<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2321 to 2335.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/la-times-nov-19-2012-emily-alpert-two-women-arrested-over-facebook-gripe-on-mumbai-shutdown"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/thinkdigit-internet-kul-bhushan-nov-15-2012-india-ranks-second-globally-in-accessing-private-details-of-users"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/information-technology-procedure-and-safeguards-for-blocking-for-access-of-information-by-public-rules-2009"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/telegraphindia-opinion-story-kavitha-shanmugham-nov-14-2012-post-and-be-damned"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/will-the-international-telecommunication-regulations-itrs-impact-internet-governance-a-multistakeholder-perspective"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/privacy-in-social-networked-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/statement-of-civil-society-members-and-groups-at-best-bits-pre-igf-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/steady-steps-foss-and-mdgs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/live-mint-politics-surabhi-agarwal-nov-6-2012-information-security-policy-on-govt-agenda"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/who-is-following-me"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/solutions-for-cross-border-data-flows"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/la-times-nov-19-2012-emily-alpert-two-women-arrested-over-facebook-gripe-on-mumbai-shutdown">
    <title>Two women arrested over Facebook gripe on Mumbai shutdown</title>
    <link>https://cis-india.org/news/la-times-nov-19-2012-emily-alpert-two-women-arrested-over-facebook-gripe-on-mumbai-shutdown</link>
    <description>
        &lt;b&gt;A woman who complained about the Indian city of Mumbai shutting down for the funeral of divisive Hindu nationalist politician Balasaheb Thackeray was arrested for "hurting religious sentiments," local police told reporters amid public anger over the case.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by &lt;span&gt;Emily Alpert appeared in &lt;a class="external-link" href="http://articles.latimes.com/2012/nov/19/world/la-fg-wn-arrest-facebook-mumbai-shutdown-20121119"&gt;Los Angeles Times&lt;/a&gt; on November 19, 2012. Pranesh Prakash is quoted.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Indian media identified the woman as Shaheen Dhada, 21, who reportedly wrote, "People like Thackeray are born and die daily and one should not observe a bandh [shutdown] for that.”&lt;/p&gt;
&lt;p&gt;Police also arrested a friend of hers who "liked" the comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Facebook remark spurred angry backers of Thackeray, a controversial figure who once openly called for attacks on Muslims, to assault a clinic owned by Dhada' uncle. Analysts told the Associated Press that the arrests appeared to be a move by police to head off any further violence from Thackeray supporters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Free-speech groups were outraged by the ransacking and arrests. In a blistering letter to the chief minister of Maharashtra state, a former Supreme Court justice who now heads the Press Council of India called the charges absurd and unlawful and demanded that the police officers involved be prosecuted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We are living in a democracy, not a fascist dictatorship," Markandey Katju wrote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Maharashtra director-general of police ordered a probe into the arrests Monday, Indian television station &lt;a href="http://ibnlive.in.com/news/mumbai-after-outrage-dgp-orders-probe-into-girls-arrest-over-antithackeray-facebook-post/306336-37.html"&gt;IBN reported&lt;/a&gt;. The two women were reportedly released on bail during the day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Shiv Sena political party that Thackeray founded has polarized Mumbai over the years with campaigns against Muslims and migrants. His death put the city on high alert over the weekend amid fears of violence. As shops were shuttered and taxis sat idle, some Mumbai residents grew frustrated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"When tens of thousands were making similar comments ... how did the police single out Shaheen Dhada and her friend for arrest?” wrote Pranesh Prakash of the &lt;a href="https://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A"&gt;Center for Internet and Society&lt;/a&gt;. He added, "This should not be written off as a harmless case of the police goofing up."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/la-times-nov-19-2012-emily-alpert-two-women-arrested-over-facebook-gripe-on-mumbai-shutdown'&gt;https://cis-india.org/news/la-times-nov-19-2012-emily-alpert-two-women-arrested-over-facebook-gripe-on-mumbai-shutdown&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-15T09:26:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/thinkdigit-internet-kul-bhushan-nov-15-2012-india-ranks-second-globally-in-accessing-private-details-of-users">
    <title>India ranks second globally in accessing private details of users</title>
    <link>https://cis-india.org/news/thinkdigit-internet-kul-bhushan-nov-15-2012-india-ranks-second-globally-in-accessing-private-details-of-users</link>
    <description>
        &lt;b&gt;According to the latest transparency report released by Google, India ranks second in the world for accessing private details of its citizens, only after the U.S. The Google report lists out requests it received from governments across the world to access details of users of its various services.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Kul Bhushan's blog post was &lt;a class="external-link" href="http://www.thinkdigit.com/Internet/India-ranks-second-globally-in-accessing-private_11364.html"&gt;published in thinkdigit&lt;/a&gt; on November 15, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.thinkdigit.com/latest/google.html" target="_blank"&gt;Google's&lt;/a&gt; data reveals India had made 2,319 requests involving 3,467 users in the first six months. The U.S. made 7,969 requests, while Brazil, which ranks third, made 1,566 requests during the same period. Worldwide 20,938 requests were made during the January-June period. The report says the information shared included complete Gmail account, chat logs, Orkut profile and search terms among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The requests for accessing user data from India had grown two-fold from 1,061 in July-December 2009 to 2,207 in July-December 2011, the report points out.&lt;br /&gt;&lt;br /&gt;According to the report, India has been consistently sending requests to remove content which it brands as defamatory and against national security. The court orders, however, to take down content has remained almost stagnant over the years; though requests from the executive and police have grown.&lt;br /&gt;&lt;br /&gt;In the first six months this year, there were 20 court orders and 64 requests from executive/police that resulted in 596 items being taken down from the web. During the January-June 2010 period, there were only eight court orders and 22 executive/police requests, resulting in 125 items being taken down. Read about Google's previous transparency report here.&lt;br /&gt;&lt;br /&gt;"Though India is a large country with a significant number of internet users, this data is nonetheless an indicator of growing surveillance," Times of India quotes Pranesh Prakash, policy director at Centre for Internet and Society ( CIS), a Bangalore-based organization looking at issues of public accountability, internet freedom and openness, as saying.&lt;br /&gt;&lt;br /&gt;"India lacks a general privacy law that helps set guidelines for such user requests, despite privacy being a constitutional right as part of the right to life," added Prakash.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/thinkdigit-internet-kul-bhushan-nov-15-2012-india-ranks-second-globally-in-accessing-private-details-of-users'&gt;https://cis-india.org/news/thinkdigit-internet-kul-bhushan-nov-15-2012-india-ranks-second-globally-in-accessing-private-details-of-users&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-19T04:49:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/information-technology-procedure-and-safeguards-for-blocking-for-access-of-information-by-public-rules-2009">
    <title>Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009</title>
    <link>https://cis-india.org/internet-governance/resources/information-technology-procedure-and-safeguards-for-blocking-for-access-of-information-by-public-rules-2009</link>
    <description>
        &lt;b&gt;G.S.R.781 (E).-- In exercise of the powers conferred by clause (z) of sub-section (2) of section 87, read with sub-section (2) of section 69A of the Information Technology Act 2000, (21 of 2000), the Central Government hereby makes the following rules, namely:&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;1. Short title and commencement.-- &lt;br /&gt; (1) These rules may be called the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;br /&gt; (2) They shall come into force on the date of their publication in the Official Gazette.&lt;br /&gt;&lt;br /&gt; 2. Definitions.-- &lt;br /&gt; In these rules, unless the context otherwise requires,-&lt;br /&gt; (a) "Act" means the Information Technology Act, 2000 (21 of 2000);&lt;br /&gt; (b) "computer resource" means computer resource as defined in clause (k) of sub-section (1) of section 2 of the Act;&lt;br /&gt; (c) "Designated Officer" means an officer designated as Designated Officer under rule 3;&lt;br /&gt; (d) "Form" means a form appended to these rules;&lt;br /&gt; (e) "intermediary" means an intermediary as defined in clause (w) of sub-section (1) of section 2 of the Act;&lt;br /&gt; (f) "nodal officer" means the nodal officer designated as such under rule 4;&lt;br /&gt; (g) "organisation" means -&lt;br /&gt; (i) Ministries or Departments of the Government of ;&lt;br /&gt; (ii) state Governments and Union territories;&lt;br /&gt; (iii) any agency of the Central Government, as may be notified in the Official Gazette, by the Central Government;&lt;br /&gt; (h) "request" means the request for blocking of access by the public any information generated, transmitted, received, stored or hosted in any computer resource;&lt;br /&gt; (i) "Review Committee" means the Review Committee constituted under rule 419A of Indian Telegraph Rules, 1951.&lt;br /&gt;&lt;br /&gt; 3. Designated Officer.-- &lt;br /&gt; The Central Government shall designate by notification in Official Gazette, an officer of the Central Government not below the rank of a Joint Secretary, as the "Designated Officer", for the purpose of issuing direction for blocking for access by the public any information generated, transmitted, received, stored or hosted in any computer resource under sub-section (2) of section 69A of the Act.&lt;br /&gt;&lt;br /&gt; 4. Nodal officer of organisation.-- &lt;br /&gt; Every organisation for the purpose of these rules, shall designate one of its officer as the Nodal Officer and shall intimate the same to the Central Government in the Department of Information Technology under the Ministry of Communications and Information Technology, Government of India and also publish the name of the said Nodal Officer on their website.&lt;br /&gt;&lt;br /&gt; 5. Direction by Designated Officer.-- &lt;br /&gt; The Designated Officer may, on receipt of any request from the Nodal Officer of an organisation or a competent court, by order direct any Agency of the Government or intermediary to block for access by the public any information or part thereof generated, transmitted, received, stored or hosted in any computer resource for any of the reasons specified in sub-section (1) of section 69A of the Act.&lt;br /&gt;&lt;br /&gt; 6. Forwarding of request by organisation.-- &lt;br /&gt; (1) Any person may send their complaint to the Nodal Officer of the concerned organisation for blocking of access by the public any information generated, transmitted, received, stored or hosted in any computer resource:&lt;br /&gt; Provided that any request, other than the one from the Nodal Officer of the organisation, shall be sent with the approval of the Chief Secretary of the concerned State or territory to the Designated Officer:&lt;br /&gt; Provided further that in case a Union territory has no Chief Secretary, then, such request may be approved by the Adviser to the Administrator of that Union territory.&lt;br /&gt; (2) The organisation shall examine the complaint received under sub-rule (1) to satisfy themselves about the need for taking of action in relation to the reasons enumerated in sub-section (1) of section 69A of the Act and after being satisfied, it shall send the request through its Nodal Officer to the Designated Officer in the format specified in the Form appended to these rules.&lt;br /&gt; (3) The Designated Officer shall not entertain any complaint or request for blocking of information directly from any person.