<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2496 to 2510.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/no-more-blocking-of-websites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/securing-e-governance-event-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/consumer-privacy-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/net-loss"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/censorship-2020"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/google-hangout-with-sunil"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/co-spying-on-competitors-staff"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-liberty-2012"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/has-geek-presents-the-fifth-elephant"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/recruitment-tracker-21-students-placed"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ppos-save-placement-record-as-christ-laws-2nd-graduating-batch-hosts-fewer-law-firms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/india-the-new-front-line-in-the-global-struggle-for-internet-freedom"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/indias-struggle-for-online-freedom"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/no-more-blocking-of-websites">
    <title>No more blocking of entire websites?</title>
    <link>https://cis-india.org/news/no-more-blocking-of-websites</link>
    <description>
        &lt;b&gt;The Madras HC has taken one step to ensure that entire websites are no longer blocked, but it doesn't mean that arbitrary takedowns will cease. &lt;/b&gt;
        &lt;p&gt;&lt;span&gt;CIS research is quoted in this article by Danish Sheikh published in the &lt;/span&gt;&lt;a href="http://www.business-standard.com/india/news/no-more-blockingentire-websites/478261/"&gt;Business Standard on June 24, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vimeo’s back. As is Pastebin, and Pirate Bay and IsoHunt. For your, you know, legitimate file-sharing practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Having been approached by a consortium of Internet Service Providers, the Madras High Court has issued a welcome clarification of its “John Doe order” issued in favour of RK Productions for the films 3 and Dammu. Designed to protect against potential offences by yet-unidentified persons, the sweeping scope of the order left a very wide, undefined scope to ISPs dealing with potentially infringing material. The ISPs over-complied, a host of file-sharing websites were barred from Indian servers overnight — oh, and “Anonymous” got more annoyed. Note here that the vagueness of the order extended to not specifying any infringing websites in particular.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the representation from the ISPs, the Court has provided them a specific directive. The new order states that the interim injunction was granted only with respect to the particular URL which featured the infringing movie, and not the entire website. No more blocking entire websites — the ISPs are now required to be informed about the particulars of where the infringing movie is kept within 48 hours.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The clarification couldn’t have come at a more vital time, and will hopefully serve as a precedent to curb an alarming practice that can be traced back to 2002. Back then, the Delhi High Court was approached in a matter concerning the unauthorised transmission of Ten Sports by unlicensed cable operators. The result was the Court’s first John Doe order with respect to media transmission: a commissioner was appointed to search premises of unnamed cable operators and seize evidence by taking photographs and video films. This particular order was then relied on by the Court almost a decade later in pre-emptively injuncting piracy of UTV Software Communication’s Saat Khoon Maaf and Thank You. The trend escalated from there, with similar orders being obtained for a number of films including Don 2, Bodyguard, Kahaani and Department, to name a few.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where the last few years have seen a steadily rising output of orders largely from the Delhi and Madras High Court, just last week it was the Bombay High Court that joined the fray. Approached by Viacom 18 Motion Pictures, it passed a John Doe pre-emptively banning the piracy of Viacom’s Gangs of Wasseypur prior to its June 22 release. Considering the Bombay High Court’s noted apprehension in granting ex-parte orders, this decision looked set to add further momentum to the John Doe juggernaut.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, we get the Madras High Court’s welcome restraint. That vague injunctions are an abuse of process is a principle that has been noted time and again, with the Delhi High Court even noting that “vague and general injunction of anticipatory nature can never be granted”. This is coupled with the larger access to information and free speech issue that has been raised more vocally following the ire with the mass block of file-sharing websites. The antecedents to this scenario may well be the media infrastructure cases of the ‘50s and ‘60s, where newspaper content was indirectly being regulated by way of regulation of newsprint, advertisement space, etc. Recognising these indirect control mechanisms in their ultimate speech-restricting form, the Supreme Court struck them down as unreasonable restrictions to the right to free expression under Article 19(1)(a) of the Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prevention isn’t always better than cure. The Madras High Court has thankfully taken one step in the direction. What is left dangling is the other big question — that of the intermediary rules. There may now be a barrier to blocking of entire websites in this manner, but as so many internet users have found, one doesn’t have to necessarily approach the Courts if they want internet service providers to take down content: the ISPs are happy to do that for free. As a Centre for Internet and Society study found, takedown requests sent to ISPs, no matter how trivial or flimsy, will for the most part be met by acquiescence of the order. Without appropriate checks and balances, the intermediary will over-comply.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the ISPs’ intervention before the Madras High Court is an encouraging sign, it doesn’t mean that the arbitrary takedowns under the intermediary rules will cease to happen. The digital media site Medianama quotes an ISP representative citing concern that ISPs were being wrongfully vilified on the Internet — and (significantly) that it would adversely impact their business if video streaming was disabled for users. The same commercial considerations wouldn’t likely stand when it comes to the bit-by-bit requests that come forward under the IT rules. Along with focusing attention on the High Court’s clarification, we need to sustain the movement to strike down the intermediary rules and push for a more transparent and fair mechanism.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/no-more-blocking-of-websites'&gt;https://cis-india.org/news/no-more-blocking-of-websites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-06-26T09:47:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you">
    <title>UID: Are your biometric I-cards stacked against you?</title>
    <link>https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you</link>
    <description>
        &lt;b&gt;Imagine a rural family of five. Mom. Dad. Two kids. And Grandma. Assume too that they are below the poverty line. The day is coming when this family will have to give its biometrics out to myriad agencies. &lt;/b&gt;
        &lt;p&gt;&lt;a href="http://articles.economictimes.indiatimes.com/2012-06-24/news/32382928_1_biometrics-uidai-national-population-register"&gt;This article by M Rajshekhar was published in the Economic Times on June 24, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;You know that Nandan Nilekani's &lt;a href="http://economictimes.indiatimes.com/topic/Unique%20Identification%20Authority%20of%20India" target="_blank"&gt;&lt;span&gt;Unique Identification Authority of India&lt;/span&gt;&lt;/a&gt; (UIDAI) or the Registrar General's &lt;a href="http://economictimes.indiatimes.com/topic/National%20Population%20Register" target="_blank"&gt;&lt;span&gt;National Population Register&lt;/span&gt;&lt;/a&gt; (NPR) has been collecting biometrics for a while now. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; But a set of other departments have entered the fray. This ranges from  the PDS department, ministry of rural development (MoRD), states'  education departments, the Rashtriya Swasthya Bima Yojana (RSBY), banks,  the department of social welfare, the post office...they are all  collecting biometrics (see Agencies Collecting Biometrics Right Now). &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; This is the latest iteration in India's tryst with biometrics. From a beginning where only the &lt;a href="http://economictimes.indiatimes.com/topic/NPR" target="_blank"&gt;&lt;span&gt;NPR&lt;/span&gt;&lt;/a&gt; — and, a little later, the &lt;a href="http://economictimes.indiatimes.com/topic/UIDAI" target="_blank"&gt;&lt;span&gt;UIDAI&lt;/span&gt;&lt;/a&gt; — were to capture biometrics, we have now reached a point where myriad  departments and ministries are camping in India's villages and towns,  capturing &lt;a href="http://economictimes.indiatimes.com/topic/fingerprints" target="_blank"&gt;&lt;span&gt;fingerprints&lt;/span&gt;&lt;/a&gt; and iris images. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt; Identity Thieves &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; There was to be one large database. Now, we are moving to a system  where multiple agencies capture and store biometrics data in myriad  servers. This is amplifying the risk of biometric theft. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; As Sunil Abraham, the head of Bangalore-based Centre for Internet and  Society says, "If biometrics is used as authentication factor then it  would be possible for a criminal to harvest your biometrics — such as  using a glass to collect fingerprints — without your conscious  cooperation. Or the registrar can cache your biometrics and duplicate  transactions." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; As the number of databases containing biometrics rises, the risk of  this information leaking out increases. There have been complaints  against an UIDAI enrolment agency called Madras Security Printers that  it had sold data to private companies. There were also charges that  enrolment agencies had outsourced the enrolment work to other companies,  which they are not allowed to do. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; What complicates matters further is there are not many safeguards. The  country doesn't have a policy on how biometrics can be captured, used,  stored and destroyed. But before we get deeper into that story, it is  useful to understand why multiple departments have begun collecting  biometrics. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt; Biometric Rush &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; According to a senior bureaucrat who recently retired from the ministry  of planning, the answer lies in the 2014 elections. "For the  government, cash transfers are the large reforms that they think UPA 2  can point towards in the next elections. For this reason, they need all  this up and running before 2014." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; However, over the past few months, parts of the government are  increasingly unsure if UIDAI and NPR will meet their targets. "I do not  think the 2014 target can be met at all," says a senior official in the &lt;a href="http://economictimes.indiatimes.com/topic/National%20Informatics%20Centre" target="_blank"&gt;&lt;span&gt;National Informatics Centre&lt;/span&gt;&lt;/a&gt; (NIC). "We have to enroll another 800 million people. Then, we have to  deduplicate them. Then, we have to make the cards and distribute them." