<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2821 to 2835.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/iraqi-delegation-in-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/chasing-shadows"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/online-anonymity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/your-right-to-remain-silent"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/beyond-clicktivism"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/changing-tide"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/iraqi-e-governance-india-tour"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/publications/limits-privacy.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/web2.0-responds-to-hazare"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rti-response-dit-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/privacy-by-design"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/march%20-2011-bulletin"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/iraqi-delegation-in-bangalore">
    <title>Iraqi delegation in Bangalore to study e-governance projects</title>
    <link>https://cis-india.org/news/iraqi-delegation-in-bangalore</link>
    <description>
        &lt;b&gt;A 20-member delegation from Iraq, led by its Science and Technology Minister Abdul Kareem El-Samarai, is in this tech hub for a firsthand account of the e-governance projects used for community development and as an interface between the government and citizens. This news was published in the Economic Times, April 20, 2011.&lt;/b&gt;
        
&lt;p&gt;The delegation, on a three-day study tour since Tuesday in partnership with the United Nations Development Programme (UNDP) and the Centre for Internet &amp;amp; Society, visited multi-specialty hospital Narayana Hrudayalaya to learn about tele-medicine services, which provide healthcare in remote villages using information and communication technology (ICT).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"The e-governance projects and ICT practices employed for citizen services and community development in India could be a useful guide in developing a strategy for e-governance in our country," Deputy Iraqi Science and Technology Minister Samir Salim Raouf said in a statement late Wednesday.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The delegation, comprising officials and experts from various fields, also visited the Azim Premji Foundation , a not-for-prof IT organisation set up by IT bellwether Wipro's chairman Azim Premji. The delegation wanted to gain insight into the foundation's efforts to reform school education across the country through ICT and modern management practices.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"What is interesting is that the civil society and the private sector innovate and contribute to governance in India and everything is not left for the government to deal with," Raouf noted.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;After interacting with officials and experts in-charge of the e-governance projects in Karnataka, the delegation went to mobile and wireless communications firm Geodisc Ltd to study its innovative product GeoAmida, an open source handheld device for e-governance and banking solutions.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"The mobile device, which can be used in diverse domains such as e-governance, banking, healthcare, transportation and retail, is a unique solution to address various societal problems faced by the Iraqi government, which is set to formulate a policy for e-governance and use ICT for social reform and development," the statement added.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The delegation, which is a part of the 'Building e- Iraq National e-Governance Strategy' of the Iraqi government, will go to New Delhi Friday for studying similar projects of the central government.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"Our objective is to increase transparency and accountability in Iraq through ICT and provide citizen services through e-governance initiatives," Raouf added.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original in Economic Times &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/news-by-industry/et-cetera/iraqi-delegation-in-bangalore-to-study-e-governance-projects/articleshow/8041017.cms"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/iraqi-delegation-in-bangalore'&gt;https://cis-india.org/news/iraqi-delegation-in-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-21T09:41:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/chasing-shadows">
    <title>Dark waders</title>
    <link>https://cis-india.org/news/chasing-shadows</link>
    <description>
        &lt;b&gt;Akhila Seetharaman finds out why a group of artists and researchers are preoccupied with chasing shadows. This article was published in Time Out Bengaluru, Vol. 3, Issue 20, April 15 - 28, 2011.&lt;/b&gt;
        
&lt;p&gt;The New Bharat Brass Band from Kalasipalayam performed an unusual ditty at the Chitrakala Parishat last month. In a typical concert, the band plays raucous renditions of the latest hit Hindi film songs, but the music at this gig had its origin in a database of photographs of the city. These images had been taken by a group of student-artists, who converted the visual data into binary codes of 0s and 1s, and then transcribed the codes into musical notation, which they asked the band to perform. The result: strange, random, almost robotic music which represented a uniquely distilled experience of the city, peppered with the band’s characteristic filmy flourishes.&lt;/p&gt;
&lt;p&gt;This performance was one among the several experimental art projects developed by participants as part of the Space the Final Frontier project, an initiative by the Dutch Art Institute and Centre for Experimental Media Arts at Srishti School of Art, Design and Technology to get students to – as described in a introduction to the project – articulate “spaces of flux” and “index the shadow worlds” of the city.&lt;/p&gt;
&lt;p&gt;“When we speak about mapping the city, we immediately think in terms of physical geography. We don’t usually approach it in an aesthetic or theoretical way,” said Deepak DL, an art student from Chitrakala Parishat who participated in the two-week programme. His group chose to map shadow sounds – birds, buses on the street, sounds from a bar, and pressure cookers whistling in homes – piecing together an aural landscape of the city. “This project was about mapping the non-spaces. For instance when you go to a restaurant, you rarely see what’s going on behind the wall in the kitchen. We tried to do just that using sound,” said Deepak.&lt;/p&gt;
&lt;p&gt;“Wherever there is light, there is also shadow. For all the spaces getting attention, there are many more spaces not getting attention, but surviving and often thriving,” said Prayas Abhinav, faculty member and researcher at CEMA and one of the organisers of Space the Final Frontier. In collaboration with Renée Ridgeway, founder of an online platform for art activities called n.e.w.s., and a third collaborator Stephen Wright, Abhinav is currently working on a book which examines the distribution of human attention in the art world, based on a concept known as “attention economy”.&lt;/p&gt;
&lt;p&gt;The trio’s fascination with the theme also led them to hunt for shadow art activities on the internet. In the course of their search they found themselves wondering how to find art online without necessarily limiting themselves to work that described itself as “art”. For Abhinav and his colleagues this became more than a technical problem, since search engines assume that users are looking for what others are looking for and throw up the most popular or valid entries first, leaving the vast majority of less popular entries in the shadow. “Lesser known artists don’t refer to themselves as ‘lesser known artists’, so finding them online via Google isn’t all that easy,” said Abhinav. “Everyone is operating in the same space with established hierarchies. Shadows exist, but how do we look for them?”&lt;/p&gt;
&lt;p&gt;“In the 1990s we used to have a culture of community web sites that looked really bad, but were thriving hubs,” said Abhinav. He pointed out that over the decade, with the advent of search engines, the larger databases gained priority among users. To democratise search results, Abhinav and Ridgeway, along with the Centre for Internet and Society, launched the Shadow Search Project with an open call for entries in early 2010 to find an algorithm that could bring up entries that otherwise exist under the radar, through search.&lt;/p&gt;
&lt;p&gt;“If the new currency is attention – that is, if users are supposed to pay not money but time –, certain kinds of priorities are set up and vast amounts of information will always remain invisible,” said Nishant Shah, researcher at the Centre for Internet and Society. The Shadow Search Project is intended to serve as a platform to look for these shadows and give them visibility.&lt;/p&gt;
&lt;p&gt;The winning entry, a search engine called Narcissus, which will be demonstrated this fortnight, takes the search results of a regular search engine like Google and reverses it, such that the user gets the last page first. “The least popular results come up first, and as those become more popular, the new least popular results come up. This continues in a cyclical manner,” said Ridgeway.&lt;/p&gt;
&lt;p&gt;Data gathered and indexed by students during the Space the Final Frontier programme will be used to test the Narcissus algorithm. “If one of the strengths of the Internet is serendipity – stumbling upon a small, but great find by chance – the idea of a search engine plug in like Narcissus that scrambles Google results and presents it in a democratic manner, definitely has appeal,” said Shah.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original in Time Out Bengaluru &lt;a class="external-link" href="http://www.timeoutbangalore.com/aroundtown/aroundtown_preview_details.asp?code=74"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/chasing-shadows'&gt;https://cis-india.org/news/chasing-shadows&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-20T05:22:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity">
    <title>We are anonymous, we are legion</title>
    <link>https://cis-india.org/internet-governance/blog/online-anonymity</link>
    <description>
        &lt;b&gt;Online anonymity is vital for creativity and entrepreneurship on the Web, writes Sunil Abraham. The article was published in the Hindu on April 18, 2011.&lt;/b&gt;
        
&lt;p&gt;During his keynote at the International World Wide Web Conference recently, Sir Tim Berners-Lee argued for the preservation of online anonymity as a safeguard against oppression. This resonated with his audience in Hyderabad, given the recent uproar in the Indian blogosphere and twitterverse around the IT Act (Amendment 2008) and the recently published associated rules for intermediaries and cyber cafes.&lt;/p&gt;
&lt;p&gt;Over time, there has been a dilution of standards for blanket surveillance. The Telegraph Act allowed for blanket surveillance of phone traffic only as the rarest of exceptions. The IT Act and the ISP licence on the other hand, authorise and require ISPs and cyber cafes to undertake blanket surveillance as the norm in the form of data retention. The transaction database of the UID (Unique Identification Number) project will log of all our interactions with the government, private sector and other citizens; all these are frightening developments for freedom of expression in general and anonymous speech in particular.&lt;/p&gt;
&lt;p&gt;Anonymous speech is a necessary pre-condition for democratic and open governance, free media, protection of whistle-blowers and artistic freedom. On many controversial areas of policy formulation, it is usually anonymous officials from various ministries making statements to the press. Would mapping UIDs to IP address compromise the very business of government? A traditional newspaper may solicit anonymous tips regarding an ongoing investigative journalism campaign through their website.&lt;/p&gt;
&lt;p&gt;Would data retention by ISPs expose their anonymous sources? Whistle-blowers usually use public Wi-Fi or cyber cafes because they don't want their communications traced back to residential or official IP addresses. Won't the ban on open public Wi-Fi networks and the mandatory requirement for ID documents at cyber cafes jeopardise their safety significantly? Throughout history, great art has been produced anonymously or under a nom de plume. Will the draft Intermediary Due Diligence Rules, which prohibits impersonation even if it is without any criminal intent, result in artists sanitising their art into banality?&lt;/p&gt;
&lt;p&gt;Anonymous speech online is facilitated by three forms of sharing — shared standards, shared software and shared identities. Shared or open standards such as asymmetric encryption and digital signatures allow for anonymous, private and yet authenticated communications. Shared software or Free/Open Source Software reassures all parties involved that there is no spy-ware or back door built into tools and technologies built around these standards.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Shared identities, unlike shared software and standards, is a cultural hack and, therefore, almost impossible to protect against. V for Vendetta, the graphic novel by Alan Moore gives us an insight into how this is could be done. The hero, V, hides his identity behind a Guy Fawkes mask. Towards the end of the novel, he couriers thousands of similar masks to the homes of ordinary citizens.&lt;/p&gt;
&lt;p&gt;In the final showdown between V and the oppressive regime, these citizens use these masks to form an anonymous mob that confuses the security forces into paralysis. Shared identities online therefore, is the perfect counterfoil to digital surveillance.&lt;/p&gt;
&lt;p&gt;As Dr. Berners-Lee spoke in Hyderabad, the Internet Rights and Principles Dynamic Coalition of the Internet Governance Forum released a list of 10 principles for online governance at the meeting convened by the UN Special Rapporteur on Freedom of Expression in Stockholm.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The fifth principle includes “freedom from surveillance, the right to use encryption, and the right to online anonymity”. One hopes that Gulshan Rai of CERT-IN will heed the advice provided by his international peers and amend the IT Act rules before they have a chilling effect on online creativity and entrepreneurship.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Read the article originally published in the Hindu&lt;/em&gt;, &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-national/article1705308.ece"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/online-anonymity'&gt;https://cis-india.org/internet-governance/blog/online-anonymity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T09:38:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/your-right-to-remain-silent">
    <title>You Have the Right to Remain Silent</title>
    <link>https://cis-india.org/internet-governance/blog/your-right-to-remain-silent</link>
    <description>
        &lt;b&gt;India has a long history of censorship that it justifies in the name of national security. But new laws governing the Internet are unreasonable and — given the multitude of online voices — poorly thought out, argues Anja Kovacs in this article published in the Sunday Guardian on 17 April 2011.&lt;/b&gt;
        
&lt;p&gt;In March 2011, Indian media - both social and traditional - was ablaze
 with fears that a new set of rules, proposed to complement the IT 
(Amendment) Act 2008, would thwart the freedom of expression of India's 
bloggers: contrary to standard international practice, the Intermediary 
Due Dilligence Rules seemed intent on making bloggers responsible for 
comments made by readers on their site. Only a few weeks earlier, the 
threat of online censorship had manifested itself in a different form: 
although the block was implemented unevenly, mobile applications market 
space Mobango, bulk SMS provider Clickatell, hacking-related portal 
Zone-H.com and blogs hosted on Typepad were suddenly no longer 
accessible for most Indian netizens, without warning or explanation.&lt;/p&gt;
&lt;p&gt;Censorship in India is nothing new. At the time of Independence, 
there was widespread fear among its lawmakers that unrestricted freedom 
of expression could become a barrier to the social reforms necessary to 
put the country on Nehru's path to development – particularly as the 
memory of Partition continued to be vivid. Although freedom of 
expression is guaranteed by the Constitution, it is therefore subject to
 a fairly extensive list of so-called "reasonable" restrictions: the 
sovereignty and integrity of India, the security of the State, friendly 
relations with foreign States, public order, decency or morality, or in 
relation to contempt of court, defamation or incitement to an offence. 