&lt;br /&gt; (4) The request shall be in writing on the letter head of the respective organisation, complete in all respects and may be sent either by mail or by fax or by e-mail signed with electronic signature of the Nodal Officer:&lt;br /&gt;Provided that in case the request is sent by fax or by e-mail which is not signed with electronic signature, the Nodal Officer shall provide a signed copy of the request so as to reach the Designated Officer within a period of three days of receipt of the request by such fax or e-mail.&lt;br /&gt; (5) On receipt, each request shall be assigned a number alongwith the date and time of its receipt by the Designated Officer and he shall acknowledge the receipt thereof to the Nodal Officer within a period of twenty four hours of its receipt.&lt;br /&gt;&lt;br /&gt; 7. Committee for examination of request.-- &lt;br /&gt; The request alongwith the printed sample content of the alleged offending information or part thereof shall be examined by a committee consisting of the Designated Officer as its chairperson and representatives, not below the rank of Joint Secretary in Ministries of Law and Justice, Home Affairs, Information and Broadcasting and the Indian Computer Emergency Response Team appointed under sub-section (1) of section 70B of the Act.&lt;br /&gt; &lt;br /&gt; 8. Examination of request.-- &lt;br /&gt; (1) On receipt of request under rule 6, the Designated Officer shall make all reasonable efforts to identify the person or intermediary who has hosted the information or part thereof as well as the computer resource on which such information or part thereof is being hosted and where he is able to identify such person or intermediary and the computer resource hosting the information or part thereof which have been requested to be blocked for public access, he shall issue a notice by way of letters or fax or e-mail signed with electronic signatures to such person or intermediary in control of such computer resource to appear and submit their reply and clarifications, if any, before the committee referred to in rule 7, at a specified date and time, which shall not be less than forty-eight hours from the time of receipt of such notice by such person or intermediary.&lt;br /&gt; (2) In case of non-appearance of such person or intermediary, who has been served with the notice under sub-rule (1), before the committee on such specified date and time, the committee shall give specific recommendation in writing with respect to the request received from the Nodal Officer, based on the information available with the committee.&lt;br /&gt; (3) In case, such a person or intermediary, who has been served with the notice under sub-rule (1), is a foreign entity or body corporate as identified by the Designated Officer, notice shall be sent by way of letters or fax or e-mail signed with electronic signatures to such foreign entity or body corporate and any such foreign entity or body corporate shall respond to such a notice within the time specified therein, failing which the committee shall give specific recommendation in writing with respect to the request received from the Nodal Officer, based on the information available with the committee.&lt;br /&gt; (4) The committee referred to in rule 7 shall examine the request and printed sample information and consider whether the request is covered within the scope of sub-section (1) of section 69A of the Act and that it is justifiable to block such information or part thereof and shall give specific recommendation in writing with respect to the request received from the Nodal Officer.&lt;br /&gt; (5) The designated Officer shall submit the recommendation of the committee, in respect of the request for blocking of information alongwith the details sent by the Nodal Officer, to the Secretary in the Department of Information Technology under the Ministry of Communications and Information Technology, Government of India (hereinafter referred to as the "Secretary, Department of Information Technology").&lt;br /&gt; (6) The Designated Officer, on approval of the request by the Secretary, Department of Information Technology, shall direct any agency of the Government or the intermediary to block the offending information generated, transmitted, received, stored or hosted in their computer resource for public access within the time limit specified in the direction:&lt;br /&gt; Provided that in case the request of the Nodal Officer is not approved by the Secretary, Department of Information Technology, the Designated Officer shall convey the same to such Nodal Officer.&lt;br /&gt;&lt;br /&gt; 9. Blocking of information in cases of emergency.-- &lt;br /&gt; (1) Notwithstanding anything contained in rules 7 and 8, the Designated Officer, in any case of emergency nature, for which no delay is acceptable, shall examine the request and printed sample information and consider whether the request is within the scope of sub-section (1) of section 69A of the Act and it is necessary or expedient and justifiable to block such information or part thereof and submit the request with specific recommendations in writing to Secretary, Department of Information Technology.&lt;br /&gt; (2) In a case of emergency nature, the Secretary, Department of Information Technology may, if he is satisfied that it is necessary or expedient and justifiable for blocking for public access of any information or part thereof through any computer resource and after recording reasons in writing, as an interim measure issue such directions as he may consider necessary to such identified or identifiable persons or intermediary in control of such computer resource hosting such information or part thereof without giving him an opportunity of hearing.&lt;br /&gt; (3) The Designated Officer, at the earliest but not later than forty-eight hours of issue of direction under sub-rule (2), shall bring the request before the committee referred to in rule 7 for its consideration and recommendation.&lt;br /&gt; (4) On receipt of recommendations of committee, Secretary, Department of Information Technology, shall pass the final order as regard to approval of such request and in case the request for blocking is not approved by the Secretary, Department of Information Technology in his final order, the interim direction issued under sub-rule (2) shall be revoked and the person or intermediary in control of such information shall be accordingly directed to unblock the information for public access.&lt;br /&gt;&lt;br /&gt; 10. Process of order of court for blocking of information.-- &lt;br /&gt; In case of an order from a competent court in India for blocking of any information or part thereof generated, transmitted, received, stored or hosted in a computer resource, the Designated Officer shall, immediately on receipt of certified copy of the court order, submit it to the Secretary, Department of Information Technology and initiate action as directed by the court.&lt;br /&gt;&lt;br /&gt; 11. Expeditious disposal of request.-- &lt;br /&gt; The request received from the Nodal Officer shall be decided expeditiously which in no case shall be more than seven working days from the date of receipt of the request.&lt;br /&gt;&lt;br /&gt; 12. Action for non-compliance of direction by intermediary.-- &lt;br /&gt; In case the intermediary fails to comply with the direction issued to him under rule 9, the Designated Officer shall, with the prior approval of the Secretary, Department of Information Technology, initiate appropriate action as may be required to comply with the provisions of sub-section (3) of section 69A of the Act.&lt;br /&gt;&lt;br /&gt; 13. Intermediary to designate one person to receive and handle directions.-- &lt;br /&gt; (1) Every intermediary shall designate at feast one person to receive and handle the directions for blocking of access by the public any information generated, transmitted, received, stored or hosted in any computer resource under these rules.&lt;br /&gt; (2) The designated person of the Intermediary shall acknowledge receipt of the directions to the Designated Officer within two hours on receipt of the direction through acknowledgement letter or fax or e-mail signed with electronic signature.&lt;br /&gt;&lt;br /&gt; 14. Meeting of Review Committee.-- &lt;br /&gt; The Review Committee shall meet at least once in two months and record its findings whether the directions issued under these rules are in accordance with the provisions of sub-section (1) of section 69A of the Act and if is of the opinion that the directions are not in accordance with the provisions referred to above, it may set aside the directions and issue order for unblocking of said information generated, transmitted, received, stored or hosted in a computer resource for public access.&lt;br /&gt;&lt;br /&gt; 15. Maintenance of records by Designated Officer.-- &lt;br /&gt; The Designated Officer shall maintain complete record of the request received and action taken thereof, in electronic database and also in register of the cases of blocking for public access of the information generated, transmitted, received, stored or hosted in a computer resource.&lt;br /&gt;&lt;br /&gt; 16. Requests and complaints to be confidential.-- &lt;br /&gt; Strict confidentiality shall be maintained regarding all the requests and complaints received and actions taken thereof.&lt;br /&gt;&lt;br /&gt;FORM&lt;br /&gt;[See rule 6(2)]&lt;br /&gt;A. Complaint&lt;br /&gt;1. Name of the complainant: --___________________________________________&lt;br /&gt;(Person who has sent the complaint to the Govt./Nodal Officer)&lt;br /&gt;2. Address :________________________________________________________&lt;br /&gt;________________________________________________________________&lt;br /&gt;City :______________________                             Pin Code:______________&lt;br /&gt;3. Telephone :______________ (prefix STD code)     4. Fax (if any):__________&lt;br /&gt;5. (if any):_____________________________&lt;br /&gt;6. Email (if any):_____________________________________________&lt;br /&gt;B : Details of website/ computer resource/intermediary/ offending Information hosted on the website&lt;br /&gt;(Please give details wherever known)&lt;br /&gt;7. URL / web address :________________________________&lt;br /&gt;8. IP Address :___________________________&lt;br /&gt;9. Hyperlink:____________________________&lt;br /&gt;10. Server/Proxy Server address :__________________________________&lt;br /&gt;11. Name of the Intermediary :___________________________________&lt;br /&gt;12. URL of the Intermediary :____________________________________&lt;br /&gt;(Please attach screenshot/printout of the offending information)&lt;br /&gt;13. Address or location of intermediary in case the intermediary is telecom service provider, network service provider, internet service provider, web-hosting service provider and cyber cafe or other form of intermediary for which information under points (7), (8), (9), (10), (11) and (12) are not available.&lt;br /&gt;_______________________________________________________&lt;br /&gt;_______________________________________________________&lt;br /&gt;_______________________________________________________&lt;br /&gt;C. Details of Request for blocking&lt;br /&gt;14. Recommendation/Comments of the Ministry/State Govt :______________________&lt;br /&gt;________________________________________________________________________&lt;br /&gt;________________________________________________________________________&lt;br /&gt;15. The level at which the comments/ recommendation have been approved&lt;br /&gt;(Please specify designation):__________________________________________&lt;br /&gt;16. Have the complaint been examined in Ministry/State Government: Y/N&lt;br /&gt;17. If yes, under which of the following reasons it falls (please tick):&lt;br /&gt;(i) Interest of sovereignty or integrity of &lt;br /&gt;(ii) Defence of &lt;br /&gt;(iii) Security of the State&lt;br /&gt;(iv) Friendly relations with foreign States&lt;br /&gt;(v) Public order&lt;br /&gt;(vi) For preventing incitement to the commission of any cognisable offence relating to above&lt;br /&gt;D. Details of the Nodal Officer forwarding the complaint alongwith recommendation of the Ministry/State Govt. and related enclosures&lt;br /&gt;18. Name of the Nodal Officer:_____________________________________________&lt;br /&gt;19. Designation :___________________________________________________&lt;br /&gt;20. organisation :________________________________________________________&lt;br /&gt;21. Address : ______________________________________________________&lt;br /&gt; City :______________________ Pin Code:______________&lt;br /&gt;22. Telephone:________________(prefix STD code) 23. Fax (if any):____________&lt;br /&gt;24. (if any):_____________________________&lt;br /&gt;25. Email (if any):_____________________________________________&lt;br /&gt;E. Any other information :&lt;br /&gt;F. Enclosures :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.&lt;br /&gt; 2.&lt;br /&gt; 3&lt;br /&gt;Date:                                                                 Place:                                                                Signature&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/information-technology-procedure-and-safeguards-for-blocking-for-access-of-information-by-public-rules-2009'&gt;https://cis-india.org/internet-governance/resources/information-technology-procedure-and-safeguards-for-blocking-for-access-of-information-by-public-rules-2009&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>smita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-11-21T09:32:36Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/telegraphindia-opinion-story-kavitha-shanmugham-nov-14-2012-post-and-be-damned">
