the review committee within a period of seven working days from issuing. The review committee is the same as constituted under rule 419A of the Indian Telegraph Rules, 1951. The review committee must meet bi-monthly and determine whether directions are in accordance with the ITA Act. If the review committee finds that the directions are not in accordance with the Act, it may issue an order for the destruction of the copies of accessed information and set aside the directions. &lt;b&gt;(Section 7)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11. &lt;/b&gt;&lt;b&gt;Principles - Integrity of communications and systems&lt;/b&gt;: &lt;i&gt;It is the responsibility of service providers to transmit and store communications and communications metadata securely and to a degree that is minimally necessary for operation. It is essential that new communications technologies incorporate security and privacy in the design phases. In order, in part, to ensure the integrity of the service providers’ systems, and in recognition of the fact that compromising security for government purposes almost always compromises security more generally, governments shall not compel service providers to build surveillance or monitoring capability into their systems. Nor shall governments require that these systems be designed to collect or retain particular information purely for law enforcement or surveillance purposes. Moreover, a priori data retention or collection should never be required of service providers and orders for communications and communications metadata preservation must be decided on a case-by-case basis. Finally, present capabilities should be subject to audit by an independent public oversight body.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are a number of security measures that must be put in place but these are predominantly actions that must be taken by service providers, and do not pertain to intelligence agencies. Furthermore, many provisions found in the ITA&lt;i&gt; Procedure and Safeguards for Interception, Monitoring, and Decryption of Information Rules&lt;/i&gt;, and the ISP and UASL licenses include requirements for service providers to provide monitoring facilities and technical assistance, require information to be retained specifically for law enforcement purposes, and require service providers to comply with a-priori data retention mandates. In the ISP and UASL license, service providers are audited and inspected to ensure compliance with requirements listed in the license, but it unclear from the legislation if the access capabilities of government or governmental agencies are audited by an independent public oversight body. This standard is recommended by the principle.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Relevant provisions are summarized below:&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;TA Rules 2007&lt;/b&gt;: The service provider must put in place internal checks to ensure that unauthorized interception of messages does not take place. &lt;b&gt;(Section 14)&lt;/b&gt; Service providers are also responsible for actions of their employees. In the case of unauthorized interception or a breach in security, service providers can be held liable for up to three years in prison, fines, and revocation of the service providers licenses depending on the nature and scale of the violation. &lt;b&gt;(Section 20, 20A 21, 23).&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; ITA Interception and Monitoring Rules: &lt;/b&gt;The intermediary or person in charge of the computer resources must put in place adequate and effective internal checks to ensure that unauthorized interception of communications does not take place and extreme secrecy is maintained and utmost care and precaution taken in the matter of interception or monitoring or decryption of information as it affects privacy of citizens and also that it is handled only by the designated officers of the intermediary. &lt;b&gt;(Section 20)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; ITA Traffic Monitoring Rules&lt;/b&gt;: The intermediary or person in charge of the computer resources must put in place adequate and effective internal checks to ensure that unauthorized interception of communications does not take place and extreme secrecy is maintained and utmost care and precaution taken in the matter of interception or monitoring or decryption of information as it affects privacy of citizens and also that it is handled only by the designated officers of the intermediary. &lt;b&gt;(Section 5&amp;amp;6)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;UASL License:&lt;/b&gt; The intermediary or service provider is responsible for ensuring the protection of privacy of communication and to ensure that unauthorized interception of messages does not take place. &lt;b&gt;(Section 39.1, Section 39.2, Section 41.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ISP License:&lt;/b&gt; The ISP has the responsibility of ensuring that unauthorized interception of messages does not take place. &lt;b&gt;(Section 32.1)&lt;/b&gt; The ISP must take all necessary steps to safeguard the privacy and confidentiality of an information about a third party and its business and will do its best endeavor to ensure that no information, except what is necessary is divulged, and no employee of the ISP seeks information other than is necessary for the purpose of providing service to the third party. &lt;b&gt;(Section 32.2&lt;/b&gt;) The ISP must also take necessary steps to ensure that any person acting on its behalf observe confidentiality of customer information. &lt;b&gt;(Section 32.3)&lt;/b&gt;.&lt;/li&gt;
&lt;p&gt;Provisions requiring the provision of facilities, assistance, and retention:&lt;/p&gt;
&lt;li&gt;&lt;b&gt;ITA Interception and Monitoring Rules: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The intermediary must provide all facilities, co-operation for interception, monitoring, and decryption of information mentioned in the direction &lt;b&gt;(Section 13(2))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If a decryption direction or copy is handed to the decryption key holder to whom the decryption direction is addressed by the nodal officer, the decryption key holder must disclose the decryption key or provide the decryption assistance. &lt;b&gt;(Section 17)&lt;/b&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Monitoring of Traffic Rules: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The intermediary must extend all facilities, co-operation and assistance in installation, removal and testing of equipment and also enable online access to the computer resource for monitoring and collecting traffic data or information. &lt;b&gt;(Section 4(7))&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;UASL License: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The service provider cannot employ bulk encryption equipment in its network, and any encryption equipment connected to the licensee’s network for specific requirements must have prior evaluation an approval of the licensor. &lt;b&gt;(Section 39.1)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider must provide all tracing facilities to trace nuisance, obnoxious or malicious calls, messages or communications transported through the equipment and network to authorized officers of the government for purposes of national security.&lt;b&gt;(Section 40.4)&lt;/b&gt;.&lt;b&gt; &lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Suitable monitoring equipment as may be prescribed for each type of system used will be provided by the service provider for monitoring as and when required by the licensor. &lt;b&gt;(Section 41.7)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The designated person of the Central/State Government as conveyed to the Licensor from time to time in addition to the licensor or its nominee shall have the right to monitor the telecommunication traffic in every MSC/Exchange/MGC/MG. The service provider must make arrangements for the monitoring of simultaneous calls by Government security agencies. In case the security agencies intend to locate the equipment at the service provider’s premises for facilitating monitoring, the service provider should extend all support in this regard including space and entry of the authorized security personnel. The interface requirements as well as features and facilities as defined by the licensor should be implemented by the service provider for both data and speech. Presently, the service provider should ensure suitable redundancy in the complete chain of monitoring equipment for trouble free operations of monitoring of at least 210 simultaneous calls for seven security agencies. &lt;b&gt;(Section 41.10)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider must also make the following records available: called/calling party mobile/PSTN numbers, Time/date and duration of interception, location of target subscribers, telephone numbers if any call-forwarding feature has been invoked by the target subscriber, data records for even failed attempts, and call data record of roaming subscribers. &lt;b&gt;(Section 41.10)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider shall provide the facility to carry out surveillance of Mobile Terminal activity within a specified area. &lt;b&gt;(Section 41.11)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The complete list of subscribers must be made available by the service provider on their website to authorized intelligence agencies. This list must be updated on a regular basis. Hard copies of the list must also be made available to security agencies when requested. &lt;b&gt;(Section 41.14)&lt;/b&gt;. The database of subscribers must also be made available to the licensor or its representatives. &lt;b&gt;(Section 41.16)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider must maintain all commercial records with regard to the communications exchanged on the network. All records must be archived for at least one year. &lt;b&gt;(Section 41.17)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Calling Line Identification must be provided and the network should also support Malicious Call Identification.&lt;b&gt; (Section 41.18)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Information about bulk connections must be forwarded to the VTM Cell of DoT, DDG (Security) DoT, and any other officer authorized by the Licensor from time to time as well as Security Agencies on a monthly basis &lt;b&gt;(Section 41.19)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Subscribers having CLIR should be listed in a password protected website with their complete address and details so that authorized Government agencies can view or download for detection and investigation of misuse. &lt;b&gt;(Section 41.19(iv))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider must provide traceable identities of their subscribers. If the subscriber is roaming from another foreign company, the Indian Company must try to obtain traceable identities from the foreign company as part of its roaming agreement. &lt;b&gt;(41.20 (ix))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;On request by the licensor or any other agency authorized by the licensor, the licensee must be able to provide the geographical location (BTS location) of any subscriber at any point of time. &lt;b&gt;(41.20 (x))&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Suitable technical devices should be made available at the Indian end to designated security agency/licensor in which a mirror image of the remote access information is available on line for monitoring purposes. &lt;b&gt;(41.20 (xiv))&lt;/b&gt;. &lt;/li&gt;
