<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1766 to 1780.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-comments-supporting-the-dns-industry-in-underserved-regions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-june-11-2014-sunita-sekhar-stay-connected-even-when-you-go-underground"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-comments-enhancing-icann-accountability"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-leslie-d-monte-june-5-2014-right-to-be-forgotten-poses-legal-dilemma-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/wsis-high-level-event-open-consultation-process"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-may-25-2014-purnima-sharma-digital-death-log-off-in-peace"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-2013-iii-conceptions-of-free-speech-and-democracy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/future-of-cyber-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/harvard-university-may-13-2014-does-size-matter"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-comments-supporting-the-dns-industry-in-underserved-regions">
    <title>Comments to ICANN Supporting the DNS Industry in Underserved Regions  </title>
    <link>https://cis-india.org/internet-governance/blog/cis-comments-supporting-the-dns-industry-in-underserved-regions</link>
    <description>
        &lt;b&gt;Towards exploring ideas and strategies to help promote the domain name industry in regions that have typically been underserved, ICANN published a call for public comments on May 14, 2014. In particular, ICANN sought comments related to existing barriers to Registrar Accreditation and operation and suggestions on how these challenges might be mitigated. CIS contributed to the comments on this report, which will be used to determine next steps to support the domain name industry in underserved regions.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Domain names and the DNS are used in virtually every aspect of the Internet, and without the DNS, the Internet as we know it, would not exist. The DNS root zone has economic value and  ICANN's contract with Verisign delineates the selling of domain names via only ICANN accredited registrars. By the indirect virtue of its control of the root, ICANN has the power and capacity to influence the decisions of entities involved in the management and operations of the DNS, including registrars.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Too far, too many?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We acknowledge some of the efforts for improvements, in particular with reference to barriers to participation in DNS-related business in regions such as Africa and the Middle East, including the creation of a fellowship program, and increased availability of translated materials. However, despite these efforts, the gaps in the distribution of the DNS registrars and registries across the world has become an issue of heightened concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is particularly true, in light of the distribution of registrars and given that, of the 1124 ICANN-accredited registrars, North America has a total of 765 registrars. US and Canada together, have more than double the number of registrars than the rest of the world taken collectively. To put things further into perspective, of the total number of registrars 725 are from the United States alone, and 7 from the 54 countries of Africa.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A barrier to ICANN's capacity building initiatives has been the lack of trust, given the general view that, ICANN focuses on policies that favour entrenched incumbents from richer countries. Without adequate representation from poorer countries, and adequate representation from the rest of the world's Internet population, there is no hope of changing these policies or establishing trust. The entire region of Latin America and the Caribbean, comprising of a population of 542.4 million internet users&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftn1"&gt;[1]&lt;/a&gt; in 2012, has only 22 registrars spread across a total of 10 countries. In Europe, covering a population of 518.5 million internet users&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftn2"&gt;[2]&lt;/a&gt;, are 158 registrars and 94 of those are spread across Germany, UK, France, Spain and Netherlands. The figures paint the most dismal picture with respect to South Asia, in particular India, where just 16 registrars cater to the population of internet users that is expected to reach 243 million by June 2014&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftn3"&gt;[3]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While we welcome ICANN's research and outreach initiatives with regard to the DNS ecosystem in underserved regions, without the crucial first step of clarifying the metrics that constitute an underserved region, these efforts might not bear their intended impact. ICANN cannot hope to identify strategies towards bridging the gaps that exist in the DNS  ecosystem, without going beyond the current ICANN community, which, while nominally being 'multistakeholder' and open to all, grossly under-represents those parts of the world that aren't North America and Western Europe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of registries in the developing world is another significant issue that needs to be highlighted and addressed. The top 5 gTLD registries are in the USA and it is important that users and the community feels that the fees being collected are equivalent compensation for the services they provide. As registries operate in captive markets that is allocated by ICANN, we invite ICANN to improve its financial accountability, by enabling its stakeholders to assess the finances collected on these registrations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Multistakeholderism—community and consensus &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As an organization that holds itself a champion of the bottom-up policy development process, and, as a private corporation fulfilling a public interest function, ICANN, is in a unique position to establish new norms of managing common resources. In theory and under ICANN’s extensive governance rules, the board is a legislative body that is only supposed to approve the consensus decisions of the community and the staff wield executive control. However in reality, both board and the staff have been criticised for decisions that are not backed by the community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The formal negotiations between ICANN and Registrar Stakeholder Group Negotiating Team (Registrar NT) over the new Registrar Accreditation Agreement (RAA), is an example of processes that have a multistakeholder approach but fail on values of deliberation and pluralistic decision making.&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftn4"&gt;[4]&lt;/a&gt; ICANN staff insisted on including a "proposed Revocation (or "blow up") Clause that would have given them the ability to unilaterally terminate all registrar accreditations" and another proposal seeking to provide ICANN Board ability to unilaterally amend the RAA (identical to proposal inserted in the gTLD registry agreement - a clause met with strong opposition not only from the Registry Stakeholder Group but from the broader ICANN community).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both proposals undermine the multistakeholder approach of the ICANN governance framework, as they seek more authority for the Board, rather than the community or protections for registrars and more importantly, registrants. The proposed amendments to the RAA were not issues raised by Law Enforcement, GAC or the GNSO but by the ICANN staff and received considerable pushback from the Registrar Stakeholder Group Negotiating Team (Registrar NT). The bottom-up policy making process at ICANN has also been questioned with reference to the ruling on vertical integration between registries and registrars, where the community could not even approach consensus.&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftn5"&gt;[5]&lt;/a&gt; Concerns have also been raised about the extent of the power granted to special advisory bodies handpicked by the ICANN president, the inadequacy of existing accountability mechanisms for providing a meaningful and external check on Board decisions and the lack of representation of underserved regions on these special bodies. ICANN must evolve its accountability mechanisms, to go beyond the opportunity to provide comments on proposed policy, and extend to a role for stakeholders in decision making, which is presently a privilege reserved for staff rather than bottom-up consensus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN was created as a consensus based organisation that would enable the Internet, its stakeholders and beneficiaries to move forward in the most streamlined, cohesive manner.&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftn6"&gt;[6]&lt;/a&gt; Through its management of the DNS, ICANN is undertaking public governance duties, and it is crucial that it upholds the democratic values entrenched in the multistakeholder framework. Bottom up policy making extends beyond passive participation and has an impact on the direction of the policy. Presently, while anyone can comment on policy issues, only a few have a say in which comments are integrated towards outcomes and action. We would like to stress not just improving and introducing checks and balances within the ICANN ecosystem, but also, integrating accountability and transparency practices at all levels of decision making.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bridging the gap&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We welcome the Africa Strategy working group and the public community process that was initiated by ICANN towards building domain name business industry in Africa, and, we are sure there will be lessons that will applicable to many other underserved regions. In the context of this report CIS, wants to examine the existing criteria of the accreditation process. As ICANN's role evolves and its revenues grow across the DNS and the larger Internet landscape, it is important in our view, that ICANN review and evolve it's processes for accreditation and see if they are as relevant today, as they were when launched.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The relationship between ICANN and every accredited registrar is governed by the individual RAA, which set out the obligations of both parties, and, we recommend simplifying and improving them. The RAA language is complex, technical and not relevant to all regions and presently, there are no online forms for the accreditation process. While ICANN's language will be English, the present framing has an American bias—we recommend—creating an online application process and simplifying the language keeping it contextual to the region. It would also be helpful, if ICANN invested in introducing some amount of standardization across forms, this would reduce the barrier of time and effort it takes to go through complex legal documents and contribute to the growth of DNS business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The existing accreditation process for registrars requires applicants to procure US$70,000 or more for the ICANN accreditation to become effective. The applicants are also required to obtain and maintain for the length of accreditation process, a commercial general liability insurance with a policy limit of US$500,000 or more. The working capital and the insurance are quite high and create a barrier to entrance of underserved regions in the DNS ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With lack of appropriate mechanisms registrars resort to using US companies for insurance, creating more foreign currency pressures on themselves. The commercial general liability insurance requirement for the registrars is not limited to their functioning as a registrar perhaps not the most appropriate option. &lt;span&gt;ICANN should, and must, increase efforts towards helping registrars find suitable insurance providers and scaling down the working capital. Solutions may lie in exploring variable fee structures adjusted against profits, and derived after considering factors such as cost of managing domain names and sub-domain names, expansion needs, ICANN obligations and services, financial capacities of LDCs and financial help pledged to disadvantaged groups or countries.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Presently, the start-up capital required is too high for developing countries, and this is reflected in the number of registries in these areas. Any efforts to improve the DNS ecosystem in underserved regions, must tackle this by scaling down the capital in proportion to the requirements of the region.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another potential issue that ICANN should consider, is that users getting sub-domain names from local registrars located in their own country, are usually taxed on the transaction, however, online registration through US registrars spares users from paying taxes in their country.&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftn7"&gt;[7]&lt;/a&gt; This could create a reverse incentive for registering domain sub-names online from US registrars. ICANN should push forward on efforts to ensure that registrars are sustainable by providing incentives for registering in underserved regions and help towards maintain critical mass of the registrants. The Business Constituency (BC)—the voice of commercial Internet users within ICANN, could play a role in this and ICANN should endeavour to either, expand the BC function or create a separate constituency for the representation of  underserved regions.&lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftnref1"&gt;[1]&lt;/a&gt; Internet Users and Population stats 2012. http://www.internetworldstats.com/stats2.htm&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftnref2"&gt;[2]&lt;/a&gt; Internet Users and Population stats 2012. http://www.internetworldstats.com/stats4.htm&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftnref3"&gt;[3]&lt;/a&gt; Times of India IAMAI Report. http://timesofindia.indiatimes.com/tech/tech-news/India-to-have-243-million-internet-users-by-June-2014-IAMAI/articleshow/29563698.cms&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftnref4"&gt;[4]&lt;/a&gt; Mar/07/2013 - Registrar Stakeholder Group Negotiating Team (Registrar NT) Statement Regarding ICANN RAA Negotiations.http://www.icannregistrars.org/calendar/announcements.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftnref5"&gt;[5]&lt;/a&gt; Kevin Murphy, Who runs the internet? An ICANN 49 primer. http://domainincite.com/16177-who-runs-the-internet-an-icann-49-primer&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftnref6"&gt;[6]&lt;/a&gt; Stephen Ryan, Governing Cyberspace: ICANN, a Controversial Internet Standards Body http://www.fed-soc.org/publications/detail/governing-cyberspace-icann-a-controversial-internet-standards-body&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Comments%20on%20Supporting%20the%20DNS%20Industry%20in%20Underserved%20Regions.doc#_ftnref7"&gt;[7]&lt;/a&gt; Open Root-Financing LDCs in the WSIS process. See: http://www.open-root.eu/about-open-root/news/financing-ldcs-in-the-wsis-process&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-comments-supporting-the-dns-industry-in-underserved-regions'&gt;https://cis-india.org/internet-governance/blog/cis-comments-supporting-the-dns-industry-in-underserved-regions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IG4all</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    

