<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1771 to 1785.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/wsis-high-level-event-open-consultation-process"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-may-25-2014-purnima-sharma-digital-death-log-off-in-peace"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-2013-iii-conceptions-of-free-speech-and-democracy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/future-of-cyber-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/harvard-university-may-13-2014-does-size-matter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-may-6-2014-laxmi-ajai-prasanna-civil-society-pushes-for-privacy-panel"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/wsis-high-level-event-open-consultation-process">
    <title>WSIS+10 High-Level Event: Open Consultation Process</title>
    <link>https://cis-india.org/news/wsis-high-level-event-open-consultation-process</link>
    <description>
        &lt;b&gt;Jyoti Panday represented the Centre for Internet and Society (CIS) at the WSIS+10 High-Level Event:Open Consultation Process held in Geneva from May 28 to 31, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Fifth Physical Meeting marked Phase Six of the Open Consultation Process for the WSIS+10 High-Level Event (HLE) to be held in Geneva from June 10 to 13, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting saw the culmination of the multistakeholder review process on the WSIS+10 Statement on the Implementation of the WSIS Outcomes and the WSIS+10 Vision for WSIS Beyond 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS made interventions on text related to increasing women's participation, freedom of expression, media rights, data privacy, network security and human rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS also endorsed text on action line 'Media' which reaffirmed committment to freedom of expression, data privacy and media rights offline and online including protection of sources, publishers and journalists.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/wsis-final-agreed-draft.pdf" class="internal-link"&gt;Download the final agreed draft&lt;/a&gt; of the WSIS+10 Statement on the Implementation of WSIS Outcomes that will be deliberated upon and agreed at the HLE, for your reference.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/wsis-high-level-event-open-consultation-process'&gt;https://cis-india.org/news/wsis-high-level-event-open-consultation-process&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-04T10:14:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age">
    <title>Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India</title>
    <link>https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age</link>
    <description>
        &lt;b&gt;The development of information technology has transformed the way in which individuals make everyday transactions and communicate with the world around us. These interactions and transactions are recorded and stored – constantly available for access by the individual and the company through which the service was used.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;For example, the ubiquitous smartphone, above and beyond a communication device, is a device which can maintain a complete record of the communications data, photos, videos and documents, and a multitude of other deeply personal information, like application data which includes location tracking, or financial data of the user. As computers and phones increasingly allow us to keep massive amounts of personal information accessible at the touch of a button or screen (a standard smartphone can hold anything between 500 MB to 64 GB of data), the increasing reliance on computers as information-silos also exponentially increases the harms associated with the loss of control over such devices and the information they contain. This vulnerability is especially visceral in the backdrop of law enforcement and the use of coercive state  power to maintain security, juxtaposed with the individual’s right to secure their privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;American Law - The Fourth Amendment Protection against Unreasonable Search and Seizure&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The right to conduct a search and seizure of persons or places is an essential part of investigation and the criminal justice system. The societal interest in maintaining security is an overwhelming consideration which gives the state a restricted mandate to do all things necessary to keep law and order, which includes acquiring all possible information for investigation of criminal activities, a restriction which is based on recognizing the perils of state-endorsed coercion and its implication on individual liberty. Digitally stored information, which is increasingly becoming a major site of investigative information, is thus essential in modern day investigation techniques. Further, specific crimes which have emerged out of the changing scenario, namely, crimes related to the internet, require investigation almost exclusively at the level of digital evidence. The role of courts and policy makers, then, is to balance the state’s mandate to procure information with the citizens’ right to protect it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The scope of this mandate is what is currently being considered before the Supreme Court of the United States, which begun hearing arguments in the cases Riley v. California,&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;and United States v Wurie,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;on the 29&lt;sup&gt;th&lt;/sup&gt; of April, 2014. At issue is the question of whether the police should be allowed to search the cell phones of individuals upon arrest, without obtaining a specific warrant for such search. The cases concern instances where the accused was arrested on account of a minor infraction and a warrantless search was conducted, which included the search of cell phones in their possession. The information revealed in the phones ultimately led to the evidence of further crimes and the conviction of the accused of graver crimes. The appeal is for a suppression of the evidence so obtained, on grounds that the search violates the Fourth Amendment of the American Constitution. Although there have been a plethora of conflicting decisions by various lower courts (including the judgements in &lt;i&gt;Wurie &lt;/i&gt;and &lt;i&gt;Riley&lt;/i&gt;),&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;the Federal Supreme Court will be for the first time deciding upon the issue of whether cell phone searches should require a higher burden under the Fourth Amendment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the core of the issue are considerations of individual privacy and the right to limit the state’s interference in private matters. The fourth amendment in the Constitution of the United States expressly grants protection against unreasonable searches and seizure,&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;however, without a clear definition of what is unreasonable, it has been left to the courts to interpret situations in which the right to non-interference would trump the interests of obtaining information in every case, leading to vast and varied jurisprudence on the issue. The jurisprudence stems from the wide fourth amendment protection against unreasonable government interference, where the rule is generally that any &lt;i&gt;warrantless &lt;/i&gt;search is unreasonable, unless covered by certain exceptions. The standard for the protection under the Fourth Amendment is a subjective standard, which is determined as per the state of the bind of the individual, rather than any objective qualifiers such as physical location; and extends to all situations where individuals have a &lt;i&gt;reasonable expectation of privacy&lt;/i&gt;, i.e., situations where individuals can legitimately expect privacy, which is a subjective test, not purely dependent upon the physical space being searched.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore, the requirement of reasonableness is generally only fulfilled when a search is conducted subsequent to obtaining a warrant from a &lt;i&gt;neutral magistrate, &lt;/i&gt;by demonstrating &lt;i&gt;probable cause &lt;/i&gt;to believe that evidence of any unlawful activity would be found upon such search. A warrant is, therefore, an important limitation on the search powers of the police. Further, the protection excludes roving or general searches and requires &lt;i&gt;particularity &lt;/i&gt;of the items to be searched&lt;i&gt;.&lt;/i&gt; The restriction derives its power from the exclusionary rule, which bars evidence obtained through unreasonable search or seizure, obtained directly or through additional warrants based upon such evidence, from being used in subsequent prosecutions. However, there have evolved several exceptions to the general rule, which includes cases where the search takes place upon the lawful arrest of an accused, a practice which is justified by the possibility of hidden weapons upon the accused or of destruction of important evidence.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The appeal, if successful, would provide an exception to the rule that any search upon lawful arrest is always reasonable, by creating a caveat for the search of computer devices like smartphones. If the court does so, it would be an important recognition of the fact that evolving technologies have transmuted the concept of privacy to beyond physical space, and legal rules and standards that applied to privacy even twenty years ago, are now anachronistic in an age where individuals can record their entire lives on an iPhone. Searching a person nowadays would not only lead to the recovery of calling cards or cigarettes, but phones and computers which can be the digital record of a person’s life, something which could not have been contemplated when the laws were drafted. Cell phone and computer searches are the equivalent of searches of thousands of documents, photos and personal records, and the expectation of privacy in such cases is much higher than in regular searches. Courts have already recognized that cell phones and laptop computers are objects in which the user may have a reasonable expectation of privacy by making them analogous to a “closed container” which the police cannot search and hence coming under the protection of the Fourth Amendment.&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, cell phones and computers also hold data which could be instrumental in investigating criminal activity, and with technologies like remote wipes of computer data available, such data is always at the risk of destruction if delay is occurred upon the investigation. As per the oral arguments, being heard now, the Court seems to be carving out a specific principle applicable to new technologies. The Court is likely to introduce subtleties specific to the technology involved – for example, it may seek to develop different principles for smartphones (at issue in &lt;i&gt;Riley) &lt;/i&gt;and the more basic kind of cell-phones (at issue in &lt;i&gt;Wurie&lt;/i&gt;), or it may recognize that only certain kinds of information may be accessed,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;or may even evolve a rule that would allow seizure, but not a search, of the cell phone before a search warrant can be obtained.&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;Recognizing that transformational technology needs to be reflected in technology-specific legal principles is an important step in maintaining a synchronisation between law and technology and the additional recognition of a higher threshold adopted for digital evidence and privacy would go a long way in securing digital privacy in the future.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Search and Seizure in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Indian jurisprudence on privacy is a wide departure from that in the USA. Though it is difficult to strictly compartmentalize the many facets of the right to privacy, there is no express or implicit mention of such a right in the Indian Constitution. Although courts have also recognized the importance of procedural safeguards in protecting against unreasonable governmental interference, the recognition of the intrinsic right to privacy as non-interference, which may be different from the instrumental rights that criminal procedure seeks to protect (such as misuse of police power), is sorely lacking. The general law providing for the state’s power of search and seizure of evidence is found in the Code of Criminal Procedure, 1973.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 93 provides for the general procedure of search. Section 93 allows for a magistrate to issue a warrant for the search of any “document or thing”, including a warrant for general search of an area, where it believes it is required for the purpose of investigation. The &lt;i&gt;particularity &lt;/i&gt;of the search warrant is not a requirement under S. 93(2), and hence a warrant may be for general or roving search of a place. Section 100, which further provides for the search of a closed place, includes certain safeguards such as the presence of witnesses and the requirement of a warrant before a police officer may be allowed ingress into the closed place. However, under S. 165 and S. 51 of the code, the requirements of a search warrant are exempted. S. 165 dispenses with the warrant requirement and provides for an &lt;i&gt;officer in charge&lt;/i&gt; &lt;i&gt;of a police station, &lt;/i&gt;or any other officer duly authorized by him,&lt;i&gt; &lt;/i&gt;to conduct the search of any place as long as he has &lt;i&gt;reasonable grounds&lt;/i&gt; to believe that such search would be for the purpose of an investigation and a belief that a search warrant cannot be obtained without &lt;i&gt;undue delay&lt;/i&gt;. Further, the officer conducting such search must &lt;i&gt;as far as possible&lt;/i&gt; note down the reasons for such belief in writing prior to conducting the search. Section 51 provides another express exception to the requirement of search warrants, by allowing the search of a person arrested lawfully provided that the arrested person &lt;i&gt;may not or cannot be admitted to bail&lt;/i&gt;, and requires any such seized items to be written in a search memo. As long as these conditions are fulfilled, the police has an unqualified authority to search a person upon arrest. Therefore, where the arrestee can be admitted to bail as per the warrant, or, in cases of warrantless arrest, as per the law, the search and seizure of such person may not be regular, and the evidence so collected would be subject to greater scrutiny by the court. However, besides these minimal protections, there is no additional procedural protection of individual privacy, and the search powers of the police are extremely wide and discretionary. In fact, there is a specific absence of the exclusionary rule as a protection as well, which means that, unlike under the Fourth Amendment, the non-compliance with the procedural requirements of search &lt;i&gt;would not by itself vitiate the proceedings&lt;/i&gt; or suppress the evidence so found, but would only amount to an irregularity which must be simply another factor considered in evaluating the evidence.