<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1496 to 1510.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/catch-news-july-2-2015-the-digital-divide-pros-and-cons-of-modi-s-latest-big-initiative"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/five-nations-one-future"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-june-24-2015-neha-alawadhi-govts-stand-on-internet-governance-draws-applause-from-civil-society-organisations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/iana-transition-stewardship-and-icann-accountability-2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/icmax-summit-and-demo-day"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/panel-discussion-on-internet-intermediaries-law-and-innovation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/perils-and-prospects-of-bringing-next-billion-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-telegraph-may-31-2015-only-digital-sex-please"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-india-jochelle-mendonca-neha-alawadhi-may-29-2015-digital-india-launch-likely-in-july"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/catch-news-july-2-2015-the-digital-divide-pros-and-cons-of-modi-s-latest-big-initiative">
    <title>The Digital Divide: pros and cons of Modi's latest big initiative </title>
    <link>https://cis-india.org/internet-governance/news/catch-news-july-2-2015-the-digital-divide-pros-and-cons-of-modi-s-latest-big-initiative</link>
    <description>
        &lt;b&gt;Prime Minister Narendra Modi inaugurated the Digital India (DI) initiative on 1 July, at an event attended by scores of government officials as well as industry leaders. &lt;/b&gt;
        &lt;p&gt;The blog post by Suhas Munshi was published in &lt;a class="external-link" href="http://www.catchnews.com/india-news/the-digital-divide-pros-and-cons-of-modi-s-latest-big-initiative-1435856952.html"&gt;Catch News&lt;/a&gt; on July 2, 2015. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;The initiative&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Digital India aims to make all citizens digitally literate. Bring e-governance to every doorstep.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Corporates have promised to invest Rs 4.5 lakh crore in the initiative.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;This is greater than the total spend on all govt schemes. It is equivalent to 1/4th of the national budget.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;The positives&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;It will be a boost to industry; both large and small enterprises.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;It will ostensibly create a lot of jobs.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;It's ideal if citizens can connect directly with the government.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;The negatives&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Will the initiative be genuinely inclusive?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;How will corporates recover their costs? Will the promised investments end up as bad loans from banks?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Who will handle the personal data of so many citizens; will it be efficient?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Who will the vendors be?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Will the proposed digital lockers for official documentation be reliable?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Will the initiative give the govt a tool to conduct mass surveillance?&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;The alternative focus&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Some experts feel the govt should concentrate on giving people access to basic necessities like water, power and sewage.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The backbone of the project, the National Optical Fibre Network, has already run into massive infrastructure issues.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The programme aims to make all citizens digitally literate and bring the internet and e-governance to all sections of the society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Like Modi's past initiatives, this too has polarised opinion, in this case on the government's aggressive push for e-governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While some advise patience before arriving at a verdict, others think it isn't too early to begin celebrations.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Astronomical budget&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Most of the funds for this initiative are expected to come from the private sector. The total investments promised by big corporates, according to Modi, is Rs 4.5 lakh crore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That is an astonishing number - it is equivalent to a quarter of the country's budget.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If true, then the amount spent on this project will be way over the total money spent on all of the government's 66 central sponsored schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, India hasn't been able to deliver on the last big welfare scheme promised - the Food Security Act, two years after it was passed in Parliament.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Investments promised by corporates add up to Rs 4.5 lakh crore, which is one-fourth of India's total budget&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This scheme, which is set to cost the country Rs 1.25 lakh crore, aims to provide subsidised food grains to two-thirds of the populace.&lt;br /&gt;&lt;br /&gt;The immediate concern experts have expressed with the budget is the possible intervention of the private sector.&lt;br /&gt;&lt;br /&gt;The big corporate houses that have promised these staggering investments, would also be looking to recover them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"As I see it, effectively a new sector is being created for this initiative. While it is good, when the private sector comes in to support big government projects, we also have to examine what the recovery model for those investments are. Hopefully, more details about investments will be made available," said Subrata Das, Executive Director, Centre for Budget and Governance Accountability.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Boost to industry&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The initiative has already received a massive thumbs up from the industry. Corporate leaders made a beeline to praise the initiative.&lt;br /&gt;&lt;br /&gt;RIL chairman Mukesh Ambani said that with Digital India, the government has moved faster than industry. He added that Reliance Jio Infocomm will invest Rs 2,50,000 crore as part of the Digital India programme.&lt;br /&gt;&lt;br /&gt;"Tata Consultancy Services (TCS) has partnered with the government for projects like Passport Seva and income tax e-filing, as well as state-level projects," said Cyrus Mistry, chairman of Tata Group, at the event.&lt;br /&gt;&lt;br /&gt;Azim Premji, Wipro chairman, was quoted as saying the initiative will democratise the nation and "break down the digital divide in India".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added that the level of skills of India's people will have to be significantly improved in order to make full use of the new initiative.&lt;br /&gt;&lt;br /&gt;Kumar Mangalam Birla, chairman of the Aditya Birla Group, said it would leverage its Idea Cellular network of 165 million subscribers across 3,50,000 towns and villages in India to provide mobile-based healthcare and education services, as well as weather forecasting advisories and 'mandi' prices to over one million farmers.&lt;br /&gt;&lt;br /&gt;The company will also launch a mobile wallet and payment bank as well as invest over $2 billion in the next five years in various internet-based sectors.&lt;br /&gt;&lt;br /&gt;There seems to be a consensus on the kind of platform DI will provide to small entrepreneurs and the massive job opportunities it will create.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Who has not heard about their computer engineer friends trying to develop a product in their spare time? These small entrepreneurs will get a lot of help if they are brought to a common platform with big companies and if lack of resources don't impede their work. Besides, as government starts to spend, there will be a severe need for hardware technicians, network operators, data entry operators," said Manish Sabharwal, chairman, Teamlease.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rajeev Chandrasekhar, independent lawmaker in the Rajya Sabha, says DI is not only essential for the idea of 'minimum government, maximum governance', it is a big boost for the Indian IT industry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It is absolutely essential for good governance that as many people as possible are put directly in touch with their government. One of the biggest achievements, I think, will be in connecting 700 million people, so far sequestered, with the rest of the country. This obviously helps small entrepreneurs with launching their startups and bringing in a healthy workforce into the folds of this scheme," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many sunrise sectors before have similarly promised job growth that has not materialised. It remains to be seen how much of this euphoria plays out in concrete terms.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy concerns&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Therefore, while there's been a lot of positive buzz, not everyone is sold on the initiative.&lt;br /&gt;&lt;br /&gt;Concerns are being raised about the handling of personal data of so many citizens.&lt;br /&gt;&lt;br /&gt;There is a question about the reliability of the digital lockers in which all citizens will have their official documentation, and the anxiety of the data falling into the wrong hands.&lt;br /&gt;&lt;br /&gt;"Of course, the concern with respect to privacy is legitimate and urgent.&lt;br /&gt;&lt;br /&gt;Since the data the government will collect will be very large in terms of volume and can be misused, the reliability of the government's systems will have to be quite high.&lt;br /&gt;&lt;br /&gt;So let's wait to see the nuts and bolts of the programme," said Apar Gupta, a senior lawyer specialising in information technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Reetika Khera, associate professor, economics at IIT Delhi, applications like digital lockers will make it easier for government to conduct mass surveillance.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;There are questions over the reliability of digital lockers and about data falling into the wrong hands&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;"Programmes like Aadhar, digi-locker, central monitoring system (of mobile calls) etc are creating and enabling a massive surveillance infrastructure in India that will put NSA's PRISM, XKeyScore etc to shame.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"For instance, if Aadhaar is linked to your mobile number, bank account, travel details, the government can build a profile of each person at the click of a mouse. This is especially worrying because data protection and privacy laws are weak or non-existent," she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of Bangalore-based research organisation Centre for Internet and Society, also agrees with the concerns but is optimistic about the safeguards being put in place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There is a very mature draft of the Privacy Bill at the Department of Personnel and Training which will hopefully be introduced into Parliament after some rounds of public consultation and feedback.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This, along with appropriate architectural and technological changes to e-governance services, will mitigate privacy concerns," said Abraham.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Misplaced priorities?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Then there is an argument that the less-privileged sections of society may need basic social services before they're considered for internet inclusion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"What is true at the ground is that many people still don't have access to basic services, so while I think this is a good initiative, it should be part of our medium-term strategy.&lt;br /&gt;&lt;br /&gt;"To begin with, we should focus on setting up basic infrastructure and extending water, power and sewer lines to most of the country," said Amitabh Kundu, retired JNU professor, who's advising the government on various projects.&lt;br /&gt;&lt;br /&gt;Apar Gupta wonders how the government intends to bring people who are semi-literate, with no access to internet, within the fold of this e-governance project.&lt;br /&gt;&lt;br /&gt;"Extending social welfare schemes to this section of people solely through digital medium is not viable," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some feel that the whole DI initiative is a mass-scale feel-good exercise. The argument is that using technology to 'uplift' the masses isn't a new idea, and is introduced periodically, and turns out to be largely ineffective.&lt;br /&gt;&lt;br /&gt;"From the looks of it, this initiative seems to be nothing but techno-optimism. There is a belief that new technologies will, by themselves, transform the social world, but this doesn't happen.&lt;br /&gt;&lt;br /&gt;"Techno-optimism, which we have seen before, is no different to traditional forms of governance, and over time, turns out to be nothing but a public relations exercises. An exercise to make governance visible to masses," said Ravi Sundaram, professor at the Centre for the Study of Developing Societies (CSDS).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Infrastructure issues&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A project of this ambition and magnitude is bound to run into difficulties and, just a day after the launch, The Indian Express reported that the National Optical Fibre Network, the backbone of the initiative, is way behind schedule.&lt;br /&gt;&lt;br /&gt;The project was supposed to be completed by December 2016. Initially, the 2014-15 target was to execute the work for one lakh gram panchayats, which was later halved to 50,000.&lt;br /&gt;&lt;br /&gt;However, up until March 2015, only about 20,000 gram panchayats have been covered.&lt;br /&gt;&lt;br /&gt;The primary problem is the cascading delays faced by central agencies, and when the active intervention of states was sought, 'right of way' charges have become the bone of contention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lack of contractors to do specialised work is also turning out to be an issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, it won't be a stretch to say that while the initiative sounds like a great thing, doubts over its proper execution will continue till there is some concrete success to show for it.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/catch-news-july-2-2015-the-digital-divide-pros-and-cons-of-modi-s-latest-big-initiative'&gt;https://cis-india.org/internet-governance/news/catch-news-july-2-2015-the-digital-divide-pros-and-cons-of-modi-s-latest-big-initiative&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-07-06T02:11:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions">
    <title>Anti-Spam Laws in Different Jurisdictions: A Comparative Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions</link>
    <description>
        &lt;b&gt;This paper is divided into three sections. The first section puts forth a comparative table of the spam laws of five different countries - the United States of America, Australia, Canada, Singapore and the United Kingdom - based on eight distinct parameters- jurisdiction of the legislation, definition of ‘spam’, understanding of consent, labelling requirements, types of senders covered, entities empowered to sue, exceptions made and penalties prescribed. The second section is a brief background of the problem of spam and it attempts to establish the context in which the paper is written. The third section is a critical analysis of the laws covered in the first section. In an effort to spot the various loopholes in these laws and suggest effective alternatives, this section points out the distinctions between the various legislations and discusses briefly their respective advantages and disadvantages.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Note:- This analysis is a part of a larger attempt at formulating a model anti-spam law for India by analyzing the existing spam laws across the world.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;CAN-SPAM Act, 2003&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Spam Act, 2003 (Australia)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Spam Control Act, 2007 (Singapore)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Canada's Anti-Spam Legislation, 2014&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;The Privacy and Electronic Communications (EC Directive) Regulations, 2003&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;(United Kingdom)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Jurisdiction&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;National Jurisdiction.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;The defendant must be either an inhabitant of the United States or have a physical place of business in the US.[1]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;National Jurisdiction.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Must have an "Australian link" i.e.&lt;/p&gt;
&lt;p&gt;(a) the message originates in Australia; or&lt;/p&gt;
&lt;p&gt;(b) the individual or organisation who sent the message, or&lt;/p&gt;
&lt;p&gt;authorised the sending of the message, is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia&lt;/p&gt;
&lt;p&gt;when the message is sent; or&lt;/p&gt;
&lt;p&gt;(ii) an organisation whose central management and control&lt;/p&gt;
&lt;p&gt;is in Australia when the message is sent; or&lt;/p&gt;
&lt;p&gt;(c) the computer, server or device that is used to access the&lt;/p&gt;
&lt;p&gt;message is located in Australia; or&lt;/p&gt;
&lt;p&gt;(d) the relevant electronic account-holder is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia&lt;/p&gt;
&lt;p&gt;when the message is&lt;/p&gt;
&lt;p&gt;Spam Act, 2003, § 7&lt;/p&gt;
&lt;p&gt;Spam Control Act, 2007, § 7(2)&lt;/p&gt;
&lt;p&gt;Canada's Anti-Spam Legislation, 2014, §accessed; or&lt;/p&gt;
&lt;p&gt;(ii) an organisation that carries on business or activities in&lt;/p&gt;
&lt;p&gt;Australia when the message is accessed; or&lt;/p&gt;
&lt;p&gt;(e) if the message cannot be delivered because the relevant&lt;/p&gt;
&lt;p&gt;electronic address does not exist-assuming that the&lt;/p&gt;
&lt;p&gt;electronic address existed, it is reasonably likely that the&lt;/p&gt;
&lt;p&gt;message would have been accessed using a computer, server&lt;/p&gt;
&lt;p&gt;or device located in Australia.[2]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;National Jurisdiction.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Must have a "Singapore link"&lt;/p&gt;
&lt;p&gt;An electronic message has a Singapore link in the following circumstances:&lt;/p&gt;
&lt;p&gt;(a) the message originates in Singapore;&lt;/p&gt;
&lt;p&gt;(b) the sender of the message is -&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Singapore when the message is sent; or&lt;/p&gt;
&lt;p&gt;(ii) an entity whose central management and control is in Singapore when the message is sent;&lt;/p&gt;
&lt;p&gt;© the computer, mobile telephone, server or device that is used to access the message is located in Singapore;&lt;/p&gt;
&lt;p&gt;the recipient of the message is-&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Singapore when the message is accessed; or&lt;/p&gt;
&lt;p&gt;(ii)an entity that carries on business or activities in Singapore when the message is accessed; or&lt;/p&gt;
&lt;p&gt;(e) if the message cannot be delivered because the relevant&lt;/p&gt;
&lt;p&gt;electronic address has ceased to exist (assuming that the electronic address existed), it is reasonably likely that the&lt;/p&gt;
&lt;p&gt;message would have been accessed using a computer, mobile telephone, server or device located in Singapore.[3]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Extends to cases where the mail originates in a foreign state but is accessed in Canada&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Section 6 of the CASL prohibits the sending of unsolicited CEMs.[4]&lt;/p&gt;
&lt;p&gt;As per Section 12 of the CASL, A person contravenes section 6 only if a computer system located in Canada is used to send &lt;i&gt;or&lt;/i&gt; access the electronic message.&lt;/p&gt;
&lt;p&gt;CASL applies to CEMs sent from, or accessed in, Canada.[5]&lt;/p&gt;
&lt;p&gt;So, if a CEM is sent to Canadians from another jurisdiction, CASL will apply. Notably, there is an exception where the person sending the 					message "reasonably believes" that the message will be accessed in one of a list&lt;/p&gt;
&lt;p&gt;of prescribed jurisdictions with anti-spam laws thought to&lt;/p&gt;
&lt;p&gt;be 'substantially similar' to CASL and the message complies with the laws of that jurisdiction.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;European Union&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;These regulations can be enforced against a person or a company anywhere in the European Union who violates the regulations.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Definition Of Spam&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited, commercial, electronic mail"[6], where&lt;/p&gt;
&lt;p&gt;a commercial electronic mail is "any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a 					commercial product or service"[7]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited commercial electronic messages" where electronic message means a message sent "using an internet carriage service or any other 					listed carriage service; and to an electronic address in connection with: an e-mail account; or an instant messaging account; or a 					telephone&lt;/p&gt;
&lt;p&gt;account; or a similar accounts."[8]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited commercial electronic message sent in bulk", where&lt;/p&gt;
&lt;p&gt;a CEM is &lt;i&gt;unsolicited&lt;/i&gt; if the recipient did not-&lt;/p&gt;
&lt;p&gt;i) request to receive the message; or&lt;/p&gt;
&lt;p&gt;ii)consent to the receipt of the message;[9] and&lt;/p&gt;
&lt;p&gt;CEMs shall be deemed to be sent in bulk if a person sends, causes to be sent or authorizes the sending of-&lt;/p&gt;
&lt;p&gt;a) more than 100 messages containing the same subject matter during a 24-hour period;&lt;/p&gt;
&lt;p&gt;b) more than 1,000 messages containing the same subject matter during a 30-day period;&lt;/p&gt;
&lt;p&gt;c) more than 10,000 messages containing the same subject matter during a one-year period.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited, commercial, electronic message"[10]&lt;/p&gt;
&lt;p&gt;where, an "electronic message" means a message sent by any means of telecommunication, including a text, sound, voice or image message.[11]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;These rules apply to all unsolicited direct marketing communications by automatic call machines[12], fax[13], calls[14] or e-mail[15].&lt;/p&gt;
&lt;p&gt;Where, "direct marketing" is defined as "the communication (by whatever means) of any advertising or marketing material which is directed 					to particular individuals"[16]&lt;/p&gt;
&lt;p&gt;The UK used its discretion to include voice-to-voice telephone calls as well.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;&lt;b&gt;Consent Requirement&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-out&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-in&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-out&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-in&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-in&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;CEMs are unlawful unless the message provides-&lt;/p&gt;
&lt;p&gt;(i)clear and conspicuous identification that the message is an advertisement or solicitation;&lt;/p&gt;
&lt;p&gt;(ii)clear and conspicuous notice of the opportunity under paragraph (3) to decline to receive further commercial electronic mail messages 					from the sender; and&lt;/p&gt;
&lt;p&gt;(iii) a valid physical postal address of the sender.[17]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 16 prohibits the sending of unsolicited commercial electronic messages. However, where a recipient has consented to the sending of 					the message, the said prohibition does not apply.[18]&lt;/p&gt;
&lt;p&gt;Consent means:&lt;/p&gt;
&lt;p&gt;(a) express consent; or&lt;/p&gt;
&lt;p&gt;(b) consent that can reasonably be inferred from:&lt;/p&gt;
&lt;p&gt;(i) the conduct; and&lt;/p&gt;
&lt;p&gt;(ii) the business and other relationships;&lt;/p&gt;
&lt;p&gt;of the individual or organisation concerned.[19]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;CEMs are unlawful unless the message contains-&lt;/p&gt;
&lt;p&gt;1 a) an electronic mail address, an Internet location address, a telephone number, a facsimile number or a postal address that the 					recipient may use to submit an unsubscribe request; and&lt;/p&gt;
&lt;p&gt;b) a statement the above information may be utilized to send an unsubscribe request.&lt;/p&gt;
&lt;p&gt;2. Where the unsolicited CEM is received by text or multimedia message sent to a mobile telephone number, the CEM must include a mobile 					telephone number to which the recipient may send an unsubscribe request. [20]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Under the CASL, it is prohibited to send or cause or permit to be sent to an electronic address a commercial electronic message unless,&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;a&lt;/i&gt;) the person to whom the message is sent has consented to receiving it, whether the consent is express or implied; &lt;i&gt;and&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;b&lt;/i&gt;)&lt;/p&gt;
&lt;p&gt;The message must-&lt;/p&gt;
