<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1421 to 1435.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-september-3-2015-harjeet-inder-singh-sahi-hiding-behind-rules-on-naming-sites-it-banned-govt-reveals-fears"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-september-3-2015-surabhi-agarwal-govt-tie-up-with-global-police-interpol-to-fight-child-pornography"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-september-1-2015-parshathy-nath-does-this-click-with-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-september-26-2015-ahead-of-hosting-modi-facebook-rebrands-internet-dot-org-as-free-basics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-26-09-2015-sunil-abraham-hits-and-misses-with-draft-encryption-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-september-22-2015-bowing-to-public-pressure-govt-withdraws-draft-encryption-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-september-3-2015-harjeet-inder-singh-sahi-hiding-behind-rules-on-naming-sites-it-banned-govt-reveals-fears">
    <title>Hiding behind rules on naming sites it banned, govt reveals fears </title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-september-3-2015-harjeet-inder-singh-sahi-hiding-behind-rules-on-naming-sites-it-banned-govt-reveals-fears</link>
    <description>
        &lt;b&gt;With the union government's ban on 857 porn sites in July creating brouhaha across the country, there had been a concern over the voice of the youth being stifled and censorship making a comeback.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Harjeet Inder Singh Sahi was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/chandigarh/hiding-behind-rules-on-naming-sites-it-banned-govt-reveals-fears/story-Ef2IdZLe4mu15KNpe8HOHO.html"&gt;Hindustan Times&lt;/a&gt; on September 3, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Even though there was a partial rollback of the ban, the government  still seems intent on being obtrusive with information and deny access  to it, especially about the internet and the way it intends to govern  it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This has been illustrated by the union government's department of  telecommunications refusing to provide information on websites it has  banned to a petition under the Right to Information (RTI) Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The reply&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The group coordinator, cyber law division, department of electronics  and information technology, has been authorised as designated officer  and issues instructions for blocking/unblocking of websites/URLs. The  clause 16 of Information Technology Procedure and Safeguards for  blocking access of information by Public, Rules 2009, says strict  confidentiality shall be maintained regarding all requests and  complaints received and actions taken thereof," says the reply to the  RTI application filed by this correspondent on August 3.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reply to the petition - filed at &lt;a href="http://www.rtionline.gov.in"&gt;www.rtionline.gov.in&lt;/a&gt; with registration number DOTEL/R/2015/61348 - was received on August 27.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Background to the case&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In July this year, the department of electronics and information  technology had banned 857 pornographic websites listed in the petition  of Indore-based advocate Kamlesh Vaswani in the supreme court. The  websites were banned by citing 'morality' and 'decency' enshrined in  Article 19 (2) of the Constitution of India and under provisions of the  Information Technology Act, 2000. A few days later, the government did a  flip-flop and revoked the ban partially.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) had subsequently released  the list online. Now, the government has refused to provide information  on websites banned in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Department tangle&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The department of electronics and IT decided on the ban, but it was  the department of telecom which served the order to the internet  companies because it is the supervising authority for them. The RTI can  be filed with the department of telecom as it issues guidelines for and  notices to internet service providers. The same application could also  have been filed with the department of electronics and information  technology. This department might have replied to the application or  forwarded it to the telecom department.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-september-3-2015-harjeet-inder-singh-sahi-hiding-behind-rules-on-naming-sites-it-banned-govt-reveals-fears'&gt;https://cis-india.org/internet-governance/news/hindustan-times-september-3-2015-harjeet-inder-singh-sahi-hiding-behind-rules-on-naming-sites-it-banned-govt-reveals-fears&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-09-27T10:59:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-september-3-2015-surabhi-agarwal-govt-tie-up-with-global-police-interpol-to-fight-child-pornography">
    <title>Government may tieup with global police, Interpol to fight child pornography</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-september-3-2015-surabhi-agarwal-govt-tie-up-with-global-police-interpol-to-fight-child-pornography</link>
    <description>
        &lt;b&gt;International partnerships, including with the global police network Interpol, could be the basis for India's strategy to counter child pornography after the government's move to ban websites peddling smut backfired last month.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was published in the &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2015-09-03/news/66178673_1_websites-international-criminal-police-organization-interpol"&gt;Economic Times&lt;/a&gt; on September 3, 2015. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The new approach by the ministry of communications and information  technology mirrors the system adopted by developed countries, government  officials said, representing a targetted attack on child pornography  instead of the recent fiasco when the authorities backtracked in the  face of protests after banning 857 websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once it comes on board as a partner, the International Criminal  Police Organization will alert India about production, distribution or  broadcast of child pornographic content regularly. India will also have  access to an Interpol database known as the 'worst of ' list of domains  with content containing child sexual abuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The country is not  divided on the issue of child pornography and the government has made a  policy statement that it will deal with the problem firmly. So that will  be guiding the entire action," a senior government official said. The  person said that the government is still studying the model and a call  will be taken soon.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A partnership with the UK-based Internet Watch Foundation, which  maintains a database on child pornography and collaborates with the  British government, is also being considered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interpol manages a  database which uses sophisticated image comparison software to make  connections between victims and places. The foundation also maintains a  similar database which is constantly updated. It sends alerts to members  twice each day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"That's the global best practice," said Sunil  Abraham, executive director of Bangalore based advocacy group Centre for  Internet and Society. "There is no reason for us to reinvent anything;  we should just adopt the best practice with some improvements." For a  long time, the government and Internet service providers have been  passing the buck to each other on this issue, arguing that they don't  have the wherewithal to create a database on such content and block it.  "This is because as per the Indian laws, anyone who looks at such  content even with the motive of blocking it is committing a punishable  offense," said Abraham.   In August the government said it was  banning 857 pornographic websites, only to backtrack amidst widespread  criticism and a rap from the Supreme Court. Almost all the websites have  been unblocked now with the exception of a few which allegedly contain  child pornographic content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the hearing in the Supreme Court, the Internet Service  Providers Association of India (ISPAI) said that it is impossible for an  ISP to block pornographic sites without orders from the court or  department of telecom and that the task of identifying such websites  should not be the domain of internet service providers. A decision on  the issue will work in the government's favour since the next hearing in  the matter is slated for October. "Once the country has access to some  list which is authentic and verified, regular action can be taken," a  government official said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per initial discussions, the  dominant point of view is for ISPAI to be the point of contact between  the government and international organisations. It will be tasked with  vetting the list and receiving blocking orders from the telecom  department so that further action can be taken.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-september-3-2015-surabhi-agarwal-govt-tie-up-with-global-police-interpol-to-fight-child-pornography'&gt;https://cis-india.org/internet-governance/news/economic-times-september-3-2015-surabhi-agarwal-govt-tie-up-with-global-police-interpol-to-fight-child-pornography&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Obscenity</dc:subject>
    
    
        <dc:subject>Pornography</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-09-27T10:25:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-september-1-2015-parshathy-nath-does-this-click-with-you">
    <title>Does this click with you?</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-september-1-2015-parshathy-nath-does-this-click-with-you</link>
    <description>
        &lt;b&gt;While the web caters to customers who purchase basic lifestyle products, the app is ideal to make impulsive shopping decisions.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article by Parshathy J. Nath was published in the &lt;a class="external-link" href="http://www.thehindu.com/features/metroplus/a-comparison-between-web-and-app-online-shopping/article7603672.ece"&gt;Hindu&lt;/a&gt; on September 1, 2015. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;Netizens were caught by surprise when online retail giant Flipkart  announced that they were going the app-only way. Some grumbled and a few  rejoiced. There were debates on its pros and cons. However, a few days  ago, Flipkart revoked the decision because it wanted to assess the  impact of this move on sales in big-ticket categories. But the debate  continues.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Bangalore-based techie Diljeet Kaur feels the app makes shopping a lot  easier. “I shop on the app for everything — from mobile chargers,  laptop, mobile covers and kitchen appliances to books and even water  bottles. In case I am not happy, I click on the return option. They call  up immediately, pick up the item within 48 hours and refund the amount  to my account. What more can one ask for?”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Rachna Binani, who owns a toy store in Madurai, also says shopping has  become faster with the app. “A mobile phone is with you for 18 hours a  day. But, you can’t lug a laptop around everywhere you go.” Prasannan  B., an HR General Manager in Madurai, agrees. “A year ago, I would not  have chosen a mobile app over a website, because it was not as advanced.  But, now things have changed.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;But, some prefer the website to the app. Like Paulami Guha Biswas, an  avid online book shopper from Hyderabad, who says, “Browsing becomes  difficult when you are shopping through an app. On a website, you can  open multiple tabs and compare prices and discount rates in peace. The  screen is also bigger.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While the web caters to customers who purchase basic lifestyle products,  the app is ideal to make impulsive shopping decisions. Says Jaishree S.  Santhosh, CEO of a Coimbatore-based educational institution, “I prefer  to do random window shopping through a website and stick to apps when it  comes to my regular Flipkart and Amazon shopping. Because when I use  apps, I need to log in and share my personal information. I would prefer  to do that only with two or three sites and not every virtual shopping  platform.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;However, apps are redefining our shopping culture and experience. With  efficient data-tracking systems, these apps record the customer’s buys.  “The app keeps throwing images of products that interest you, based on  your purchase history. This can be a little creepy at times,” says  Jaishree. “It seems like it can read your mind. I do not like it getting  too personal with me. Moreover, it tempts me to buy things that I  otherwise would not have thought of buying.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The personalised shopping experience can be both a boon and bane.  According to Sunil Abraham, Executive Director of the Centre for  Internet and Society, a Bangalore-based research organisation, “It is a  terrible development from the perspective of the online user’s rights.  Apps violate user privacy. Moreover, they waste your phone’s memory,  storage and battery.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Even though mobiles and apps are popular among the youth, young  entrepreneurs from the online world are still hesitant to venture into  the app domain. Nilisha Bhimani, a 28-year-old online entrepreneur who  runs www.stayfabulous.com, says she cannot even imagine making her  portal app-only. “Mine is a fashion portal. And with fashion shopping,  one would want to open multiple windows and compare products. It is  difficult to do this on our phones.