But while this long list might have made sense at the time of Partition,
 in the mature democracy that India has now become, its existence, and 
the numerous opportunities for censorship and surveillance that it has 
enabled or justified, seems out of place. Indeed, though all these 
restrictions in themselves are considered acceptable internationally, 
there are few other democratic states that include all of them in the 
basic laws of their land.&lt;/p&gt;
&lt;p&gt;An appetite for censorship does not only exist among India's 
legislature and judiciary, however. Especially since the early nineties,
 instances of vigilante groups destroying art, preventing film 
screenings, or even attacking offending artists, writers and editors 
have become noteworthy for their regularity. But it is worth noting that
 even more progressive sections of society have not been averse to 
censorship: for example, section of the Indian feminist movement have 
voiced strong support for the Indecent Representation of Women Act that 
seeks to censor images of women which are derogatory, denigrating or 
likely to corrupt public morality.&lt;/p&gt;
&lt;p&gt;What connects all these efforts? A belief that suppressing speech and 
opinions makes it possible to contain the conflicts that emanate from 
India's tremendous diversity, while simultaneously ensuring its 
homogenous moral as much as political development. But if the advent of 
satellite television already revealed the vulnerabilities of this 
strategy, the Internet has made clear that in the long term, it is 
simply untenable. It is not just that the authors of a speech act may 
not be residents of India; it is that everybody can now become an 
author, infinitely multiplying the number of expressions that are 
produced each year and that thus could come within the Law's ambit. In 
this context, even if it may still have a role, suppression clearly can 
no longer be the preferred or even dominant technology of choice to 
manage disagreements. What is urgently needed is the building of a much 
stronger culture of respectful disagreement and debate within and across
 the country's many social groups. If more and more people are now 
getting an opportunity to speak, what we need to make sure is that they 
end up having a conversation.&lt;/p&gt;
&lt;p&gt;Yet the government of India so far has mostly continued on the beaten 
track, putting into place a range of legislations and policies to 
meticulously monitor and police the freedom of expression of netizens 
within its borders. Thus, for example, section 66F(1)(B) of the IT 
(Amendment) Act 2008 defines "cyberterrorism" so broadly as to include 
the unauthorised access to information on a computer with a belief that 
that information may be used to cause injury to...decency or morality. 
The suggested sentence may extend to imprisonment for life. The proposed
 Intermediary Due Dilligence Rules 2011 privatise the responsibility for
 censorship by making intermediaries responsible for all content that 
they host or store, putting unprecedented power over our acts of speech 
into the hands of private bodies. The proposed Cyber Cafe Rules 2011 
order that children who do not possess a photo identity card need to be 
accompanied by an adult who does, constraining the Internet access of 
crores of young people among the less advantaged sections of society in 
particular. And while the US and other Western countries continue to 
debate the desireability of an Internet Kill Switch, the Indian 
government obtained this prerogative through section 69A of the IT 
(Amendment Act) 2008 years ago.&lt;/p&gt;
&lt;p&gt;Such measures are given extra teeth by being paired with unprecedented
 systems of surveillance. For example, there are proposals on the table 
that make it obligatory for telecommunication carriers and manufacturers
 of telecommunications equipment to ensure their equipment and services 
have built-in surveillance capabilities. While at present, records are 
only kept if there is a specific requirement by intelligence or security
 agencies, the Intelligence Bureau has proposed that ISPs keep a record 
of all online activities of all customers for at least six months. The 
IB has also suggested putting into place a unique identification system 
for all Internet users, whereby they would be required to submit some 
form of online identification every time they go online.&lt;/p&gt;
&lt;p&gt;Proponents of such legislation often point to the new threats to 
safety and security that the Internet poses to defend these measures, 
and it is indeed a core obligation of any state to ensure the safety of 
its citizens. But the hallmark of a democracy is that it carefully 
balances any measures to do so with the continued guarantee of its 
citizens' fundamental rights. Despite the enormous changes and 
challenges that the Internet brings for freedom of expression 
everywhere, such an exercise seems to sadly not yet have been 
systematically undertaken in India so far.&lt;/p&gt;
&lt;p&gt;The recent blocking of websites with which we started this article 
reflects the urgent need to do so. In response to RTI applications by 
the Centre for Internet and Society and Medianama, the Department of 
Information Technology, which is authorised to order such blocks, 
admitted to blocking Zone-H, but not any of the other websites affected 
earlier this year. In an interview with The Hindu, the Department of 
Telecommunication too had denied ordering the blocking of access, 
despite the fact that some users trying to access Typepad had reported 
seeing the message "this site has been blocked as per request by 
Department of Telecom" on their screen. In the mean time, Clickatell and
 Mobango remain inaccessible for this author at the time of writing. 
That we continue to be in the dark as to why this is so in the world's 
largest democracy deserves to urgently become a rallying point.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/your-right-to-remain-silent'&gt;https://cis-india.org/internet-governance/blog/your-right-to-remain-silent&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>anja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>human rights</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-08-02T07:55:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/beyond-clicktivism">
    <title>Beyond Clicktivism </title>
    <link>https://cis-india.org/news/beyond-clicktivism</link>
    <description>
        &lt;b&gt;Moral support Hazare has in plenty. Count the missed calls, writes Debarshi Dasgupta in this article published in the Outlook on April 18, 2011.&lt;/b&gt;
        
&lt;p&gt;Want to commit sedition against the government?” “Join Dandi March-II.” “A Mahatma&amp;nbsp;announces a fast-unto-death.” These were some of the clarion calls that organisers of the protest against corruption led by Anna Hazare were making online. And people from all classes responded in massive numbers. Possibly fed up with the scale of the CWG and 2G scams and exasperated by the petty and mundane corruption they encounter daily.&lt;/p&gt;
&lt;p&gt;Anna Hazare and Jantar Mantar were among the top 10 global trending topics on Twitter on April 7 afternoon. “Earthquake named Anna Hazare lashes on corrupted Indian Politicians, epicenter India, it measures 1.22 Billion Richter Hearts,” said one. A disengaged youngster tweeted: “OK, enough of ignorance...time to read up on Anna Hazare.” On the ‘India Against Corruption’ page on Facebook, people from across the country left posts either announcing their local programme to support Hazare or asking for advice to organise one. Leaflets urged people to give a missed call on a Mumbai landline expressing support. With 6,00,000 missed calls, the organisers were urging more to call in to take that number to over 25 lakh.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society, said the organisers of this social media campaign had adopted a “funnel approach”, in which they get people involved gradually. “Clicking on the ‘Like’ function on Facebook to making a call—they are increasing the action, incrementally getting people to become proper activists from being armchair slacktivists.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?271256"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/beyond-clicktivism'&gt;https://cis-india.org/news/beyond-clicktivism&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-20T04:33:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/changing-tide">
    <title>Gone in a flash</title>
    <link>https://cis-india.org/news/changing-tide</link>
    <description>
        &lt;b&gt;Net-savvy crowds gather in public places for moments of wacky fun, then vanish. This article by Neha Thirani was published in the Times of India Crest Edition on April 16, 2011.&lt;/b&gt;
        
&lt;p&gt;It's an ordinary day at the MGF mall in Gurgaon, when a group of fifteen people suddenly appears carrying lanterns made from discarded plastic bottles and starts passing them along in relay fashion. Starting from the plaza in front of the mall, the crowd goes into the metro station nearby and back again, and then suddenly disperses, attracting amused stares from befuddled passersby. This lantern-wielding crowd is a flash mob, a global phenomenon that has now hit India.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So is this part of a mass social experiment? Political movement? Performance art? Pointless fun? Malini Kochupillai and Kanishka Prasad, both professors at the Sushant School of Art and Architecture in Gurgaon who orchestrated the event, say it's an effort to add a modicum of vibrancy to otherwise ignored public places, reclaiming the space for public use. Along with their students, the duo has organised about a dozen such 'flash mobs'.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For the uninitiated, a flash mob appears to be entirely random - a group of people, performing an unusual and seemingly pointless act and then dispersing. For those in the know, the flash mob is mobilised by an organiser, who brings together a crowd of people at a predefined location and time via social media, viral emails or mass texting. The crowd then carries out a scripted series of actions. The participants are typically strangers and the purpose is usually satire. Their actions transform a public place for the period of the performance, and engender discussion at the unexpected.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This rather quirky social phenomenon, popular in the US and Europe, originated in 2003 when Bill Wasik, senior editor of Harper's Magazine, organised the first successful flash mob in Macy's department store. Over a hundred people converged on the store, gathered over an expensive rug and pretended to be shopping for a 'love rug' for their shared apartment. Wasik's aim was apolitical. Through amusement, he wanted to question notions of conformity and the hipster culture of wanting to be a part of the 'next big thing'. Since then, there have been hugely successful flash mobs all over Europe and America. The biggest recorded flash mob has been the International Pillow Fight Day, which took place on March 22, 2008 in over 25 cities simultaneously. More recently, Egypt has seen a series of flash mobs who left security forces befuddled by their silent protests.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While the word was officially coined in 2003, the phenomenon can be traced back to 18th century England where workers in an assembly line would stitch secret messages into garments to plan a congregation of strangers.&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Nishant Shah, research director for the Centre for Internet and Society in Bangalore, says the growth in places of globalised consumption parallels the formation of flash mobs. "We can call malls places of public consumption, but at the back of our minds is the uneasy thought that the sign reads - rights of entry reserved. The mall, then, is only for certain public, " says Shah. "What flash mobs do is abuse the space - subverting the intention of the space that they are orchestrated in. "&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This social experiment that has now made its way to metros across the country has been loosely related to locations of consumerism. The first ever flash mob in India took place on October 4, 2003 when a group of over 60 people swarmed the then newly built Crossroads mall in Mumbai. The flash mobbers shocked the malls security guards when they inexplicably starting screaming into their cellphones vague directions such as: "Infosys becho ek hazaar, and SBI gheun tak don she. " This was followed by some frenzied dancing, and a moment later, they were gone.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;New media professional Noel Braganza, 26, organised a flash mob in the main courtyard of Phoenix Mills, Mumbai on Independence Day last year. Along with his colleague Nicole, Braganza spread the message over social media entirely;"We didn't take any prior permission, and this was possible because we organised it around Independence Day - our concept was patriotic, not disruptive, " says Braganza. At 4 pm on August 15, 2010, a crowd of over one hundred people, dressed in tri-color, lined up in rows in the courtyard of Pheonix Mills, sang the national anthem and then dispersed. Though most were there by design, some of the shoppers present joined spontaneously. "There was a huge snaking queue outside Big Bazaar that stopped in its tracks and started singing. "&amp;nbsp;&lt;/p&gt;