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; This is one reason why a set of government departments are configuring  their own alternatives. Take the Department of Financial Services (DFS).  It has been testing an online, biometric system for cash payments in  Haryana's Mewat district for months now. Here, each bank will store its  customers' biometric information in its own servers. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; If a customer of bank A goes to a banking correspondent (BC) agent of  bank B, his biometrics would be forwarded by bank B to bank A for  authentication. Once authenticated, the transaction will be completed.  "We should be rolling the new system out nationally from July or  August," says the bureaucrat. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; The rural development ministry is also testing its payment system. Once  the local administration tells the ministry about who worked how many  days, the ministry will be able to put money into their accounts  automatically via a payment gateway. Right now, this is done manually  with the block development officer and sarpanch making out the cheques. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; This pilot, says DK Jain, joint secretary, MoRD, started 3-4 months ago  in parts of Gujarat, Karnataka, Odisha and Rajasthan. In another six  months, it will be available across the country. And then, there is the  PDS. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; Here, different states are putting different systems in place. Andhra,  says a senior mandarin in the food ministry, is going with UID, Haryana  is looking at smart cards, Jharkhand is going with Aadhaar, MP and  Gujarat are testing food coupons, while Chhattisgarh has decided to use  RSBY and Orissa has chosen NPR. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; Apart from this, data is also being collected by the RSBY and BC  companies on behalf of the banks handling welfare payments, or  scrambling to meet their financial inclusion targets. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;Sunil Abraham is quoted in this article&lt;/i&gt;.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you'&gt;https://cis-india.org/news/are-your-biometric-i-cards-stacked-against-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-26T09:33:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/securing-e-governance-event-report">
    <title>Securing e-Governance</title>
    <link>https://cis-india.org/internet-governance/securing-e-governance-event-report</link>
    <description>
        &lt;b&gt;On June 16, 2012, Privacy India in partnership with the Centre for Internet &amp; Society, Bangalore, International Development Research Centre, Canada, Privacy International, UK and the Society in Action Group, Gurgaon organised a public discussion on “Securing e-Governance: Ensuring Data Protection and Privacy”, at the Ahmedabad Management Association. &lt;/b&gt;
        &lt;p&gt;The conversation brought together a cross section of citizens, lawyers, activists, researchers, academia and students.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Prashant.jpg/@@images/7d25500b-2486-4674-9b83-5584b672cf38.jpeg" alt="Prashant Iyengar" class="image-inline" title="Prashant Iyengar" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Prashant Iyengar, &lt;/b&gt;&lt;b&gt;Assistant Professor, Jindal Global Law,&lt;/b&gt; opened the conference with an explanation of Privacy India’s mandate to  raise awareness, spark civil action and promote democratic dialogue  around privacy challenges and violations in India. He summarized the  series of eight consultation previously organized across India in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary"&gt;Kolkata&lt;/a&gt; on January 23, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-conferencebanglaore"&gt;Bangalore&lt;/a&gt; on February 5, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad"&gt;Ahmedabad&lt;/a&gt; on March 26, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report"&gt;Guwahati&lt;/a&gt; on June 23, 2011, in &lt;a href="https://cis-india.org/internet-governance/privacy-chennai-report.pdf/view"&gt;Chennai&lt;/a&gt; on August 6, 2011, in &lt;a href="https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill"&gt;Mumbai&lt;/a&gt; on January 21, 2012, in &lt;a href="https://cis-india.org/internet-governance/all-india-privacy-delhi-report"&gt;New Delhi&lt;/a&gt; on February 3, 2012 and again in &lt;a href="https://cis-india.org/internet-governance/high-level-privacy-conclave"&gt;New Delhi&lt;/a&gt; on February 4, 2012.&lt;/p&gt;
&lt;p&gt;He described an egregious instance where the State Government of  Karnataka, announced a plan to “post on its website all details of (1.51  crore) ration cardholders in the state”, to weed out duplicate ration  cards and promote transparency. Details posted on the website would  include the “ration card number, category of card (BPL/APL), names and  photographs of the head and other members of a family, address, sources  of income, LPG gas connection and number of cylinders in  village/taluk/district wise.” An official said, “This would also work as  a marriage bureau, for instance, a boy can see a photograph of a girl  on the website and see whether she suits him”.&lt;a href="#_ftn1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;He described another embarrassing incident, which took place in 2008.  Sixteen surveillance cameras were stolen from the Taj Mahal. After they  had been replaced, in December 2010, it was reported that all of the  CCTVs in the Taj Mahal had stopped working due to a “virus attack” on  their computer systems. The district administration and the police  department were apparently in disagreement as to who bore the burden of  their maintenance.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Prof. Subhash Bhatnagar, Advisor Center for e-Governance IIM, Ahmedabad&lt;/b&gt;,  dismissed the notion that privacy is irrelevant in India. A survey on  e-governance, of 50,000 people conducted in major cities of India shows  that confidentiality and security of data were among the top 3 concerns  among 20 choices. He discussed various mission mode projects in the  National e-Governance Plan that holds and shares large amounts of data  on individuals and business. He referred to his personal experience when  enrolling for UID. He noticed that the box concerning consent for  sharing of information with third parties was, by default, automatically  ticked. When he asked the UID staff, they mentioned that the software  does not allow for enrollment to continue if the box is not ticked. He  called for increased vigilance among citizens, a phone helpline  dedicated to resolution of privacy intrusions and sensitizing designers  of e-Governance projects.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Subhash.jpg/@@images/1bc58ead-4318-430d-bc78-b892513ad498.jpeg" alt="Subhash Bhatnagar" class="image-inline" title="Subhash Bhatnagar" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Nityesh.jpg/@@images/2e28525b-1577-4abb-96c8-68284ac72f46.jpeg" alt="Nityesh Bhatt" class="image-inline" title="Nityesh Bhatt" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Dr. Nityesh Bhatt, Sr. Associate Prof and Chairperson-Information   Management Area, Institute of Management, Nirma University, Ahmedabad,&lt;/b&gt;&lt;i&gt; &lt;/i&gt;stressed   the importance of limiting access of information on a need-to-know   basis, which is one of the most fundamental security principles. He   described various characteristics of information security management   including: planning, policy, programs, protection, people and project   management. Lastly, he recommended ‘SETA’ as an essential program,   designed to reduce the incidence of accidental security breaches by   employees, contractors, consultants, vendors, and business partners. A   SETA program consists of three elements: security education, security  training, and security awareness. It can improve employee behavior and  enables the organization to hold employees accountable for their  actions.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Dr. Neeta Shah, &lt;/b&gt;&lt;b&gt;Director (e-Governance) Gujarat Informatics Limited,&lt;/b&gt;&lt;i&gt; &lt;/i&gt;described   the extent of e-governance initiatives in Gujarat (there are more than   100 e-governance applications running) and its impact. She discussed   successful e-governance initiatives that have helped solve critical   problems such as the online teacher application process, which   accelerates the recruitment process of primary teachers.&lt;/p&gt;
&lt;p&gt;E-governance applications of various departments ensure security of data and privacy protection through the following measures:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Network security (NIPS, Firewalls, content filtering, HIPS, antivirus, etc.)&lt;/li&gt;
&lt;li&gt;Data security (robust SAN environment with high raid levels to prevent any data loss)&lt;/li&gt;
&lt;li&gt;Application security (audited by empanelled TPA)&lt;/li&gt;
&lt;li&gt;DR/BCP provisioning (real-time data is replicated to DR site in case  of any physical calamity or damage to resources at primary site, backup  exists at remote different seismological locations)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;When  designing e-government projects, the government tends to think about  security of the system, but not privacy of the data. Security in the  minds of the government is achieved through strengthening  infrastructure, but they often overlook the human dynamic.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Neeta.jpg/@@images/6f2d5dba-dac7-4743-ad72-72b47f919575.jpeg" alt="Neeta Shah" class="image-inline" title="Neeta Shah" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Gopalkrishnan Devnathan (Kris dev), Co-founder, International Transparency and Accountability Network,&lt;/b&gt;&lt;i&gt; &lt;/i&gt;described  e-Governance as the application of Information and Communication  Technology for delivering government services. It involves the  integration of various systems and services between  Government-to-Citizens, Government-to-Business, Government-to-Government  as well as back office processes and interactions within the entire  government framework. E-governance initiatives can ensure privacy and  security through:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Securing data/transaction using Smart Card with triple access control, Card, PIN and Biometrics (multimodal)&lt;/li&gt;
&lt;li&gt;Mirrored data storage with proper security&lt;/li&gt;
&lt;li&gt;Indelible audit trail using encrypted flat file&lt;/li&gt;
&lt;li&gt;Prevent server intrusion and data theft upfront rather than do post-mortem analysis&lt;/li&gt;
&lt;li&gt;Information on data accessed can be communicated on real time basis using ICT tools&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Lastly, he&lt;i&gt; &lt;/i&gt;identified the usefulness, inhibitions and potential security solutions for the Unique Identification System.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Gopalakrishnan.jpg/@@images/cb006e36-05e6-410f-87de-a179119a5023.jpeg" alt="Gopalakrishnan Devnathan" class="image-inline" title="Gopalakrishnan Devnathan" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Anindya.jpg/@@images/1f025dc0-c8bd-4df9-af39-dbabdfb83521.jpeg" alt="Anindya Kumar" class="image-inline" title="Anindya Kumar" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Anindya Kumar Banerjee, Regional Manager- East, CG &amp;amp; MP at Ncomputing Inc., &lt;/b&gt;discussed a comparative analysis of e-governance initiatives in India. He analyzed various factors such as ease of use, simplicity of procedures, time savings compared to manual, affordable cost of service and reduction in corruption. He described the difference infrastructural threats of security and privacy in e-Governance.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Dr. Mrinalini Shah, Professor of Operations Management at Institute of Management Technology, Ghaziabad&lt;/b&gt;&lt;i&gt; &lt;/i&gt;identified  the slow legal system and multiple jurisdiction system as a challenge  for privacy and security of data and implementations of suitable access  controls and authorization as a helping factor.&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Mrinalini.jpg/@@images/efdbd8d4-d5d6-4a3d-9360-6aaa79acfaa2.jpeg" alt="Mrinalini Shah" class="image-inline" title="Mrinalini Shah" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Utkarsh.jpg/@@images/28ea0c0e-9ede-436c-bca6-12fd6f748c37.jpeg" alt="Utkarsh Jani" class="image-inline" title="Utkarsh Jani" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Utkarsh Jani, Advocate, Jani Advocates&lt;/b&gt;, described the relevant section of the Information Technology Act (ITA) relating to privacy and the political and social challenges surrounding the right to privacy. He discussed the right to privacy vis-à-vis data protection.  Though the ITA does enforce a level of data protection, it is far from flawless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ITA lacks the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The definition and classification of data types.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;The nature and protection of the categories of data.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Data controllers and data processors have distinct &lt;/li&gt;