&lt;a href="#fn10" name="fr10"&gt;[10] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The extent of the imputation of the Fourth Amendment protection against unreasonable governmental interference in the Indian constitution is also uncertain. A direct imputation of the Fourth Amendment into the Indian Constitution has been disregarded by the Supreme Court.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt;Though the allusions to the Fourth Amendment have mostly been invoked on facts where unreasonable intrusions &lt;i&gt;into the homes&lt;/i&gt; of persons were challenged, the indirect imputation of the right to privacy into the right under Article 21 of the Constitution, invoking the right to privacy as a right to non-interference and a right to live with dignity, would suggest that the considerations for privacy under the Constitution are not merely objective, or physical, but depend on the subjective facts of the situation, i.e. its effect on the right to live with dignity (analogous to the reasonable expectation of privacy test laid down in &lt;i&gt;Katz&lt;/i&gt;).&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; Further, the court has specifically struck down provisions for search and seizure which confer particularly wide and discretionary powers on the executive without judicial scrutiny, holding that searches must be subject to the doctrine of proportionality, and that a provision &lt;i&gt;probable cause &lt;/i&gt;to effect any search.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;The Fourth Amendment protection against unreasonable interference in private matters by the state is a useful standard to assess privacy, since it imputes a concept of privacy as an intrinsic right as well as an instrumental one, i.e. privacy as non-interference is a good in itself, notwithstanding the rights it helps achieve, like the freedom of movement or speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regarding digital privacy in particular, Indian law and policy has failed to stand up to the challenges that new technologies pose to privacy and has in fact been regressive, by engaging in surveillance of communications and by allowing governmental access to digital records of online communications (including emails, website logs, etc.) without judicial scrutiny and accountability.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; In an age of transformative technology and of privacy being placed at a much greater risk, laws which were once deemed reasonable are now completely inadequate in guaranteeing freedom and liberty as encapsulated by the right to privacy. The disparity is even more pronounced in cases of investigation of cyber-crimes which rely almost exclusively on digital evidence, such as those substantively enumerated under the Information Technology Act, but investigated under the general procedure laid down in the Code of Criminal Procedure, which is already mentioned. The procedures for investigation of cyber-crimes and the search and seizure of digital evidence require special consideration and must be brought in line with changing norms. Although S.69 and 69B lay down provisions for investigation of certain crimes,&lt;a href="#fn15" name="fr15"&gt;[15] &lt;/a&gt;which requires search upon an order by &lt;i&gt;competent authority,&lt;/i&gt; i.e. the Secretary to the Department of IT in the Government of India, the powers of search and seizure are also present in several other rules, such as rule 3(9) of the Information Technology (Due diligence observed by intermediaries guidelines) Rules, 2011 which allows access to information from intermediaries by a simple written order by &lt;i&gt;any agency or person who are lawfully authorised for investigative, protective, cyber security or intelligence activity&lt;/i&gt;; or under rule 6 of the draft Reasonable Security Practices Rules, 2011 framed under Section 43A of the Information Technology Act, where &lt;i&gt;any government agency &lt;/i&gt;may, for the prevention, detection, investigation, prosecution, and punishment of offences, obtain any personal data from an intermediate “body corporate” which stores such data. The rules framed for investigation of digital evidence, therefore, do not inspire much confidence where safeguarding privacy is concerned. In the absence of specific guidelines or amendments to the procedures of search and seizure of digital evidence, the inadequacies of applying archaic standards leads to unreasonable intrusions of individual privacy and liberties – an incongruity which requires remedy by the courts and legislature of the country.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;a class="external-link" href="http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-132_h315.pdf"&gt;http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-132_h315.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a class="external-link" href="http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-212_86qd.pdf"&gt;http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-212_86qd.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. In Wurie, the motion to supress was allowed, while in Riley it was denied. Also see US v Jacob Finley, US v Abel Flores-Lopez where the motion to suppress was denied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. The Fourth Amendment to the Constitution of the United States of America: &lt;i&gt;"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Katz v United States, 389 U.S. 347, 352 (1967).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Stephen Saltzer, American Criminal Procedure&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. United States v Chan, 830 F. Supp. 531,534 (N.D. Cal. 1993).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. A factor considered in &lt;i&gt;US v Abel Flores-Lopez, &lt;/i&gt;where the court held that the search of call history in a cell phone did not constitute a sufficient infringement of privacy to require the burden of a warrant.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. The decision in Smallwood v. Florida, No. SC11-1130, before the Florida Supreme Court, made such a distinction.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. State Of Maharashtra v. Natwarlal Damodardas Soni, AIR 1980 SC 593; Radhakrishnan v State of UP, 1963 Supp. 1 S.C.R. 408&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. M.P. Sharma v Satish Chandra, AIR 1954 SC 300&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Kharak Singh v State of UP, (1964) 1 SCR 332; Gobind v State of Madhya Pradesh, 1975 AIR 1378&lt;/p&gt;
&lt;p class="Footnote" style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. &lt;i&gt;District Registrar and Collector&lt;/i&gt; v. &lt;i&gt;Canara Bank, &lt;/i&gt;AIR 2005 SC 186&lt;i&gt;, &lt;/i&gt;which related to S.73 of the Andhra Pradesh Stamps Act which allowed ‘any person’ to enter into ‘any premises’ for the purpose of conducting a search.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. S. 69 and 69B of the Information Technology (Amendment) Act, 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Procedures and Safeguards for Monitoring and collecting traffic data or information rules 2009, &lt;i&gt;available at &lt;/i&gt;&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009" class="external-link"&gt;http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age'&gt;https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-02T06:45:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-may-25-2014-purnima-sharma-digital-death-log-off-in-peace">
    <title>Digital death: Log off in peace</title>
    <link>https://cis-india.org/news/the-times-of-india-may-25-2014-purnima-sharma-digital-death-log-off-in-peace</link>
    <description>
        &lt;b&gt;From email and e-banking to shopping and social media sites, Indians have expanded their online footprint. Now, a small but rising number are planning for their digital death.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Purnima Sharma was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/Digital-deathLog-off-in-peace/articleshow/35579831.cms"&gt;published in the Times of India&lt;/a&gt; on May 25, 2014. Nishant Shah is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A few days after his son Yousmann's death in a road accident, Kongposh Bazaz began searching for the 19-year-old's Facebook password. "There was such an outpouring of grief on his wall that I felt the need to 'speak' to my son's friends on his behalf, telling them to be strong," he says. Facebook does not hand over access to a person's account even when they die but fortunately, Yousmann had shared his password with a close friend who gave it to Bazaz. "Like any teenager, he did not share it with his parents," says the 51-year-old publisher, revealing that while he has memorialized his son's Facebook page, he would prefer that his own online accounts were closed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As  we build our lives in a virtual world, there's a growing concern about  what happens to our online presence after death. In the West, some  people are writing out digital wills, spelling out how their virtual  life should be handled post-mortem . In India, too, a small number is  taking an interest in their digital afterlife. Sandeep Nerlekar, MD and  CEO Terentia Consultants, an estate planning firm that handles both  online (through a portal &lt;a class="smarterwiki-linkify" href="http://www.onlinewill"&gt;www.onlinewill&lt;/a&gt; .co.in) and digital wills, says, "Now, even social networking sites are becoming part of one's assets."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah, director, Research, at the Bangalore-based Centre for Internet and Society, says that though the trend is nascent, people have started including their digital accounts in their wills. "However, it is evident, that as more and more of our lives get mediated by digital devices, and as we live on the cloud, we are going to have to find legal and personal options of making sure that important data gets transmitted beyond our lives, and stored, archived and managed in responsible ways for those who find value in it."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in a country where only a small percentage writes wills for physical assets, it's not something a lot of people are thinking about proactively. Sudha Sarin, Delhi-based communications specialist, says "It doesn't get priority, like your financial assets," she says. At some point, she intends to leave a list of all her online account-ids and passwords in a place where her sons can find them easily. "This will give them access to my friends list so that they can be informed. And, in turn, let people who knew me reach out to them at such a time," she says. But she will want her family to close her accounts a couple of months after. "I wouldn't want my accounts to just sit out there. It's a way of closure," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sarin faced these questions of mortality after she lost her sister Geeta to cancer three months ago. She has decided to memorialize Geeta's Facebook page. Facebook doesn't allow family members access to data/passowords etc but kin can either delete or "memorialize" the accounts of the deceased. Sarin believes she's taken a decision her sister would have supported. "Reading her posts and seeing her pictures act like a balm - it's a catharsis of sorts," she says.&lt;br /&gt;&lt;br /&gt;American blogger Evan Caroll, who runs The Digital Beyond which talks about digital afterlife, writes that people need to start planning for what is to be done with their email, online banking and trading, social media , photo-sharing , online billpay and blogs after death. In an email interview with TOI, he suggests a simple conversation with one's heirs, using online services like SecureSafe that let users store passwords to pass along when they are gone or speaking to one's lawyer.&lt;br /&gt;&lt;br /&gt;Companies have different policies on what to do with accounts of those deceased. Last year, Google introduced a stepby-step process allowing users to plan what they want done with their account, and in some cases they provide the contents of an email account which hasn't left specific instructions after a "careful review" . Yahoo and Facebook currently have no service akin to a virtual will, but offer the option of closing down a deceased person's email accounts and social media profiles , though only after receiving verification of death. Arunav Sinha, director, corporate communications , India, China &amp;amp; South East Asia of Yahoo, says that virtual legacy planning is a personal prerogative in India today. "We can't hand over any data to anyone, as per the terms of our service. Requests for access have to come through a legal process and with the relevant documentation," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Caroll says there is no standard way in which online accounts are handled once you're gone. "People too have varied responses - while some look at it as a place to remember and grieve, others believe it's strange to continue the online profile."&lt;br /&gt;&lt;br /&gt;Rekha Aggarwal, advocate, Supreme Court, has started suggesting to clients that they keep their online accounts in mind too. "Talking about myself, I've already passed on my password to my son in case of any eventuality. I've told him to close my accounts because I don't want to be left hanging in the virtual world."&lt;br /&gt;&lt;br /&gt;But there are many for whom "the sense of digital life beyond death is exciting ," points out Nishant Shah. "I know of people who actually leave a last message to be posted on social media by their friends or family. There are some whose accounts are now transparently run by their partners or families." '&lt;br /&gt;&lt;br /&gt;Accessing a deceased person's account is something Pooja Dager isn't comfortable with. The 37-year-old HR manager has "not even tried to venture into that territory" after her husband's passing. "Only his bank accounts were transferred to my son's name, that's it. The others I try not to think about. I just let them be," she adds.&lt;br /&gt;&lt;br /&gt;But as internet users age, many more people will have to confront these issues.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Making a digial will&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Take an inventory of your online accounts and plan a way for your heirs to access your 'memories' such as photos, movies and emails Give instructions whether you want your page(s) closed or if you'd like someone to answer your friends' posts on your behalf, maybe for a few months You might even like to incorporate details of your digital assets in your will. Consult your attorney for advice.&lt;br /&gt;&lt;b&gt;Evan Carroll, The Digital Beyond&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-may-25-2014-purnima-sharma-digital-death-log-off-in-peace'&gt;https://cis-india.org/news/the-times-of-india-may-25-2014-purnima-sharma-digital-death-log-off-in-peace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-28T07:24:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police">
    <title> India needs better cyber police</title>
    <link>https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police</link>