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;However, Nilisha thinks that it is a good move from Flipkart to have  sparked off this debate. “It sounds like a well-thought-out strategy.  More so, since surveys point out that there are increasingly more people  doing mobile transactions.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;According to an article published in &lt;i&gt;Business Insider &lt;/i&gt;on August  24, a study conducted by Internet &amp;amp; Mobile Association of India and  KPMG found out that India is projected to have 236 million mobile  Internet users by 2016. Flipkart’s move could be a response to the large  influx of smart phones into the Indian mobile market, feels Ashish  Jhalani, founder of eTailing India, an e-commerce knowledge platform and  advisory. “We will be the second-largest smartphone market in the world  soon, but that does not mean we are ready for an app-only strategy. Our  consumer base is still getting used to shopping online and to ask them  to use only one interface to shop is a little premature. I believe, in  the long term, this strategy will work, but there is still some time for  that.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;And, how will elders in the society, who also constitute a large section  of online customers, cope with change? Suchi Dalmia, a business woman  from Coimbatore, says that even though her mother shops online, she is  still not comfortable with it. “And on top of it, if we open up an  app-only shopping system, it is going to hit her hard. A retail giant  like Flipkart stands the risk of losing a big chunk of their clientele  with this move.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;(With inputs from Soma Basu, Shilpa Sebastian R. and Nikhil Varma)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-september-1-2015-parshathy-nath-does-this-click-with-you'&gt;https://cis-india.org/internet-governance/news/the-hindu-september-1-2015-parshathy-nath-does-this-click-with-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-27T10:07:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-september-26-2015-ahead-of-hosting-modi-facebook-rebrands-internet-dot-org-as-free-basics">
    <title>Ahead of hosting Modi, Facebook rebrands internet.org as Free Basics</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-september-26-2015-ahead-of-hosting-modi-facebook-rebrands-internet-dot-org-as-free-basics</link>
    <description>
        &lt;b&gt;Hinting at what could be vital points of discussion when Prime Minister Narendra Modi visits Facebook founder Mark Zuckerberg on Sunday, the social media giant has rebranded its internet access enabling platform Internet.org as Free Basics.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by &lt;a class="external-link" href="http://www.business-standard.com/article/current-affairs/facebooks-internet-org-is-now-free-basics-115092500238_1.html"&gt;Business Standard&lt;/a&gt; on September 26, 2015. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was announced by Chris Daniels, vice-president of Internet.org, at a press meet in Menlo Park on Friday. Zuckerberg confirmed the same and wrote on his Facebook wall.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;Facebook has opened up its &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Free+Basics" target="_blank"&gt;Free Basics &lt;/a&gt;platform,  which means any app developer can now include their services on it.  “This gives people the power to choose what apps they want to use.”  Zuckerberg in his post also said the company has improved the security  and privacy of Internet.org, which will support HTTPS web services as  well. “Connectivity isn't an end in itself. It’s what people do with it  that matters. We hope the improvements we've made  help even more people  get connected — so that our whole global community can benefit  together,” Zuckerberg said in his post, in which he quoted the example  of a soybean farmer from Maharashtra, Asif Mujhawar, who uses parenting  app BabyCenter for free through Internet.org.&lt;br /&gt; &lt;br /&gt; This is a significant move by Facebook, considering the backlash it had  from various quarters in India following debates on net neutrality.  Internet.org is an open platform by Facebook across 19 developing  countries, including India, to enable easy access of selected apps and  app-based services to people at zero cost. In India, it had partnered  with Reliance Communications to offer free access to about 30 websites.&lt;br /&gt; &lt;br /&gt; “One of the concerns was calling the service ‘Internet.org’, despite it  representing only a tiny sliver of the Internet,” said Pranesh Prakash,  policy director at the centre for Internet and Society, a nonprofit  entity to promote safe internet access in the country.&lt;br /&gt; &lt;br /&gt; He said by removing the Internet word, Facebook is now talking of its  own larger internet affordability project and allowing app developers to  build apps and host it on the  Free Basic platform. “This gives people  the power to choose what apps they want to use,” Prakash said.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-september-26-2015-ahead-of-hosting-modi-facebook-rebrands-internet-dot-org-as-free-basics'&gt;https://cis-india.org/internet-governance/news/business-standard-september-26-2015-ahead-of-hosting-modi-facebook-rebrands-internet-dot-org-as-free-basics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-18T14:21:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-26-09-2015-sunil-abraham-hits-and-misses-with-draft-encryption-policy">
    <title>Hits and Misses With the Draft Encryption Policy</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-26-09-2015-sunil-abraham-hits-and-misses-with-draft-encryption-policy</link>
    <description>
        &lt;b&gt;Most encryption standards are open standards. They are developed by open participation in a publicly scrutable process by industry, academia and governments in standard setting organisations (SSOs) using the principles of “rough consensus” – sometimes established by the number of participants humming in unison – and “running code” – a working implementation of the standard. The open model of standards development is based on the Free and Open Source Software (FOSS) philosophy that “many eyes make all bugs shallow”.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://thewire.in/2015/09/26/hits-and-misses-with-the-draft-encryption-policy-11708/"&gt;published in the Wire&lt;/a&gt; on September 26, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This model has largely been a success but as Edward Snowden in his revelations has told us, the US with its large army of mathematicians has managed to compromise some of the standards that have been developed under public and peer scrutiny. Once a standard is developed, its success or failure depends on voluntary adoption by various sections of the market – the private sector, government (since in most markets the scale of public procurement can shape the market) and end-users. This process of voluntary adoption usually results in the best standards rising to the top. Mandates on high quality encryption standards and minimum key-sizes are an excellent idea within the government context to ensure that state, military, intelligence and law enforcement agencies are protected from foreign surveillance and traitors from within. In other words, these mandates are based on a national security imperative.&lt;br /&gt;&lt;br /&gt;However, similar mandates for corporations and ordinary citizens are based on a diametrically opposite imperative – surveillance. Therefore these mandates usually require the use of standards that governments can compromise usually via a brute force method (wherein supercomputers generate and attempt every possible key) and smaller key-lengths for it is generally the case that the smaller the key-length the quicker it is for the supercomputers to break in. These mandates, unlike the ones for state, military, intelligence and law enforcement agencies, interfere with the market-based voluntary adoption of standards and therefore are examples of inappropriate regulation that will undermine the security and stability of information societies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Plain-text storage requirement&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;First, the draft policy mandates that Business to Business (B2B) users and Consumer to Consumer (C2C) users store equivalent plain text (decrypted versions) of their encrypted communications and storage data for 90 days from the date of transaction. This requirement is impossible to comply with for three reasons. Foremost, encryption for web sessions are based on dynamically generated keys and users are not even aware that their interaction with web servers (including webmail such as Gmail and Yahoo Mail) are encrypted. Next, from a usability perspective, this would require additional manual steps which no one has the time for as part of their daily usage of technologies. Finally, the plain text storage will become a honey pot for attackers. In effect this requirement is as good as saying “don’t use encryption”.&lt;br /&gt;&lt;br /&gt;Second, the policy mandates that B2C and “service providers located within and outside India, using encryption” shall provide readable plain-text along with the corresponding encrypted information using the same software/hardware used to produce the encrypted information when demanded in line with the provisions of the laws of the country. From the perspective of lawful interception and targeted surveillance, it is indeed important that corporations cooperate with Indian intelligence and law enforcement agencies in a manner that is compliant with international and domestic human rights law. However, there are three circumstances where this is unworkable: 1) when the service providers are FOSS communities like the TOR project which don’t retain any user data and as far as we know don’t cooperate with any government; 2) when the service provider provides consumers with solutions based on end-to-end encryption and therefore do not hold the private keys that are required for decryption; and 3) when the Indian market is too small for a foreign provider to take requests from the Indian government seriously.&lt;br /&gt;&lt;br /&gt;Where it is technically possible for the service provider to cooperate with Indian law enforcement and intelligence, greater compliance can be ensured by Indian participation in multilateral and multi-stakeholder internet governance policy development to ensure greater harmonisation of substantive and procedural law across jurisdictions. Options here for India include reform of the Mutual Legal Assistance Treaty (MLAT) process and standardisation of user data request formats via the Internet Jurisdiction Project.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Regulatory design&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Governments don’t have unlimited regulatory capability or capacity. They have to be conservative when designing regulation so that a high degree of compliance can be ensured. The draft policy mandates that citizens only use “encryption algorithms and key sizes will be prescribed by the government through notification from time to time.” This would be near impossible to enforce given the burgeoning multiplicity of encryption technologies available and the number of citizens that will get online in the coming years. Similarly the mandate that “service providers located within and outside India…must enter into an agreement with the government”, “vendors of encryption products shall register their products with the designated agency of the government” and “vendors shall submit working copies of the encryption software / hardware to the government along with professional quality documentation, test suites and execution platform environments” would be impossible for two reasons: that cloud based providers will not submit their software since they would want to protect their intellectual property from competitors, and that smaller and non-profit service providers may not comply since they can’t be threatened with bans or block orders.&lt;br /&gt;&lt;br /&gt;This approach to regulation is inspired by license raj thinking where enforcement requires enforcement capability and capacity that we don’t have. It would be more appropriate to have a “harms”-based approach wherein the government targets only those corporations that don’t comply with legitimate law enforcement and intelligence requests for user data and interception of communication.&lt;br /&gt;&lt;br /&gt;Also, while the “Technical Advisory Committee” is the appropriate mechanism to ensure that policies remain technologically neutral, it does not appear that the annexure of the draft policy, i.e. “Draft Notification on modes and methods of Encryption prescribed under Section 84A of Information Technology Act 2000”, has been properly debated by technical experts. According to my colleague Pranesh Prakash, “of the three symmetric cryptographic primitives that are listed – AES, 3DES, and RC4 – one, RC4, has been shown to be a broken cipher.”&lt;br /&gt;&lt;br /&gt;The draft policy also doesn’t take into account the security requirements of the IT, ITES, BPO and KPO industries that handle foreign intellectual property and personal information that is protected under European or American data protection law. If clients of these Indian companies feel that the Indian government would be able to access their confidential information, they will take their business to competing countries such as the Philippines.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;And the good news is…&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the second objective of the policy, which encourages “wider usage of digital Signature by all entities including Government for trusted communication, transactions and authentication” is laudable but should have ideally been a mandate for all government officials as this will ensure non-repudiation. Government officials would not be able to deny authorship for their communications or approvals that they grant for various applications and files that they process.&lt;br /&gt;&lt;br /&gt;Second, the setting up of “testing and evaluation infrastructure for encryption products” is also long overdue. The initiation of “research and development programs … for the development of indigenous algorithms and manufacture of indigenous products” is slightly utopian because it will be a long time before indigenous standards are as good as the global state of the art but also notable as an important start.&lt;br /&gt;&lt;br /&gt;The more important step for the government is to ensure high quality Indian participation in global SSOs and contributions to global standards. This has to be done through competition and market-based mechanisms wherein at least a billion dollars from the last spectrum auction should be immediately spent on funding existing government organisations, research organisations, independent research scholars and private sector organisations. These decisions should be made by peer-based committees and based on publicly verifiable measures of scientific rigour such as number of publications in peer-reviewed academic journals and acceptance of “running code” by SSOs.&lt;br /&gt;&lt;br /&gt;Additionally the government needs to start making mathematics a viable career in India by either employing mathematicians directly or funding academic and independent research organisations who employ mathematicians. The basis of all encryptions standards is mathematics and we urgently need the tribe of Indian mathematicians to increase dramatically in this country.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-26-09-2015-sunil-abraham-hits-and-misses-with-draft-encryption-policy'&gt;https://cis-india.org/internet-governance/blog/the-wire-26-09-2015-sunil-abraham-hits-and-misses-with-draft-encryption-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>FOSS</dc:subject>
    
    