&lt;li&gt;Clear restrictions on the manner of data collection.&lt;/li&gt;
&lt;li&gt;Clear guidelines on the purposes for which the data can be put and to whom it can be sent.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Standards and technical measures governing the collection, storage, access to, protection, retention and destruction of data.&lt;/li&gt;
&lt;li&gt;It does not provide strong safeguard and penalties against the aforesaid breaches. &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;S&lt;b&gt;unny Vaghela, Founder and CTO, TechDefence Pvt. Ltd&lt;/b&gt;., provided a hacker’s perspective to security and privacy issues in e-governance. Cyber crimes such as privacy violations and data breaches are increasing because of the dependence on complex computer infrastructures. Complex computer infrastructures make systems vulnerable because if one application is hacked, the entire network can be accessed and compromised.&lt;/p&gt;
&lt;p&gt;He conducted a live demonstration, showing how simple it is to hack into a government website. From his personal experience as an ethical hacker, he stated that government agencies are extremely negligent about the privacy and the security of data. A major concern with e-governance websites is that they not designed with privacy in mind, leaving the personal and private details of citizens vulnerable.&lt;/p&gt;
&lt;p&gt;He called for full penetration testing and vulnerability assessment of  e-governance portals in order to maintain the privacy of citizens and  protect government data. Some government websites that were hacked  include AMC e-governance (was awarded one best e-governance award in  2010), CBI server and the Income Tax of India server.&lt;/p&gt;
&lt;p&gt;Lastly, he described the frequent mistakes made by the government in  e-Governance projects. The government started using the e-Governance  systems in 2003. Typically, three things are a component of the  application: the person, the source code and the database, but the  security is on the network. Governments work on developing the network  to be secure, but they often overlook the application. A solution to  this could be the use of high interaction honey pots.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Sunny.jpg/@@images/3fbba656-7cad-49f4-8563-3bc50e958198.jpeg" alt="Sunny Vaghela" class="image-inline" title="Sunny Vaghela" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/NishaThompson.jpg/@@images/f03f05bb-ba12-421f-a921-47f4b80b17c2.jpeg" alt="Nisha Thompson" class="image-inline" title="Nisha Thompson" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Nisha Thompson, Data Project Manager at Arghyam/ India Water Portal&lt;/b&gt;, discussed the increased amount of data generated through e-governance initiatives and its impact. When more data is generated and collected, politics and privacy become intertwined. There can be a conflict between opening up data and privacy thus; one needs to decide on parameters. For example, with regards to privacy and national security, parameters should be in place to determine where privacy ends and the public good starts. In India, this line does not begin with the individual as it does in many contexts. Collective privacy in India is important. She described various online tools that increase transparency and awareness such as: Transparency Chennai, India Governs and I Paid a Bribe.&lt;/p&gt;
&lt;p&gt;Over the course of the day, participants engaged in lively discussion on various issues such as the objectives and features of e-governance, examples of e-governance projects, and the parameters, problems, loopholes and tensions in e-governance projects.&lt;/p&gt;
&lt;p&gt;Participants response to privacy concerns have to a large extent focused on the fact that e-Governance is a double-edge sword. E-governance initiatives are an invariable tool for ensuring wider participation and deeper involvement of citizens, institutions, NGOs as well as private firms in the decision making process. However, the political and regulatory environment must be strengthened.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy_of_participants.jpg/@@images/cc15001d-bf85-4b07-9eb8-c87cb6dcc50f.jpeg" alt="Participants" class="image-inline" title="Participants" /&gt;&lt;/p&gt;
&lt;h3&gt;About Privacy India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Privacy India was established in 2010 with the objective of raising awareness, sparking civil action and promoting democratic dialogue around privacy challenges and violations in India. One of our goals is to build consensus towards the promulgation of comprehensive privacy legislation in India through consultations with the public, policymakers, legislators and the legal and academic community.&lt;/p&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p&gt;&lt;a href="#_ftnref1"&gt;[1]&lt;/a&gt; Nagesh Prabhu, A way to check bogus ration cards, THE HINDU, September 18, 2010, &lt;a href="http://www.thehindu.com/todays-paper/tp-national/tp-karnataka/article696087.ece"&gt;http://www.thehindu.com/todays-paper/tp-national/tp-karnataka/article696087.ece&lt;/a&gt; (last visited Oct 23, 2011).&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click below to download the following resources:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="resolveuid/fc0269aba5d44a5488c08aefe92d58d2" class="internal-link"&gt;E-Governance, Identity and Privacy&lt;/a&gt; [PDF, 253 Kb]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/securing-e-governance-programme.pdf" class="internal-link"&gt;Event Brochure&lt;/a&gt; [PDF, 1618 Kb]&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/securing-e-governance-event-report'&gt;https://cis-india.org/internet-governance/securing-e-governance-event-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>natasha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-06-26T06:45:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/consumer-privacy-delhi">
    <title>Privacy Matters — Consumer Privacy</title>
    <link>https://cis-india.org/internet-governance/consumer-privacy-delhi</link>
    <description>
        &lt;b&gt;Privacy India, in partnership with the Centre for Internet &amp; Society, International Development Research Centre, Society in Action Group and Privacy International, invites you to a public conference focused on discussing the challenges and concerns to consumer privacy in India. The event will be held at the Indian International Centre, New Delhi on Saturday, July 7, 2012, from 9 a.m. to 5 p.m.&lt;/b&gt;
        &lt;p&gt;According to the Consumer Protection Act, 1986, a consumer is a broad  label for any person who buys any goods or services for consideration  with the intent of using them for a non-commercial purpose. Certain  services that consumers use may, by their very nature, put an  extraordinary amount of sensitive personal information into the hands of  vendors.&lt;/p&gt;
&lt;p&gt;Consumer privacy is concerned with accuracy of how a consumers  information is collected and used. Because a consumers relationship with  another entity is based on an exchange along consented terms, a breach  in consumer privacy can be constituted as an action that was not agreed  to. In the age of data collection – a breach in privacy occurs when  information is used in different ways than was intended. Consumer  privacy in India is determined at the sectoral level, and differs  depending on the services that is provided for.&lt;/p&gt;
&lt;p&gt;As corporations sell data banks, ISP's expose consumer habits, or  ones personal information falls in the wrong hands – the consequences  are far reaching, and can result in spamming, unwanted marketing, theft,  or the violation can impact an individual's ability to buy a home,  potential employment opportunities, or gain access to credit.&lt;/p&gt;
&lt;p&gt;In India, the right to privacy has been a neglected area of study and  engagement. Although sectoral legislation deals with privacy issues,  India does not as yet have a horizontal legislation that deals  comprehensively with privacy across all contexts. The absence of a  minimum guarantee of privacy is felt most heavily by marginalized  communities, including HIV patients, children, women, sexuality  minorities, prisoners, etc. - people who most need to know that  sensitive information is protected.&lt;/p&gt;
&lt;p&gt;Since June 2010, Privacy India in collaboration with Privacy  International, based in London, has been conducting workshops and  engaging in public awareness. Participants include policy makers,  researchers, sectoral experts, NGOs, and the public to discuss and  deliberate different questions of privacy, its intersections and its  implications with our everyday life. The discussions have ranged from  topics of online privacy to minority rights and privacy and e-Governance  initiatives privacy.  The workshops have been organized in different  cities - Bangalore, Guwahati, Mumbai, Delhi, Kolkata, Ahmedabad,  Chennai, Goa, etc.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/consumer-privacy-event" class="internal-link"&gt;Click here&lt;/a&gt; for the agenda&lt;/p&gt;
&lt;p&gt;Please confirm your participation with &lt;a class="external-link" href="mailto:natasha@cis-india.org"&gt;natasha@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Download the invite &lt;a href="https://cis-india.org/internet-governance/consumer-privacy-invite" class="internal-link"&gt;here&lt;/a&gt; [PDF, 160 Kb]&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Download our research &lt;a href="https://cis-india.org/internet-governance/consumer-research.pdf" class="internal-link"&gt;here&lt;/a&gt; [PDF, 178 Kb]&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/consumer-privacy-delhi'&gt;https://cis-india.org/internet-governance/consumer-privacy-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-07-31T10:55:30Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/net-loss">
    <title>NET LOSS </title>
    <link>https://cis-india.org/news/net-loss</link>
    <description>
        &lt;b&gt;Unless the IT Act is amended and the definition of ‘offensive’ online content clearly set out, attempts to gag the Internet will continue in our country, argues Abimanyu Nagarajan&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.telegraphindia.com/1120620/jsp/opinion/story_15632655.jsp#.T-gA68XvqTZ"&gt;The article was published in the Telegraph on June 20, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Lately, the Indian government seems to be trying its best to control the Internet. In the past few weeks, dozens of file hosting or sharing sites have been blocked by court order. Earlier this year Union human resource development minister, Kapil Sibal, came down heavily on social networking sites and the Internet and waxed eloquent on the need to weed out “offensive” content there.&lt;/p&gt;