&lt;p&gt;(i) set out prescribed information that identifies the person who sent the message and the person - if different - on whose behalf it is 					sent;&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;ii&lt;/i&gt;) set out information enabling the person to whom the message is sent to readily contact one of the persons referred to in 					paragraph&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;i&lt;/i&gt;); and&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;iii)&lt;/i&gt; set out an unsubscribe mechanism in accordance with subsection 11(1) of CASL.[21]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Under Section 19&lt;/b&gt; , A person shall neither transmit, nor instigate the transmission of, communications comprising recorded matter for direct marketing 					purposes by means of an automated calling system except in the circumstances where the called line is that of a subscriber who has 					previously notified the caller that &lt;i&gt;for the time being he consents to such communications&lt;/i&gt; being sent by, or at the instigation of, 					the caller on that line.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Under Section 20&lt;/b&gt; , A person shall neither transmit, nor instigate the transmission of, unsolicited communications for direct marketing purposes by means of 					a facsimile machine where the called line is that of an individual or a company except in the circumstances where the individual subscriber 					has previously notified the caller that he consents for the time being to such communications being sent by, or at the instigation of, the 					caller.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Under Section 21,&lt;/b&gt; A person shall neither use, nor instigate the use of, a public electronic communications service for the purposes of making unsolicited calls for direct marketing purposes where the called line is that of a subscriber who has					&lt;i&gt;previously notified the caller that such calls should not for the time being be made on that line&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Under Section 22&lt;/b&gt; , a person shall neither transmit, nor instigate the transmission of, unsolicited communications for the purposes of direct marketing by means of electronic mail unless the recipient of the electronic mail has previously notified the sender that					&lt;i&gt;he consents for the time being to such communications being sent by, or at the instigation of, the sender.&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Labelling Requirements&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Warning Labels mandatory on e-mails containing pornographic content&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;No person may send to a protected computer, any commercial electronic mail message that includes sexually oriented material and-&lt;/p&gt;
&lt;p&gt;(a) fail to include in subject heading for the electronic mail message the marks or notices prescribed by the law; or&lt;/p&gt;
&lt;p&gt;(B) fail to provide that the matter in the message&lt;/p&gt;
&lt;p&gt;that is initially viewable to the recipient, when the message is opened by any recipient and absent any further actions by the recipient, 					includes only-&lt;/p&gt;
&lt;p&gt;(i) material which the recipient has consented to;&lt;/p&gt;
&lt;p&gt;(ii) the identifier information required to be included in pursuance Section 5(5); and&lt;/p&gt;
&lt;p&gt;(iii) Instructions on how to access, or a mechanism to access, the sexually oriented material.[22]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not Applicable.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;True e-mail title and clear identification of advertisements with "ADV" label&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Every unsolicited CEM must contain-&lt;/p&gt;
&lt;p&gt;a) where there is a subject field, a title which is not false or misleading as to the content of the message;&lt;/p&gt;
&lt;p&gt;b) the letters "&amp;lt;ADV&amp;gt;" with a space before the title in the subject field or if there is no subject field, in the words first 					appearing in the message to clearly identify that the message is an advertisement;&lt;/p&gt;
&lt;p&gt;c) header information that is not false or misleading; and&lt;/p&gt;
&lt;p&gt;d) an accurate and functional e-mail address or telephone number by which the sender can be readily contacted.[23]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not Applicable.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not Applicable.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Other Banned/Restricted Activities&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Illegal Access-&lt;/i&gt; &lt;i&gt;Prohibition Against Predatory and Abusive Commercial E-Mail-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"Whoever, in or affecting interstate or foreign&lt;/p&gt;
&lt;p&gt;commerce, knowingly-&lt;/p&gt;
&lt;p&gt;(1) accesses a protected computer without authorization, and intentionally initiates the transmission of multiple CEMs from or through such 					computer,&lt;/p&gt;
&lt;p&gt;(2) uses a protected computer to relay or retransmit multiple&lt;/p&gt;
&lt;p&gt;CEMs, with the intent to&lt;/p&gt;
&lt;p&gt;deceive or mislead recipients, or any Internet access service, as to the origin of such messages,&lt;/p&gt;
&lt;p&gt;(3) &lt;i&gt;materially falsifies header information&lt;/i&gt; in multiple commercial electronic mail messages and intentionally initiates&lt;/p&gt;
&lt;p&gt;the transmission of such messages,&lt;/p&gt;
&lt;p&gt;(4) registers, using information that materially &lt;i&gt;falsifies the identity of the actual registrant,&lt;/i&gt; for five or more electronic mail 					accounts or online user accounts or two or more domain names, and intentionally initiates the transmission of multiple&lt;/p&gt;
&lt;p&gt;commercial electronic mail messages from any combination of such accounts or domain names, or&lt;/p&gt;
&lt;p&gt;(5) falsely represents oneself to be the registrant or the legitimate successor in interest to the registrant of 5 or more Internet 					Protocol addresses, and intentionally initiates the transmission of multiple commercial electronic mail messages from such addresses, or 					conspires to do so, shall be punished as provided for in the Act.[24]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Supply of address harvesting software and harvested‑address lists &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"A person must not supply or offer to supply:&lt;/p&gt;
&lt;p&gt;(a) address‑harvesting software; or&lt;/p&gt;
&lt;p&gt;(b) a right to use address‑harvesting software; or&lt;/p&gt;
&lt;p&gt;(c) a harvested address list; or&lt;/p&gt;
&lt;p&gt;(d) a right to use a harvested‑address list;&lt;/p&gt;
&lt;p&gt;to another person if:&lt;/p&gt;
&lt;p&gt;(e) the supplier is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia at the time of the supply or offer; or&lt;/p&gt;
&lt;p&gt;(ii) a body corporate or partnership that carries on business or activities in Australia at the time of the supply or offer; or&lt;/p&gt;
&lt;p&gt;(f) the customer is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia at the time of the supply or offer; or&lt;/p&gt;
&lt;p&gt;(ii) a body corporate or partnership that carries on business or activities in Australia at the time of the supply or offer."&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Dictionary Attacks and Address harvesting software&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"No person shall send, cause to be sent, or authorize the sending of, an electronic message to electronic addresses generated or obtained 					through the use of-&lt;/p&gt;
&lt;p&gt;a) a dictionary attack;&lt;/p&gt;
&lt;p&gt;b) address harvesting software.[25]&lt;/p&gt;
&lt;p&gt;Where,&lt;/p&gt;
&lt;p&gt;"dictionary attack" means the method which by which the electronic address of a recipient is obtained using an automated means that 					generates possible electronic addresses by combining names, letters, numbers, punctuation marks or symbols into numerous permutations.[26] 					And,&lt;/p&gt;
&lt;p&gt;"address harvesting software" means software that is specifically designed or marketed for use for-&lt;/p&gt;
&lt;p&gt;a)searching the Internet for electronic addresses; and,&lt;/p&gt;
&lt;p&gt;b) collecting, compiling, capturing or otherwise harvesting those electronic addresses."[27]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Altering Transmission Data&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"It is prohibited, in the course of a commercial activity, to alter or cause to be altered the transmission data in an electronic message 					so that the message is delivered to a destination other than or in addition to that specified by the sender, unless&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;a&lt;/i&gt;) the alteration is made with the express consent of the sender or the person to whom the message is sent, and the person 					altering or causing to be altered the data complies with subsection 11(4) of CASL; or&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;b&lt;/i&gt;) the alteration is made in accordance with a court order.[28]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Installation of Computer Program&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A person must not, in the course of a commercial activity, install or cause to be installed a computer program on any other person's 					computer system or, having so installed or caused to be installed a computer program, cause an electronic message to be sent from that 					computer system, unless&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;a&lt;/i&gt;) the person has obtained the express consent of the owner or an authorized user of the&lt;/p&gt;
&lt;p&gt;computer system and complies with subsection 11(5) of the CASL; or&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;b&lt;/i&gt;) the person is acting in accordance with a court order.&lt;/p&gt;
&lt;p&gt;(2) A person contravenes subsection (1) only if the computer system is located in Canada at the relevant time or if the person either is in 					Canada at the relevant time or is acting under the direction of a person who is in Canada at the time when they give the directions."[29]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Electronic mail for direct marketing purposes where the identity or address of the sender is concealed&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;A person shall neither transmit, nor instigate the transmission of, a communication for the purposes of direct marketing by means of 					electronic mail-&lt;/p&gt;
&lt;p&gt;(a) where the identity of the person on whose behalf the communication has been sent has been disguised or concealed; or&lt;/p&gt;
&lt;p&gt;(b)where a valid address to which the recipient of the communication may send a request that such communications cease has not been 					provided.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Types of Senders Covered&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;the term ''sender'', when used with respect to a commercial electronic mail message, means a person who initiates such a message and whose 					product, service, or Internet web site is advertised or promoted by the message."[30]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;A person must not &lt;i&gt;send&lt;/i&gt;, or &lt;i&gt;cause to be sent&lt;/i&gt;, a commercial electronic message that:&lt;/p&gt;
&lt;p&gt;(a) has an Australian link; and&lt;/p&gt;
&lt;p&gt;(b) is not a designated commercial electronic message.[31]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers,&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;beneficiaries, and&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;providers of support&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;services&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"sender" means a person who sends a message, causes the message to be sent, or authorizes the sending of the message.[32]&lt;/p&gt;
&lt;p&gt;Further, persons aiding or abetting the offences under Section 9 or 11 are also punishable under the Act.[33]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Under Section 6, it is prohibited to &lt;i&gt;send&lt;/i&gt; or &lt;i&gt;cause or permit to be sent&lt;/i&gt; to an electronic address a CEM.&lt;/p&gt;
&lt;p&gt;Under Section 7, It is prohibited, in the course of a commercial activity, to &lt;i&gt;alter or cause to be altered&lt;/i&gt; the transmission data 					in a CEM.&lt;/p&gt;
&lt;p&gt;Under Section 8, A person must not, in the course of a commercial activity, &lt;i&gt;install or cause to be installed&lt;/i&gt; a computer program on 					any other person's computer system or, &lt;i&gt;having so installed or caused to be installed&lt;/i&gt; a computer program, cause an electronic 					message to be sent from&lt;/p&gt;
&lt;p&gt;that computer system.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;The texts of Sections 19, 20, 21 and 22 all prohibit the transmission as well as the instigation of the transmission of, communications for 					direct marketing purposes without the consent of the recipient.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Who Can Sue&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;FTC[34], Attorney Generals[35], ISPs and IAPs[36] and most recently even companies/private entities[37]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Australian Communications and Media Agency (ACMA)[38]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any injured party, including individual users.[39]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any injured party, including individual users.[40]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any person who suffers damage by reason of any contravention of any of the requirements of these Regulations.[41]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Exceptions&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Transactional or Relationship Messages&lt;/i&gt; [42]&lt;/p&gt;
&lt;p&gt;where,&lt;/p&gt;
&lt;p&gt;The term ''transactional or relationship&lt;/p&gt;
&lt;p&gt;message'' means an electronic mail message the primary purpose of which is-&lt;/p&gt;
&lt;p&gt;(i) to facilitate, complete, or confirm a commercial&lt;/p&gt;
&lt;p&gt;transaction;&lt;/p&gt;
&lt;p&gt;(ii) to provide warranty information, product recall information, etc. with respect to a commercial product or service used or purchased by 					the recipient;&lt;/p&gt;
&lt;p&gt;(iii) to provide notifications-&lt;/p&gt;
&lt;p&gt;(I) concerning a change in the terms or features of;&lt;/p&gt;
&lt;p&gt;(II) of a change in the recipient's standing or status with respect to; or&lt;/p&gt;
&lt;p&gt;(III) information with respect to a subscription, membership, account, loan, or comparable ongoing commercial relationship involving the&lt;/p&gt;
&lt;p&gt;ongoing purchase or use by the recipient of products or services offered by the sender;&lt;/p&gt;
&lt;p&gt;(iv) to provide information directly related to an employment relationship or related benefit plan in which the recipient is currently 					involved, participating,&lt;/p&gt;
&lt;p&gt;or enrolled; or&lt;/p&gt;
&lt;p&gt;(v) to deliver goods or services, including product updates or upgrades, that the recipient is entitled to receive under the terms of a 					transaction that the recipient has previously agreed to enter into with the sender.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Designated Commercial Electronic Message&lt;/i&gt; (DCEM). A DCEM is a message containing &lt;i&gt;purely factual information&lt;/i&gt;, any related comments of non-commercial nature and some limited 					commercial information as to the identity of the sender company/individual.[43]&lt;/p&gt;
&lt;p&gt;A message is a DCEMs if-&lt;/p&gt;
&lt;p&gt;a) the sending of the message is authorized by any of the following bodies:&lt;/p&gt;
&lt;p&gt;(i) a government body;&lt;/p&gt;
&lt;p&gt;(ii) a registered political party;&lt;/p&gt;
&lt;p&gt;(iii) a religious organization;&lt;/p&gt;
&lt;p&gt;(iv) a charity or charitable institution; and&lt;/p&gt;
&lt;p&gt;(b) the message relates to goods or services; and&lt;/p&gt;
&lt;p&gt;(c) the body is the supplier, or prospective supplier, of the goods or services concerned.[44]&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Messages from educational institutions:&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;an electronic message is a &lt;b&gt;&lt;i&gt;DCEM &lt;/i&gt;&lt;/b&gt;if:&lt;/p&gt;
&lt;p&gt;(a) the sending of the message is authorised by an educational institution; and&lt;/p&gt;
&lt;p&gt;(b) either or both of the following subparagraphs applies:&lt;/p&gt;
&lt;p&gt;(i) the relevant electronic account‑holder is, or has been, enrolled as a student in that institution;&lt;/p&gt;
&lt;p&gt;(ii) a member or former member of the household of the relevant electronic account‑holder is, or has been, enrolled as a student in 					that institution; and&lt;/p&gt;
&lt;p&gt;(c) the message relates to goods or services; and&lt;/p&gt;
&lt;p&gt;(d) the institution is the supplier, or prospective supplier, of the goods or services concerned.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Electronic Messages authorized by the Government&lt;b&gt;[45]&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;The Act does not apply to any electronic message where the sending of the message is authorized by the Government or a statutory body on 					the occurrence of any public emergency, in the public interest or in the interests of public security or national defence.[46]&lt;/p&gt;
&lt;p&gt;A certificate signed by the Minister shall be conclusive evidence of existence of a public emergency and the other above stated 					matters.[47]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;i&gt;Family and Personal relationships, &lt;/i&gt; where &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;"Family relationship" is a relationship between two people related through marriage, a common law partnership, or any legal parent-child 					relationship who have had direct, voluntary two-way communications; and&lt;/p&gt;
&lt;p&gt;"personal relationship" means a relationship between two people who have had direct, voluntary two-way communications where it would be 					reasonable to conclude that the relationship is personal.[48]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;i&gt; Mails sent to an individual who practices a particular commercial activity with the mail containing solely an inquiry or 							application related to that activity&lt;b&gt;[49]&lt;/b&gt;. &lt;/i&gt; &lt;/li&gt;
&lt;li&gt; &lt;i&gt;A mail which&lt;/i&gt; - provides a quote or estimate for the supply of a product, goods, a service, etc. if requested by the recipient; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;· facilitates, completes or confirms a commercial transaction that the recipient previously agreed to enter into with the sender;&lt;/p&gt;
&lt;p&gt;· provides warranty information, product recall information etc. about a product, goods or a service that the recipient uses, has used 					or has purchased;&lt;/p&gt;
&lt;p&gt;· provides notification of factual information about-&lt;/p&gt;
&lt;p&gt;(i) the ongoing use or ongoing purchase by the recipient of a product, goods or a service offered under a subscription, membership, 					account, loan or similar relationship by the sender, or&lt;/p&gt;
&lt;p&gt;· provides information directly related to an employment relationship or related benefit plan in which the recipient is currently 					involved, is currently participating or is currently enrolled;&lt;/p&gt;
&lt;p&gt;· delivers a product, goods or a service, including updates or upgrades, that the recipient is entitled to receive under the terms of 					a transaction that they have previously entered into with the sender.[50]&lt;/p&gt;
&lt;p&gt;· Telecommunications service provider merely because the service provider provides a telecommunications service that enables the 					transmission of the message.[51]&lt;/p&gt;
&lt;p&gt;· CEMs which are two-way voice communication between individuals sent by means of a facsimile or a voice recording sent to a telephone 					account.[52]&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;A person may send or instigate the sending of electronic mail for the purposes of direct marketing where&lt;/i&gt; -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the contact details of the recipient of that electronic mail in the course of the sale or negotiations for the sale of a product or 					service to that recipient;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the direct marketing is in respect of that person's similar products and services only; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) the recipient has been given a simple means of refusing (free of charge except for the costs of the transmission of the refusal) the 					use of his contact details for the purposes of such direct marketing, at the time that the details were initially collected, and, where he 					did not initially refuse the use of the details, at the time of each subsequent communication.[53]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Penalties&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil and Criminal&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Statutory damages-&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Amount calculated by multiplying the number of violations by up to $250. Total amount of damages may not exceed $2,000,000. [54]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Imprisonment- &lt;/b&gt; upto 5 years.[55]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Forfeiture from the offender, of-&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;i) any property, real or personal, constituting or&lt;/p&gt;
&lt;p&gt;traceable to gross proceeds obtained from such offense;&lt;/p&gt;
&lt;p&gt;ii) any equipment, software, or other technology used or intended to be used to commit or to facilitate the commission of such offense.[56]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil only&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;body corporate without prior record&lt;/b&gt;,&lt;/p&gt;
&lt;p&gt;for upto 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 100 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 50 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 2000 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 1000 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;body corporate with prior record&lt;/b&gt;,&lt;/p&gt;
&lt;p&gt;for upto 2 contravention, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 500 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 250 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 10,000 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 5,000 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;person without prior record&lt;/b&gt;,&lt;/p&gt;
&lt;p&gt;for upto 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 20 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 10 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 400 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 200 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;person with prior record,&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;for upto 2 contravention, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 100 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 50 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 2,000 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 1,000 penalty units in any other case.[57]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil only&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;i) &lt;b&gt;Injunction&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;ii) &lt;b&gt;Damages-&lt;/b&gt; calculated in terms of loss suffered as a direct or indirect result of the contravention of the Act.&lt;/p&gt;
&lt;p&gt;ii) &lt;b&gt;Statutory Damages&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;not exceeding $25 for each CEM; and not exceeding in the aggregate $1 million, unless the plaintiff proves that his actual loss from such 					CEMs exceeds $1 million.[58]&lt;/p&gt;
&lt;p&gt;iii)Costs of litigation to the plaintiff.[59]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil only&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Administrative Monetary Penalty&lt;/b&gt; , the purpose of which is to promote compliance with the Act and not to punish.[60]&lt;/p&gt;
&lt;p&gt;The maximum penalty for a violation is $1,000,000 in the case of an individual, and $10,000,000 in the case of any other person.[61]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil on private action; Criminal for non-compliance with IC's notice&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;A person who suffers damage by reason of any contravention of any of the requirements of these Regulations by any other person shall be 					entitled to bring proceedings &lt;i&gt;for compensation&lt;/i&gt; from that other person for that damage.[62]&lt;/p&gt;
&lt;p&gt;The enforcement authority for these regulations is Britain's Information Commissioner who oversees both the Act and the Regulations, and 					investigates complaints and makes findings in the form of various types of notices.[63]&lt;/p&gt;