&lt;li&gt;A complete audit trail of the remote access activities pertaining to the network operated in India should be maintained for a period of six months and provided on request to the licensor. &lt;b&gt;(Section 41.20 (xv))&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;For monitoring traffic, the service provider should provide access of their network and other facilities as well as to books of accounts to the security agencies. &lt;b&gt;(Section 41.20 (xx))&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ISP License:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The ISP must ensure that Bulk Encryption is not deployed by ISPs. Individuals/groups /organizations can use encryption up to 40 bit key length without obtaining permission from the licensor. If encryption equipments higher than this limit are deployed, individuals/groups/organizations must obtain prior written permission from the licensor and deposit the decryption key. &lt;b&gt;(Section 2.2(vii))&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP must furnish to the licensor/TRAI on demand documents, accounts, estimates, returns, reports, or other information. &lt;b&gt;(Section 9.1)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP will provide tracing facilities to trace nuisance, obnoxious or malicious calls, messages or communications transported through his equipment and network when such information is necessary for investigations or detection of crimes and in the interest of national security. &lt;b&gt;(Section 33.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP will provide the necessary facilities for continuous monitoring of the system, as required by the licensor or its authorized representatives. &lt;b&gt;(Section 30.1)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP shall provide necessary facilities depending upon the specific situation at the relevant time to the Government to counteract espionage, subversive acts, sabotage or any other unlawful activity. &lt;b&gt;(Section 34.1)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In the interests of security, suitable monitoring equipment as may be prescribed for each type of system used, which will be provided by the licensee. &lt;b&gt;(Section 34.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The designated person of the Central/State Government or its nominee will have the right to monitor the telecommunication traffic. The ISP will make arrangements for monitoring simultaneous calls by Government security agencies. &lt;b&gt;(Section 34.6)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP must install infrastructure in the service area with respect to: Internet telephony services offered by the ISP for processing, routing, directing, managing, authenticating the internet telephony calls including the generation of Call Details Record (CDR), called IP address, called numbers, date , duration, time and charges of internet telephony calls. &lt;b&gt;(Section 34.7)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;ISPs must maintain a log of all users connected and the service that they are using (mail, telnet, http etc.). The ISPs must log every outward login or telnet through their computers. These logs as well as copies of all the packets originating from the Customer Premises Equipment of the ISP must be made available in real time to the Telecom Authority. &lt;b&gt;(Section 34.8)&lt;/b&gt;.&lt;b&gt; &lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP should provide the facility to carry out surveillance of Mobile Terminal activity within a specified area. &lt;b&gt;(Section 34.9)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The complete list of subscribers must be made available by the ISP on their website so that intelligence agencies can obtain the subscriber list at any time. &lt;b&gt;(Section 34.12)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The list of Internet leased line customers and sub-costumers must be placed on a password protected website with the following information: Name of customer, IP address allotted, bandwidth provided, address of installation, date of installation, contact person with phone number and email. This information should be accessible to authorized Government agencies.&lt;b&gt; (Section 34.13)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Monitoring of high UDP traffic value and to check for cases where upstream UDP traffic is similar to downstream UDP traffic and monitor such customer monthly with physical verification and personal identity. &lt;b&gt;(Section 34.15)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The licensor will have access to the database relating to the subscribers of the ISP. The ISP must make available at any instant the details of the subscribers using the service. &lt;b&gt;(Section 34.22)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP must maintain all commercial records with regard to the communications exchanged on the network for at least one year and will be destroyed unless directed otherwise. &lt;b&gt;(Section 34.23)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Every international gateway with a route/switch having a capacity of 2Mbps must be equipped with a monitoring Centre at the cost of the ISP. The cost of meeting the requirements of the security agencies, the cost of maintenance of the monitoring equipment and infrastructure must be borne by the ISP. &lt;b&gt;(Section 34.27 (a(i))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Office space of 10 by 10 feet with adequate power supply and air-conditioning must be provided by the ISP free of cost. &lt;b&gt;(Section 34.27 (a(ii))&lt;/b&gt; One local exclusive telephone must be made available by the ISP at the monitoring centre at the cost of the ISP. &lt;b&gt;(Section 34.27 (a(iii))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Each route/switch of the ISP should be connected by the LAN operating at the same speed as the router/switch; the monitoring equipment will be connected to this network. &lt;b&gt;(Section 34.27 (a(v))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP must provide traceable identity of their subscribers. In the case of roaming subscribers the ISP must try to obtain the traceable identity of roaming subscribers from the foreign company. &lt;b&gt;(Section 34.27 (ix))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;On request of the licensor or any other authorized agency, the ISP must be able to provide the geographical location of any subscriber (BTS location of wireless subscriber) at a given point of time. &lt;b&gt;(Section 34.27 (x))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Suitable technical devices should be made available to designated security agencies in which a mirror image of the remote access information is available on line for monitoring purposes. &lt;b&gt;(Section 34.27 (xiv))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A complete audit trail of the remote access activities pertaining to the network operated in India should be maintained for a period of six months and provided on request. &lt;b&gt;(Section 34.27 (xv))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;ISPs must provide access of their network and other facilities, as well as books to security agencies. &lt;b&gt;(Section 34.27 (xx))&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12. &lt;/b&gt;&lt;b&gt;Principle - Safeguards for international cooperation&lt;/b&gt;:&lt;i&gt; In response to changes in the flows of information and the technologies and services that are now used to communicate, governments may have to work across borders to fight crime. Mutual legal assistance treaties (MLATs) should ensure that, where the laws of more than one state could apply to communications and communications metadata, the higher/highest of the available standards should be applied to the data. Mutual legal assistance processes and how they are used should also be clearly documented and open to the public. The processes should distinguish between when law enforcement agencies can collaborate for purposes of intelligence as opposed to sharing actual evidence. Moreover, governments cannot use international cooperation as a means to surveil people in ways that would be unlawful under their own laws. States must verify that the data collected or supplied, and the mode of analysis under MLAT, is in fact limited to what is permitted. In the absence of an MLAT, service providers should not respond to requests of the government of a particular country requesting information of users if the requests do not include the same safeguards as providers would require from domestic authorities, and the safeguards do not match these principles. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; India currently has signed 32 MLAT treaties with other countries, each with its own provisions and conditions relating to access to information. The provisions of the Information Technology Act 2000 apply to any contravention of the Act that is committed outside of India, thus the Rules related to interception, monitoring, decryption etc. would apply to any contravention of the Act outside of India. The provisions of the Indian Telegraph Act only apply to communications within India, but the licenses do specify when information held by service providers cannot be transferred across borders.&lt;/p&gt;
&lt;p&gt;Below is a summary of the relevant provisions:&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ITA 2000&lt;/b&gt;: The Act will extend to the whole of India, and applies to any offence or contravention committed outside India by any person. &lt;b&gt;(Section 1(2))&lt;/b&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;UASL License:&lt;/b&gt; The service provider cannot transfer any accounting information relating to the subscriber or user information to any person or place outside of India (this does not restrict a statutorily required disclosure of financial nature. &lt;b&gt;(section (41.20 (viii))&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ISP License:&lt;/b&gt; For security reasons, domestic traffic of such entities as identified by the licensor will not be hauled or route to any place outside of India. &lt;b&gt;(Section 34.28 (iii)) &lt;/b&gt;ISPs shall also not transfer accounting information relating to the subscriber or user information to any person or place outside of India (this does not restrict a statutorily required disclosure of financial nature) &lt;b&gt;(Section 34.28 (viii))&lt;/b&gt;&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13. &lt;/b&gt;&lt;b&gt;&lt;i&gt;Principle - Safeguards against illegitimate access&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: To protect individuals against unwarranted attempts to access communications and communications metadata, governments should ensure that those authorities and organizations who initiate, or are complicit in, unnecessary, disproportionate or extra-legal interception or access are subject to sufficient and significant dissuasive penalties, including protection and rewards for whistleblowers, and that individuals affected by such activities are able to access avenues for redress. Any information obtained in a manner that is inconsistent with these principles is inadmissible as evidence in any proceeding, as is any evidence derivative of such information. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; Though relevant Indian legislation does provide penalty for unauthorized interception or access, the penalty applies only to service providers, and does not hold governmental agencies responsible. Currently there are no avenues of redress for the individual, and there are no protections or rewards for whistleblowers. Both of these safeguards are recommended by the principle.&lt;/p&gt;