    <description>
        &lt;b&gt;On Wednesday, one of the largest online shopping and auction portals, eBay, revealed that earlier this year, cybercriminals accessed details of 145 million of its customers.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was &lt;a class="external-link" href="http://www.business-standard.com/article/international/india-needs-better-cyber-police-114052201689_1.html"&gt;published in the Business Standard&lt;/a&gt; on May 23, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Even though eBay's customers' financial details are said to be safe, the  incident is being termed a "historic breach" given the enormity of the  data compromised.  Globally, eBay is being criticised not just for its  laxity in securing the digital perimeter but also for reacting too late.  The company has said that it first came to know of the breach "two  weeks" ago. Records that have been accessed contain passwords as well as  email addresses, birth dates, mailing addresses and other personal  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The situation is worse when it comes to reporting such instances in &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=India" target="_blank"&gt;India&lt;/a&gt;, say &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Cyber+Security" target="_blank"&gt;cyber security&lt;/a&gt; experts. The Indian Information Technology Act requires companies to  adopt "reasonable security measures" to protect consumers' sensitive  personal information such as passwords and financial details. It also  makes companies duty bound to report breaches and also defines  liabilities in case a firm is found not to be adhering to best data  security practices. However, implementation is patchy and most such  instances go unreported.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pavan Duggal, an advocate specialising in cyber security, says most  users do not come to know if there has been a breach. "Awareness is also  low among consumers about the legal recourse available in case their  data has been compromised," he adds. Unlike in the West, lack of a  proper data protection and privacy law in India is to be blamed for  this. "Companies, too, are inclined not to report such instances as they  fear being negatively impacted in the market," he points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case of a breach, a user can contact the adjudicating officer, which  is the state infotech secretary, for legal recourse. However, the onus  is on the user to prove the breach. In the US, a consumer can get a  subpoena (court order) issued against a company that makes it duty bound  to provide details of the breach. "In India, the regime is too lax. It  is very difficult to notify the government," says Sunil Abraham,  executive director of the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There are stringent compliance requirements in countries such as the US. The laws in India need to come tougher if we want companies to become more serious about this," adds Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;eBay has advised consumers, many of whom could be Indians, to immediately change their passwords. While people  tend to use the same password across many sites, emails and phones  numbers act as verifying tools for several financial transactions and  could be misused. Moreover, unlike India, the US does not require  additional authentication apart from credit card and CVV number, which  makes transactions slightly more vulnerable. "It may be a good idea to  include a one-time password as a security layer," says Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over 200 million Indians are online. The Indian &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=E-commerce" target="_blank"&gt;e-commerce&lt;/a&gt; market is estimated at $2 billion (Rs 12,000 crore) and is expected to cross $20 billion over the next four years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There is no such thing as 100 per cent protection in the digital world.  The choice is between transacting online or not," says Akhilesh Tuteja,  executive director of consulting firm KPMG. "Technology is becoming so  sophisticated that what was good yesterday is not good today." A bigger  dialogue is needed on people treating theft of digital assets just as  they would physical assets, he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The last big breach was reported at software maker Adobe Systems in  October 2013, when it was uncovered that hackers accessed about 152  million user accounts. Last December Target said some 40 million payment  card numbers and another 70 million customer records were hacked into.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police'&gt;https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-06-04T07:56:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas">
    <title>Students lead the way with apps for ideas</title>
    <link>https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas</link>
    <description>
        &lt;b&gt;At 1am, the lights are still on in 15-year-old Pratik's room at his house on 80 Feet Road, Indiranagar. The NPS-Koramangala student is busy typing code on his laptop for his latest app called Resolve.&lt;/b&gt;
        &lt;p&gt;The article &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/bangalore/Students-lead-the-way-with-apps-for-ideas/articleshow/35399402.cms"&gt;published in the Times of India&lt;/a&gt; on May 21, 2014 quotes Nishant Shah.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT" style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pratik epitomizes Gen X. Coding and decoding, these school children, barely into their teens, are developing apps drawing attention worldwide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I learnt coding by myself with the help of the internet. The world wants things simplified and that's why apps are a hit. The first app I made was a calculator because my dad was unhappy with the one on his phone. My work was initially rejected, but I knew that would happen. But I continued working. When I went to a Microsoft conference, they told me youngsters have ideas to change the world and we have the time," said Pratik.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He was felicitated with a Nokia Lumia 1520 at the Windows Azure Conference 2014 for his work in developing apps for Windows and Windows Phone store.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rahul Yedida, a Class 12 student at the National Centre for Excellence, has around 18,000 downloads for the app he and his friend created. "I wasn't too happy with the amount of Maths homework. I started wondering whether an app could do it. At the same time, I had learnt a new language and wanted to test my skills. That's how I started working on it," said Rahul.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Programming is fun. Seeing a computer work the way you want it to gives you special joy," said Vaisakh M, Rahul's co-developer. They sent a letter to Bill Gates about the app and got a reply lauding their achievement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Quote hanger&lt;br /&gt;&lt;/b&gt;* During my free time, I read about programming which helps me when I write programs. My friends in the colony join me when I watch videos about it. They do programs in other languages. I play games and used to wonder how they're made. My dad promised to get me a laptop if I start programming and that's how it started.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Thrisha Mohan| 12, Vidyashilp Academy, now working on a jewellery app&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;* Apps are the cool things to do now. With the kind of access possible thanks to smart phones, they have gone to the masses. I wouldn't be surprised at the number of apps being created. When an app is created in a college dormitory, 1,000 students in the college will download it. That's instant gratification. The ecosystem is such that with social networking sites, you become an instant hero. The question is: How many can be successful and have a long life?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;S Sadagopan | director, IIIT-B&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;* Apps are more relevant for those growing up with interfaces which are mobile and wearable. We also need to realise there is a growing generation of people whose first point of access to the digital as well as to the connected worlds of the internet is through mobile devices. And apps are a natural way of interaction. It is a positive trend because it allows users to think of themselves not only as 'users' but as active producers of the digital world. They look beyond platforms made available by multi-national companies or private enterprises, and it allows them to build communities of interaction and learning between them. We need to make sure they are safe and not susceptible to invasive presence of others who might exploit their presence on the web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Nishant Shah | director- research, The Centre for Internet and Society&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas'&gt;https://cis-india.org/news/times-of-india-may-21-2014-sruthy-susan-ullas-students-lead-the-way-with-apps-for-ideas&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-28T09:24:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy">
    <title>Legislating for Privacy - Part II</title>
    <link>https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy</link>
    <description>
        &lt;b&gt;Apart from the conflation of commercial data protection and privacy, the right to privacy bill has ill-informed and poorly drafted provisions to regulate surveillance.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://www.thehoot.org/web/freetracker/storynew.php?storyid=570&amp;amp;sectionId=10"&gt;published in the Hoot&lt;/a&gt; on May 20, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Emblem.png" alt="Emblem" class="image-inline" title="Emblem" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In October 2010, the Department of Personnel and Training ("DOPT") of the Ministry of Personnel, Public Grievances and Pensions released an ‘Approach Paper’ towards drafting a privacy law for India. The Approach Paper claims to be prepared by a leading Indian corporate law firm that, to the best of my knowledge, has almost no experience of criminal procedure or constitutional law. The Approach Paper resulted in the drafting of a Right to Privacy Bill, 2011 ("DOPT Bill") which, although it has suffered several leaks, has neither been published for public feedback nor sent to the Cabinet for political clearance prior to introduction in Parliament.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Approach Paper and DOPT Bill&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first article in this two-part series broadly examined the many legal facets of privacy. Notions of privacy have long informed law in common law countries and have been statutorily codified to protect bodily privacy, territorial or spatial privacy, locational privacy, and so on. These fields continue to evolve and advance; for instance, the legal imperative to protect intimate body privacy from violation has now expanded to include biometric information, and the protection given to the content of personal communications that developed over the course of the twentieth century is now expanding to encompass metadata and other ‘information about information’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Approach Paper suffers from several serious flaws, the largest of which is its conflation of commercial data protection and privacy. It ignores the diversity of privacy law and jurisprudence in the common law, instead concerning itself wholly with commercial data protection. This creates a false equivalency, albeit not one that cannot be rectified by re-naming the endeavour to describe commercial data protection only.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there are other errors. The paper claims that no right of action exists for privacy breaches between citizens inter se. This is false, the civil wrongs of nuisance, interference with enjoyment, invasion of privacy, and other similar torts and actionable claims operate to redress privacy violations. In fact, in the case of Ratan Tata v. Union of India that is currently being heard by the Supreme Court of India, at least two parties are arguing that privacy is already adequately protected by civil law. Further, the criminal offences of nuisance and defamation, amongst others, and the recently introduced crimes of stalking and voyeurism, all create rights of action for privacy violations. These measures are incomplete, – this is not contested, the premise of these articles is the need for better privacy protection law – but denying their existence is not useful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The shortcomings of the Approach Paper are reflected in the draft legislation it resulted in. A major concern with the DOPT Bill is its amateur treatment of surveillance and interception of communications. This is inevitable for the Approach Paper does not consider this area at all although there is sustained and critical global and national attention to the issues that attend surveillance and communications privacy. For an effort to propose privacy law, this lapse is quite astonishing. The Approach Paper does not even examine if Parliament is competent to regulate surveillance, although the DOPT Bill wades into this contested turf.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Constitutionality of Interceptions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In a federal country, laws are weighed by the competence of their legislatures and struck down for overstepping their bounds. In India, the powers to legislate arise from entries that are contained in three lists in Schedule VII of the Constitution. The power to legislate in respect of intercepting communications traditionally emanates from Entry 31 of the Union List, which vests the Union – that is, Parliament and the Central Government – with the power to regulate “Posts and telegraphs; telephones, wireless, broadcasting and other like forms of communication” to the exclusion of the States. Hence, the Indian Telegraph Act, 1885, and the Indian Post Office Act, 1898, both Union laws, contain interception provisions. However, after holding the field for more than a century, the Supreme Court overturned this scheme in Bharat Shah’s case in 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The case challenged the telephone interception provisions of the Maharashtra Control of Organised Crime Act, 1999 ("MCOCA"), a State law that appeared to transgress into legislative territory reserved for the Union. The Supreme Court held that Maharashtra’s interception provisions were valid and arose from powers granted to the States – that is, State Assemblies and State Governments – by Entries 1 and 2 of the State List, which deal with “public order” and “police” respectively. This cleared the way for several States to frame their own communications interception regimes in addition to Parliament’s existing laws. The question of what happens when the two regimes clash has not been answered yet. India’s federal scheme anticipates competing inconsistencies between Union and State laws, but only when these laws derive from the Concurrent List which shares legislative power. In such an event, the ‘doctrine of repugnancy’ privileges the Union law and strikes down the State law to the extent of the inconsistency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In competitions between Union and State laws that do not arise from the Concurrent List but instead from the mutually exclusive Union and State Lists, the ‘doctrine of pith and substance’ tests the core substance of the law and traces it to one the two Lists. Hence, in a conflict, a Union law the substance of which was traceable to an entry in the State List would be struck down, and vice versa.