    <title>Post and be Damned</title>
    <link>https://cis-india.org/news/telegraphindia-opinion-story-kavitha-shanmugham-nov-14-2012-post-and-be-damned</link>
    <description>
        &lt;b&gt;Your careless comments online could put you in jail, thanks to Section 66A of the Information Technology Act. Kavitha Shanmugam examines a law that some critics say is vague and unconstitutional&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Kavita Shanmugham's column was &lt;a class="external-link" href="http://www.telegraphindia.com/1121114/jsp/opinion/story_16193233.jsp#.UKmmGmfm71V"&gt;published in the Telegraph&lt;/a&gt; on November 14, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Two weeks ago, S. Ravi, owner of a small plastic packaging unit in Puducherry, was rudely woken up by the police at 5am, manhandled and arrested. Reason: Ravi had posted a couple of unflattering comments about Karti Chidambaram, son of finance minister P. Chidambaram, on Twitter. He had tweeted that Chidambaram Junior "had amassed more wealth than Robert Vadra".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ravi was arrested under Section 66A of the Information Technology (IT) Act, 2008, and hauled up before a judicial magistrate who remanded him to nine days in custody. "It was then that I became really scared," says Ravi, who is out on bail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A casual tweeter with just 16 followers, Ravi believes he did nothing wrong. “I was using a statement that was already there on the Internet. They could have sent me a lawyer’s notice or investigated the complaint before taking action,” argues Ravi, whose Twitter following has now jumped to 2,518.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"My tweet was retweeted by 20,000 people, who dared the authorities to arrest them too," he adds indignantly, terming Section 66A a “draconian law" with "wide scope for misuse".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ravi is not alone in denouncing Section 66A of the IT Act. Indeed, there is now a huge outcry against the law, with a section of legal and cyber experts saying that it is nothing but a useful tool in the hands of the powers that be to curb freedom of speech and expression online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, there are those who believe that online abuse or defamation cannot masquerade as freedom of speech and that the law is necessary to move against those who commit this offence.&lt;/p&gt;
&lt;p align="LEFT"&gt;Karti Chidambaram, for one, believes that Ravi’s tweet was motivated and defamatory. "The tweeter made one tweet in 78 days. It was about me. It clearly implied that I am corrupt. That is malicious. So I preferred a complaint to the police. The law exists. I didn’t frame the law," he says.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Section 66A of the IT Act lays down that a person can be punished with  up to three years’ imprisonment if he or she sends offensive information  or messages through a computer resource or communication device. The  problem arises because it fails to clarify what can be termed  "offensive". For example, information that is "grossly offensive" or has  "menacing character” or information disseminated for the “purpose of  causing annoyance and inconvenience" are all brought under the ambit of  "offensive". This leaves the law wide open for various interpretations  and abuse.&lt;/p&gt;
&lt;p&gt;"It’s too vaguely worded," insists M. Lenin, a lawyer advising  volunteers of India Against Corruption in Chennai. “Any online statement  can be declared 'offensive' and any tweet may be deemed ‘inconvenient’.  The section has become a convenient tool for the police to harass  people."&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/karti.jpg" alt="Karti Chidambaram" class="image-inline" title="Karti Chidambaram" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, Section 66A was also invoked, among other laws, to arrest Jadavpur University professor Ambikesh Mahapatra for forwarding an email cartoon of West Bengal chief minister Mamata Banerjee.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, some experts go a step further and call Section 66A patently unconstitutional. Says Pranesh Prakash, policy director, Centre for Internet and Society, Bangalore, "It’s clearly in violation of Article 19(1)(a) of our Constitution that guarantees freedom of speech. The fact that some information is ‘grossly offensive’ (Section 66A) or that it causes ‘annoyance’ or ‘inconvenience’ while being known to be false (Section 66A(c)) cannot be a reason for curbing freedom of speech unless it is directly related to violating decency, morality or public order, or amounts to defamation."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, apologists for Section 66A argue that the law has its merits too in that it can be used to move against genuine incidents of harassment or defamation online. Take the case of Chinmayee Sripada, a popular Chennai-based playback singer. Chinmayee, who has one lakh followers on Twitter, was targeted by a group of six men who sent her lewd and threatening tweets for a period of time. Apparently, they were upset with her remarks on reservation and for not joining them in a Twitter campaign against the killing of Tamil Nadu fishermen by the Sri Lankan navy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, Chinmayee complained to the police with “thousands of pages of ugliness and vulgarity” and the trolls, including a professor at the National Institute of Fashion Technology, Chennai, were identified and arrested under Section 66A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The offending tweeters apologised to her and closed their accounts after the arrest. "I believe Section 66A belled the cat. The arrest made people realise that Twitter also demands self-regulation. In the name of freedom of speech there is zero control on platforms like Twitter. There should be some boundaries," says Chinmayee’s mother T. Padmahasini.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ramachandra Murthy, Ravi’s lawyer, too believes that Section 66A is a "good tool" for genuine cases of harassment. "Unfortunately, it is being misused by influential people. Still, if you are innocent the case can never hold up in court," he reasons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others question the need for a separate law to deal with cases of online defamation or harassment when the Indian Penal Code already has provisions to tackle them. New Delhi-based lawyer Apar Gupta cites the examples of Section 500, 499 and 294 of the IPC which deal with defamation or committing obscene acts in public. "Section 66A only makes the burden on the accused harsher," he adds.&lt;/p&gt;
&lt;p align="LEFT"&gt;While some IT experts want Section 66A scrapped, others say that it should at least be amended. “Even if the section is not struck off the statute books, the provisions in it may be read down by the courts and safeguards may be prescribed in its application,” says Gupta.&lt;/p&gt;
&lt;p align="LEFT"&gt;Until that happens, mistaking social media platforms for online drawing rooms where you can indulge in all kinds of freewheeling chat could be fraught with danger.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Justice A.P. Shah, a former chief justice of the Delhi High Court, echoes that view. "Section 66A is very broad and loosely worded. The scope of such a law has to be restricted. Instead, it is vague and clearly violative of Article 19(1)(a) of the Constitution that guarantees freedom of speech and expression," he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/telegraphindia-opinion-story-kavitha-shanmugham-nov-14-2012-post-and-be-damned'&gt;https://cis-india.org/news/telegraphindia-opinion-story-kavitha-shanmugham-nov-14-2012-post-and-be-damned&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-11-19T03:40:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/will-the-international-telecommunication-regulations-itrs-impact-internet-governance-a-multistakeholder-perspective">
    <title>Will The International Telecommunication Regulations (ITRs) Impact Internet Governance?  A Multistakeholder Perspective</title>
    <link>https://cis-india.org/internet-governance/blog/will-the-international-telecommunication-regulations-itrs-impact-internet-governance-a-multistakeholder-perspective</link>
    <description>
        &lt;b&gt;Pranesh Prakash made a presentation at the India Internet Governance Conference (IIGC) held at the FICCI, Federation House, Tansen Marg, New Delhi on October 4 and 5, 2012. The event was organised by the Ministry of Communications &amp; Information Technology, FICCI and Internet Society. CIS was one of the supporting organisations.&lt;/b&gt;
        &lt;h3&gt;Principles&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;I'll outline some broad principles that should be kept in mind while deciding on proposals for the International Telecommunications Regulations (ITR).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any proposal should be considered for the ITR if an only if it satisfies all the below criteria:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Only if international      regulation is needed&lt;/li&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;If only national regulation       is sufficient, then ITR is not the right place for it.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;International roaming price       transparency, for instance, is an issue where international cooperation       is required.&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;Only if it is a technical      issue limited to telecommunications networks and interoperability&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;On the issues of       'security', if it is strictly about network security, then it is fine.&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;ITU        already does some standard setting work around this.&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;If it about security of       root server operations, or DNS, etc., that's not around       telecommunications, despite being a technical issue.&lt;/li&gt;
&lt;li&gt;If it is about criminal       activities on telecommunications networks, that is not a technical issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;Only if it is something that      can be decided at the level of states.&lt;/li&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Multistakeholder issues       should not end up at the ITU, since the ITU is not a multistakeholder       body.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;This principle has been       accepted by the ITU itself in the Geneva Declaration as well as the Tunis       Agenda.&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;Only if it proposes to      address a proven harm&lt;/li&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The ETNO proposal, for       instance, does not make it very clear why they think current       interconnection system is a problem.&lt;/li&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Though        the ETNO proposal says that it is required to enable "fair        compensation", "sustainable development of telecom", it        does so without showing why the current payment mechanisms are        unsustainable, or how telecom industry has changed lately, or even how        moving from voice to data (even for voice) is going to affect        "sustainable development of telecom".&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Geoff        Huston provides the wonderful example of how ten years ago, content        providers were asking for fair compensation from telecom providers        ("content is being provided free, while ISPs charge customers; ISPs        are worthless without content, hence ISPs need to share revenue with content        providers"). Now the opposite argument is being made by telecom        operators.&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Airtel         in India has publicly asked Google and Facebook for revenue sharing.&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;Rohan        Samarajiva of LIRNEasia&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;He         believes ETNO proposal is bad for developing countries.&lt;/li&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Adverse          unintended effect of ETNO proposal ("sending-party network          pays") is that less traffic will be directed towards poorer          regions without the ability (whether through ad sales, or otherwise)          to justify that expenditure by the sender.&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;li&gt;ISOC        paper is one of the most in-depth analysis so far.&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;They         strongly believe it is going to be bad for Internet&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;Truth        is that there has been no clear economic study so far of the potential        impact. Hence counting benefits without proper analysis is risky.&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;li&gt;Only if there's no better      place than ITU&lt;/li&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;If another existing       organization like ICANN or IETF can look at it, then ITU should not take       over.&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;p&gt;If all the above principles are satisfied, then the question becomes:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Does the proposal further      substantive principles, such as:&lt;/li&gt;