   <dc:date>2014-07-04T06:48:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-june-11-2014-sunita-sekhar-stay-connected-even-when-you-go-underground">
    <title>Stay connected even when you go underground</title>
    <link>https://cis-india.org/news/the-hindu-june-11-2014-sunita-sekhar-stay-connected-even-when-you-go-underground</link>
    <description>
        &lt;b&gt;CMRL may soon start making arrangements to ensure good mobile connectivity on the underground stretch.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The &lt;a class="external-link" href="http://www.thehindu.com/news/cities/chennai/chen-infra/stay-connected-even-when-you-go-underground/article6105262.ece"&gt;article by Sunita Sekhar was published in the Hindu&lt;/a&gt; on June 12, 2014. Nishant Shah gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;A really erratic mobile network connection is something  all of us have probably experienced, while on the move, every now and  then.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;If your mobile phone signal can fail you on the road, have you thought what it will be like when you ride underground?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Perhaps  it is time to put that thought into your head. Not very many years from  now, it is likely you will be riding the Chennai Metro underground.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Folks at Chennai Metro Rail Ltd. (CMRL) have, however, already thought of this, to their credit.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;CMRL may soon start making arrangements to ensure good mobile connectivity on the underground stretch.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“We  are considering various options to boost mobile network underground. It  is important we provide such a service,” says a CMRL official. Chennai  Metro, built at a cost of Rs. 14,600 crore, 45 km across the city, will  have 24 km underground. Of the 32 stations, 19 will be underground.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;CMRL  has drawn the idea from Delhi Metro Rail Corporation (DMRC), a  principal consultant. Sometime back, Delhi Metro Rail had installed  additional cellular towers at its underground stations to improve mobile  connectivity.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The value of such a facility will  surface especially during a crisis, according to Nishant Shah of Centre  for Internet and Society.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Connectivity becomes crucial when something untoward —  be it breakdown of infrastructure or even sexual harassment — occurs on  the underground stretch. It needs to be recorded or documented  immediately,” he says.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Janaki Pillai of Ability  Foundation says connectivity is particularly critical for the hearing  impaired, who often use the messaging and WhatsApp services.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“But  the question of them using the underground stations and the need for  mobile connectivity arises only when the stations are accessible.  Whether I choose to use it or not is different, but the service should  be available and the choice should be mine,” she says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-june-11-2014-sunita-sekhar-stay-connected-even-when-you-go-underground'&gt;https://cis-india.org/news/the-hindu-june-11-2014-sunita-sekhar-stay-connected-even-when-you-go-underground&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-04T15:15:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-comments-enhancing-icann-accountability">
    <title>CIS Comments: Enhancing ICANN Accountability</title>
    <link>https://cis-india.org/internet-governance/blog/cis-comments-enhancing-icann-accountability</link>
    <description>
        &lt;b&gt;On May 6, 2014, ICANN published a call for public comments on "Enhancing ICANN Accountability". This comes in the wake of the IANA stewardship transition spearheaded by ICANN and related concerns of ICANN's external and internal accountability mechanisms. Centre for Internet and Society contributed to the call for comments.&lt;/b&gt;
        &lt;h3&gt;&lt;strong&gt;Introduction:&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On March 14, 2014, the US National Telecommunications and Information Administration &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;announced its intent&lt;/a&gt; to transition key Internet domain name functions to the global multi-stakeholder Internet governance community. ICANN was tasked with the development of a proposal for transition of IANA stewardship, for which ICANN subsequently &lt;a href="https://www.icann.org/resources/pages/draft-proposal-2014-04-08-en"&gt;called for public comments&lt;/a&gt;. At NETmundial, ICANN President and CEO Fadi Chehadé acknowledged that the IANA stewardship transition and improved ICANN accountability were &lt;a href="http://www.internetcommerce.org/issuance-of-netmundial-multistakeholder-statement-concludes-act-one-of-2014-internet-governance-trifecta/"&gt;inter-related issues&lt;/a&gt;, and &lt;a href="http://blog.icann.org/2014/05/icanns-accountability-in-the-wake-of-the-iana-functions-stewardship-transition/"&gt;announced&lt;/a&gt; the impending launch of a process to strengthen and enhance ICANN accountability in the absence of US government oversight. The subsequent call for public comments on “Enhancing ICANN Accountability” may be found &lt;a href="https://www.icann.org/resources/pages/enhancing-accountability-2014-05-06-en"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Suggestions for improved accountability:&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the event, Centre for Internet and Society (“CIS”) wishes to limit its suggestions for improved ICANN accountability to matters of reactive or responsive transparency on the part of ICANN to the global multi-stakeholder community. We propose the creation and implementation of a robust “freedom or right to information” process from ICANN, accompanied by an independent review mechanism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article III of ICANN Bye-laws note that “&lt;i&gt;ICANN and its constituent bodies shall operate to the maximum extent feasible in an open and transparent manner and consistent with procedures designed to ensure fairness&lt;/i&gt;”. As part of this, Article III(2) note that ICANN shall make publicly available information on, &lt;i&gt;inter alia&lt;/i&gt;, ICANN’s budget, annual audit, financial contributors and the amount of their contributions, as well as information on accountability mechanisms and the outcome of specific requests and complaints regarding the same. Such accountability mechanisms include reconsideration (Article IV(2)), independent review of Board actions (Article IV(3)), periodic reviews (Article IV(4)) and the Ombudsman (Article V).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, ICANN’s Documentary Information Disclosure Policy (“DIDP”) sets forth a process by which members of the public may request information “&lt;i&gt;not already publicly available&lt;/i&gt;”. ICANN &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;may respond&lt;/a&gt; (either affirmatively or in denial) to such requests within 30 days. Appeals to denials under the DIDP are available under the reconsideration or independent review procedures, to the extent applicable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While ICANN has historically been prompt in its response to DIDP Requests, CIS is of the view that absent the commitments in the AoC following IANA stewardship transition, it would be desirable to amend and strengthen Response and Appeal procedures for DIDP and other, broader disclosures. Our concerns stem from the fact that, &lt;i&gt;first&lt;/i&gt;, the substantive scope of appeal under the DIDP, on the basis of documents requested, is unclear (say, contracts or financial documents regarding payments to Registries or Registrars, or a detailed, granular break-up of ICANN’s revenue and expenditures); and &lt;i&gt;second&lt;/i&gt;, that grievances with decisions of the Board Governance Committee or the Independent Review Panel cannot be appealed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore, CIS proposes a mechanism based on “right to information” best practices, which results in transparent and accountable governance at governmental levels.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, we propose that designated members of ICANN staff shoulder responsibility to respond to information requests. The identity of such members (information officers, say) ought to be made public, including in the response document.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, an independent, third party body should be constituted to sit in appeal over information officers’ decisions to provide or decline to provide information. Such body may be composed of nominated members from the global multi-stakeholder community, with adequate stakeholder-, regional- and gender-representation. However, such members should not have held prior positions in ICANN or its related organizations. During the appointed term of the body, the terms and conditions of service ought to remain beyond the purview of ICANN, similar to globally accepted principles of an independent judiciary. For instance, the Constitution of India forbids any disadvantageous alteration of privileges and allowances of judges of the &lt;a href="http://www.constitution.org/cons/india/p05125.html"&gt;Supreme Court&lt;/a&gt; and &lt;a href="http://www.constitution.org/cons/india/p06221.html"&gt;High Courts&lt;/a&gt; during tenure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt;, and importantly, punitive measures ought to follow unreasonable, unexplained or illegitimate denials of requests by ICANN information officers. In order to ensure compliance, penalties should be made continuing (a certain prescribed fine for each day of information-denial) on concerned officers. Such punitive measures are accepted, for instance, in Section 20 of India’s Right to Information Act, 2005, where the review body may impose continuing penalties on any defaulting officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Finally&lt;/i&gt;, exceptions to disclosure should be finite and time-bound. Any and all information exempted from disclosure should be clearly set out (and not merely as categories of exempted information). Further, all exempted information should be made public after a prescribed period of time (say, 1 year), after which any member of the public may request for the same if it continues to be unavailable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS hopes that ICANN shall deliver on its promise to ensure and enhance its accountability and transparency to the global multi-stakeholder community. To that end, we hope our suggestions may be positively considered.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;Comment repository&lt;/strong&gt;:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;All comments received by ICANN during the comment period (May 6, 2014 to June 6, 2014) may be found &lt;a href="http://forum.icann.org/lists/comments-enhancing-accountability-06may14/"&gt;at this link&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-comments-enhancing-icann-accountability'&gt;https://cis-india.org/internet-governance/blog/cis-comments-enhancing-icann-accountability&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IANA</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    

   <dc:date>2014-06-10T13:03:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-leslie-d-monte-june-5-2014-right-to-be-forgotten-poses-legal-dilemma-in-india">
    <title>Right to be forgotten poses a legal dilemma in India</title>
    <link>https://cis-india.org/news/livemint-leslie-d-monte-june-5-2014-right-to-be-forgotten-poses-legal-dilemma-in-india</link>
    <description>