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the doctrine permits incidental interferences that are not substantive. For example, as in a landmark 1946 case, a State law validly regulating moneylenders may incidentally deal with promissory notes, a Union field, since the interference is not substantive. Since surveillance is a police activity, and since “police” is a State subject, care must be taken by a Union surveillance law to remain on the pale of constitutionality by only incidentally affecting police procedure. Conversely, State surveillance laws were required to stay clear of the Union’s exclusive interception power until Bharat Shah’s case dissolved this distinction without answering the many questions it threw up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the creation of the Republic, India’s federal scheme was premised on the notion that the Union and State Lists were exclusive of each other. Conceptually, the Union and the States could not have competing laws on the same subject. But Bharat Shah did just that; it located the interception power in both the Lists and did not enunciate a new doctrine to resolve their (inevitable) future conflict. This both disturbs Indian constitutional law and goes to the heart of surveillance and privacy law.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Three Principles of Interception&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Apart from the important questions regarding legislative competence and constitutionality, the DOPT Bill proposed weak, ill-informed, and poorly drafted provisions to regulate surveillance and interceptions. It serves no purpose to further scrutinise the 2011 DOPT Bill. Instead, at this point, it may be constructive to set out the broad contours of a good interceptions regulation regime. Some clarity on the concepts: intercepting communications means capturing the content and metadata of oral and written communications, including letters, couriers, telephone calls, facsimiles, SMSs, internet telephony, wireless broadcasts, emails, and so on. It does not include activities such visual capturing of images, location tracking or physical surveillance; these are separate aspects of surveillance, of which interception of communications is a part.&lt;br /&gt; &lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;Firstly&lt;/span&gt;, all interceptions of communications must be properly sanctioned. In India, under Rule 419A of the Indian Telegraph Rules, 1951, the Home Secretary – an unelected career bureaucrat, or a junior officer deputised by the Home Secretary – with even lesser accountability, authorises interceptions. In certain circumstances, even senior police officers can authorise interceptions. Copies of the interception orders are supposed to be sent to a Review Committee, consisting of three more unelected bureaucrats, for bi-monthly review. No public information exists, despite exhaustive searching, regarding the authorisers and numbers of interception orders and the appropriateness of the interceptions.&lt;br /&gt; &lt;br /&gt;The Indian system derives from outdated United Kingdom law that also enables executive authorities to order interceptions. But, the UK has constantly revisited and revised its interception regime; its present avatar is governed by the Regulation of Investigatory Powers Act, 2000 ("RIPA") which creates a significant oversight mechanism headed by an independent commissioner, who monitors interceptions and whose reports are tabled in Parliament, and quasi-judicially scrutinised by a tribunal comprised of judges and senior independent lawyers, which hears public complaints, cancels interceptions, and awards monetary compensation. Put together, even though the current UK interceptions system is executively sanctioned, it is balanced by independent and transparent quasi-judicial authorities.&lt;br /&gt; &lt;br /&gt;In the United States, all interceptions are judicially sanctioned because American constitutional philosophy – the separation of powers doctrine – requires state action to be checked and balanced. Hence, ordinary interceptions of criminals’ communications as also extraordinary interceptions of perceived national security threats are authorised only by judges, who are ex hypothesi independent, although, as the PRISM affairs teaches us, independence can be subverted. In comparison, India’s interception regime is incompatible with its democracy and must be overhauled to establish independent and transparent authorities to properly sanction interceptions.&lt;br /&gt; &lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;Secondly&lt;/span&gt;, no interceptions should be sanctioned but upon ‘probable cause’. Simply described, probable cause is the standard that convinces a reasonable person of the existence of criminality necessary to warrant interception. Probable case is an American doctrine that flows from the US Constitution’s Fourth Amendment that protects the rights of people to be secure in places in which they have a reasonable expectation of privacy. There is no equivalent standard in UK law, except perhaps the common law test of reasonability that attaches to all government action that abridges individual freedoms. If a coherent ‘reasonable suspicion’ test could be coalesced from the common law, I think it would fall short of the strictness that the probable cause doctrine imposes on the executive. Therefore, the probable cause requirement is stronger than ordinary constraint of reasonability but weaker than the standard of reasonable doubt beyond which courts may convict. In this spectrum of acceptable standards, India’s current law in section 5(2) of the Indian Telegraph Act, 1885 is the weakest for it permits interceptions merely “on the occurrence of any public emergency or in the interest of public safety”, which determination is left to the “satisfaction” of a bureaucrat. And, under Rule 419A(2) of the Telegraph Rules, the only imposition on the bureaucrat when exercising this satisfaction is that the order “contain reasons” for the interception.&lt;br /&gt; &lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;Thirdly&lt;/span&gt;, all interceptions should be warranted. This point refers not to the necessity or otherwise of the interception, but to the framework within which it should be conducted. Warrants should clearly specify the name and clear identity of the person whose communications are sought to be intercepted. The target person’s identity should be linked to the specific means of communication upon which the suspected criminal conversations take place. Therefore, if the warrant lists one person’s name but another person’s telephone number – which, because of the general ineptness of many police forces, is not uncommon – the warrant should be rejected and the interception cancelled. And, by extension, the specific telephone number, or email account, should be specified. A warrant against a person called Rahul Kumar, for instance, cannot be executed against all Rahul Kumars in the vicinity, nor also against all the telephones that the one specific Rahul Kumar uses, but only against the one specific telephone number that is used by the one specific Rahul Kumar. Warrants should also specify the duration of the interception, the officer responsible for its conduct and thereby liable for its abuse, and other safeguards. Some of these concerns were addressed in 2007 when the Telegraph Rules were amended, but not all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A law that fails to substantially meet the standards of these principles is liable, perhaps in the not too distant future, to be read down or struck down by India’s higher judiciary. But, besides the threat of judicial review, a democratic polity must protect the freedoms and diversity of its citizens by holding itself to the highest standards of the rule of law, where the law is just.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy'&gt;https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-05-28T09:59:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns">
    <title>National Elections 2014: How Technology Powered Campaigns</title>
    <link>https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns</link>
    <description>
        &lt;b&gt;HasGeek and the Centre for Internet and Society (CIS) welcome you to a presentation on how technology powered politicial campaigns in the recently concluded 2014 national elections. Developers, advocacy organizations and the general public are invited to participate. The event will be held at CIS on May 23, 2014, 6.00 p.m. to 8.30 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;During the 2014 Indian general elections, technology was widely used for candidate and party campaigns. The purpose of these technology-driven campaigns was to help voters make more informed decisions before casting their votes. Voter responses to these campaigns continuously helped individual candidates and political parties (via their technology teams and consultants) to rework messaging till the very end.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;HasGeek and CIS are organizing three presentations followed by an interactive Q&amp;amp;A session to understand how technology spurred campaigns during the 2014 elections, and how voters will have to get smarter just as parties are becoming smart in reaching out to them.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Sessions&lt;/h2&gt;
&lt;h3&gt;Campaigning in the pre-Internet and Internet Era (Talk)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Vijay Grover, founder of Bangalore Media Foundation and television journalist since 17 years, will compare the past and present to explain how internet technologies have changed campaigning stratgies. Grover will argue that voters need to get smart in sifting information and making choices as more and more parties use social media and information technologies in reaching out to them.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Technology-driven campaigns (Talk)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Viral Shah, part of Nandan Nilekani's campaign management team, will talk about how India is placed in the global scene with respect to technology-driven political campaigns. Viral will also discuss how to design a campaign with technology and how technology was used to power Nilekani's campaign.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Tools used for powering campaigns and attracting volunteers (Talk)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;BG Mahesh, founder and managing director at Oneindia.in, will talk about the tools used during Narendra Modi's campaign. Apart from informing voters about the candidate, volunteers were also enlisted through the drives. BG Mahesh will throw light on how technology made this possible.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Schedule&lt;/h2&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Sessions&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.00&lt;br /&gt;18.15&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;Introductions: HasGeek, CIS, The Fifth Elephant &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.15&lt;br /&gt;18.45&lt;/td&gt;
&lt;td&gt;Vijay Grover: Campaigning in the pre-Internet and Internet Era&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.45&lt;br /&gt;19.15&lt;/td&gt;
&lt;td&gt;Viral Shah: Technology-driven campaigning&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.15&lt;br /&gt;19.45&lt;/td&gt;
&lt;td&gt;B.G.Mahesh: Tools used for powering campaigns and attracting volunteers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.45&lt;br /&gt;20.15&lt;/td&gt;
&lt;td&gt;Q &amp;amp; A Session&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.15&lt;br /&gt;20.30&lt;/td&gt;
&lt;td&gt;Snacks&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns'&gt;https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-20T07:03:51Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-2013-iii-conceptions-of-free-speech-and-democracy">
    <title>Net Neutrality, Free Speech and the Indian Constitution – III: Conceptions of Free Speech and Democracy</title>
    <link>https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-2013-iii-conceptions-of-free-speech-and-democracy</link>
    <description>
        &lt;b&gt;In this 3 part series, Gautam Bhatia explores the concept of net neutrality in the context of Indian law and the Indian Constitution.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the modern State, effective exercise of free speech rights is increasingly dependent upon an infrastructure that includes newspapers, television and the internet. Access to a significant part of this infrastructure is determined by money. Consequently, if what we value about free speech is the ability to communicate one’s message to a non-trivial audience, financial resources influence both &lt;i&gt;who &lt;/i&gt;can speak and, consequently, &lt;i&gt;what &lt;/i&gt;is spoken. The nature of the public discourse – what information and what ideas circulate in the public sphere – is contingent upon a distribution of resources that is arguably unjust and certainly unequal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are two opposing theories about how we should understand the right to free speech in this context. Call the first one of these the libertarian conception of free speech. The libertarian conception takes as given the existing distribution of income and resources, and consequently, the unequal speaking power that that engenders. It prohibits any intervention designed to remedy the situation. The most famous summary of this vision was provided by the American Supreme Court, when it first struck down campaign finance regulations, in &lt;a href="http://www.law.cornell.edu/supremecourt/text/424/1#writing-USSC_CR_0424_0001_ZO"&gt;&lt;i&gt;Buckley v. Valeo&lt;/i&gt;&lt;/a&gt;: &lt;i&gt;“t&lt;/i&gt;&lt;i&gt;he concept that government may restrict the speech of some [in] order to enhance the relative voice of others is wholly foreign to the First Amendment.” &lt;/i&gt;This theory is part of the broader libertarian worldview, which would restrict government’s role in a polity to enforcing property and criminal law, and views any government-imposed restriction on what people can do within the existing structure of these laws as presumptively wrong.