&lt;p&gt;In fact, this week Google said that there was a 49 per cent increase in requests for content removal from India in the second half of 2011 compared to the first half. Of the 101 requests to take down 255 items, only five were made by the courts. The rest were by politicians and policemen.&lt;/p&gt;
&lt;p&gt;In the now infamous cartoon case, a professor of Calcutta’s Jadavpur University was arrested for circulating a cartoon relating to chief minister Mamata Banerjee via email. One of the charges levelled against him was that he was culpable under Section 66A of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p&gt;Indeed, experts feel that the IT Act and its vague and loose definition of what constitutes “offensive” content on the Net or on a social networking site can easily be abused by those who wish to control online content.&lt;/p&gt;
&lt;p&gt;Everything related to the Internet comes under the purview of the IT Act. As cyber law expert Pavan Duggal says, “The IT Act, 2000, covers all aspects pertaining to the use of computers, computer systems, computer networks, computer resources, communication devices as also data and information in the electronic format.”&lt;/p&gt;
&lt;p&gt;Social networking sites and what gets posted there also come under the act. Section 2(1)(w) of the act uses the term “intermediary” to mean any legal entity that receives, stores or transmits a message, or provides any service with respect to that message on behalf of another person. By this definition social networking sites are “intermediaries” and there are strict sets of rules and guidelines listed under Section 43(a) of the act that they have to follow if they want to operate in India.&lt;/p&gt;
&lt;p&gt;But what infuriates IT experts most is Section 66A of the IT Act, which leaves the term “offensive” utterly vague and fluid. It states: “Any person who sends, by means of a computer resource or a communication device (a) any information that is grossly offensive or has menacing character; (b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device; (c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages shall be punishable with imprisonment for a term which may extend to three years and with fine.”&lt;/p&gt;
&lt;p&gt;In addition, Rule 3 of the IT Intermediaries Guidelines, 2011, lays down that all Internet service providers, telecom companies, email and blogging services must take down content that is “harmful, harassing, blasphemous, defamatory…”. In fact, this provision allows you to send a takedown notice for any content that may have offended you and the item has to be deleted within 36 hours.&lt;/p&gt;
&lt;p&gt;This is draconian, say IT experts. As Prashant Mali, a cyber law expert and president of Cyber Law Consulting, puts it, “The problem is that the offences listed under Section 66A are non-bailable, cognisable offenses. Technically speaking, since nothing is specific, you can always be arrested.”&lt;/p&gt;
&lt;p&gt;Adds advocate Apar Gupta, a partner at law firm Advani and Company, “Section 66A is vague and stringent at the same time.”&lt;/p&gt;
&lt;p&gt;The extent to which these provisions in the IT Act can be abused was recently demonstrated by the Bangalore-based Centre for Internet Society (CIS). Sunil Abraham, executive director of CIS, talks about how the group flagged content as being offensive on a variety of sites, even though they weren’t so.&lt;/p&gt;
&lt;p&gt;“We sent takedown notices to e-commerce, content hosting, and news media sites,” recalls Abraham. “And in most cases, we found the intermediaries were very risk averse. For example, there was one site that was talking about game theory — a mathematics model on decision making. As part of the article, they had linked out to a few gambling sites to support their research. We sent notices saying that the site promoted gambling and was therefore offensive. They didn’t just remove the links, they took the whole site down.”&lt;/p&gt;
&lt;p&gt;Mahesh Murthy, CEO of Pinstorm, a digital advertising firm, points out that this means individuals are being allowed to do what should ideally be done by a court of law. “People who are not part of the judiciary, who are not elected officials, are taking decisions on censorship.”&lt;/p&gt;
&lt;p&gt;Gupta reveals that the sites are not even required to inform a user that their content is being taken down. “The content vanishes into a black hole. All they have to do is remove the flagged content within 36 hours of it being reported,” he says.&lt;/p&gt;
&lt;p&gt;IT experts have been crying themselves hoarse demanding that the government amends the IT Act and clearly sets out definitions for what constitutes “offensive” content. As Duggal says, “It will do immense service to the nation if the IT Act, 2000, is amended so as to provide more definitions, illustrations and parameters of what constitutes offensive content. Since the act is silent on what constitutes offensive material, the scope for abuse of Section 66A remains wide open.”&lt;/p&gt;
&lt;p&gt;So will the government heed the demand of cyber law professionals and other experts and amend the IT Act? That remains to be seen. But unless the government changes its posture vis-à-vis the Internet, and shifts from its position that it’s something that needs to be controlled, few believe that an amendment in this regard will be forthcoming any time soon.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/net-loss'&gt;https://cis-india.org/news/net-loss&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-25T06:15:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/censorship-2020">
    <title>CENSORSHIP 2020:  The Future of Free Speech Online</title>
    <link>https://cis-india.org/news/censorship-2020</link>
    <description>
        &lt;b&gt;The DC Chapter of the Internet Society, in conjunction with the U.S. Department of State, invite you to an informal discussion on CENSORSHIP 2020: The Future of Free Speech Online on Monday, June 25, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://cct.georgetown.edu/300237.html"&gt;Published in Communication, Culture &amp;amp; Technology&lt;/a&gt;&lt;/span&gt;. For more info, &lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://http//censorship2020.eventbrite.com/"&gt;visit here&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Arab Spring demonstrated how Internet technologies such as Twitter, blogs, and Facebook could be used to mobilize protesters, publicize corruption and human rights violations, and connect activists and emigres. But in Iran , Syria , and elsewhere, we have seen repressive governments use the Internet to identify and track dissidents, to spread disinformation, and defame political opponents. Will the technologies of anonymization win out over new digital monitoring tools? Will new wireless data technologies foster democracy--or lead to more effective tracking and surveillance? Join us for an informal discussion with six people fighting for free speech on the Internet in their country--and around the world:&lt;/p&gt;
&lt;div id="_mcePaste"&gt;
&lt;ul&gt;
&lt;li&gt;Dlshad Othman (Syria), an activist and IT engineer providing Syrians with digital security tools&lt;/li&gt;
&lt;li&gt;Pranesh Prakash (India), a blogger and cyberlaw expert who is promoting a free Internet and online freedom of speech.&lt;/li&gt;
&lt;li&gt;Koundjoro Gabriel Kambou (Burkina Faso), a journalist at Lefaso.net, is promoting human rights, democracy particularly among young people.&lt;/li&gt;
&lt;li&gt;Sopheap Chak (Cambodia), the Deputy Director of the Cambodian Center for Human Rights (CCHR) and one of Cambodia ’s leading bloggers.&lt;/li&gt;
&lt;li&gt;Andres Azpurua (Venezuela) has trained 300 youth on using Web 2.0 tools to publicize human rights violations.&lt;/li&gt;
&lt;li&gt;Emin Milli (Azerbaijan), a writer who is using YouTube, Facebook and Twitter to spread information about human rights violations.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="_mcePaste"&gt;Moderator: Ambassador (ret.) Richard Kauzarlich, Deputy Director, Terrorism, Transnational Crime and Corruption Center (TraCCC), George Mason University, &lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://traccc.gmu.edu/"&gt;http://traccc.gmu.edu/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="visualHighlight"&gt;&lt;span style="text-align: justify; "&gt;Hosted by the Communication, Culture and Technology Program of Georgetown University 2nd Floor, Car Barn, 3520 Prospect St., N.W. , Washington , DC (enter from Prospect St.)&lt;/span&gt; &lt;/span&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/censorship-2020'&gt;https://cis-india.org/news/censorship-2020&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-28T10:01:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/google-hangout-with-sunil">
    <title>Google Hangout with Ashoka Fellow Sunil Abraham</title>
    <link>https://cis-india.org/news/google-hangout-with-sunil</link>
    <description>
        &lt;b&gt;Sunil Abraham, an Ashoka Fellow from India, visited the DC Office and shared his work on public accountability, access, and learning at the intersection of internet and society.&lt;/b&gt;
        
&lt;h3&gt;Watch the video below&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;iframe src="http://www.youtube.com/embed/QprvyCtY1DU" frameborder="0" height="315" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.youtube.com/watch?v=QprvyCtY1DU"&gt;Click&lt;/a&gt; to see the original from YouTube.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/google-hangout-with-sunil'&gt;https://cis-india.org/news/google-hangout-with-sunil&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-20T09:16:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights">
    <title>Global Networks, Individual Freedoms: A Peer Forum on Internet Freedom and Human Rights</title>
    <link>https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights</link>
    <description>
        &lt;b&gt;In Connection with the 2012 Internet Freedom Fellows Program, the United States Mission to the United Nations in Geneva is pleased to invite Pranesh Prakash to a peer forum at the United States Mission to the United Nations on Thursday, June 21, 2012, from 9 a.m. to 3 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Join the Internet Freedom Fellows, diplomats, UN representatives, civil society, technologists and social media experts, Geneva media and other professionals engaged in the intersection of human rights, internet freedom and technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This peer forum is part of the Internet Freedom Fellows program, which brings human rights activists from across the globe to Geneva, Washington, and Silicon Valley to meet with fellow activists, U.S. and international government leaders, and members of civil society and the private sector engaged in technology and human rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This year’s Internet Freedom Fellows, all human rights activists and active practitioners of digital media, are from Syria, India, Burkina Faso, Cambodia, Venezuela and Azerbaijan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For additional information on the program, please visit &lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://geneva.usmission.gov/us-hrc/internet-freedom-fellows-2012/"&gt;Internet Freedom Fellows&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;h3 id="_mcePaste"&gt;Program&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;9:00 a.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Welcome and introduction&lt;/strong&gt;&lt;br /&gt;David Kennedy / John Horniblow&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:15 - 10:15&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Freedom to Connect and Freedom from Fear: The problem of surveillance in a networked world&lt;/strong&gt;. &lt;br /&gt;&lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://consentofthenetworked.com/author/"&gt;Rebecca MacKinnon&lt;/a&gt;&lt;/span&gt; – Co Founder Global Voices Online, Author “Consent of  the Networked”, Boards of Directors of the Committee to Protect Journalists and the Global Network Initiative&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:15 - 10:45&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Developing Networked Voices and Promoting the protection of Human Rights &lt;/strong&gt;&lt;br /&gt;Andreas Harsono, blogger and human rights activist (Indonesia), and Rosebell Kagumire, multimedia journalist working on peace and conflict issues in the Eastern Africa region (Uganda)  &lt;br /&gt;2011 Internet Freedom Fellows and journalists (via Skype)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:45 - 11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Coffee break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00 - 12:00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Moderated Panel Discussion – How Do we Protect Human Rights in a world of global networks? How do the needs of the grassroots, civil society and business inform the process of upholding the UDHR and IHL in networks and technologies?