&lt;p&gt;The relevant provisions are summarized below:&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;TA Rules 2007:&lt;/b&gt; The Telegraph Act: The service provider must put in place internal checks to ensure that unauthorized interception of messages does not take place. &lt;b&gt;(Section 14)&lt;/b&gt; Service providers are also responsible for actions of their employees. In the case of unauthorized interception or a breach in security on the part of the service provider, service providers can be held liable with penalty of imprisonment from 1 to 3 years and or a fine of rs.500 – 1000 depending on the exact violation&lt;b&gt;. (Section 20, 20A, 23, and  24 Indian Telegraph Act)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; ITA Interception and Monitoring Rules:&lt;/b&gt; The intermediary must be responsible for the actions of their employees and in the case of violation pertaining to the maintenance of secrecy and confidentiality of intercepted material or unauthorized interception, monitoring, or decrypting of information – the intermediary will be held liable under the relevant provisions of the laws in force. &lt;b&gt;(Section 21)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; ITA Traffic Monitoring Rules:&lt;/b&gt; The intermediary must be responsible for the actions of their employees and in the case of violation pertaining to the maintenance of secrecy and confidentiality of intercepted material or unauthorized interception, monitoring, or decrypting of information – the intermediary will be held liable under the relevant provisions of the laws in force. &lt;b&gt;(Section 6)&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;UASL License: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In order to maintain privacy of voice and data, monitoring must be done in accordance with the 2007 Rules established under the Indian Telegraph Act, 1885. &lt;b&gt;(Section 41.20 (xix))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Any damage arising from the failure of the service provider to provider tracing assistance to the government for purposes of national security is payable by the service provider. &lt;b&gt;(Section 40.4)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ISP License:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In order to maintain the privacy of voice and data, monitoring can only be carried out after authorization by the Union Home Secretary or Home Secretaries of the State/Union Territories. &lt;b&gt;(Section 34.28 (xix))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP indemnifies the licensor against all actions brought against the licensor for breach of privacy or unauthorized interruption of data transmitted by the subscribers. &lt;b&gt;(Section 8.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Any damages that occur from non-compliance on the part of the ISP must be paid by the ISP. &lt;b&gt;(Section 33.4)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14. &lt;/b&gt;&lt;b&gt;&lt;i&gt;Principle - Cost of surveillance&lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;:&lt;/i&gt;&lt;/b&gt;&lt;i&gt; The financial cost of providing access to user data should be borne by the public authority undertaking the investigation. Financial constraints place an institutional check on the overuse of orders, but the payments should not exceed the service provider’s actual costs for reviewing and responding to orders, as such would provide a perverse financial incentive in opposition to user’s rights.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In India, the ISP and the UASL licenses specifically state that the cost of providing facilities must be borne by the service provider. Though the ITA Interception and Monitoring Rules do require intermediaries to provide facilities, it is not clear from the Rules where the burden of the cost will fall. Currently, there are no requirements that the cost of access to user data should be borne by the public authority undertaking the investigation. This standard is recommended by the principle.&lt;/p&gt;
&lt;p&gt;Below are summaries of relevant provisions:&lt;/p&gt;
&lt;li&gt;&lt;b&gt;UASL License&lt;/b&gt;:           
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; Any damage arising from the failure of the service provider to provider tracing assistance to the government for purposes of national security is payable by the service provider. &lt;b&gt;(Section 40.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Suitable monitoring equipment as may be prescribed for each type of system used will be provided by the service provider for monitoring as and when required by the licensor. &lt;b&gt;(Section 41.7)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The hardware and software required for the monitoring of calls must be engineered, provided/installed, and maintained by the service provider at the service providers cost. However the respective Government instrumentality must bear the cost of the user end hardware and leased line circuits from the MSC/Exchange/MGC/MG to the monitoring centers to be located as per their choice in their premises. &lt;b&gt;(Section 41.10)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider must ensure that the necessary provision (hardware/software) is available in their equipment for doing the Lawful Interception and monitoring from a centralized location. &lt;b&gt;(Section 41.20 (xvi))&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ISP License:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Any damages that occur from non-compliance on the part of the ISP must be paid by the ISP. &lt;b&gt;(Section 33.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The hardware at the ISP end and the software required for monitoring of calls must be engineered, provided/installed, and maintained by the ISP. &lt;b&gt;(Section 34.7)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Every international gateway with a route/switch having a capacity of 2Mbps must be equipped with a monitoring Centre at the cost of the ISP. The cost of meeting the requirements of the security agencies, the cost of maintenance of the monitoring equipment and infrastructure must be borne by the ISP. &lt;b&gt;(Section 34.27 (a(i))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Office space of 10 by 10 feet with adequate power supply and air-conditioning must be provided by the ISP free of cost. &lt;b&gt;(Section 34.27 (a(ii))&lt;/b&gt; One local exclusive telephone must be made available by the ISP at the monitoring centre at the cost of the ISP. &lt;b&gt;(Section 34.27 (a(iii))&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comparison-of-indian-legislation-and-draft-principles-on-surveillance-of-communications'&gt;https://cis-india.org/internet-governance/blog/comparison-of-indian-legislation-and-draft-principles-on-surveillance-of-communications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:40:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/january-2013-bulletin">
    <title>January 2013 Bulletin </title>
    <link>https://cis-india.org/about/newsletters/january-2013-bulletin</link>
    <description>
        &lt;b&gt;We at the Centre for Internet &amp; Society (CIS) wish you all a great year ahead and welcome you to the first issue of our newsletter for the year 2013. This issue brings you an overview of our research programs, events organised and participated, news and media coverage, and videos of recent events.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;CIS is seeking applications for the posts of &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2675&amp;amp;qid=263491" target="_blank"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge — Indic Language Initiatives), &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2676&amp;amp;qid=263491" target="_blank"&gt;Developer&lt;/a&gt; (NVDA Project), &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2677&amp;amp;qid=263491" target="_blank"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge and Openness), and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2678&amp;amp;qid=263491" target="_blank"&gt;Programme Officer&lt;/a&gt; (Internet Governance). To apply send your resume to &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; and &lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;.  For our Privacy project, we are seeking applications for the post of  Researcher, Technology/Security Expert, Graphic Designer as well as for  internships. To apply for these posts, please send in your resume to Elonnai Hickok (&lt;a href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;).&lt;/p&gt;
&lt;h2&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2679&amp;amp;qid=263491" target="_blank"&gt;Accessibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align:justify; "&gt;CIS is carrying out two projects in partnership with the &lt;b&gt;Hans Foundation&lt;/b&gt;. The first one is to create a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India and the second  one is for developing a screen reader and text to speech synthesizer  for Indian languages. We are also working with the World Blind Union to  develop the Treaty for Improved Access for Blind, Visually Impaired and  other Reading Disabled Persons, and assisting in the negotiations at WIPO:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;National Resource Kit for Persons with Disabilities&lt;/h3&gt;