&lt;p&gt;Failure to comply with any notice issued by the Information Commissioner is a criminal offence and is punishable with a fine of upto 					£5000 in England and Wales and £10,000 Scotland.[64]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;THE PROBLEM OF SPAM -WHY IT PERSISTS&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per a study conducted by &lt;i&gt;Kaspersky Lab &lt;/i&gt;in 2014, 66.34% of all messages exchanged over the internet were spam.[65] Over the 2000s, several 	countries recognized the threats posed by spam and enacted specific legislations to tackle the same. The ones taken into consideration in this paper are 	the CAN-SPAM Act, 2003 of the United States, Canada's Anti-Spam Legislation, 2014, The Spam Act, 2003 of Australia, Singapore's Spam Control Act, 2007 and 	The Privacy and Electronic Communications (EC Directive) Regulations, 2003 (United Kingdom). As will be analyzed in the course of this paper, none of these 	laws have evolved to become comprehensive mechanisms for combating spam yet. Nevertheless, post the enactment of these laws, spam has reduced as a 	percentage of the net email traffic; however, the absolute quantity of spam has increased owing to the exponential growth of email traffic universally.[66]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Who Benefits from Spam?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. &lt;i&gt;Commercial establishments -&lt;/i&gt; Spamming is one of the most cost-effective means of promoting products and services to a large number of potential 	customers. Spams are not necessarily duplicitous and often contain legitimate information to which a fraction of the recipients respond positively. As per 	a recent study, for spam to be profitable, only 1 in 25,000 spam recipients needs to open the email, get enticed, and make a gray-market purchase.[67]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;i&gt;Non-commercial establishments benefitting from advertisements -&lt;/i&gt; Many seemingly non-profit messages benefit from revenue generated through 	advertisements when recipients visit their site. Advertisers pay these sites either per click or per impression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;i&gt;Spammers &lt;/i&gt;- The costs incurred by spammers largely include the cost of e-mail/phone number harvesting and the cost of paying botnet operators. 	As compared to the revenue generated as a percentage of profits earned by the merchant on whose behalf spam messages are sent, these costs are 	negligible.[68]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, spamming proves to be an activity that involves minimal investment and often yields some response from prospective clients.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The impact of spam is clearly widespread. Presently, India lacks a specific anti-spam legislation. In consideration of the swelling growth of spam across 	the globe and the increasing number of Indian users, it is of utmost urgency that a specific legislation is formulated to tackle the issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;OBSERVATIONS AND ANALYSIS&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1.&lt;/b&gt; &lt;b&gt;Definition of Spam&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a.&lt;/b&gt; &lt;b&gt;'Spam' must be defined in a technologically neutral manner&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The legislations analyzed in this paper deal with either one or a cluster of modes of communication through which spam may be sent. However, it is 	essential that 'spam' is defined in a manner that is technologically neutral. Most commercial spam is aimed at promoting products and services to a large 	number of prospective customers. Thus, making only spam e-mails illegal, like the CAN-SPAM Act does, fails to address the issue wholly as companies would 	always retain the option of sending unsolicited messages through other communicative devices. It becomes an issue of merely switching modes of 	communication without there being any actual deterrence to spamming. Thus, a narrow understanding of spam, limiting it to one or few modes of 	communication, is problematic and for a model law, a broader definition that discourages unsolicited messages sent via any network is warranted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b.&lt;/b&gt; &lt;b&gt;Non-commercial spam must also be addressed&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The five legislations examined in this paper address only the issue of unsolicited 'commercial' mails/messages. For instance, under the CAN-SPAM, a commercial mail means "	&lt;i&gt;any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial product or service&lt;/i&gt;". 	Singapore's Spam Control Act defines a commercial message in a similar fashion but more elaborately. CASL, while limiting the scope of the law to 	commercial mail, additionally prescribes that such communication need not have a profit motive. Australia's Spam Act defines a commercial message as a 	message that has the purpose of offering, advertising or promoting goods or services or the supplier or prospective supplier of goods or services. Under 	the EC Directive, the term used is 'marketing communication'; however, in essence, it includes only commercial communications.[69] These definitions suffer 	from an obvious exclusion error. It is known from experience that not all unsolicited messages received are in pursuance of commercial interests. Often, 	unsolicited mails and messages are received with explicit sexual content as well as promoting political and religious agendas sent by party volunteers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, it would be in higher consonance with the greater aim of curbing spam to broaden the scope of these legislations to address both commercial as well 	as non-commercial messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c.&lt;/b&gt; &lt;b&gt;Bulk requirement and its quantification&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Singaporean law makes 'sent in bulk' a mandatory requirement for spam. However, deciding what quantity of a particular message qualifies it as bulk is 	difficult. If an objective threshold is set, say 100 messages in 24 hours, then anything short of that, say even 99 messages, go unaddressed simply because 	it does not meet the statutory requirement of being in bulk. This enables spammers to misuse the law by marginally falling short of the threshold and still 	continuing to spam. The issue here is comparable to the one faced in setting age as bar to criminal culpability. No matter what, any number arrived at is 	likely to be arbitrary and consequently subject of criticism. A possible way to tackle this would be to strengthen the unsubscribe mechanisms by virtue of 	which individuals are able to, at the very least, stop receiving unsolicited mails. For the determination of threshold for State action and its 	feasibility, a much more detailed study is merited.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2.&lt;/b&gt; &lt;b&gt;Consent Requirement&lt;/b&gt;&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Opt- out Model&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Opt-in Model&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Double Opt-in Model&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Countries following the model&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;United States of America and Singapore&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Canada, Australia and the United Kingdom&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;None at present.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;When messages may be sent&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;At all times until recipient voluntarily opts out/unsubscribes.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Only after the recipient voluntarily opts-in/subscribes to receive messages by submitting his/her contact details to be part of a 					particular mailing list.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Only after the recipient responds in the affirmative to the confirmation mail sent by the sender on receiving an opt-in request from the 					recipient.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Specific requirements&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. The mail/message must bear a clear identifier of its content. E.g. marked as 'ADVT' for advertisements;&lt;/p&gt;
&lt;p&gt;2. An 'unsubscribe' option must be provided in the message which may be utilized by the recipient to express his/her disinterest in the 					message; and&lt;/p&gt;
&lt;p&gt;3. The message must conspicuously bear a valid physical postal address.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Advantages&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Promotes commercial speech rights-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Since the default position presumes the right to market, average collection rates are considerably higher as more emails can be sent to 					more people.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. &lt;i&gt;Reduction in unsolicited messages-&lt;/i&gt; Commercial messages are not sent until the recipient voluntarily consents to receiving such 					messages by submitting his/her contact information.&lt;/p&gt;
&lt;p&gt;2. &lt;i&gt;Availability of unsubscribe option-&lt;/i&gt; Even after a recipient voluntarily opts in, he/she still has the right to withdraw from 					such messages by unsubscribing.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Ensures people are entering their information correctly, which equals a cleaner list and lowers bounce rates.&lt;/p&gt;
&lt;p&gt;2. Reduces the probability of spam complaints because subscribers have had to take the extra step to confirm their consent.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disadvantages&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. This merely places the &lt;i&gt;burden of reduction of spam on the recipients&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;2. The &lt;i&gt;functionality of the 'unsubscribe' link is itself questionable.&lt;/i&gt; Very often these links themselves are fraudulent. In such a 					case, the recipient is further harmed before any opting-out can even take place.&lt;/p&gt;
&lt;p&gt;3. In the absence of any strict regulatory oversight, there exists &lt;i&gt;no&lt;/i&gt; &lt;i&gt;incentive&lt;/i&gt; for the senders to strictly address 					unsubscribe requests.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. &lt;i&gt;Consent may be obtained in fact but not in spirit&lt;/i&gt; through inconspicuous pre-ticked check boxes.&lt;/p&gt;
&lt;p&gt;2. &lt;i&gt;E-mail addresses may be added to a list by spambots&lt;/i&gt;. Where, the person 'opted-in' may not actually be the person opting in.&lt;/p&gt;
&lt;p&gt;3. &lt;i&gt;Errors may be made when entering emails&lt;/i&gt;; a typo may result in someone submitting an address that is not theirs.&lt;/p&gt;
&lt;p&gt;4. Legitimate addresses may be added by someone who does not own the address.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Genuine subscribers may not understand clearly the confirmation process and fail to click the verification link.&lt;/p&gt;
&lt;p&gt;2. Confirmation emails may get stuck in spam filters.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The comparison above highlights that the opt-out model as well as the opt-in model may leave loopholes. The opt-in model has been advocated for as the 	better model as compared to the opt-out model as it prohibits the sending of messages unless the recipient consents to receiving such messages. However, as 	pointed out above, in this model consent may be given by entities other than the owner of the contact details. In such a situation, a double opt-in model 	may be a viable option to contemplate as it is the only model where it can be ensured that only the addressee is enabled to successfully opt-in.[70]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Presently, the double opt-in model has not been adopted by any of the countries discussed in this paper. Nonetheless, it seems to have the potential to aid 	the fight against spam more effectively than the existing models. Its real efficacy however, shall be proven only on practical implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.&lt;/b&gt; &lt;b&gt;Exceptions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a.&lt;/b&gt; &lt;b&gt;Family and Personal Relationships&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the CASL, an exception is made for &lt;i&gt;'personal&lt;/i&gt; &lt;i&gt;relationships'&lt;/i&gt; and &lt;i&gt;'family relationship'&lt;/i&gt;. However, these terms are defined 	quite narrowly. For instance, family relationship is defined as 'a relationship between two people related through marriage, a common law partnership, or 	any legal parent-child relationship and those individuals have had direct, voluntary, two-way communication'.&lt;sup&gt;[71]&lt;/sup&gt; This implies that in a 	situation where an individual wants to send a message offering to sell something to an individual in his extended family, say his cousins, doing so without 	obtaining their consent first, would qualify his mail as spam under the CASL. This would become especially problematic in the Indian context where 	comparatively larger family structures prevail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the anti-spam legislations of the other four countries, no such exceptions are made. Quite obviously, these exceptions are of crucial significance and 	must be provided in any anti-spam legislation; however, it is important that they are defined in a manner such that their actual purpose i.e. of exclusion 	of familial and personal relationships from regulations applicable to spammers, is effectively achieved and the law does not become a creator for 	unnecessary litigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b.&lt;/b&gt; &lt;b&gt;Transactional Messages&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The term 'transactional messages' is used only under the CAN-SPAM Act of the USA. It basically covers messages sent when the recipient stands in an 	existing transactional relationship with the sender and the mail contains information specific to the recipient. It also includes employment relationships. 	In CASL, a similar exception is made under Section 6(6). The section is worded almost identically as the CAN-SPAM provision, though the term 'transactional 	messages' is not used. In the UK laws, messages for the purpose of direct marketing may be sent where the contact information of the recipient is received 	in the course of the sale or negotiations for the sale of a product or service to that recipient, thus implying an existing transactional relationship. One 	added proviso under the UK law is that the recipient must be clearly and distinctively given the opportunity to object, free of charge and in an easy 	manner, to the use of the e-mail address when collected and on the occasion of each message in case the customer has not initially refused such use.[72]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An exception for transactional messages is essential to ensure freedom of commercial speech rights even while effectively tackling spam. In the formulation 	of a model law, a combination of the American and the English laws may be workable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c.&lt;/b&gt; &lt;b&gt;Governmental Messages&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Spam Act, 2003 of Australia makes an exemption for &lt;i&gt;'designated commercial electronic message (DCEM)'&lt;/i&gt;. This exemption is to avoid any 	unintended restriction on communication between the government and the community.&lt;sup&gt;[73]&lt;/sup&gt; In order to be a DCEM, a message must-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Be authorized by the government;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Contain purely factual information and any related comments of non-commercial nature; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Contain some information as to the identity of the sender company/individual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DCEMs need not always be sent by government bodies and may also be sent by third parties authorized by the government.&lt;sup&gt;[74]&lt;/sup&gt; Such messages are 	exempt from the consent requirement as well as the unsubscribe option requirement but must comply with the identifier requirement. However, where 	government bodies are operating in a competitive environment, the provisions of the act would apply normally to them.&lt;sup&gt;[75]&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, Singapore's Spam Control Act does not apply to any electronic message where the sending of the message is authorized by the Government or a statutory body on the occurrence of any &lt;i&gt;public emergency&lt;/i&gt;, in &lt;i&gt;public interest&lt;/i&gt; or in the &lt;i&gt;interests of public security&lt;/i&gt; or	&lt;i&gt;national defence&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These exemptions are essential in order to enable free communication of important information between the government and the citizens. The Singaporean 	wording of the exception is rather broad and would give the government immense space for misusing the law. Such a wording might be more effective if 	supplemented with the Australian proviso wherein governmental communications operating in a competitive environment are excluded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.&lt;/b&gt; &lt;b&gt;Penalties&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a. &lt;/b&gt; &lt;b&gt;Penalties must be higher than benefit from spamming&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the penalty prescribed itself is too low, such that loss suffered from paying penalties is lower than net benefit from spamming, the spammer is not 	sufficiently deterred. Four out of the five countries analyzed in this paper prescribe only civil penalties in the form of fines for spamming. Recently, a 	Facebook spammer was found to have made a profit of $200 million in a year.[76] For instance, as noted above, the Australian law sets a limit for penalty 	at $1 million. Thus, such a penalty would constitute a small fraction of the profit from spamming and would not deter a spammer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b. High penalty does not imply effective deterrence where probability of prosecution is low.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CAN-SPAM Act prescribes the harshest penalties including both civil as well as criminal penalties. However, it has been rather ineffective in reducing spam. This is for the reason that this Act is more about how to spam legally than anything else. It is more like- '	&lt;i&gt;you can spam but do not use false headers&lt;/i&gt;.'[77] As a consequence, unintentional spam from ignorant commercial establishments has reduced. However, 	due to easy compliance standards, the 'real' spammers still go undetected to a large extent.[78] Thus, even moderate penalties may serve as good deterrents 	where the probability of prosecution is high.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c. Effective enforcement is the key to effective deterrence.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The cornerstone of an effective spam law is effective enforcement. Penalties must be enforced in a manner that the cost of punishment is always higher than 	the benefit from spamming and the probability of conviction is high. In order to implement legislative measures effectively, governments should also 	undertake an information campaign on spam issues targeting users, business communities, private sector groups and other stakeholders as the one primary 	reason for sustenance of spam is the response received from certain recipients. Such supplementary activities would also facilitate the preservation of 	commercial rights as excessive penalties could inhibit regular commercial activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CONCLUSION&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The observations made in this paper are crucial to the formulation of a model anti-spam law for India. The most important part of any ant-spam legislation 	would be the definition of 'spam' which, as established above, must be technologically neutral in order to be able to address as much unsolicited 	communication as possible. On the question of consent, a double opt-in is what this paper would propose. This model has been contemplated and recommended 	by academic and policy researchers as a possibly more effective consent model for spam laws; however, it has not been codified as a legal regime till date. 	It could be a rather groundbreaking approach that India could adopt as this clearly is the only model where 'opting-in' is realized in fact and in spirit. 	Further, exceptions are necessary in order to prevent the abuse of laws making certain such exceptions do not suffer from inclusive or exclusion errors. A 	combination of the exceptions under the Australian and the American laws seems ideal at this stage of research. In terms of penalty, this paper observed 	that only prescribing harsh penalties is not sufficient to effectively deter spammers but efficient modes of enforcement have to be formulated to ensure 	actual deterrence. Lastly, while a well-drafted national anti-spam legislation is clearly the need of the hour for India; additional steps have to be taken 	towards sensitizing citizens to the fact that the problem of spam is real and a costly threat to the communications infrastructure of the country and 	combat has to begin at the individual level.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;[1] CAN-SPAM Act, § 7706(f) (7).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[2] Spam Act, 2003, § 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[3] Spam Control Act, 2007, § 7(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[4] Canada's Anti-Spam Legislation, 2014, § 6.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[5] Canada's Anti-Spam Legislation, 2014, § 12.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[6] 15 U.S.C. § 7701 (2003).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[7] CAN-SPAM Act, Section 3 (2)(A)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[8] Spam Act, 2003, § 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[9] Spam Control Act, 2007, § 5(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[10] Canada's Anti-Spam Legislation, 2014, § 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[11] Canada's Anti-Spam Legislation, 2014, § 1(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[12] Regulation 19, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[13] Regulation 20, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[14] Regulation 21, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[15] Regulation 22, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[16] Section 11, Data Protection Act, 1998&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[17] CAN-SPAM Act, Section 5(5)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[18] Spam Act, 2003, § 16(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[19] Spam Act, 2003, Schedule 2 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[20] Spam Control Act, 2007 Section 11, Schedule 2(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[21] Canada's Anti-Spam Legislation, 2014, Section 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[22] CAN-SPAM Act, 2003, Section 5(d)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[23] Spam Control Act, 2007, Schedule 2, 3(1), Section 11&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[24] Chapter 47 of title 18, U.S.C., § 1037, inserted through an amendment by the CAN-SPAM Act, § 4(a) (1); '§ 5(A)(1).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[25] Spam Control Act, 2007, '§ 9&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[26] Spam Control Act, 2007, '§ 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[27] Spam Control Act, 2007, '§ 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[28] Canada's Anti-Spam Legislation, 2014, § 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[29] Canada's Anti-Spam Legislation, 2014, § 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[30] CAN-SPAM Act, 2003, § 3(16)(A)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[31] Spam Act, 2003, Section 16(1), Section 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[32] Spam Control Act, 2007, § 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[33] Spam Control Act, 2007, § 12&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[34] CAN-SPAM Act, 2003, § 7(a)(c)(d)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[35] CAN-SPAM Act, 2003, § 7(f)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[36] CAN-SPAM Act, 2003, § 7(g)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[37] &lt;i&gt;MySpace, Inc. v. The Globe.com, Inc.&lt;/i&gt;, 2007 WL 1686966 (C.D. Cal., Feb. 27, 2007)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[38] Spam Act, 2003, § 26(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[39] Spam Control Act, 2007, § 13&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[40] Canada's Anti-Spam Legislation, § 47&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[41] Regulation 30(1), EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[42] CAN-SPAM Act, 2003, § 3(2)(B)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[43] Spam Act, 2003, Schedule 1, § 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[44] Spam Act, 2003, Schedule 1, § 3&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[45] Spam Control Act, 2007, § 7(3)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[46] Spam Control Act, 2007, First Schedule Clause (1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[47] Spam Control Act, 2007, First Schedule Clause (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[48] Canada's Anti-Spam Legislation, § 6(5a)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[49] Canada's Anti-Spam Legislation, § 6(5b)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[50] Canada's Anti-Spam Legislation, § 6(6)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[51] Canada's Anti-Spam Legislation, § 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[52] Canada's Anti-Spam Legislation, § 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[53]Section 22(3), EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[54] CAN-SPAM Act, § 7 (f)(3)(A).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[55] CAN-SPAM Act, § 4 (b)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[56] CAN-SPAM Act, § 4 (c)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[57] Spam Act, 2003, Sections 24, 25&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[58] Spam Control Act, 2007, § 14&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[59] Spam Control Act, 2007, § 15&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[60] Canada's Anti-Spam Legislation, 2014, § 20(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[61] Canada's Anti-Spam Legislation, 2014, § 20(4)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[62] Regulation 30(1), EC Directive, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[63] Regulations 31-32, EC Directive, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[64] Section 47 and 60, Data Protection Act, 1998&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[65] Spam and Phishing Statistics Report Q1-2014, Kaspersky Lab&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;http://usa.kaspersky.com/internet-security-center/threats/spam-statistics-report-q1-2014#.VVQxNndqN5I (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May, 2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[66] Snow and Jayakar, Krishna, &lt;i&gt;Can We Can Spam? A Comparison of National Spam Regulations,&lt;/i&gt; August 15, 2013. TPRC 41: The 41st Research Conference 	on Communication, Information and Internet Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[67] Justin Rao and David Reiley, &lt;i&gt;The Economics of Spam, &lt;/i&gt;Vol.&lt;i&gt; &lt;/i&gt;26, No. 3 The Journal of Economic Perspectives (2012), p. 104.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[68] Supra n. 66; p. 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[69] Refer Table in Section 1.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[70] Dr. Ralph F. Wilson, &lt;i&gt;Spam, Spam Bots, and Double Opt-in E-mail Lists, &lt;/i&gt;April 21, 2010; available at 	http://webmarketingtoday.com/articles/wilson-double-optin/ (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[71] Section 2(a), Electronic Commerce Protection Regulations, http://fightspam.gc.ca/eic/site/030.nsf/eng/00273.html (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May 	2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[72] Evangelos Moustakas, C. Ranganathan and Penny Duquenoy,	&lt;i&gt;Combating Spam Through Legislation: A Comparative Analysis Of US And European Approaches, &lt;/i&gt;available at http://ceas.cc/2005/papers/146.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[73] &lt;i&gt;Spam Act 2003- A Practical Guide for Government, &lt;/i&gt;Australian Communications Authority, available at- 	http://www.acma.gov.au/webwr/consumer_info/spam/spam_act_pracguide_govt.pdf (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May 2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[74] &lt;i&gt;Ibid&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[75] &lt;i&gt;Id&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[76] Charles Arthur, &lt;i&gt;Facebook spammers make $200m just posting links, researchers say, &lt;/i&gt;The Guardian, 28&lt;sup&gt;th&lt;/sup&gt; August 2013, 	http://www.theguardian.com/technology/2013/aug/28/facebook-spam-202-million-italian-research (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May, 2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[77] Evangelos Moustakas, C. Ranganathan and Penny Duquenoy,	&lt;i&gt;Combating Spam Through Legislation: A Comparative Analysis Of US And European Approaches, &lt;/i&gt;available at http://ceas.cc/2005/papers/146.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[78] Carolyn Duffy Marsan, &lt;i&gt;CAN-SPAM: What went wrong?, &lt;/i&gt;6&lt;sup&gt;th&lt;/sup&gt; October 2008, available at&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;http://www.networkworld.com/article/2276180/security/can-spam--what-went-wrong-.html (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May, 2015)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions'&gt;https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rakshanda Deka</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-07-02T16:21:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/five-nations-one-future">