        &lt;b&gt;The “right to be forgotten” judgment has raised a controversy, while some argue that it upholds an individual’s privacy, others say it leaves a lot of room for interpretation. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Leslie D' Monte was &lt;a class="external-link" href="http://www.livemint.com/Industry/5jmbcpuHqO7UwX3IBsiGCM/Right-to-be-forgotten-poses-a-legal-dilemma-in-India.html"&gt;published in Livemint&lt;/a&gt; on June 5, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Medianama.com&lt;/i&gt; has become perhaps the first Indian website to be  asked by an individual to remove a link, failing which the user would  approach &lt;a href="http://www.livemint.com/Search/Link/Keyword/Google%20Inc."&gt;Google Inc.&lt;/a&gt; to delete the link under the “right to be forgotten” provision granted  by a European court. There’s one hitch: India doesn’t have any legal  provision to entertain or process such request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In his request to the media website, the individual cited a landmark 13  May judgment by the Court of Justice of the European Union (EU), which  said users could ask search engines like Google or Bing to remove links  to web pages that contain information about them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the judgement, the user is also free to approach “the  competent authorities in order to obtain, under certain conditions, the  removal of that link from the list of results” if the search engines do  not comply.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“...this individual told us of a plan to appeal to Google on the basis  of the judgment of the European Court of Justice, and asked us to either  convert the public post into a non-indexable post, such that it may not  be surfaced by search engines, or to modify the individual’s name,  place and any references to his/her employer in the post that we’ve  written, so that it cannot be linked directly to the individual,” said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Nikhil%20Pahwa"&gt;Nikhil Pahwa&lt;/a&gt;&lt;/span&gt;, founder of &lt;i&gt;medianama.com&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pahwa did not reveal the identity of the individual, who made the  request on 31 May. Medianama, according to Pahwa, had written about the  individual “a few years ago, protesting against attacks on his/her  freedom of speech.” It did not give details. The media website reported  about the request on 2 June.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under legal pressure, the individual eventually relented and retracted the request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The individual, Pahwa said, requested &lt;i&gt;medianama.com&lt;/i&gt; to retain  only his last name on the web page, cautioning that if the website does  not do so, he would submit the URL (uniform resource locator or address  of that link) of that web page to Google in a “right to be forgotten”  request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This, Pahwa said, “might hurt our search ranking, or lead to a blanket removal of our website from Google’s search index.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is a tricky one, and we’ve declined this request,” said Pahwa. He  added that “the implications for media are immense, since digital data,  which is a recording of online history, will be affected.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The EU ruling came after a Spanish national complained in 2010 that  searching his name in Google threw up links to two newspaper webpages  which reported a property auction to recover social security debt he  once owed, even though the information had become irrelevant since the  proceedings had since been resolved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the ruling, Google put up an online form (mintne.ws/1oYVP5Y), inviting users in Europe to submit their requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“...we will assess each individual request and attempt to balance the  privacy rights of the individual with the public’s right to know and  distribute information,” the form reads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“When evaluating your request, we will look at whether the results include outdated information about you, as well as whether there’s a public interest in the information—for  example, information about financial scams, professional malpractice,  criminal convictions, or public conduct of government officials...”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A Google spokesman said on Tuesday that the company had received over 41,000 requests to be forgotten so far.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the first day itself, Google had received 12,000 requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Almost a third of the requests were in relation to accusations of  fraud, 20% were in relation to violent/serious crimes, and around 12%  regarded child pornography arrests. More than 1,500 of these requests  are believed to have come from people in the UK. An ex-politician  seeking re-election, a paedophile and a GP (general practitioner) were  among the British applicants”, according to a 2 June report in&lt;i&gt;The Telegraph&lt;/i&gt; of London.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The “right to be forgotten” judgment has raised a controversy. While  some argue that it upholds an individual’s privacy, others say it leaves  a lot of room for interpretation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an interview to &lt;i&gt;Mint &lt;/i&gt;on 26 May, &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Anupam%20Chander"&gt;Anupam Chander&lt;/a&gt;&lt;/span&gt;,  director of the California International Law Center, reasoned that if a  person could simply scrub all the bad information about him from being  searchable on the Internet, she/he could do so by claiming that such  information was “no longer relevant”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Do we want search engines to then judge whether information remains  “relevant” or is somehow “inadequate” under the threat of liability for  leaving information accessible? An Internet sanitized of accessible  negative information will only tell half the truth,” he argued.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ruling is not binding on India and applies only to EU countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to legal experts, the country has no provision for a right to be forgotten, either in the Information Technology (IT) Act 2000 (amended in 2008) or  the IT Rules, 2011. India, for that matter, does not even have a privacy  act as yet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In India, we do not have a concept of the right to be Forgotten. It’s a  very Western concept,” said Pavan Duggal, a cyberlaw expert and Supreme  Court advocate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still, intermediaries like search engines and Internet services  providers, under the country’s IT Act and IT Rules, have the obligation  to exercise due diligence if an aggrieved party sends them a written  notice, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;,  executive director of the Centre for Internet and Society, an Internet  rights lobby group, “right to be forgotten” cases should pass the  “public interest” test.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Privacy protection should not have a chilling effect on transparency.  The question is: Does the content (which a user wants to be removed)  serve a public interest that outweighs the harm that it is doing to the  individual concerned? If no public interest is being served, there is no  point in knowing what the content is all about. The complication with  the EU ruling is that it wants intermediaries and over-the-top providers  to play the role of judges,” said Abraham.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-leslie-d-monte-june-5-2014-right-to-be-forgotten-poses-legal-dilemma-in-india'&gt;https://cis-india.org/news/livemint-leslie-d-monte-june-5-2014-right-to-be-forgotten-poses-legal-dilemma-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-09T10:02:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy">
    <title>CIS Cybersecurity Series (Part 14) – Menaka Guruswamy</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy</link>
    <description>
        &lt;b&gt;CIS interviews Menaka Guruswamy, lawyer at the Supreme Court of India, as part of the Cybersecurity Series.&lt;/b&gt;
        &lt;div&gt;&lt;em&gt;"The courts have rarely used privacy to stop the Indian state from getting into someone's business. So jurisprudentially, it is a weak challenge when you mount a rights based or a privacy right challenge against surveillance by the state. Because the answer of the state to that has always been, and as has been Obama's answer in the United States, that there are national security concerns. And usually national security will trump individual privacy."&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Centre for Internet and Society presents its fourteenth installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Menaka Guruswamy practices law at the Supreme Court of India. She was a Rhodes Scholar at Oxford University, and a Gammon Fellow at Harvard Law School, and a gold medalist from the National Law School of India. She has law degrees from all three schools, with a focus on Constitutional Law and Public International Law.&amp;nbsp;Guruswamy has worked at the Office of the Attorney General of India, the highest office that represents the federal government of India in the Supreme Court of India.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
http://youtu.be/GCDD6Z-UrGI
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;iframe src="//www.youtube.com/embed/GCDD6Z-UrGI" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2014-07-21T10:39:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/wsis-high-level-event-open-consultation-process">
    <title>WSIS+10 High-Level Event: Open Consultation Process</title>
    <link>https://cis-india.org/news/wsis-high-level-event-open-consultation-process</link>
    <description>
        &lt;b&gt;Jyoti Panday represented the Centre for Internet and Society (CIS) at the WSIS+10 High-Level Event:Open Consultation Process held in Geneva from May 28 to 31, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Fifth Physical Meeting marked Phase Six of the Open Consultation Process for the WSIS+10 High-Level Event (HLE) to be held in Geneva from June 10 to 13, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting saw the culmination of the multistakeholder review process on the WSIS+10 Statement on the Implementation of the WSIS Outcomes and the WSIS+10 Vision for WSIS Beyond 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS made interventions on text related to increasing women's participation, freedom of expression, media rights, data privacy, network security and human rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS also endorsed text on action line 'Media' which reaffirmed committment to freedom of expression, data privacy and media rights offline and online including protection of sources, publishers and journalists.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/wsis-final-agreed-draft.pdf" class="internal-link"&gt;Download the final agreed draft&lt;/a&gt; of the WSIS+10 Statement on the Implementation of WSIS Outcomes that will be deliberated upon and agreed at the HLE, for your reference.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/wsis-high-level-event-open-consultation-process'&gt;https://cis-india.org/news/wsis-high-level-event-open-consultation-process&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-04T10:14:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age">
    <title>Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India</title>
    <link>https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age</link>
    <description>
        &lt;b&gt;The development of information technology has transformed the way in which individuals make everyday transactions and communicate with the world around us. These interactions and transactions are recorded and stored – constantly available for access by the individual and the company through which the service was used.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;For example, the ubiquitous smartphone, above and beyond a communication device, is a device which can maintain a complete record of the communications data, photos, videos and documents, and a multitude of other deeply personal information, like application data which includes location tracking, or financial data of the user. As computers and phones increasingly allow us to keep massive amounts of personal information accessible at the touch of a button or screen (a standard smartphone can hold anything between 500 MB to 64 GB of data), the increasing reliance on computers as information-silos also exponentially increases the harms associated with the loss of control over such devices and the information they contain. This vulnerability is especially visceral in the backdrop of law enforcement and the use of coercive state  power to maintain security, juxtaposed with the individual’s right to secure their privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;American Law - The Fourth Amendment Protection against Unreasonable Search and Seizure&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The right to conduct a search and seizure of persons or places is an essential part of investigation and the criminal justice system. The societal interest in maintaining security is an overwhelming consideration which gives the state a restricted mandate to do all things necessary to keep law and order, which includes acquiring all possible information for investigation of criminal activities, a restriction which is based on recognizing the perils of state-endorsed coercion and its implication on individual liberty. Digitally stored information, which is increasingly becoming a major site of investigative information, is thus essential in modern day investigation techniques. Further, specific crimes which have emerged out of the changing scenario, namely, crimes related to the internet, require investigation almost exclusively at the level of digital evidence. The role of courts and policy makers, then, is to balance the state’s mandate to procure information with the citizens’ right to protect it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The scope of this mandate is what is currently being considered before the Supreme Court of the United States, which begun hearing arguments in the cases Riley v. California,&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;and United States v Wurie,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;on the 29&lt;sup&gt;th&lt;/sup&gt; of April, 2014. At issue is the question of whether the police should be allowed to search the cell phones of individuals upon arrest, without obtaining a specific warrant for such search. The cases concern instances where the accused was arrested on account of a minor infraction and a warrantless search was conducted, which included the search of cell phones in their possession. The information revealed in the phones ultimately led to the evidence of further crimes and the conviction of the accused of graver crimes. The appeal is for a suppression of the evidence so obtained, on grounds that the search violates the Fourth Amendment of the American Constitution. Although there have been a plethora of conflicting decisions by various lower courts (including the judgements in &lt;i&gt;Wurie &lt;/i&gt;and &lt;i&gt;Riley&lt;/i&gt;),&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;the Federal Supreme Court will be for the first time deciding upon the issue of whether cell phone searches should require a higher burden under the Fourth Amendment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the core of the issue are considerations of individual privacy and the right to limit the state’s interference in private matters. The fourth amendment in the Constitution of the United States expressly grants protection against unreasonable searches and seizure,&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;however, without a clear definition of what is unreasonable, it has been left to the courts to interpret situations in which the right to non-interference would trump the interests of obtaining information in every case, leading to vast and varied jurisprudence on the issue. The jurisprudence stems from the wide fourth amendment protection against unreasonable government interference, where the rule is generally that any &lt;i&gt;warrantless &lt;/i&gt;search is unreasonable, unless covered by certain exceptions. The standard for the protection under the Fourth Amendment is a subjective standard, which is determined as per the state of the bind of the individual, rather than any objective qualifiers such as physical location; and extends to all situations where individuals have a &lt;i&gt;reasonable expectation of privacy&lt;/i&gt;, i.e., situations where individuals can legitimately expect privacy, which is a subjective test, not purely dependent upon the physical space being searched.