&lt;div&gt;The Urban Gorillaz - as the Gurgaon group is called - has organised its events with a particular focus on reclaiming spaces that have largely been ignored, or usurped by private developers. "Most public spaces in Delhi are decrepit and in desperate need of refurbishment, " says Kochupillai. "Perhaps increased use of these spaces will push the authorities to look beyond roads, flyovers and parking lots and give pedestrians an equally deserving space in the public realm. " The group encourages people to engage with the spaces available to them so that they do not become unused and unsafe.&amp;nbsp;&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div&gt;
&lt;div&gt;By studying what prevents or promotes the use of public space - such as movement patterns, active/ inactive zones and traffic interference in pedestrian areas - the group hopes to encourage architects and urban planners to create spaces where people can relax without feeling like they are trespassing or encroaching. "A flash mob says that you can create public spaces but we will decide how we will use them, " says Nishant Shah. "It gives a certain sense of power to the user who is no longer a consumer but an architect of the space. "&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div&gt;Started as an exercise in an architecture class at the Sushant School of Art and Architecture, the Urban Gorillaz facebook group has grown to over 400 members.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;Up until now, they have orchestrated over ten flash mobs doing a variety of random acts from exercising in the main courtyard of Heritage city, flying paper planes in an office complex, sketching people passing by in a mall, creating installations for passersby to paint and building a canopy on a sidewalk with rope and bamboo. The one which attracted the most attention was during the Commonwealth Games, where they organised the 'Common Man Games' at Nehru Place to entertain Delhi citizens who were sidelined during the games. The games included track and field and pitthu.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;"The first reaction of most people is what are you selling or promoting? And I reply that I am promoting public space, " says Kochupillai. "On occasions when guards have asked us to stop, we simply move into an area that is not under their jurisdiction. " The group has not encountered much antagonism, with most people amused rather than angry. Pragya Vig, 19, is a member of the group and a second year student at the college. "It set me thinking - why aren't we using the public spaces?" says Vig.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;In the coming month, the Urban Gorillaz are planning flash mobs in the metro to raise awareness for a women's right to personal space.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;Not all flash mobs have any apparent rationale. In the week after the death of Michael Jackson, Bangalore saw a spontaneous flash mob. At every red light signal, whenever the traffic would stop, people would suddenly come together and perform popular Michael Jackson dance moves. When the light changed, they would be gone in a flash.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Read the article in the &lt;a class="external-link" href="http://www.timescrest.com/society/gone-in-a-flash-5181"&gt;Times of India&lt;/a&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/changing-tide'&gt;https://cis-india.org/news/changing-tide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-20T04:58:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/iraqi-e-governance-india-tour">
    <title>Iraq Delegation to Visit India for Study of E-Governance in Indian Cities ― Meetings in Bangalore and Delhi</title>
    <link>https://cis-india.org/internet-governance/blog/iraqi-e-governance-india-tour</link>
    <description>
        &lt;b&gt;An Iraqi Government delegation headed by HE Mr. Abdul Kareem Al-Samarai, Minister of Science &amp; Technology, Government of Iraq will be in India on a e-governance tour. The study tour is organised by the United Nations Development Programme (UNDP) and the Economic and Social Commission for Western Asia (ESCWA). 
&lt;/b&gt;
        
&lt;p&gt;The Building e-Iraq National e-Governance strategic plan clearly 
emphasizes the need for connecting services and citizens to better 
access of information and services using ICTs as a leading 
resource/innovative force and as a contributing factor to enhancing 
transparency and accountability as well as facilitate the effective and 
efficient provisioning of essential services.&amp;nbsp; In this context, and as 
identified by the Iraqi e-governance ministerial steering committee, 
community service centers (CSCs) have been identified as having a 
direct bearing on sustainable social and economical changes consistent 
with the MDGs.&lt;/p&gt;
&lt;p&gt;As agreed within the steering committee, the community based 
connectivity services centres will be hosted within existing community 
structures throughout Iraq in order to enhance penetration levels and provide for cost-effective strategies. Post offices and youth 
centres would henceforth represent the point of entry for the community 
centres, where the Iraqi government is rehabilitating the buildings and 
has already provided Internet access with the hope of introducing 
e-governance services. The centres will also be linked with the 
implementation of the pilot e-services to promote access to information 
resources and government programmes and services. Additionally, the 
centres will serve to address local issues and priorities.&lt;/p&gt;
&lt;p&gt;UNDP in partnership with ESCWA is organizing a study tour to India that would expose senior Iraqi stakeholders to e-government and e-governance as a means to enhance the effectiveness and efficiency of the public sector in service provision, and make them learn from India's experience in:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Harnessing ICT technologies in service of community development, 
inclusiveness and empowerment, particularly at the local level;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Highlighting e-governance practices in connecting citizens to the 
state – at both the federal and local levels – and enhancing services;&lt;/li&gt;&lt;li&gt;Presenting success stories and lessons learned from India’s experience in instigating and operating CSCs; and&lt;/li&gt;&lt;li&gt;Providing the Government of India with a frame of reference in 
designing an appropriate, efficient and effective decentralized planning
 process and service delivery.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Dr. Samir Salim Raouf, Deputy Minister, Ministry of Science and 
Technology, Dr. Mahmood Kasim Sharief, Director General, Ministry of 
Science and Technology, Zagros Fattah Mohammed Mohammed, Director 
General, Ministry of Planning - KRG, Najwa Saeed Fathullah, Director 
General, Ministry of Finance, Majeed Hameed Jassim, Director General, 
Ministry of Communication, Dr. Kathim Mohammed Breesam, Director 
General, Ministry of Planning, Majed Sadoon Jasim, Director General, 
Ministry of Interior, Naeef Thamer Hussien, Director General, Ministry 
of Education, Ismael Khaleel Murad, Chief of Information, Ministry of 
Higher Education, Anwer Alwan Jassim, Ministry of Higher Education, 
Khalaf Muhammad Khalaf, Deputy Director General, Ministry of Education, 
Samer Noori Taqi, Chief of Information, Ministry of Municipalities and 
Public Works, Safaa Mohammed Kassar, Anbar Governorates, Abdulamer 
Abdulwahid Mubarak, Basra Governorates, Isam Hussein Ali, Ministry of 
Science and Technology, Sudipto Mukherjee, Head of Economic Recovery and Poverty Alleviation, UNDP, Abeer Fawaeer, E-Governance Specialist, UNDP and
 Dalia Zendi, Project Associate, UNDP will participate in the meetings.&lt;/p&gt;
&lt;h3&gt;Study tour structure&lt;/h3&gt;
&lt;p&gt;The delegation will hold meetings with Deepak Menon of India Water Portal, Ashok Kamath of Pratham Books, Srikanth Nadhamuni of E-governments foundation, Dr. Subbramanya of Geodesic, Parth Sarwate of Azim Premji Foundation, Abhay Singhavi of Narayana Hrydayalaya and MN Vidyashankar and DS Ravindran of Department of e-governance, Government of Karnataka.&lt;/p&gt;
&lt;p&gt;In Delhi, the delegation will hold meetings in the Department of Information Technology, National Informatics Centre, National Institute for Smart Government, Ministry of Urban Development and Ministry of Panchayati Raj.&lt;/p&gt;
&lt;h3&gt;Expected outcomes&lt;/h3&gt;
&lt;p&gt;The study tour will be concluded in Delhi with a brainstorming session to discuss and explore the results achieved by 
the study tour, and ultimately formulate an integrated framework for 
identifying, establishing, operating and managing CSCs in Iraq with 
wider national and local e-governance development plan in line with 
overarching public sector and modernization programme and generate a 
list of pilots quick-win e-services applications that can be implemented
 in Iraq.&lt;/p&gt;
&lt;p&gt;Other expected outputs are:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;To identify critical and relevant lessons from the Indian 
e-governance models, with particular emphasis on linkages between ICT 
and broad-based development in the areas of education, health, water and
 social development of rural and urban areas;&lt;/li&gt;&lt;li&gt;To enhance awareness on the role and operation of CSCs at various 
levels and their pivotal role in facilitating access to essential 
services and reducing service costs;&lt;/li&gt;&lt;li&gt;To improve understanding of the challenges in the effective 
application of ICTs for development and the key factors in the design 
and implementation of ICT for development projects and programmes; &lt;br /&gt;
  &lt;/li&gt;&lt;li&gt;To enhance the understanding of the measures to be undertaken by 
the centre and the provinces to identify and put in place e-services;&lt;/li&gt;&lt;li&gt;To highlight the successes and lessons learned from the Indian decentralized and local area planning and development model;&amp;nbsp;&lt;/li&gt;&lt;li&gt;To learn about the latest development in IT industry and the infrastructure required for CSCs and e-services; and&lt;/li&gt;&lt;li&gt;To explore working partnerships between the Government of India and the Indian IT companies.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;em&gt;This study tour is in furtherance to the &lt;a class="external-link" href="http://www.iq.undp.org/newsDetails.aspx?data=FpWRQMpyj_2frpqbXmYYkeq9JtoZpEgRrD_2byfKHhZ2RLQSmPC7DYQE1qSvK6fhgdttqrwInk_2bg_2fS5aRiBJzSyyIoh8FJZZ2aIGpO15PnJ7rqP54gCkBUx0UqV6qvkVz5nj"&gt;e-Governance Action plan&lt;/a&gt; prepared by the Iraq Government&lt;/em&gt;. &lt;em&gt;The Centre for Internet and Society is assisting the delegation for the meetings held in Bangalore.&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/iraqi-e-governance-india-tour'&gt;https://cis-india.org/internet-governance/blog/iraqi-e-governance-india-tour&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-08-02T07:13:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/publications/limits-privacy.pdf">
    <title>Limits to Privacy</title>
    <link>https://cis-india.org/internet-governance/publications/limits-privacy.pdf</link>
    <description>
        &lt;b&gt;In this chapter we attempt to build a catalogue of these various
justifications, without attempting to be exhaustive, with the objective of arriving at a
rough taxonomy of such frequently invoked terms. In addition we also examine some the
more important justifications such as “public interest” and “security of the state” that
have been invoked in statutes and upheld by courts to deprive persons of their privacy.