&lt;/strong&gt;&lt;br /&gt;Dr. Robert Whelan (ICRC), Pranesh Prakash, Salil Trepathi (IHRB), Nicolas Seidler (ISOC), Emin Milli  Moderated Panel Discussion followed by Q &amp;amp;A&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:00 - 13:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Buffet Luncheon&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00 - 13:30&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;The Open Internet - Empowering Digital Humanitarianism&lt;/strong&gt;&lt;br /&gt;Paul Conneally - Head of Communications for ITU and a former Red Cross delegate (in various positions, locations and with IFRC plus ICRC and the Irish Red Cross).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:40 - 14:10&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Global Network Initiative and the multistakeholder approach ensuring an Open Internet&lt;br /&gt;David Sullivan -Policy and Communications Director &lt;br /&gt;Global Network Initiative&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left; "&gt;14.15 &lt;span style="text-align: left; "&gt;- &lt;/span&gt;14.40&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;The Silicon Valley Standard and implications for technology companies in the protection of Human Rights and other freedoms &lt;/strong&gt;&lt;br /&gt;Brett Solomon -Exec Director Access Now  (via Skype)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left; "&gt;15:00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Twiplomacy &lt;/strong&gt;&lt;br /&gt;Matthias Luefkins  &lt;i&gt;Managing Director, Digital, EMEA&lt;/i&gt;– Burson Marstellar&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div style="text-align: justify; "&gt;Participation is limited.  Please RSVP by noon on Friday, June 15 to &lt;span class="visualHighlight"&gt;&lt;a class="mail-link" href="mailto:iff@usmission.ch"&gt;iff@usmission.ch&lt;/a&gt;. &lt;/span&gt;When responding, please indicate whether you will also join us for the luncheon buffet.&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights'&gt;https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-28T09:12:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/co-spying-on-competitors-staff">
    <title>Cos spying on competitors, staff: Study </title>
    <link>https://cis-india.org/news/co-spying-on-competitors-staff</link>
    <description>
        &lt;b&gt;Most companies are spying on their competitors and their own employees, according to a recent survey conducted by the Associated Chambers of Commerce and Industry of India (Assocham). &lt;/b&gt;
        
&lt;p&gt;The &lt;a class="external-link" href="http://www.thestatesman.net/index.php?option=com_content&amp;amp;view=article&amp;amp;id=413934:cos-spying-on-competitors-staff-study&amp;amp;catid=40:business&amp;amp;from_page=search"&gt;Statesman published this article&lt;/a&gt; on June 19, 2012. Sunil Abraham is quoted in it.&lt;/p&gt;
&lt;p&gt;The survey's results raise questions about whether employees have enough privacy in the workplace. Rubbishing the survey's findings, head of the Indian Council of Corporate Investigators, Mr Kunwar Vikram Singh, said businesses are not spying but verifying facts.&lt;/p&gt;
&lt;p&gt;The Assocham survey said almost 1,200 of 1,500 executives surveyed admitted to hiring people to spy on their employees and monitor their lifestyles. They said they watch former employees, too, especially those who had been laid off or kicked out for fraud.&lt;/p&gt;
&lt;p&gt;In the survey, which was done between January and May this year in Ahmedabad, Bangalore, Chennai, the Delhi-National Capital Region and Mumbai, about 900 top industry officials said they carry out corporate espionage, bug the offices of their rivals and plant moles in other companies. About a quarter of respondents said they have hired computer experts to hack networks and track e-mails of their rivals.&lt;/p&gt;
&lt;p&gt;Many more respondents — 1,110 of those questioned — said they use social media sites to track their rival companies and employees. “Most of the companies have mentioned their sensitive details including their data, plans, clients’ details, products and other confidential and trade-related secrets on their page and unknowingly share the same in the social media circuit,” said Mr DS Rawat, national secretary-general of Assocham, “which is why it is the most favoured spying activity being carried out by the companies.”&lt;/p&gt;
&lt;p&gt;The practice of companies pilfering trade secrets and ideas may be bad for the country's business environment, said Mr Rawat. It “might dampen the spirit of innovation in the long-run,” he said.&lt;/p&gt;
&lt;p&gt;The Indian Council of Corporate Investigators’ Mr Singh, however, disputed Assocham's picture of rampant corporate espionage. “I totally deny that corporates are spying on their employees,” he said. “It is not spying. It is verification of facts.”&lt;/p&gt;
&lt;p&gt;Mr Singh said that when companies look into their employees or other companies, for example, before they enter into joint ventures, they are just carrying out “due diligence”. He said they legally gather information needed for companies to survive. He also denied there were any privacy issues.&lt;/p&gt;
&lt;p&gt;Mr Sunil Abraham, executive director of the Centre for Internet and Society, though, said there are growing concerns about privacy in the workplace, including about intense video surveillance. “Managers started to object to this,” he said. “What they started saying was it really undermines the morale of these locations ... friends and relatives would ask, 'In spite of you being so educated, it's funny your companies don't trust you at all.'”&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Companies need to develop more nuanced ways to deal with these problems — perhaps something more similar to the military's multiple levels of clearance — and different ways for people to acquire and lose trust, Mr Abraham said.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Whether or not surveillance is legal, depends on the type, Mr Abraham said. There is some private information a person will expect to remain private, and some information that is expected to be public — like Twitter feeds.&lt;/p&gt;
&lt;p&gt;There is no law against monitoring this second type, known as “clear view surveillance”, he said, and blanket legislation could clash with freedom of expression. He said an ideal law for this should include a “proportional relation to power” clause, which would limit the legal ability of the powerful to monitor, but allow individual citizens more leeway.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/co-spying-on-competitors-staff'&gt;https://cis-india.org/news/co-spying-on-competitors-staff&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-06-20T08:46:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-liberty-2012">
    <title>Internet At Liberty 2012</title>
    <link>https://cis-india.org/news/internet-liberty-2012</link>
    <description>
        &lt;b&gt;Activists and experts from all over the world came together for this event organised by Google on May 23 and 24, 2012 to explore free expression in the digital age.&lt;/b&gt;
        &lt;p&gt;&lt;img src="https://cis-india.org/home-images/Internet.jpg/@@images/dc9d1698-03d0-4d2e-bdba-be0f3a5ccb51.jpeg" alt="Internet" class="image-inline" title="Internet" /&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham was a speaker in Plenary IV Debate 3: In a world where nearly nine out of ten Internet users are not American, what is the responsibility of United States institutions in promoting internet freedom? Cynthia Wong, Mohamed El Dahshan, Dunja Mijatović and Judy Woodruff were the other speakers in this panel. See the video below:&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Internet at Liberty 2012: Plenary IV - Sunil Abraham, Cynthia Wong, Mohamed El Dahshan and Dunja Mijatović&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/9YMte4hdYu0" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.youtube.com/watch?v=9YMte4hdYu0"&gt;View the video on YouTube&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-liberty-2012'&gt;https://cis-india.org/news/internet-liberty-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-05T05:24:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/has-geek-presents-the-fifth-elephant">
    <title>HasGeek presents The Fifth Elephant</title>
    <link>https://cis-india.org/internet-governance/has-geek-presents-the-fifth-elephant</link>
    <description>
        &lt;b&gt;HasGeek and the Centre for Internet &amp; Society invite you the Fifth Elephant at the NIMHANS Convention Centre, Bangalore on July 27 and 28, 2012. &lt;/b&gt;
        
&lt;h3&gt;Why The Fifth Elephant?&lt;/h3&gt;
&lt;p&gt;Modern technology with ubiquitous connectivity and cloud-hosted computing power is increasingly becoming important for making sense of data. The infrastructure, tools, processes and algorithms for storage, analytics and visualization shape the meanings and value that can be derived from the data. At the same time, these technologies are strongly intertwined i.e., the database infrastructure shapes how data is accessed for processing, as well as the tools you can (or cannot) use to represent the data in certain ways on the frontend. Similarly, the paradigms used for simplifying and storing data — MapReduce, NoSQL, RDBMS — variously enable the morphing of complex data into meaningful formats. Working with each one of them involves limitations and possibilities.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Fifth Elephant &lt;/strong&gt;is the first of its kind of events where you will meet different people working with different kinds of data. It is an opportunity for learning about new tools, technologies, platforms, processes and best practices, and engaging with business leaders, IT decision-makers, journalists, analysts and developers. It is also an opportunity to showcase data products, APIs, services and platforms.&lt;/p&gt;
&lt;h3&gt;A Conference? An Event?&lt;/h3&gt;
&lt;p&gt;The Fifth Elephant is not simply a series of lectures. It is a space for interactions with a diverse audience to serendipitously explore insights and solutions for your data problems, to understand how hidden meanings in data can be made manifest, and to learn how others are working with data. The event is open to data analysts and scientists, statisticians, geeks, enthusiasts, data-driven product managers and designers, enterprise architects, journalists, researchers, developers and database professionals.&lt;/p&gt;
&lt;h3&gt;The Agenda&lt;/h3&gt;
&lt;p&gt;The Fifth Elephant will be held on July&amp;nbsp; 27 and 28, 2012  at the NIMHANS Convention Centre, Bangalore. Day 1 covers the technology track — big data infrastructure,&amp;nbsp; analytics and visualization. Day 2 invites talks from business and industry — finance, retail, health, media, telecom — to showcase the nature of data in each of these sectors and how they are working (and not working) with the data.&lt;/p&gt;
&lt;p&gt;Apart from demos, lectures and tutorials, there will be opportunities for open house discussions and presentations on Hadoop, NoSQL versus RDBMS paradigms, and legal and licensing frameworks for data sharing, among others. Hacker corners, a dedicated participant lounge and interactive sponsor booths will further the learning, showcasing and engagement at the event.&lt;/p&gt;