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore, the requirement of reasonableness is generally only fulfilled when a search is conducted subsequent to obtaining a warrant from a &lt;i&gt;neutral magistrate, &lt;/i&gt;by demonstrating &lt;i&gt;probable cause &lt;/i&gt;to believe that evidence of any unlawful activity would be found upon such search. A warrant is, therefore, an important limitation on the search powers of the police. Further, the protection excludes roving or general searches and requires &lt;i&gt;particularity &lt;/i&gt;of the items to be searched&lt;i&gt;.&lt;/i&gt; The restriction derives its power from the exclusionary rule, which bars evidence obtained through unreasonable search or seizure, obtained directly or through additional warrants based upon such evidence, from being used in subsequent prosecutions. However, there have evolved several exceptions to the general rule, which includes cases where the search takes place upon the lawful arrest of an accused, a practice which is justified by the possibility of hidden weapons upon the accused or of destruction of important evidence.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The appeal, if successful, would provide an exception to the rule that any search upon lawful arrest is always reasonable, by creating a caveat for the search of computer devices like smartphones. If the court does so, it would be an important recognition of the fact that evolving technologies have transmuted the concept of privacy to beyond physical space, and legal rules and standards that applied to privacy even twenty years ago, are now anachronistic in an age where individuals can record their entire lives on an iPhone. Searching a person nowadays would not only lead to the recovery of calling cards or cigarettes, but phones and computers which can be the digital record of a person’s life, something which could not have been contemplated when the laws were drafted. Cell phone and computer searches are the equivalent of searches of thousands of documents, photos and personal records, and the expectation of privacy in such cases is much higher than in regular searches. Courts have already recognized that cell phones and laptop computers are objects in which the user may have a reasonable expectation of privacy by making them analogous to a “closed container” which the police cannot search and hence coming under the protection of the Fourth Amendment.&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, cell phones and computers also hold data which could be instrumental in investigating criminal activity, and with technologies like remote wipes of computer data available, such data is always at the risk of destruction if delay is occurred upon the investigation. As per the oral arguments, being heard now, the Court seems to be carving out a specific principle applicable to new technologies. The Court is likely to introduce subtleties specific to the technology involved – for example, it may seek to develop different principles for smartphones (at issue in &lt;i&gt;Riley) &lt;/i&gt;and the more basic kind of cell-phones (at issue in &lt;i&gt;Wurie&lt;/i&gt;), or it may recognize that only certain kinds of information may be accessed,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;or may even evolve a rule that would allow seizure, but not a search, of the cell phone before a search warrant can be obtained.&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;Recognizing that transformational technology needs to be reflected in technology-specific legal principles is an important step in maintaining a synchronisation between law and technology and the additional recognition of a higher threshold adopted for digital evidence and privacy would go a long way in securing digital privacy in the future.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Search and Seizure in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Indian jurisprudence on privacy is a wide departure from that in the USA. Though it is difficult to strictly compartmentalize the many facets of the right to privacy, there is no express or implicit mention of such a right in the Indian Constitution. Although courts have also recognized the importance of procedural safeguards in protecting against unreasonable governmental interference, the recognition of the intrinsic right to privacy as non-interference, which may be different from the instrumental rights that criminal procedure seeks to protect (such as misuse of police power), is sorely lacking. The general law providing for the state’s power of search and seizure of evidence is found in the Code of Criminal Procedure, 1973.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 93 provides for the general procedure of search. Section 93 allows for a magistrate to issue a warrant for the search of any “document or thing”, including a warrant for general search of an area, where it believes it is required for the purpose of investigation. The &lt;i&gt;particularity &lt;/i&gt;of the search warrant is not a requirement under S. 93(2), and hence a warrant may be for general or roving search of a place. Section 100, which further provides for the search of a closed place, includes certain safeguards such as the presence of witnesses and the requirement of a warrant before a police officer may be allowed ingress into the closed place. However, under S. 165 and S. 51 of the code, the requirements of a search warrant are exempted. S. 165 dispenses with the warrant requirement and provides for an &lt;i&gt;officer in charge&lt;/i&gt; &lt;i&gt;of a police station, &lt;/i&gt;or any other officer duly authorized by him,&lt;i&gt; &lt;/i&gt;to conduct the search of any place as long as he has &lt;i&gt;reasonable grounds&lt;/i&gt; to believe that such search would be for the purpose of an investigation and a belief that a search warrant cannot be obtained without &lt;i&gt;undue delay&lt;/i&gt;. Further, the officer conducting such search must &lt;i&gt;as far as possible&lt;/i&gt; note down the reasons for such belief in writing prior to conducting the search. Section 51 provides another express exception to the requirement of search warrants, by allowing the search of a person arrested lawfully provided that the arrested person &lt;i&gt;may not or cannot be admitted to bail&lt;/i&gt;, and requires any such seized items to be written in a search memo. As long as these conditions are fulfilled, the police has an unqualified authority to search a person upon arrest. Therefore, where the arrestee can be admitted to bail as per the warrant, or, in cases of warrantless arrest, as per the law, the search and seizure of such person may not be regular, and the evidence so collected would be subject to greater scrutiny by the court. However, besides these minimal protections, there is no additional procedural protection of individual privacy, and the search powers of the police are extremely wide and discretionary. In fact, there is a specific absence of the exclusionary rule as a protection as well, which means that, unlike under the Fourth Amendment, the non-compliance with the procedural requirements of search &lt;i&gt;would not by itself vitiate the proceedings&lt;/i&gt; or suppress the evidence so found, but would only amount to an irregularity which must be simply another factor considered in evaluating the evidence.&lt;a href="#fn10" name="fr10"&gt;[10] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The extent of the imputation of the Fourth Amendment protection against unreasonable governmental interference in the Indian constitution is also uncertain. A direct imputation of the Fourth Amendment into the Indian Constitution has been disregarded by the Supreme Court.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt;Though the allusions to the Fourth Amendment have mostly been invoked on facts where unreasonable intrusions &lt;i&gt;into the homes&lt;/i&gt; of persons were challenged, the indirect imputation of the right to privacy into the right under Article 21 of the Constitution, invoking the right to privacy as a right to non-interference and a right to live with dignity, would suggest that the considerations for privacy under the Constitution are not merely objective, or physical, but depend on the subjective facts of the situation, i.e. its effect on the right to live with dignity (analogous to the reasonable expectation of privacy test laid down in &lt;i&gt;Katz&lt;/i&gt;).&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; Further, the court has specifically struck down provisions for search and seizure which confer particularly wide and discretionary powers on the executive without judicial scrutiny, holding that searches must be subject to the doctrine of proportionality, and that a provision &lt;i&gt;probable cause &lt;/i&gt;to effect any search.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;The Fourth Amendment protection against unreasonable interference in private matters by the state is a useful standard to assess privacy, since it imputes a concept of privacy as an intrinsic right as well as an instrumental one, i.e. privacy as non-interference is a good in itself, notwithstanding the rights it helps achieve, like the freedom of movement or speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regarding digital privacy in particular, Indian law and policy has failed to stand up to the challenges that new technologies pose to privacy and has in fact been regressive, by engaging in surveillance of communications and by allowing governmental access to digital records of online communications (including emails, website logs, etc.) without judicial scrutiny and accountability.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; In an age of transformative technology and of privacy being placed at a much greater risk, laws which were once deemed reasonable are now completely inadequate in guaranteeing freedom and liberty as encapsulated by the right to privacy. The disparity is even more pronounced in cases of investigation of cyber-crimes which rely almost exclusively on digital evidence, such as those substantively enumerated under the Information Technology Act, but investigated under the general procedure laid down in the Code of Criminal Procedure, which is already mentioned. The procedures for investigation of cyber-crimes and the search and seizure of digital evidence require special consideration and must be brought in line with changing norms. Although S.69 and 69B lay down provisions for investigation of certain crimes,&lt;a href="#fn15" name="fr15"&gt;[15] &lt;/a&gt;which requires search upon an order by &lt;i&gt;competent authority,&lt;/i&gt; i.e. the Secretary to the Department of IT in the Government of India, the powers of search and seizure are also present in several other rules, such as rule 3(9) of the Information Technology (Due diligence observed by intermediaries guidelines) Rules, 2011 which allows access to information from intermediaries by a simple written order by &lt;i&gt;any agency or person who are lawfully authorised for investigative, protective, cyber security or intelligence activity&lt;/i&gt;; or under rule 6 of the draft Reasonable Security Practices Rules, 2011 framed under Section 43A of the Information Technology Act, where &lt;i&gt;any government agency &lt;/i&gt;may, for the prevention, detection, investigation, prosecution, and punishment of offences, obtain any personal data from an intermediate “body corporate” which stores such data. The rules framed for investigation of digital evidence, therefore, do not inspire much confidence where safeguarding privacy is concerned. In the absence of specific guidelines or amendments to the procedures of search and seizure of digital evidence, the inadequacies of applying archaic standards leads to unreasonable intrusions of individual privacy and liberties – an incongruity which requires remedy by the courts and legislature of the country.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;a class="external-link" href="http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-132_h315.pdf"&gt;http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-132_h315.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a class="external-link" href="http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-212_86qd.pdf"&gt;http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-212_86qd.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. In Wurie, the motion to supress was allowed, while in Riley it was denied. Also see US v Jacob Finley, US v Abel Flores-Lopez where the motion to suppress was denied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. The Fourth Amendment to the Constitution of the United States of America: &lt;i&gt;"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Katz v United States, 389 U.S. 347, 352 (1967).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Stephen Saltzer, American Criminal Procedure&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. United States v Chan, 830 F. Supp. 531,534 (N.D. Cal. 1993).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. A factor considered in &lt;i&gt;US v Abel Flores-Lopez, &lt;/i&gt;where the court held that the search of call history in a cell phone did not constitute a sufficient infringement of privacy to require the burden of a warrant.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. The decision in Smallwood v. Florida, No. SC11-1130, before the Florida Supreme Court, made such a distinction.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. State Of Maharashtra v. Natwarlal Damodardas Soni, AIR 1980 SC 593; Radhakrishnan v State of UP, 1963 Supp. 1 S.C.R. 408&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. M.P. Sharma v Satish Chandra, AIR 1954 SC 300&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Kharak Singh v State of UP, (1964) 1 SCR 332; Gobind v State of Madhya Pradesh, 1975 AIR 1378&lt;/p&gt;