&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/publications/limits-privacy.pdf'&gt;https://cis-india.org/internet-governance/publications/limits-privacy.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-14T10:28:59Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/web2.0-responds-to-hazare">
    <title>How Web 2.0 responded to Hazare </title>
    <link>https://cis-india.org/news/web2.0-responds-to-hazare</link>
    <description>
        &lt;b&gt;Social media often fails to give us time to form critical opinions. ‘It mirrored the spectacle that we were being fed by TV channels', says Nishant Shah in an interview with Deepa Kurup. This news was published in the Hindu on April 11, 2011.&lt;/b&gt;
        
&lt;p style="text-align: center;"&gt;&lt;img src="https://cis-india.org/home-images/annahazare.jpg/image_preview" alt="Anna Hazare" class="image-inline image-inline" title="Anna Hazare" /&gt;&lt;/p&gt;
&lt;p&gt;By Day Two of the protests at Jantar Mantar, where social activist Anna Hazare was leading a fast-unto-death against corruption, most commentators were drawing fierce parallels with Tahrir Square, and other pro-democracy revolutions in the Middle-East.&lt;/p&gt;
&lt;p&gt;Soon enough, the social media angle raised its head. After a quiet Tuesday, when television channels began to “play up” the protests, Wednesday morning saw social media platforms abuzz with chatter. Initiated by campaign organisers, the India Against Corruption team, Facebook profile badges, missed call campaigns and petitions (most notably on online campaign site Avaaz (where over 6.17 lakh have registered support) entered the scene.&lt;/p&gt;
&lt;p&gt;In 140 characters, #janlokpal, #annahazare and the less gracious #meranetachorhain began to trend on Twitter. YouTube shows up around 2,000 video results, a lot of which are amateur videos shot by participants.&lt;/p&gt;
&lt;p&gt;‘Causes' application requests for “brandishing corruption”, ‘Like'-this-revolution requests and Tweets on how you can indeed weed out the corruption demon with a Re-Tweet, were abound.&lt;/p&gt;
&lt;p&gt;But did this social media buzz translate into more people on the ground? Did the Tweets and chain e-mails, that were doing the rounds fairly early on, manage to drive public opinion, or outrage, as in this case? On this, the jury is divided.&lt;/p&gt;
&lt;h3&gt;Crunching numbers&lt;/h3&gt;
&lt;p&gt;Even in the Middle-East, where we saw dictators plug social media channels, experts have downplayed the pivotal role attributed to social media. A tool for sharing information, its standalone role in triggering a revolution has been dismissed by many.&lt;/p&gt;
&lt;p&gt;In the current context, this is even more difficult to establish because efforts appear to be all too scattered, unlike in Egypt where the ‘We are all Khaled Said' page by Wael Ghonim, appeared to be a focal point of sorts.&lt;/p&gt;
&lt;p&gt;In comparison, a simple search on Facebook reveals over 20 pages that all have around 25,000-30,000 users on-board. Mr. Hazare's Facebook profile page has over 1.3 lakh ‘Likes'.&lt;/p&gt;
&lt;p&gt;Gaurav Mishra, social media analyst, pegs the total support at around 15 lakh. Drawing parallels with the citizen activism campaigns that emerged between the terrorist attacks in Mumbai in 2008 and the Lok Sabha elections of 2009 (the former being when social media arrived in India), Mr. Mishra also points out that corruption did go for a Six on Friday (the final day) with IPL4 dominating conversation online.&lt;/p&gt;
&lt;p&gt;Nishant Shah, director (research) at the Centre for Internet and Society, points out that while during revolutions, the social media has proved to be a poignant and powerful tool to mobilise resources, last week it emerged that it can not only propagate dubious opinions, but also it often (because it relies on the temporal quality of making things viral) fails to give us time to form critical opinions.&lt;/p&gt;
&lt;p&gt;He compares a platform like Avaaz, that mobilised people ‘against corruption', with long-term Ipaidabribe project (using the same digital tools) which actually leads to debate around why corruption is so endemic.&lt;/p&gt;
&lt;h3&gt;Mirrors TV&lt;/h3&gt;
&lt;p&gt;Interestingly, as Mr. Shah points out, the social media mirrored the spectacle that people were being fed by TV channels, instead of being a true discursive space of public dialogue. It's now getting clear that they are actually playing out an interesting traction as they supplement each other in bolstering of evidence and participation, he adds.&lt;/p&gt;
&lt;p&gt;On the other hand, blogs too were abuzz. However, many did seek to provide deeper perspective, and provided more space for debate and dissent. In fact, progressive blogs even attempted to counter the one-sided commentary provided on traditional visual media.&lt;/p&gt;
&lt;p&gt;Click here for the story in the &lt;a class="external-link" href="http://www.hindu.com/2011/04/11/stories/2011041155420700.htm"&gt;Hindu&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/web2.0-responds-to-hazare'&gt;https://cis-india.org/news/web2.0-responds-to-hazare&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-11T10:38:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy">
    <title>Privacy and the Information Technology Act — Do we have the Safeguards for Electronic Privacy?</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy</link>
    <description>
        &lt;b&gt;How do the provisions of the Information Technology Act measure up to the challenges of privacy infringement? Does it provide an adequate and useful safeguard for our electronic privacy? Prashant Iyengar gives a comprehensive analysis on whether and how the Act fulfils the challenges and needs through a series of FAQs while drawing upon real life examples. &lt;/b&gt;
        &lt;h2&gt;What kinds of computer related activities impinge on privacy?&lt;/h2&gt;
&lt;p&gt;Although Information and Communications Technologies (ICTs) have greatly enhanced our capacities to collect, store, process and communicate information, it is ironically these very capacities of technology which make us vulnerable to intrusions of our privacy on a previously impossible scale. Firstly, data on our own personal computers can compromise us in unpleasant ways — with consequences ranging from personal embarrassment to financial loss. Secondly, transmission of data over the Internet and mobile networks is equally fraught with the risk of interception — both lawful and unlawful — which could compromise our privacy. Thirdly, in this age of cloud computing when much of "our" data — our emails, chat logs, personal profiles, bank statements, etc., reside on distant servers of the companies whose services we use, our privacy becomes only as strong as these companies’ internal electronic security systems. Fourthly, the privacy of children, women and minorities tend to be especially fragile in this digital age and they have become frequent targets of exploitation. Fifthly, Internet has spawned new kinds of annoyances from electronic voyeurism to spam or offensive email to ‘phishing’ — impersonating someone else’s identity for financial gain — each of which have the effect of impinging on one’s privacy.&lt;/p&gt;
&lt;p&gt;Although there are a number of technological measures through which these risks can be reduced, it is equally important to have a robust legal regime in place which lays emphasis on the maintenance of privacy. This note looks at whether and how the Information Technology Act that we currently have in India measures up to these challenges of electronic privacy [&lt;a href="#1"&gt;1&lt;/a&gt;].&lt;/p&gt;
&lt;h2&gt;&lt;span class="Apple-style-span"&gt;What provisions in the IT Act protect against violations of privacy?&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;At the outset, it would be pertinent to note that the IT Act defines a ‘computer resource’; expansively as including a “computer, computer system, computer network, data, computer database or software” [&lt;a href="#2"&gt;2&lt;/a&gt;]. As is evident, this definition is wide enough to cover most intrusions which involve any electronic communication devices or networks — including mobile networks. Briefly, then IT Act provides for both civil liability and criminal penalty for a number of specifically proscribed activities involving use of a computer —  many of which impinge on privacy directly or indirectly. These will be examined in detail in the following sub-sections.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span"&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;Intrusions into computers and mobile devices&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;accessing&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;downloading/copying/extraction of data or extracts any data&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;introduction of computer contaminant[&lt;a href="#3"&gt;3&lt;/a&gt;];or computer virus[&lt;a href="#4"&gt;4&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;causing damage either to the computer resource or data residing on it&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;disruption&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;denial of access&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;facilitating access by an unauthorized person&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;charging the services availed of by a person to the account of another person,&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;destruction or diminishing of value of information&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;stealing, concealing, destroying or altering source code with an intention&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span"&gt;
&lt;p&gt;The Act provides for the civil remedy of “damages by way of compensation” for damages caused by any of these actions. In addition anyone who “dishonestly” and “fraudulently” does any of these specified acts is liable to be punished with imprisonment for a term of upto three years or with a fine which may extend to five lakh rupees, or with both[&lt;a href="#5"&gt;5&lt;/a&gt;].&lt;/p&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Bangalore techie convicted for hacking govt site (2009, Deccan Herald)&lt;/b&gt;[&lt;a href="#6"&gt;6&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In November 2009, The Additional Chief Metropolitan Magistrate, Egmore, Chennai, sentenced N G Arun Kumar, a techie from Bangalore to undergo a rigorous imprisonment for one year with a fine of Rs 5,000 under section 420 IPC (cheating) and Section 66 of IT Act (hacking).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;Investigations had revealed that Kumar was logging on to the BSNL broadband Internet connection as if he was the authorised genuine user and ‘made alteration in the computer database pertaining to broadband Internet user accounts’ of the subscribers.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;The CBI had registered a cyber crime case against Kumar and carried out investigations on the basis of a complaint by the Press Information Bureau, Chennai, which detected the unauthorised use of broadband Internet.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;The complaint also stated that the subscribers had incurred a loss of Rs 38,248 due to Kumar’s wrongful act. He used to ‘hack’ sites from Bangalore as also from Chennai and other cities, they said.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Children's privacy online&lt;/h3&gt;
&lt;p&gt;As computers and the Internet become ubiquitous children have increasingly become exposed to crimes such as pornography and stalking that make use of their private information. The newly inserted section 67B of the IT Act (2008) attempts to safeguard the privacy of children below 18 years by creating a new enhanced penalty for criminals who target children.&lt;/p&gt;
&lt;p&gt;The section firstly penalizes anyone engaged in child pornography. Thus, any person who “publishes or transmits” any material which depicts children engaged in sexually explicit conduct, or anyone who creates, seeks, collects, stores, downloads, advertises or exchanges this material may be punished with imprisonment upto five years (seven years for repeat offenders) and with a fine of upto Rs. 10 lakh.&lt;/p&gt;
&lt;p&gt;Secondly, this section punishes the online enticement of children into sexually explicitly acts, and the facilitation of child abuse, which are also punishable as above.&lt;/p&gt;
&lt;p&gt;Viewed together, these provisions seek to carve out a limited domain of privacy for children from would-be sexual predators.&lt;/p&gt;
&lt;p&gt;The section exempts from its ambit, material which is justified on the grounds of public good, including the interests of "science, literature, art, learning or other objects of general concern". Material which is kept or used for bona fide "heritage or religious purpose" is also exempt.&lt;/p&gt;
&lt;p&gt;In addition, the newly released Draft Intermediary Due-Diligence Guidelines, 2011 [&lt;a href="#7"&gt;7&lt;/a&gt;]require ‘intermediaries’[&lt;a href="#8"&gt;8&lt;/a&gt;]to notify users not to store, update, transmit and store any information that is inter alia, “pedophilic” or “harms minors in any way”. An intermediary who obtains knowledge of such information is required to “act expeditiously to work with user or owner of such information to remove access to such information that is claimed to be infringing or to be the subject of infringing activity”. Further, the intermediary is required to inform the police about such information and preserve the records for 90 days.&lt;/p&gt;