        <dc:subject>B2B</dc:subject>
    

   <dc:date>2015-09-26T16:46:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar">
    <title>Open Governance and Privacy in a Post-Snowden World : Webinar</title>
    <link>https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar</link>
    <description>
        &lt;b&gt;On 10th September 2015, the OGP Support Unit, the Open Government Guide, and the World Bank held a webinar on “Open Governance and Privacy in a Post-Snowden World” presented by Carly Nyst, Independent consultant and former Legal Director of Privacy International and Javier Ruiz, Policy Director of Open Rights Group. This is a summary of the key issues that were discussed by the speakers and the participants.&lt;/b&gt;
        &lt;p&gt;See &lt;a href="https://events-na4.adobeconnect.com/content/connect/c1/833642795/en/events/event/private/877773861/1209689848/event_landing.html?sco-id=1253823513"&gt;Open Governance and Privacy in a Post-Snowden World&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Summary&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The webinar discussed how Government surveillance has become an important and key issue in the 21&lt;sup&gt;st&lt;/sup&gt; century, thanks to Edward Snowden. The main concern raised was with respect to what a democracy should look like in the present day. Should the states’ use of technology enable state surveillance or an open government? Typically, there is a balance that must be achieved between the privacy of an individual and the security of the state – particularly as the former is primarily about social rights and collective interest of citizens.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;At the international level, the right to privacy has been recognized as a basic human right and an enabler of other individual freedoms. This right encapsulates protection of personal data where citizens have the authority to choose whether to share or reveal their personal data or not. Due to technological advancement that has enabled collection, storage and sharing of personal data, the right to privacy and data protection frameworks have become of utmost importance and relevance with regard to open government efforts. Therefore, it is important for Governments to be transparent in handling sensitive data that they collect and use.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Many countries have also introduced laws to balance the right to privacy and right to information.  The role of the private sector and NGOs involved in enabling an open and transparent government must also be duly addressed at a national level.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Key Questions:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Why should the government release information?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;There are multiple reasons for doing so including:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the purposes of research and public policy (which relates to healthcare, social issues, economics, national statistics, census, etc.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Transparency and accountability (politicians, registers, public expenses, subsidies, fraud, court records, education)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Public participation and public services (budgets, anti-corruption, engagement, and e-governance).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, all these have certain risks and privacy implications:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Risk of identification of individual: Any individual whose information is released has the risk of identification, followed by issues like identity theft, discrimination, stigmatization or repression. Normally, the solution for this would be anonymization of the data; however, this is not an absolute solution. Privacy laws can generally cope with such risks, but with pseudonymous data it becomes difficult in preventing identification.&lt;/li&gt;
&lt;li&gt;Profiling of social categories which can lead to discrimination: In such a situation, policies and other legislations regulating the use of data and providing remedy for violations can help.&lt;/li&gt;
&lt;li&gt;Exploitation and unfair/unethical use of information: When understanding the potential exploitation of information it is useful to consider who is going to benefit from the release of information.  For example, in UK, with respect to release of Health Data, the main concern is that people and companies will benefit commercially from the information released, despite of the result potentially being improved drugs and treatment. &lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;What are the Solutions?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The webinar also discussed potential solutions to the questions and challenges posed. For example, when &lt;a href="http://www.opengovguide.com/"&gt;commitments of Open Government Data Partnership&lt;/a&gt; are considered, privacy legislations must also be proposed. Further, key stakeholders must make commitments to take pro-active measures to reduce informational asymmetries between the state and citizens.  To reduce the risks, measures must be taken to publish what information the State has or what the Government knows about the citizens. For example, in UK, within the civil society network, it is being duly considered in the national plan that the government will publicize how it will share data and have a centralized view on the process of information handling and usage of the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Open Government Guide provides for Illustrative Commitments like enactment of data protection legislation, establishing programmes for awareness and assessment of their impact, giving citizens control of their personal information and the right to redress when that information is misused, etc. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue of surveillance and the role of privacy in an open government context was also discussed.  The need for creating a balance between the legitimate interest of national security and the privacy of individuals was emphasized. With the rise of digital technologies, many governmental measures pertaining to surveillance intervene in individual privacy. There are many forms of surveillance and this has serious privacy implications, especially in developing countries. For example:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Communications surveillance &lt;/li&gt;
&lt;li&gt;Visual surveillance &lt;/li&gt;
&lt;li&gt;Travel surveillance &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This raises the question: When is surveillance legitimate and when must it be allowed?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://en.necessaryandproportionate.org/"&gt;The International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt; acts as a soft law and tries to set out what a good surveillance system looks like by ensuring that governments are in compliance with international human rights law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In essence surveillance does not violate privacy, however, there must be a clear and foreseeable legal framework laying circumstances when the government has the power to collect data and when individuals might be able to foresee when they might be under surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, a competent judicial authority must be established to oversee surveillance and keep a check on executive power by placing restrictions on privacy invasions. The actions of the government must be proportionate and the benefits must not outweigh harm caused by surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Role of openness in a “mass surveillance” state &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance measures that are being undertaken by governments are increasingly secretive. The European court of Human Rights has held that Secret surveillance may undermine democracy under the cloak of protecting it. Hence, open government and openness will work towards protecting privacy and not undermining it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To balance the measure of government surveillance with privacy, there is a need to publish laws regulating such powers; publish transparency reports about surveillance, interception and access to communications data; reform legislations relating to surveillance by state agencies to ensure it complies with human rights and establish safeguards to ensure that new technologies used for surveillance and interception respect the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The conclusion one can draw is that Privacy concerns have gained importance in today’s data driven world. The main question that needs to be answered is whether Government’s should adopt surveillance measures or adopt an Open Government?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering equal importance of national security and privacy of individuals, it is required that a balance must be crafted between the two. This could be possibly done by enacting foreseeable and clear laws outlining scope of surveillance by the Government on one hand, and informing citizens about such measures on the other. Establishment of a competent judicial authority to keep a check on Government actions is also suggested to work out the delicate balance between surveillance and privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar'&gt;https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-10-04T11:09:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy">
    <title>Govt presses 'undo' button on draft encryption policy</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy</link>
    <description>
        &lt;b&gt;The decision came a day before PM embarked on a visit to the US, where he is expected to meet leaders of firms such as Apple, Facebook, Google and Tesla.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/govt-presses-undo-button-on-draft-encryption-policy-115092201014_1.html"&gt;Business Standard&lt;/a&gt; on September 23, 2015. Sunil Abraham gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government on Tuesday scrapped a draft &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=National+Encryption+Policy" target="_blank"&gt;national encryption policy &lt;/a&gt;that mandated firms and individuals to allow authorities access to all encrypted information on email, apps, websites and business servers.&lt;br /&gt;&lt;br /&gt;The decision came a day before Prime Minister&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Narendra+Modi" target="_blank"&gt;Narendra Modi &lt;/a&gt;embarked on a visit to the US, where he is expected to meet leaders of firms such as Apple, Facebook, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Google" target="_blank"&gt;Google &lt;/a&gt;and Tesla. Activists and executives from technology firms had expressed outrage on the draft policy, saying the move would have taken India a step back in technology adoption.&lt;br /&gt;&lt;br /&gt;At a meeting of the Union Cabinet on Tuesday, Modi was livid at the controversy generated by the draft policy and directed officials to withdraw it ahead of his US trip, sources said.&lt;br /&gt;&lt;br /&gt;The draft had global ramifications, as Facebook,&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Twitter" target="_blank"&gt;Twitter &lt;/a&gt;and messaging apps such as &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;were named in it.&lt;br /&gt;&lt;br /&gt;Ravi Shankar Prasad, Union minister for communications and information technology, distanced the government from the draft hosted on the IT department site, but admitted it gave “uncalled-for misgivings”. He directed officials to rework the draft but did not set a timeframe for seeking feedback from the public.&lt;br /&gt;&lt;br /&gt;“Yesterday (Monday), it was brought to our notice that the draft had been put in the public domain for, seeking comment. I read the draft. I understand that the manner in which it was written could lead to misconceptions. I have asked for the draft policy to be withdrawn and reworded. I personally feel some of the expressions used in the draft are giving rise to uncalled-for misgivings,” Prasad said. “Experts had framed the draft policy. It is not the government’s final view.”