&lt;p&gt;For submitting talks and speaking proposals, visit &lt;a class="external-link" href="http://funnel.hasgeek.com/5el"&gt;funnel.hasgeek.com/5el&lt;/a&gt;.&lt;br /&gt;Corporate tickets available for company delegates and employees. For more information write to &lt;a class="external-link" href="mailto:info@hasgeek.com"&gt;info@hasgeek.com&lt;/a&gt;&lt;br /&gt;For sponsorship queries, write to &lt;a class="external-link" href="mailto:zainab@hasgeek.com"&gt;zainab@hasgeek.com&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/has-geek-presents-the-fifth-elephant'&gt;https://cis-india.org/internet-governance/has-geek-presents-the-fifth-elephant&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-19T06:38:13Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/recruitment-tracker-21-students-placed">
    <title>Recruitment Tracker: 21 students placed out of the 49 who sat for recruitment in Christ University’s School of Law, Class of 2012</title>
    <link>https://cis-india.org/news/recruitment-tracker-21-students-placed</link>
    <description>
        &lt;b&gt;The Class of 2012 at the School of Law, Christ University saw 21 students placed out of the 49 who sat for recruitment. The graduating class has a batch strength of 77 students. The batch saw 8 pre-placement offers, 4 students being accepted for LLM’s abroad and 3 students opting for litigation while 1 student opted to appear for the civil services examination.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://barandbench.com/brief/9/2485/recruitment-tracker-21-students-placed-out-of-the-49-who-sat-for-recruitment-in-christ-universitys-school-of-law-class-of-2012"&gt;Published by the Bar &amp;amp; Bench News Network on June 11, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Pangea 3 was the biggest recruiter, bagging four students while Nishith Desai Associates, Murli &amp;amp; Co., Clutch Group and Prudent Insurance Brokers Private Limited hiring two students each. J. Sagar Associates, Linklegal, PXV Law Partners, BMR Advisors and Bajaj Allianz General Insurance Corporation picked up one student each.&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society, human-rights organisation Justice and Care, Teach for India and the Freeland Wildlife Trust hired one student each. Out of the four students who have opted for a Masters programme, two will be going to the National University of Singapore and one each to Cornell University and George Washington University.&lt;/p&gt;
&lt;p&gt;At the time of publication, the recruitment process for one student was currently under progress at J. Sagar Associates.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Name of the Company / Firm&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;Number of Students Recruited&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Pangea3&lt;/td&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Nishith Desai &amp;amp; Associates&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Murli &amp;amp; Co.&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Prudent Insurance Brokers&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Clutch Group&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;BMR Advisors&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;J Sagar Associates&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Bajaj Allianz General Insurance Corporation&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;PXV Law Partners&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Link Legal&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Freeland Wildlife Trust&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Centre for Internet &amp;amp; Society&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Justice and Care&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Teach for India&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;TOTAL &lt;br /&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;&amp;nbsp;21&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/recruitment-tracker-21-students-placed'&gt;https://cis-india.org/news/recruitment-tracker-21-students-placed&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-18T08:45:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ppos-save-placement-record-as-christ-laws-2nd-graduating-batch-hosts-fewer-law-firms">
    <title>PPOs save placement-record as Christ Law’s 2nd graduating batch hosts fewer law firms</title>
    <link>https://cis-india.org/news/ppos-save-placement-record-as-christ-laws-2nd-graduating-batch-hosts-fewer-law-firms</link>
    <description>
        &lt;b&gt;The number of recruiting law firms visiting Christ College of Law Bangalore slumped to two this year, but the second batch graduating from the college made it up in terms of pre placement offers (PPOs) to secure 21 total jobs, one short of the college’s debut recruitment record.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.legallyindia.com/201206102879/Law-schools/ppos-save-placement-record-as-christ-laws-2nd-graduating-batch-hosts-fewer-law-firms"&gt;This blog post by Prachi Shrivastava was published in Legally India on June 10, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Out of the 14 organisations hiring from a pool of 49 students registered with the recruitment coordination committee of 2012, J Sagar Associates (JSA) and Nishith Desai Associates (NDA) were the only law firms interviewing on campus. JSA hired one and NDA hired two students.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[Correction: The information supplied by the RCC previously, was partially incorrect. It has now clarified that JSA and NDA did not visit campus, but conducted off-campus interviews]&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;PXV Law Partners, BMR Advisors and Link Legal Advocates, each extending one PPO, and Murli Associates with two PPOs, were the only other law firms figuring in the RCC’s recruitment table this year.&lt;/p&gt;
&lt;p&gt;Legal process outsourcing unit (LPO) Pangea3 was the biggest recruiter at the law school, hiring three students through campus and one through PPO. Clutch Group was the other LPO that visited campus and engaged two students.&lt;/p&gt;
&lt;p&gt;Insurance companies also paid a visit: Prudent Insurance Brokers hired two students while Bajaj Allianz General Insurance Corporation made one hire.&lt;/p&gt;
&lt;p&gt;Three non government organisations (NGOs) and a think tank each recruited the remaining four students. International human rights NGO Justice and Care, and domestic free school-teaching movement Teach for India picked one student each on campus, and wildlife-law enforcement NGO Freeland Wildlife Trust hired one student through PPO.&lt;/p&gt;
&lt;p&gt;Bangalore-based think tank Centre for Internet and Society (CIS) engaged a student.&lt;/p&gt;
&lt;p&gt;Four more RCC participants in the batch of 77, will pursue an LLM. The University of Singapore accepted two students, while Cornell University and George Washington University accepted one each.&lt;/p&gt;
&lt;p&gt;Three students are known to have opted for court practice while one gears up to take the civil services examination.&lt;/p&gt;
&lt;h3&gt;Previously, at Christ&lt;/h3&gt;
&lt;p&gt;The &lt;a class="external-link" href="http://www.legallyindia.com/201105172088/Law-schools/christ-college-bootstraps-first-batch-placements-attracts-mix-of-recruiters"&gt;first ever class graduating from the Bangalore law school last year&lt;/a&gt;, smaller in size by two students, saw 22 jobs for a pool of 52 students registered with the inaugural recruitment coordination committee.&lt;/p&gt;
&lt;p&gt;Trilegal and Lakshmikumaran &amp;amp; Sridharan (LKS) were the biggest of the five law firms visiting campus last year, while GMR, Infosys and Roamware were the three local companies interviewing students on campus.&lt;/p&gt;
&lt;p&gt;An LPO was the keenest recruiter at Christ last time as well, though CPA Global took the place of Pangea 3 which did not figure in last year’s recruitment table.&lt;/p&gt;
&lt;p&gt;HNLU Raipur was the other law school where LPO Pangea3 was the heaviest recruiter this year, being the only one to visit the Abhanpur campus. The LPO hired three student’s from HNLU’s class of 2012.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ppos-save-placement-record-as-christ-laws-2nd-graduating-batch-hosts-fewer-law-firms'&gt;https://cis-india.org/news/ppos-save-placement-record-as-christ-laws-2nd-graduating-batch-hosts-fewer-law-firms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-18T08:33:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/india-the-new-front-line-in-the-global-struggle-for-internet-freedom">
    <title>India: The New Front Line in the Global Struggle for Internet Freedom </title>
    <link>https://cis-india.org/news/india-the-new-front-line-in-the-global-struggle-for-internet-freedom</link>
    <description>
        &lt;b&gt;The government tussles with Internet freedom activists in the world's largest democracy.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.theatlantic.com/international/archive/2012/06/india-the-new-front-line-in-the-global-struggle-for-internet-freedom/258237/"&gt;This article was published in the Atlantic on June 7, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This Saturday, Indian Internet freedom advocates are planning to stage a nation-wide protest against what they see as their government's increasingly restrictive regulation of the Internet. An amorphous alliance of concerned citizens and activist hackers intend to use the streets and the Internet itself to make their opposition felt.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Over the last year, as Americans were focused on the domestic debates surrounding the &lt;a class="external-link" href="http://www.forbes.com/fdc/welcome_mjx.shtml"&gt;Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA)&lt;/a&gt;, or on the more brazen displays of online censorship by mainstays of Internet restriction like China, Iran and Pakistan, India was rapidly emerging as a key battleground in the worldwide struggle for Internet freedom.&lt;/p&gt;
&lt;p&gt;The confrontation escalated in April 2011, when the Ministry of Communications and Information Technology introduced sweeping new rules regulating the nature of material that Internet companies could host online. In response, civil liberties groups, Internet freedom supporters, and a growing assembly of online activist hackers have been fighting back, initiating street protests, organizing online petitions, and launching -- under the banner of the "Anonymous" hacker group -- a torrent of distributed denial of service (DDoS) attacks against Indian government and industry web sites.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/GSR314E_10511%281%29.pdf"&gt;April 2011 rules&lt;/a&gt;, an update to India's &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/downloads/itact2000/it_amendment_act2008.pdf"&gt;Information Technology Act&lt;/a&gt; (IT Act) of 2000 (amended in 2008), popularly known as the "intermediary guidelines," instruct online "intermediaries" -- companies that provide Internet access, host online content, websites, or search services -- to remove, within 36 hours, any material deemed to be "grossly harmful, harassing, blasphemous," "ethnically objectionable," or "disparaging" by any Internet user who submits a formal objection letter to that intermediary. Under the guidelines, any resident of India can compel Google, at the risk of criminal and/or civil liability, to remove content from its site that the resident finds politically, religiously, or otherwise "objectionable."&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Information Technology Minister Kapil Sibal -- the intermediary guidelines' most important government evangelist, and the head of the agency responsible for administering the guidelines -- even &lt;a class="external-link" href="http://india.blogs.nytimes.com/2011/12/05/india-asks-google-facebook-others-to-screen-user-content/"&gt;instructed Internet companies&lt;/a&gt; to go one step further and start pre-screening content for removal before it was flagged by concerned users.&amp;nbsp; This requires companies like Facebook, in effect, to determine what material might offend its users and thus violate Indian law, and then remove it from the website. With &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2011-12-15/news/30520358_1_e-commerce-indian-internet-space-internet-and-mobile-association"&gt;over 100 million Internet users&lt;/a&gt; in India, no company could possibly monitor all its content through human intervention alone; web companies would have to set up filters and other mechanisms to take down potentially objectionable content more or less automatically.&lt;/p&gt;