&lt;h3&gt;Electronic Voyeurism&lt;/h3&gt;
&lt;p&gt;Although once regarded as only the stuff of spy cinema, the explosion in consumer electronics has lowered the costs and the size of cameras to such an extent that the threat of hidden cameras recording people’s intimate moments has become quite real. Responding to the growing trend of such electronic voyeurism, a new section 66E has been inserted into the IT Act which penalizes the capturing, publishing and transmission of images of the "private area" [&lt;a href="#9"&gt;9&lt;/a&gt;]of any person without their consent, "under circumstances violating the privacy" [&lt;a href="#10"&gt;10&lt;/a&gt;] of that person.&lt;/p&gt;
&lt;p&gt;This offence is punishable with imprisonment of upto three years or with a fine of upto Rs. two lakh or both.&lt;/p&gt;
&lt;h3&gt;Phishing – or Identity Theft&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The word 'phishing' is commonly used to describe the offence of electronically impersonating someone else for financial gain. This is frequently done either by using someone else’s login credentials to gain access to protected systems, or by the unauthorized application of someone else’s digital signature in the course of electronic contracts. Increasingly a new type of crime has emerged wherein sim cards of mobile phones have been ‘cloned’ enabling miscreants to make calls on others' accounts. This is also a form of identity theft.&lt;/p&gt;
&lt;p&gt;Two sections of the amended IT Act penalize these crimes:&lt;/p&gt;
&lt;p&gt;Section 66C makes it an offence to “fraudulently or dishonestly” make use of the electronic signature, password or other unique identification feature of any person. Similarly, section 66D makes it an offence to “cheat by personation” [&lt;a href="#11"&gt;11&lt;/a&gt;] by means of any ‘communication device’[&lt;a href="#12"&gt;12&lt;/a&gt;] or 'computer resource'.&lt;/p&gt;
&lt;p&gt;Both offences are punishable with imprisonment of upto three years or with a fine of upto Rs. one lakh.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Mumbai Police Solves Phishing scam&lt;/b&gt; &lt;span class="Apple-style-span"&gt;[&lt;a href="#13"&gt;13&lt;/a&gt;]&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;In 2005, a financial institute complained that they were receiving misleading emails ostensibly emanating from ICICI Bank’s email ID.&lt;/p&gt;
&lt;p&gt;An investigation was carried out with the emails received by the customers of that financial institute and the accused were arrested. The place of offence, Vijaywada was searched for the evidence. One laptop and mobile phone used for committing the crime was seized.&lt;/p&gt;
&lt;p&gt;The arrested accused had used open source code email application software for sending spam e-mails. He had downloaded the same software from the Internet and then used it as it is.&lt;/p&gt;
&lt;p&gt;He used only VSNL to spam the e-mail to customers of the financial institute because VSNL email service provider does not have spam box to block the unsolicited emails.&lt;/p&gt;
&lt;p&gt;After spamming e-mails to the institute customers he got the response from around 120 customers of which 80 are genuine and others are not correct because they do not have debit card details as required for e-banking."&lt;/p&gt;
&lt;p&gt;The customers who received his e-mail felt that it originated from the bank. When they filled the confidential information and submitted it the said information was directed to the accused. This was possible because the dynamic link was given in the first page (home page) of the fake website. The dynamic link means when people click on the link provided in spam that time only the link will be activated. The dynamic link was coded by handling the Internet Explorer onclick () event and the information of the form will be submitted to the web server (where the fake website is hosted). Then server will send the data to the configured e-mail address and in this case the e-mail configured was to the e-mail of the accused. All the information after phishing (user name, password, transaction password, debit card number and PIN, mother’s maiden name) which he had received through the Wi-Fi Internet connectivity of Reliance.com was now available on his Acer laptop.&lt;/p&gt;
&lt;p&gt;This crime was registered under section 66 of the IT Act, sections 419, 420, 465, 468 and 471 of  the Indian Penal Code and sections 51, 63 and 65 of the Indian Copyright Act, 1957 which attract the punishment of three years imprisonment and fine upto Rs 2 lac which the accused never thought of.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Spam and Offensive Messages&lt;/h3&gt;
&lt;p&gt;Although the advent of e-mail has greatly enhanced our communications capacities, most e-mail networks today remain susceptible to attacks from spammers who bulk-email unsolicited promotional or even offensive messages to the nuisance of users. Among the more notorious of these scams is/was the so-called "section 409 scam" in which victims receive e-mails from alleged millionaires who induce them to disclose their credit information in return for a share in millions.&lt;/p&gt;
&lt;p&gt;Section 66A of the IT Act attempts to address this situation by penalizing the sending of:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;any message which is grossly offensive or has a menacing character&lt;/li&gt;
&lt;li&gt;false information for the purpose of causing annoyance, inconvenience, danger, insult, criminal intimidation, enmity, hatred or ill-will&lt;/li&gt;
&lt;li&gt;any electronic e-mail for the purpose of causing annoyance or inconvenience, or to deceive the addressee about the origin of such messages;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This offence is punishable with imprisonment upto three years and with a fine[&lt;a href="#14"&gt;14&lt;/a&gt;]&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;b&gt;Hoax E-mails&lt;/b&gt; [&lt;a href="#15"&gt;15&lt;/a&gt;]&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In 2009, a 15-year-old Bangalore teenager was arrested by the cyber crime investigation cell (CCIC) of the city crime branch for allegedly sending a hoax e-mail to a private news channel. In the e-mail, he claimed to have planted five bombs in Mumbai, challenging the police to find them before it was too late.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;According to police officials, at around 1p.m. on May 25, the news channel received an e-mail that read: “I have planted five bombs in Mumbai; you have two hours to find it.” The police, who were alerted immediately, traced the Internet Protocol (IP) address to Vijay Nagar in Bangalore. The Internet service provider for the account was BSNL, said officials.&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span class="Apple-style-span"&gt;&lt;b&gt;Minor Hoax Spells Major Trouble&lt;/b&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class="Apple-style-span"&gt;Sixteen-year-old Rakesh Patel (name changed), a student from Ahmedabad, sent an e-mail to a private news channel on March 18, 2008, warning officials of a bomb on an Andheri-bound train. In the e-mail, he claimed to be a member of the Dawood Ibrahim gang. Three days later, the crime investigation cell (CCIC) of the city police arrested the boy under section 506 (ii) for criminal intimidation. He was charge-sheeted on November 28, 2008.&lt;br /&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;Status: Patel was given a warning by a juvenile court&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;A 14-year-old Colaba boy sent a hoax e-mail to a TV channel in Madhya Pradesh, three days after the July 26, 2008, Ahmedabad bomb blasts. He claimed that 29 bombs would go off in Jabalpur. He was picked up by officers of the anti-terrorism squad (ATS) who, with the help of the MP police, were able to trace the e-mail to a cyber café in Colaba.&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;Status: No FIR was registered. The Cuffe Parade police registered a non-cognizable (NC) complaint &lt;/span&gt;&lt;span class="Apple-style-span"&gt;against him, and the boy was allowed to go home after the police gave him a “strict warning”.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Shariq Khan, 18, was arrested in Bhopal on July 26, 2006, for sending out three e-mails claiming to be a member of the terrorist organisation, which the police believed was behind the 7/11 train bombings. He was arrested by the Bhopal police. Later, the ATS brought the boy to Mumbai and also booked him for a five-year-old unsolved case where an unknown accused had sent e-mail warnings to the department of Atomic Energy (DAE) in 2001.&lt;br /&gt;Status: The police filed a charge-sheet against Shariq who claimed that he had sent the e-mails for fun. Trial is pending in a juvenile court. Shariq is presently out on bail in Bhopal.&lt;/li&gt;
&lt;li&gt;On February 26, 2006, a 17-yearold student from Jamnabai Narsee School called an Alitalia flight bound to Milan at 2 a.m. telling them there was a bomb on board. He wanted to stop his girlfriend from going abroad. She was one of the 12 students on their way to attend a mock United Nations session in Geneva.&lt;br /&gt;Status: After being grilled by the police, he was arrested, but let out on bail.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Lawful Interception and monitoring of electronic communications under the IT Act&lt;/h2&gt;
&lt;p&gt;In addition to violations of privacy by criminal and the mischievous minded, electronic communications and storage are also a goldmine for governmental supervision and surveillance. This section provides a brief overview of the provisions in the IT Act which circumscribe the powers of the state to intercept electronic communications.&lt;/p&gt;
&lt;p&gt;The newly amended IT Act completely rewrote its provisions in relation to lawful interception. The new section 69 dealing with “power to issue directions for interception or monitoring or decryption of any information through any computer resource” is much more elaborate than the one it replaced, In October 2009, the Central Government notified rules under section 69 which lay down procedures and safeguards for interception, monitoring and decryption of information (the “Interception Rules 2009”). This further thickens the legal regime in this context.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Unlawful Intercept&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;In August 2007, Lakshmana Kailash K., a techie from Bangalore was arrested on the suspicion of having posted insulting images of Chhatrapati Shivaji, a major historical figure in the state of Maharashtra, on the social-networking site Orkut. The police identified him based on IP address details obtained from Google and Airtel – Lakshmana’s ISP. He was brought to Pune and detained for 50 days before it was discovered that the IP address provided by Airtel was erroneous. The mistake was evidently due to the fact that while requesting information from Airtel, the police had not properly specified whether the suspect had posted the content at 1:15 p.m. or a.m.&lt;/p&gt;
&lt;p&gt;Taking cognizance of his plight from newspaper accounts, the State Human Rights Commission subsequently ordered the company to pay Rs 2 lakh to Lakshmana as damages [&lt;a href="#16"&gt;16&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;The incident highlights how minor privacy violations by ISPs and intermediaries could have impacts that gravely undermine other basic human rights [&lt;a href="#17"&gt;17&lt;/a&gt;].&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In addition to section 69, the Government has been empowered under the newly inserted section 69B to "monitor and collect traffic data or information generated, transmitted, received or stored in any computer resource".&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;"Traffic data" has been defined in the section to mean “any data identifying or purporting to identify any person, computer system or computer network or any location to or from which communication is or may be transmitted.” Rules have been issued by the Central Government under this section (the “Monitoring and Collecting Traffic Data Rules, 2009”) which are similar, although with important distinctions, to the rules issued under section 69. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Thus, there are two parallel interception and monitoring regimes in place under the Information Technology Act. In the paragraphs that follow, we provide an overview of the regime of surveillance under section 69 — since they are more targeted towards the individual, and consequently the threats to privacy are more severe — while highlighting important differences in the rules drafted under section 69.&lt;/p&gt;
&lt;h3&gt;Who may lawfully intercept?&lt;/h3&gt;
&lt;p&gt;Section 69 empowers the “Central Government or a state government or any of its officers specially authorised by the Central Government or the state government, as the case may be” to exercise powers of interception under this section.&lt;/p&gt;
&lt;p&gt;Under the Interception Rules 2009, the secretary in the Ministry of Home Affairs has been designated as the "competent authority", with respect to the Central Government, to issue directions pertaining to interception, monitoring and decryption. Similarly, the respective state secretaries in charge of Home Departments of the various states and union territories are designated as "competent authorities" to issue directions with respect to the state government [&lt;a href="#18"&gt;18&lt;/a&gt;].&lt;/p&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Central Government&lt;/td&gt;