&lt;p style="text-align:justify; "&gt;Anandhi Viswanathan from CIS and Manojna Yeluri from the Centre for Law and Policy Research are working in this project. Shruti Ramakrishnan has left the project. Draft chapters have been published. Feedback and comments are invited from readers for the chapter on Haryana:&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-haryana-chapter-call-for-comments" class="external-link"&gt;The Haryana Chapter&lt;/a&gt; (by Anandi Viswanathan,  January 31, 2012): The state implements the provisions under the  central laws, particularly the Persons with Disabilities (Equal  Opportunities, Protection of Rights and Full Participation) Act 1995 and  the National Trust for Welfare of Persons with Autism, Cerebral Palsy,  Mental Retardation and Multiple Disabilities Act 1999.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Submission / Notification&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2681&amp;amp;qid=263491" target="_blank"&gt;Making Public Libraries Accessible to People with Disabilities&lt;/a&gt; (by Rahul Cherian, January 23, 2013): CIS was one of the 20 disability rights groups that wrote to the Ministry of Culture.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2682&amp;amp;qid=263491" target="_blank"&gt;Government of Madhya Pradesh initiates ICT Accessibility in Public Communication&lt;/a&gt; (by Nirmita Narasimhan, January 31, 2013): CIS with Daisy Forum of India member Arushi in Bhopal submitted a request for a notification mandating that all communication by the Government of Madhya Pradesh should be accessible to persons with disabilities.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Report&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2683&amp;amp;qid=263491" target="_blank"&gt;Accessible Broadcasting in India&lt;/a&gt; (by Srividya Vaidyanathan, January 11, 2013): The abridged version of ITU’s report "Making Television Accessible" which was initially put up for comments last year has been updated once again.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2684&amp;amp;qid=263491" target="_blank"&gt;Linking Commercial Availability and Exceptions in the Treaty for Visually Impaired/Persons with Disabilities&lt;/a&gt; (by Rahul Cherian, January 23, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2685&amp;amp;qid=263491" target="_blank"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align:justify; "&gt;In partnership with the &lt;b&gt;International Development Research Centre&lt;/b&gt; we are doing a project on Pervasive Technologies examining the  relationship between production of pervasive technologies and  intellectual property. The &lt;b&gt;Wikimedia Foundation&lt;/b&gt;’s  India Program to support and develop free knowledge in India is now  being executed by us. We are also supporting the Iraq government in  developing an eGovernment Interoperability Framework:&lt;/p&gt;
&lt;h3&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2686&amp;amp;qid=263491" target="_blank"&gt;Wikipedia&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align:justify; "&gt;Beginning from September 1, 2012, Wikimedia Foundation has &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2686&amp;amp;qid=263491" target="_blank"&gt;awarded&lt;/a&gt; CIS a two-year grant of INR 26,000,000 to support and develop free knowledge in India. The &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2687&amp;amp;qid=263491" target="_blank" title="Access To&amp;lt;br &amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;   &amp;lt;br /&amp;gt;               Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of four members based in Delhi: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2688&amp;amp;qid=263491" target="_blank"&gt;T. Vishnu Vardhan&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2689&amp;amp;qid=263491" target="_blank"&gt;Nitika Tandon&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2689&amp;amp;qid=263491" target="_blank"&gt;Subhashish Panigrahi&lt;/a&gt; and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2689&amp;amp;qid=263491" target="_blank"&gt;Noopur Raval&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;New Project Director&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2688&amp;amp;qid=263491" target="_blank"&gt;T. Vishnu Vardhan&lt;/a&gt; is the new Programme Director-Access to Knowledge at CIS.  Vishnu has over the last 11 years  worked in various capacities as researcher, grant manager, teacher,  project consultant, information architect and translator. Vishnu managed  the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2690&amp;amp;qid=263491" target="_blank"&gt;Art, Crafts and Culture&lt;/a&gt; portfolio of &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2691&amp;amp;qid=263491" target="_blank"&gt;Sir Ratan Tata Trust&lt;/a&gt; and also worked as Research Coordinator at the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2692&amp;amp;qid=263491" target="_blank"&gt;Centre for the Study of Culture and Society&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;New Distinguished Fellow at CIS&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2693&amp;amp;qid=263491" target="_blank"&gt;Tejaswini Niranjana&lt;/a&gt;, a Senior Fellow at the Centre for the Study of Culture and Society (CSCS), Bangalore, and Visiting Professor at the Tata Institute of Social Sciences (TISS), Mumbai is joining our team as an Adviser to the 'Access to Knowledge' project. She will guide the A2K team in expanding the Indian language Wikipedias and in increasing the number of active editors through strategic partnerships with Higher Education institutions across India.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Reports&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2694&amp;amp;qid=263491" target="_blank"&gt;Access to Knowledge Report — September to December 2012&lt;/a&gt; (by Noopur Raval,  January 31, 2013): The report covers an overview of the activities done  by the Access to Knowledge team under the grant provided by the Wikimedia Foundation from September 2012 to December 2012.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2695&amp;amp;qid=263491" target="_blank"&gt;Indic Language Wikipedias — Statistical Report — 2012&lt;/a&gt; (by Shiju Alex, January 21, 2013): A statistical update of the Indic language Wikipedias for the year 2012 providing perspectives on the health of various Indic language communities as well as the state of various Indic language wikipedias.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Wiki Event Reports&lt;br /&gt; &lt;/b&gt;CIS organised a series of Wiki workshops in Goa in the month of December 2012, we bring you the reports from those events.&lt;/p&gt;
&lt;p style="text-align:justify; "&gt;&lt;i&gt;Note: The workshops were held in the month of December 2012 but the reports were published only in the month of January.&lt;/i&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2696&amp;amp;qid=263491" target="_blank"&gt;Two-day Wiki Workshop in Goa University: An Introduction&lt;/a&gt; (by Nitika Tandon, January 15, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2697&amp;amp;qid=263491" target="_blank"&gt;Wikipedia in St. Xavier's College, Mapusa, Goa&lt;/a&gt; (by Nitika Tandon, January 19, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2698&amp;amp;qid=263491" target="_blank"&gt;Bringing Konkani Encyclopedia in Public Domain&lt;/a&gt; (by Nitika Tandon, January 22, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2699&amp;amp;qid=263491" target="_blank"&gt;Promoting GLAM in Goa&lt;/a&gt; (by Nitika Tandon, January 24, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2700&amp;amp;qid=263491" target="_blank"&gt;Konkani in Wikipedia Incubator — Taking it to the Next Level&lt;/a&gt; (by Nitika Tandon, January 25, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;CIS also organised a Wiki workshop in Ghaziabad:&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2701&amp;amp;qid=263491" target="_blank"&gt;A Wiki Workshop at Raj Kumar Goel Institute of Technology, Ghaziabad&lt;/a&gt; (RKGIT, Ghaziabad, January 17, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Wiki Event Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2702&amp;amp;qid=263491" target="_blank"&gt;Celebrating the success of Wikipedia in Wikipedia Summit Pune 2013&lt;/a&gt; (organized by Wikipedia Club, Pune, January 12 – 13, 2013). Subhashish Panigrahi participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Wikipedia News Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2703&amp;amp;qid=263491" target="_blank"&gt;First Odia Wikipedia Education Program concludes at IIMC, Dhenkanal&lt;/a&gt; (Odisha Diary Bureau, Dhenkanal, January 27, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2704&amp;amp;qid=263491" target="_blank"&gt;Odia Wikipedia's 9th Anniversary and Workshop on Application of Odia in Media&lt;/a&gt; (Sambad, January 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Wiki Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2705&amp;amp;qid=263491" target="_blank"&gt;Odia Education Program&lt;/a&gt; (Indian Institute of Mass Communication, Dhenkanal, Orissa, January 26, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2706&amp;amp;qid=263491" target="_blank"&gt;Odia Wikipedia 9th Anniversary Celebration&lt;/a&gt; (Academy of Media Learning, Samantha Vihar, Bhubaneswar, Orissa, January 29, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Pervasive Technologies&lt;/h3&gt;
&lt;p style="text-align:justify; "&gt;The Pervasive Technologies project carries out research on the  intellectual property implicated in the hardware, software and content  available in low-cost mobile devices.The long-term outcome of this  project is to create a legitimate, legal space for these technologies to  exist on the Indian market.&lt;/p&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Events Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2707&amp;amp;qid=263491" target="_blank"&gt;Pervasive Technologies: Access to Knowledge in the Market Place — A Presentation by Sunil Abraham&lt;/a&gt; (FGV Law School, Rio de Janeiro, December 15, 2012).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2708&amp;amp;qid=263491" target="_blank"&gt;Fifth International IPR Conference&lt;/a&gt; (GIPC 2013) (organised by ITAG Business Solutions, Hotel Lalit Ashok, Bangalore, January 30, 2013): Snehashish Ghosh made a presentation on the Pervasive Technologies Project.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Other &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2709&amp;amp;qid=263491" target="_blank"&gt;Openness&lt;/a&gt; Updates&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Blog Posts / Columns&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;i&gt; &lt;/i&gt;
&lt;li&gt;&lt;i&gt; &lt;/i&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2710&amp;amp;qid=263491" target="_blank"&gt;The Violence of Knowledge Cartels&lt;/a&gt; (by Nishant Shah, Hybrid Publishing Lab, January 17, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2711&amp;amp;qid=263491" target="_blank"&gt;Remembering Aaron Swartz, Taking Up the Fight&lt;/a&gt; (by Nishant Shah, DML Central, January 24, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Interview &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2712&amp;amp;qid=263491" target="_blank"&gt;Aaron Swartz: The First Martyr of the Free Information Movement&lt;/a&gt;: Prabir Purkayastha interviewed Lawrence Liang on Newsclick, January 19, 2013. The video is published.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2713&amp;amp;qid=263491" target="_blank"&gt;Bangalore hackers write code as tribute to Aaron Swartz&lt;/a&gt; (by Deepa Kurup, Hindu, January 21, 2013. Sunil Abraham is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;h3 style="text-align: justify; "&gt;HasGeek&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;HasGeek creates discussion spaces for geeks and has organised conferences like the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2714&amp;amp;qid=263491" target="_blank"&gt;Fifth Elephant&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2715&amp;amp;qid=263491" target="_blank"&gt;Droidcon India 2011&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2716&amp;amp;qid=263491" target="_blank"&gt;Android Camp&lt;/a&gt;, etc. HasGeek is supported by CIS and works out from CIS office in Bengaluru.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align:justify; "&gt;Event Organized&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2717&amp;amp;qid=263491" target="_blank"&gt;Aaron Swartz Memorial Hacknight&lt;/a&gt; (CIS, Bangalore, January 19 – 20, 2013): Aaron’s collaborators such as &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2718&amp;amp;qid=263491" target="_blank"&gt;Anand Chitipothu&lt;/a&gt; and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2719&amp;amp;qid=263491" target="_blank"&gt;A S L Devi&lt;/a&gt; participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2720&amp;amp;qid=263491" target="_blank"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align:justify; "&gt;With &lt;b&gt;Privacy International&lt;/b&gt;,  London we signed an agreement to facilitate the implementation of  activities related to surveillance and freedom of speech and expression.  