&lt;br /&gt;&lt;br /&gt;According to the original draft, the encryption policy sought every message sent by a user, be it through services such as WhatsApp, an SMS or an email, be mandatorily stored in plain text format for 90 days and made available on demand to security agencies. Failure to do so, it added, would draw legal action.&lt;br /&gt;&lt;br /&gt;This was because typically, all messaging apps and services such as WhatsApp, Viber, Line, Google Chat and Yahoo! Messenger have high levels of encryption, which security agencies find hard to crack and intercept.&lt;br /&gt;&lt;br /&gt;Early on Tuesday, before Prasad announced the withdrawal of the draft policy, the government had issued an addendum to keep social media and web applications such as WhatsApp, Twitter and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;out of its purview.&lt;br /&gt;&lt;br /&gt;In a three-point clarification, the Department of Electronics and Information Technology (DeitY) said some encryption products were exempt. “Mass-use encryption products, currently being used in web applications, social media sites and social media applications, such as WhatsApp, Facebook and Twitter…SSL/TLS encryption products being used in internet banking and payment gateways, as directed by the Reserve Bank of India”, and SSL/TLS encryption products being used for e-commerce and password based transactions,” it said.&lt;br /&gt;&lt;br /&gt;“Ideally, the new policy should only focus on two objectives: It should mandate encryption standards within the government, military, law enforcement and intelligence agencies. It shouldn’t regulate the use of encryption by the private sector; the private sector should be allowed to use whatever it believes is appropriate, as long as it is considered a reasonable security measure by courts, under section 43A of the IT Act,” said Sunil Abraham, director,&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Centre+For+Internet+And+Society" target="_blank"&gt;Centre for Internet and Society &lt;/a&gt;(CIS).&lt;br /&gt;&lt;br /&gt;Prasad reiterated the government, under the leadership of Prime Minister Narendra Modi, had promoted social media activism. “The right of articulation and freedom we fully respect. But at the same time, we need to acknowledge that cyber space transaction is rising enormously for individuals, businesses, the government and companies,” he said.&lt;br /&gt;&lt;br /&gt;Opposition parties slammed the Draft policy. Congress communications in-charge Randeep Surjewala said, “Subjugation of individual freedom, surveillance of the citizen and suppression of dissent have emerged as the DNA of the Narendra Modi-led BJP government. The draft policy on encryption, first circulated, then amended and now, withdrawn with a rider for re-issuing it, is a totalitarian, misconceived and a failed attempt of the Modi government to override all sense of individual freedom of speech and expression and encroach upon the right to privacy of communication…With 243.1 million internet users in India at the end of 2014 (173 million being mobile internet users), 112 million Facebook users, 80 million WhatsApp users, 22 million Twitter users and 950 million mobile connections, the intrusion of individual liberty is fraught with dangerous dimensions under the Modi government.”&lt;br /&gt;&lt;br /&gt;Aam Aadmi Party spokesperson Raghav Chadha said, “Only a fascist government can bring such a policy. The draft policy was in violation of the right to personal liberty and the fundamental tenets of freedom of speech and expression…the draft policy was for snooping. It presupposes the 1.2 billion people of India are potential criminals. It reflects the inclination of the government and its intention to turn India into a totalitarian state.”&lt;br /&gt;&lt;br /&gt;&lt;b&gt;ABOUT THE NATIONAL ENCRYPTION POLICY&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Five things the government  draft policy wanted&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Information security for individuals, businesses and government agencies&lt;/li&gt;
&lt;li&gt;Development of indigenous encryption standards&lt;/li&gt;
&lt;li&gt;Use of digital signatures to authenticate transactions&lt;/li&gt;
&lt;li&gt;Legal interception and data retention&lt;/li&gt;
&lt;li&gt;Service providers to register under appropriate government agency&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Things that caused outrage&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Regulation of private sector encryption&lt;/li&gt;
&lt;li&gt;Storage of all encrypted communications for&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;90 days&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Gaining backdoor into private communications of users&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Amendment &amp;amp; withdrawal&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Omission of mass encryption products such as those used by social networks&lt;/li&gt;
&lt;li&gt; Withdrawal of draft policy following Ravi Shankar Prasad’s statement&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy'&gt;https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-25T01:55:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame">
    <title>Open sesame</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame</link>
    <description>
        &lt;b&gt;The government’s email is shockingly vulnerable.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.thehindubusinessline.com/opinion/open-sesame/article7678142.ece"&gt;Hindu&lt;/a&gt; on September 22, 2015. CIS research on private email accounts is mentioned.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;As the Centre moves towards smart cities and a Digital  India, some critics have cited the country’s increased vulnerability to  cyber attacks. To be sure, cyber threat groups could disrupt our  infrastructure by taking control of many systems. Such attacks could be  quite damaging. Yes, they are rare today, but are much more likely to  arise in conjunction with traditional armed conflicts. Cyber criminal  groups target Indian organisations on a daily basis.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Almost  two years ago, the IT minister’s office triggered national outrage when  it used a public email service for official communication. There was  much hand-wringing about security practices in a ministry responsible  for setting the technology direction (secure email policy) for the  country. Then in December 2013, the Centre for Internet and Society  revealed that up to 90 per cent of Indian government officials used  private email accounts for professional purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A big deal&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Between  then and now, we’ve read about a new email policy and revelations of  several cyber attacks on government officials. And FireEye revealed a  decade-long cyber espionage operation by a group we call ‘APT30’, which  is likely to be sponsored by China. How did they break in? By sending  targeted ‘spear-phish’ emails with malware attached.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Email  doesn’t sound like a big deal. Most of us have been using it for over a  decade, and think we know how to use it right. But when you’re in a  position of authority with access to sensitive information, you  shouldn’t leave it to chance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Today, state-sponsored  attackers craft these spear-phishing emails after considerable  research. APT30 carefully researched their targets and crafted mails  which would appear extremely relevant, with interesting content. The  moment a victim would open an attachment, an exploit would secretly  install a backdoor. Through that backdoor, groups can compromise the  employee’s entire network and extricate sensitive data. Groups bent on  destruction can deploy malware to destroy the data. They could also take  control of systems managing infrastructure or industrial processes and  create havoc.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Spear-phishing has an open rate of 70  per cent, while regular mass emails had an open rate of just 3 per cent.  Email is the front- door for today’s threat groups. That’s why  governments around the world are improving the security of their email  systems to fend off these spear-phishing threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Public concerns&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;When  government employees use webmail for official business, they trade away  their security for convenience. The emails they receive are no longer  screened by cyber security solutions, which detect advanced targeted  email attacks before they reach the inbox. In addition, because people  typically retrieve their webmail in a browser, attackers have a larger  attack surface to exploit when carrying out their attacks. For example,  attackers can coax victims to click on a link to a website, which  delivers an exploit via Adobe Flash.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Webmail opens  the door to threats that would otherwise have been intercepted. When our  government employees use webmail for official business, they leave the  front door wide open to threats. One of the best steps we can take  towards improving our government’s cyber security defences is abandoning  public email services.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;The writer is a software architect at the cyber security firm FireEye&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame'&gt;https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-25T01:31:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi">
    <title>Encryption policy would have affected emails, operating systems, WiFi</title>
    <link>https://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi</link>
    <description>
        &lt;b&gt;Our email data would have to be stored. If we connect to a WiFi, that data would have to be stored, and that's plain ridiculous. There is a problem when the government tries to target citizens to ensure national security, said Pranesh Prakash, policy director at the Bangalore-based Centre for Internet and Society. &lt;/b&gt;
        &lt;p&gt;The article by Amrita Madhukalya was published in &lt;a class="external-link" href="http://www.dnaindia.com/india/report-encryption-policy-would-have-affected-emails-operating-systems-wifi-2127715"&gt;DNA&lt;/a&gt; on September 23, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The &lt;a href="http://www.dnaindia.com/topic/draft-national-policy"&gt;Draft National Policy&lt;/a&gt; on Encryption, withdrawn by the Department of Electronics and  Information Technology (DeiTY) after it created a furore on privacy  issues, would have had allowed the government access to any form of  digital data that required encryption. Not limited to just WhatsApp or  Viber data, it would have affected email services, WiFi, phone operating  systems, etc.&lt;/p&gt;
&lt;p&gt;"Our email data would have to be stored. If we connect to a WiFi,  that data would have to be stored, and that's plain ridiculous. There is  a problem when the government tries to target citizens to ensure  national security," said Pranesh Prakash, policy director at the  Bangalore-based Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;The government, criticised heavily for the policy, withdrew it on  Tuesday afternoon. It said that a new policy will be brought in its  place.&lt;/p&gt;
&lt;p&gt;Nikhil Pahwa of internet watchdog Medianama said that data about  normal day-to-day activities would have to be stored if the policy was  implemented. "The policy would have affected everyday business to  consumer data.&lt;br /&gt; This would mean that if a doctor or lawyer had your data digitised,  they will be open to access, and would have to be kept for at least 90  days," said Pahwa.&lt;/p&gt;
&lt;p&gt;However, he added that a robust encryption is needed. "It is believed that companies like Google, &lt;a href="http://www.dnaindia.com/topic/facebook"&gt;Facebook&lt;/a&gt; allow the NSA to access user data in the US, putting our personal  security, and the national security largely, at risk," said Pahwa.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi'&gt;https://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-25T01:23:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal">
    <title>Huge outcry forces India to backtrack on social media data proposal</title>
    <link>https://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal</link>
    <description>