&lt;p&gt;India's constitution, in large part crafted in response to the modern country's harrowing history of religious and communal violence, allows for "reasonable restrictions" on free speech. Indian officials have at times banned certain books, movies, or other materials touching on such sensitive subjects as religion and caste.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Left with little choice but to comply or risk legal action, Google, Yahoo!, and other Internet companies acquiesced and &lt;a class="external-link" href="http://www.reuters.com/article/2012/02/06/india-internet-idUSL4E8D66SM20120206"&gt;began pulling down &lt;/a&gt;webpages after receiving requests to do so. Yet many companies refused to remove all the content requested, prompting Mufti Aijaz Arshad Qasm, an Islamic scholar, and journalist Vinay Rai, respectively, to file civil and criminal suits against 22 of the largest Internet companies operating in India. The targets, including Google, Yahoo!, Facebook, and Microsoft, were accused of failing to remove material deemed to be offensive to the Prophet Mohammed, Jesus, several Hindu gods and goddesses, and various political leaders.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The companies have had some success in the litigation: Google India, Yahoo!, and Microsoft have all &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052702304356604577341101544076864.html"&gt;been dropped&lt;/a&gt; from the civil case after the court heard preliminary arguments; the Delhi High Court recently dismissed Microsoft from the criminal case.&amp;nbsp; Otherwise, both cases are still ongoing.&lt;/p&gt;
&lt;p&gt;India has taken its Internet regulation internationally, &lt;a class="external-link" href="http://www.thinkdigit.com/Internet/India-asks-US-to-remove-objectionable-content_9366.html"&gt;asking&lt;/a&gt; the United States government to ensure that India-specific objectionable content is removed from sites such as Facebook, Google, and YouTube, and suggesting that these companies should be asked to relocate their servers to India in to order better to regulate the content locally.&lt;/p&gt;
&lt;p&gt;The Indian government's state-centric view of Internet regulation and governance is also clear in their approach to international governance. Citing the need for more governmental input in the Internet's development and what happens online, India formally &lt;a class="external-link" href="http://content.ibnlive.in.com/article/21-May-2012documents/full-text-indias-un-proposal-to-control-the-internet-259971-53.html"&gt;proposed the creation&lt;/a&gt; of the Committee for Internet Related Policies (CIRP) at the 2011 United Nations General Assembly. The CIRP would be an entirely new multilateral UN body responsible for coordinating virtually all Internet governance functions, including multilateral treaties.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;To be fair, some Indians see these as efforts not to impose censorship but to allow a greater degree of Indian and international control over a system considered by many in India and elsewhere to be &lt;a class="external-link" href="http://www.thehindu.com/opinion/op-ed/article3426292.ece"&gt;under the thumb of the U.S. government&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Yet some Internet experts in both India and the West are criticizing the CIRP proposal as part of "&lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2012-05-21/internet/31800574_1_governance-cyber-security-internet"&gt;thinly masked efforts to control or shape the Internet&lt;/a&gt;," as one Indian official put it. They&lt;a class="external-link" href="http://www.huffingtonpost.com/joe-waz/internet-governance-at-a-_b_1203125.html"&gt; warn&lt;/a&gt; that a state-centric system of Internet governance could lead to serious restrictions on the type of information available online, and damage the Internet's potential for innovation.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/IndiaAnonymous.jpg/image_preview" alt="India Anonymous" class="image-inline image-inline" title="India Anonymous" /&gt;&lt;/p&gt;
&lt;p&gt;India's Internet freedom advocates are straining to keep up with the rapid pace of the last year. But, now, they're gathering some steam. Online petitions against the intermediary guidelines, the IT Act, and censorship in India in general have appeared on &lt;a class="external-link" href="https://www.change.org/petitions/mps-of-india-support-the-annulment-motion-to-protect-internet-freedom-stopitrules"&gt;Change.org&lt;/a&gt; and &lt;a class="external-link" href="https://www.facebook.com/saveyourvoice"&gt;Facebook&lt;/a&gt;; &lt;a class="external-link" href="http://www.youtube.com/watch?v=HtA194jig3s"&gt;protest videos&lt;/a&gt; are popping up on Youtube. The Centre for Internet and Society, a web-focused think tank, released an &lt;a href="https://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet" class="external-link"&gt;extensive report highlighting&lt;/a&gt; the intermediary guidelines' effects on freedom online. The Internet Democracy Project &lt;a class="external-link" href="http://lighthouseinsights.in/bloggers-against-internet-censorship.html"&gt;organized a day-long training program&lt;/a&gt; on freedom of expression and censorship for bloggers entitled "Make Blog not War." FreeSoftware Movement Karnataka organized a protest of hundreds of students in Bangalore, India's IT hub. And Save Your Voice activists &lt;a class="external-link" href="http://kafila.org/2012/04/22/freedom-in-the-cage-photos-from-a-protest-against-internet-censorship-in-delhi/"&gt;held a sit in&lt;/a&gt; outside Delhi's Jantar Mantar monument to pressure lawmakers.&lt;/p&gt;
&lt;p&gt;Yet, not all the opposition has been so civil. Hackers, operating under the umbrella of the techno-libertarian hacker community, "Anonymous," are waging their own, less lawful fight against the government as well as the Internet companies that have, in their view, too readily complied with the government's censorship demands.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;On May 17, Anonymous hackers attacked a number of Indian &lt;a class="external-link" href="http://tech2.in.com/news/web-services/supreme-court-website-hacked-in-response-to-tpb-vimeo-block/307532"&gt;government websites&lt;/a&gt;, including the Indian Supreme Court, the Reserve Bank of India, the ruling Congress Party and its &lt;a class="external-link" href="http://windowsera.com/anonymous-india-hacks-aitmc-mizoram-government-website-redirects-to-twitter"&gt;coalition partners&lt;/a&gt;, as well as the opposition Bhartiya Janata Party (BJP), making them all inaccessible for several hours.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Moreover, just this past week, Anonymous broke into the websites and servers of a number of Internet Service Providers, including &lt;a class="external-link" href="http://www.firstpost.com/tech/anonymous-strikes-rcom-to-protest-india-net-censorship-322241.html"&gt;Reliance Communications&lt;/a&gt;, seemingly to punish them for complying with government orders to block file-sharing hosts such as Pirate Bay and Vimeo. Once in the ISPs' servers, the hackers accessed their lists of &lt;a class="external-link" href="http://tech2.in.com/news/general/anonymous-india-releases-blocked-sites-list-plans-peaceful-protest/310682"&gt;blocked sites&lt;/a&gt; -- which they then distributed to media outlets. They also redirected people who tried to reach Reliance's site to an Anonymous &lt;a class="external-link" href="http://www.cio.in/sites/default/files/topstory/2012/05/reliance_network_hacked.JPG"&gt;protest page&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Building on the momentum of these attacks, and on the anti-censorship outrage growing across India, Anonymous &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2012-05-31/internet/31920036_1_occupy-protests-government-sites-website"&gt;has called for a national day of protest&lt;/a&gt; in 11 Indian cities this Saturday, and an additional series online attacks against government and industry websites. The occupy-style protests -- which Anonymous insists will be non-violent -- are to include awareness campaigns on Facebook and other social networking sites. Protesters are being asked to don the &lt;a class="external-link" href="http://en.wikipedia.org/wiki/File:Anonymous_at_Scientology_in_Los_Angeles.jpg"&gt;Guy Fawkes mask&lt;/a&gt;, a symbol now associated with Anonymous, among other protest movements, both in the streets and on their Facebook profiles.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It's unclear how much support the June 9 protest will receive, or how serious the planned Anonymous attacks with be, but given the attention that the announcement has attracted in the Indian media, it seems likely that people will at least be paying attention. And even if this weekend the protest fails to attract the type of large and vocal response protest organizers are hoping it will, that it's come so far is an indication that neither side looks ready to back down.&lt;/p&gt;
&lt;p&gt;Still, the government has given some small signs recently that it is reconsidering its position on the "intermediary guidelines," if not on Internet regulation more generally. Information Technology Minister Sibal, under pressure from the political opposition and after Parliament Member P. Rajeeve tabled a motion to seek rescission of the new rules,&lt;a class="external-link" href="http://indiatoday.intoday.in/story/kapil-sibal-promises-to-rethink-on-internet-censorship/1/189265.html"&gt; indicated&lt;/a&gt; that he would reconsider his previous positions, and the government has agreed to &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2012-05-18/news/31765682_1_internet-rules-arun-jaitley-information-technology-rules"&gt;reexamine the rules&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This is an encouraging sign, although it's unlikely that any government action will come in time to forestall this weekend's protests. But even if the intermediary guidelines are ultimately rescinded, India will likely continue its soul-searching on how it deals with the Internet.&lt;/p&gt;
&lt;p&gt;As the world's largest democracy and a model for much of the developing world, and with an Internet population anticipated to surpass that of the United States in the next few years, India is an important, maybe the most important, test case for the future of Internet freedom globally. Should India continue down a course of restriction, other nations eager to restrict online speech could see precedent to impose their own technical and political barriers to free expression online. It would be a tragic irony if India, as one of the developing world's greatest beneficiaries of the information revolution, ended up curbing those same free flows of information and ideas.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/india-the-new-front-line-in-the-global-struggle-for-internet-freedom'&gt;https://cis-india.org/news/india-the-new-front-line-in-the-global-struggle-for-internet-freedom&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-06-18T07:10:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/indias-struggle-for-online-freedom">
    <title>India's struggle for online freedom </title>
    <link>https://cis-india.org/news/indias-struggle-for-online-freedom</link>
    <description>
        &lt;b&gt;"65 years since your independence," a new battle for freedom is under way in India — according to a YouTube video uploaded by an Indian member of Anonymous, the global "hacktivist" movement.