In this month we have blog posts on data retention, international  principles of surveillance and human rights and comparitive analysis of Indian legislation vis-à-vis draft of the International Principles on Surveillance of Communications by Ellonai Hickok, and columns by Sunil Abraham and Nishant Shah:&lt;/p&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Privacy Research&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2721&amp;amp;qid=263491" target="_blank"&gt;Data Retention in India&lt;/a&gt; (by Elonnai Hickok,  January 30, 2013): The post provides an insight into the data retention  mandates from the Government of India and data retention practices by  service providers.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2722&amp;amp;qid=263491" target="_blank"&gt;Draft International Principles on Communications Surveillance and Human Rights&lt;/a&gt; (by Elonnai Hickok,  January 16, 2013): These principles were developed by Privacy  International and the Electronic Frontier Foundation and seek to define  an international standard for the surveillance of communications.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2723&amp;amp;qid=263491" target="_blank"&gt;A Comparison of Indian Legislation to Draft International Principles on Surveillance of Communications&lt;/a&gt; (by Elonnai Hickok,  January 31, 2013): The principles, first drafted in October 2012 and  developed subsequently seek to establish an international standard for  surveillance of communications in the context of human rights. CIS is  contributing feedback to the drafting of the principles.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Columns/Op-eds&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2724&amp;amp;qid=263491" target="_blank"&gt;Web of Sameness&lt;/a&gt; (by Nishant Shah, Indian Express, January 18, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2725&amp;amp;qid=263491" target="_blank"&gt;TV versus Social Media: The Rights and Wrongs&lt;/a&gt; (by Sunil Abraham, The Tribune, January 20, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Statement&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2726&amp;amp;qid=263491" target="_blank"&gt;Statement of Solidarity on Freedom of Expression and Safety of Internet Users in Bangladesh&lt;/a&gt; (by Pranesh Prakash, January 15, 2013): This is a statement on the violent attack on blogger Asif Mohiuddin by the participants to the Third South Asian Meeting on the Internet and Freedom of Expression.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2727&amp;amp;qid=263491" target="_blank"&gt;No Civil Society Members in the Cyber Regulations Advisory Committee&lt;/a&gt; (by Pranesh Prakash, January 10, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2728&amp;amp;qid=263491" target="_blank"&gt;Five Frequently Asked Questions about the Amended ITRs&lt;/a&gt; (by Chinmayi Arun,  January 28, 2013): The author discusses the five major questions that  have been the subject of debate after the World Conference on  International Telecommunications 2012 (WCIT).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2729&amp;amp;qid=263491" target="_blank"&gt;DML Conference 2013&lt;/a&gt; (co-organised by CIS and Digital Media &amp;amp; Learning Research Hub Central, Sheraton  Chicago Hotel &amp;amp; Towers - Chicago, Illinois, March 14 – 16, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2730&amp;amp;qid=263491" target="_blank"&gt;An Introduction to Bitfilm and Bitcoin – A Discussion by Aaron Koenig&lt;/a&gt; (CIS, Bangalore, January 23, 2013): Aaron Koenig, Managing Director, Bitfilm Networks of Hamburg, Germany gave a talk.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Events Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2731&amp;amp;qid=263491" target="_blank"&gt;Panel Discussion on E-Commerce at NLSIU&lt;/a&gt; (organised by National Law School of India University, Bangalore, January 7, 2013). Pranesh Prakash was a panelist.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2732&amp;amp;qid=263491" target="_blank"&gt;Mobile Broadband: Leveraging for Business Transformation&lt;/a&gt; (Chancery Pavilion, Bangalore, January 9, 2013): Sunil Abraham was a panelist in this event.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2733&amp;amp;qid=263491" target="_blank"&gt;Third South Asian Meeting on the Internet and Freedom of Expression&lt;/a&gt; (organized by Internet Democracy Project, Voices for Interactive Choice  &amp;amp; Empowerment and Global Partners &amp;amp; Associates, Dhaka, January  14 – 15, 2013): Pranesh Prakash moderated the session on "Understanding cyber security and surveillance in South Asia”.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2734&amp;amp;qid=263491" target="_blank"&gt;Is Freedom of Expression under Threat in the Digital Age?&lt;/a&gt; (organized by Editors Guild of India, Index on Censorship and Sage,  India International Centre, New Delhi, January 15, 2013): Sunil Abraham  was a panelist at this event.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2735&amp;amp;qid=263491" target="_blank"&gt;7th India Digital Summit 2013&lt;/a&gt; (organised by Internet and Mobile Association of India, Lalit Hotel, New Delhi, January 16 – 17, 2013): Sunil Abraham was the  moderator for Plenary Session 3: Discussion on Social Media – Freedom,  Moderation or Regulation.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2736&amp;amp;qid=263491" target="_blank"&gt;9th International Asian Conference&lt;/a&gt; (organised by ITechLaw, February 14 – 15, 2013): Sunil Abraham will be participating as a panelist in the session on “Censorship of Online Content”.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2737&amp;amp;qid=263491" target="_blank"&gt;2012 in Review: Biometric ID Systems Grew Internationally...and So Did Concerns about Privacy&lt;/a&gt; (by Rebecca Bowe, Right Side News, January 1, 2013)&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2738&amp;amp;qid=263491" target="_blank"&gt;Cool Jobs | Parmesh Shahani, Head, Godrej India Culture Lab&lt;/a&gt; (LiveMint, January 4, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2739&amp;amp;qid=263491" target="_blank"&gt;Clash of the cyberworlds&lt;/a&gt; (by Latha Jishnu, Dinsa Sachan and Moyna, Down to Earth, January 15, 2013 issue). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2740&amp;amp;qid=263491" target="_blank"&gt;Is freedom of expression under threat in digital age?&lt;/a&gt; (originally published by&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2741&amp;amp;qid=263491" target="_blank"&gt; Indo Asian News Service&lt;/a&gt;, January 16, 2013 and also covered in the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2742&amp;amp;qid=263491" target="_blank"&gt;Business Standard&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2743&amp;amp;qid=263491" target="_blank"&gt;Vancouver Desi&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2744&amp;amp;qid=263491" target="_blank"&gt;DNA&lt;/a&gt;, and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2745&amp;amp;qid=263491" target="_blank"&gt;Tech2&lt;/a&gt;). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2746&amp;amp;qid=263491" target="_blank"&gt;Is freedom of expression under threat in the digital age?&lt;/a&gt; (by Mahima Kaul, Index on Censorship, January 18, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2747&amp;amp;qid=263491" target="_blank"&gt;Internet Freedom in India – Open to Debate&lt;/a&gt; (by Kirsty Hughes, Index on Censorship, January 22, 2013). CIS research on censorship is quoted.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2748&amp;amp;qid=263491" target="_blank"&gt;Cyber security, surveillance and the right to privacy: country perspectives&lt;/a&gt; (by Richa Kaul Padte, Internet Democracy Project).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2749&amp;amp;qid=263491" target="_blank"&gt;Surveillance Camp: Privatized State Surveillance&lt;/a&gt; (by Katitza Rodriguez, Electronic Frontier Foundation, January 28, 2013). Elonnai Hickok is quoted.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2750&amp;amp;qid=263491" target="_blank"&gt;An innovative concept comes to the fore&lt;/a&gt; (Deccan Herald, January 29, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;h3&gt;Internet Access – Knowledge Repository&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;In  partnership with Ford Foundation, CIS was tasked to produce and   disseminate modules on various aspects of telecommunications including   policy, regulations, infrastructure and market. However, as on November   9, 2012 there was a change in the mandate of the project. Currently, we   are working on building a knowledge repository on “Internet Access”.   This new repository will cover the history of the internet, technologies   involved, principle and values of internet access, broadband market  and  universal access. It will also touch upon various polices and   regulations which has an impact on internet access and bodies and   mechanism which are responsible for such policy formulation. For this  purpose we will be hosting a new website:&lt;span class="visualHighlight"&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2751&amp;amp;qid=263491" target="_blank"&gt;www.internet-institute.in&lt;/a&gt;&lt;/span&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;We are  also organizing an “Institute on Internet and Society” in  collaboration  with the Ford Foundation India, which is to be held from  June 8, 2013 to  June 14, 2013. Call for registrations and relevant  details will be soon  announced on our website.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2752&amp;amp;qid=263491" target="_blank"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align:justify; "&gt;While the  potential for growth and returns exist for telecommunications in India,  a range of issues need to be addressed. One aspect is more extensive  rural coverage and the other is a countrywide access to broadband which  is low. Both require effective and efficient use of networks and  resources, including spectrum.:&lt;/p&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Column by Shyam Ponappa&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2753&amp;amp;qid=263491" target="_blank"&gt;What's Needed Is User-Centric Design, Not Good Intentions&lt;/a&gt; (by Shyam Ponappa, Business Standard, January 3, 2013 and Organizing India Blogpost, January 6, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event(s) Participated &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;21&lt;sup&gt;st&lt;/sup&gt; Convergence Conference Conference India 2013 (organized by Exhibitions  India Group, January 16 – 17, 2013, Pragati Maidan, New Delhi). Snehashish Ghosh participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2754&amp;amp;qid=263491" target="_blank"&gt;Digital Humanities&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align:justify; "&gt;From 2012  to 2015, the Researchers At Work series is focusing on building  research clusters in the field of Digital Humanities. We organised the first Habits of Living workshops in Bangalore last year. The next workshop is being held in Brown University:&lt;/p&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Habits of Living Workshop&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2755&amp;amp;qid=263491" target="_blank"&gt;Habits of Living: Networked Affects, Glocal Effects&lt;/a&gt; (organised by CIS and Brown University, March 21 – 23, 2013, Brown University, Rhode Island). Nishant Shah will be speaking at this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt; 