&lt;td&gt;State/Union Territory&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Ordinary Circumstances&lt;/td&gt;
&lt;td&gt;Secretary in the Ministry of Home Affairs&lt;/td&gt;
&lt;td&gt;Secretary in charge of Home Departments of State&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Emergency&lt;/td&gt;
&lt;td&gt;Head or second senior most officer of security and law enforcement&lt;/td&gt;
&lt;td&gt;Authorized officer not below the rank of Inspectors General of Police&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;p&gt;However, an exception is made in cases of emergency, either&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;in remote areas where obtaining prior directions from the competent authority is not feasible or&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;for ‘operational reasons’ where obtaining prior directions is not feasible.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In such cases it would be permissible to carry out interception after obtaining the orders of the Head or second senior most officer of security and law enforcement at the central level, and an authorized officer not below the rank of Inspector General of Police at the state or union territory level. The order must be communicated to the competent authority within three days of its issue, and approval must be obtained from the authority within seven working days, failing which the order would lapse.&lt;/p&gt;
&lt;p&gt;Where a state/union territory wishes to intercept/monitor or decrypt information beyond its territory, the competent authority for that state must make a request to the competent authority of the Central Government to issue appropriate directions.&lt;/p&gt;
&lt;h2&gt;Under what circumstances a direction to intercept may be issued?&lt;/h2&gt;
&lt;h3&gt;Purposes for which interception may be directed&lt;/h3&gt;
&lt;p&gt;Under section 69, the powers of interception may be exercised by the authorized officers “when they are satisfied that it is necessary or expedient” to do so in the interest of:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;sovereignty or integrity of India,&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;defense of India,&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;security of the state,&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;friendly relations with foreign states or&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;public order or&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;preventing incitement to the commission  of any cognizable offence relating to above or&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;for investigation of any offence.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Under section 69B, the competent authority may issue directions for monitoring for a range of “cyber security”[&lt;a href="#20"&gt;20&lt;/a&gt;] purposes including, inter alia, “identifying or tracking of any person who has breached, or is suspected of having breached or being likely to breach cyber security”.&lt;/p&gt;
&lt;h3&gt;Contents of direction&lt;/h3&gt;
&lt;p&gt;The reasons for ordering interception must be recorded in writing [&lt;a href="#21"&gt;21&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In the case of a direction under section 69, in arriving at its decision, the competent authority must consider alternate means of acquiring the information other than issuing a direction for interception [&lt;/span&gt;&lt;a href="#22"&gt;22&lt;/a&gt;&lt;span class="Apple-style-span"&gt;]. The direction must relate to information sent or likely to be sent from one or more particular computer resources to another (or many) computer resources [&lt;/span&gt;&lt;a href="#23"&gt;23&lt;/a&gt;&lt;span class="Apple-style-span"&gt;]. The direction must specify the name and designation of the officer to whom information obtained is to be disclosed, and also specify the uses for which the information is to be employed [&lt;/span&gt;&lt;a href="#24"&gt;24&lt;/a&gt;&lt;span class="Apple-style-span"&gt;].&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Duration of interception and periodic review&lt;/h3&gt;
&lt;p&gt;Once issued, an interception direction issued under section 69 remains in force for a period of 60 days (unless withdrawn earlier), and may be renewed for a total period not exceeding 180 days [&lt;a href="#25"&gt;25&lt;/a&gt;]. A direction issued under section 69B does not expire automatically through the lapse of time and theoretically would continue until withdrawn.&lt;/p&gt;
&lt;p&gt;Within seven days of its issue, a copy of a direction issued under either section 69 or section 69B must be forwarded to the review committee constituted to oversee wiretapping under the Indian Telegraph Act [&lt;a href="#26"&gt;26&lt;/a&gt;]. Every two months, the review committee is required to meet and record its findings as to whether the direction was validly issued in light of section 69(3) [&lt;a href="#27"&gt;27&lt;/a&gt;]. If the review committee is of the opinion that it was not, it can set aside the direction and order destruction of all information collected [&lt;a href="#28"&gt;28&lt;/a&gt;].&lt;/p&gt;
&lt;h3&gt;What powers of interception do they have?&lt;/h3&gt;
&lt;p&gt;The competent authority may, in his written direction “direct any agency of the appropriate government to intercept monitor or decrypt or cause to be intercepted or monitored or decrypted any information generated, transmitted, received or stored in any computer resource”[&lt;a href="#29"&gt;29&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;Accordingly, the subscriber or intermediary or any person in charge of the computer resource is must, if required by the designated government agency, extend all facilities, equipment and technical assistance to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;provide access to or secure access to the computer resource generating, transmitting, receiving or storing such information; or&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;intercept, monitor, or decrypt[&lt;a href="#30"&gt;30&lt;/a&gt;] the information, as the case may be; or&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;provide information stored in computer resource.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The intermediary must maintain records mentioning the intercepted information, the particulars of the person, e-mail account, computer resource, etc., that was intercepted, the particulars of the authority to whom the information was disclosed, number of copies of the information that were made, the date of their destruction, etc. [&lt;a href="#31"&gt;31&lt;/a&gt;].  This list of requisitions received must be forwarded to the government agency once every 15 days to ensure their authenticity [&lt;a href="#32"&gt;32&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;In addition, a responsibility is cast on the intermediary to put in place adequate internal checks to ensure that unauthorized interception does not take place, and extreme secrecy of intercepted information is maintained [&lt;a href="#33"&gt;33&lt;/a&gt;].&lt;/p&gt;
&lt;h2&gt;How long can information collected during interception be retained?&lt;/h2&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Interception rules require all records, including electronic records pertaining to interception to be destroyed by the government agency “in every six months except in cases where such information is required or likely to be required for functional purposes”. In the case of the Monitoring and Collecting of Traffic Data Rules 2009, this period is nine months from the date of creation of record.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;In addition, all records pertaining to directions for interception and monitoring are to be destroyed by the intermediary within a period of two months following discontinuance of interception or monitoring, unless they are required for any ongoing investigation or legal proceedings. In the case of Monitoring Rules, this period is six months from the date of discontinuance.&lt;/p&gt;
&lt;h2&gt;What penalties accrue to intermediaries and subscribers for resisting interception?&lt;/h2&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Section 69 stipulates a penalty of imprisonment upto a term of seven years and fine for any “subscriber or intermediary or any person who fails to assist the agency” empowered to intercept.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Data Protection under the IT Act&lt;/h2&gt;
&lt;h3&gt;Data Retention Requirements of 'Intermediaries'&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Section 67C of the amended IT Act mandates ‘intermediaries’[&lt;a href="#34"&gt;34&lt;/a&gt;] to maintain and preserve certain information under their control for durations which are to be specified by law. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;Any intermediary who fails to retain such electronic records may be punished with imprisonment up to three years and a fine.&lt;/p&gt;
&lt;h3&gt;Liability for body-corporates under section 43A&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;The newly inserted section 43A makes a start at introducing a mandatory data protection regime in Indian law. The section obliges corporate bodies who ‘possess, deal or handle’ any ‘sensitive personal data’ to implement and maintain ‘reasonable’ security practices, failing which they would be liable to compensate those affected by any negligence attributable to this failure. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;It is only the narrowly-defined ‘body corporates’ [&lt;a href="#35"&gt;35&lt;/a&gt;] engaged in ‘commercial or professional activities’ who are the targets of this section. Thus government agencies and non-profit organisations are entirely excluded from the ambit of this section [&lt;a href="#36"&gt;36&lt;/a&gt;]. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;“Sensitive personal data or information” is any information that the Central Government may designate as such, when it sees fit to.&lt;/p&gt;
&lt;p&gt;The “reasonable security practices” which the section obliges body corporates to observe are restricted to such measures as may be specified either “in an agreement between the parties” or in any law in force or as prescribed by the Central Government.&lt;/p&gt;
&lt;p&gt;By defining both “sensitive personal data” and “reasonable security practice” in terms that require executive elaboration, the section in effect pre-empts the courts from evolving an iterative, contextual definition of these terms.&lt;/p&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Mphasis BPO Fraud: 2005&lt;/b&gt; [&lt;a href="#37"&gt;37&lt;/a&gt;]&lt;br /&gt;&lt;br /&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In December 2004, four call centre employees, working at an outsourcing facility operated by MphasiS in India, obtained PIN codes from four customers of MphasiS’ client, Citi Group. These employees were not authorized to obtain the PINs. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;In association with others, the call centre employees opened new accounts at Indian banks using false identities. Within two months, they used the PINs and account information gleaned during their employment at MphasiS to transfer money from the bank accounts of CitiGroup customers to the new accounts at Indian banks. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;/span&gt;By April 2005, the Indian police had tipped off to the scam by a U.S. bank, and quickly identified the individuals involved in the scam. Arrests were made when those individuals attempted to withdraw cash from the falsified accounts, $426,000 was stolen; the amount recovered was $230,000.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h3&gt;Draft Reasonable Security Practices Rules 2011 &lt;span class="Apple-style-span"&gt;[&lt;a href="#38"&gt;38&lt;/a&gt;]&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;In February 2011, the Ministry of Information and Technology, published draft rules under section 43A in order to define “sensitive personal information” and to prescribe “reasonable security practices” that body corporates must observe in relation to the information they hold.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Sensitive Personal Information&lt;/b&gt;&lt;br /&gt;Rule 3 of these Draft Rules designates the following types of information as ‘sensitive personal information’:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;password;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;user details as provided at the time of registration or thereafter;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;information related to financial information such as Bank account / credit card / debit card / other payment instrument details of the users;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;physiological and mental health condition;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;medical records and history;(vi) Biometric information;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;information received by body corporate for processing, stored or processed under lawful contract or otherwise;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;call data records;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;This however, does not apply to “any information that is freely available or accessible in public domain or accessible under the Right to Information Act, 2005”.&lt;/p&gt;