&lt;p class="Footnote" style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. &lt;i&gt;District Registrar and Collector&lt;/i&gt; v. &lt;i&gt;Canara Bank, &lt;/i&gt;AIR 2005 SC 186&lt;i&gt;, &lt;/i&gt;which related to S.73 of the Andhra Pradesh Stamps Act which allowed ‘any person’ to enter into ‘any premises’ for the purpose of conducting a search.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. S. 69 and 69B of the Information Technology (Amendment) Act, 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Procedures and Safeguards for Monitoring and collecting traffic data or information rules 2009, &lt;i&gt;available at &lt;/i&gt;&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009" class="external-link"&gt;http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age'&gt;https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-02T06:45:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-may-25-2014-purnima-sharma-digital-death-log-off-in-peace">
    <title>Digital death: Log off in peace</title>
    <link>https://cis-india.org/news/the-times-of-india-may-25-2014-purnima-sharma-digital-death-log-off-in-peace</link>
    <description>
        &lt;b&gt;From email and e-banking to shopping and social media sites, Indians have expanded their online footprint. Now, a small but rising number are planning for their digital death.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Purnima Sharma was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/Digital-deathLog-off-in-peace/articleshow/35579831.cms"&gt;published in the Times of India&lt;/a&gt; on May 25, 2014. Nishant Shah is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A few days after his son Yousmann's death in a road accident, Kongposh Bazaz began searching for the 19-year-old's Facebook password. "There was such an outpouring of grief on his wall that I felt the need to 'speak' to my son's friends on his behalf, telling them to be strong," he says. Facebook does not hand over access to a person's account even when they die but fortunately, Yousmann had shared his password with a close friend who gave it to Bazaz. "Like any teenager, he did not share it with his parents," says the 51-year-old publisher, revealing that while he has memorialized his son's Facebook page, he would prefer that his own online accounts were closed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As  we build our lives in a virtual world, there's a growing concern about  what happens to our online presence after death. In the West, some  people are writing out digital wills, spelling out how their virtual  life should be handled post-mortem . In India, too, a small number is  taking an interest in their digital afterlife. Sandeep Nerlekar, MD and  CEO Terentia Consultants, an estate planning firm that handles both  online (through a portal &lt;a class="smarterwiki-linkify" href="http://www.onlinewill"&gt;www.onlinewill&lt;/a&gt; .co.in) and digital wills, says, "Now, even social networking sites are becoming part of one's assets."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah, director, Research, at the Bangalore-based Centre for Internet and Society, says that though the trend is nascent, people have started including their digital accounts in their wills. "However, it is evident, that as more and more of our lives get mediated by digital devices, and as we live on the cloud, we are going to have to find legal and personal options of making sure that important data gets transmitted beyond our lives, and stored, archived and managed in responsible ways for those who find value in it."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in a country where only a small percentage writes wills for physical assets, it's not something a lot of people are thinking about proactively. Sudha Sarin, Delhi-based communications specialist, says "It doesn't get priority, like your financial assets," she says. At some point, she intends to leave a list of all her online account-ids and passwords in a place where her sons can find them easily. "This will give them access to my friends list so that they can be informed. And, in turn, let people who knew me reach out to them at such a time," she says. But she will want her family to close her accounts a couple of months after. "I wouldn't want my accounts to just sit out there. It's a way of closure," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sarin faced these questions of mortality after she lost her sister Geeta to cancer three months ago. She has decided to memorialize Geeta's Facebook page. Facebook doesn't allow family members access to data/passowords etc but kin can either delete or "memorialize" the accounts of the deceased. Sarin believes she's taken a decision her sister would have supported. "Reading her posts and seeing her pictures act like a balm - it's a catharsis of sorts," she says.&lt;br /&gt;&lt;br /&gt;American blogger Evan Caroll, who runs The Digital Beyond which talks about digital afterlife, writes that people need to start planning for what is to be done with their email, online banking and trading, social media , photo-sharing , online billpay and blogs after death. In an email interview with TOI, he suggests a simple conversation with one's heirs, using online services like SecureSafe that let users store passwords to pass along when they are gone or speaking to one's lawyer.&lt;br /&gt;&lt;br /&gt;Companies have different policies on what to do with accounts of those deceased. Last year, Google introduced a stepby-step process allowing users to plan what they want done with their account, and in some cases they provide the contents of an email account which hasn't left specific instructions after a "careful review" . Yahoo and Facebook currently have no service akin to a virtual will, but offer the option of closing down a deceased person's email accounts and social media profiles , though only after receiving verification of death. Arunav Sinha, director, corporate communications , India, China &amp;amp; South East Asia of Yahoo, says that virtual legacy planning is a personal prerogative in India today. "We can't hand over any data to anyone, as per the terms of our service. Requests for access have to come through a legal process and with the relevant documentation," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Caroll says there is no standard way in which online accounts are handled once you're gone. "People too have varied responses - while some look at it as a place to remember and grieve, others believe it's strange to continue the online profile."&lt;br /&gt;&lt;br /&gt;Rekha Aggarwal, advocate, Supreme Court, has started suggesting to clients that they keep their online accounts in mind too. "Talking about myself, I've already passed on my password to my son in case of any eventuality. I've told him to close my accounts because I don't want to be left hanging in the virtual world."&lt;br /&gt;&lt;br /&gt;But there are many for whom "the sense of digital life beyond death is exciting ," points out Nishant Shah. "I know of people who actually leave a last message to be posted on social media by their friends or family. There are some whose accounts are now transparently run by their partners or families." '&lt;br /&gt;&lt;br /&gt;Accessing a deceased person's account is something Pooja Dager isn't comfortable with. The 37-year-old HR manager has "not even tried to venture into that territory" after her husband's passing. "Only his bank accounts were transferred to my son's name, that's it. The others I try not to think about. I just let them be," she adds.&lt;br /&gt;&lt;br /&gt;But as internet users age, many more people will have to confront these issues.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Making a digial will&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Take an inventory of your online accounts and plan a way for your heirs to access your 'memories' such as photos, movies and emails Give instructions whether you want your page(s) closed or if you'd like someone to answer your friends' posts on your behalf, maybe for a few months You might even like to incorporate details of your digital assets in your will. Consult your attorney for advice.&lt;br /&gt;&lt;b&gt;Evan Carroll, The Digital Beyond&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-may-25-2014-purnima-sharma-digital-death-log-off-in-peace'&gt;https://cis-india.org/news/the-times-of-india-may-25-2014-purnima-sharma-digital-death-log-off-in-peace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-28T07:24:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police">
    <title> India needs better cyber police</title>
    <link>https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police</link>
    <description>
        &lt;b&gt;On Wednesday, one of the largest online shopping and auction portals, eBay, revealed that earlier this year, cybercriminals accessed details of 145 million of its customers.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was &lt;a class="external-link" href="http://www.business-standard.com/article/international/india-needs-better-cyber-police-114052201689_1.html"&gt;published in the Business Standard&lt;/a&gt; on May 23, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Even though eBay's customers' financial details are said to be safe, the  incident is being termed a "historic breach" given the enormity of the  data compromised.  Globally, eBay is being criticised not just for its  laxity in securing the digital perimeter but also for reacting too late.  The company has said that it first came to know of the breach "two  weeks" ago. Records that have been accessed contain passwords as well as  email addresses, birth dates, mailing addresses and other personal  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The situation is worse when it comes to reporting such instances in &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=India" target="_blank"&gt;India&lt;/a&gt;, say &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Cyber+Security" target="_blank"&gt;cyber security&lt;/a&gt; experts. The Indian Information Technology Act requires companies to  adopt "reasonable security measures" to protect consumers' sensitive  personal information such as passwords and financial details. It also  makes companies duty bound to report breaches and also defines  liabilities in case a firm is found not to be adhering to best data  security practices. However, implementation is patchy and most such  instances go unreported.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pavan Duggal, an advocate specialising in cyber security, says most  users do not come to know if there has been a breach. "Awareness is also  low among consumers about the legal recourse available in case their  data has been compromised," he adds. Unlike in the West, lack of a  proper data protection and privacy law in India is to be blamed for  this. "Companies, too, are inclined not to report such instances as they  fear being negatively impacted in the market," he points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case of a breach, a user can contact the adjudicating officer, which  is the state infotech secretary, for legal recourse. However, the onus  is on the user to prove the breach. In the US, a consumer can get a  subpoena (court order) issued against a company that makes it duty bound  to provide details of the breach. "In India, the regime is too lax. It  is very difficult to notify the government," says Sunil Abraham,  executive director of the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There are stringent compliance requirements in countries such as the US. The laws in India need to come tougher if we want companies to become more serious about this," adds Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;eBay has advised consumers, many of whom could be Indians, to immediately change their passwords. While people  tend to use the same password across many sites, emails and phones  numbers act as verifying tools for several financial transactions and  could be misused. Moreover, unlike India, the US does not require  additional authentication apart from credit card and CVV number, which  makes transactions slightly more vulnerable. "It may be a good idea to  include a one-time password as a security layer," says Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over 200 million Indians are online. The Indian &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=E-commerce" target="_blank"&gt;e-commerce&lt;/a&gt; market is estimated at $2 billion (Rs 12,000 crore) and is expected to cross $20 billion over the next four years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There is no such thing as 100 per cent protection in the digital world.  The choice is between transacting online or not," says Akhilesh Tuteja,  executive director of consulting firm KPMG. "Technology is becoming so  sophisticated that what was good yesterday is not good today." A bigger  dialogue is needed on people treating theft of digital assets just as  they would physical assets, he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The last big breach was reported at software maker Adobe Systems in  October 2013, when it was uncovered that hackers accessed about 152  million user accounts. Last December Target said some 40 million payment  card numbers and another 70 million customer records were hacked into.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police'&gt;https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-06-04T07:56:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas">