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;We can tentatively label the second theory as the &lt;i&gt;social-democratic theory &lt;/i&gt;of free speech. This theory focuses not so much on the individual speaker’s right not to be restricted in using their resources to speak as much as they want, but upon the collective interest in maintaining a public discourse that is open, inclusive and home to a multiplicity of diverse and antagonistic ideas and viewpoints. Often, in order to achieve this goal, governments regulate access to the infrastructure of speech so as to ensure that participation is not entirely skewed by inequality in resources. When this is done, it is often justified in the name of democracy: a functioning democracy, it is argued, requires a thriving public sphere that is not closed off to some or most persons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surprisingly, one of the most powerful judicial statements for this vision also comes from the United States. In &lt;a href="http://supreme.justia.com/cases/federal/us/395/367/case.html"&gt;&lt;i&gt;Red Lion v. FCC&lt;/i&gt;&lt;/a&gt;, while upholding the “fairness doctrine”, which required broadcasting stations to cover “both sides” of a political issue, and provide a right of reply in case of personal attacks, the Supreme Court noted:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“[Free speech requires] &lt;i&gt;preserv&lt;/i&gt;[ing]&lt;i&gt; an uninhibited marketplace of ideas in which truth will ultimately prevail, rather than to countenance &lt;span style="text-decoration: underline;"&gt;monopolization of that market&lt;/span&gt;, whether it be by the Government itself or &lt;span style="text-decoration: underline;"&gt;a private licensee&lt;/span&gt;…&lt;/i&gt;&lt;i&gt; it is the right of the public to receive suitable access to social, political, esthetic, moral, and other ideas and experiences which is crucial here&lt;/i&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What of India? In the early days of the Supreme Court, it adopted something akin to the libertarian theory of free speech. In &lt;a href="http://indiankanoon.org/doc/243002/"&gt;&lt;i&gt;Sakal Papers v. Union of India&lt;/i&gt;&lt;/a&gt;, for example, it struck down certain newspaper regulations that the government was defending on grounds of opening up the market and allowing smaller players to compete, holding that Article 19(1)(a) – in language similar to what &lt;i&gt;Buckley v. Valeo &lt;/i&gt;would hold, more than fifteen years later – did not permit the government to infringe the free speech rights of some in order to allow others to speak. The Court continued with this approach in its next major newspaper regulation case, &lt;a href="http://www.indiankanoon.org/doc/125596/"&gt;&lt;i&gt;Bennett Coleman v. Union of India&lt;/i&gt;&lt;/a&gt;, but this time, it had to contend with a strong dissent from Justice Mathew. After noting that “&lt;i&gt;it is no use having a right to express your idea, unless you have got a medium for expressing it”&lt;/i&gt;, Justice Mathew went on to hold:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;What is, therefore, required is an interpretation of Article 19(1)(a) which focuses on the idea that restraining the hand of the government is quite useless in assuring free speech, if a restraint on access is effectively secured by private groups. A Constitutional prohibition against governmental restriction on the expression is effective only if the Constitution ensures an adequate opportunity for discussion… Any scheme of distribution of newsprint which would make the freedom of speech a reality by making it possible the dissemination of ideas as news with as many different facets and colours as possible would not violate the fundamental right of the freedom of speech of the petitioners. In other words, a scheme for distribution of a commodity like newsprint which will subserve the purpose of free flow of ideas to the market from as many different sources as possible would be a step to advance and enrich that freedom. If the scheme of distribution is calculated to prevent even an oligopoly ruling the market and thus check the tendency to monopoly in the market, that will not be open to any objection on the ground that the scheme involves a regulation of the press which would amount to an abridgment of the freedom of speech.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;In Justice Mathew’s view, therefore, freedom of speech is not only the speaker’s right (the libertarian view), but a complex balancing act between the listeners’ right to be exposed to a wide range of material, as well as the collective, societal right to have an open and inclusive public discourse, which can only be achieved by preventing the monopolization of the instruments, infrastructure and access-points of speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the years, the Court has moved away from the majority opinions in &lt;i&gt;Sakal Papers &lt;/i&gt;and &lt;i&gt;Bennett Coleman&lt;/i&gt;, and steadily come around to Justice Mathew’s view. This is particularly evident from two cases in the 1990s: in &lt;a href="http://indiankanoon.org/doc/921638/"&gt;&lt;i&gt;Union of India v. The Motion Picture Association&lt;/i&gt;&lt;/a&gt;, the Court upheld various provisions of the Cinematograph Act that imposed certain forms of compelled speech on moviemakers while exhibiting their movies, on the ground that “&lt;i&gt;to earmark a small portion of time of this entertainment medium for the purpose of showing scientific, educational or documentary films, or for showing news films has to be looked at in this context of &lt;/i&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;promoting dissemination of ideas, information and knowledge to the masses so that there may be an informed debate and decision making on public issues&lt;/span&gt;&lt;/i&gt;&lt;i&gt;. Clearly, the impugned provisions are designed to further free speech and expression and not to curtail it.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.indiankanoon.org/doc/304068/"&gt;&lt;i&gt;LIC v. Manubhai D. Shah&lt;/i&gt;&lt;/a&gt; is even more on point. In that case, the Court upheld a right of reply in an &lt;i&gt;in-house &lt;/i&gt;magazine, &lt;i&gt;“because fairness demanded that both view points were placed before the readers,&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;however limited be their number, to enable them to draw their own conclusions and unreasonable&lt;/span&gt;&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;because there was no logic or proper justification for refusing publication…&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;the respondent’s fundamental right of speech and expression clearly entitled him to insist that his views on the subject should reach those who read the magazine so that they have a complete picture before them and not a one sided or distorted one&lt;/i&gt;…” This goes even further than Justice Mathew’s dissent in &lt;i&gt;Bennett Coleman&lt;/i&gt;, and the opinion of the Court in &lt;i&gt;Motion Picture Association&lt;/i&gt;, in holding that not merely is it permitted to structure the public sphere in an equal and inclusive manner, but that it is a &lt;i&gt;requirement &lt;/i&gt;of Article 19(1)(a).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We can now bring the threads of the separate arguments in the three posts together. In the first post, we found that public law and constitutional obligations can be imposed upon private parties when they discharge public functions. In the second post, it was argued that the internet has replaced the park, the street and the public square as the quintessential forum for the circulation of speech. ISPs, in their role as gatekeepers, now play the role that government once did in controlling and keeping open these avenues of expression. Consequently, they can be subjected to public law free speech obligations. And lastly, we discussed how the constitutional conception of free speech in India, that the Court has gradually evolved over many years, is a social-democratic one, that requires the keeping open of a free and inclusive public sphere. &lt;a href="http://motherboard.vice.com/read/net-neutrality-monopoly-and-the-death-of-the-democratic-internet?trk_source=homepage-lede"&gt;And if there is one thing that fast-lanes over the internet threaten, it is certainly a free and inclusive (digital) public sphere&lt;/a&gt;. A combination of these arguments provides us with an arguable case for imposing obligations of net neutrality upon ISPs, even in the absence of a statutory or regulatory obligations, grounded within the constitutional guarantee of the freedom of speech and expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;For the previous post, please see: http://cis-india.org/internet-governance/blog/-neutrality-free-speech-and-the-indian-constitution-part-2.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;_____________________________________________________________________________________________________&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;i style="text-align: justify; "&gt;Gautam Bhatia — @gautambhatia88 on Twitter — is a graduate of the National Law School of India University (2011), and presently an LLM student at the Yale Law School. He blogs about the Indian Constitution at &lt;a class="moz-txt-link-freetext" href="http://indconlawphil.wordpress.com/"&gt;http://indconlawphil.wordpress.com&lt;/a&gt;. Here at CIS, he will be blogging on issues of online freedom of speech and expression.&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-2013-iii-conceptions-of-free-speech-and-democracy'&gt;https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-2013-iii-conceptions-of-free-speech-and-democracy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gautam</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-27T10:21:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/future-of-cyber-governance">
    <title>The Future of Cyber Governance </title>
    <link>https://cis-india.org/news/future-of-cyber-governance</link>
    <description>
        &lt;b&gt;Hague Institute for Global Justice in association with the Observer Research Foundation, Ministry of Foreign Affairs of Netherlands, and the Netherlands Institute for International Relations - Clingendael organized a conference on the Future of Cyber Governance at the Hague from May 13 to 15, 2014. Sunil Abraham was a speaker at this event.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Global Governance Reform Initiative&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Global Governance Reform Initiative (GGRI) seeks to overcome the challenges of global governance in three important domains – cyberspace, oceans and migration – by improving the efficiency, effectiveness and legitimacy of collective actions undertaken by relevant stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The current focus of the GGRI is the governance of cyberspace. How cyberspace is governed has significant implications for a range of critical issues, from national security to the protection of individuals’ rights and freedoms. Yet, the governance of cyberspace is highly contested. Tensions exist between those who favour private sector-led, decentralized forms of governance, and those who favour state-led, centralized forms of governance. There is, therefore, a pressing need for practicable policies which can help balance competing demands effectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The conference is a platform for 17 outstanding academics and professionals representing a range of countries and sectors to present papers addressing key issues related to the governance of cyberspace. The authors were selected through a competitive application process which sought to balance the candidates’ professional and geographic backgrounds in a manner that would maximize the quality and policy-relevance of the research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the conference, the participants will present their papers to a select group of seasoned experts on cyber governance. These experts will provide the participants with constructive feedback on their research findings and policy recommendations. The aim of the conference is to allow the participants to engage in a rigorous analysis of the selected governance challenges in order to craft practicable policy recommendations aimed at improving the governance of cyberspace. The authors of the best papers will be invited to present their work at the 2014 India Conference on Cyber Security and Cyber Governance, organized by the Observer Research Foundation, New Delhi.&lt;br /&gt;The Hague Institute undertakes this project in collaboration with the Netherlands Ministry of Foreign Affairs, the Observer Research Foundation (New Delhi), and the Netherlands Institute of International Relations – Clingendael.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;See the &lt;a href="https://cis-india.org/internet-governance/blog/global-governance-reform-initiative.pdf" class="internal-link"&gt;full details of the programme here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/dblYECIVHs8" width="360"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/future-of-cyber-governance'&gt;https://cis-india.org/news/future-of-cyber-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-27T10:05:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/harvard-university-may-13-2014-does-size-matter">
    <title>Does Size Matter? A Tale of Performing Welfare, Producing Bodies and Faking Identity</title>
    <link>https://cis-india.org/news/harvard-university-may-13-2014-does-size-matter</link>
    <description>
        &lt;b&gt;Malavika Jayaram gave a talk.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cyber.law.harvard.edu/events/luncheon/2014/05/jayaram"&gt;This was published by the website of Berkman Center for Internet and Society&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Big Data doesn’t get much bigger than India’s identity project. The world’s largest biometric database - currently consisting of almost 600 million enrolled - seduces with promises of inclusion, legitimacy and visibility. By locating this techno-utopian vision within the larger surveillance state that a unique identifier facilitates, Malavika will describe the ‘welfare industrial complex’ that imagines the poor as the next emerging market. She will highlight the risks of the body as password, of implementing e-governance in a legal vacuum, and of digitization reinforcing existing inequalities. The export of technologies of control - once they have been tested on a massive population that has little agency and limited ability to withhold consent - transforms this project from a site of local activism to one with global repercussions. By offering a perspective that is somewhat different from the traditional western focus of privacy, she hopes to generate a more inclusive discourse about what it means to be autonomous and empowered in the face of paternalistic development projects. She will highlight, in particular, the varied ways in which the project is already being subverted and re-purposed, in ways that are humorous and poignant.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;About Malavika&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Malavika is a Fellow at the Berkman Center for Internet and Society at  Harvard University, focusing on privacy, identity and free expression.  She is also a Fellow at the Centre for Internet and Society, Bangalore,  and the author of the India chapter for the Data Protection &amp;amp;  Privacy volume in the Getting the Deal Done series. Malavika is one of  10 Indian lawyers in The International Who's Who of Internet e-Commerce  &amp;amp; Data Protection Lawyers directory. In August 2013, she was voted  one of India’s leading lawyers - one of only 8 women to be featured in  the “40 under 45” survey conducted by Law Business Research, London. In a  different life, she spent 8 years in London, practicing law with global  firm Allen &amp;amp; Overy in the Communications, Media &amp;amp; Technology  group, and as VP and Technology Counsel at Citigroup. She is working on a  PhD about the development of a privacy jurisprudence and discourse in  India, viewed partly through the lens of the Indian biometric ID  project.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Podcast&lt;/h3&gt;