    <title>Five Nations, One Future?</title>
    <link>https://cis-india.org/internet-governance/news/five-nations-one-future</link>
    <description>
        &lt;b&gt;The Silicon Valley model for success - what Bangalore, Chile, London and Rwanda want to learn from California. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;When it comes to IT, Silicon Valley is viewed worldwide as the model for success. What can we learn from the drivers of innovation in California? We investigate in Bangalore, Chile, London and Rwanda. The article by Bjorn Ludtke, Ellen Lee, Jaideep Sen, Gwendolyn Ledger, David Nicholson, and Jesko Johannsen was published by Voestalpine. Sunil Abraham was quoted extensively. &lt;a href="https://cis-india.org/internet-governance/blog/five-nations-one-future.pdf" class="external-link"&gt;Read more about the article&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/five-nations-one-future'&gt;https://cis-india.org/internet-governance/news/five-nations-one-future&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-07-18T02:34:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts">
    <title>Most emerging firms low on cyber security: Experts</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts</link>
    <description>
        &lt;b&gt;When Pavitra Badrinath saw that the upgrade to a shopping application on her smartphone asked access to her contacts and messages, she decided against it. "Laws on privacy are not clear in India. So I am doing what I can to protect my information," the 26-year-old technology firm employee said.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Malavika Murali and Payal Ganguly was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2015-06-24/news/63783278_1_cyber-security-data-security-council-google-india"&gt;published in the Economic Times&lt;/a&gt; on June 24, 2015. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Are users taking a risk by allowing applications to gain access to personal data shadowed by an upgrade? "Most definitely ," said Bikash Barai, cofounder and chief executive of security firm iViz Security .&lt;br /&gt;&lt;br /&gt;With at least 10 alleged breaches and hacks into the databases of startups such as Ola and Gaana this year, the alarm bells are going off.&lt;br /&gt;&lt;br /&gt;Experts warn that emerging businesses are lax with security frameworks, which is especially worrying as millions more Indians are shopping online, including on their phones, exposing crucial personal and financial data to fraud.&lt;br /&gt;&lt;br /&gt;More than 70 per cent of Indian companies are under-prepared when it comes to cyber security, according to a report by CISO Platform, a social platform for security experts where Barai is chief adviser.&lt;br /&gt;&lt;br /&gt;India's largest cab-hailing company, Ola denied hackers' claims in an email response to ET, stating that its data were not compromised.&lt;br /&gt;&lt;br /&gt;Music service Gaana.com, in response to being hacked by a person in Pakistan calling himself MakMan, said it had strengthened its security team and offerings in recent weeks. "In addition, we are working on a `bug bounty' program, which will allow individuals to point out any potential vulnerability in a safe way," said Pawan Agarwal, business head at Gaana.com.&lt;br /&gt;&lt;br /&gt;According to Google India, the number of online shoppers is expected to cross 100 million by the end of next year, from 35 million ear, from 35 million n 2014. But lack of roust regulations and ata privacy laws as ell as the fragmentd nature of the starup ecosystem, do not llow much scope for esearch on cyber seurity , said experts."Under the Indian "Under the Indian regime, there are no self-regulatory mechanisms for putting out breach notifications," said Sunil Abraham, executive director of the Centre for Internet and Society. "The numbers available with a central body like Data Security Council of India will be a gross underestimation of the cases of breach."&lt;br /&gt;&lt;br /&gt;"Most of the startups in India want to do everything in-house. This can lead to a potential compromise or lack of expertise on the security front, even if it is made priority," said Harshit Agarwal, founder and chief executive of Singapore-based Appknox, which provides security services to Paytm, Freecharge and Myntra among other clients.&lt;br /&gt;&lt;br /&gt;Jabong founder and managing director Praveen Sinha said the online fashion retailer spends 15-20 per cent of its revenue on cyber security. But other startups contended that budgets and teams sizes are not accurate indicators of security preparedness.&lt;br /&gt;&lt;br /&gt;"We do not work with any external security firms as we have realised that the average report is as good as our internal team can make," said Mukesh Singh, chief executive officer of online grocer ZopNow.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts'&gt;https://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-06-29T16:02:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-june-24-2015-neha-alawadhi-govts-stand-on-internet-governance-draws-applause-from-civil-society-organisations">
    <title>Government's stand on internet governance draws applause from civil society organisations</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-june-24-2015-neha-alawadhi-govts-stand-on-internet-governance-draws-applause-from-civil-society-organisations</link>
    <description>
        &lt;b&gt;India's decision to support the multistakeholder model of internet governance has drawn mostly applause from civil society organisations and individuals who have been following the issue, even as they cautioned that implementation will determine the success of the model.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Neha Alawadhi was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2015-06-24/news/63782695_1_internet-governance-icann-multistakeholder-model"&gt;published in Economic Times&lt;/a&gt; on June 24, 2015. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A day after communications and IT minister &lt;a href="http://economictimes.indiatimes.com/topic/Ravi%20Shankar%20Prasad"&gt;Ravi Shankar Prasad&lt;/a&gt; said India will support the multistakeholder model, reactions poured in  on Tuesday, largely hailing the move to break the longstanding status  quo on the issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"What matters now is how the approach articulated by the minister is  translated into coordinated action across various fora, including  ICANN, BRICS, and perhaps most crucially the UN WSIS+10 Review Process,  which culminates in the meeting of the UN General Assembly in December  2015," said Vinay Kesari, a lawyer specialising in ICT and internet  governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not just at international fora, India also needs to  figure out tistakeholder stand within the country, said Arun Mohan  Sukumar, senior fellow at the Centre for Communication Governance,  National Law University. "Multistakeholderism is very attractive in  principle but, as the &lt;a href="http://economictimes.indiatimes.com/topic/ICANN"&gt;ICANN&lt;/a&gt; experience shows, it is susceptible to concerns like elite capture and lack of accountability to the general public," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasad made the announcement in a video address during the opening ceremony of the &lt;a href="http://economictimes.indiatimes.com/topic/Internet%20Corporation%20for%20Assigned%20Names"&gt;Internet Corporation for Assigned Names&lt;/a&gt; and Numbers (ICANN)'s 53rd public meeting in Buenos Aires on Monday.  ICANN manages the Domain Name System (DNS), which helps organise the  internet with the allotment of domain names such as .com, .org and .net  and has often come under the scanner for not being transparent enough.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The multistakeholder model involves all stakeholders such as  businesses, civil society, governments, research institutions and  non-governmental organisations in the dialogue, decision-making and  implementation of policymaking and governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The external  affairs ministry, telecom department and the department of electronics  and IT have long held divergent views on issues of internet governance,  with no clear stand being made at international platforms. While  welcoming the announcement, Sunil Abraham, executive director at the  Centre for Internet and Society, said the minister could have explained  in greater detail, especially the ongoing transition of internet  governance control from US government to a multistakeholder model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"He also spoke about government being responsible for security and  human rights over the internet, which adds to the confusion over whether  India will really let the internet be a fair and free medium," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasanth Sugathan, counsel for the Software Freedom Law Centre, said  the government should seek the views of other stakeholders as well on  the issue. "When you talk of multistakeholderism, it should not be only  at an international level. It should also happen at a national level.  The government should have other parties also contributing to issues of  internet governance," he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-june-24-2015-neha-alawadhi-govts-stand-on-internet-governance-draws-applause-from-civil-society-organisations'&gt;https://cis-india.org/internet-governance/news/economic-times-june-24-2015-neha-alawadhi-govts-stand-on-internet-governance-draws-applause-from-civil-society-organisations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-06-29T15:40:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency">
    <title>The generation of e-Emergency</title>
    <link>https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency</link>
    <description>
        &lt;b&gt;The next generation of censorship technology is expected to be ‘real-time content manipulation’ through ISPs and Internet companies. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/pL8oDtSth36hkoDvIjILLJ/The-generation-of-eEmergency.html"&gt;Livemint&lt;/a&gt; on June 22, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Censorship during the Emergency in the 1970s was done by clamping down on the media by intimidating editors and journalists, and installing a human censor at every news agency with a red pencil. In the age of both multicast and broadcast media, thought and speech control is more expensive and complicated but still possible to do. What governments across the world have realized is that traditional web censorship methods such as filtering and blocking are not effective because of circumvention technologies and the Streisand effect (a phenomenon in which an attempt to hide or censor information proves to be counter-productive). New methods to manipulate the networked public sphere have evolved accordingly. India, despite claims to the contrary, still does not have the budget and technological wherewithal to successfully pull off some of the censorship and surveillance techniques described below, but thanks to Moore’s law and to the global lack of export controls on such technologies, this might change in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, mass technological-enabled surveillance resulting in self-censorship and self-policing. The coordinated monitoring of Occupy protests in the US by the Department of Homeland Security, the Federal Bureau of Investigation (FBI) counter-terrorism units, police departments and the private sector showcased the bleeding edge of surveillance technologies. Stingrays or IMSI catchers are fake mobile towers that were used to monitor calls, Internet traffic and SMSes. Footage from helicopters, drones, high-res on-ground cameras and the existing CCTV network was matched with images available on social media using facial recognition technology. This intelligence was combined with data from the global-scale Internet surveillance that we know about thanks to the National Security Agency (NSA) whistle-blower &lt;a class="external-link" href="http://www.livemint.com/Search/Link/Keyword/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt;, and what is dubbed “open source intelligence” gleaned by monitoring public social media activity; and then used by police during visits to intimidate activists and scare them off the protests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, mass technological gaming—again, according to documents released  by Snowden, the British spy agency, GCHQ (Government Communications  Headquarters), has developed tools to seed false information online,  cast fake votes in web polls, inflate visitor counts on sites,  automatically discover content on video-hosting platform and send  takedown notices, permanently disable accounts on computers, find  private photographs on Facebook, monitor Skype activity in real time and  harvest Skype contacts, prevent access to certain websites by using  peer-to-peer based distributed denial of service attacks, spoof any  email address and amplify propaganda on social media. According to &lt;i&gt;The Intercept&lt;/i&gt;,  a secret unit of GCHQ called the Joint Threat Research Intelligence  Group (JTRIG) combined technology with psychology and other social  sciences to “not only understand, but shape and control how online  activism and discourse unfolds”. The JTRIG used fake victim blog posts,  false flag operations and honey traps to discredit and manipulate  activists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third, mass human manipulation. The exact size of the Kremlin troll army  is unknown. But in an interview with Radio Liberty, St. Petersburg  blogger Marat Burkhard (who spent two months working for Internet  Research Agency) said, “there are about 40 rooms with about 20 people  sitting in each, and each person has their assignments.” The room he  worked in had each employee produce 135 comments on social media in  every 12-hour shift for a monthly remuneration of 45,000 rubles.  According to Burkhard, in order to bring a “feeling of authenticity”,  his department was divided into teams of three—one of them would be a  villain troll who would represent the voice of dissent, the other two  would be the picture troll and the link troll. The picture troll would  use images to counter the villain troll’s point of view by appealing to  emotion while the link troll would use arguments and references to  appeal to reason. In a day, the “troika” would cover 35 forums.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next generation of censorship technology is expected to be  “real-time content manipulation” through ISPs and Internet companies. We  have already seen word filters where blacklisted words or phrases are  automatically expunged. Last week, Bengaluru-based activist Thejesh GN  detected that Airtel was injecting javascript into every web page that  you download using a 3G connection. Airtel claims that it is injecting  code developed by the Israeli firm Flash Networks to monitor data usage  but the very same method can be used to make subtle personalized changes  to web content. In China, according to a paper by Tao Zhu et al titled &lt;i&gt;The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions&lt;/i&gt;,  “Weibo also sometimes makes it appear to a user that their post was  successfully posted, but other users are not able to see the post. The  poster receives no warning message in this case.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than two decades ago, John Gilmore, of Electronic Frontier  Foundation, famously said, “the Net interprets censorship as damage and  routes around it.” That was when the topology of the Internet was highly  decentralized and there were hundreds of ISPs that competed with each  other to provide access. Given the information diet of the average  netizen today, the Internet is, for all practical purposes, highly  centralized and therefore governments find it easier and easier to  control.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency'&gt;https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-06-29T16:40:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/iana-transition-stewardship-and-icann-accountability-2">
    <title>IANA Transition Stewardship &amp; ICANN Accountability (II)</title>
    <link>https://cis-india.org/internet-governance/blog/iana-transition-stewardship-and-icann-accountability-2</link>
    <description>
        &lt;b&gt;This paper is the second in a multi-part series, in which we provide an overview of submitted proposals and highlight areas of concern that will need attention moving forward. The series is a work in progress and will be updated as the processes move forward. It is up for public comments and we welcome your feedback.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The discussions and the processes established for transition plan have moved rapidly, though not fast enough—given the complicated legal and technical undertaking it is. ICG will be considering the submitted proposals and moving forward on consultations and recommendations for pending proposals. ICANN53 saw a lot of discussion on the implementation of the proposals from the numbers and protocols community, while the CWG addressed the questions related to the 2&lt;sup&gt;nd&lt;/sup&gt; draft of the names community proposal. The Protocol Parameters (IANA PLAN Working Group) submitted to ICG on 6 January 2015, while the Numbering Resources (CRISP Team) submitted on 15 January 2015. The Domain Names (CWG-Stewardship) submitted its second draft to ICG on 25 June 2015. The ICG had a face-to-face meeting in Buenos Aires and their proposal to transition the stewardship of the IANA functions is expected to be out for public comment July 31 to September 8, 2015. Parallelly, the CCWG on Enhancing ICANN Accountability offered its first set of proposals for public comment in June 2015 and organised two working sessions at ICANN'53. More recently, the CCWG met in Paris focusing on the proposed community empowerment mechanisms, emerging concerns and progress on issues so far.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Number and Protocols Proposals&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The numbering and the protocol communities have developed and approved their plans for the transition. Both communities are proposing a direct contractual relationship with ICANN, in which they have the ability to end the contract on their terms. The termination clause has seen push back from ICANN and teams involved in the negotiations have revealed that ICANN has verbally represented that they will reject any proposed agreement in which ICANN is not deemed the sole source prime contractor for IANA functions in perpetuity.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; The emerging contentious negotiations on the issue of separability i.e., the ability to change to a different IANA functions operator, is an important issue.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; As Milton Mueller points out, ICANN seems to be using these contract negotiations to undo the HYPERLINK "http://www.internetgovernance.org/2015/04/28/icann-wants-an-iana-functions-monopoly-and-its-willing-to-wreck-the-transition-process-to-get-it/#comment-40045"community process and that ICANN’s staff members are viewing themselves, rather than the formal IANA transition process shepherded by the ICG, as the final authority on the transition.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; The attempts of ICANN Staff to influence or veto ideas regarding what solutions will be acceptable to NTIA and the Congress goes beyond its mandate to facilitate the transition dialogue. The ARIN meeting&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; and the process of updating MoU with IETF which mandates supplementary SLAs&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; are examples of ICANN leveraging its status as the incumbent IANA functions operator, with which all three operational communities must negotiate, to ensure that the outcome of the IANA transition process does not threaten its control.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Names Proposal&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Recently, the CWG working on recommendations for the names related functions provided an improved 2nd draft of their earlier complex proposal which attempts to resolve the internal-external debate with a middle ground, with the creation of Post-Transition IANA (PTI). PTI a subsidiary/affiliate of the current contract-holder, ICANN, will be created and handed the IANA contract and its related technology and staff. Therefore, ICANN takes on the role of the contracting authority and PTI as the contracted party will perform the names-related IANA functions. &lt;b&gt;&lt;i&gt;Importantly, under the new proposal CWG has done away altogether with the requirement of “authorisation” to root zone changes and the reasons for this decision have not been provided.&lt;/i&gt;&lt;/b&gt; The proposal also calls for creation of a Customer Standing Committee (CSC) to continuously monitor the performance of IANA and creation a periodic review process, rooted in the community, with the ability to recommend ICANN relinquishing its role in names-related IANA functions, if necessary. A key concern area is the external oversight mechanism Multistakeholder Review Team– has been done away with. This is a significant departure from the version placed for public comment in December 2014. It is expected that clarification will be sought from the CWG on how it has factored in inputs from the first round of public comments.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Consensus around the CWG 2nd Draft&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There is a growing consensus around the model proposed—the numbers community has commented on the proposal that it does "not foresee any incompatibility between the CWG's proposal”.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; On the IANA PLAN list, members of the protocols community have also expressed willingness to accept the new arrangement to keep all the IANA functions together in PTI during the transition and view this as merely a reorganization.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; However, acceptance of the proposal is pending till clarification related to how the PTI will be set up and its legal standing and scope are provided.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Structure of PTI&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Presently, two corporate forms are being considered for the PTI, a nonprofit public benefit corporation (PBC) or a limited liability corporation (LLC), with a single member, ICANN, at its outset. Milton Mueller has advocated for the incorporation of PTI as a PBC rather than as a LLC, with its board composed of a mix of insiders and outsiders.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; He is of the view that LLC form makes the implementation of PTI much more complex and risky as the CWG would need to debate mechanisms of control for the PTI as part of the transition process. &lt;b&gt;&lt;i&gt;The choice of structure is important as it will define the limitations and responsibilities that will be placed on the PTI Board—an important and necessary accountability mechanism.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Broadly, the division of views is around selection of the Board Members that is if they should be chosen either by IANA's customers or representative groups within ICANN or solely by the Board. The degree of autonomy which the PTI has given the existing ICANN structure is also a key developing question. &lt;b&gt;&lt;i&gt;Debate on autonomy of PTI are broadly centered around two distinct views of PTI being incorporated in a different country, to prevent ICANN from slowly subsuming the organization. The other view endorsed by ICANN states that a high degree of autonomy risks creates additional bureaucracy and process for no discernible improvement in actual services.