&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.smh.com.au/technology/technology-news/indias-struggle-for-online-freedom-20120608-2016i.html"&gt;Rebecca MacKinnon's article was published in the Sydney Morning Herald on June 9, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;With popular websites like Vimeo.com blocked across India by court order, the video calls for action: "Fight for your rights. Fight for India." Over the past several weeks, the group has launched distributed denial-of-service attacks against websites belonging to internet service providers, government departments, India's Supreme Court, and two political parties.&lt;/p&gt;
&lt;p&gt;Street protests are being planned for today in as many as 18 cities to protest laws and other government actions that a growing number of Indian internet users believe have violated their right to free expression and privacy online.&lt;/p&gt;
&lt;p&gt;A lively national internet freedom movement has grown rapidly across India since the beginning of this year.&lt;/p&gt;
&lt;p&gt;The most colourful highlight so far was a seven-day Gandhian hunger strike, otherwise known as a "freedom fast," held in early May on a New Delhi pavement by political cartoonist Aseem Trivedi and activist-journalist Alok Dixit. Trivedi's website was shut down this year in response to a police complaint by a Mumbai-based advocate who alleged that some of Trivedi's works "ridicule the Indian Parliament, the national emblem, and the national flag."&lt;/p&gt;
&lt;p&gt;Escalating political and legal battles over internet regulation in India are the latest front in a global struggle for online freedom — not only in countries like China and Iran where the internet is heavily censored and monitored by autocratic regimes, but also in democracies where the political motivations for control are much more complicated.&lt;/p&gt;
&lt;p&gt;Democratically elected governments all over the world are failing to find the right balance between demands from constituents to fight crime, control hate speech, keep children safe, and protect intellectual property, and their duty to ensure and respect all citizens' rights to free expression and privacy. Popular online movements — many of them globally interconnected — are arising in response to these failures.&lt;/p&gt;
&lt;p&gt;Only about 10 per cent of India's population uses the web, making it unlikely that internet freedom will be a decisive ballot-box issue anytime soon. Yet activists are determined to punish New Delhi's "humourless babus," as one columnist recently called India's censorious politicians and bureaucrats, in the country's media. Grassroots organisers are bringing a new generation of white-collar protesters to the streets to defend the right to use a technology that remains alien to the majority of India's people.&lt;/p&gt;
&lt;p&gt;The trouble started with the 2008 passage of the Information Technology (Amendment) Act, whose Section 69 empowers the government to direct any internet service to block, intercept, monitor, or decrypt any information through any computer resource.&lt;/p&gt;
&lt;p&gt;Company officials who fail to comply with government requests can face fines and up to seven years in jail. Then, in April 2011, the Ministry of Communications and Information Technology issued new rules under which internet companies are expected to remove within 36 hours any content that regulators designate as "grossly harmful," "harassing," or "ethnically objectionable" — designations that are open to a wide variety of interpretations and that free speech advocates argue have opened the door to abuse.&lt;/p&gt;
&lt;p&gt;It is thanks to these rules that the website of the hunger-striking cartoonist, Trivedi, was taken offline. Also thanks to the 2011 rules, Facebook and Google are facing trial for having failed to remove objectionable content. If found guilty, the companies could face fines, and executives could be sentenced to jail time.&lt;/p&gt;
&lt;p&gt;Saturday's protesters are calling for annulment of the 2011 rules and the repeal of part of the 2008 act. They are also calling for internet service companies to reverse the wholesale blocking of hundreds of websites, including the file-sharing services isoHunt and The Pirate Bay, as well as the video-sharing site Vimeo and Pastebin, which is primarily used for the sharing of text and links.&lt;/p&gt;
&lt;p&gt;Internet service providers were responding to a court order from the Madras High Court demanding the blockage, which is aimed at preventing the online distribution of pirated versions of one particular film. The internet companies, fearing that they would not be able to catch every individual instance on every possible site they host, instead chose to block entire services along with all of their content — which had nothing to do with the film in question.&lt;/p&gt;
&lt;p&gt;Such "John Doe" orders, named because they are directed against unknown potential offenders in the present and future, are characterised "by their overly broad and sweeping nature," argue lawyer Lawrence Liang and researcher Achal Prabhala, which extends "to a range of non-infringing activities as well, thus catching a whole range of legal acts in their net."&lt;/p&gt;
&lt;p&gt;More broadly, as Delhi-based journalist Shivam Vij wrote in a recent essay: "The current mechanisms of internet censorship in India — blocking, direct removal requests to websites, intermediary rules — are draconian and unconstitutional. They need to be replaced with a new set of rules that are fair, transparent and accessible for public scrutiny. They should not be amenable to misuse by the powers-that-be for their own private interests."&lt;/p&gt;
&lt;p&gt;Not only are the rules abused, but researchers find that they are causing extralegal censorship by companies that overcompensate in order to err on the side of caution. Last year, the Bangalore-based Centre for Internet and Society performed an experiment in which it sent "legally flawed" takedown demands to seven companies that provide a range of online services, including search, online shopping, and news with user-generated comments.&lt;/p&gt;
&lt;p&gt;The legal flaws in the notices were such that the companies could have rejected them without being in breach of the law. Yet "of the 7 intermediaries to which takedown notices were sent, 6 intermediaries over-complied with the notices, despite the apparent flaws in them," reads the Centre for Internet and Society report.&lt;/p&gt;
&lt;p&gt;Despite the growing public opposition, a motion to annul the 2011 rules was defeated by voice vote in the upper house of Parliament last month. Yet the criticism was sufficiently sharp that Communications Minister Kapil Sibal announced that he will hold consultations with all members of Parliament, representatives of industry, and other "stakeholders" to discuss the law's problems and how it might be revised.&lt;/p&gt;
&lt;p&gt;Many of the law's critics, however, are skeptical that this will eliminate the law's deep flaws and loopholes for abuse, especially given the government's failure to listen so far. Comments on the 2011 rules submitted last year by the Centre for Internet and Society were not even acknowledged as having been received by the Ministry of Communications and Information Technology. "Sibal uses the excuse of national security and hate speech," says the center's director, Sunil Abraham, "but that is not what is happening."&lt;/p&gt;
&lt;p&gt;Abraham worries that what is really happening is a government effort at Internet "behavior modification" through a process akin to an experiment involving caged monkeys, bananas, and ice water. Put four monkeys in a cage and hang a bunch of bananas on the ceiling. Every time one of them climbs up to reach the bananas, you drench all of them with ice water.&lt;/p&gt;
&lt;p&gt;Soon enough, the monkeys will start policing themselves — attacking anybody who tries to reach the bananas, making it unnecessary for their masters to deploy the ice water. "This is why the government is being so aggressive so early on, with only 10 percent of India's population online," says Abraham. "If you start the drenching early on, by the time you get to 50 per cent [internet penetration], every one will be well-behaved monkeys."&lt;/p&gt;
&lt;p&gt;Companies will act as private internet police for fear of legal punishment before the government is called upon to step in and enforce the law. If it works, Indian politicians could have fewer reasons to worry about online critiques or mockery, because companies fearing prosecution will proactively delete speech that could potentially be designated "harassing" or "grossly harmful."&lt;/p&gt;
&lt;p&gt;India is not China or Iran, however. Its politicians may be corrupt, and most of its voters may not understand why Internet freedom matters because they've never used the Internet. But it still has an independent press and boisterous civil society that are not going to give up their critiques and protests anytime soon. India also has a strong, independent judiciary, with a record of ruling against censorship and surveillance measures when a strong case can be made that they conflict with constitutional protections of individual rights. "On free speech I have high faith in the Indian judiciary," says Abraham. "There is a good chance to launch a constitutional challenge."&lt;/p&gt;
&lt;p&gt;If Google and Facebook lose at their impending trial — now scheduled for July — they will most certainly appeal, which activists hope could provide just such an opportunity to prevent the sort of "behaviour modification" process that Abraham warns against.&lt;/p&gt;
&lt;p&gt;Now India's burgeoning internet freedom movement needs its own reverse "behaviour modification" strategy — imposing consistent and regular doses of political and legal ice water upon India's bureaucrats, politicians, and companies whenever they do things that threaten to corrode the rights of India's internet users. Saturday's protest is just the beginning.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Sunil Abraham is quoted in the article. The report on Intermediary Guidelines co-produced by CIS and Google is also mentioned.&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/indias-struggle-for-online-freedom'&gt;https://cis-india.org/news/indias-struggle-for-online-freedom&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-06-18T06:39:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