        &lt;b&gt;Govt retracts move after strongly negative reaction to 90-day message-saving policy&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by &lt;a class="external-link" href="http://www.todayonline.com/chinaindia/india/huge-outcry-forces-india-backtrack-social-media-data-proposal?singlepage=true"&gt;Today&lt;/a&gt; on September 24, 2015. Pranesh Prakash has been quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Responding to a chorus of withering criticism, Indian officials have  withdrawn a draft policy on encryption that would have required users of  social media and messaging apps to save plain-text versions of their  messages for 90 days so they could be shared with the police.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  proposal, which many condemned as both draconian and impractical, came  as an embarrassment days before Prime Minister Narendra Modi travels to  Silicon Valley to try to attract investment and promote India as an  emerging market for digital technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr Modi is an avid user of social media and has mobilised large networks of online activists during his party’s campaigns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  government issued a statement on Tuesday saying the draft proposing  that users save messages for three months had been withdrawn, as  officials hurried to distance themselves from the idea.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I wish to  make it clear that it is just a draft and not the view of the  government,” said Mr Ravi Shankar Prasad, the Minister of Communications  and Information Technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet policy activists discovered  the draft on a government website late last week and began to lampoon it  online as “absurd”. One offered the example of an iPhone, which  automatically encrypts messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“They can’t intentionally want  people to copy and paste every message a person gets on their iPhone on  to another device,” said Mr Pranesh Prakash, a policy director at the  Center for Internet and Society in Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft, which was  put forward by a committee of unidentified experts in the Department of  Electronics and Information Technology, also overlooked the fact that  most Indians use mobile phones with very little storage space, said Mr  Nikhil Pahwa, the editor of MediaNama.com, which covers digital media  issues in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is incomprehensible how they would have  expected users to keep their messages in plain-text format,” he said.  “And I don’t think that anyone can argue that keeping data in a  plain-text format makes it secure.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An official in the  Communications Ministry, who spoke on the condition of anonymity because  he was not authorised to talk to the media, said the expert committee  had been convened to formulate a policy on the “phenomenal rise” in  encrypted communication over the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said the committee  had intended to require social media platforms and messaging apps, such  as WhatsApp and Viber, to save plain-text versions of messages and did  not intend to impose that burden on individual users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It was interpreted by the netizens as ‘you and I’,” the official said. He added that interpretation was misleading.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  that version of the requirement would also be “outrageous,” Mr Prakash  said. For example, WhatsApp uses “end-to-end” encryption and does not  save communications between users or have access to plain text, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr  Prakash said that as officials revised the proposal, the government  should reach out to “experts in cryptography and human rights”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This  is a very crucial combination of three rights: the right to security,  the right to freedom of expression, and the right to privacy,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  television, spokesmen for Mr Modi’s Bharatiya Janata Party (BJP) found  themselves debating their counterparts from the opposition Indian  National Congress Party, one of whom remarked that “tomorrow they will  start demanding that you videograph what has been going on in your  bedroom for the past 90 days.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The BJP’s national spokeswoman,  Shaina Nana Chudasama, responded with some exasperation. “I don’t know  why we have to have this hue and cry,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Our Prime  Minister believes in absolute freedom on social media. There is no  question of our trying to come down heavily on the freedom of the public  at large.” THE NEW YORK TIMES&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal'&gt;https://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-01T01:31:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-september-22-2015-bowing-to-public-pressure-govt-withdraws-draft-encryption-policy">
    <title>Bowing to public pressure, govt withdraws draft encryption policy </title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-september-22-2015-bowing-to-public-pressure-govt-withdraws-draft-encryption-policy</link>
    <description>
        &lt;b&gt;Bowing to pressure from the public, the government on Tuesday withdrew a draft policy that sought to control secured online communication, including through mass-use social media and web applications such as WhatsApp and Twitter.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by the &lt;a class="external-link" href="http://www.hindustantimes.com/tech/bowing-to-public-pressure-govt-withdraws-draft-encryption-policy/story-kOVNjpFZIuzyuQZGqv4JSN.html;jsessionid=C7FD668754FD1868D4BFE90D6D3C98B5"&gt;Hindustan Times&lt;/a&gt; on September 22, 2015. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Communications and information technology minister Ravi Shankar  Prasad announced the government’s decision at a news conference, saying  the draft National Encryption Policy will be reviewed before it is again  presented to the public for their suggestions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I read the draft. I understand that the manner in which it is  written can lead to misconceptions. I have asked for the draft policy to  be withdrawn and reworded,” Prasad said. He said the draft would be  re-released, but did not say when it would be made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Experts had framed a draft policy...This draft policy is not the  government’s final view,” he added. “There were concerns in some  quarters. There were some words (in the draft policy) that caused  concern.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft will be reviewed and experts will be asked to specify to  whom the policy will be applicable, Prasad said. He did not say when the  new draft will be made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those using social media platforms and web applications fell outside the scope of an encryption policy, Prasad said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several countries have felt the need for an encryption policy because  of the boom in e-commerce and e-governance, he remarked. “Cyber space  interactions are on the rise. There are concerns about security. We need  a sound encryption policy,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before Prasad announced the withdrawal of the draft policy, the  government had issued an addendum early on Tuesday to keep social media  and web applications like WhatsApp, Twitter and Facebook out of its  purview.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secure banking transactions and password protected e-commerce  businesses too will be kept out of the ambit of the proposed policy, the  addendum said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The climb down by the government came following a storm of protests  from users who objected to any stringent state controls on the use of  email, social media accounts and apps.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the original draft, users of apps such as WhatsApp and  Snapchat would be required to save all messages for up to 90 days and be  able to produce them if asked by authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts told Hindustan Times the draft policy, if implemented in its  current form, could compromise the privacy of users and hamper the  functioning of several multi-national service providers in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nikhil Pahwa, editor of the MediaNama website that tracks cyber  issues and tech news, said there were several problems even with the  addendum to the draft policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The usage of the phrase ‘currently in use’ renders the policy vague:  Firstly, when is ‘currently’?” he questioned in a post on his website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Will a new service that uses a different kind of encryption to  protect its users, still be covered? Why should users be ‘restricted to  encryption currently in use’? Why should services like Whatsapp,  Facebook and Twitter define our security standards?” said Pahwa, who  also volunteers for savetheinternet.in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director for The Centre for Internet and  Society, tweeted that even the addendum “does not clarify anything, but  further muddles the encryption policy”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media users called the draft “draconian” and “delusional”, and  Congress leader Manish Tewari too attacked the Union government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The encryption policy (draft) is a snooping and spying orgy. After  net chats, the government may want you to keep a video record of what  you do in your bedroom for 90 days,” the Congress spokesperson told  reporters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft policy had been posted online last week to seek suggestions from the public.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-september-22-2015-bowing-to-public-pressure-govt-withdraws-draft-encryption-policy'&gt;https://cis-india.org/internet-governance/news/hindustan-times-september-22-2015-bowing-to-public-pressure-govt-withdraws-draft-encryption-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Encryption Policy</dc:subject>
    

   <dc:date>2015-10-01T02:15:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash">
    <title>India encryption policy draft faces backlash</title>
    <link>https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash</link>
    <description>
        &lt;b&gt;The department of information technology is facing a backlash from industry experts, Internet watchers and netizens on its draft of the National Encryption Policy that it recently made public.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Moulishree Srivastava was published in &lt;a class="external-link" href="http://www.livemint.com/Industry/3KK1XWztlnFyR10dffTWMM/India-encryption-policy-draft-faces-backlash.html"&gt;Livemint&lt;/a&gt; on September 22, 2015. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While the draft policy aims to enable a secure environment for both information and transactions in cyberspace for individuals, businesses and government, experts are concerned over privacy and outdated standards prescribed in the policy, among other things.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy puts the onus to produce encrypted information when demanded by government agencies on Indian citizens as well as on all the online service providers including instant messaging and e-commerce services that use encryption technology (to convert plain information to an unreadable format).&lt;br /&gt;&lt;br /&gt;The department put the policy online late last week and it came on the radar of industry watchers and experts over the weekend. The policy is open for comments from the public till 16 October.&lt;br /&gt;&lt;br /&gt;The policy, in its current form, is poorly drafted and the measures listed in it make Indian information systems vulnerable to cyber attacks, experts say.&lt;br /&gt;&lt;br /&gt;For instance, the policy has mandated the use of specific standards and algorithms for encryption.&lt;br /&gt;&lt;br /&gt;Encryption can be compared to the process of translating information in one language into a foreign language.&lt;br /&gt;&lt;br /&gt;“Specifying certain algorithms to be used for encryption, and restricting the key sizes is same as saying that you are only allowed to communicate using a language from a given set of government-specified languages and no other language can be used,” said Pranesh Prakash, policy director at the Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;However, the ones mentioned in the draft policy are outdated and unsafe to use, experts say. Another thing that weakens the security considerably is the req-uirement for businesses and citizens to keep the information (that was encrypted and sent over) for 90 days, in case law en-forcement agencies demand it. But that also means that for those 90 days, cyber criminals, too, can access it, warn experts.&lt;br /&gt;&lt;br /&gt;Another big gap in the policy is that it leaves out “sensitive departments/agencies of the government designated for performing sensitive and strategic roles”, said Prakash.&lt;br /&gt;&lt;br /&gt;“When the policy states its mission to be the enhancing of confidentiality of information and of security of critical networks by laying out information security best practices, how does it make any sense to keep sensitive or strategic government department and agencies outside its purview?” he asked. “After all, these are the organizations that most need to be kept secure to enhance national cybersecurity.”&lt;br /&gt;&lt;br /&gt;The draft is also ambiguous on which online services—be it shopping online or accessing email—people can use (in compliance with the law) and which online service providers will have to be registered with the government.&lt;br /&gt;&lt;br /&gt;The policy states that “service providers located within and outside India, using encryption technology for providing any type of services in India, must enter into an agreement with the government for providing such services in India”. Users can only use the services that are registered with the government.&lt;br /&gt;&lt;br /&gt;“This is the first time when users are actually being told what are the things they can and cannot do,” said Prakash.&lt;br /&gt;&lt;br /&gt;“The government must take note that the knowledge and expertise of common citizens may be inadequate to understand the nuances of encryption,” said cyber law expert Na Vijayashankar on his blog. “For example, if a citizen uses a service available on the Internet which uses, say, a higher level of encryption than what is appro-ved, then this policy may make him liable for the violation.”&lt;br /&gt;&lt;br /&gt;The problem is enhanced because all online services use some encryption technology. This means that practically all online activity will fall under this new policy.&lt;br /&gt;&lt;br /&gt;For instance, companies like Apple or Microsoft use encryption technologies at various levels of their operating systems; e-commerce services like Flipkart, Amazon and Snapdeal; web browsers like Mozilla Firefox and Google Chrome and mail services like Gmail, Yahoo and Rediff may be required to register with the government. The only way they may escape this requirement is if there is an exemption for products that are in use at a large scale. Network security service providers like Cisco Inc. will also need to comply. (Cisco declined to respond to a query.) Snapdeal said it is still examining the draft policy, while Amazon, Google, Microsoft did not reply to emails sent by Mint. Yahoo said its spokesperson was unavailable.&lt;br /&gt;&lt;br /&gt;One clause that is drawing a lot of ire from industry veterans and technology enthusiasts requires individual users and businesses to store all information that was sent in an encrypted form for 90 days from the date of transaction. The users would also be required to reproduce the plain text and the encrypted text, if demanded by law enforcement agencies.&lt;br /&gt;&lt;br /&gt;The draft policy also overlooks the privacy concerns of citizens and businesses. “It is clearly a violation of freedom of speech. A large part of the policy states how the government can interfere with users, like, by demanding their private messages. The policy is anti-privacy law,” said Prakash. “Privacy and security go hand in hand. So, as this policy weakens the security of the information, it puts the privacy at greater risk.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash'&gt;https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-09-22T01:59:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp">