    <title>Students lead the way with apps for ideas</title>
    <link>https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas</link>
    <description>
        &lt;b&gt;At 1am, the lights are still on in 15-year-old Pratik's room at his house on 80 Feet Road, Indiranagar. The NPS-Koramangala student is busy typing code on his laptop for his latest app called Resolve.&lt;/b&gt;
        &lt;p&gt;The article &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/bangalore/Students-lead-the-way-with-apps-for-ideas/articleshow/35399402.cms"&gt;published in the Times of India&lt;/a&gt; on May 21, 2014 quotes Nishant Shah.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT" style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pratik epitomizes Gen X. Coding and decoding, these school children, barely into their teens, are developing apps drawing attention worldwide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I learnt coding by myself with the help of the internet. The world wants things simplified and that's why apps are a hit. The first app I made was a calculator because my dad was unhappy with the one on his phone. My work was initially rejected, but I knew that would happen. But I continued working. When I went to a Microsoft conference, they told me youngsters have ideas to change the world and we have the time," said Pratik.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He was felicitated with a Nokia Lumia 1520 at the Windows Azure Conference 2014 for his work in developing apps for Windows and Windows Phone store.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rahul Yedida, a Class 12 student at the National Centre for Excellence, has around 18,000 downloads for the app he and his friend created. "I wasn't too happy with the amount of Maths homework. I started wondering whether an app could do it. At the same time, I had learnt a new language and wanted to test my skills. That's how I started working on it," said Rahul.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Programming is fun. Seeing a computer work the way you want it to gives you special joy," said Vaisakh M, Rahul's co-developer. They sent a letter to Bill Gates about the app and got a reply lauding their achievement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Quote hanger&lt;br /&gt;&lt;/b&gt;* During my free time, I read about programming which helps me when I write programs. My friends in the colony join me when I watch videos about it. They do programs in other languages. I play games and used to wonder how they're made. My dad promised to get me a laptop if I start programming and that's how it started.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Thrisha Mohan| 12, Vidyashilp Academy, now working on a jewellery app&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;* Apps are the cool things to do now. With the kind of access possible thanks to smart phones, they have gone to the masses. I wouldn't be surprised at the number of apps being created. When an app is created in a college dormitory, 1,000 students in the college will download it. That's instant gratification. The ecosystem is such that with social networking sites, you become an instant hero. The question is: How many can be successful and have a long life?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;S Sadagopan | director, IIIT-B&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;* Apps are more relevant for those growing up with interfaces which are mobile and wearable. We also need to realise there is a growing generation of people whose first point of access to the digital as well as to the connected worlds of the internet is through mobile devices. And apps are a natural way of interaction. It is a positive trend because it allows users to think of themselves not only as 'users' but as active producers of the digital world. They look beyond platforms made available by multi-national companies or private enterprises, and it allows them to build communities of interaction and learning between them. We need to make sure they are safe and not susceptible to invasive presence of others who might exploit their presence on the web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Nishant Shah | director- research, The Centre for Internet and Society&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas'&gt;https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-28T09:24:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy">
    <title>Legislating for Privacy - Part II</title>
    <link>https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy</link>
    <description>
        &lt;b&gt;Apart from the conflation of commercial data protection and privacy, the right to privacy bill has ill-informed and poorly drafted provisions to regulate surveillance.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://www.thehoot.org/web/freetracker/storynew.php?storyid=570&amp;amp;sectionId=10"&gt;published in the Hoot&lt;/a&gt; on May 20, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Emblem.png" alt="Emblem" class="image-inline" title="Emblem" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In October 2010, the Department of Personnel and Training ("DOPT") of the Ministry of Personnel, Public Grievances and Pensions released an ‘Approach Paper’ towards drafting a privacy law for India. The Approach Paper claims to be prepared by a leading Indian corporate law firm that, to the best of my knowledge, has almost no experience of criminal procedure or constitutional law. The Approach Paper resulted in the drafting of a Right to Privacy Bill, 2011 ("DOPT Bill") which, although it has suffered several leaks, has neither been published for public feedback nor sent to the Cabinet for political clearance prior to introduction in Parliament.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Approach Paper and DOPT Bill&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first article in this two-part series broadly examined the many legal facets of privacy. Notions of privacy have long informed law in common law countries and have been statutorily codified to protect bodily privacy, territorial or spatial privacy, locational privacy, and so on. These fields continue to evolve and advance; for instance, the legal imperative to protect intimate body privacy from violation has now expanded to include biometric information, and the protection given to the content of personal communications that developed over the course of the twentieth century is now expanding to encompass metadata and other ‘information about information’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Approach Paper suffers from several serious flaws, the largest of which is its conflation of commercial data protection and privacy. It ignores the diversity of privacy law and jurisprudence in the common law, instead concerning itself wholly with commercial data protection. This creates a false equivalency, albeit not one that cannot be rectified by re-naming the endeavour to describe commercial data protection only.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there are other errors. The paper claims that no right of action exists for privacy breaches between citizens inter se. This is false, the civil wrongs of nuisance, interference with enjoyment, invasion of privacy, and other similar torts and actionable claims operate to redress privacy violations. In fact, in the case of Ratan Tata v. Union of India that is currently being heard by the Supreme Court of India, at least two parties are arguing that privacy is already adequately protected by civil law. Further, the criminal offences of nuisance and defamation, amongst others, and the recently introduced crimes of stalking and voyeurism, all create rights of action for privacy violations. These measures are incomplete, – this is not contested, the premise of these articles is the need for better privacy protection law – but denying their existence is not useful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The shortcomings of the Approach Paper are reflected in the draft legislation it resulted in. A major concern with the DOPT Bill is its amateur treatment of surveillance and interception of communications. This is inevitable for the Approach Paper does not consider this area at all although there is sustained and critical global and national attention to the issues that attend surveillance and communications privacy. For an effort to propose privacy law, this lapse is quite astonishing. The Approach Paper does not even examine if Parliament is competent to regulate surveillance, although the DOPT Bill wades into this contested turf.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Constitutionality of Interceptions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In a federal country, laws are weighed by the competence of their legislatures and struck down for overstepping their bounds. In India, the powers to legislate arise from entries that are contained in three lists in Schedule VII of the Constitution. The power to legislate in respect of intercepting communications traditionally emanates from Entry 31 of the Union List, which vests the Union – that is, Parliament and the Central Government – with the power to regulate “Posts and telegraphs; telephones, wireless, broadcasting and other like forms of communication” to the exclusion of the States. Hence, the Indian Telegraph Act, 1885, and the Indian Post Office Act, 1898, both Union laws, contain interception provisions. However, after holding the field for more than a century, the Supreme Court overturned this scheme in Bharat Shah’s case in 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The case challenged the telephone interception provisions of the Maharashtra Control of Organised Crime Act, 1999 ("MCOCA"), a State law that appeared to transgress into legislative territory reserved for the Union. The Supreme Court held that Maharashtra’s interception provisions were valid and arose from powers granted to the States – that is, State Assemblies and State Governments – by Entries 1 and 2 of the State List, which deal with “public order” and “police” respectively. This cleared the way for several States to frame their own communications interception regimes in addition to Parliament’s existing laws. The question of what happens when the two regimes clash has not been answered yet. India’s federal scheme anticipates competing inconsistencies between Union and State laws, but only when these laws derive from the Concurrent List which shares legislative power. In such an event, the ‘doctrine of repugnancy’ privileges the Union law and strikes down the State law to the extent of the inconsistency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In competitions between Union and State laws that do not arise from the Concurrent List but instead from the mutually exclusive Union and State Lists, the ‘doctrine of pith and substance’ tests the core substance of the law and traces it to one the two Lists. Hence, in a conflict, a Union law the substance of which was traceable to an entry in the State List would be struck down, and vice versa.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the doctrine permits incidental interferences that are not substantive. For example, as in a landmark 1946 case, a State law validly regulating moneylenders may incidentally deal with promissory notes, a Union field, since the interference is not substantive. Since surveillance is a police activity, and since “police” is a State subject, care must be taken by a Union surveillance law to remain on the pale of constitutionality by only incidentally affecting police procedure. Conversely, State surveillance laws were required to stay clear of the Union’s exclusive interception power until Bharat Shah’s case dissolved this distinction without answering the many questions it threw up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the creation of the Republic, India’s federal scheme was premised on the notion that the Union and State Lists were exclusive of each other. Conceptually, the Union and the States could not have competing laws on the same subject. But Bharat Shah did just that; it located the interception power in both the Lists and did not enunciate a new doctrine to resolve their (inevitable) future conflict. This both disturbs Indian constitutional law and goes to the heart of surveillance and privacy law.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Three Principles of Interception&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Apart from the important questions regarding legislative competence and constitutionality, the DOPT Bill proposed weak, ill-informed, and poorly drafted provisions to regulate surveillance and interceptions. It serves no purpose to further scrutinise the 2011 DOPT Bill. Instead, at this point, it may be constructive to set out the broad contours of a good interceptions regulation regime. Some clarity on the concepts: intercepting communications means capturing the content and metadata of oral and written communications, including letters, couriers, telephone calls, facsimiles, SMSs, internet telephony, wireless broadcasts, emails, and so on. It does not include activities such visual capturing of images, location tracking or physical surveillance; these are separate aspects of surveillance, of which interception of communications is a part.