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Functional Separability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under the CWG-Stewardship draft proposal, ICANN would assume the role currently fulfilled by NTIA (overseeing the IANA function), while PTI would assume the role currently played by ICANN (the IANA functions operator). A divisive area here is that the goal of “functional separation” is defeated with PTI being structured as an “affiliate” wholly owned subsidiary, as it will be subject to management and policies of ICANN. From this view, while ICANN as the contracting party has the right of selecting future IANA functions operators, the legal and policy justification for this has not been provided. It is expected that ICANN'53 will see discussions around the PTI will focus on its composition, legal standing and applicability of the California law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Richard Hill is of the view that the details of how PTI would be set up is critical for understanding whether or not there is "real" separation between ICANN and PTI leading to the conclusion of a meaningful contract in the sense of an agreement between two separate entities.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; This functional separation and autonomy is granted by the combination of a legally binding contract, CSC oversight, periodic review and the possibility of non-renewal of the contract.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Technical and policy roles - ICANN and PTI&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The creation of PTI splits the technical and policy functions between ICANN and PTI. The ICANN Board comments on CWG HYPERLINK "http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfrIUO5F9nY4.pdf"PrHYPERLINK "http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfrIUO5F9nY4.pdf"oHYPERLINK "http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfrIUO5F9nY4.pdf"posal also confirm PTI having no policy role, nor it being intended to in the future, and that while it will have control of the budget amounts ceded to it by ICANN the funding of the PTI will be provided by ICANN as part of the ICANN budgeting process.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; &lt;b&gt;The comments from the Indian government on the proposal&lt;/b&gt; &lt;b&gt;states this as an issue of concern, as it negates ICANN's present role as a merely technical coordination body. The concerns stem from placing ICANN in the role of the perpetual contracting authority for the IANA function makes ICANN the sole venue for decisions relating to naming policy as well as the entity with sole control over the PTI under the present wholly subsidiary entity.&lt;/b&gt;&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Key areas of work related to the distinction between the PTI and ICANN policy and technical functions include addressing how the new PFI Board would be structured, what its role would be, and what the legal construction between it and ICANN. The ICANN Board too has sought some important clarifications on its relationship as a parent body including areas where the PTI is separate from ICANN and areas where CWG sees shared services as being allowable (shared office space, HR, accounting, legal, payroll). It also sought clarification on the line of reporting, duties of the PTI Directors and alignment of PTI corporate governance with that of ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Swedish government has commented that the next steps in this process would be clarification of the process for designing the PTI-IANA contract, a process to establish community consent before entering the contract, explicit mention of whom the contracting parties are and what their legal responsibilities would be in relation to it.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Internal vs External Accountability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ICANN Board, pushing for an internal model of full control of IANA Functions is of the view that a more independent PTI could somehow be "captured" and used to thwart the policies developed by ICANN. However, others have pointed out that under proposed structure PTI has strong ties to ICANN community that implements the policies developed by ICANN.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; With no funding and no authority other than as a contractor of ICANN, if PTI is acting in a manner contrary to its contract it would be held in breach and could be replaced under the proposal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even so, as the Indian government has pointHYPERLINK "http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfJGK6yVohdU.pdf"edHYPERLINK "http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfJGK6yVohdU.pdf" out from the point of view of institutional architecture and accountability, this model is materially worse off than the status quo.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposed PTI and ICANN relationship places complete reliance on internal accountability mechanisms within ICANN, which is not a prudent institutional design. &lt;b&gt;&lt;i&gt;The Indian government anticipates a situation where, in the event there is customer/ stakeholder dissatisfaction with ICANN’s role in naming policy development, there would be no mechanism to change the entity which fulfils this role. &lt;/i&gt;&lt;/b&gt;They feel that the earlier proposal for the creation of a Contract Co, a lightweight entity with the sole purpose of being the repository of contracting authority, and award contracts including the IANA Functions Contract provided a much more effective mechanism for external accountability. While the numbers and protocol communities have proposed a severable contractual relationship with ICANN for the performance of its SLAs no such mechanism exists with respect to ICANN's role in policy development for names.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Checks and Balances&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under the current proposal the Customer Standing Committee (CSC) has the role, of constantly reviewing the technical aspects of the naming function as performed by PTI. This, combined with the proposed periodic IANA Function Review (IFR), would act as a check on the PTI. The current draft proposal does not specify what will be the consequence of an unfavourable IANA Functions Review.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some other areas of focus going forward relate to the IFR team inclusion in ICANN bylaws along the lines of the AOC established in 2009.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; Also, ensuring the IFR team clarifies the scope of separability. The circumstances and procedures in place for pulling the IANA contract away if it has been established that ICANN is not fulfilling it contractual agreements. This will be a key accountability mechanism and deterrent for ICANN controlling the exercise of its influence.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;CCWG Accountability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Work Stream (WS1)&lt;/b&gt;: Responsible for drafting a mechanism for enhancing ICANN accountability, which must be in place before the IANA stewardship transition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Work Stream (WS2)&lt;/b&gt;: Addressing long term accountability topics which may extend beyond the IANA Stewardship Transition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IANA transition was recognized to be dependent on ICANN’s wider accountability, and this has exposed the trust issues between community and leadership and the proposal must be viewed in this context. The CCWG Draft Proposal attempts 4 significant new undertakings:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A. Restating ICANN’s Mission, Commitments, and Core Values, and placing those into the ICANN Bylaws. The CCWG has recommended that some segments of the Affirmation of Commitments (AOC)– a contract on operating principles agreed upon between ICANN and the United States government – be absorbed into the Corporation’s bylaws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;B. Establishing certain bylaws as “Fundamental Bylaws” &lt;b&gt;that cannot be altered by the ICANN&lt;/b&gt; Board acting unilaterally, but over which stakeholders have prior approval rights;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;C. Creating a &lt;b&gt;formal “membership” structure for ICANN&lt;/b&gt;, along with “community empowerment mechanisms”. Some of the community empowerment mechanisms including (a) remove individual Board members, (b) recall the entire Board, (c) veto or approve changes to the ICANN Bylaws, Mission Statement, Commitments, and Core Values; and (d) to veto Board decisions on ICANN’s Strategic Plan and its budget;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;D. &lt;b&gt;Enhancing and strengthening ICANN's Independent Review Process (IRP)&lt;/b&gt; by creating a standing IRP Panel empowered to review actions taken by the corporation for compliance both with stated procedures and with the Bylaws, and to issue decisions that are binding upon the ICANN Board.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The key questions likely to be raised at ICANN 53 on several of these proposals will likely concern how these empowerment mechanisms affect the “legal nature” of the community.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Membership and Accountability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At the heart of the distrust between the ICANN Board and the community is the question of membership. ICANN as a corporation is a private sector body that is largely unregulated, with no natural competitors, cash-rich and directly or indirectly supports many of its participants and other Internet governance processes. Without effective accountability and transparency mechanisms, the opportunities for distortion, even corruption, are manifold. In such an environment, placing limitations on the Board’s power is critical to invoke trust. Three keys areas of accountability related to the Board include: no mechanisms for recall of individual board directors; the board’s ability to amend the company’s constitution (its bylaws), and the track record of board reconsideration requests.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With no membership, ICANN’s directors represent the end of the line in terms of accountability. While there is a formal mechanism to review board decisions, the review is conducted by a subset of the same people. The CCWG’s proposal to create SOs/ACs as unincorporated “members” with Articles of Association has met with a lot of discussion, especially in the Governmental Advisory Council (GAC).&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; The GAC has posed several critical questions on this set up, some of which are listed here:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Can a &lt;b&gt;&lt;i&gt;legal person created and acting on behalf of the GAC become a member of ICANN&lt;/i&gt;&lt;/b&gt;, even though the GAC does not appoint Board members?&lt;/li&gt;
&lt;li&gt;If GAC &lt;b&gt;&lt;i&gt;does not wish to become a member, how could it still be associated to the exercise of the 6 (community empowerment mechanisms) powers&lt;/i&gt;&lt;/b&gt;?&lt;/li&gt;
&lt;li&gt;It is still unclear what the &lt;b&gt;&lt;i&gt;liability of members &lt;/i&gt;&lt;/b&gt;of future “community empowered structures” would be.&lt;/li&gt;
&lt;li&gt;What are the &lt;b&gt;&lt;i&gt;legal implications on rights, obligations and liabilities of an informal group like the GAC&lt;/i&gt;&lt;/b&gt; creating an unincorporated association (UA) and taking decisions as such UA, from substantial (like exercising the community powers) to clerical (appointing its board, deciding on its financing) and whether there are implications when the members of such an UA are Governments? &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Any proposal to strengthen accountability of ICANN needs to provide for membership so that there is ability to remove directors, creates financial accountability by receiving financial accounts and appointing editors and can check the ICANN’s board power to change bylaws without recourse to a higher authority.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Constitutional Undertaking&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;David Post and Danielle Kehl have pointed out that the CCWG correctly identifies the task it is undertaking – to ensure that ICANN’s power is adequately and appropriately constrained – as a “constitutional” one.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; Their interpretation is based on the view that even if ICANN is not a true “sovereign,” it can usefully be viewed as one for the purpose of evaluating the sufficiency of checks on its power. Subsequently, the CCWG Draft Proposal, and ICANN’s accountability post-transition, can be understood and analyzed as a constitutional exercise, and that the transition proposal should meet constitutional criteria. Further, from this view the CCWG draft reflects the reformulation of ICANN around the broadly agreed upon constitutional criteria that should be addressed. These include:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;A clear enumeration of the powers that the corporation can exercise, and a clear demarcation of those that it cannot exercise.&lt;/li&gt;
&lt;li&gt;A division of the institution’s powers, to avoid concentrating all powers in one set of hands, and as a means of providing internal checks on its exercise.&lt;/li&gt;
&lt;li&gt;Mechanism(s) to enforce the constraints of (1) and (2) in the form of meaningful remedies for violations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Their comments reflect that they support CCWG in their approach and progress made in designing a durable accountability structure for a post-transition ICANN. However, they have stressed that a number of important omissions and/or clarifications need to be addressed before they can be confident that these mechanisms will, in practice, accomplish their mission. One such suggestion relates to ICANN’s policy role and PTI technical role separability. Given ICANN’s position in the DNS hierarchy gives it the power to impose its policies, via the web of contracts with and among registries, registrars, and registrants, on all users of the DNS, a &lt;b&gt;&lt;i&gt;constitutional balance for the DNS must preserve and strengthen the separation between DNS policy-making and policy-implementation&lt;/i&gt;&lt;/b&gt;. Importantly, they have clarified that even if ICANN has the power to choose what policies are in the best interest of the community it is not free to impose them on the community. ICANN's role is a critical though narrow one: to organize and coordinate the activities of that stakeholder community – which it does through its various Supporting Organizations, Advisory Committees, and Constituencies – and to implement the consensus policies that emerge from that process. Their comments on the CCWG draft call for stating this clarification explicitly and institutionalizing separability to be guided by this critical safeguard against ICANN’s abuse of its power over the DNS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An &lt;b&gt;&lt;i&gt;effective implementation of this limitation will help clarify the role mechanisms being proposed such as the PTI and is critical for creating sustainable mechanisms, post-transition&lt;/i&gt;&lt;/b&gt;. More importantly, &lt;b&gt;&lt;i&gt;clarifying ICANN’s mission&lt;/i&gt;&lt;/b&gt; would ensure that in the post-transition &lt;b&gt;&lt;i&gt;communities could challenge its decisions&lt;/i&gt;&lt;/b&gt; on the basis that it is not pertaining to the role outlined or based on strengthening the stability and security of the DNS. Presently, it is very unclear where ICANN can interfere in terms of policymaking and implementation.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Other Issues&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Other issues expected to be raised in the context of ICANN's overall accountabiltiy will likey concern the following:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Strengthening financial transparency and oversight&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Given the rapid growth of the global domain name industry, one would imagine that ICANN is held up to the same standard of accountability as laid down in the right to information mechanisms countries such as India. CIS has been raising this issue for a while and has managed to received the list of ICANN’s current domain name revenues.&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By sharing this information, ICANN has shown itself responsive to repeated requests for transparency however, the shared revenue data is only for the fiscal year ending June 2014, and historical revenue data is still not publicly available. Neither is a detailed list (current and historical) of ICANN’s expenditures publicly available. Accountability mechanisms and discussions must seek that ICANN provide the necessary information during its regular Quarterly Stakeholder Reports, as well as on its website.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Strengthening transparency&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A key area of concern is ICANN's unchecked influence and growing role as an institution in the IG space. Seen in the light of the impending transition, the transparency concerns gain significance and given ICANN's vocal interests in maintaining the status quo of its role in DNS Management. While financial statements (current and historic) are public and community discussions are generally open, the complexity of the contractual arrangements in place tracking the financial reserves available to ICANN through these processes are not sufficient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, ICANN as a monopoly is presently constrained only by the NTIA review and few internal mechanisms like the Documentary Information Disclosure Policy (DIDP)&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;, Ombudsman&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;, Reconsideration and Independent Review&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; and the Accountability and Transparency Review (ATRT)&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;. These mechanisms are facing teething issues and some do not conform to the principles of natural justice. For example, a Reconsideration Request can be filed if one is aggrieved by an action of ICANN’s Board or staff. Under ICANN’s By-laws, it is the Board Governance Committee, comprising ICANN Board members, that adjudicates Reconsideration Requests.&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Responses to the DIDP requests filed by CIS reveal that the mechanism in its current form, is not sufficient to provide the transparency necessary for ICANN’s functioning. For instance, in the response to DIDP pertaining to the Ombudsman Requests&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;, ICANN cites confidentiality as a reason to decline providing information as making Ombudsman Requests public would violate ICANN Bylaws, toppling the independence and integrity of the Ombudsman. Over December ’14 and January ’15, CIS sent 10 DIDP requests to ICANN with an aim was to test and encourage discussions on transparency from ICANN. We have received responses for 9 of our requests, and in 7 of those responses ICANN provides very little new information and moving forward we would stress the improvements of existing mechanisms along with introduction of new oversight and reporting parameters towards facilitating the transition process.&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt;John Sweeting and others, 'CRISP Process Overview' (ARIN 35, 2015) &lt;a href="https://regmedia.co.uk/2015/04/30/crisp_panel.pdf"&gt;https://regmedia.co.uk/2015/04/30/crisp_panel.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt;Andrew Sullivan, &lt;i&gt;[Ianaplan] Update On IANA Transition &amp;amp; Negotiations With ICANN&lt;/i&gt; (2015), Email &lt;a href="http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&gt;http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt;Milton Mueller, ‘ICANN WANTS AN IANA FUNCTIONS MONOPOLY – WILL IT WRECK THE TRANSITION PROCESS TO GET IT?’ (&lt;i&gt;Internet Governance Project&lt;/i&gt;, 28 April 2015) http://www.internetgovernance.org/2015/04/28/icann-wants-an-iana-functions-monopoly-and-its-willing-to-wreck-the-transition-process-to-get-it/#comment-40045&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt;Tony Smith, 'Event Wrap: ICANN 52' (&lt;i&gt;APNIC Blog&lt;/i&gt;, 20 February 2015) &lt;a href="http://blog.apnic.net/2015/02/20/event-wrap-icann-52/"&gt;http://blog.apnic.net/2015/02/20/event-wrap-icann-52/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt;Internet Engineering Task Force, 'IPROC – IETF Protocol Registries Oversight Committee' (2015) &lt;a href="https://www.ietf.org/iana/iproc.html"&gt;https://www.ietf.org/iana/iproc.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt;Axel Pawlik, &lt;i&gt;Numbers Community Proposal Contact Points With CWG’S Draft IANA Stewardship Transition Proposal&lt;/i&gt; (2015), Email &lt;a href="http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00003.html"&gt;http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00003.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt;Jari Arkko, &lt;i&gt;Re: [Ianaplan] CWG Draft And Its Impact On The IETF&lt;/i&gt; (2015), Email &lt;a href="http://www.ietf.org/mail-archive/web/ianaplan/current/msg01843.html"&gt;http://www.ietf.org/mail-archive/web/ianaplan/current/msg01843.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt;Milton Mueller, &lt;i&gt;Comments Of The Internet Governance Project&lt;/i&gt; (2015), Email &lt;a href="http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00021.html"&gt;http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00021.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt;Richard Hill, &lt;i&gt;Initial Comments On CWG-Stewardship Draft Proposal&lt;/i&gt; (2015), Email &lt;a href="http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00000.html"&gt;http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00000.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt;Brenden Kuerbis, 'Why The Post-Transition IANA Should Be A Nonprofit Public Benefit Corporation' (&lt;i&gt;Internet Governance Project&lt;/i&gt;, 18 May 2015) &lt;a href="http://www.internetgovernance.org/2015/05/18/why-the-post-transition-iana-should-be-a-nonp"&gt;http://www.internetgovernance.org/2015/05/18/why-the-post-transition-iana-should-be-a-nonp&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt;&lt;i&gt;ICANN Board Comments On 2Nd Draft Proposal Of The Cross Community Working Group To Develop An IANA Stewardship Transition Proposal On Naming Related Functions&lt;/i&gt; (20 May 2015) &lt;a href="http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfrIUO5F9nY4.pdf"&gt;http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfrIUO5F9nY4.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt;&lt;i&gt;Comments Of Government Of India On The ‘2nd Draft Proposal Of The Cross Community Working Group To Develop An IANA Stewardship Transition Proposal On Naming Related Functions’&lt;/i&gt; (2015) &lt;a href="http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfJGK6yVohdU.pdf"&gt;http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfJGK6yVohdU.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt;Anders Hektor, &lt;i&gt;Sweden Comments To CWG-Stewardship&lt;/i&gt; (2015), Email &lt;a href="http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00016.html"&gt;http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00016.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt;Brenden Kuerbis, 'Why The Post-Transition IANA Should Be A Nonprofit Public Benefit Corporation |' (&lt;i&gt;Internet Governance Project&lt;/i&gt;, 18 May 2015) &lt;a href="http://www.internetgovernance.org/2015/05/18/why-the-post-transition-iana-should-be-a-nonprofit-public-benefit-corporation/"&gt;http://www.internetgovernance.org/2015/05/18/why-the-post-transition-iana-should-be-a-nonprofit-public-benefit-corporation/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt;&lt;i&gt;Comments Of Government Of India On The ‘2nd Draft Proposal Of The Cross Community Working Group To Develop An IANA Stewardship Transition Proposal On Naming Related Functions’&lt;/i&gt; (2015) &lt;a href="http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfJGK6yVohdU.pdf"&gt;http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfJGK6yVohdU.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt;Kieren McCarthy, 'Internet Kingmakers Drop Ego, Devise Future Of DNS, IP Addys Etc' (&lt;i&gt;The Register&lt;/i&gt;, 24 April 2015) &lt;a href="http://www.theregister.co.uk/2015/04/24/internet_kingmakers_drop_ego_devise_future_of_the_internet/"&gt;http://www.theregister.co.uk/2015/04/24/internet_kingmakers_drop_ego_devise_future_of_the_internet/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt;Emily Taylor, &lt;i&gt;ICANN: Bridging The Trust Gap&lt;/i&gt; (Paper Series No. 9, Global Commission on Internet Governance March 2015) &lt;a href="https://regmedia.co.uk/2015/04/02/gcig_paper_no9-iana.pdf"&gt;https://regmedia.co.uk/2015/04/02/gcig_paper_no9-iana.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt;Milton Mueller, 'Power Shift: The CCWG’S ICANN Membership Proposal' (&lt;i&gt;Internet Governance Project&lt;/i&gt;, 4 June 2015) &lt;a href="http://www.internetgovernance.org/2015/06/04/power-shift-the-ccwgs-icann-membership-proposal/"&gt;http://www.internetgovernance.org/2015/06/04/power-shift-the-ccwgs-icann-membership-proposal/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt;David Post, &lt;i&gt;Submission Of Comments On CCWG Draft Initial Proposal&lt;/i&gt; (2015), Email &lt;a href="http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/msg00050.html"&gt;http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/msg00050.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Hariharan, 'ICANN reveals hitherto undisclosed details of domain names revenues', 8 December, 2014 See: &lt;a href="http://cis-india.org/internet-governance/blog/cis-receives-information-on-icanns-revenues-from-domain-names-fy-2014"&gt;http://cis-india.org/internet-governance/blog/cis-receives-information-on-icanns-revenues-from-domain-names-fy-2014&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; ICANN, Documentary Information Disclosure Policy See: https://www.icann.org/resources/pages/didp-2012-02-25-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; ICANN Accountability, Role of the Ombudsman https://www.icann.org/resources/pages/accountability/ombudsman-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; ICANN Reconsideration and independent review, ICANN Bylaws, Article IV, Accountability and Review https://www.icann.org/resources/pages/reconsideration-and-independent-review-icann-bylaws-article-iv-accountability-and-review&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; ICANN Accountability and Transparency Review Final Recommendations https://www.icann.org/en/system/files/files/final-recommendations-31dec13-en.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; ICANN Bylaws Article iv, Section 2 https://www.icann.org/resources/pages/governance/bylaws-en#IV&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; ICANN Response to DIDP Ombudsman https://www.icann.org/resources/pages/20141228-1-ombudsman-2015-01-28-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Table of CIS DIDP Requests See: http://cis-india.org/internet-governance/blog/table-of-cis-didp-requests/at_download/file&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/iana-transition-stewardship-and-icann-accountability-2'&gt;https://cis-india.org/internet-governance/blog/iana-transition-stewardship-and-icann-accountability-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-07-31T15:47:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india">