&lt;li&gt;Development&lt;/li&gt;
&lt;li&gt;Competition and prevention      of monopolies&lt;/li&gt;
&lt;li&gt;Etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;If the proposal does advance such substantive principles, then we should ask what kind of regulation is needed: &lt;i&gt;Whether mandatory or not &lt;/i&gt;whether it is the minimal amount required to achieve the policy objectives.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;Indian government's positions on the specific proposals to the ITR haven't yet been made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the India government has taken a public position on the larger issue before: the IBSA statement on Enhanced Cooperation from December 2010. the IBSA reaffirms its commitment to the stability and security of the Internet as a global facility based on the full participation of all stakeholders, from both developed and developing countries, within their respective roles and responsibilities in line with paragraph 35 of the Tunis Agenda.&lt;/p&gt;
&lt;p&gt;"The management of the Internet encompasses both technical and public policy issues and should involve all stakeholders and relevant intergovernmental and international organizations."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Demonization of the ITU is not good, though some in civil society have engaged in it, and is not the issue here. * After all, ITU was a core part of the WSIS process that led to the multistakeholder system. * ITU does have its own role to play in Internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly, transparency and public participation is required. * We have signed an international civil society letter asking ITU to be more transparent. This has had a little impact; more documents are now out in the public. And there's now WCITLeaks.org * The Indian government must hold inclusive meetings with all relevant experts and stakeholders, including civil society organizations and academics.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/will-the-international-telecommunication-regulations-itrs-impact-internet-governance-a-multistakeholder-perspective'&gt;https://cis-india.org/internet-governance/blog/will-the-international-telecommunication-regulations-itrs-impact-internet-governance-a-multistakeholder-perspective&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-10T04:40:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/privacy-in-social-networked-world">
    <title>Privacy in the Social Networked World</title>
    <link>https://cis-india.org/news/privacy-in-social-networked-world</link>
    <description>
        &lt;b&gt;The Asian Privacy Scholars Network 2nd International Conference was hosted by the Centre for Business Information Ethics, Meiji University, Tokyo, Japan, on behalf of the Asian Privacy Scholars Network, November 19 - 20, 2012. Elonnai Hickok is speaking at the event.&lt;/b&gt;
        &lt;h3&gt;Monday, November 19, 2012&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;09:00—09:30&lt;/td&gt;
&lt;td&gt;Registration and Welcome&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09:30—10:30&lt;/td&gt;
&lt;td&gt;Keynote Speaker: Pirongrong Ramasoota&lt;br /&gt;(Chulalongkorn University, Thailand)&lt;br /&gt;The Future of Privacy in the World's Largest Democracy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30—11:00&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00—12:30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Whon-Il Park (Kyung Hee University, Korea)&lt;br /&gt;How to Protect, or Utilize, Personal Visual Information in Korea&lt;/p&gt;
&lt;p&gt;Sinta Dewi Rosadi (University Padjadjaran, Indonesia)&lt;br /&gt;Constitutional Privacy Protection: The Indonesian Experience&lt;/p&gt;
&lt;p&gt;Takato Natsui (Meiji University, Japan) Censorship, Burying and Mental Health in Business Office&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:30—14:00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:00—15:00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lilian Edwards (Strathclyde University, UK)&lt;br /&gt;International Implications of the Proposed Revision of the EU Data Protection Directive&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Graham Greenleaf (UNSW, Australia and Meiji University, Japan)&lt;br /&gt;100 Data Privacy Laws: Their Significance and Origins&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:00—15:30&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30—16:30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Kiyoshi Murata/Yohko Orito (Meiji University/Ehime University, Japan)&lt;br /&gt;Japanese Youngsters' Social Attitude towards Privacy&lt;/p&gt;
&lt;p&gt;Ryoko Asai/Iordanis Kavathatzopoulos&lt;br /&gt;(Meiji University, Japan/Uppsala University, Sweden) The Paradoxical Nature of Privacy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:00—20:00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Conference Banquet (Salon San, 23rd Floor, Liberty Tower, Meiji University)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Tuesday, November 20, 2012&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;09:00—09:45&lt;/td&gt;
&lt;td&gt;Keynote Speaker: Roger Clarke&lt;br /&gt;(Xamax Consultancy, UNSW and ANU, Australia)&lt;br /&gt;Consumer-Oriented Social Media as Market Opportunity&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09:45—10:00&lt;/td&gt;
&lt;td&gt;Video Presentation from David Lyon (Queens University, Canada)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00—10:30&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30—12:00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Daniel Trottier (Uppsala University, Sweden) Social Networking Sites and Crowd-sourced Surveillance&lt;/p&gt;
&lt;p&gt;Colin Bennett (University of Victoria, Canada) Social Networking and Privacy Jurisdiction&lt;/p&gt;
&lt;p&gt;Andrew Adams (Meiji University, Japan) Facebook Code: SNS Platform Affordances and Privacy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:00—13:00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00—14:30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Elonnai Hickok (Centre for Internet and Society, India) Transparency and Privacy in India&lt;/p&gt;
&lt;p&gt;Fumio Shimpo (Keio University, Japan) Current Developments in Japanese Data Protection Policy&lt;/p&gt;
&lt;p&gt;Panel: Chen, Greenleaf, Hickok, Shimpo&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30—15:00&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:00—17:00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Ian Brown (University of Oxford, UK) Data Protection and Social Networking Services&lt;/p&gt;
&lt;p&gt;Shirley Williams (University of Reading, UK) Do Computer Science Scholars Consider Issues of Privacy when Studying Large Twitter Data Sets?&lt;/p&gt;
&lt;p&gt;Final Panel: Adams, Bennett, Brown, Clarke, Williams&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Organisers&lt;/h3&gt;
&lt;p&gt;Prof Andrew A. Adams, Meiji University, Tokyo, Japan&lt;br /&gt;Prof Kiyoshi Murata, Meiji University, Tokyo, Japan&lt;br /&gt;Prof Graham Greenleaf, UNSW, Sydney, Australia&lt;br /&gt;(JSPS Visiting Fellow, Meiji University Sep-Dec 2012)&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.kisc.meiji.ac.jp/~ethicj/APSN2/program.pdf"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/privacy-in-social-networked-world'&gt;https://cis-india.org/news/privacy-in-social-networked-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-04T16:19:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/statement-of-civil-society-members-and-groups-at-best-bits-pre-igf-meeting">
    <title>Statement of Civil Society Members and Groups Participating in the "Best Bits" pre-IGF meeting at Baku in 2012</title>
    <link>https://cis-india.org/internet-governance/blog/statement-of-civil-society-members-and-groups-at-best-bits-pre-igf-meeting</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society was one of the signatories for this submission made to the ITU on November 16, 2012.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bestbits.igf-online.net/statement/"&gt;Read the statement of civil society members and groups participating in the “Best Bits” pre-IGF meeting at Baku in 2012&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;We thank the Secretariat of the ITU for making the opportunity to submit our views.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nevertheless, the process of the revision of the International Telecommunication Regulations (ITRs) has not been sufficiently inclusive and transparent, despite some recent efforts to facilitate public participation.  Fundamental to the framing of public policy must be the pursuit of the public interest and fundamental human rights, and we urge Member States to uphold and protect these values.&lt;br /&gt; &lt;br /&gt; We as civil society organizations wish to engage with the World Conference on International Telecommunication (WCIT) process in this spirit. Member States, in most cases, have not held open, broad-based, public consultations in the lead up to the WCIT, nor have they indicated such a process for the WCIT itself.&lt;br /&gt; &lt;br /&gt; In order to address this deficiency, and at a minimum, we would urge:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; All Member States and regional groups to make their proposals available to the public in sufficient time to allow for meaningfulpublic participation;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;All delegates to support proposals to open sessions of the WCIT meeting to the public;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ITU Secretariat to increase transparency of the WCIT including live webcast with the video, audio, and text transcripts, as far as possible, to enable participation by all, including persons with disabilities;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ITU Secretariat, Member States, and regional groups to make as much documentation publicly available as possible on the ITU's website, so that civil society can provide substantive input on proposals as they are made available;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Member States to encourage and facilitate civil society participation in their national delegations;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ITU to create spaces during the WCIT for civil society to express their views, as was done during the WSIS process.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Given the uncertainty about the nature of final proposals that will be presented, we urge delegates that the following criteria be applied to any proposed revisions of the ITRs.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;That any proposed revisions are confined to the traditional scope of the ITRs, where international regulation is required around technical issues is limited to telecommunications networks and interoperability standards.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There should be no revisions to the ITRs that involve regulation of the Internet Protocol and the layers above.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There should be no revisions that could have a negative impact on affordable access to the Internet or the public's rights to privacy and freedom of expression.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;More generally we call upon the ITU to promote principles of net neutrality, open standards, affordable access and universal service, and effective competition.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Signatories:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Access (Global)&lt;/li&gt;
&lt;li&gt;Association for Progressive Communications (Global)&lt;/li&gt;
&lt;li&gt;Bangladesh NGOs Network for Radio and Communication (Bangladesh)&lt;/li&gt;
&lt;li&gt;Bytes for All (Pakistan)&lt;/li&gt;
&lt;li&gt;Center for Democracy and Technology (United States of America)&lt;/li&gt;
&lt;li&gt;Centre for Community Informatics Research (Canada)&lt;/li&gt;
&lt;li&gt;Centre for Internet and Society (India)&lt;/li&gt;
&lt;li&gt;Collaboration on International ICT Policy for East and Southern Africa (Eastern and Southern Africa)&lt;/li&gt;
&lt;li&gt;Consumer Council of Fiji (Fiji)&lt;/li&gt;
&lt;li&gt;Consumers International (Global)&lt;/li&gt;
&lt;li&gt;Dynamic Coalition on Internet Rights and Principles (IRP) (Global)&lt;/li&gt;
&lt;li&gt;Electronic Frontier Finland (Finland)&lt;/li&gt;
&lt;li&gt;Imagining the Internet Center (United States of America)&lt;/li&gt;
&lt;li&gt;Instituto Nupef (Brazil)&lt;/li&gt;
&lt;li&gt;Internet Democracy Project (India)&lt;/li&gt;
&lt;li&gt;Internet Research Project (Pakistan)&lt;/li&gt;
&lt;li&gt;Global Partners and Associates (United Kingdom)&lt;/li&gt;
&lt;li&gt;GobernanzadeInternet.co (Colombia)&lt;/li&gt;
&lt;li&gt;ICT Watch Indonesia (Indonesia)&lt;/li&gt;
&lt;li&gt;Instituto Brasileiro de Defesa do Consumidor / Brazilian Institute for&lt;/li&gt;