&lt;p&gt;Watch the podcast &lt;a class="external-link" href="http://castroller.com/podcasts/BerkmanCenterFor/4060529"&gt;at this link&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/harvard-university-may-13-2014-does-size-matter'&gt;https://cis-india.org/news/harvard-university-may-13-2014-does-size-matter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-04T09:45:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties">
    <title>European Court of Justice rules Internet Search Engine Operator responsible for Processing Personal Data Published by Third Parties</title>
    <link>https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties</link>
    <description>
        &lt;b&gt;The Court of Justice of the European Union has ruled that an "an internet search engine operator is responsible for the processing that it carries out of personal data which appear on web pages published by third parties.” The decision adds to the conundrum of maintaining a balance between freedom of expression, protecting personal data and intermediary liability.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The ruling is expected to have considerable impact on reputation and privacy related takedown requests as under the decision, data subjects may approach the operator directly seeking removal of links to web pages containing personal data. Currently, users prove whether data needs to be kept online—the new rules reverse the burden of proof, placing an obligation on companies, rather than users for content regulation.&lt;/p&gt;
&lt;h3&gt;A win for privacy?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ECJ ruling addresses Mario Costeja González complaint filed in 2010, against Google Spain and Google Inc., requesting that personal data relating to him appearing in search results be protected and that data which was no longer relevant be removed. Referring to &lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML"&gt;the Directive 95/46/EC&lt;/a&gt; of the European Parliament, the court said, that Google and other search engine operators should be considered 'controllers' of personal data. Following the decision, Google will be required to consider takedown requests of personal data, regardless of the fact that processing of such data is carried out without distinction in respect of information other than the personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The decision—which cannot be appealed—raises important of questions of how this ruling will be applied in practice and its impact on the information available online in countries outside the European Union.  The decree forces search engine operators such as Google, Yahoo and Microsoft's Bing to make judgement calls on the fairness of the information published through their services that reach over 500  million people across the twenty eight nation bloc of EU.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ECJ rules that search engines 'as a general rule,' should place the right to privacy above the right to information by the public. Under the verdict, links to irrelevant and out of date data need to be erased upon request, placing search engines in the role of controllers of information—beyond the role of being an arbitrator that linked to data that already existed in the public domain. The verdict is directed at highlighting the power of search engines to retrieve controversial information while limiting their capacity to do so in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ruling calls for maintaining a balance in addressing the legitimate interest of internet users in accessing personal information and upholding the data subject’s fundamental rights, but does not directly address either issues. The court also recognised, that the data subject's rights override the interest of internet users, however, with exceptions pertaining to nature of information, its sensitivity for the data subject's private life and the role of the data subject in public life. Acknowledging that data belongs to the individual and is not the right of the company, European Commissioner Viviane Reding, &lt;a href="https://www.facebook.com/permalink.php?story_fbid=304206613078842&amp;amp;id=291423897690447&amp;amp;_ga=1.233872279.883261846.1397148393"&gt;hailed the verdict&lt;/a&gt;, "a clear victory for the protection of personal data of Europeans".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court stated that if data is deemed irrelevant at the time of the case, even if it has been lawfully processed initially, it must be removed and that the data subject has the right to approach the operator directly for the removal of such content. The liability issue is further complicated by the fact, that search engines such as Google do not publish the content rather they point to information that already exists in the public domain—raising questions of the degree of liability on account of third party content displayed on their services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ECJ ruling is based on the case originally filed against Google, Spain and it is important to note that, González argued that searching for his name linked to two pages originally published in 1998, on the website of the Spanish newspaper La Vanguardia. The Spanish Data Protection Agency did not require La Vanguardia to take down the pages, however, it did order Google to remove links to them. Google appealed this decision, following which the National  High Court of Spain sought advice from the European court. The definition of Google as the controller of information, raises important questions related to the distinction between liability of publishers and the liability of processors of information such as search engines.&lt;/p&gt;
&lt;h3&gt;The 'right to be forgotten'&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The decision also brings to the fore, the ongoing debate and &lt;a href="http://www.theguardian.com/technology/2013/apr/04/britain-opt-out-right-to-be-forgotten-law"&gt;fragmented opinions within the EU&lt;/a&gt;, on the right of the individual to be forgotten. The &lt;a href="http://www.bbc.com/news/technology-16677370"&gt;'right to be forgotten&lt;/a&gt;' has evolved from the European Commission's wide-ranging plans of an overhaul of the commission's 1995 Data Protection Directive. The plans for the law included allowing people to request removal of personal data with an obligation of compliance for service providers, unless there were 'legitimate' reasons to do otherwise. Technology firms rallying around issues of freedom of expression and censorship, have expressed concerns about the reach of the bill. Privacy-rights activist and European officials have upheld the notion of the right to be forgotten, highlighting the right of the individual to protect their honour and reputation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These issues have been controversial amidst EU member states with the UK's Ministry of Justice claiming the law 'raises unrealistic and unfair expectations' and  has &lt;a href="http://www.theguardian.com/technology/2013/apr/04/britain-opt-out-right-to-be-forgotten-law"&gt;sought to opt-out&lt;/a&gt; of the privacy laws. The Advocate General of the European Court &lt;a href="http://curia.europa.eu/juris/document/document.jsf?text=&amp;amp;docid=138782&amp;amp;pageIndex=0&amp;amp;doclang=EN&amp;amp;mode=req&amp;amp;dir=&amp;amp;occ=first&amp;amp;part=1&amp;amp;cid=362663#Footref91"&gt;Niilo Jääskinen's opinion&lt;/a&gt;, that the individual's right to seek removal of content should not be upheld if the information was published legally, contradicts the verdict of the ECJ ruling. The European Court of Justice's move is surprising for many and as Richard Cumbley, information-management and data protection partner at the law firm Linklaters &lt;a href="http://turnstylenews.com/2014/05/13/europe-union-high-court-establishes-the-right-to-be-forgotten/"&gt;puts it&lt;/a&gt;, “Given that the E.U. has spent two years debating this right as part of the reform of E.U. privacy legislation, it is ironic that the E.C.J. has found it already exists in such a striking manner."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The economic implications of enforcing a liability regime where search engine operators censor legal content in their results aside, the decision might also have a chilling effect on freedom of expression and access to information. Google &lt;a href="http://www.theguardian.com/technology/2014/may/13/right-to-be-forgotten-eu-court-google-search-results"&gt;called the decision&lt;/a&gt; “a disappointing ruling for search engines and online publishers in general,” and that the company would take time to analyze the implications. While the implications of the decision are yet to be determined, it is important to bear in mind that while decisions like these are public, the refinements that Google and other search engines will have to make to its technology and the judgement calls on the fairness of the information available online are not public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ECJ press release is available &lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2014-05/cp140070en.pdf"&gt;here&lt;/a&gt; and the actual judgement is available &lt;a href="http://curia.europa.eu/juris/documents.jsf?pro=&amp;amp;lgrec=en&amp;amp;nat=or&amp;amp;oqp=&amp;amp;lg=&amp;amp;dates=&amp;amp;language=en&amp;amp;jur=C%2CT%2CF&amp;amp;cit=none%252CC%252CCJ%252CR%252C2008E%252C%252C%252C%252C%252C%252C%252C%252C%252C%252Ctrue%252Cfalse%252Cfalse&amp;amp;num=C-131%252F12&amp;amp;td=%3BALL&amp;amp;pcs=Oor&amp;amp;avg"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties'&gt;https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2014-05-14T14:18:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way">
    <title>Net Freedom Campaign Loses its Way</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way</link>
    <description>
        &lt;b&gt;A recent global meet was a victory for governments and the private sector over civil society interests.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.thehindubusinessline.com/todays-paper/tp-opinion/net-freedom-campaign-loses-its-way/article5994906.ece"&gt;published in the Hindu Businessline&lt;/a&gt; on May 10, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;One word to describe NetMundial: Disappointing! Why? Because despite the promise, human rights on the Internet are still insufficiently protected. Snowden’s revelations starting last June threw the global Internet governance processes into crisis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Things came to a head in October, when Brazil’s President Dilma Rousseff, horrified to learn that she was under NSA surveillance for economic reasons, called for the organisation of a global conference called NetMundial to accelerate Internet governance reform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NetMundial was held in São Paulo on April 23-24 this year. The result was a statement described as “the non-binding outcome of a bottom-up, open, and participatory process involving … governments, private sector, civil society, technical community, and academia from around the world.” In other words — it is international soft law with no enforcement mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The statement emerges from “broad consensus”, meaning governments such as India, Cuba and Russia and civil society representatives expressed deep dissatisfaction at the closing plenary. Unlike an international binding law, only time will tell whether each member of the different stakeholder groups will regulate itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Again, not easy, because the outcome document does not specifically prescribe what each stakeholder can or cannot do — it only says what internet governance (IG) should or should not be. And finally, there’s no global consensus yet on the scope of IG. The substantive consensus was disappointing in four important ways:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mass surveillance&lt;/b&gt; : Civil society was hoping that the statement would make mass surveillance illegal. After all, global violation of the right to privacy by the US was the &lt;i&gt;raison d'être&lt;/i&gt; of the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, the statement legitimised “mass surveillance, interception and collection” as long as it was done in compliance with international human rights law. This was clearly the most disastrous outcome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access to knowledge:&lt;/b&gt; The conference was not supposed to expand intellectual property rights (IPR) or enforcement of these rights. After all, a multilateral forum, WIPO, was meant to address these concerns. But in the days before the conference the rights-holders lobby went into overdrive and civil society was caught unprepared.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The end result — “freedom of information and access to information” or right to information in India was qualified “with rights of authors and creators”. The right to information laws across the world, including in India, contains almost a dozen exemptions, including IPR. The only thing to be grateful for is that this limitation did not find its way into the language for freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Intermediary liability:&lt;/b&gt; The language that limits liability for intermediaries basically provides for a private censorship regime without judicial oversight, and without explicit language protecting the rights to freedom of expression and privacy. Even though the private sector chants Hillary Clinton's Internet freedom mantra — they only care for their own bottomlines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Net neutrality:&lt;/b&gt; Even though there was little global consensus, some optimistic sections of civil society were hoping that domestic best practice on network neutrality in Brazil’s Internet Bill of Right — also known as Marco Civil, that was signed into law during the inaugural ceremony of NetMundial — would make it to the statement. Unfortunately, this did not happen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For almost a decade since the debate between the multi-stakeholder and multilateral model started, the multi-stakeholder model had produced absolutely nothing outside ICANN (Internet Corporation for Assigned Names and Numbers, a non-profit body), its technical fraternity and the standard-setting bodies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The multi-stakeholder model is governance with the participation (and consent — depending on who you ask) of those stakeholders who are governed. In contrast, in the multilateral system, participation is limited to nation-states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil society divisions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The inability of multi-stakeholderism to deliver also resulted in the fragmentation of global civil society regulars at Internet Governance Forums.