    <title>DesiSec: Cybersecurity and Civil Society in India</title>
    <link>https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india</link>
    <description>
        &lt;b&gt;As part of its project on mapping cyber security actors in South Asia and South East Asia, the Centre for Internet &amp; Society conducted a series of interviews with cyber security actors. The interviews were compiled and edited into one documentary. The film produced by Purba Sarkar, edited by Aaron Joseph, and directed by Oxblood Ruffin features Malavika Jayaram, Nitin Pai, Namita Malhotra, Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Originally the idea was to do 24 interviews with an array of international experts: Technical, political, policy, legal, and activist. The project was initiated at the University of Toronto and over time a possibility emerged. Why not shape these interviews into a documentary about cybersecurity and civil society? And why not focus on the world’s largest democracy, India? Whether in India or the rest of the world there are several issues that are fundamental to life online: Privacy, surveillance, anonymity and, free speech. DesiSec includes all of these, and it examines the legal frameworks that shape how India deals with these  challenges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the time it was shot till the final edit there has only been one change in the juridical topography: the dreaded 66A of the IT Act has been struck down. Otherwise, all else is in tact. DesiSec was produced by Purba Sarkar, shot and edited by Aaron Joseph, and directed by Oxblood Ruffin. It took our team from Bangalore to Delhi and, Dharamsala. We had the honour of interviewing: Malavika Jayaram, Nitin Pai, Namita Malhotra, Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad. Everyone brought something special to the discussion and we are grateful for their insights. Also, we are particularly pleased to include the music of Charanjit Singh for the intro/outro of DesiSec. Mr. Singh is the inventor of acid house music, predating the Wikipedia entry for that category by five years. Someone should correct that.&lt;/p&gt;
&lt;p&gt;DesiSec is released under the Creative Commons License Attribution 3.0 Unported (CC by 3.0). You can watch it on Vimeo: &lt;a href="https://vimeo.com/123722680" target="_blank"&gt;https://vimeo.com/123722680&lt;/a&gt; or download it legally and free of charge via torrent. Feel free to show, remix, and share with your friends. And let us know what you think!&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/8N3JUqRRvys" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india'&gt;https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Laird Brown</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2015-06-29T16:25:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1">
    <title>IANA Transition Stewardship &amp; ICANN Accountability (I)</title>
    <link>https://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1</link>
    <description>
        &lt;b&gt;This paper is the first in a multi-part series, in which we provide a background to the IANA transition and updates on the ensuing processes. An attempt to familiarise people with the issues at stake, this paper will be followed by a second piece that provides an overview of submitted proposals and areas of concern that will need attention moving forward. The series is a work in progress and will be updated as the processes move forward. It is up for public comments and we welcome your feedback.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In developing these papers we have been guided by Kieren McCarthy's writings in The Register, Milton Mueller writings on the Internet Governance Project, Rafik Dammak emails on the mailings lists, the constitutional undertaking argument made in the policy paper authored by Danielle Kehl &amp;amp; David Post for New America Foundation.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h3 style="text-align: justify; "&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The 53rd ICANN&lt;/b&gt; conference in Buenos Aires was pivotal as it marked the last general meeting before the IANA transition deadline on 30th September, 2015. The multistakeholder process initiated seeks communities to develop transition proposals to be consolidated and reviewed by the the IANA Stewardship Transition Coordination Group (ICG). The names, number and protocol communities convened at the conference to finalize the components of the transition proposal and to determine the way forward on the transition proposals. The Protocol Parameters (IANA PLAN Working Group) submitted to ICG on 6 January 2015, while the Numbering Resources (CRISP Team) submitted on 15 January 2015. The Domain Names (CWG-Stewardship) submitted its second draft to ICG on 25 June 2015. The ICG had a face-to-face meeting in Buenos Aires and their proposal to transition the stewardship of the IANA functions is expected to be out for public comment July 31 to September 8, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parallelly, the CCWG on Enhancing ICANN Accountability offered its first set of proposals for public comment in June 2015 and organised two working sessions at ICANN'53. More recently, the CCWG met in Paris focusing on the proposed community empowerment mechanisms, emerging concerns and progress on issues so far. &lt;b&gt;&lt;i&gt;CIS reserves its comments to the CCWG till the second round of comments expected in July.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This working paper explains the IANA Transition, its history and relevance to management of the Internet. It provides an update on the processes so far, including the submissions by the Indian government and highlights areas of concern that need attention going forward.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How is IANA Transition linked to DNS Management?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The IANA transition presents a significant opportunity for stakeholders to influence the management and governance of the global network. The Domain Name System (DNS), which allows users to locate websites by translating the domain name with corresponding Internet Protocol address, is critical to the functioning of the Internet. The DNS rests on the effective coordination of three critical functions—the allocation of IP Addresses (the numbers function), domain name allocation (the naming function), and protocol parameters standardisation (the protocols function).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;History of the ICANN-IANA Functions contract&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Initially, these key functions were performed by individuals and public and private institutions. They either came together voluntarily or through a series of agreements and contracts brokered by the Department of Commerce’s National Telecommunications and Information Administration (NTIA) and funded by the US government. With the Internet's rapid expansion and in response to concerns raised about its increasing commercialization as a resource, a need was felt for the creation of a formal institution that would take over DNS management. This is how ICANN, a California-based private, non-profit technical coordination body, came at the helm of DNS and related issues. Since then, ICANN has been performing the Internet Assigned Numbers Authority (IANA) functions under a contract with the NTIA, and is commonly referred to as the IANA Functions Operator.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;IANA Functions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In February 2000, the NTIA entered into the first stand-alone IANA Functions HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/sf_26_pg_1-2-final_award_and_sacs.pdf"contract&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; with ICANN as the Operator. While the contractual obligations have evolved over time, these are largely administrative and technical in nature including:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(1) the coordination of the assignment of technical Internet protocol parameters;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(2) the allocation of Internet numbering resources; and&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(3) the administration of certain responsibilities associated with the Internet DNS root zone management;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(4) other services related to the management of the ARPA and top-level domains.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN has been performing the IANA functions under this oversight, primarily as NTIA did not want to let go of complete control of DNS management. Another reason was to ensure NTIA's leverage in ensuring that ICANN’s commitments, conditional to its incorporation, were being met and that it was sticking to its administrative and technical role.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Root Zone Management—Entities and Functions Involved&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;NTIA' s involvement has been controversial particularly in reference to the Root Zone Management function, which allows allows for changes to the&lt;a href="http://www.internetsociety.org/sites/default/files/The%20Internet%20Domain%20Name%20System%20Explained%20for%20Non-Experts%20(ENGLISH).pdf"&gt; &lt;/a&gt;&lt;a href="http://www.internetsociety.org/sites/default/files/The%20Internet%20Domain%20Name%20System%20Explained%20for%20Non-Experts%20(ENGLISH).pdf"&gt;HYPERLINK "http://www.internetsociety.org/sites/default/files/The Internet Domain Name System Explained for Non-Experts (ENGLISH).pdf"&lt;/a&gt;highest level of the DNS namespace&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; by updating the databases that represent that namespace. DNS namespace is defined to be the set of names known as top-level domain names or TLDs which may be at the country level (ccTLDs or generic (gTLDs). This&lt;a href="https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf"&gt; &lt;/a&gt;&lt;a href="https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf"&gt;HYPERLINK "https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf"&lt;/a&gt;function to maintain the Root was split into two parts&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;—with two separate procurements and two separate contracts. The operational contract for the Primary (“A”) Root Server was awarded to VeriSign, the IANA Functions Contract—was awarded to ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These contracts created contractual obligations for ICANN as IANA Root Zone Management Function Operator, in co-operation with Verisign as the Root Zone Maintainer and NTIA as the Root Zone Administrator whose authorisation is explicitly required for any requests to be implemented in the root zone. Under this contract, ICANN had responsibility for the technical functions for all three communities under the IANA Functions contract.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN also had policy making functions for the names community such as developing&lt;a href="https://www.iana.org/domains/root/files"&gt; &lt;/a&gt;&lt;a href="https://www.iana.org/domains/root/files"&gt;HYPERLINK "https://www.iana.org/domains/root/files"&lt;/a&gt;rules and procedures and policies under &lt;a href="https://www.iana.org/domains/root/files"&gt;HYPERLINK "https://www.iana.org/domains/root/files"&lt;/a&gt;which any changes to the Root Zone File&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; were to be proposed, including the policies for adding new TLDs to the system. The policy making of numbers and protocols is with IETF and RIRs respectively.&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/ntias_role_root_zone_management_12162014.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/ntias_role_root_zone_management_12162014.pdf"&gt;HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/ntias_role_root_zone_management_12162014.pdf"&lt;/a&gt;NTIA role in root zone management&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; is clerical and judgment free with regards to content. It authorizes implementation of requests after verifying whether procedures and policies are being followed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This contract was subject to extension by mutual agreement and failure of complying with predefined commitments could result in the re-opening of the contract to another entity through a Request For Proposal (RFP). In fact, in 2011&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt;HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt;NTIA issued a RFP pursuant to ICANN&lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt;HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt;'&lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt;HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&lt;/a&gt;s Conflict of Interest Policy.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why is this oversight needed?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The role of the Administrator becomes critical for ensuring the security and operation of the Internet with the Root Zone serving as the directory of critical resources. In December 2014,&lt;a href="http://www.theregister.co.uk/2015/04/30/confidential_information_exposed_over_300_times_in_icann_security_snafu/"&gt; &lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/04/30/confidential_information_exposed_over_300_times_in_icann_security_snafu/"&gt;HYPERLINK "http://www.theregister.co.uk/2015/04/30/confidential_information_exposed_over_300_times_in_icann_security_snafu/"&lt;/a&gt;a report revealed 300 incidents of internal security breaches&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; some of which were related to the Centralized Zone Data System (CZDS) – where the internet core root zone files are mirrored and the WHOIS portal. In view of the IANA transition and given ICANN's critical role in maintaining the Internet infrastructure, the question which arises is if NTIA will let go of its Administrator role then which body should succeed it?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Transition announcement and launch of process&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On 14 March 2014, the NTIA &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;HYPERLINK "http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&lt;/a&gt;announced&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; “&lt;i&gt;its intent to transition key Internet domain name functions to the global multistakeholder community”&lt;/i&gt;. These key Internet domain name functions refer to the IANA functions. For this purpose, the NTIA&lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt; &lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;HYPERLINK "http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&lt;/a&gt;asked&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; the Internet Corporation for Assigned Names and Numbers (ICANN) to convene a global multistakeholder process to develop a transition proposal which has broad community support and addresses the following four principles:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Support and enhance the multistakeholder model;&lt;/li&gt;
&lt;li&gt;Maintain the security, stability, and resiliency of the Internet DNS;&lt;/li&gt;
&lt;li&gt;Meet the needs and expectation of the global customers and partners of the IANA services; and&lt;/li&gt;
&lt;li&gt;Maintain the openness of the Internet.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The transition process has been split according to the three main communities naming, numbers and protocols.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Structure of the Transition Processes&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;ICANN performs both technical functions and policy-making functions. The technical functions are known as IANA functions and these are performed by ICANN are for all three communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.&lt;i&gt; Naming function:&lt;/i&gt;&lt;/b&gt; ICANN performs &lt;b&gt;&lt;i&gt;technical and policy-making&lt;/i&gt;&lt;/b&gt; for the names community. The technical functions are known as IANA functions and the policy-making functions relates to their role in deciding whether .xxx or .sucks should be allowed amongst other issues. There are two parallel streams of work focusing on the naming community that are crucial to completing the transition. The first, &lt;b&gt;&lt;i&gt;Cross-Community Working Group to Develop an IANA Stewardship Transition Proposal on Naming Related Functions &lt;/i&gt;&lt;/b&gt;will enable NTIA to transition out of its role in the DNS. Therefore, accountability of IANA functions is the responsibility of the CWG and accountability of policy-making functions is outside its scope. CWG has submitted its second draft to the ICG.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second, &lt;b&gt;&lt;i&gt;Cross-Community Working Group on Accountability (CCWG-Accountability)&lt;/i&gt;&lt;/b&gt; is identifying necessary reforms to ICANN’s bylaws and processes to enhance the organization’s accountability to the global community post-transition. Therefore accountability of IANA functions is outside the scope of the CCWG. The CCWG on Enhancing ICANN Accountability offered its first set of proposals for public comment in June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II.&lt;i&gt; Numbers function:&lt;/i&gt;&lt;/b&gt; ICANN performs only technical functions for the numbers community. The policy-making functions for numbers are performed by RIRs. CRISP is focusing on the IANA functions for numbers and has submitted their proposal to the ICG earlier this year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III.&lt;i&gt; Protocols function:&lt;/i&gt;&lt;/b&gt; ICANN performs only technical functions for the protocols community. The policy-making functions for protocols are performed by IETF. IETF-WG is focusing on the IANA functions for protocols and has submitted their proposal to the ICG earlier this year.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Role of ICG&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;After receiving the proposals from all three communities the ICG must combine these proposals into a consolidated transition proposal and then seek public comment on all aspects of the plan. ICG’s role is crucial, because it must build a public record for the NTIA on how the three customer group submissions tie together in a manner that ensures NTIA’s&lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt; &lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;HYPERLINK "http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&lt;/a&gt;criteria&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; are met and institutionalized over the long term. Further, ICG's final submission to NTIA must include a plan to enhance ICANN’s accountability based on the CCWG-Accountability proposal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NTIA Leverage&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Reprocurement of the IANA contract is &lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;HYPERLINK "http://www.newamerica.org/oti/controlling-internet-infrastructure/"&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;essential for ICANN&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;HYPERLINK "http://www.newamerica.org/oti/controlling-internet-infrastructure/"&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;'&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;HYPERLINK "http://www.newamerica.org/oti/controlling-internet-infrastructure/"&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;s&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;HYPERLINK "http://www.newamerica.org/oti/controlling-internet-infrastructure/"&lt;/a&gt; legitimacy&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; in the DNS ecosystem and the authority to reopen the contract and in keeping the policy and operational functions separate meant that, NTIA could simply direct VeriSign to follow policy directives being issued from the entity replacing ICANN if they were deemed to be not complying. This worked as an effective leverage for ICANN complying to their commitments even if it is difficult to determine how this oversight was exercised. Perceptually, this has been interpreted as a broad overreach particularly, in the context of issues of sovereignty associated with ccTLDs and the gTLDs in their influence in shaping markets. However, it is important to bear in mind that the NTIA authorization comes after the operator, ICANN—has validated the request and does not deal with the substance of the request rather focuses merely on compliance with outlined procedure.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NTIA's role in the transition process&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;NTIA in its&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/ntia_second_quarterly_iana_report_05.07.15.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/ntia_second_quarterly_iana_report_05.07.15.pdf"&gt;HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/ntia_second_quarterly_iana_report_05.07.15.pdf"&lt;/a&gt;Second Quarterly Report to the Congress&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; for the period of February 1-March 31, 2015 has outlined some clarifications on the process ahead. It confirmed the flexibility of extending the contract or reducing the time period for renewal, based on community decision. The report also specified that the NTIA would consider a proposal only if it has been developed in consultation with the multi-stakeholder community. The transition proposal should have broad community support and does not seek replacement of NTIA's role with a government-led or intergovernmental organization solution. Further the proposal should maintain security, stability, and resiliency of the DNS, the openness of the Internet and must meet the needs and expectations of the global customers and partners of the IANA services. NTIA will only review a comprehensive plan that includes all these elements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the communities develop and ICG submits a consolidated proposal, NTIA will ensure that the proposal has been adequately “stress tested” to ensure the continued stability and security of the DNS. NTIA also added that any proposed processes or structures that have been tested to see if they work, prior to the submission—will be taken into consideration in NTIA's review. The report clarified that NTIA will review and assess the changes made or proposed to enhance ICANN’s accountability before initiating the transition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to ICANN'53, Lawrence E. Strickling Assistant Secretary for Communications and Information and NTIA Administrator HYPERLINK "http://www.ntia.doc.gov/blog/2015/stakeholder-proposals-come-together-icann-meeting-argentina"has posed some questions for consideration&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; by the communities prior to the completion of the transition plan. The issues and questions related to CCWG-Accountability draft are outlined below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Proposed &lt;b&gt;&lt;i&gt;new or modified community empowerment tools—&lt;/i&gt;&lt;/b&gt;how can the CCWG ensure that the creation of new organizations or tools will not interfere with the security and stability of the DNS during and after the transition? Do these new committees and structures &lt;b&gt;&lt;i&gt;create a different set of accountability questions&lt;/i&gt;&lt;/b&gt;?&lt;/li&gt;
&lt;li&gt;Proposed membership model for community empowerment—have &lt;b&gt;&lt;i&gt;other possible models&lt;/i&gt;&lt;/b&gt; been thoroughly examined, detailed, and documented? Has CCWG designed stress tests of the various models to address how the multistakeholder model is preserved &lt;b&gt;&lt;i&gt;if individual ICANN Supporting Organizations and Advisory Committees opt out&lt;/i&gt;&lt;/b&gt;?&lt;/li&gt;
&lt;li&gt;Has CCWG developed stress tests to address the &lt;b&gt;&lt;i&gt;potential risk of capture and barriers to entry for new participants&lt;/i&gt;&lt;/b&gt; of the various models? Further, have stress tests been considered to address &lt;b&gt;&lt;i&gt;potential unintended consequences of “operationalizing” groups&lt;/i&gt;&lt;/b&gt; that to date have been advisory in nature?&lt;/li&gt;
&lt;li&gt;Suggestions on improvements to the current Independent Review Panel (IRP) that has been criticized for its lack of accountability—how does the CCWG proposal &lt;b&gt;&lt;i&gt;analyze and remedy existing concerns with the IRP&lt;/i&gt;&lt;/b&gt;?&lt;/li&gt;