&lt;li&gt;Consumer Defense (Brazil)&lt;/li&gt;
&lt;li&gt;InternetNZ (New Zealand)&lt;/li&gt;
&lt;li&gt;IT for Change (India)&lt;/li&gt;
&lt;li&gt;Media Education Center (Armenia)&lt;/li&gt;
&lt;li&gt;ONG Derechos Digitales (Chile)&lt;/li&gt;
&lt;li&gt;OpenMedia (Canada)&lt;/li&gt;
&lt;li&gt;Public Knowledge (United States of America)&lt;/li&gt;
&lt;li&gt;Thai Netizen Network (Thailand)&lt;/li&gt;
&lt;li&gt;Ginger Paque (Venezuala)&lt;/li&gt;
&lt;li&gt;Nnenna Nwakanma (Côte d'Ivoire)&lt;/li&gt;
&lt;li&gt;Sonigitu Ekpe (Nigeria)&lt;/li&gt;
&lt;li&gt;Wolfgang Kleinwächter (Denmark)&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/statement-of-civil-society-members-and-groups-at-best-bits-pre-igf-meeting'&gt;https://cis-india.org/internet-governance/blog/statement-of-civil-society-members-and-groups-at-best-bits-pre-igf-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-07T08:06:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google">
    <title> India second in requesting user info: Google</title>
    <link>https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google</link>
    <description>
        &lt;b&gt;India is at second place after the US in terms of the government requests for user data from Google&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Karthik Subramanian's article was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/internet/india-second-in-requesting-user-info-google/article4095170.ece"&gt;published in the Hindu on November 14, 2012&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The  Indian government made the second largest demand for Web user  information — next only to the United States government — to Google in  the six-month period from January to June this year, according to the  ‘Transparency Report’ published by the Web services major on Tuesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During  the six-month period, the Indian government — both by way of court  orders and by way of requests from police— requested Google to disclose  user information 2,319 times over 3,467 users/accounts. Google fully or  partially complied with the request to the tune of 64 per cent. Only the  U.S. government requested more data during the period — 7,969 requests  over 16,281 accounts, compliance rate: 90 per cent.&lt;br /&gt;&lt;br /&gt;It is the  sixth time Google has brought out the bi-annual report detailing its  interactions with the world government agencies. It details two  categories of interactions : requests to divulge user data; and requests  to pull down content. India ranked seventh in the list of requests to  pull down data; experts say that the possible reason could be the  government not having such powers under the Constitution.&lt;br /&gt;&lt;br /&gt;Pranesh  Prakash, policy director with Bangalore-based Centre for Internet and  Society, said that the Google report was a damning indictment of the  country’s government exceeding its constitutional bounds by demanding  removal of material for defamation, government criticism, etc., without a  valid court order. "There are no laws in our country that allows the  executive or the police to remove such material without a court order."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Substantial spike&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In  all, 33 countries figure in the report. There was a substantial spike  when compared to previous reports with respect to the number of requests  from various governments to pull down content.&lt;br /&gt;&lt;br /&gt;"In the first  half of 2012, there were 20,938 inquiries from government entities  around the world. Those requests were for information about 36,614  accounts,” wrote Dorothy Chou, Google’s senior policy analyst, on the  Official Google Blog while presenting the report. “The number of  government requests to remove content from our services was largely flat  from 2009 to 2011. But it’s spiked in this reporting period. In the  first half of 2012, there were 1,791 requests from government officials  around the world to remove 17,746 pieces of content."&lt;br /&gt;&lt;br /&gt;Google is  leading the cause for voluntary disclosure of the interactions it has  with the governments. Other web services that put out similar  transparency reports include micro-blogging site Twitter; cloud storage  service Dropbox; and social networking site Linkedin.&lt;br /&gt;&lt;br /&gt;Mr. Prakash  said it was not enough if just the web services put out such reports.  "The telecom service providers must voluntarily come out with such  information," he added.&lt;br /&gt;&lt;br /&gt;"There is a dearth of public information  about the amount of legal interception and surveillance. This does not  bode well in a democratic polity."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google'&gt;https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-15T09:40:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens">
    <title> India second in keeping tabs on netizens</title>
    <link>https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens</link>
    <description>
        &lt;b&gt;India ranks second globally in accessing private details of its citizens, next only to the US, if the latest data from Google is to be believed.
&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Ishan Srivastava was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/internet/India-second-in-keeping-tabs-on-netizens/articleshow/17222023.cms"&gt;published in the Times of India on November 15, 2012&lt;/a&gt;, Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The transparency report by the internet search giant lists out requests it received from governments across the world to access information on the users of its various services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the first six months of 2012, India made 2,319 requests involving 3,467 users. In comparison, the US made 7,969 requests in the same period and Brazil, which comes third, sent 1,566 requests. Globally, there were 20,938 requests for user data during the January-June period. The data can include your complete &lt;a href="http://timesofindia.indiatimes.com/topic/Gmail-account"&gt;Gmail account&lt;/a&gt;, chat logs, Orkut profile and search terms among others. These reports are prepared by Google every six months, and were started in July-December 2009.&lt;/p&gt;
&lt;p&gt;The requests for user data from India doubled from 1,061 in July-December 2009 to 2,207 in July-December 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Though India is a large country with a significant number of internet users, this data is nonetheless an indicator of growing surveillance," said Pranesh Prakash, policy director at &lt;a href="http://timesofindia.indiatimes.com/topic/Centre-for-Internet-and-Society"&gt;Centre for Internet and Society&lt;/a&gt; (CIS), a Bangalore-based organization looking at issues of public accountability, internet freedom and openness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"India lacks a general privacy law that helps set guidelines for such user requests, despite privacy being a constitutional right as part of the right to life," said Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India also actively sends requests to take down content which it deems defamatory and against national security. While the number of court orders for taking down web content has remained almost stagnant over the years, there has been a rise in the number of requests by the executive and police. Between January and June this year, there were 20 court orders and 64 requests from executive/police that resulted in 596 items being taken down from the web. In comparison, there were only eight court orders and 22 executive/police requests in January-June 2010, resulting in 125 items being taken down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The government does not always specify the reason for which they want access. They just want access, what they do with the information is not known to us," said a legal adviser to an MNC. "These requests come with a threat to our continued operation in India."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Falsified court orders are also being employed to seek removal of content. Three such court orders were sent to Google "that demanded the removal of blog posts and entire blogs for alleged defamation." One order was said have been issued by a local court in Andheri, Mumbai while the other two by the Delhi high court. But all the three were found to be fake.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google says a single court order was responsible for removal of 360 items this year as they "contained adult videos that allegedly violated an individual's personal privacy." While such orders have a positive impact like curbing pornography and violent content, governments at every level have also tried to use these requests to take down unfavourable content or criticism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In January-June 2011 period, Google received "requests from state and local law enforcement agencies to remove &lt;a href="http://timesofindia.indiatimes.com/topic/YouTube"&gt;YouTube&lt;/a&gt; videos that displayed protests against social leaders or used offensive language in reference to religious leaders". Google rejected a majority of these requests. It also received a request from a law enforcement agency to remove 236 communities and profiles from Orkut that were critical of a local politician. Google did not remove them either.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Prior to 2009, government had limited powers of interception. However, after 26/11 they gave themselves huge powers to block and monitor content," said Supreme Court lawyer Pavan Duggal. "Data privacy is non-existent in India." He said that the A P Shah Committee, which was formed to recommend principles for a privacy law, has submitted its report to the Planning Commission and now it is up to the government to take it to the next stage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both Prakash and Duggal said that technology companies in India, including telecom players, should come out with similar transparency reports as Google. A report by international watchdog Privacy International says that &lt;a href="http://economictimes.indiatimes.com/bharti-airtel-ltd/stocks/companyid-2718.cms" target="_blank"&gt;Bharti Airtel&lt;/a&gt;, in its 2010-2011 annual report, said it had received 422 appreciation letters from law enforcement agencies for assistance in lawful interceptions. "The Indian IT Act requires electronic audit by firms but the law is silent on how this audit is filed," said Duggal.&lt;/p&gt;
&lt;p&gt;Globally, &lt;a href="http://timesofindia.indiatimes.com/topic/Dropbox"&gt;Dropbox&lt;/a&gt;, LinkedIn, Sonic.net and Twitter release transparency reports apart from Google.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens'&gt;https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-15T09:04:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/steady-steps-foss-and-mdgs">
    <title>Steady Steps.....FOSS and the MDG's</title>
    <link>https://cis-india.org/news/steady-steps-foss-and-mdgs</link>
    <description>
        &lt;b&gt;Pranesh Prakash was a panelist at this IGF workshop held on November 9, 2012. It was organised by International Center For Free and Open Source Software and Free Software and OpenSource Foundation For Africa.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;IG4D Thematic Cluster 2 "Enabling Environment" Question 1: What does it take to attract investment in infrastructure and enc&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concise Description of Workshop:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This workshop will address some key areas, where  Free and open source software has made a milestone, in the last few  years to fulfill the Millennium development goal, across the globe. Many  a times whenever FOSS is mentioned, , thoughts quickly run to ‘techies’  . In this session , the Panelists will give practical  presentations/projects on Free and Open Source Software, outside the  technical arena and show how it has changed the face of  : 1)  Governments:- We will look at, Policy in the area of Open Data, 2)  In  Academia:- We will look at, Open Education Resources (OER) , FOSS in  schools etc, both in Africa and India. 3)  In Private Sector- we will  look at , Wealth creation, innovation and job creation, just to mention  but a few. 1)  Secondly we will look at how FOSS is bridging the digital  divide, existing between the different age groups more especially the  Youth, Women, between the different social circles/media , inclusion of  person's with disabilities.etc, through partnerships and rural  deployment of FOSS. We will have the privilege to look at initiative(s),  in Brazil.   1) Last but not least, It will address, the key policies,  that governments should embrace, that would continue to enhance FOSS in  the Internet development goal at national level , regional level and at  the global level.  A rich discussion will be encouraged, from the  participants to ensure that the FOSS community understands its strength  and role in the internet governance realm, in policy making process  and in the privacy, security and openness arena.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Workshop Agenda&lt;/b&gt;:&lt;br /&gt; 1. What Milestone has FOSS made in:&lt;br /&gt; i) Academia&lt;br /&gt; ii) Government&lt;br /&gt; iii) Private Sector&lt;br /&gt; 2. Is FOSS factor to consider in bridging the digital divide?&lt;br /&gt; 3. Regarding the Milestone that FOSS has achieved, should there be  national, regional, global.etc  policies to ensure a fair palying field  it?&lt;br /&gt; - Closing remarks, What actions to be taken,  conclusion.&lt;/p&gt;