&lt;hr /&gt;
&lt;h2 style="text-align: center; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2756&amp;amp;qid=263491" target="_blank"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;CIS was registered as a society in Bangalore in 2008. As an independent,  non-profit research organisation, it runs different policy research  programmes such as Accessibility, Access to Knowledge, Openness,  Internet Governance, and Telecom. The policy research programmes have  resulted in outputs such as the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2757&amp;amp;qid=263491" target="_blank"&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;/a&gt; with ITU and G3ict, and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2758&amp;amp;qid=263491" target="_blank"&gt;Digital Alternatives with a Cause?&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2759&amp;amp;qid=263491" target="_blank"&gt;Thinkathon Position Papers&lt;/a&gt; and the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2760&amp;amp;qid=263491" target="_blank"&gt;Digital Natives with a Cause? Report&lt;/a&gt; with Hivos,  etc. We have conducted policy research for the Ministry of   Communications &amp;amp; Information Technology, Ministry of Human  Resource  Development, Ministry of Personnel, Public Grievances  and  Pensions,  Ministry of Social Justice and Empowerment, etc., on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2761&amp;amp;qid=263491" target="_blank"&gt;WIPO Treaties&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2762&amp;amp;qid=263491" target="_blank"&gt;Copyright Bill&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2763&amp;amp;qid=263491" target="_blank"&gt;NIA Bill&lt;/a&gt;, etc.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;CIS is accredited as an observer at WIPO. CIS staff participates in the  Standing Committee for Copyright and Related Rights (SCCR)  meetings  regularly held in Geneva, and participate in the discussions  and  comments on them from a public interest perspective. Our Policy   Director, Nirmita Narasimhan won the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2764&amp;amp;qid=263491" target="_blank"&gt;National Award for Empowerment of Persons with Disabilities&lt;/a&gt; from the Government of India and also received the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2765&amp;amp;qid=263491" target="_blank"&gt;NIVH Excellence Award&lt;/a&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;/ul&gt;
&lt;h3&gt;Follow us elsewhere&lt;/h3&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;li&gt; Get short, timely messages from us on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2766&amp;amp;qid=263491" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Join the CIS group on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2767&amp;amp;qid=263491" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Visit us at &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2768&amp;amp;qid=263491" target="_blank"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Support Us&lt;/h3&gt;
&lt;p style="text-align:justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Request for Collaboration&lt;/h3&gt;
&lt;p style="text-align:justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society  and improve our understanding of this new field. To discuss the  research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align:justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/january-2013-bulletin'&gt;https://cis-india.org/about/newsletters/january-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-06-11T11:56:35Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/rti-on-complaints-under-it-act-section-79">
    <title>RTI on Complaints under Section 79 of IT Act</title>
    <link>https://cis-india.org/internet-governance/resources/rti-on-complaints-under-it-act-section-79</link>
    <description>
        &lt;b&gt;The Department of Electronics and Information Technology, Ministry of Communications and Information Technology, gave its reply to an RTI application filed by Saket Bisani. We are reproducing the text below:&lt;/b&gt;
        &lt;p style="text-align: center; "&gt;&lt;b&gt;No. 14(146)/2012-ESD&lt;/b&gt;&lt;br /&gt;M/o Communications &amp;amp; Information Technololgy&lt;br /&gt;Department of Electronics &amp;amp; Information Technology&lt;br /&gt;Electronics Niketan,6, CGO Complex&lt;br /&gt;New Delhi-110003&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th colspan="4"&gt;Dated: 15.1.13&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: left; "&gt;Subject: RTI application received from Shri Saket Biswani&lt;/p&gt;
&lt;p style="text-align: left; "&gt;With reference to your RTI application requesting for the following information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an article titled "We believe in the freedom of speech and expression" published in Mint of February 1, 2012, Dr. Gulshan Rai has been quoted saying:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"if the police say something has to be disabled, we tell then (Google and others) that a complaint has come under section 79 of the IT Act. We feel them: "we're bringing it to your notice. Please look at it and do whatever best you can do under the law."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With respect the above quote I request you to provide me the following information under Right to Information Act, 2005:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Please provide me a copy of every complaint that has been received by the Department of Information Technology (now the Department of Electronics and Information Technology) under Section 79 of the Information Technology Act, 2000.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please provide me a copy of every notice and complaint that your office has sent pursuant to complaints received under section79 of the Information Technology Act, 2000.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The information as received from the custodian of the information is placed below:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Department of Electronics and Information Technology has not received any complaint quoting specifically under Section 79 of the Information Technology Act,2000.&lt;/li&gt;
&lt;li&gt;Not applicable.&lt;/li&gt;
&lt;/ol&gt; 
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th colspan="7"&gt;(A.K. Kaushik)&lt;br /&gt;Additional Director &amp;amp; CPIO&lt;br /&gt;(E-Security &amp;amp; Cyber Laws)&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: left; "&gt;Shri Saket Bisani &lt;br /&gt;No. 194, 2nd ׳C Cross &lt;br /&gt;Domlur 2nd Stage * &lt;br /&gt;Bangalore-560 071&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: left; "&gt;Read a &lt;a href="https://cis-india.org/internet-governance/blog/reply-to-rti-application-from-saket-bisani.pdf" class="internal-link"&gt;scanned version&lt;/a&gt; of the reply that we got from the Department of Electronics and Information Technology.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/rti-on-complaints-under-it-act-section-79'&gt;https://cis-india.org/internet-governance/resources/rti-on-complaints-under-it-act-section-79&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-12T09:50:40Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/deccan-herald-january-29-2013-an-innovative-concept-comes-to-the-fore">
    <title>An innovative concept comes to the fore</title>
    <link>https://cis-india.org/news/deccan-herald-january-29-2013-an-innovative-concept-comes-to-the-fore</link>
    <description>
        &lt;b&gt;There’s very little awareness about Bitcoin — a new digital currency and payment system, designed for the voting process of ‘Bitfilm 13’  — in the City. Aaron Koenig, the managing director at Bitfilm Networks Hamburg, addressed this issue recently, during a talk held at The Centre for Internet and Society. The talk was based on the creation of Bitcoin and its various uses.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.deccanherald.com/content/308243/an-innovative-concept-comes-fore.html"&gt;published in the Deccan Herald&lt;/a&gt; on January 29, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"The potential of Bitcoin is huge. It’s easy to use and currently, there are about 21 million (units of) Bitcoin in the world and everyone accepts it. It works differently, but it is the same as gold and has an intrinsic value," explains Aaron.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aaron also showed cryptographic diagrams of how a Bitcoin transaction works. "It is a clever way of encryption and it is easy to open an account. You just need to download some software and then, you get a virtual wallet and a user ID and password. The identity of the person is kept anonymous and hence, there have been instances of people misusing Bitcoin," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An animated short film about Bitcoin, which Aaron produced along with an animation team based in Bangalore, was also screened during the talk. "I have paid all the animators in Bitcoin. Initially, they were hesitant and did not want to accept it. But when they got to know about how its value almost doubles itself in the span of a year, they readily accepted it," he explains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There is a German restaurant where Bitcoin is accepted. Slowly, more such places are coming up, as people are realising its worth. It is easy to transfer," he adds. There was an interactive session with the audience after the talk, which was equally interesting. Many wanted to know if Bitcoin can be liquidated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I am very curious to know if Bitcoin can be liquidated. Also, what is the exact process that one should follow when they want to liquidate Bitcoin?" questions Geane, who was attending the session. These queries, as well as many others, were addressed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vinod, who also attended the session, says that it was a new concept and interesting for those who wanted to know more. "The concept of a new form of money sounds great and Aaron really helped us get to know more about it. For people like us, who had no clue about Bitcoin, it was an enlightening session," he informs.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/deccan-herald-january-29-2013-an-innovative-concept-comes-to-the-fore'&gt;https://cis-india.org/news/deccan-herald-january-29-2013-an-innovative-concept-comes-to-the-fore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-30T06:04:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/data-retention-in-india">
    <title>Data Retention in India</title>
    <link>https://cis-india.org/internet-governance/blog/data-retention-in-india</link>
    <description>