&lt;p&gt;They and “any person” holding sensitive personal information are forbidden from “keeping that information for longer than is required for the purposes for which the information may lawfully be used”[&lt;a href="#40"&gt;40&lt;/a&gt;]&lt;/p&gt;
&lt;h3&gt;Mandatory Privacy Policies for body corporates&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Rule 4 of the draft rules enjoins a body corporate or its representative who “collects, receives, possess, stores, deals or handles” data to provide a privacy policy “for handling of or dealing in user information including sensitive personal information”. This policy is to be made available for view by such “providers of information” [&lt;a href="#41"&gt;41&lt;/a&gt;]. The policy must provide details of:&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Type of personal or sensitive information collected under sub-rule (ii) of rule 3;&lt;/li&gt;
&lt;li&gt;Purpose, means and modes of usage of such information;&lt;/li&gt;
&lt;li&gt;Disclosure of information as provided in rule 6 [&lt;a href="#42"&gt;42&lt;/a&gt;]. &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;b&gt;Prior Consent and Use Limitation during Data Collection&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In addition to the restrictions on collecting sensitive personal information, body corporate must obtain prior consent from the “provider of information” regarding “purpose, means and modes of use of the information”. The body corporate is required to “take such steps as are, in the circumstances, reasonable”[&lt;a href="#43"&gt;43&lt;/a&gt;] to ensure that the individual from whom data is collected is aware of :&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;the fact that the information is being collected; and&lt;/li&gt;
&lt;li&gt;the purpose for which the information is being collected; and&lt;/li&gt;
&lt;li&gt;the intended recipients of the information; and&lt;/li&gt;
&lt;li&gt;the name and address of :&lt;/li&gt;
&lt;li&gt;the agency that is collecting the information; and&lt;/li&gt;
&lt;li&gt;the agency that will hold the information. &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;During data collection, body corporates are required to give individuals the option to opt-in or opt-out from data collection [&lt;a href="#44"&gt;44&lt;/a&gt;]. They must also permit individuals to review and modify the information they provide "wherever necessary" [&lt;a href="#45"&gt;45&lt;/a&gt;]. Information collected is to be kept securely [&lt;a href="#46"&gt;46&lt;/a&gt;], used only for the stated purpose [&lt;a href="#47"&gt;47&lt;/a&gt;] and any grievances must be addressed by the body corporate “in a time bound manner” [&lt;a href="#48"&gt;48&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;Unlike "sensitive personal information" there is no obligation to retain information only for as long as is it is required for the purpose collected.&lt;/p&gt;
&lt;h3&gt;Limitations on Disclosure of Information&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;The draft rules require a body corporate to obtain prior permission from the provider of such information obtained either “under lawful contract or otherwise” before information is disclosed [&lt;a href="#49"&gt;49&lt;/a&gt;]. The body corporate or any person on its behalf shall not publish the sensitive personal information [&lt;a href="#50"&gt;50&lt;/a&gt;]. Any third party receiving this information is prohibited from disclosing it further [&lt;a href="#51"&gt;51&lt;/a&gt;]. However, a proviso to this sub-rule mandates information to be provided to ‘government agencies’ for the purposes of “verification of identity, or for prevention, detection, investigation, prosecution, and punishment of offences”. In such cases, the government agency is required to send a written request to the body corporate possessing the sensitive information, stating clearly the purpose of seeking such information. The government agency is also required to “state that the information thus obtained will not be published or shared with any other person” [&lt;a href="#52"&gt;52&lt;/a&gt;].&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Sub-rule (2) of rule 6 requires “any information” to be “disclosed to any third party by an order under the law for the time being in force.” This is to be done “without prejudice” to the obligations of the body corporate to obtain prior permission from the providers of information [&lt;a href="#53"&gt;53&lt;/a&gt;].&lt;/p&gt;
&lt;h3&gt;Reasonable Security Practices&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Rule 7 of the draft rules stipulates that a body corporate shall be deemed to have complied with reasonable security practices if it has implemented security practices and standards which require:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;a comprehensive documented information security program; and&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;information security policies that contain managerial, technical, operational and physical security control measures that are commensurate with the information assets being protected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In case of an information security breach, such body corporate will be “required to demonstrate, as and when called upon to do so by the agency mandated under the law, that they have implemented security control measures as per their documented information security program and information security policies”.&lt;/p&gt;
&lt;p&gt;The rule stipulates that by adopting the International Standard IS/ISO/IEC 27001 on “Information Technology – Security Techniques – Information Security Management System – Requirements”, a body corporate will be deemed to have complied with reasonable security practices and procedures.&lt;/p&gt;
&lt;p&gt;The rule also permits “industry associations or industry clusters” who are following standards other than IS/ISO/IEC 27001 but which nevertheless correspond to the requirements of sub-rule 7(1), to obtain approval for these codes from the government. Once this approval has been sought and obtained, the observance of these standards by a body corporate would deem them to have complied with the reasonable security practice requirements of section 43A.&lt;/p&gt;
&lt;h2&gt;Penalties and Remedies for breach of Data Protection&lt;/h2&gt;
&lt;h3&gt;Civil Liability for Corporates&lt;/h3&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;As mentioned above, any body corporates who fail to observe data protection norms may be liable to pay compensation if:&lt;/span&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;it is negligent in implementing and maintaining reasonable security practices, and thereby &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;causes wrongful loss or wrongful gain to any person;[&lt;a href="#54"&gt;54&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Claims for compensation are to be made to the adjudicating officer appointed under section 46 of the IT Act. Further, details of the powers and functions of this officer are given in succeeding sections of this note.&lt;/p&gt;
&lt;h3&gt;Criminal liability for disclosure of information obtained in the course of exercising powers under the IT Act&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Section 72 of the Information Technology Act imposes a penalty on “any person” who, having secured access to any electronic record, correspondence, information, document or other material using powers conferred by the Act or rules, discloses such information without the consent of the person concerned. Such unauthorized disclosure is punishable “with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.”&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Criminal Liability for unauthorized disclosure of information by any person of information obtained under contract&lt;/h3&gt;
&lt;p&gt;Section 72A of the IT Act imposes a penalty on any person [&lt;a href="#55"&gt;55&lt;/a&gt;] (including an intermediary) who&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;has obtained personal information while providing services under a lawful contract and&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;discloses the personal information without consent of the person, &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;with the intent to cause, or knowing it is likely to cause wrongful gain or wrongful loss [&lt;a href="#56"&gt;56&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Such unauthorised disclosure to a third person is punishable with imprisonment upto three years or with fine upto Rs five lakh, or both.&lt;/p&gt;
&lt;h2&gt;Whom to call? Adjudicatory Mechanism and Remedies under the IT Act&lt;/h2&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;This section provides a brief outline of the mechanism installed by the IT Act to activate the various remedies and penalties prescribed in various sections of the Act. As a victim of online intrusion, how does one use the IT Act to seek redressal?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;As mentioned above, the IT Act provides for both the civil remedy of damages in compensation (Chapter IX) as well as criminal penalties for offences such as imprisonment and fine (Chapter XI). In general, claiming a civil remedy does not bar one from seeking criminal prosecution and ideally both should be pursued together. For clarity, in the sections that follow, we will be discussing the two procedures separately.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Civil Damages and Compensation&lt;/h2&gt;
&lt;h3&gt;Whom to approach?&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Section 46 of the IT Act empowers the Central Government to appoint “adjudication officers” to adjudicate whether any person has committed any of the contraventions described in Chapter IX of the Act (See section 2.1 and 4.2 above) and to determine the quantum of compensation payable. Accordingly, the Central Government has designated the secretaries of the Department of Information Technology of each of the states or union territories as the “adjudicating officer” with respect to each of their territories [&lt;a href="#57"&gt;57&lt;/a&gt;].&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;However, a pecuniary limit has been placed on the powers of adjudicating officers, and they may only adjudicate cases where the quantum of compensation claimed does not exceed Rs. five crores. In cases where the compensation claimed exceeds this amount, jurisdiction would vest in the “competent court”, under the Code of Civil Procedure [&lt;a href="#58"&gt;58&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;Section 61 of the Act bars ordinary civil courts from jurisdiction over matters which the adjudicating officers have been empowered to decide under this Act.&lt;/p&gt;
&lt;h2&gt;When must a complaint be filed?&lt;/h2&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;The Limitation Act provides that a suit must be filed within three years from when the right to sue accrues [&lt;a href="#59"&gt;59&lt;/a&gt;].&lt;/span&gt;&lt;/div&gt;
&lt;h2&gt;What is the procedure?&lt;/h2&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Section 46 and the rules framed under that section provide elaborate guidelines on the procedure that is to be followed by the adjudicating officer. Thus, the adjudicating officer is required to give the accused person “a reasonable opportunity for making representation in the matter”. Thereafter, if , on an inquiry, “he is satisfied that the person has committed the contravention, he may impose such penalty or award such compensation as he thinks fit in accordance with the provisions of that section.”&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;In order to carry out their duties adjudicating officer have been invested with the powers of a civil court which are conferred on the cyber appellate tribunal [&lt;a href="#60"&gt;60&lt;/a&gt;]. Additionally, they have the power to punish for their contempt undert the Code of Criminal Procedure.&lt;/p&gt;
&lt;p&gt;Rules framed under the section provide further details on the procedure that must be followed and provide for the issuance of a “show cause notice”, manner of holding enquiry, compounding of offences, etc. [&lt;a href="#61"&gt;61&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;Section 47 provides that in adjudging the quantum of compensation, the adjudicating officer shall have due regard to the following factors, namely:—&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;the amount of gain of unfair advantage, wherever quantifiable, made as a result of the default; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;the amount of loss caused to any person as a result of the default;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;the repetitive nature of the default.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Where must a complaint be filed and in what format?&lt;/h2&gt;
&lt;p&gt;The complaint must be made to the adjudicating officer of the state or union territory on the basis of location of computer system, computer network. The complaint must be made on a plain paper in the format provided in the Performa attached to the rules [&lt;a href="#62"&gt;62&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;In case the offender or computer resource is located abroad, it would be deemed, for the purpose of prosecution to be located in India [&lt;a href="#63"&gt;63&lt;/a&gt;].&lt;/p&gt;
&lt;h2&gt;How long does the process take?&lt;/h2&gt;
&lt;div&gt;
&lt;div&gt;The Rules direct that the whole matter should be heard and decided “as far as possible” within a period of six months [&lt;a href="#64"&gt;64&lt;/a&gt;].&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;How much does it cost?&lt;/h2&gt;