    <title>Peering behind the veil of ICANN’s DIDP (I)</title>
    <link>https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp</link>
    <description>
        &lt;b&gt;One of the key elements of the process of enhancing democracy and furthering transparency in any institution which holds power is open access to information for all the stakeholders. This is critical to ensure that there is accountability for the actions of those in charge of a body which utilises public funds and carries out functions in the public interest. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;As the body which “&lt;i&gt;...coordinates the Internet Assigned Numbers Authority (IANA) functions, which are key technical services critical to the continued operations of the Internet's underlying address book, the Domain Name System (DNS)&lt;/i&gt;”&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the centrality of ICANN in regulating the Internet (a public good if there ever was one) makes it vital that ICANN’s decision-making processes, financial flows, and operations are open to public scrutiny. ICANN itself echoes the same belief, and upholds “...&lt;i&gt;a proven commitment to accountability and transparency in all of its practices&lt;/i&gt;”&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which is captured in their By-Laws and &lt;a href="https://www.icann.org/resources/pages/affirmation-of-commitments-2009-09-30-en"&gt;Affirmation of Commitments&lt;/a&gt;. In furtherance of this, ICANN has created its own &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;Documentary Information Disclosure Policy&lt;/a&gt;, where it promises to “...&lt;i&gt;ensure that information contained in &lt;b&gt;documents concerning ICANN's operational activities&lt;/b&gt;, and within ICANN's possession, custody, or control, is &lt;b&gt;made available to the public &lt;/b&gt;unless there is a compelling reason for confidentiality.&lt;/i&gt;”&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN has a vast array of documents that are already in the public domain, listed &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;here&lt;/a&gt;. These include annual reports, budgets, registry reports, speeches, operating plans, correspondence, etc. However, their Documentary Information Disclosure Policy falls short of meeting international standards for information disclosure. In this piece, I have focused on an examination of their defined conditions for non-disclosure of information, which seem to undercut the entire process of transparency that the DIDP process aims towards upholding. The obvious comparison that comes to mind is with the right to information laws that governments the world over have enacted in furtherance of democracy. While ICANN cannot be equated to a democratically elected government, it nonetheless does exercise sufficient regulatory power of the functioning of the Internet for it to owe a similar degree of information to all the stakeholders in the internet community. In this piece, I have made an examination of ICANN’s conditions for non-disclosure, and compared it to the analogous exclusions in India’s Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;ICANN’ꜱ Defined Conditions for Non-Disclosure versus Exclusions in Indian Law :&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN, in its DIDP policy identifies a lengthy list of conditions as being sufficient grounds for non-disclosure of information. One of the most important indicators of a strong transparency law is said to be &lt;b&gt;&lt;i&gt;minimum exclusions&lt;/i&gt;&lt;/b&gt;.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, as seen from the table below, ICANN’s exclusions are extensive and vast, and this has been a barrier in the way of free flow of information. An analysis of their responses to various DIDP requests (available &lt;a href="https://www.icann.org/resources/pages/governance/transparency-en"&gt;here&lt;/a&gt;) shows that the conditions for non-disclosure have been invoked in over 50 of the 85 requests responded to (as of 11.09.2015); i.e., over two-thirds of the requests that ICANN receives are subjected to the non-disclosure policies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast, an analysis of India’s Right to Information Act, considered to be among the better drafted transparency laws of the world, reveals a much narrower list of exclusions that come in the way of a citizen obtaining any kind of information sought. The table below compares the two lists:&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;No.&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;ICANN&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;India&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Analysis&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information provided by or to a government or international organization&lt;/b&gt; which was to be kept confidential or would materially affect ICANN’s equation with the concerned body.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information, disclosure of which would prejudicially affect the &lt;b&gt;sovereignty and integrity of India&lt;/b&gt;, the security, "strategic, scientific or economic" interests of the State, relation with foreign State or lead to incitement of an offense&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;/ information &lt;b&gt;received in confidence from foreign government&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The threshold for both the bodies is fairly similar for this exclusion.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internal (staff/Board) information &lt;/b&gt;that, if disclosed, would or would be likely to compromise the integrity of ICANN's deliberative and decision-making process&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cabinet papers including records of deliberations&lt;/b&gt; of the Council of Ministers, Secretaries and other officers, provided that such decisions the reasons thereof, and the material on the basis of which the decisions were taken &lt;b&gt;shall be made public after the decision has been taken&lt;/b&gt;, and the matter is complete, or over (unless subject to these exemptions)&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The Indian law is far more transparent as it ultimately allows for the records of internal deliberation to be made public after the decision is taken.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information related to the &lt;b&gt;deliberative and decision-making process between ICANN, its constituents, and/or other entities with which ICANN cooperates &lt;/b&gt;that, if disclosed, would or would be likely to compromise the integrity of the deliberative and decision-making process&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No similar provision in Indian Law.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is an additional restriction that ICANN introduces in addition to the one above, which in itself is quite broad.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Records relating to an individual's personal information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information which relates to &lt;b&gt;personal information &lt;/b&gt;the disclosure of which has no relationship to any public activity or interest, or which would cause unwarranted invasion of the privacy of the individual (but it is also provided that the information which cannot be denied to the Parliament or a State Legislature shall not be denied by this exemption);&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Again, the Indian law contains a proviso for information with “&lt;i&gt;relationship to any public activity or interest&lt;/i&gt;”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Proceedings of internal appeal mechanisms and investigations.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information which has been &lt;b&gt;expressly forbidden to be published by any court of law &lt;/b&gt;or tribunal or the disclosure of which may constitute contempt of court;&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;While ICANN prohibits the disclosure of all proceedings, in India, the exemption is only to the limited extent of information that the court prohibits from being made public.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information provided to ICANN by a party that, if disclosed, would or would be likely to &lt;b&gt;materially prejudice the commercial interests, financial interests, and/or competitive position &lt;/b&gt;of such party or was provided to ICANN pursuant to a nondisclosure agreement or nondisclosure provision within an agreement.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information including &lt;b&gt;commercial confidence, trade secrets &lt;/b&gt;or intellectual property, the &lt;b&gt;disclosure of which would harm the competitive position of a third party&lt;/b&gt;, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information;&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is fairly similar for both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;7.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Confidential business information &lt;/b&gt;and/or internal policies and procedures.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No similar provision in Indian Law. This is encapsulated in the abovementioned provision&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is fairly similar in both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;8.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information that, if disclosed, would or would be likely to &lt;b&gt;endanger the life, health, or safety &lt;/b&gt;of any individual or materially prejudice the administration of justice.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information, the disclosure of which would &lt;b&gt;endanger the life or physical safety of any person &lt;/b&gt;or identify the source of information or assistance given in confidence for law enforcement or security purposes;&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This is fairly similar for both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information subject to any kind of privilege&lt;/b&gt;, which might prejudice any investigation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information, the disclosure of which would cause a &lt;b&gt;breach of privilege of Parliament &lt;/b&gt;or the State Legislature&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;/Information which would &lt;b&gt;impede the process of investigation or apprehension or prosecution of offenders&lt;/b&gt;;&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This is fairly similar in both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Drafts of all correspondence, reports, documents, agreements, contracts, emails, or any other forms of communication.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in Indian Law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This exclusion is not present in Indian law, and it is extremely broadly worded, coming in the way of full transparency.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information that relates in any way to the &lt;b&gt;security and stability of the Internet&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in Indian Law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is perhaps necessary to ICANN’s role as the IANA Functions Operator. However, given the large public interest in this matter, there should be some proviso to make information in this regard available to the public as well.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Trade secrets and commercial and financial information &lt;/b&gt;not publicly disclosed by ICANN.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information including &lt;b&gt;commercial confidence, trade secrets &lt;/b&gt;or intellectual property, the disclosure of which would harm the competitive position of a third party, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information;&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This is fairly similar in both cases.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information requests:&lt;/p&gt;
&lt;p&gt;● which are not reasonable;&lt;/p&gt;
&lt;p&gt;● which are excessive or overly burdensome&lt;/p&gt;
&lt;p&gt;● complying with which is not feasible&lt;/p&gt;