&lt;li&gt;In designing a plan for improved accountability, should the CCWG consider what exactly is the &lt;b&gt;&lt;i&gt;role of the ICANN Board within the multistakeholder model&lt;/i&gt;&lt;/b&gt;? Should the &lt;b&gt;&lt;i&gt;standard for Board action&lt;/i&gt;&lt;/b&gt; be to confirm that the community has reached consensus, and if so, what &lt;b&gt;&lt;i&gt;accountability mechanisms are needed&lt;/i&gt;&lt;/b&gt; to ensure the Board operates in accordance with that standard?&lt;/li&gt;
&lt;li&gt;The proposal is primarily focused on the accountability of the ICANN Board—has the CCWG considered &lt;b&gt;&lt;i&gt;accountability improvements&lt;/i&gt;&lt;/b&gt; that would apply to &lt;b&gt;&lt;i&gt;ICANN management and staff or to the various ICANN Supporting Organizations and Advisory Committees&lt;/i&gt;&lt;/b&gt;?&lt;/li&gt;
&lt;li&gt;NTIA has also asked the CCWG to &lt;b&gt;&lt;i&gt;build a public record and thoroughly document&lt;/i&gt;&lt;/b&gt; how the NTIA criteria have been met and will be maintained in the future.&lt;/li&gt;
&lt;li&gt;Has the CCWG identified and &lt;b&gt;&lt;i&gt;addressed issues of implementation &lt;/i&gt;&lt;/b&gt;so that the community and ICANN can implement the plan as expeditiously as possible once NTIA has reviewed and accepted it.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;NTIA has also sought community’s input on timing to finalize and implement the transition plan if it were approved. The Buenos Aires meeting became a crucial point in the transtion process as following the meeting, NTIA will need to make a determination on extending its current contract with ICANN. Keeping in mind that the community and ICANN will need to implement all work items identified by the ICG and the Working Group on Accountability as prerequisites for the transition before the contract can end, the community’s input is critical.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NTIA's legal standing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On 25th February, 2015 the US Senate Committee on Commerce, Science &amp;amp; Transportation on 'Preserving the Multi-stakeholder Model of Internet Governance'&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; heard from NTIA head Larry Strickling, Ambassador Gross and Fadi Chehade. The hearing sought to plug any existing legal loopholes, and tighten its administrative, technical, financial, public policy, and political oversight over the entire process no matter which entity takes up the NTIA function. The most important takeaway from this Congressional hearing came from Larry Strickling’s testimony&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; who stated that NTIA has no legal or statutory responsibility to manage the DNS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If &lt;b&gt;&lt;i&gt;the NTIA does not have the legal responsibility to act, and its role was temporary; on what basis is the NTIA driving the current IANA Transition process without the requisite legal authority or Congressional mandate?&lt;/i&gt;&lt;/b&gt; Historically, the NTIA oversight, effectively devised as a leverage for ICANN fulfilling its commitments have not been open to discussion.&lt;a href="http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/pdfnOquQlhsmM.pdf"&gt; &lt;/a&gt;&lt;a href="http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/pdfnOquQlhsmM.pdf"&gt;HYPERLINK "http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/pdfnOquQlhsmM.pdf"&lt;/a&gt;Concerns have also been raised&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; on the lack of engagement with non-US governments, organizations and persons prior to initiating or defining the scope and conditions of the transition. Therefore, any IANA transition plan must consider this lack of consultation, develop a multi-stakeholder process as the way forward—even if the NTIA wants to approve the final transition plan.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Need to strengthen Diversity Principle&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Following submissions by various stakeholders raising concerns regarding developing world participation, representation and lack of multilingualism in the transition process—the Diversity Principle was included by ICANN in the Revised Proposal of 6 June 2014. Given that representatives from developing countries as well as from stakeholder communities outside of the ICANN community are unable to productively involve themselves in such processes because of lack of multilingualism or unfamiliarity with its way of functioning merely mentioning diversity as a principle is not adequate to ensure abundant participation. As CIS has pointed out&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; before issues have been raised about the domination by North American or European entities which results in undemocratic, unrepresentative and non-transparent decision-making in such processes. Accordingly, all the discussions in the process should be translated into multiple native languages of participants in situ, so that everyone participating in the process can understand what is going on. Adequate time must be given for the discussion issues to be translated and circulated widely amongst all stakeholders of the world, before a decision is taken or a proposal is framed. This was a concern raised in the recent CCWG proposal which was extended as many communities did not have translated texts or adequate time to participate.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Representation of the global multistakeholder community in ICG&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Currently, the Co-ordination Group includes representatives from ALAC, ASO, ccNSO, GNSO, gTLD registries, GAC, ICC/BASIS, IAB, IETF, ISOC, NRO, RSSAC and SSAC. Most of these representatives belong to the ICANN community, and is not representative of the global multistakeholder community including governments. This is not representative of even a multistakeholder model which the US &lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;HYPERLINK "http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;g&lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;HYPERLINK "http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;ov&lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;HYPERLINK "http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;ernment &lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;HYPERLINK "http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&lt;/a&gt;has announced&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; for the transition; nor in the multistakeholder participation spirit of NETmundial. Adequate number of seats on the Committee must be granted to each stakeholder so that they can each coordinate discussions within their own communities and ensure wider and more inclusive participation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;ICANN's role in the transition process&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Another issue of concern in the pre-transition process has been ICANN having been charged with facilitating this transition process. This decision calls to question the legitimacy of the process given that the suggestions from the proposals envision a more permanent role for ICANN in DNS management. As Kieren McCarthy has pointed out &lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;ICANN has taken several steps to retain the balance of power in managing these functions which have seen considerable pushback from the community. These include an attempt to control the process by announcing two separate processes&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; – one looking into the IANA transition, and a second at its own accountability improvements – while insisting the two were not related. That effort was beaten down&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; after an unprecedented letter by the leaders of every one of ICANN's supporting organizations and advisory committees that said the two processes must be connected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Next, ICANN was accused of stacking the deck&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt; by purposefully excluding groups skeptical of ICANN’s efforts, and by trying to give ICANN's chairman the right to personally select the members of the group that would decide the final proposal. That was also beaten back. ICANN staff also produced a "scoping document"&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt;, that pre-empt any discussion of structural separation and once again community pushback forced a backtrack.&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These concerns garner more urgency given recent developments with the community working &lt;a href="http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&gt;HYPERLINK "http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&lt;/a&gt;groups&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt; and ICANN divisive view of the long-term role of ICANN in DNS management. Further, given HYPERLINK "https://www.youtube.com/watch?v=yGwbYljtNyI#t=1164"ICANNHYPERLINK "https://www.youtube.com/watch?v=yGwbYljtNyI#t=1164" HYPERLINK "https://www.youtube.com/watch?v=yGwbYljtNyI#t=1164"President Chehade’s comments that the CWG is not doing its job&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;, is populated with people who do not know anything and the “IANA process needs to be left alone as much as possible”. Fadi also specified that ICANN had begun the formal process of initiating a direct contract with VeriSign to request and authorise changes to be implemented by VeriSign. &lt;b&gt;&lt;i&gt;While ICANN may see itself without oversight in this relationship with VeriSign, it is imperative that proposals bear this plausible outcome in mind and put forth suggestions to counter this.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The&lt;a href="http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&gt; &lt;/a&gt;&lt;a href="http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&gt;HYPERLINK "http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&lt;/a&gt;update from IETF on the ongoing negotiation with ICANN on their proposal&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt; related to protocol parameters has also flagged that ICANN is unwilling to cede to any text which would suggest ICANN relinquishing its role in the operations of protocol parameters to a subsequent operator, should the circumstances demand this. ICANN has stated that agreeing to such text now would possibly put them in breach of their existing agreement with the NTIA. Finally,&lt;a href="https://twitter.com/arunmsukumar/status/603952197186035712"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/arunmsukumar/status/603952197186035712"&gt;HYPERLINK "https://twitter.com/arunmsukumar/status/603952197186035712"&lt;/a&gt;&lt;a href="https://twitter.com/arunmsukumar/status/603952197186035712"&gt;ICANN &lt;/a&gt;&lt;a href="https://twitter.com/arunmsukumar/status/603952197186035712"&gt;HYPERLINK "https://twitter.com/arunmsukumar/status/603952197186035712"&lt;/a&gt;Board Member, Markus Kummer&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt; stated that if ICANN was to not approve any aspect of the proposal this would hinder the consensus and therefore, the transition would not be able to move forward.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN has been designated the convenor role by the US government on basis of its unique position as the current IANA functions contractor and the global coordinator for the DNS. However it is this unique position itself which creates a conflict of interest as in the role of contractor of IANA functions, ICANN has an interest in the outcome of the process being conducive to ICANN. In other words, there exists a potential for abuse of the process by ICANN, which may tend to steer the process towards an outcome favourable to itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Therefore there exists a strong rationale for defining the limitations of the role of ICANN as convenor.&lt;/i&gt;&lt;/b&gt; The community has suggested that ICANN should limit its role to merely facilitating discussions and not extend it to reviewing or commenting on emerging proposals from the process. Additional safeguards need to be put in place to avoid conflicts of interest or appearance of conflicts of interest. ICANN should further not compile comments on drafts to create a revised draft at any stage of the process. Additionally, ICANN staff must not be allowed to be a part of any group or committee which facilitates or co-ordinates the discussion regarding IANA transition.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How is the Obama Administration and the US Congress playing this?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Even as the issues of separation of ICANN's policy and administrative role remained unsettled, in the wake of the Snowden revelations, NTIA initiated the long due transition of the IANA contract oversight to a global, private, non-governmental multi-stakeholder institution on March 14, 2014. This announcement immediately raised questions from Congress on whether the transition decision was dictated by technical considerations or in response to political motives, and if the Obama Administration had the authority to commence such a transition unilaterally, without prior open stakeholder consultations. Republican&lt;a href="http://www.reuters.com/article/2015/06/02/us-usa-internet-icann-idUSKBN0OI2IJ20150602"&gt; &lt;/a&gt;&lt;a href="http://www.reuters.com/article/2015/06/02/us-usa-internet-icann-idUSKBN0OI2IJ20150602"&gt;HYPERLINK "http://www.reuters.com/article/2015/06/02/us-usa-internet-icann-idUSKBN0OI2IJ20150602"&lt;/a&gt;lawmakers have raised concerns about the IANA transition plan &lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;worried that it may allow other countries to capture control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More recently,&lt;a href="https://www.congress.gov/bill/114th-congress/house-bill/2251"&gt; &lt;/a&gt;&lt;a href="https://www.congress.gov/bill/114th-congress/house-bill/2251"&gt;HYPERLINK "https://www.congress.gov/bill/114th-congress/house-bill/2251"&lt;/a&gt;Defending Internet Freedom Act&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt; has been re-introduced to US Congress. This bill seeks ICANN adopt the recommendations of three internet community groups, about the transition of power, before the US government relinquishes control of the IANA contract. The bill also seeks ownership of the .gov and .mil top-level domains be granted to US government and that ICANN submit itself to the US Freedom of Information Act (FOIA), a legislation similar to the RTI in India, so that its records and other information gain some degree of public access.It has also been asserted by ICANN that neither NTIA nor the US Congress will approve any transition plan which leaves open the possibility of non-US IANA Functions Operator in the future.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Funding of the transition&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Obama administration is also&lt;a href="http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393"&gt; &lt;/a&gt;&lt;a href="http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393"&gt;HYPERLINK "http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393"&lt;/a&gt;fighting a Republican-backed Commerce, Justice, Science, and &lt;a href="http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393"&gt;HYPERLINK "http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393"&lt;/a&gt;Related Agencies Appropriations Act (H.R. 2578)&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; which seeks to block NTIA funding the IANA transition. One provision of this bill restricts NTIA from using appropriated dollars for IANA stewardship transition till the end of the fiscal year, September 30, 2015 also the base period of the contact in function. This peculiar proviso in the Omnibus spending bill actually implies that Congress believes that the IANA Transition should be delayed with proper deliberation, and not be rushed as ICANN and NTIA are inclined to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IANA Transition cannot take place in violation of US Federal Law that has defunded it within a stipulated time-window. At the Congressional Internet Caucus in January 2015, NTIA head Lawrence Strickling clarified that NTIA will “not use appropriated funds to terminate the IANA functions...” or “to amend the cooperative agreement with Verisign to eliminate NTIA's role in approving changes to the authoritative root zone file...”. This implicitly establishes that the IANA contract will be extended, and Strickling confirmed that there was no hard deadline for the transition.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;DOTCOM Act&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Communications and Technology Subcommittee of the House Energy and Commerce Committee&lt;a href="http://energycommerce.house.gov/markup/communications-and-technology-subcommittee-vote-dotcom-act"&gt; &lt;/a&gt;&lt;a href="http://energycommerce.house.gov/markup/communications-and-technology-subcommittee-vote-dotcom-act"&gt;HYPERLINK "http://energycommerce.house.gov/markup/communications-and-technology-subcommittee-vote-dotcom-act"&lt;/a&gt;amended the DOTCOM Act&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;, a bill which, in earlier drafts, would have halted the IANA functions transition process for up to a year pending US Congressional approval. The bill in its earlier version represented unilateral governmental interference in the multistakeholder process. The new bill reflects a much deeper understanding of, and confidence in, the significant amount of work that the global multistakeholder community has undertaken in planning both for the transition of IANA functions oversight and for the increased accountability of ICANN. The amended DOTCOM Act would call for the NTIA to certify – as a part of a proposed GAO report on the transition – that &lt;i&gt;“the required changes to ICANN’s by-laws contained in the final report of ICANN’s Cross Community Working Group on Enhancing ICANN Accountability and the changes to ICANN’s bylaws required by ICANN’s IANA have been implemented.” &lt;/i&gt;The bill enjoys immense bipartisan support&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt;, and is being lauded as a prudent and necessary step for ensuring the success of the IANA transition.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; IANA Functions Contract &amp;lt;http://www.ntia.doc.gov/files/ntia/publications/sf_26_pg_1-2-final_award_and_sacs.pdf&amp;gt; accessed 15th June 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Daniel Karrenberg, The Internet Domain Name System Explained For Nonexperts &amp;lt;http://www.internetsociety.org/sites/default/files/The%20Internet%20Domain%20Name%20System%20Explained%20for%20Non-Experts%20(ENGLISH).pdf&amp;gt; accessed 15 June 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; David Post and Danielle Kehl, Controlling Internet Infrastructure The “IANA Transition” And Why It Matters For The Future Of The Internet, Part I (1st edn, Open Technology Institute 2015) &amp;lt;https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Iana.org, 'IANA — Root Files' (2015) &amp;lt;https://www.iana.org/domains/root/files&amp;gt; accessed 11 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; 'NTIA's Role In Root Zone Management' (2014). &amp;lt;http://www.ntia.doc.gov/files/ntia/publications/ntias_role_root_zone_management_12162014.pdf&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; &lt;i&gt;Contract&lt;/i&gt; ( 2011) &amp;lt;http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Kieren McCarthy, 'Confidential Information Exposed Over 300 Times In ICANN Security Snafu' &lt;i&gt;The Register&lt;/i&gt; (2015) &amp;lt;http://www.theregister.co.uk/2015/04/30/confidential_information_exposed_over_300_times_in_icann_security_snafu/&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; NTIA, ‘NTIA Announces Intent To Transition Key Internet Domain Name Functions’ (2014) &amp;lt;http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; NTIA, ‘NTIA Announces Intent To Transition Key Internet Domain Name Functions’ (2014) &amp;lt;http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; NTIA, ‘NTIA Announces Intent To Transition Key Internet Domain Name Functions’ (2014) &amp;lt;http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; David Post and Danielle Kehl, &lt;i&gt;Controlling Internet Infrastructure The “IANA Transition” And Why It Matters For The Future Of The Internet, Part I&lt;/i&gt; (1st edn, Open Technology Institute 2015) &amp;lt;https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; National Telecommunications and Information Administration, 'REPORT ON THE TRANSITION OF THE STEWARDSHIP OF THE INTERNET ASSIGNED NUMBERS AUTHORITY (IANA) FUNCTIONS' (NTIA 2015) &amp;lt;http://www.ntia.doc.gov/files/ntia/publications/ntia_second_quarterly_iana_report_05.07.15.pdf&amp;gt; accessed 10 July 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Lawrence Strickling, 'Stakeholder Proposals To Come Together At ICANN Meeting In Argentina' &amp;lt;http://www.ntia.doc.gov/blog/2015/stakeholder-proposals-come-together-icann-meeting-argentina&amp;gt; accessed 19 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Philip Corwin, 'NTIA Says Cromnibus Bars IANA Transition During Current Contract Term' &amp;lt;http://www.circleid.com/posts/20150127_ntia_cromnibus_bars_iana_transition_during_current_contract_term/&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Sophia Bekele, '"No Legal Basis For IANA Transition": A Post-Mortem Analysis Of Senate Committee Hearing' &amp;lt;http://www.circleid.com/posts/20150309_no_legal_basis_for_iana_transition_post_mortem_senate_hearing/&amp;gt; accessed 9 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt;&lt;i&gt; Comments On The IANA Transition And ICANN Accountability Just Net Coalition&lt;/i&gt; (2015) &amp;lt;http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/pdfnOquQlhsmM.pdf&amp;gt; accessed 12 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; The Centre for Internet and Society, 'IANA Transition: Suggestions For Process Design' (2014) &amp;lt;http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design&amp;gt; accessed 9 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; The Centre for Internet and Society, 'IANA Transition: Suggestions For Process Design' (2014) &amp;lt;http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design&amp;gt; accessed 9 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Kieren McCarthy, 'Let It Go, Let It Go: How Global DNS Could Survive In The Frozen Lands Outside US Control Public Comments On Revised IANA Transition Plan' &lt;i&gt;The Register&lt;/i&gt; (2015) &amp;lt;http://www.theregister.co.uk/2015/05/26/iana_icann_latest/&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Icann.org, 'Resources - ICANN' (2014) &amp;lt;https://www.icann.org/resources/pages/process-next-steps-2014-08-14-en&amp;gt; accessed 13 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; &amp;lt;https://www.icann.org/en/system/files/correspondence/crocker-chehade-to-soac-et-al-18sep14-en.pdf&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Richard Forno, '[Infowarrior] - Internet Power Grab: The Duplicity Of ICANN' (&lt;i&gt;Mail-archive.com&lt;/i&gt;, 2015) &amp;lt;https://www.mail-archive.com/infowarrior@attrition.org/msg12578.html&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; ICANN, 'Scoping Document' (2014) &amp;lt;https://www.icann.org/en/system/files/files/iana-transition-scoping-08apr14-en.pdf&amp;gt; accessed 9 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Milton Mueller, 'ICANN: Anything That Doesn’T Give IANA To Me Is Out Of Scope |' (&lt;i&gt;Internetgovernance.org&lt;/i&gt;, 2014) &amp;lt;http://www.internetgovernance.org/2014/04/16/icann-anything-that-doesnt-give-iana-to-me-is-out-of-scope/&amp;gt; accessed 12 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Andrew Sullivan, '[Ianaplan] Update On IANA Transition &amp;amp; Negotiations With ICANN' (&lt;i&gt;Ietf.org&lt;/i&gt;, 2015) &amp;lt;http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html&amp;gt; accessed 14 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; &lt;i&gt;DNA Member Breakfast With Fadi Chehadé (2015-02-11)&lt;/i&gt; (The Domain Name Association 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Andrew Sullivan, '[Ianaplan] Update On IANA Transition &amp;amp; Negotiations With ICANN' (&lt;i&gt;Ietf.org&lt;/i&gt;, 2015) &amp;lt;http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html&amp;gt; accessed 14 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Mobile.twitter.com, 'Twitter' (2015) &amp;lt;https://mobile.twitter.com/arunmsukumar/status/603952197186035712&amp;gt; accessed 12 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; Alina Selyukh, 'U.S. Plan To Cede Internet Domain Control On Track: ICANN Head' &lt;i&gt;Reuters&lt;/i&gt; (2015) &amp;lt;http://www.reuters.com/article/2015/06/02/us-usa-internet-icann-idUSKBN0OI2IJ20150602&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; 114th Congress, 'H.R.2251 - Defending Internet Freedom Act Of 2015' (2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; John Eggerton, 'House Bill Blocks Internet Naming Oversight Handoff: White House Opposes Legislation' &lt;i&gt;Broadcasting &amp;amp; Cable&lt;/i&gt; (2015) &amp;lt;http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393&amp;gt; accessed 9 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; &lt;i&gt;Communications And Technology Subcommittee Vote On The DOTCOM Act&lt;/i&gt; (2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Timothy Wilt, 'DOTCOM Act Breezes Through Committee' &lt;i&gt;Digital Liberty&lt;/i&gt; (2015) &amp;lt;http://www.digitalliberty.net/dotcom-act-breezes-committee-a319&amp;gt; accessed 22 June 2015.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1'&gt;https://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    

   <dc:date>2015-07-31T14:56:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/icmax-summit-and-demo-day">
    <title>The I-MACX Summit &amp; Demo Day (Spring 2015)</title>
    <link>https://cis-india.org/internet-governance/news/icmax-summit-and-demo-day</link>
    <description>
        &lt;b&gt;IIIT-B Innovation Center organized this event in Bangalore on June 18, 2015. Sunil Abraham participated as a speaker.&lt;/b&gt;
        &lt;h3&gt;Programme&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Agenda&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.00 p.m.&lt;/td&gt;