        &lt;b&gt;As part of its privacy research, the Centre for Internet and Society has been researching upon data retention mandates from the Government of India and data retention practices by service providers. Globally, data retention has become a contested practice with regards to privacy, as many governments require service providers to retain more data for extensive time periods, for security purposes. Many argue that the scope of the retention is becoming disproportional to the purpose of investigating crimes. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;The Debate around Data Retention&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the EU, data retention &lt;i&gt;“refers to the storage of traffic and location data resulting from electronic communications (not data on the content of the communications)”&lt;/i&gt;.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The debate around data retention has many sides, and walks a fine line of balancing necessity with proportionality. For example, some argue that the actual retention of data is not harmful, and at least some data retention is necessary to assist law enforcement in investigations. Following this argument, the abuse of information is not found in the retention of data, but instead is found by who accesses the data and how it is used. Others argue that any blanket or &lt;i&gt;a priori &lt;/i&gt;data&lt;i&gt; &lt;/i&gt;retention requirements are increasingly becoming disproportional and can lead to harm and misuse. When discussing data retention it is also important to take into consideration what type of data is being collected and by what standard is access being granted. Increasingly, governments are mandating that service providers retain communication metadata for law enforcement purposes. The type of authorization required to access retained communication metadata varies from context to context. However, it is often lower than what is required for law enforcement to access the contents of communications. The retention and lower access standards to metadata is controversial because metadata can encompass a wide variety of information, including IP address, transaction records, and location information — all of which can reveal a great deal about an individual.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;Furthermore, the definition of metadata changes and evolves depending on the context and the type of information being generated by new technologies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Retention vs. Data Preservation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Countries have taken different stances on what national standards for data retention by service providers should be. For example, in 2006 the EU passed the Data Retention Directive which requires European Internet Service Providers to retain telecom and Internet traffic data from customers' communications for at least six months and upto two years. The stored data can be accessed by authorized officials for law enforcement purposes.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Despite the fact that the Directive pertains to the whole of Europe, in 2010 the German Federal Constitutional Court annulled the law that harmonized German law with the Data Retention Directive.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; Other European countries that have refused to adopt the Directive include the Czech Republic and Romania.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Instead of mandating the retention of data, Germany, along with the US, mandates the 'preservation' of data. The difference being that the preservation of data takes place through a specified request by law enforcement, with an identified data set. In some cases, like the US, after submitting a request for preservation, law enforcement must obtain a court order or subpoena for further access to the preserved information.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Data Retention in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, the government has established a regime of data retention. Retention requirements for service providers are found in the ISP and UASL licenses, which are grounded in the Indian Telegraph Act, 1885.&lt;/p&gt;
&lt;h3&gt;ISP License&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the ISP License,&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; there are eight categories of records that service providers are required to retain for security purposes that pertain to customer information or transactions. In some cases the license has identified how long records must be maintained, and in other cases the license only states that the records must be made available and provided. This language implies that records will be kept.&lt;/p&gt;
&lt;p&gt;According to the ISP License, each ISP must maintain:&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;span&gt; &lt;/span&gt;
&lt;li&gt;&lt;span&gt;&lt;b&gt;&lt;span&gt;Users and Services&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;: A log of all users connected and the service they are using, which must be available in real time to the Telecom Authority. (Section 34.12).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;b&gt;&lt;span&gt;Outward Logins or Telnet&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;: A log of every outward login or telnet through an ISPs computer must be available in real time to the Telecom Authority. (Section 34.12).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Packets&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; Copies of all packets originating from the Customer Premises Equipment of the ISP must be available in real time to the Telecom Authority. (Section 34.12).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Subscribers&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; A complete list of subscribers must be made available on the ISP website with password controlled access, available to authorized Intelligence Agencies at any time. (Section 34.12).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Internet Leased Line Customers&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; A complete list of Internet leased line customers and their sub-customers consisting of the following information: name of customer, IP address allotted, bandwidth provided, address of installation, date of installation/commissioning, and contact person with phone no./email. These must be made available on a password protected website (Section 34.14).  The password and login ID must be provided to the DDG (Security), DoT HQ and concerned DDG(VTM) of DoT on a monthly basis. The information should also be accessible to authorized government agencies (Section 34.14).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Diagram Records and Reasons&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; A record of complete network diagram of set-up at each of the internet leased line customer premises along with details of connectivity must be made available at the site of the service provider. All details of other communication links (PSTN, NLD, ILD, WLL, GSM, other ISP) plus reasons for taking the links by the customer must be recorded before the activation of the link. These records must be readily available for inspection at the respective premises of all internet leased line customers (Section 34.18).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; 
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Commercial Records&lt;/span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; All commercial records with regard to the communications exchanged on the network must be maintained for a year (Section 34.23).&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Location&lt;/span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt; The service provider should be able to provide the geographical location of any subscriber at a given point of time (Section 34.28(x).&lt;/p&gt;
&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;span&gt; &lt;/span&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Remote Activities&lt;/span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; A complete audit trail of the remote access activities pertaining to the network operated in India. These must be retained for a period of six months, and must be provided on request to the licensor or any other agency authorized by the licensor (Section 34.28 (xv).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;UASL License&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the UASL License&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;, &lt;span&gt;there are twelve categories of records that ISP’s are required to retain that pertain to costumer information or transactions for security purposes. In some cases the license has identified how long records must be maintained, and in other cases the license only states that the information must be provided and made available when requested. This language implies that records will be kept. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;According to the license, service providers must maintain and make available: &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Numbers&lt;/span&gt;&lt;/span&gt;&lt;span&gt;: &lt;/span&gt;&lt;/b&gt;&lt;span&gt;Called/calling party mobile/PSTN numbers when required. Telephone numbers of any call-forwarding feature when required (Section 41.10).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Interception records: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;Time, date and duration of interception when required (Section 41.10).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; 
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Location:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; Location of target subscribers. For the present, cell ID should be provided for location of the target subscriber when required (Section 41.10).&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;All call records:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; All call data records handled by the system when required (Section 41.10). This includes:&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Failed call records:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; Call data records of failed call attempts when required. (Section 41.10).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Roaming subscriber records&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;: Call data records of roaming subscribers when required. (Section 41.10)&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Commercial records: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;All commercial records with regards to the communications exchanged on the network must be retained for one year (Section 41.17).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Outgoing call records: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;A record of checks made on outgoing calls completed by customers who are making large outgoing calls day and night to various customers (Section 41.19(ii)).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Calling line Identification:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; A list of subscribers including address and details using calling line identification should be kept in a password protected website accessible to authorized government agencies (Section 41.19 (iv)).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; 