&lt;p&gt;● which are made with an abusive or vexatious purpose or by a vexatious or querulous individual.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in Indian Law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Of all the DIDP exclusions, this is the one which is most loosely worded. The terms in this clause are not clearly defined, and it can effectively be used to deflect any request sought from ICANN because of its extreme subjectivity. What amounts to ‘reasonable’? Whom is the process going to ‘burden’? What lens does ICANN use to define a ‘vexatious’ purpose? Where do we look for answers?&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in ICANN’s DIDP.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information available to a person in his &lt;b&gt;fiduciary relationship&lt;/b&gt;, unless the competent authority is satisfied that the larger public interest warrants the disclosure of such information;&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in ICANN’s DIDP.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information which providing access to would involve an &lt;b&gt;infringement of copyright subsisting in a person other than the State&lt;/b&gt;.&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Thus, the net cast by the DIDP exclusions policy is more vast than even than that of a democratic state’s transparency law. Clearly, the exclusions above have effectively allowed ICANN to dodge answers to most of the requests floating its way. One can only hope that ICANN realises that these exclusions come in the way of the transparency that they are so committed to, and does away with this unreasonably wide range on the road to the IANA Transition.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/resources/pages/welcome-2012-02-25-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/resources/accountability&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/resources/pages/didp-2012-02-25-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Shekhar Singh, &lt;i&gt;India: Grassroot Initiatives&lt;/i&gt; in Tʜᴇ Rɪɢʜᴛ ᴛᴏ Kɴᴏᴡ 19, 44 (Ann Florin ed., 2007)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In a proviso, ICANN’s DIDP states that all these exemptions can be overridden if the larger public interest is higher. However, this has not yet been reflected in their responses to any DIDP requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(a), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(f), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(i), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(j), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(b), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section (1)(d), Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(g), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(c), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(h), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section (1)(d), Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(e), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 9, Right to Information Act, 2005.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp'&gt;https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padmini Baruah</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-15T02:42:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore">
    <title>Sustainable Smart Cities India Conference 2015, Bangalore</title>
    <link>https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore</link>
    <description>
        &lt;b&gt;Nispana Innovative Platforms organized a Sustainable Smart Cities India Conference 2015, in Bangalore on 3rd and 4th September, 2015. The event saw participation from people across various sectors including Government Representatives from Ministries, Municipalities, Regulatory Authorities, as well as Project Management Companies, Engineers, Architects, Consultants, Handpicked Technology Solution Providers and Researchers. National and International experts and stakeholders were also present to discuss the opportunities and challenges in creating smart and responsible cities as well as citizens, and creating a roadmap for converting the smart cities vision into a reality that is best suited for India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The objective of the conference was to discuss the meaning of a smart city, the promises made, the challenges and possible solutions for implementation of ideas by transforming Indian Cities towards a Sustainable and Smart Future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Smart Cities Mission&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering the pace of rapid urbanization in India, it has been estimated that the urban population would rise by more than 400 million people by the year 2050&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; and would contribute nearly 75% to India’s GDP by the year 2030. It has been realized that to foster such growth, well planned cities are of utmost importance. For this, the Indian government has come up with a Smart Cities initiative to drive economic growth and improve the quality of life of people by enabling local area development and harnessing technology, especially technology that leads to Smart outcomes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially, the Mission aims to cover 100 cities across the countries (which have been shortlisted on the basis of a Smart Cities Proposal prepared by every city) and its duration will be five years (FY2015-16 to FY2019-20). The Mission may be continued thereafter in the light of an evaluation to be done by the Ministry of Urban Development (MoUD) and incorporating the learnings into the Mission. This initiative aims to focus on area-based development in the form of redevelopment, or developing new areas (Greenfield) to accommodate the growing urban population and ensure comprehensive planning to improve quality of life, create employment and enhance incomes for all, especially the poor and the disadvantaged.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is being done?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Smart City Mission will be operated as a Centrally Sponsored Scheme (CSS) and the Central Government proposes to give financial support to the Mission to the extent of Rs. 48,000 crores over five years i.e. on an average Rs. 100 crore per city per year.The Government has come up with 2 missions:Atal Mission for Rejuvenation and Urban Transformation (AMRUT) and Smart Cities Mission for the purpose of achieving urban transformation.The vision is to preserve India’s traditional architecture, culture &amp;amp; ethnicity while implementing modern technology to make cities livable, use resources in a sustainable manner and create an inclusive environment. Additionally, Foreign Direct Investment regulations have been relaxed to invite foreign capital and help into the Smart City Mission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is a Smart City?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the two-day conference, various speakers shared a common sentiment that the Governments’ mission does not clearly define what encompasses the idea of a Smart City. There is no universally accepted definition of a Smart City and its conceptualization varies from city to city and country to country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A global consensus on the idea of a smart city is a city which is livable, sustainable and inclusive. Hence, it would mean a city which has mobility, healthcare, smart infrastructure, smart people, traffic maintenance, efficient waste resource management, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, there is a global debate at United Nations regarding developmental goals. One of these goals is gender equality which is very important for the smart city initiative. According to this, a smart city must be such where the women have a life free from violence, must be made to participate and are economically empowered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Promises&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The promises of the Smart City mission include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Make a sustainable future, reduce carbon footprint, adequate water supply, assured electricity supply, proper sanitation, including solid waste management, efficient urban mobility and public transport, affordable housing especially for the poor, robust IT connectivity and digitalization, good governance, especially e-Governance and citizen participation, sustainable environment, safety and security of citizens, particularly women, children and the elderly, and health and education.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The vision is to preserve country’s traditional architecture, culture &amp;amp; ethnicity while implementing modern technology. It was discussed how the Smart City Mission is currently attracting global investment, will create new job opportunities, improve communications and infrastructure, decrease pollution and ultimately improve the quality of living.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Challenges&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main challenges for implementation of these objectives are with respect to housing, dealing&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;with existing cities and adopting the idea of retro-fitting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, another challenge is that of eradicating urban poverty, controlling environment degradation, formulating a fool-proof plan, proper waste management mechanism, widening roads but not at the cost of pedestrians and cyclist and building cities which are inclusive and cater to the needs of women, children and disabled people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the top challenges will include devising a fool-proof plan to develop smart cities, meaningful public-private partnership, increasing the renewable energy, water supply, effective waste management, traffic management, meeting power demand, urban mobility, ICT connectivity, e-governance, etc., while preparing for new threats that can emerge with implementation of these new technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What needs to be done?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following suggestions were made by the experts to successfully implement government’s vision of creating successful smart cities in India.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Focus on the 4 P’s: Public-Private-People Partnership since people very much form a part of the cities.&lt;/li&gt;
&lt;li&gt;Integration of organizations, government bodies, and the citizens. The Government can opt for a sentiment analysis.&lt;/li&gt;
&lt;li&gt;Active participation by state governments since Land is a state subject under the Constitution. There must be a detailed framework to monitor the progress and the responsibilities must be clearly demarcated.&lt;/li&gt;
&lt;li&gt;Detailed plans, policies and guidelines&lt;/li&gt;
&lt;li&gt;Strengthen big data initiatives&lt;/li&gt;
&lt;li&gt;Resource maximization&lt;/li&gt;
&lt;li&gt;Make citizens smart by informing them and creating awareness&lt;/li&gt;
&lt;li&gt;Need for competent people to run the projects&lt;/li&gt;
&lt;li&gt;Visionary leadership&lt;/li&gt;
&lt;li&gt;Create flexible and shared spaces for community development.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National/International case studies&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several national and international case studies were discussed to list down practical challenges to enable the selected Indian cities learn from their mistakes or include successful schemes in their planning from its inception.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Amsterdam Smart City: It is said to be a global village which was transformed into a smart city by involving the people. They took views of the citizens to make the plan a success. The role of big data and open data was highly emphasized. Also, it was suggested that there must be alignment with respect to responsibilities with the central, state and district government to avoid overlap of functions. The city adopted smart grid integration to make intelligent infrastructure and subsidized initiatives to make the city livable.&lt;/li&gt;
&lt;li&gt;GIFT City, Gujarat: This is an ICT based sustainable city which is a Greenfield development. It is strategically situated. One of the major features of the City is a utility tunnel for providing repair services and the top of the tunnel can be utilized as a walking/jogging track. The city has smart fire safety measures, wide roads to control traffic, smart regulations.&lt;/li&gt;