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in the run-up to NetMundial more divisions began to appear. If we ignore nuances — we could divide them into three groups. One, the ‘outsiders’ who are best exemplified by Jérémie Zimmermann of the La Quadrature du Net. Jérémie ran an online campaign, organised a protest during the conference and did everything he could to prevent NetMundial from being sanctified by civil society consensus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two, the ‘process geeks’ — for these individuals and organisations process was more important than principles. Most of them were as deeply invested in the multi-stakeholder model as ICANN and the US government and some who have been riding the ICANN gravy train for years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even worse, some were suspected of being astroturfers bootstrapped by the private sector and the technical community. None of them were willing to rock the boat. For the ‘process geeks’, seeing politicians and bureaucrats queue up like civil society to speak at the mike was the crowning achievement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three, the ‘principles geeks’ perhaps best exemplified by the Just Net Coalition who privileged principles over process. Divisions were also beginning to sharpen within the private sector. For example, Neville Roy Singham, CEO of Thoughtworks, agreed more with civil society than he did with other members of the private sector in his interventions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, the ‘outsiders’ couldn't care less about the outcome and will do everything to discredit it, the ‘process geeks’ stood in ovation when the outcome document was read at the closing plenary and the ‘principles geeks’ returned devastated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the multi-stakeholder model to survive it must advance democratic values, not undermine them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This will only happen if there is greater transparency and accountability. Individuals, organisations and consortia that participate in Internet governance processes need to disclose lists of donors including those that sponsor travel to these meetings.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way'&gt;https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    

   <dc:date>2014-05-27T11:07:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-may-6-2014-laxmi-ajai-prasanna-civil-society-pushes-for-privacy-panel">
    <title>Civil Society Pushes for Privacy Panel</title>
    <link>https://cis-india.org/news/the-times-of-india-may-6-2014-laxmi-ajai-prasanna-civil-society-pushes-for-privacy-panel</link>
    <description>
        &lt;b&gt;The article was published in the Times of India on May 6, 2014. Sunil Abraham is quoted.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Civil society organizations are pushing for a 'privacy commission' to provide protection to individuals from illegal breach of their privacy, with guidelines imposing penal sanction against the violators. This assumes significance&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This assumes significance at a time when the Centre has decided to set up a judicial panel to probe the snoopgate scandal wherein the BJP government in Gujarat was allegedly involved in illegal surveillance of a woman architect and especially when the Right to Privacy Bill is pending in Parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, industry consortia, including CII and FICCI, prefer lesser regulation, though calling for a cautious approach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among civil society organizations pressing for a stringent privacy bill is the International Centre for Free and Open Source Software (ICFOSS), the only representative from Kerala to attend the NETmundial conference held recently in Brazil. The meet focused on privacy issues to ensure basic human rights, including freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NETmundial is the first step towards pushing for a privacy law against the snooping and spying on individuals by those in power, including agencies within and outside the country Privacy guidelines should be clear as to what data can be collected without infringing on the dignity of an individual as 'data' represents the duration of a call, while 'metadata' reveals the content of the caH," said ICFOSS director SatishBabu.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bangalore-based Centre for Internet and Society (CIS), another NETmundial participant, also stands for a strong privacy law. "The two-day conference that concluded on April 24 was a baby step towards a privacy law with a road map for global internet governance. It is the first step towards a multi-stakeholder model offering an equal footing for all civil society organizations, academia, government, private sector and the UN fora," said CIS executive director Sunil Abraham&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are pushing for a privacy law in the country aimed at national privacy regulation and constituting a privacy commission on the lines of the information commission," he added.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/civil-society-privacy-bill.pdf" class="internal-link"&gt;Click to read the full story&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-may-6-2014-laxmi-ajai-prasanna-civil-society-pushes-for-privacy-panel'&gt;https://cis-india.org/news/the-times-of-india-may-6-2014-laxmi-ajai-prasanna-civil-society-pushes-for-privacy-panel&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    

   <dc:date>2014-05-27T11:39:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet">
    <title>Filtering content on the internet</title>
    <link>https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;hr /&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The op-ed was &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-opinion/filtering-content-on-the-internet/article5967959.ece"&gt;published in the Hindu&lt;/a&gt; on May 2, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;On May 5, the Supreme Court will hear Kamlesh Vaswani’s infamous anti-pornography petition again. The petition makes some rather outrageous claims. Watching pornography ‘puts the country’s security in danger’ and it is ‘worse than Hitler, worse than AIDS, cancer or any other epidemic,’ it says. This petition has been pending before the Court since February 2013, and seeks a new law that will ensure that pornography is exhaustively curbed.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Disintegrating into binaries&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The petition assumes that pornography causes violence  against women and children. The trouble with such a claim is that the  debate disintegrates into binaries; the two positions being that  pornography causes violence or that it does not. The fact remains that  the causal link between violence against women and pornography is yet to  be proven convincingly and remains the subject of much debate.  Additionally, since the term pornography refers to a whole range of  explicit content, including homosexual adult pornography, it cannot be  argued that all pornography objectifies women or glamorises violent  treatment of them.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Allowing even for the petitioner’s legitimate concern about  violence against women, it is interesting to note that of all the  remedies available, he seeks the one which is authoritarian but may not  have any impact at all. Mr. Vaswani could have, instead, encouraged the  state to do more toward its international obligations under the  Convention on the Elimination of Discrimination against Women (CEDAW).  CEDAW’s General Recommendation No. 19 is about violence against women  and recommends steps to be taken to reduce violence against women. These  include encouraging research on the extent, causes and effects of  violence, and adopting preventive measures, such as public information  and education programmes, to change attitudes concerning the roles and  status of men and women.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Child pornography&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Although different countries disagree about the necessity  of banning adult pornography, there is general international consensus  about the need to remove child pornography from the Internet. Children  may be harmed in the making of pornography, and would at the very  minimum have their privacy violated to an unacceptable degree. Being  minors, they are not in a position to consent to the act. Each act of  circulation and viewing adds to the harmful nature of child pornography.  Therefore, an argument can certainly be made for the comprehensive  removal of this kind of content.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Indian policy makers have been alive to this issue. The  Information Technology Act (IT Act) contains a separate provision for  material depicting children explicitly or obscenely, stating that those  who circulate such content will be penalised. The IT Act also  criminalises watching child pornography (whereas watching regular  pornography is not a crime in India).&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Intermediaries are obligated to take down child pornography  once they have been made aware that they are hosting it. Organisations  or individuals can proactively identify and report child pornography  online. Other countries have tried, with reasonable success, systems  using hotlines, verification of reports and co-operation of internet  service providers to take down child pornography. However, these systems  have also sometimes resulted in the removal of other legitimate  content.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Filtering speech on the Internet&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Child pornography can be blocked or removed using the IT  Act, which permits the government to send lists of URLs of illegal  content to internet service providers, requiring them to remove this  content. Even private parties can send notices to online intermediaries  informing them of illegal content and thereby making them legally  accountable for such content if they do not remove it. However, none of  this will be able to ensure the disappearance of child pornography from  the Internet in India.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Technological solutions like filtering software that  screens or blocks access to online content, whether at the state,  service provider or user level, can at best make child pornography  inaccessible to most people. People who are more skilled than amateurs  will be able to circumvent technological barriers since these are  barriers only until better technology enables circumvention.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Additionally, attempts at technological filtering usually  even affect speech that is not targeted by the filtering mechanism.  Therefore, any system for filtering or blocking content from the  Internet needs to build in safeguards to ensure that processes designed  to remove child pornography do not end up being used to remove political  speech or speeches that are constitutionally protected.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In the Vaswani case, the government has correctly explained  to the Supreme Court that any greater attempt to monitor pornography is  not technologically feasible. It has pointed out that human monitoring  of content will delay transmission of data substantially, will slow down  the Internet, and will also be ineffective, since the illegal content  can easily be moved to other servers in other countries.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Making intermediaries liable for the content they host will  undo the safe harbour protection granted to them by the IT Act. Without  it, intermediaries like Facebook will actually have to monitor all the  content they host, and the resources required for such monitoring will  reduce the content that makes its way online. This would seriously  impact the extensiveness and diversity of content available on the  Internet in India. Additionally, when demands are made for the removal  of legitimate content, profit-making internet companies will be  disinclined to risk litigation much in the same way as Penguin was  reluctant to defend Wendy Doniger’s book.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;If the Supreme Court makes the mistake of creating a  positive obligation to monitor Internet content for intermediaries, it  will effectively kill the Internet in India.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;i&gt;(Chinmayi Arun &lt;/i&gt;is &lt;i&gt;research director, Centre for  Communication Governance, National Law University, Delhi, and fellow,  Centre for Internet and Society, &lt;/i&gt;Bangalore)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet'&gt;https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-05-06T09:33:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get">
    <title>Networks: What You Don’t See is What You (for)Get</title>
    <link>https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get</link>
    <description>