&lt;div class="field-field-ws-panel field-type-text field"&gt;
&lt;div class="field-label"&gt;Submitted Workshop Panelists:&lt;/div&gt;
&lt;div class="field-items"&gt;
&lt;div class="odd field-item"&gt;
&lt;p&gt;1. Mr. Satish Babu - ICFOSS, India  (Government)- Moderator- Confirmed &lt;br /&gt; 2. Mr. Fernando Botelho- F123.org, Brazil (Remote Participation)- Confirmed&lt;br /&gt; 3. Ms. Anne Rachel Inne, ICANN- Confirmed&lt;br /&gt; 4. Mr. Pranesh Prakash, CIS Bangalore, India- Confirmed &lt;br /&gt; 5. Ms. Mishi Choudhary,  Executive Director of International programs at Software Freedom Law Center (SFLC), India- Confirmed&lt;br /&gt; 6. Mr. Yves Miezan Ezo, FOSSFA , CHALA, France- Confirmed&lt;br /&gt; 7.Ms. Nnenna Nwakanma, CEO, Nnenna.org, Cote d' Ivoire- Confirmed&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="field-field-ws-rm field-type-text field"&gt;
&lt;div class="field-label"&gt;Name of Remote Moderator(s):&lt;/div&gt;
&lt;div class="field-items"&gt;
&lt;div class="odd field-item"&gt;Ms. Judy Okite, FOSSFA&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="field-field-assigned-panellists field-type-nodereference field"&gt;
&lt;div class="field-label"&gt;Assigned Panellists:&lt;/div&gt;
&lt;div class="field-items"&gt;
&lt;div class="odd field-item"&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/babu-satish"&gt;Babu - Satish&lt;/a&gt;&lt;/div&gt;
&lt;div class="even field-item"&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/botelho-fernando"&gt;Botelho - Fernando&lt;/a&gt;&lt;/div&gt;
&lt;div class="odd field-item"&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/inne-anne-rachel"&gt;INNE - Anne-Rachel&lt;/a&gt;&lt;/div&gt;
&lt;div class="even field-item"&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/abraham-sunil"&gt;Abraham - Sunil&lt;/a&gt;&lt;/div&gt;
&lt;div class="odd field-item"&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/choudhary-mishi"&gt;Choudhary  - Mishi&lt;/a&gt;&lt;/div&gt;
&lt;div class="even field-item"&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/miezan-ezo-yves"&gt;Miezan Ezo - Yves&lt;/a&gt;&lt;/div&gt;
&lt;div class="odd field-item"&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/nwakanma-nnenna"&gt;Nwakanma - Nnenna&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/steady-steps-foss-and-mdgs'&gt;https://cis-india.org/news/steady-steps-foss-and-mdgs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-09T01:11:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy">
    <title>Q&amp;A to the Report of the Group of Experts on Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy</link>
    <description>
        &lt;b&gt;In January 2012 Justice A.P. Shah formed a committee consisting of a group of experts to contribute to and create a report of recommendations for a privacy legislation in India. The committee met a total of seven times from January to September 2012.  The Centre for Internet and Society (CIS) was a member of the committee creating the report. This blog post is CIS’s attempt to answer questions that have arisen from media coverage on the report, based on our understanding. &lt;/b&gt;
        &lt;h2&gt;Executive Summary&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The executive summary explains how the need for a horizontal privacy legislation that recognizes the right to privacy has come about in India in light of projects and practices such as the UID, NATGRID, and the changing nature of business and technology. The executive summary highlights the committee’s recommendations of what should be considered by legislatures while enacting a privacy legislation in India.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the salient features of the committee’s recommendations? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; In its report the committee recommended that any privacy legislation passed should:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; Be technologically neutral and interoperable with international standards to ensure that the regulation can adapt to changing technology, and that business will be promoted. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Recognize the multiple dimensions of privacy including physical and informational privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Apply to all data controllers both in the private sector and the public sector to ensure that businesses and governments are held accountable to protecting privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Establish a set of privacy principles that can be applicable to different practices, policies, projects, departments, and businesses to create a uniform level of privacy protection across all sectors. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Create an enforcement regime of co-regulation, where industry has the choice of developing privacy principles and ensuring compliance at the sectoral level with regular oversight by the Privacy Commissioners. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 1: Constitutional Basis for Privacy&lt;/h2&gt;
&lt;p&gt;This chapter summarizes a number of decisions from the Indian Judiciary that demonstrate how the right to privacy in India has been defined on a case to case basis and has been defined as either a fundamental right or a common law right.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the contexts of the cases covered? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; This chapter covers cases that speak to the:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Right to privacy in the context of surveillance by the State &lt;/li&gt;
&lt;li&gt;Balancing the ‘right to privacy’ against the ‘right to free speech’ &lt;/li&gt;
&lt;li&gt;The ‘right to privacy’ of HIV patients &lt;/li&gt;
&lt;li&gt;Prior judicial sanctions for tapping telephones &lt;/li&gt;
&lt;li&gt;The ‘search and seizure’ powers of revenue authorities &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 2: International Privacy Principles&lt;/h2&gt;
&lt;p&gt;This chapter summarizes recent developments in privacy laws, international privacy principles, and privacy principles developed by specific countries. This review aided the Committee in forming its recommendations for the report.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Privacy principles from which countries were reviewed by the Committee?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; The Committee reviewed privacy principles from the following countries and international organizations.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;EU Regulations of January 2012 &lt;/li&gt;
&lt;li&gt;US Consumer Privacy Bill of Rights &lt;/li&gt;
&lt;li&gt;OECD Privacy Principles &lt;/li&gt;
&lt;li&gt;APEC Privacy Framework &lt;/li&gt;
&lt;li&gt;Australia &lt;/li&gt;
&lt;li&gt;Canada &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 3: National Privacy Principles, Rationales, and Emerging Issues&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter lays out the nine national privacy principles and describes the rationale for each principle along with emerging issues around each principle.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What could the principles apply to? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The principles apply to the collection, processing, storage, retention, access, disclosure, destruction, sharing, transfer, and anonymization of sensitive personal information, personal identifiable information, and identifiable information by data controllers. The national privacy principles can also be applied to legislation, projects, practices, and policies to ensure that provisions and requirements are in compliance with the national privacy principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Who could be brought under the scope of the principles?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The principles are applicable to every data controller in the private sector and the public sector. For example organizations and government departments that determine the purposes and means of processing personal information will be brought under the scope of the principles and will be responsible for carrying out the processing of data in accordance with sectoral privacy standards or the national privacy principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: How could the National Privacy Principles impact individuals? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The principles provide individuals with the right to 1. Receive notice before giving consent stating what personal information is being collected, the purposes for which personal information is being collected, the uses of collected personal information, whether or not personal information will be disclosed to third persons, security safeguards established by the data controller, processes available to data subjects to access and correct personal information, and contact details of privacy officers. 2. Opt in and out of providing personal information 3. Withdraw given consent at any point of time. 4. Access and correct any personal information held by data controllers 5. Allow individuals to issue a complaint with the respective ombudsman, privacy commissioner, or court.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Would the National Privacy Principles be binding for every data controller? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; Yes, but Self Regulating Organizations at the industry level have the option of developing principles for that specific sector. These principles must be approved by the privacy commissioner and be in compliance with the National Privacy Principles.&lt;/p&gt;
&lt;h2&gt;Chapter 4: Analysis of Relevant Legislation, Bills, and Interests from a Privacy Perspective&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter examines relevant legislation, bills, and interests from a privacy perspective. In doing so the chapter clarifies how the right to privacy should intersect with the right to information and the freedom of expression, and anaylzes current and upcoming legislation to demonstrate what existing provisions in the legislation uphold the privacy principles, what existing provisions are in conflict with the principles, and what provisions are missing to ensure that the legislation is compliant to the extent possible with the principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: How does the report understand the relationship between the Right to Information and the Right to Privacy?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; When applied the Privacy Act should not circumscribe the Right to Information Act. Furthermore, RTI recipients should not be considered data controllers and thus should not be brought under the ambit of the privacy principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: How does the report understand the relationship between the freedom of expression and privacy? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; Questions about how to balance the right to privacy with the freedom of expression can arise in many circumstances including: the right to be forgotten and data portability, journalistic expression, state secrecy and whistle blowers, and national security. Most often, public interest is the test used to determine if the right to privacy should supersede the freedom of expression or vice versa.&lt;/p&gt;
&lt;h2&gt;Chapter 5: The Regulatory Framework&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter outlines the committee’s recommendations for a regulatory framework for the Privacy Act.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Who are the main actors in the regulatory framework?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The report recommends that a regulatory framework be comprised of one privacy commissioner at the central level and four commissioners at the regional level, self regulating organizations (SRO’s) at the industry level, data controllers and privacy officers at the organization level, and courts.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the salient features of the regulatory framework? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The salient features of the regulatory framework include 1. A framework of co-regulation 2. Complaints 3. Exceptions to the Privacy Act 4. Offenses under the Act&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are exceptions to the right to privacy? Are these blanket exceptions?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; National security; public order; disclosure of information in public interest; prevention, detection, investigation and prosecution of criminal offences; and protection of the individual or of the rights and freedoms of others are suggested exceptions to the right to privacy. The committee has qualified these exceptions with the statement that before an exception can be made for the following circumstances, the proportionality, legality, and necessity in a democratic state should be used to measure if the exception applies and the extent of the exception. Thus, they are not blanket exceptions to the right to privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Historical and scientific research and journalistic purposes were also recommended as additional exceptions to the right to privacy that may be considered. These exceptions will not be subjected to the principles of proportionality, legality, and necessary in a democratic state.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the powers and responsibilities of the privacy commissioners? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; The powers and responsibilities of the Privacy Commissioners are the following:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Responsibilities:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Enforcement of the Act &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Broadly oversee interception/access, audio &amp;amp; video recordings, the use of personal identifiers, and the use of bodily or genetic material. &lt;/li&gt;