&lt;li&gt;TEL AVIV Smart City, Israel: It has been named as the Mediterranean cool city with young and free spirted people. The city comprises of creative class with 3 T’s-talent, technology and tolerance. The city welcomes startups and focuses on G2G, G2C and C2C initiatives by adopting technologically equipped initiatives for effective governance and community building programmes.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event saw participation from people across various sectors including Government Representatives of Ministries, Municipalities, Regulatory Authorities, as well as Project Management Companies, Engineers, Architects, Consultants, Handpicked Technology Solution Providers and Researchers.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Foundation for Futuristic Cities:&lt;/b&gt; The conference saw participation from this think tank based out of Hyderabad working on establishing vibrant smart cities for a vibrant India. They are currently working on developing a "Smart City Protocol" for Indian cities collaborating with Technology, Government and Corporate partners by making a framework for Smart Cities, Big Data and predictive analytics for safe cities, City Sentiment Analysis, Situation Awareness Tools and mobile Apps for better city life by way of Hackathons and Devthons.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Centre for SMART cities, Bangalore:&lt;/b&gt; This is a research organization which aims to address the challenge of collaborating and sharing knowledge, resources and best practices that exist both in the private sector and governments/municipal bodies in a usable form and format.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;BDP – India (Studio Leader – Urbanism): &lt;/b&gt;The Organization is based out of Delhi and is involved in providing services relating to master planning, urbanism, design and landscape design. The team includes interior designers, engineers, urbanists, sustainability experts, lighting designers, etc. The vision is to help build and create high quality, effective and inspiring built spaces.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;UN Women: &lt;/b&gt;It is a United Nations Organization working on gender equality, women empowerment and elimination of discrimination. They strive to strengthen rights of women by working with women, men, feminists, women’s networks, governments, local authorities and civil society to create national strategies to advance gender equality in line with national and international priorities. The UN negotiated the 2030 Agenda for Sustainable Development in August 2015 (which would be formally adopted by World leaders in September 2015) and it feature 17 sustainable development goals, one of them being achievement of gender equality and empowerment of all women and girls.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Elematic India Pvt. Ltd.: &lt;/b&gt;The Company is a leading supplier of precast concrete technology worldwide providing smart solutions for concrete buildings to help enable build smart cities with safe infrastructure.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event discussed in great detail about what a smart city would look like in a country like India where every city has different demographics, needs and resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Participants had a mutual understanding that a city is not gauged by its length and width, but by the broadness of its vision and height of its dream. The initiative of creating smart cities would echo across the country as a whole and would not be limited to the urban centers. Hence, the plan must be inclusive in implementation and right from its inception, the people and their needs must be given due consideration to make it a success. The issue of the road ahead was resonating in the minds of many, as to how would this exactly happen. Hence, the first step, as was suggested by the experts, was to involve the citizens by primarily informing them, taking their suggestions and planning the project for every city accordingly. While focusing on cities which would be made better by human ingenuity and technology, along with building mechanism for housing, commerce, transportation and utilities, it must not be forgotten that technology is timely, but culture is timeless. The cities must not be faceless and community space must be built with walkable spaces with smart utilization of limited resources. Also, it must be ensured that the cities do not cater to the needs of the elite and skilled population, but also the less privileged community. Adequate urban mapping must be done to ensure placement for community facilities, such as restrooms, trash bins, and information kiosks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A story shared from personal experience by an expert Architect in building Green infrastructure was highly instrumental in setting the tone of the conference and is bound to stay with many of the participants. The son of the Architect, a small child from Baroda left his father speechless when he questioned him about the absence of butterflies from the Big City of Mumbai since he used to play with butterflies every morning in his hometown in Gujarat. The incident was genuinely thought provoking and left every architect, government representative and engineer thinking that before they step on to build a smart cities with technologically equipped infrastructure and utilities - can we, as a country, come together and ensure to build a smart city with butterflies? Can we pay equal attention to sustainability, environment and requirements of a community in the smart city that is envisioned by the Government to make the city livable and inclusive?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions that I, as a participant, am left with are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Building a Greenfield project is comparatively easier than upgrading the existing cities into Smart ones, which requires planning and optimum utilization of resources. The role of local bodies needs to be strengthened which would primarily require skilled workforce, beginning from planning to execution. Therefore, what must be done to make the current cities “Smarter” and how encourage and fund ordinary citizens to redefine and prioritize local needs?&lt;/li&gt;
&lt;li&gt;The conference touched upon the need for a well-planned policy framework to govern the smart cities; however, what was missing was a discussion on the kind of policies that would be required for every city to ensure governance and monitor the operations. Chalking out well thought of urban policies is the first step towards implementation of the Project and requires deliberation in this regard.&lt;/li&gt;
&lt;li&gt;The Government plans seem to cater to the needs of a handful of sections of the society and must focus on safety of women, chalk out initiatives to build basic utilities like public toilets, plan the infrastructure keeping in mind the disabled individuals, etc. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;This is of paramount importance since it is necessary for the Government to consider who would be the potential inhabitants of these future smart cities and what would be their particular needs. Before the cities are made better by use of technology, there is a requirement of more toilets as a basic utility. Thus, instead of focusing on technological advancement as the sole foundation to make lives of the people easy, the cities must have provision of utilities which are accessible to develop livable smart cities. Hence, what measures would the Government and other bodies involved in the plan take to ensure that the urban enclaves would not oversee the under privileged class?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another issue that went unnoticed during the two-day event was pertaining to the Fundamental Rights of individuals within the city. For example, the right of privacy, right to access services and utilities, right to security, etc. These basic rights must be given due recognition by the smart city developers to uphold the spirit of these internationally accepted Human Rights principles. Therefore, it is important to ask how these future cities are going to address the rights of its people in the cities?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from plans of working on waste management, another important factor that must not be overlooked is sustainability in terms of maximization of the available resources in the best possible ways and techniques to be adopted to stop the fast paced degradation of the environment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The conference could suggest more solutions to adopt measures like rain water harvesting, better sewage management in the existing cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, the importance of big data in building the smart cities was emphasized by many experts. However, the question of regulation of data being generated and released was not talked about. Use of big data analytics involves massive streaming of data which required regulation and control over its use and generation to ensure such information is not misutilised in any way. In such a scenario, how would these cities regulate and govern big data techniques to make the infrastructure and utilities technologically efficient on one hand, but also to use the large data sets in a monitored fashion on the other?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An answer to these crucial issues and questions would have brought about a lot of clarity in minds of all the officials, planners and the potential residents of the Smart Cities in India.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; 2014 revision of the World Urbanization Prospects, United Nations, Department of Economic and Social Affairs, July 2014, Available at : http://www.un.org/en/development/desa/publications/2014-revision-world-urbanization-prospects.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Smart Cities, Mission Statement and Guidelines, Ministry of Urban Development, Government of India, June 2015, Available at : http://smartcities.gov.in/writereaddata/SmartCityGuidelines.pdf&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore'&gt;https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-21T02:24:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing">
    <title>Outrage before sharing</title>
    <link>https://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing</link>
    <description>
        &lt;b&gt;Has the social media converted people into a lynch mob that seeks out justice and passes judgement instantly, without bothering to hear both sides of the story? &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nikhil Varma was &lt;a class="external-link" href="http://m.thehindu.com/features/metroplus/outrage-before-sharing/article7633402.ece"&gt;published in the Hindu on September 9, 2015&lt;/a&gt;. Rohini Lakshané was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Internet has changed the way we communicate in more ways than we can  imagine. Apart from being a medium to share pictures and updates with  family and friends, social media has also become an arena where  political debates are a commonplace and people are quick to make  judgements. The social media space has become one where superlatives are  commonly used and videos or conversations about inappropriate behaviour  or even a tweet or Facebook post has a tendency to go viral and  snowball into a shaming of the individual or organisation in question,  without bothering to hear out the other side of the story. Outraging can  be over anything, from the faults of the Government, to lay people who  sometimes find themselves the subject of an online shaming campaign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, an FB user put up pictures of a person, who she claimed  misbehaved with her on a street in Delhi. Within a few hours, the man’s  picture went viral and he was arrested by the police, even as he was  called names and abused on social media networks. A few days later,  eyewitness accounts corroborated the man’s account of the incident. The  response online now put the girl at fault and blamed her for  politicising the issue. The initial response to the video of the Rohtak  sisters bashing up alleged molesters also saw the outrage shifting  sides.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How does one deal with people making judgements with a click of a  button? Does online shaming dent the chances of people getting justice  in genuine cases of assault?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rohini Lakshané, a researcher at the Centre for Internet and Society  says, “Online, public shaming is a useful and often effective strategy  for calling out unacceptable behaviour when recourse to other remedies  is tedious, time-consuming, or non-existent. Its flipside is that  shaming online could lead to mob justice or a witch-hunt. The onus  should be on the viewers or readers of such an act of shaming to not  take the law into their own hands and on the news media to do their  basic duty of checking facts before publishing or broadcasting  anything.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She adds, “People use social networking sites, among other things, as  verandas where they can gather gossip, and talk about their interests.  If people jumping the gun and being judgemental offline isn’t a cause  for concern, I don’t see why it should be when it happens online.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On checks, Rohini contends, “They would not be in the interest of free  speech. It would, of course, make a difference if social media users  paused to think.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;V. Shakti, Social Media and Branding Professional, points out that the  mass adoption of social media platforms has had positive and negative  effects. “It has ensured that anyone can reach out and get any  information. The flip side is that this power to reach millions needs to  be handled with care and responsibility. The Jasleen Kaur incident is a  glaring reflection. Such is the mindset of people online that anyone  who is shamed is assumed guilty and derided. Sometimes the shaming does  permanent damage to the target and the effects are life-long. The minute  Jasleen posted a picture online, even the media jumped in calling the  guy a ‘pervert’, if this were some other country, they would be sued. We  need to understand that un-shaming is not an option and hence be  careful when throwing mud at someone online. Remember, it could be you  tomorrow. Think, verify and then act. Like I always say, there are three  sides to every story - yours, mine and the truth.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For psychiatrist and Integrative medicine specialist Shyam Bhatt, online  shaming is a combination of a sense of mob justice and the feeling of  participating in a cause. “It is easy to sign up for a cause online, you  can click share and feel good about yourself. People also tend to get  swayed by what their friend circles are talking about.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media user Praveen Rao feels an attempt to feel involved with causes is responsible for this phenomenon.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is important for people to check the authenticity and wait for a  clear picture to emerge before talking about something. However, in the  rush to appear clued in, people tend to share anything that goes viral,  without pausing to think if someone’s life could be ruined. It is a good  tool to call out genuine cases of misbehaviour and assault, but mob  justice should be avoided.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing'&gt;https://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-20T17:08:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