&lt;td&gt;Registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.15 p.m.&lt;/td&gt;
&lt;td&gt;Welcome Address&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.30 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Keynote: “Solving Civic Issues through Technology Platforms” by&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Dr. Pramod Varma, &lt;i&gt;Chief Architect – Technology, UIDAI&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.50 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Panel Discussion: “Opportunities and Challenges in Civic-Tech Startup Space”&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ms. Radha Kizhanattam, Principal – Unitus Seed Fund&lt;/li&gt;
&lt;li&gt;Mr. Shyam Menon, Co-founder – Infuse Ventures&lt;/li&gt;
&lt;li&gt;Mr. Sunil Abraham, Executive Director – The Center for Internet &amp;amp; Society&lt;/li&gt;
&lt;li&gt;Mr. Rajith Shaji, Product Manager – Janaagraha&lt;/li&gt;
&lt;li&gt;Mr. VS Prakash, Director – Karnataka State Natural Disasters&lt;/li&gt;
&lt;li&gt;Monitoring Center (Retd.); Currently Registrar – IIIT Bangalore&lt;/li&gt;
&lt;li&gt;Mr. Syed Suhale Perveez, Senior Manager – Emergency Management Research Institute (108)&lt;/li&gt;
&lt;li&gt;Moderated by Dr. TK Srikanth, Professor – IIIT Bangalore&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.45 p.m.&lt;/td&gt;
&lt;td&gt;Startups Pitch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.55 p.m.&lt;/td&gt;
&lt;td&gt;Vote of Thanks&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.00 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Investors – Startups discuss over High Tea&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Startups demonstrate their innovative solutions&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;About the Summit:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The I-MACX Summit is a civic-tech focused event that intends to bring together innovators from government and social organizations along with civic-minded startups, influencers, activists, investors and entrepreneurs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The I-MACX Summit aims to not only bring out the opportunities and the challenges in the civictech space, but also showcase the offerings that are being created by the civic-tech startups nurtured at IIIT-B Innovation Center.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The I-MACX Summit, envisions itself as a thought-leadership forum that would delve into how the various players in the civic-tech ecosystem could potentially transform governance and society, using the emerging technologies (IOT, Data Analytics, Sensors, Mobile, Cloud).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/icmax-summit-and-demo-day'&gt;https://cis-india.org/internet-governance/news/icmax-summit-and-demo-day&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-08-23T09:37:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/panel-discussion-on-internet-intermediaries-law-and-innovation">
    <title>Panel Discussion on Internet Intermediaries, Law and Innovation</title>
    <link>https://cis-india.org/internet-governance/news/panel-discussion-on-internet-intermediaries-law-and-innovation</link>
    <description>
        &lt;b&gt;CII, Google and Centre For Communications Governance, NLU Delhi hosted a panel discussion on June 2 in New Delhi. Jyoti Panday attended.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet &amp;amp; Society (CIS) participated in the panel discussion on 'Internet Intermediaries, Law and Innovation' hosted by CII, Google and Centre For Communications Governance, NLU Delhi. The panel discussed the impact of the existing provisions on intermediary liability and innovation and sought suggestions and the way forward.&lt;br /&gt;&lt;br /&gt;The panel was moderated by Dr Subho Ray, President, IAMAI&lt;br /&gt;&lt;br /&gt;Other panelists included:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Mr Anupam Chander, Eminent Global Lawyer &amp;amp; Academician&lt;/li&gt;
&lt;li&gt; Mr Apar Gupta, Advocate&lt;/li&gt;
&lt;li&gt; Ms Mishi Choudhary, Founding Director , Software Freedom Law Centre&lt;/li&gt;
&lt;li&gt; Mr J Sai Deepak, Associate Partner, Litigation Team, Saikrishna &amp;amp; Associates&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Mr Indranil Choudhury, Founder and CEO, Lexplosion&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/internet-intermediaries-law-and-innovation-panel.odp" class="internal-link"&gt;Click to download the presentation.&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/panel-discussion-on-internet-intermediaries-law-and-innovation'&gt;https://cis-india.org/internet-governance/news/panel-discussion-on-internet-intermediaries-law-and-innovation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2015-06-14T16:37:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked">
    <title>Can Uber, Ola apps be blocked? Govt fighting cyber odds</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked</link>
    <description>
        &lt;b&gt;The Delhi government is trying to block taxi hailing apps like Uber and Ola Cabs, but is it really possible?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Siladitya Ray published in the &lt;a class="external-link" href="http://www.hindustantimes.com/technology-topstories/can-the-uber-ola-apps-be-blocked/article1-1354921.aspx"&gt;Hindustan Times&lt;/a&gt; on June 4, 2015 quotes Sunil Abraham.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Taxi aggregators are in the firing line over passenger safety again  after a 21-year-old Delhi woman alleged she was molested by a driver in  an Uber cab near Gurgaon on Saturday morning.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The allegation came just six months after a 25-year-old financial  analyst was allegedly raped in an Uber cab in Delhi, over which the  victim took the cab aggregator's parent company to court in the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following an order from the Delhi government, the Department of  Telecommunication had issued an order to Internet Service Providers to  block the websites and apps of taxi hailing aggregators like Uber,  TaxiForSure and Ola Cabs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Internet Service Providers (ISP) have apparently expressed  inability to block Uber, Ola as the web services feature strong  end-to-end encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How ISPs block sites&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Often when an ISP blocks a website it severs your connection with the  domain name.  For example if ISPs want to block Google they simply  block your access to &lt;a href="http://www.google.com"&gt;www.google.com&lt;/a&gt; (i.e. Google's domain name), pretty simple. But if you are using an app  like Google Now there is no domain name involved here the app talks  directly to the server through using some form of encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If we were to use an analogy, think of the ISP as a bridge that  connects you to the web. The sites can be thought of as cars and their  domain names as license plates.  If the ISP wants to block a car with a  certain license plate from going through it can do so with ease. But if a  car's number plates are obscured (encryption) then ISP cannot block the  car from passing through.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Uber and Ola&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most users book cabs from Ola or Uber using the company's apps, which  use strong encryption effectively making their data virtually  undetectable to ISPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It's possible to block apps but it's much more difficult than  before. Earlier you had to deal with a finite set of IP addresses but  now these services are hosted on multiple cloud servers," said Sunil  Abraham, the executive director of Bangalore based research  organisation, the Centre for Internet and Society. "The ISPs themselves  don't want to go through the pain of blocking these apps so they are  asking the government to give them a solution," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government and the Department of Telecommunication are fighting  near improbable odds in their endeavor to block these services on the  web.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked'&gt;https://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Blocking</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-06-14T09:52:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/perils-and-prospects-of-bringing-next-billion-online">
    <title>The Perils and Prospects of Bringing the Next Billion Online</title>
    <link>https://cis-india.org/internet-governance/news/perils-and-prospects-of-bringing-next-billion-online</link>
    <description>
        &lt;b&gt;Sunil Abraham is the executive director of the Centre for Internet &amp; Society, Bangalore. In his PDF talk, he explains the fight for net neutrality in India and how many solutions fall under the category of walled garden.&lt;/b&gt;
        &lt;h2&gt;Video&lt;/h2&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/amJaGwAgD_A" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;For more see &lt;a class="external-link" href="https://personaldemocracy.com/media/perils-and-prospects-bringing-next-b illion-online"&gt;Personal Democracy Media&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/perils-and-prospects-of-bringing-next-billion-online'&gt;https://cis-india.org/internet-governance/news/perils-and-prospects-of-bringing-next-billion-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-08-23T08:04:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-telegraph-may-31-2015-only-digital-sex-please">
    <title>Only digital sex, please</title>
    <link>https://cis-india.org/internet-governance/news/the-telegraph-may-31-2015-only-digital-sex-please</link>
    <description>
        &lt;b&gt;Many Indian men are getting so dependent on digital sex and online pornography that they can’t handle real relationships. And a new book says this is happening the world over. Prasun Chandhuri and Avijit Chatterjee turn the spotlight on the trend&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.telegraphindia.com/1150531/jsp/7days/story_23033.jsp"&gt;published in the Telegraph&lt;/a&gt; on May 31. Rohini is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;P. Sharath doesn't know how to handle women. The 31-year-old software  engineer, who works for a multinational company in Bangalore, thinks he  doesn't need them either. The man who grew up in Hubli in Karnataka and  now earns an eight-figure annual salary has his virtual world. That  gives him his sexual satisfaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Socially awkward, Sharath did try to date a woman, but the  relationship broke within a few months because he found that she was  getting to be "clingy" and "boring". An attempt by his family to fix a  marriage with a woman failed when he groped her in a cinema hall. His  online women, on the other hand, need no pampering, and do not complain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sharath, however, is not happy. "He no longer gets any gratification  from online sex and has been suffering from anxiety and depression,"  says Dr Ali Khwaja, a Bangalore-based psychologist and founder of the  Banjara Academy, a counselling centre.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Increasingly, counsellors in urban India are coming across such cases  of people who are so used to digital sex that they can't cope with real  relationships any more. Khwaja refers to them as "hollow men" - people  who go through despair after relations fail because of their dependence  on digital pornography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Almost every week I meet a young man addicted to porn," says  Mumbai-based counsellor Shefali Batra, author of the recently published  book &lt;i&gt;Teen Matters&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It's a pattern that many counsellors have noticed. As teenagers,  young boys get hooked on to digital sex. "But it becomes a vicious  addiction over time, playing havoc with their social and sexual  development," Batra says. The women they meet do not match up to the  large breasted and oversexed digital women - and the boys become men who  cannot sustain marriages and relationships.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pornography has always existed, and some counsellors do not believe  that it is always harmful. But the spread of the Internet, the easy  availability of smartphones and the profusion of sophisticated sex games  and other platforms have led to a situation where men merely log on for  sexual satisfaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet is bursting at the seams with sex sites. There are  various types of sex games, including cartoon sex games, 3D sex games,  virtual reality sex games and so on where the viewer can indulge in sex  with three or four imaginary characters. Some online games offer virtual  simulation sex. In a new genre of digital porn, users can enjoy 3D porn  with a special virtual reality headset that allows them to step inside  their favourite games and completely immerse themselves in a sexual  fantasy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And this is happening across the world. In a recently released book, &lt;i&gt;Men (Dis)Connected: How technology has sabotaged what it means to be male&lt;/i&gt;, psychologist Philip Zimbardo holds that "masculinity" is being destroyed by online pornography and gaming technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We have surveyed over 20,000 young people in many countries. Even  though we don't have data on Indian men, we assume that the impact of  freely available porn is creating a new breed of addicts in every  country," he says in an email interview. "These men prefer to masturbate  to visual images than have live sexual relations with real women."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nikita Coulombe, co-author of &lt;i&gt;Men (Dis)Connected&lt;/i&gt;, adds that  it is an "endless novelty" and a "virtual harem" for the men. "In 10  minutes you can see more 'mates' than your ancestors would have seen in  their lifetime."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was a time when people shrugged and said, it's just a phase.  But Zimbardo believes that this addiction has gone beyond that and will  have a "permanent negative impact" on young men everywhere because the  porn industry is big business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The professor emeritus at Stanford discovered this phenomenon when he  found that many of his male students were shy and spent too much time  poring over screens. Closer home, academic and writer Shiv Visvanathan  had a similar experience while teaching at the O.P. Jindal University in  Haryana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Many of these guys do not know how to talk to a girl - they'd rather  convey their feelings through text messages or through social networks  or mobile phones. Sometimes you'll even see two people sitting close  together but talking over the phone, just to avoid a face-to-face  conversation," Visvanathan says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What this means is that young men are not just wary of getting into  relationships - they are not missing them either. "Porn gives them  instant gratification which can be repeated, say, 200 times. Moreover,  the virtual body seems more transformable than the actual body and it's  fast," Visvanathan points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is an addiction that draws men more than women, primarily because  the majority of Internet porn is male-centric and, more than teenage  women, boys are addicted to computer games and associated thrills.  "Research has affirmed that this is truer for the male brain in  comparison to the female brain," explains Batra. "The male brain is more  thrill and pleasure seeking and these exciting virtual realities  provide an immense rush of pleasure in the brain."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zimbardo's survey underlines this. It found that three out of five  men expressed a "lack of interest in pursuing and maintaining a romantic  relationship" while three out of four women between the ages of 18 and  30 said they were concerned about the "emotional immaturity or the  unavailability" of men.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the celebrated psychologist plans to conduct a similar survey  in India, concerns are already rising because the lack of sex education  in schools and colleges - coupled with repressed backgrounds and  exaggerated pornographic images - gives the young a warped idea of sex  and relationships.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"In a society where talking about sex is taboo, their only avenue to  satisfy sexual curiosities becomes porn," says Rohini Lakshane,  researcher, Centre for Internet and Society, Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is why sexologist Prakash Kothari often encounters young men who  yearn for a "14-inch organ" and suffer from performance anxiety and  depression. "Proper sex education can teach them just two inches and  oodles of erotic love are enough to satisfy your female partner," says  Kothari.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The experts stress that they are not against pornography. "One should  not shoot the messenger," contends Audrey D'Mello, programme director,  Majlis, a legal counselling centre in Mumbai. "If used properly it can  be an aphrodisiac," Kothari adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But many of the images that the young today see are violent and  bestial. "These twisted forms of sex are being consumed by young men and  boys through smartphones across the country," laments Ira Trivedi,  author of &lt;i&gt;India in Love&lt;/i&gt;. Lakshane believes that easy access to  violent pornography "degrades and objectifies women", giving men and  boys a "skewed view of sex and intimacy".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Calcutta-based Subhrangshu Aditya counselled a woman who wanted a  divorce because her husband forced her to replicate all that he watched  on porn. "It was torture for her, devoid of romantic love or eroticism,"  Aditya says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, the effect on men has an impact on women as well. Trivedi  points out that as men devote themselves to porn, women go for measures  such as vaginal beautification to attract men.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Or women go off sex altogether.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These women have an extreme phobia about sex," says Aindri Sanyal,  an infertility specialist at a Calcutta-based fertility centre. "Some  haven't even got their marriage consummated. So they want to conceive  through artificial insemination."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is there a way out? Experts such as Khwaja are doing what they can.  "I am trying to help Sharath socialise in mixed groups, then spend a few  minutes at a time doing a favour for a woman, or showing a gesture. I  want him to focus on understanding the emotions that girls go through  and eventually make him understand how to interact with another  flesh-and-blood person who has her own romantic and sexual needs," he  says. "The process will take quite a long time."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zimbardo, 82, wants the "socially crippled generation" to hit the  Escape button on their digital devices. He wants to remind them that  real sex involves communicating with a real person, feeling their pain,  earning their trust and making a real connection to their heart. Like  people did, once upon a time.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;If it’s May, it’s got to be India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Some porn stats&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;In 2014, India ranked among the highest consumers of pornographic content in the world, according to Pornhub, an online video hub&lt;/li&gt;
&lt;li&gt;Around 25 per cent of Indian visitors on Pornhub.com were women, 2 per cent higher than the worldwide average of 23 per cent&lt;/li&gt;
&lt;li&gt;Indians seek out pornography most in May and least in October&lt;/li&gt;
&lt;li&gt;More Indians surf porn on their smartphones than on desktops&lt;/li&gt;
&lt;li&gt;On an average, Indians spend 8 minutes and 22 seconds per visit to Pornhub, 30 seconds less than the rest of the world&lt;/li&gt;
&lt;li&gt;Of all states, people from Andhra Pradesh spend the least time on Pornhub — 6 min and 40 sec; people from West Bengal spend 9 min and 5 sec; people from Assam spend 9 min and 55 sec&lt;/li&gt;
&lt;li&gt;Sunny Leone is India’s favourite porn star&lt;/li&gt;
&lt;li&gt;In most places in the world, porn is viewed most on Monday, but in India, it’s on Saturday&lt;/li&gt;
&lt;li&gt;Porn viewing in India dips by over 25 per cent on Diwali, Dussehra, New Year’s Eve and Gandhi Jayanti.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-telegraph-may-31-2015-only-digital-sex-please'&gt;https://cis-india.org/internet-governance/news/the-telegraph-may-31-2015-only-digital-sex-please&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-06-15T01:38:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-india-jochelle-mendonca-neha-alawadhi-may-29-2015-digital-india-launch-likely-in-july">
    <title>Digital India launch likely in July</title>
    <link>https://cis-india.org/internet-governance/news/times-of-india-jochelle-mendonca-neha-alawadhi-may-29-2015-digital-india-launch-likely-in-july</link>
    <description>
        &lt;b&gt;The Modi government, which completed one year at the Centre, is preparing for a big-ticket launch of Digital India, taking technology to the villages and block levels, through merchandise, hackathons and games spread over a week-long initiative across the country.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Jochelle Mendonca and Neha Alawadhi was published in the &lt;a class="external-link" href="http://timesofindia.indiatimes.com/articleshow/47470673.cms"&gt;Times of India&lt;/a&gt; on May 29, 2015. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The  National e-Governance Division (NeGD), under the Department of Electronics and Information Technology ( &lt;a href="http://www.speakingtree.in/topics/god/deity" target="_blank"&gt;DeitY&lt;/a&gt;),  has empanelled agencies for a messaging campaign, gamification,  printing and merchandise, advertising and creatives, including  advertising for rural outreach and social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Working directly with the Prime Minister's Office, NeGD has been tasked  with preparing for the launch since February. Though no formal dates  have been fixed yet, the  Digital India Week (DIW) is likely to take off  in July, and will involve stakeholders across state governments and  ministries, and is expected to be the flagship programme for the second  year of the BJP government, EThas learnt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"They really want to make this the biggest programme of the second year.  The idea is that many things have been done in the digital space that  need to get highlighted," an individual with knowledge of the plans told  ET.&lt;br /&gt; &lt;br /&gt; The event is certainly being planned on a grand scale,  according to the tender documents issued by the government. The  government has asked for merchandise such as t-shirts, caps, trophies,  pen drives and leather cloth and plastic bags. A gamification agency  will work on the portals, mobile applications and social media handles  to boost participation.&lt;br /&gt; &lt;br /&gt; The messaging agency must be able to  carry out, track, record and analyze 50 lakh to one crore messages a  day. The event will be launched by the Prime Minister through a radio  address on 'Mann ki Baat,' which will be followed by events at gram  panchayats, block and sub divisional headquarters, district and state  levels, eventually culminating in a national event, according to a  presentation seen by ET.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the run-up to the DIW, events such as hackathons, training  programmes and webinars would be held in schools and colleges, followed  by crowd-sourcing ideas through the government's portal MyGov, as well  as a new Digital India portal that is being designed.&lt;br /&gt; &lt;br /&gt; "It is a  typical BJP-style campaign. The Prime Minister does not want to hold the  final day event in Delhi and the location is being finalized. All state  and line ministries have been involved, and are being asked to showcase  e-services and best practices, along with the launch of some programmes  like digital locker," said another person familiar with the plans being  rolled out for the DIW.&lt;br /&gt; &lt;br /&gt; The watch words of the campaign will  be "inform, educate and engage", which will include taking the message  of Digital India to the masses through educational institutions,  industry and government agencies.&lt;br /&gt; &lt;br /&gt; "It will educate people on  various important services such as digital literacy, cyber-hygiene and  e-waste management, and also look at engaging a large number of people,  especially youth on a continuous basis," said a person familiar with the  ongoing preparation.&lt;br /&gt; &lt;br /&gt; NeGD is looking at using the principles  of gamification to gather feedback. Experts on e-governance say this is a  good move as most e-governance projects, across the world, fail because  there's not enough buy-in from stakeholders or the goals aren't  communicated widely to the public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"E-governance needs evangelizing. That is what this campaign looks like  it will do. Some parts are dated — such as posters and the print  elements. But this is a good idea. Whether it works or not depends on  the participation they see at the end," Sunil Abraham, director at the  Centre for Internet and Society, said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-india-jochelle-mendonca-neha-alawadhi-may-29-2015-digital-india-launch-likely-in-july'&gt;https://cis-india.org/internet-governance/news/times-of-india-jochelle-mendonca-neha-alawadhi-may-29-2015-digital-india-launch-likely-in-july&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-05-31T16:08:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