&lt;li&gt;Evaluate and approve privacy principles developed by SRO’s &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Collaborate with stakeholders to endure effective regulation, promote awareness of the Act, and sensitize citizens to privacy considerations &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Powers: &lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Order privacy impact assessments on organisations &lt;/li&gt;
&lt;li&gt;Investigate complaints suomotu or based off of complaints from data subjects (summon documents, call and examine witnesses, and take a case to court if necessary ) &lt;/li&gt;
&lt;li&gt;Fine non-compliant data controllers &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Q: How does Co-regulation work? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The purpose of establishing a regulatory framework of co-regulation is to ensure that appropriate policies and principles are articulated and enforced for all sectors. If a sector wishes to develop its own privacy standards, the industry level self regulating organization will submit to the privacy commissioner a sub set of self regulatory norms. If these norms are approved by the privacy commissioner the SRO will be responsible for enforcing those norms, but the privacy commissioner will have the power to sanction member data controllers for violating the norms. If a sector does not have an SRO or does not wish to develop its own set of standards, the National Privacy Principles will be binding.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are data controllers? What are privacy officers? What are ombudsmen? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; A data controller is any entity that handles or process data. Privacy officers receive and handle complaints at the organizational level and may be appointed as part of a SRO’s privacy requirements for a sector.  Ombudsmen are appointed at the SRO level and are also responsible for receiving and handling complaints. The objective of having ombudsman and privacy officers is to reduce the burden of handling complaints on the commissioner and the courts.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: When can an individual issue a complaint? Which body should individuals issue complaints to? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; An individual can issue a complaint at any point of time when they feel that their personal information has not been handled by a data controller according to the principles, or that a data controller is not in compliance with the Act. When applicable complaints are encouraged to be issued first to the organization. If the complaint is not resolved, the individual can take the complaint to the SRO or privacy commissioner. The individual also has the option of taking a complaint straight to the courts. When a complaint is received by the commissioner, the commissioner may fine the data controller if it is found to be non-compliant. Data controllers cannot appeal fines issued by the commissioner, but they can appeal the initial decision of non-compliance.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Can an individual receive compensation for a violation of privacy: &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; Yes. Individuals who suffer damages caused by non-compliance with the principles or any obligation under the Act can receive compensation, but the compensation must be issued by the courts and cannot be issued by a privacy commissioner. Actors that can be held liable by individuals include data controllers, organization directors, agency directors, and heads of Governmental departments.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What offences does the report reccomend?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; The following constitutes as an offence under the Act:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Non-compliance with the  privacy principles &lt;/li&gt;
&lt;li&gt;Unlawful  collection,  processing,  sharing/disclosure,  access,  and  use  of personal data &lt;/li&gt;
&lt;li&gt;Obstruction of commissioner &lt;/li&gt;
&lt;li&gt;Failure to comply with notification issued by commissioner        
&lt;ul&gt;
&lt;li&gt; Processing data after receiving a notification &lt;/li&gt;
&lt;li&gt; Failure to appear before commissioner &lt;/li&gt;
&lt;li&gt;Failure to produce documents requested by commissioner &lt;/li&gt;
&lt;li&gt; Sending report to commissioner with false or misleading information&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 6: The Multiple Dimensions of Privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter gives examples of practices that impact privacy in India which the national privacy principles could be applied to. These include interception/access, the use of electronic recording devices, the use of personal identifiers, and the use of bodily and genetic material. The current state of each practice in India is described, and the inconsistencies and gaps in the regimes are highlighted. Each section also provides recommendations of which privacy principles need to be addressed and strengthened in each practice, and how the privacy principles would be affected by each practice.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Does the report give specific recommendations as to how each practice should be amended to incorporate the National Privacy Principles?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; No. Each section explains the current state of the practice in India, gaps and inconsistencies with the current practice,  and recommends broadly what principles need to be addressed and strengthened in the regime, and how the National Privacy Principles may be affected by the practice.&lt;/p&gt;
&lt;h3&gt;Summary of Recommendations&lt;/h3&gt;
&lt;p&gt;This chapter consolidates and clarifies all of the Committee’s recommendations for a Privacy Act in India.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Are the recommendations in this chapter different from chapters above?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; No.  The recommendations in this chapter reflect the recommendations made earlier. This chapter does clarify the recommended scope and objectives of the Privacy Act  including:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The Act should define and harmonize with existing laws in force. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Act should extend the right of privacy to all individuals in India and all data processed by any company or equipment locating in India, and all data that originated in India. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Act should clarify that the publication of personal data for artistic and journalistic purposes in public interest, the use of personal information for household purposes, and the disclosure of information as required by the Right to Information Act should not constitute an infringement of privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Act should not require a ‘reasonable expectation’ of privacy to be present for the right to be evoked. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If any other legislation provides more extensive protections than those set out by the Privacy Act, than the more extensive protections should apply. &lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy.pdf" class="internal-link"&gt;Report of the Group of Experts on Privacy&lt;/a&gt; [PDF, 1270 Kb]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy'&gt;https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-09T10:20:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms">
    <title>Law yet to catch up with tech-enabled peeping toms</title>
    <link>https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms</link>
    <description>
        &lt;b&gt;Devices that give sharp images are the order of the day. But this clarity is lacking when it comes to regulating use of cameras and camera phones in public places, say policy makers.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Sandhya Soman &amp;amp; Pratiksha Ramkumar was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2012-11-07/chennai/34972633_1_privacy-law-phones-in-public-places-camera-phones"&gt;published&lt;/a&gt; in the Times of India on November 7, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If there is one thing that sends more clients harried by blackmailers to detectives like A M Malathy of Malathy Detective Agency, it is the pervasive presence of the camera, most often inside modest cell phones. "One girl had to leave a town as her ex-boyfriend uploaded her photo on the internet and referred to her as a call girl. We got the web page removed," says Malathy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But tracing culprits is difficult if they are strangers on the road. Absence of a privacy law makes it difficult for police to book culprits. "If someone photographs a woman on a bus, we can ask the person to delete it. But we can't book the person s there is no law," says Jegabar Sali, assistant commissioner, cyber crime cell.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology (IT) Act, 2000 talks of punishment only in cases where a person's private areas have been photographed. However, things are looking up with the government trying to draw up the Right to Privacy Bill.&lt;br /&gt;&lt;br /&gt;"The problems posed by digital technology are complex and we need to define what these new crimes are," says Rajeev Chandrasekhar, independent Member of Parliament, who introduced the Right to Privacy Bill,2010 in Parliament. "I did it because I got representations from parents and women about how MMS clips were being used to blackmail them," says Chandrasekhar.&lt;br /&gt;&lt;br /&gt;There have been attempts at legislation earlier. The Mobile Camera Phone Users (Code of Conduct) Bill, 2006 attempted to regulate the use of camera phones in public places. It proposed that manufactures build camera phones that flash a light or emit a 'click' sound, and that users should get consent of the person being photographed.&lt;br /&gt;&lt;br /&gt;"The sound and light are for informing people that they are being filmed," says Sunil Abraham, executive director, Centre for Internet and Society, a Bangalore-based organisation that was part of the committee. These provisions are part of South Korea's privacy law, which sought to bring down cases of technology-enabled 'upskirt' photography, where photos of women were taken without their permission, he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms'&gt;https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-08T08:06:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/live-mint-politics-surabhi-agarwal-nov-6-2012-information-security-policy-on-govt-agenda">
    <title>Information security policy on govt agenda</title>
    <link>https://cis-india.org/news/live-mint-politics-surabhi-agarwal-nov-6-2012-information-security-policy-on-govt-agenda</link>
    <description>