&lt;br /&gt; &lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;Firstly&lt;/span&gt;, all interceptions of communications must be properly sanctioned. In India, under Rule 419A of the Indian Telegraph Rules, 1951, the Home Secretary – an unelected career bureaucrat, or a junior officer deputised by the Home Secretary – with even lesser accountability, authorises interceptions. In certain circumstances, even senior police officers can authorise interceptions. Copies of the interception orders are supposed to be sent to a Review Committee, consisting of three more unelected bureaucrats, for bi-monthly review. No public information exists, despite exhaustive searching, regarding the authorisers and numbers of interception orders and the appropriateness of the interceptions.&lt;br /&gt; &lt;br /&gt;The Indian system derives from outdated United Kingdom law that also enables executive authorities to order interceptions. But, the UK has constantly revisited and revised its interception regime; its present avatar is governed by the Regulation of Investigatory Powers Act, 2000 ("RIPA") which creates a significant oversight mechanism headed by an independent commissioner, who monitors interceptions and whose reports are tabled in Parliament, and quasi-judicially scrutinised by a tribunal comprised of judges and senior independent lawyers, which hears public complaints, cancels interceptions, and awards monetary compensation. Put together, even though the current UK interceptions system is executively sanctioned, it is balanced by independent and transparent quasi-judicial authorities.&lt;br /&gt; &lt;br /&gt;In the United States, all interceptions are judicially sanctioned because American constitutional philosophy – the separation of powers doctrine – requires state action to be checked and balanced. Hence, ordinary interceptions of criminals’ communications as also extraordinary interceptions of perceived national security threats are authorised only by judges, who are ex hypothesi independent, although, as the PRISM affairs teaches us, independence can be subverted. In comparison, India’s interception regime is incompatible with its democracy and must be overhauled to establish independent and transparent authorities to properly sanction interceptions.&lt;br /&gt; &lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;Secondly&lt;/span&gt;, no interceptions should be sanctioned but upon ‘probable cause’. Simply described, probable cause is the standard that convinces a reasonable person of the existence of criminality necessary to warrant interception. Probable case is an American doctrine that flows from the US Constitution’s Fourth Amendment that protects the rights of people to be secure in places in which they have a reasonable expectation of privacy. There is no equivalent standard in UK law, except perhaps the common law test of reasonability that attaches to all government action that abridges individual freedoms. If a coherent ‘reasonable suspicion’ test could be coalesced from the common law, I think it would fall short of the strictness that the probable cause doctrine imposes on the executive. Therefore, the probable cause requirement is stronger than ordinary constraint of reasonability but weaker than the standard of reasonable doubt beyond which courts may convict. In this spectrum of acceptable standards, India’s current law in section 5(2) of the Indian Telegraph Act, 1885 is the weakest for it permits interceptions merely “on the occurrence of any public emergency or in the interest of public safety”, which determination is left to the “satisfaction” of a bureaucrat. And, under Rule 419A(2) of the Telegraph Rules, the only imposition on the bureaucrat when exercising this satisfaction is that the order “contain reasons” for the interception.&lt;br /&gt; &lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;Thirdly&lt;/span&gt;, all interceptions should be warranted. This point refers not to the necessity or otherwise of the interception, but to the framework within which it should be conducted. Warrants should clearly specify the name and clear identity of the person whose communications are sought to be intercepted. The target person’s identity should be linked to the specific means of communication upon which the suspected criminal conversations take place. Therefore, if the warrant lists one person’s name but another person’s telephone number – which, because of the general ineptness of many police forces, is not uncommon – the warrant should be rejected and the interception cancelled. And, by extension, the specific telephone number, or email account, should be specified. A warrant against a person called Rahul Kumar, for instance, cannot be executed against all Rahul Kumars in the vicinity, nor also against all the telephones that the one specific Rahul Kumar uses, but only against the one specific telephone number that is used by the one specific Rahul Kumar. Warrants should also specify the duration of the interception, the officer responsible for its conduct and thereby liable for its abuse, and other safeguards. Some of these concerns were addressed in 2007 when the Telegraph Rules were amended, but not all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A law that fails to substantially meet the standards of these principles is liable, perhaps in the not too distant future, to be read down or struck down by India’s higher judiciary. But, besides the threat of judicial review, a democratic polity must protect the freedoms and diversity of its citizens by holding itself to the highest standards of the rule of law, where the law is just.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy'&gt;https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-05-28T09:59:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns">
    <title>National Elections 2014: How Technology Powered Campaigns</title>
    <link>https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns</link>
    <description>
        &lt;b&gt;HasGeek and the Centre for Internet and Society (CIS) welcome you to a presentation on how technology powered politicial campaigns in the recently concluded 2014 national elections. Developers, advocacy organizations and the general public are invited to participate. The event will be held at CIS on May 23, 2014, 6.00 p.m. to 8.30 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;During the 2014 Indian general elections, technology was widely used for candidate and party campaigns. The purpose of these technology-driven campaigns was to help voters make more informed decisions before casting their votes. Voter responses to these campaigns continuously helped individual candidates and political parties (via their technology teams and consultants) to rework messaging till the very end.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;HasGeek and CIS are organizing three presentations followed by an interactive Q&amp;amp;A session to understand how technology spurred campaigns during the 2014 elections, and how voters will have to get smarter just as parties are becoming smart in reaching out to them.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Sessions&lt;/h2&gt;
&lt;h3&gt;Campaigning in the pre-Internet and Internet Era (Talk)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Vijay Grover, founder of Bangalore Media Foundation and television journalist since 17 years, will compare the past and present to explain how internet technologies have changed campaigning stratgies. Grover will argue that voters need to get smart in sifting information and making choices as more and more parties use social media and information technologies in reaching out to them.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Technology-driven campaigns (Talk)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Viral Shah, part of Nandan Nilekani's campaign management team, will talk about how India is placed in the global scene with respect to technology-driven political campaigns. Viral will also discuss how to design a campaign with technology and how technology was used to power Nilekani's campaign.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Tools used for powering campaigns and attracting volunteers (Talk)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;BG Mahesh, founder and managing director at Oneindia.in, will talk about the tools used during Narendra Modi's campaign. Apart from informing voters about the candidate, volunteers were also enlisted through the drives. BG Mahesh will throw light on how technology made this possible.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Schedule&lt;/h2&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Sessions&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.00&lt;br /&gt;18.15&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;Introductions: HasGeek, CIS, The Fifth Elephant &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.15&lt;br /&gt;18.45&lt;/td&gt;
&lt;td&gt;Vijay Grover: Campaigning in the pre-Internet and Internet Era&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.45&lt;br /&gt;19.15&lt;/td&gt;
&lt;td&gt;Viral Shah: Technology-driven campaigning&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.15&lt;br /&gt;19.45&lt;/td&gt;
&lt;td&gt;B.G.Mahesh: Tools used for powering campaigns and attracting volunteers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.45&lt;br /&gt;20.15&lt;/td&gt;
&lt;td&gt;Q &amp;amp; A Session&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.15&lt;br /&gt;20.30&lt;/td&gt;
&lt;td&gt;Snacks&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns'&gt;https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-20T07:03:51Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-2013-iii-conceptions-of-free-speech-and-democracy">
    <title>Net Neutrality, Free Speech and the Indian Constitution – III: Conceptions of Free Speech and Democracy</title>
    <link>https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-2013-iii-conceptions-of-free-speech-and-democracy</link>
    <description>
        &lt;b&gt;In this 3 part series, Gautam Bhatia explores the concept of net neutrality in the context of Indian law and the Indian Constitution.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the modern State, effective exercise of free speech rights is increasingly dependent upon an infrastructure that includes newspapers, television and the internet. Access to a significant part of this infrastructure is determined by money. Consequently, if what we value about free speech is the ability to communicate one’s message to a non-trivial audience, financial resources influence both &lt;i&gt;who &lt;/i&gt;can speak and, consequently, &lt;i&gt;what &lt;/i&gt;is spoken. The nature of the public discourse – what information and what ideas circulate in the public sphere – is contingent upon a distribution of resources that is arguably unjust and certainly unequal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are two opposing theories about how we should understand the right to free speech in this context. Call the first one of these the libertarian conception of free speech. The libertarian conception takes as given the existing distribution of income and resources, and consequently, the unequal speaking power that that engenders. It prohibits any intervention designed to remedy the situation. The most famous summary of this vision was provided by the American Supreme Court, when it first struck down campaign finance regulations, in &lt;a href="http://www.law.cornell.edu/supremecourt/text/424/1#writing-USSC_CR_0424_0001_ZO"&gt;&lt;i&gt;Buckley v. Valeo&lt;/i&gt;&lt;/a&gt;: &lt;i&gt;“t&lt;/i&gt;&lt;i&gt;he concept that government may restrict the speech of some [in] order to enhance the relative voice of others is wholly foreign to the First Amendment.” &lt;/i&gt;This theory is part of the broader libertarian worldview, which would restrict government’s role in a polity to enforcing property and criminal law, and views any government-imposed restriction on what people can do within the existing structure of these laws as presumptively wrong.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;We can tentatively label the second theory as the &lt;i&gt;social-democratic theory &lt;/i&gt;of free speech. This theory focuses not so much on the individual speaker’s right not to be restricted in using their resources to speak as much as they want, but upon the collective interest in maintaining a public discourse that is open, inclusive and home to a multiplicity of diverse and antagonistic ideas and viewpoints. Often, in order to achieve this goal, governments regulate access to the infrastructure of speech so as to ensure that participation is not entirely skewed by inequality in resources. When this is done, it is often justified in the name of democracy: a functioning democracy, it is argued, requires a thriving public sphere that is not closed off to some or most persons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surprisingly, one of the most powerful judicial statements for this vision also comes from the United States. In &lt;a href="http://supreme.justia.com/cases/federal/us/395/367/case.html"&gt;&lt;i&gt;Red Lion v. FCC&lt;/i&gt;&lt;/a&gt;, while upholding the “fairness doctrine”, which required broadcasting stations to cover “both sides” of a political issue, and provide a right of reply in case of personal attacks, the Supreme Court noted:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“[Free speech requires] &lt;i&gt;preserv&lt;/i&gt;[ing]&lt;i&gt; an uninhibited marketplace of ideas in which truth will ultimately prevail, rather than to countenance &lt;span style="text-decoration: underline;"&gt;monopolization of that market&lt;/span&gt;, whether it be by the Government itself or &lt;span style="text-decoration: underline;"&gt;a private licensee&lt;/span&gt;…&lt;/i&gt;&lt;i&gt; it is the right of the public to receive suitable access to social, political, esthetic, moral, and other ideas and experiences which is crucial here&lt;/i&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What of India? In the early days of the Supreme Court, it adopted something akin to the libertarian theory of free speech. In &lt;a href="http://indiankanoon.org/doc/243002/"&gt;&lt;i&gt;Sakal Papers v. Union of India&lt;/i&gt;&lt;/a&gt;, for example, it struck down certain newspaper regulations that the government was defending on grounds of opening up the market and allowing smaller players to compete, holding that Article 19(1)(a) – in language similar to what &lt;i&gt;Buckley v. Valeo &lt;/i&gt;would hold, more than fifteen years later – did not permit the government to infringe the free speech rights of some in order to allow others to speak. The Court continued with this approach in its next major newspaper regulation case, &lt;a href="http://www.indiankanoon.org/doc/125596/"&gt;&lt;i&gt;Bennett Coleman v. Union of India&lt;/i&gt;&lt;/a&gt;, but this time, it had to contend with a strong dissent from Justice Mathew. After noting that “&lt;i&gt;it is no use having a right to express your idea, unless you have got a medium for expressing it”&lt;/i&gt;, Justice Mathew went on to hold:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;What is, therefore, required is an interpretation of Article 19(1)(a) which focuses on the idea that restraining the hand of the government is quite useless in assuring free speech, if a restraint on access is effectively secured by private groups. A Constitutional prohibition against governmental restriction on the expression is effective only if the Constitution ensures an adequate opportunity for discussion… Any scheme of distribution of newsprint which would make the freedom of speech a reality by making it possible the dissemination of ideas as news with as many different facets and colours as possible would not violate the fundamental right of the freedom of speech of the petitioners. In other words, a scheme for distribution of a commodity like newsprint which will subserve the purpose of free flow of ideas to the market from as many different sources as possible would be a step to advance and enrich that freedom. If the scheme of distribution is calculated to prevent even an oligopoly ruling the market and thus check the tendency to monopoly in the market, that will not be open to any objection on the ground that the scheme involves a regulation of the press which would amount to an abridgment of the freedom of speech.