        &lt;b&gt;When I start thinking about DML (digital media and learning) and other such “networks” that I am plugged into, I often get a little confused about what to call them.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog entry was originally &lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/networks-what-you-don%E2%80%99t-see-what-you-forget"&gt;published in DML Central&lt;/a&gt; on April 17, 2014 and mirrored in &lt;a class="external-link" href="http://hybridpublishing.org/2014/05/what-you-dont-see-is-what-you-forget/"&gt;Hybrid Publishing Lab&lt;/a&gt; on May 13, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Are we an ensemble of actors? A cluster of friends? A conference of scholars? A committee of decision makers? An array of perspectives? A group of associates? A play-list of voices? I do not pose these  questions rhetorically, though I do enjoy rhetoric. I want to look at this inability to name collectives and the confusions and ambiguity it produces as central to our conversations around digital thinking. In particular, I want to look at the notion of the network. Because, I am sure, that if we were to go for the most neutralised digital term to characterise this collection that we all weave in and out of, it would have to be the network. We are a network.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, what does it mean to say that we are a network? The network is a very strange thing. Especially within the realms of the Internet, which, in itself, purports to be a giant network, the network is self-explanatory, self-referential and completely denuded of meaning. A network is benign, and like the digital, that foregrounds the network aesthetic, the network is inscrutable. You cannot really touch a network or name it. You cannot shape it or define it. You can produce momentary snapshots of it, but you can never contain it or limit it. The network cannot be held or materially felt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, the network touches us. We live within networked societies. We engage in networking – network as a verb. We are a network – network as a noun. We belong to networks – network as a collective. In all these poetic mechanisms of network, there is perhaps the core of what we want to talk about today – the tension between the local and the global and the way in which we will understand the Internet and then the frameworks of governance and policy that surround it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Let me begin with a genuine question. What predates the network? Because the network is a very new word. The first etymological trace of the network is in 1887, where it was used as a verb, within broadcast and communications models, to talk about an outreach. As in ‘to cover with a network.’ The idea of a network as a noun is older where in the 1550s, the idea of ‘net-like arrangements of threads, wires, etc.’ was first identified as a network. In the second half of the industrial 19th Century, the term network was used for understanding an extended, complex, interlocking system. The idea of network as a set of connected people emerged in the latter half of the 20thCentury. I am pointing at these references to remind us that the ubiquitous presence of the network, as a practice, as a collective, and as a metaphor that seeks to explain the rest of the world around us, is a relatively new phenomenon. And we need to be aware of the fact, that the network, especially as it is understood in computing and digital technologies, is a particular model through which objects, individuals and the transactions between them are imagined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For anybody who looks at the network itself – especially the digital network that we have accepted as the basis on which everything from social relationships on Facebook to global financial arcs are defined – we know that the network is in a state of crisis.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Networks of crises: The Bangalore North East Exodus&lt;/h3&gt;
&lt;p&gt;Let me illustrate the multiple ways in which the relationship between networks and crisis has been imagined through a particular story. In August 2012, I woke up one morning to realise that I was living in a city of crisis. Bangalore, which is one of my homes, where the largest preoccupations to date have been about bad roads, stray dogs, and occasionally, the lack of a nightlife, was suddenly a space that people wanted to flee and occupy simultaneously.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Through the technology mediated gossip mill that produced rumours faster than the speed of a digital click, imagination of terror, danger, and material harm found currency. The city suddenly witnessed thousands of people running away from it, heading back to their imagined homelands. It was called the North East exodus, where, following an ethnic-religious clash between two traditionally hostile communities in Assam, there were rumours that the large North East Indian community in Bangalore was going to be attacked by certain Muslim factions at the end of Ramadan.&lt;br /&gt;The media spectacle of the exodus around questions of religion, ethnicity, regionalism and belonging only emphasised the fact that there is a new way of connectedness that we live in – the network society that no longer can be controlled, contained or corrected by official authorities and their voices. Despite a barrage of messages from law enforcement and security authorities, on email, on large screens on the roads, and on our cell phones, there was a growing anxiety and a spiralling information explosion that was producing an imaginary situation of precariousness and bodily harm. For me, this event, was one of the first signalling how to imagine the network society in a crisis, especially when it came to Bangalore, which is supposed to represent the Silicon dreams of an India that is shining brightly. While there is much to be unpacked about the political motivations and the ecologies of fear that our migrant lives in global cities are enshrined in, I want to specifically focus on what the emergence of this network society means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is an imagination, especially in cities like Bangalore, of digital technologies as necessarily plugging in larger networks of global information consumption. The idea that technology plugs us into the transnational circuits is so huge that it only tunes us toward an idea of connectedness that is always outward looking, expanding the scope of nation, community and body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the ways in which information was circulating during this phenomenon reminds us that digital networks are also embedded in local practices of living and survival. Most of the time, these networks are so natural and such an integral part of our crucial mechanics of urban life that they appear as habits, without any presence or visibility. In times of crises – perceived or otherwise – these networks make themselves visible, to show that they are also inward looking. But in this production of hyper-visible spectacles, the network works incessantly to make itself invisible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which is why, in the case of the North East exodus, the steps leading to the resolution of the crisis, constructed and fuelled by networks is interesting. As government and civil society efforts to control the rumours and panic reached an all-time high and people continued to flee the city, the government eventually went in to regulate the technology itself. There were expert panel discussions about whether the digital technologies are to be blamed for this rumour mill. There was a ban on mass-messaging and there was a cap on the number of messages which could be sent on a day by each mobile phone subscriber. The Information and Broadcast Ministry along with the Information Technologies cell, started monitoring and punishing people for false and inflammatory information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Network as Crisis: The unexpected visibility of a network&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;What, then, was the nature of the crisis in this situation? It is a question worth exploring. We would imagine that this crisis was a crisis about the nationwide building of mega-cities filled with immigrant bodies that are not allowed their differences because they all have to be cosmopolitan and mobile bodies. The crisis could have been read as one of neo-liberal flatness in imagining the nation and its fragments, that hides the inherent and historical sites of conflict under the seductive rhetoric of economic development. And yet, when we look at the operationalization of the resolutions, it looked as if the crisis was the appearance and the visibility of the hitherto hidden local networks of information and communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In her analysis of networks, Brown University’s Wendy Chun posits that this is why networks are an opaque metaphor. If the function of metaphor is to explain, through familiarity, objects which are new to us, the network as an explanatory paradigm presents a new conundrum. While the network presumes and exteriority that it seeks to present, while the network allows for a subjective interiority of the actor and its decisions, while the network grants visibility and form to the everyday logic of organisation, what the network actually seeks to explain is itself. Or, in less evocative terms, the network is not only the framework through which we analyse, but it is also the object of analyses. Once the network has been deployed as a paradigm through which to understand a crisis, once the network has made itself visible, all our efforts are driven at explaining and strengthening, and almost like digital mothers, comfort the network back into its peaceful existence as infrastructure. We develop better tools to regulate the network. We define new parameters to mine the data more effectively. We develop policies to govern and govern through the network with greater transparency and ease.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, in the case of the North East exodus, instead of addressing the larger issues of conservative parochialism, an increasing backlash by right-wing governments and a growing hostility that emerges from these cities that nobody possesses and nobody belongs to, the efforts were directed at blaming technology as the site where the problem is located and the network as the object that needs to be controlled. What emerged was a series of corrective mechanisms and a set of redundant regulations that controlled the number of text messages that people were able to send per day or policing the Internet for spreading rumours. The entire focus was on information management, as if the reason for the mass exodus of people from the NE Indian states and the sense of fragility that the city had been immersed in, was all due to the pervasive and ubiquitous information gadgets and their ability to proliferate in p2p (peer-to-peer) environments outside of the government’s control. This lack of exteriority to the network is something that very few critical voices have pointed out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Duncan Watts, the father of network computing, working through the logic of nodes, traffic and edges, has suggested there is a great problem in the ways in which we understand the process of network making. I am paraphrasing his complex mathematical text that explains the production of physical networks – what he calls the small worlds – and pointing out his strong critique about how the social scientists engage with networks. In the social sciences’ imagination of networks, there is a messy exteriority – fuzzy, complex and often not reducible to patterns or basic principles. The network is a distilling of the messy exteriority, a representation of the complex interplay between different objects and actors, and a visual mapping of things as they are. Which is to say, we imagine there is a material reality and the network is a tool by which this reality, or at least parts of this reality, are mapped and represented to us in patterns which can help us understand the true nature of this reality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Drawing from practices of network modelling and building, Watts proved, that we have the equation wrong. The network is not a representation of reality but the ontology of reality. The network is not about trying to make sense of an exteriority. Instead, the network is an abstract and ideological map that constructs the reality in a particular way. In other words, the network precedes the real, and because of its ability to produce objective, empiricist and reductive principles (constantly filtering out that which is not important to the logic or the logistics of the network design), it then gives us a reality that is produced through the network principles. To make it clear, the network representation is not the derivative of the real but the blue-print of the real. And the real as we access it, through these networked tools, is not the raw and messy real but one that is constructed and shaped by the network in those ways. The network, then, needs to be understood, examined and critiqued, not as something that represents the natural, but something that shapes our understanding of the natural itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of the Bangalore North East Exodus, the network and its visibility created a problem for us – and the problem was, that the network, which is supposed to be infrastructure, and hence, by nature invisible, had suddenly become visible. We needed to make sure that it was shamed, blamed, named and tamed so that we can go back to our everyday practices of regulation, governance and policy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Intersectional Network&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;What I want to emphasise, then, is that this binary of local versus the global, or local working in tandem with global, or the quaintly hybridised glocal are not very generative in thinking of policy and politics around the Internet. What we need is to recognise what gets hidden in this debate. What becomes visible when it is not supposed to? What remains invisible beyond all our efforts? And how do we develop a framework that actually moves beyond these binary modes of thinking, where the resolution is either to collapse them or to pretend that they do not exist in the first place? Working with frameworks like the network makes us aware of the ways in which these ideas of the global and the local are constructed and continue to remain the focus of our conversations, making invisible the real questions at hand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, we need to think of networks, not as spaces of intersection, but in need of intersections. The networks, because of their predatory, expanding nature, and the constant interaction with the edges, often appear as dynamic and inclusive. We need to now think of the networks as in need of intersections – or of intersectional networks. Developing intersections, of temporality, of geography and of contexts are great. But, we need to move one step beyond – and look at the couplings of aspiration, inspiration, autonomy, control, desire, belonging and precariousness that often mark the new digital subjects. And our policies, politics and regulations will have to be tailored to not only stop the person abandoning her life and running to a place of safety, not only stop the rumours within the Information and communication networks, not only create stop-gap measures of curbing the flows of gossip, but to actually account for the human conditions of life and living.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. This post has grown from conversations across three different locations. The first draft of this talk was presented at the Habits of Living Conference, organised by the Centre for Internet &amp;amp; Society and Brown University, in Bangalore. A version of this talk found great inputs from the University of California Humanities Research Institute in Irvine, where I found great ways of sharpening the focus. The responses at the Milton Wolf Seminar at the America Austria Foundation, Austria, to this story, helped in making it more concrete to the challenges that the “network” throws to our digital modes of thinking. I am very glad to be able to put the talk into writing this time, and look forward to more responses.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get'&gt;https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-28T09:30:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