        &lt;b&gt;As an increasing quantity of sensitive information is transmitted through electronic channels, the government is considering putting in place an internal information security policy to reduce the risk of leaks and counter possible cyber attacks, said three government officials involved in discussions on the proposal.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Surabhi Agarwal's article was &lt;a class="external-link" href="http://www.livemint.com/Politics/TyFgDxthlTap5XwzA84gdO/Information-security-policy-on-govt-agenda.html"&gt;published&lt;/a&gt; in LiveMint on November 6, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The policy will include new guidelines on top of the standards set out by the Official Secrets Act, 1923, and mandate safeguards for each category of information on how it should be transmitted, stored and preserved. The categories are “top secret”, “secret”, “confidential”, “restricted” and “official use only”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts argue that given the easy portability of such information and its vulnerability to hackers, the policy should have been in place much sooner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Official Secrets Act seeks to protect sensitive information including official communications, sketch plans, documents and other information pertaining to government functioning. Gaining wrongful access to information deemed to be an official secret or unauthorized use of such information are regarded as offences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that the law was enacted almost a quarter century before independence, it had no provisions to deal with electronic transmission of such information made possible by technological advances in subsequent decades, said cyber expert &lt;a href="http://www.livemint.com/Search/Link/Keyword/Pawan%20Duggal"&gt;Pawan Duggal&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the three government officials cited above said the aim of the proposed internal information security policy is to protect classified information that’s transmitted electronically much as it is done currently in the paper format.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"As more information is getting transmitted in the electronic format, we have to put in place procedures, guidelines, policies and standards for protecting that information in the electronic format," the official said.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/mbEt4qd0fnA" width="320"&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;br /&gt;From the newsroom: Securing government information&lt;/p&gt;
&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The discussions, being anchored by the home ministry, have been under way for some time and the policy should be finalized in the “next few months”, the official said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A second official said the policy will lay down the dos and don’ts for government officers on how information has to be transmitted, stored and preserved in the electronic format. “In case of a breach, the investigation agencies can then look into whether the requisite safeguards were followed or not,” the official said. The proposal follows a rash of attacks on government computer systems that exposed their vulnerability to hackers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Former minister of state for communications and information technology &lt;a href="http://www.livemint.com/Search/Link/Keyword/Sachin%20Pilot"&gt;Sachin Pilot&lt;/a&gt; told Parliament recently that between December 2011 and February 2012, a total of 112 government websites had been hacked.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;A third government official, who also didn’t want to be identified, said that every government official would have to follow standard procedures in electronic transmission of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The moment one’s computer is connected to the Internet, it is part of a global network, so attackers in the cyber space know which information can be stolen from where if the necessary deterrents are not in place,” the official said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sensitive information such as tax matters and intellectual property issues are part of the information that’s transmitted electronically by government offices, which if leaked can have market implications as well as an impact on governance, experts said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The government leaks like a sieve,” said &lt;a href="http://www.livemint.com/Search/Link/Keyword/B.G.%20Verghese"&gt;B.G. Verghese&lt;/a&gt;, a visiting professor at New Delhi-based Centre for Policy Research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is a step and they are trying to lay some ground rules to regulate a process that fits in with concepts of law, good governance, Constitution, privacy and prevents any wrongdoing,” Verghese said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposed policy, when put in place, will be a step forward so long as it does not dilute the powers available to citizens under the Right to Information Act, said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;, executive director of Bangalore-based research organization Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently there are several concerns centred on electronic transmission, including questions about who is responsible for information, especially its unauthorized use. “This could help establish an audit trail,” Abraham said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first government official quoted above stressed that although cyber security and information security cut across each other, the two concepts are different.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Cyber (security) is basically about devices and networks, whereas information security is very particularly about the information which travels on the net,” this official said. Reinforced cyber security will be an additional benefit once the information security policy comes into force, he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/live-mint-politics-surabhi-agarwal-nov-6-2012-information-security-policy-on-govt-agenda'&gt;https://cis-india.org/news/live-mint-politics-surabhi-agarwal-nov-6-2012-information-security-policy-on-govt-agenda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-11-08T06:18:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/who-is-following-me">
    <title>Who is Following Me: Tracking the Trackers (IGF2012)</title>
    <link>https://cis-india.org/news/who-is-following-me</link>
    <description>
        &lt;b&gt;The Internet Society and the Council of Europe are co-organising a workshop at the IGF (Baku - 8 November 2012 - 09:00 - 10:30) regarding online tracking. Malavika Jayaram is a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Interest in online tracking as a policy issue spiked with the release  of the Preliminary Federal Trade Commission Staff Report in December  2010 entitled &lt;i&gt;Protecting Consumer Privacy in an Era of Rapid Change – A Proposed Framework for Businesses and Policymakers&lt;/i&gt; calling for a “do not track” mechanism, the launch of the W3C Tracking  Protection Workng Group and the recent entry into force of the so-called  European “Cookie Directive” provisions. However, the actual and  potential observation of individuals’ interactions online has long been a  concern for privacy advocates and others.&lt;/p&gt;
&lt;p&gt;Much of the policy attention is currently focused on cookies used to  track users to build profiles for more targeted advertising, but some of  the more difficult issues are:&lt;/p&gt;
&lt;ul class="rteindent1"&gt;
&lt;li style="text-align: justify; "&gt; How to deal with less-observable tracking (e.g. browser and/or device  fingerprinting, monitoring of publicly disclosed information)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; How to develop laws that accommodate different tracking scenarios – for example:  
&lt;ul&gt;
&lt;li&gt; different entities (law enforcement, companies, etc.); &lt;/li&gt;
&lt;li&gt; different and sometimes multiple purposes (security, personalising  user experience, targeting advertising, malicious activity; etc.); &lt;/li&gt;
&lt;li&gt; first-party and third-party tracking o single site and multiple site tracking&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Transparency (particularly on small mobile devices)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Whether a traditional consent model is sufficient and effective&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The panel:&lt;/p&gt;
&lt;ul class="rteindent1"&gt;
&lt;li&gt; Wendy Seltzer, Policy Council, World Wide Web Consortium (W3C)&lt;/li&gt;
&lt;li&gt; Kimon Zorbas, Vice President, Interactive Advertising Bureau (IAB) Europe&lt;/li&gt;
&lt;li&gt; Cornelia Kutterer, Director of Regulatory Policy, Corporate Affairs, LCA, Microsoft EMEA&lt;/li&gt;
&lt;li&gt; Malavika Jayaram, partner at Jayaram &amp;amp; Jayaram, Bangalore&lt;/li&gt;
&lt;li&gt; Shaundra Watson, Counsel for international consumer protection, USA Federal Trade Commission&lt;/li&gt;
&lt;li&gt; Rob van Eijk, Council of Europe expert, Leiden University (PhD student)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The moderators:&lt;/p&gt;
&lt;ul class="rteindent1"&gt;
&lt;li&gt; Christine Runnegar, Internet Society&lt;/li&gt;
&lt;li&gt; Sophie Kwasny, Council of Europe&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The remote moderator:&lt;/p&gt;
&lt;ul class="rteindent1"&gt;
&lt;li&gt; James Lawson, Council of Europe&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This workshop will explore:&lt;/p&gt;
&lt;ul class="rteindent1"&gt;
&lt;li&gt; Current and emerging trends in online tracking (and their related purposes)&lt;/li&gt;
&lt;li&gt; How to give individuals full knowledge of the tracking that occurs when they go online&lt;/li&gt;
&lt;li&gt; Mechanisms to give individuals greater control over tracking and data use&lt;/li&gt;
&lt;li&gt; The respective roles of all actors (government, law enforcement,  Internet intermediaries, businesses, browser vendors, application  developers, advertisers, data brokers, users, Internet technical  community, etc.) &lt;/li&gt;
&lt;li&gt; Whether effective data protection online can be ensured solely by law.&lt;/li&gt;
&lt;li&gt; Whether self-regulation and voluntary consensus standards offer better  options for tuning privacy choice to the rapidly advancing technology  environment.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Please read our &lt;b&gt;&lt;a href="http://www.internetsociety.org/sites/default/files/Tracking%20-%20Background%20paper%2020120711_0.pdf"&gt;background paper&lt;/a&gt;&lt;/b&gt; and &lt;a href="http://www.internetsociety.org/doc/who-following-me-tracking-trackers-part-2"&gt;&lt;b&gt;update&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/who-is-following-me'&gt;https://cis-india.org/news/who-is-following-me&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-07T17:17:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/solutions-for-cross-border-data-flows">
    <title>Solutions for Enabling Cross-border Data Flows</title>
    <link>https://cis-india.org/news/solutions-for-cross-border-data-flows</link>
    <description>
        &lt;b&gt;ICC BASIS and the Internet Society are co-organising a workshop at the IGF (Baku - 7 November 2012 - 14:30 to 16:00) to explore solutions for enabling cross-border data flows. Malavika Jayaram is a panelist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by&lt;a class="external-link" href="http://www.internetsociety.org/solutions-enabling-cross-border-data-flows-igf2012"&gt; Internet Society&lt;/a&gt;. For details published on the IGF website, see &lt;a class="external-link" href="http://http//wsms1.intgovforum.org/content/no86-solutions-enabling-cross-border-data-flows"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;BRIEF OVERVIEW&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet has revolutionised our ability to communicate and share  data beyond national boundaries, thereby facilitating cross-border  social and commercial interactions. Enabling cross-border data flows,  however, raises a number of important Internet governance policy  considerations for a broad range of stakeholders, such as business,  intermediaries, users, law enforcement agencies, governments,  policymakers and the wider Internet technical community. In this  context, the workshop will explore policy issues, from various  stakeholder perspectives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dynamic panel of experts will provide a wide range of  perspectives for this discussion and explore concrete solutions and  options for enabling cross-border data flows. This is an important  opportunity to raise awareness about the practical and the policy  realities raised by these issues. It will also be an opportunity to  share concrete issues, experiences, possible approaches and solutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;MODERATOR&lt;/b&gt;&lt;br /&gt; Jeff Brueggeman, Vice President-Public Policy &amp;amp; Deputy Chief Privacy Officer, AT&amp;amp;T&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;PANELLISTS&lt;/b&gt;&lt;br /&gt; Joseph Alhadeff, Chief Privacy Strategist, Vice President, Global Public Policy, Oracle&lt;br /&gt; Maria Häll, Ministry of Enterprise, Energy and Communications, Sweden&lt;br /&gt; Malavika Jayaram, Partner, Jayaram &amp;amp; Jayaram, Bangalore&lt;br /&gt; Christine Runnegar, Senior Policy Advisor, Internet Society&lt;br /&gt; Ivan Sanchez Medina, Member of the Columbian National Telecommunications Commission, CRC&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;LEAD DISCUSSANTS&lt;/b&gt;&lt;br /&gt; Olga Cavalli, Advisor to the Ministry of Foreign Affairs, Argentina&lt;br /&gt; Christoph Steck, Chief Regulatory Officer, Telefonica (TBC)&lt;br /&gt; Kevin Bankston, Senior Counsel and Free Expression Director, Center for Democracy &amp;amp; Technology&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;REMOTE MODERATOR&lt;/b&gt;&lt;br /&gt; Constance Weise, ICC BASIS&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;SUBSTANTIVE RAPPORTEUR &lt;/b&gt;&lt;br /&gt; Karen Mulberry, Policy Advisor, Internet Society&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/solutions-for-cross-border-data-flows'&gt;https://cis-india.org/news/solutions-for-cross-border-data-flows&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-07T22:42:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