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;In Justice Mathew’s view, therefore, freedom of speech is not only the speaker’s right (the libertarian view), but a complex balancing act between the listeners’ right to be exposed to a wide range of material, as well as the collective, societal right to have an open and inclusive public discourse, which can only be achieved by preventing the monopolization of the instruments, infrastructure and access-points of speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the years, the Court has moved away from the majority opinions in &lt;i&gt;Sakal Papers &lt;/i&gt;and &lt;i&gt;Bennett Coleman&lt;/i&gt;, and steadily come around to Justice Mathew’s view. This is particularly evident from two cases in the 1990s: in &lt;a href="http://indiankanoon.org/doc/921638/"&gt;&lt;i&gt;Union of India v. The Motion Picture Association&lt;/i&gt;&lt;/a&gt;, the Court upheld various provisions of the Cinematograph Act that imposed certain forms of compelled speech on moviemakers while exhibiting their movies, on the ground that “&lt;i&gt;to earmark a small portion of time of this entertainment medium for the purpose of showing scientific, educational or documentary films, or for showing news films has to be looked at in this context of &lt;/i&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;promoting dissemination of ideas, information and knowledge to the masses so that there may be an informed debate and decision making on public issues&lt;/span&gt;&lt;/i&gt;&lt;i&gt;. Clearly, the impugned provisions are designed to further free speech and expression and not to curtail it.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.indiankanoon.org/doc/304068/"&gt;&lt;i&gt;LIC v. Manubhai D. Shah&lt;/i&gt;&lt;/a&gt; is even more on point. In that case, the Court upheld a right of reply in an &lt;i&gt;in-house &lt;/i&gt;magazine, &lt;i&gt;“because fairness demanded that both view points were placed before the readers,&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;however limited be their number, to enable them to draw their own conclusions and unreasonable&lt;/span&gt;&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;because there was no logic or proper justification for refusing publication…&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;the respondent’s fundamental right of speech and expression clearly entitled him to insist that his views on the subject should reach those who read the magazine so that they have a complete picture before them and not a one sided or distorted one&lt;/i&gt;…” This goes even further than Justice Mathew’s dissent in &lt;i&gt;Bennett Coleman&lt;/i&gt;, and the opinion of the Court in &lt;i&gt;Motion Picture Association&lt;/i&gt;, in holding that not merely is it permitted to structure the public sphere in an equal and inclusive manner, but that it is a &lt;i&gt;requirement &lt;/i&gt;of Article 19(1)(a).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We can now bring the threads of the separate arguments in the three posts together. In the first post, we found that public law and constitutional obligations can be imposed upon private parties when they discharge public functions. In the second post, it was argued that the internet has replaced the park, the street and the public square as the quintessential forum for the circulation of speech. ISPs, in their role as gatekeepers, now play the role that government once did in controlling and keeping open these avenues of expression. Consequently, they can be subjected to public law free speech obligations. And lastly, we discussed how the constitutional conception of free speech in India, that the Court has gradually evolved over many years, is a social-democratic one, that requires the keeping open of a free and inclusive public sphere. &lt;a href="http://motherboard.vice.com/read/net-neutrality-monopoly-and-the-death-of-the-democratic-internet?trk_source=homepage-lede"&gt;And if there is one thing that fast-lanes over the internet threaten, it is certainly a free and inclusive (digital) public sphere&lt;/a&gt;. A combination of these arguments provides us with an arguable case for imposing obligations of net neutrality upon ISPs, even in the absence of a statutory or regulatory obligations, grounded within the constitutional guarantee of the freedom of speech and expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;For the previous post, please see: http://cis-india.org/internet-governance/blog/-neutrality-free-speech-and-the-indian-constitution-part-2.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;_____________________________________________________________________________________________________&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;i style="text-align: justify; "&gt;Gautam Bhatia — @gautambhatia88 on Twitter — is a graduate of the National Law School of India University (2011), and presently an LLM student at the Yale Law School. He blogs about the Indian Constitution at &lt;a class="moz-txt-link-freetext" href="http://indconlawphil.wordpress.com/"&gt;http://indconlawphil.wordpress.com&lt;/a&gt;. Here at CIS, he will be blogging on issues of online freedom of speech and expression.&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-2013-iii-conceptions-of-free-speech-and-democracy'&gt;https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-2013-iii-conceptions-of-free-speech-and-democracy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gautam</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-27T10:21:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/future-of-cyber-governance">
    <title>The Future of Cyber Governance </title>
    <link>https://cis-india.org/news/future-of-cyber-governance</link>
    <description>
        &lt;b&gt;Hague Institute for Global Justice in association with the Observer Research Foundation, Ministry of Foreign Affairs of Netherlands, and the Netherlands Institute for International Relations - Clingendael organized a conference on the Future of Cyber Governance at the Hague from May 13 to 15, 2014. Sunil Abraham was a speaker at this event.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Global Governance Reform Initiative&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Global Governance Reform Initiative (GGRI) seeks to overcome the challenges of global governance in three important domains – cyberspace, oceans and migration – by improving the efficiency, effectiveness and legitimacy of collective actions undertaken by relevant stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The current focus of the GGRI is the governance of cyberspace. How cyberspace is governed has significant implications for a range of critical issues, from national security to the protection of individuals’ rights and freedoms. Yet, the governance of cyberspace is highly contested. Tensions exist between those who favour private sector-led, decentralized forms of governance, and those who favour state-led, centralized forms of governance. There is, therefore, a pressing need for practicable policies which can help balance competing demands effectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The conference is a platform for 17 outstanding academics and professionals representing a range of countries and sectors to present papers addressing key issues related to the governance of cyberspace. The authors were selected through a competitive application process which sought to balance the candidates’ professional and geographic backgrounds in a manner that would maximize the quality and policy-relevance of the research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the conference, the participants will present their papers to a select group of seasoned experts on cyber governance. These experts will provide the participants with constructive feedback on their research findings and policy recommendations. The aim of the conference is to allow the participants to engage in a rigorous analysis of the selected governance challenges in order to craft practicable policy recommendations aimed at improving the governance of cyberspace. The authors of the best papers will be invited to present their work at the 2014 India Conference on Cyber Security and Cyber Governance, organized by the Observer Research Foundation, New Delhi.&lt;br /&gt;The Hague Institute undertakes this project in collaboration with the Netherlands Ministry of Foreign Affairs, the Observer Research Foundation (New Delhi), and the Netherlands Institute of International Relations – Clingendael.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;See the &lt;a href="https://cis-india.org/internet-governance/blog/global-governance-reform-initiative.pdf" class="internal-link"&gt;full details of the programme here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/dblYECIVHs8" width="360"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/future-of-cyber-governance'&gt;https://cis-india.org/news/future-of-cyber-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-27T10:05:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/harvard-university-may-13-2014-does-size-matter">
    <title>Does Size Matter? A Tale of Performing Welfare, Producing Bodies and Faking Identity</title>
    <link>https://cis-india.org/news/harvard-university-may-13-2014-does-size-matter</link>
    <description>
        &lt;b&gt;Malavika Jayaram gave a talk.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cyber.law.harvard.edu/events/luncheon/2014/05/jayaram"&gt;This was published by the website of Berkman Center for Internet and Society&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Big Data doesn’t get much bigger than India’s identity project. The world’s largest biometric database - currently consisting of almost 600 million enrolled - seduces with promises of inclusion, legitimacy and visibility. By locating this techno-utopian vision within the larger surveillance state that a unique identifier facilitates, Malavika will describe the ‘welfare industrial complex’ that imagines the poor as the next emerging market. She will highlight the risks of the body as password, of implementing e-governance in a legal vacuum, and of digitization reinforcing existing inequalities. The export of technologies of control - once they have been tested on a massive population that has little agency and limited ability to withhold consent - transforms this project from a site of local activism to one with global repercussions. By offering a perspective that is somewhat different from the traditional western focus of privacy, she hopes to generate a more inclusive discourse about what it means to be autonomous and empowered in the face of paternalistic development projects. She will highlight, in particular, the varied ways in which the project is already being subverted and re-purposed, in ways that are humorous and poignant.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;About Malavika&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Malavika is a Fellow at the Berkman Center for Internet and Society at  Harvard University, focusing on privacy, identity and free expression.  She is also a Fellow at the Centre for Internet and Society, Bangalore,  and the author of the India chapter for the Data Protection &amp;amp;  Privacy volume in the Getting the Deal Done series. Malavika is one of  10 Indian lawyers in The International Who's Who of Internet e-Commerce  &amp;amp; Data Protection Lawyers directory. In August 2013, she was voted  one of India’s leading lawyers - one of only 8 women to be featured in  the “40 under 45” survey conducted by Law Business Research, London. In a  different life, she spent 8 years in London, practicing law with global  firm Allen &amp;amp; Overy in the Communications, Media &amp;amp; Technology  group, and as VP and Technology Counsel at Citigroup. She is working on a  PhD about the development of a privacy jurisprudence and discourse in  India, viewed partly through the lens of the Indian biometric ID  project.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Podcast&lt;/h3&gt;
&lt;p&gt;Watch the podcast &lt;a class="external-link" href="http://castroller.com/podcasts/BerkmanCenterFor/4060529"&gt;at this link&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/harvard-university-may-13-2014-does-size-matter'&gt;https://cis-india.org/news/harvard-university-may-13-2014-does-size-matter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-04T09:45:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