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Location:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; The service provider must be able to provide the geographical location of any subscriber at any point of time (Section 41.20(x)).&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Remote access activities:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;Complete audit trail of the remote access activities pertaining to the network operated in India for a period of six months (Section&lt;span&gt; &lt;/span&gt;41.20 (xv)).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;RTI Request to &lt;a href="https://cis-india.org/internet-governance/blog/bsnl-rti" class="internal-link"&gt;BSNL&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/blog/mtnl-rti-request.pdf" class="internal-link"&gt;MTNL&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;On September 10,&lt;sup&gt;&lt;/sup&gt; 2012, the Centre for Internet and Society sent an RTI to MTNL and BSNL with the following questions related to the respective data retention practices: &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;ul type="disc"&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Does      MTNL/BSNL store the following information/data:&lt;/span&gt;&lt;/li&gt;
&lt;ul type="circle"&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Text       message detail (To and from cell numbers, timestamps)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Text       message content (The text and/or data content of the SMS or MMS)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Call       detail records (Inbound and outbound phone numbers, call duration)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Bill       copies for postpaid and recharge/top-up billing details for prepaid&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Location       data (Based on cell tower, GPS, Wi-Fi hotspots or any combination       thereof)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;If it      does store data then&lt;/span&gt;&lt;/li&gt;
&lt;ul type="circle"&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;For what       period does MTNL/BSNL store: SMS and MMS messages, cellular and mobile       data, customer data?&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;What       procedures for retention does MTNL/BSNL have for: SMS and MMS messages,       cellular and mobile data, and customer data?&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;What       procedures for deletion of: SMS and MMS messages, cellular and mobile       data, and customer data?&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;What       security procedures are in place for SMS and MMS messages, cellular and       mobile data, and customer data?&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;h3&gt;BSNL Response&lt;/h3&gt;
&lt;p&gt;BSNL replied by stating that it stores at least three types of information including:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol type="1"&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;IP session information -      connection start end time, bytes in and out (three years offline)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;MAC address of the modem/router/device (three years offline)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Bill copies for post paid and recharge/top up billing details      for prepaid. Billing information of post paid Broadband are available in      CDR system under ITPC, prepaid voucher details (last six months).&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;MTNL Response&lt;/h3&gt;
&lt;p&gt;MTNL replied by stating that it stores at least () types of information including:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol type="1"&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Text message details (to and from cell number, timestamps) in      the form of CDRs&lt;span&gt; &lt;/span&gt;(one year)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Call detail records including inbound and outbound phone      numbers and call duration (one year)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Bill copies from postpaid (one year) &lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Recharge details for prepaid (three months) &lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Location of the mobile number if it has used the MTNL      GSM/3GCDMA network (one year)&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;It is interesting that BSNL stores information that is beyond the required time period required in both the ISP and the UASL licenses. The responses to the RTI showed that each service provider also stores different types of information. This could or could not be the actual case, as each question could have been interpreted differently by the responding officer.&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;Conclusion &lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt; &lt;span&gt;The responses to the RTI from BSNL and MTNL are a step towards understanding data retention practices in India, but there are still many aspects about data retention in India which are unclear including:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;What constitutes a ‘commercial record’ which must be stored for one year by service providers?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;How much data is retained by service providers on an annual basis?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;What is the cost involved in retaining data? For the service provider? For the public?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;How frequently is retained information accessed by law enforcement? What percentage of the data is accessed by law enforcement?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;How many criminal and civil cases rely on retained data?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;What is the authorization process for access to retained records? Are these standards for access the same for all types of retained data?&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;Having answers to these questions would be useful for determining if the Indian data retention regime is proportional and effective. It would also be useful in determining if it would be meaningful to maintain a regime of data retention or switch over to a more targeted regime of data preservation. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;Though it can be simple to say that a regime of data preservation is the most optimal choice as it gives the individual the greatest amount of immediate privacy protection, &lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;A regime of data preservation would mean that all records would be treated like an interception, where the police or security agencies would need to prove that a crime was going to take place or is in the process of taking place and then request the ISP to begin retaining specific records. This approach to solving crime would mean that the police would never use retained data or historical data as part of an investigation – to either solve a case or to take the case to the next level.&lt;span&gt; &lt;/span&gt;If Indian law enforcement is at a point where they are able to concisely identify a threat and then begin an investigation is a hard call to make. It is also important to note that though preservation of data can reduce the risk to individual privacy as it is not possible for law enforcement to track individuals based off of their historical data and access large amounts of data about an individual, preservation does not mean that there is no possibility for abuse. Other factors such as:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;Any request for preservation and access to records must be legitimate and proportional&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Accessed and preserved records must be used only for the purpose indicated &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;Accessed and preserved records can only be shared with authorized authorities&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;Any access to preserved records that do not pertain to an investigation must be deleted &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;These factors must be enforced through the application of penalties for abuse of the system. These factors can also be applied to not only a data preservation regime, but also a data retention regime and are focused on preventing the actual abuse of data after retained. That said, before an argument for either data retention or data preservation can be made for India it is important to understand more about data retention practices in India and use of retained data by Indian law enforcement and access controls in place. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;European Commission – Press  Release. Commission Takes Germany to Court Requesting that Fines be  Imposed. May 31st 2012. Available at:  &lt;a class="external-link" href="http://bit.ly/14qXW6o"&gt;http://bit.ly/14qXW6o&lt;/a&gt;. Last accessed:  January 21st 2013&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].Draft International Principles on Communications Surveillance and Human Rights: &lt;a class="external-link" href="http://bit.ly/UpGA3D"&gt;http://bit.ly/UpGA3D&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. European Commission – Press Release. Commission Takes Germany to Court Requesting that Fines be Imposed. May 31&lt;sup&gt;st&lt;/sup&gt; 2012. Available at:  &lt;a class="external-link" href="http://bit.ly/14qXW6o"&gt;http://bit.ly/14qXW6o&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_IP-12-530_en.htm"&gt;&lt;/a&gt;. Last accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. European Commission – Press Release. Commission Takes Germany to Court Requesting that Fines be Imposed. May 31&lt;sup&gt;st&lt;/sup&gt; 2012. Available at:  &lt;a class="external-link" href="http://bit.ly/14qXW6o"&gt;http://bit.ly/14qXW6o&lt;/a&gt;. Last accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013.&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Tiffen, S. Sweden passes controversial data retention directive. DW. March 22 2012. Available at: &lt;a class="external-link" href="http://bit.ly/WOfzaX"&gt;http://bit.ly/WOfzaX&lt;/a&gt;. Last Accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013.&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;].  Kristina, R. The European Union's Data Retention Directive and the  United State's Data Preservation Laws: Fining the Better Model. 5  Shilder J.L. Com. &amp;amp; Tech. 13 (2009) available at: &lt;a class="external-link" href="http://bit.ly/VoQxQ9"&gt;http://bit.ly/VoQxQ9&lt;/a&gt;. Last accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;].  Government of India. Ministry of Communications &amp;amp; IT Department of  Telecommunications. License Agreement for Provision of Internet  Services.&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].  Government of India. Ministry of Communications &amp;amp; IT Department of  Telecommunications. License Agreement for Provision of Unified Access  Services after Migration from CMTS. Amended December 3&lt;sup&gt;rd&lt;/sup&gt; 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/data-retention-in-india'&gt;https://cis-india.org/internet-governance/blog/data-retention-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:51:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