&lt;p&gt;The Rules stipulates a variable fee payable by a bank draft calculated on the basis of damages claimed by way of compensation&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;a) Upto Rs. 10,000&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;10% ad valorem rounded off to nearest next hundred&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;b) From 10001 to Rs.50000&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Rs. 1000 plus 5% of the amount exceeding Rs.10,000 rounded off to nearest next hundred&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;c) From Rs.50001 to Rs.100000&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Rs. 3000/- plus 4% of the amount exceeding Rs. 50,000 rounded off to nearest next hundred&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;d) More than Rs. 100000&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Rs.5000/- plus 2% of the amount exceeding Rs. 100,000 rounded off to nearest next hundred&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h3&gt;Appeals to the Cyber Appellate Tribunal and the High Court&lt;/h3&gt;
&lt;p&gt;The Act provides for the constitution of a cyber appellate tribunal to hear appeals from cases decided by the adjudicating officer.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;Within 25 days of the copy of the decision being made available by the adjudicating officer, the aggrieved party may file an appeal before the cyber appellate tribunal.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;/span&gt;Section 57 provides that the appeal filed before the cyber appellate tribunal shall be dealt with by it as expeditiously as possible and endeavor shall be made by it to dispose of the appeal finally within six months from the date of receipt of the appeal. Section 62 gives the right of appeal to a high court to any person aggrieved by any decision or order of the cyber appellate tribunal on any question of fact or law arising out of such order. Such an appeal must be filed within 60 days from the date of communication of the decision or order of the cyber appellate tribunal.&lt;/p&gt;
&lt;h3&gt;Can contraventions be compounded (compromised) with the offender?&lt;/h3&gt;
&lt;p&gt;Except in the case of repeat offenders, contraventions may be compromised by the adjudicating officer or between the parties either before or after institution of the suit. Where any contravention has been compounded the IT Act provides that “no proceeding or further proceeding, as the case may be, shall be taken against the person guilty of such contravention in respect of the contravention so compounded”[&lt;a href="#65"&gt;65&lt;/a&gt;].&lt;/p&gt;
&lt;h3&gt;Criminal Penalties&lt;/h3&gt;
&lt;p&gt;The process described above applies to “contraventions” under Chapter IX of the Act. In addition to being liable to pay compensation, in the cases falling under section 43, such offenders may also be liable for criminal penalties such as imprisonment and fines [&lt;a href="#66"&gt;66&lt;/a&gt;]. This sub-section of this paper deals with the procedure to be followed with respect to the criminal offences set out under Chapter XI of the Act (for example, see sections 2.2 to 2.5 above).&lt;/p&gt;
&lt;h2&gt;Whom to approach? Who can take cognizance of offences and investigate them?&lt;/h2&gt;
&lt;p&gt;Section 78 of the IT Act empowers police officers of the rank of Inspectors and above to investigate offences under the IT Act.&lt;/p&gt;
&lt;p&gt;Many states have set up dedicated cyber crime police stations to investigate offences under this Act [&lt;a href="#67"&gt;67&lt;/a&gt;]. Thus, for example, the State of Karnataka has set up a special cyber crime police station responsible for investigating all offences under the IT Act with respect to the entire territory of Karnataka [&lt;a href="#68"&gt;68&lt;/a&gt;].&lt;/p&gt;
&lt;h2&gt;When must a complaint be lodged?&lt;/h2&gt;
&lt;p&gt;Although there is no time limit prescribed by the IT Act or the Code of Criminal Procedure with respect to when an FIR must be filed, in general, courts tend to take an adverse view when a significant delay has occurred between the time of occurrence of an offence and it’s reporting to the nearest police station.&lt;/p&gt;
&lt;p&gt;The Code of Criminal Procedure forbids courts from taking cognizance of cases after three years “if the offence is punishable with imprisonment for a term exceeding one year but not exceeding three years”. Where either the commission of the offence was not known to the person aggrieved, or where it is not known by whom the offence committed, this period is computed from the date on which respectively the offence or the identity of the offender comes to the knowledge of the person aggrieved [&lt;a href="#69"&gt;69&lt;/a&gt;].&lt;/p&gt;
&lt;h2&gt;What is the procedure?&lt;/h2&gt;
&lt;p&gt;No special procedure is prescribed for the trial of cyber offences and hence the general provisions of criminal procedure would apply with respect to investigation, charge sheet, trial, decision, sentencing and appeal.&lt;/p&gt;
&lt;h2&gt;Can offences be compounded?&lt;/h2&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Offences punishable with imprisonment of upto three years are compoundable by a competent court. However, repeat offenders cannot have their subsequent offences compounded. Additionally, offences which “affect the socio-economic conditions of the country” or those committed against a child under 18 years of age or against women cannot be compounded [&lt;a href="#70"&gt;70&lt;/a&gt;]. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Bibliography&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;&lt;a name="1"&gt;[1].&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;The IT Act is only one of the various laws which safeguard citizens from violations of online privacy. In addition, in the domain of finance, for instance, various RBI regulations mandate strong security protocols with respect to data held by financial institutions. Since this is the subject of a different dispatch on banking and privacy which we have brought out, these regulations are omitted from this discussion.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="2"&gt;[2].Section 2(k) of the IT Act defines ‘computer’ as any electronic magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="3"&gt;[3].Section 43 defines "computer contaminant" as any set of computer instructions that are designed— (a) to modify, destroy, record, transmit data or program residing within a computer, computer system or computer network; or (b) by any means to usurp the normal operation of the computer, computer system, or computer network;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="4"&gt;[4].Similarly, "computer virus" has been defined in section 43 as “any computer instruction, information, data or program that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a program, data or instruction is executed or some other event takes place in that computer resource;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="6"&gt;[6].Section 66 of the IT Act. &lt;/a&gt;&lt;a name="5"&gt;Anon, 2009. Bangalore techie convicted for hacking govt site. Deccan Herald. Available at: http://goo.gl/jCvAh. [Accessed March 29, 2011];&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="7"&gt;[7].The Information Technology (Due Diligence observed by Intermediaries Guidelines) Rules, 2011;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="8"&gt;[8].‘Intermediary’ has been defined very expansively under section 2(w) of the Act to mean, with respect to any electronic record, “any person who on behalf of another person receives, stores or transmits that record, or provides any service with respect to that record and includes telecom service providers, network service providers, Internet service providers, web hosting service providers, search engines, online payment sites, online-auction sites, online-market places and cyber cafes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="9"&gt;[9].‘Private area’ has been defined in section 66E as “the naked or undergarment clad genitals, pubic area, buttocks or female breast”.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="10"&gt;[10].Defined as “circumstances in which a person can have a reasonable expectation that (i) he or she could disrobe in privacy, without being concerned that an image of his or her private area was being captured or (ii) any part of his or her private area would not be visible to the public regardless of whether that person is in a public or private place”. See explanation to Section 66E&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="11"&gt;[11]."Cheating by personation" is a crime defined under section 416 the Indian Penal Code. According to that section, “a person is said to "cheat by personation" if he cheats by pretending to be some other person, or by knowingly substituting one person for another, or representing that he or any other person is a person other than he or such other person really is." The explanation to the section adds that "the offence is committed whether the individual personated is a real or imaginary person".  Two illustrations to the section further elaborate its meaning: (a) A cheats by pretending to be a certain rich banker of the same name. A cheats by personation (b) A cheats by pretending to be B, a person who is deceased. A cheats by personation.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="12"&gt;[12].Communication device" has been defined to mean "cell phones, personal digital assistance (sic) or combination of both or any other device used to communicate send or transmit any text, video, audio or image".&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="12"&gt;&lt;/a&gt;&lt;a name="12"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="13"&gt;[13].2005. Cyber Crime Cell, Mumbai: Case of Phishing. Mumbai Police. Available at: http://www.cybercellmumbai.com/case-studies/case-of-fishing [Accessed March 23, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="12"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="14"&gt;[14]. Although no maximum limit is prescribed for the fine under this section, Section 63 of the Indian Penal Code declares that “Where no sum is expressed to which a fine may extend, the amount of fine to which the offender is liable is unlimited, but shall not be excessive”.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="12"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="12"&gt;&lt;/a&gt;&lt;a name="15"&gt;[15].Hafeez, M., 2009. Crime Line: Curiosity was his main motive, say city police. Crime Line. Available at: http://mateenhafeez.blogspot.com/2009/05/curiosity-was-his-main-motive-say-city.html [Accessed March 23, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="16"&gt;[16]. Holla, A., 2009. Wronged, techie gets justice 2 yrs after being jailed. Mumbai Mirror. Available at: http://www.mumbaimirror.com/index.aspx?page=article&amp;amp;sectid=2&amp;amp;contentid=200906252009062503144578681037483 [Accessed March 23, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="17"&gt;[17].See also Nanjappa, V., 2008. 'I have lost everything'. Rediff.com News. Available at: http://www.rediff.com/news/2008/jan/21inter.htm [Accessed March 23, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="18"&gt;[18]. By contrast, rules framed under Section 69B designates only the Secretary to the Government of India in the Department of Information Technology under the Ministry of Communications and IT as the “competent authority” to issue orders of interception.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="19"&gt;[19].It is unclear what these “operational reasons” could mean. The text of the rules provide no useful guidance.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="20"&gt;[20].“Cyber security breach” is defined as meaning “any real or suspected adverse event in relation to cyber security that violates an explicitly or implicitly acceptable security policy resulting in unauthorized access, denial of service, disruption, unauthorized use of a computer resource for processing or storage of information or changes to date, information without authorization”. Rule 2(f) of the Monitoring and Collecting of Traffic Data Rules 2009. &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="20"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="20"&gt;&lt;/a&gt;&lt;a name="21"&gt;[21].Rule 7 of the Interception Rules 2009; Rule 3(3) of the Monitoring and Collecting of Traffic Data Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="22"&gt;[22].Rule 8 of the Interception Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="23"&gt;[23]. Rule 9 of the Interception Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="24"&gt;[24].Rule 10 of the Interception Rules 2009; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="25"&gt;[25].Rule 11 of the Interception Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="26"&gt;[26].Rule 7 of the Interception Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="27"&gt;[27].Rule 22 of the Interception Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="28"&gt;[28]. Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="29"&gt;[29].Section 69 of the IT Act.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="30"&gt;[30].The intermediary is required to assist in the decryption only to the extent that the intermediary has control over the decryption key. See Sub-Rule 13(3) of the Interception Rules 2009. Rule 17 enjoins the holder of a decryption key to provide decryption assistance when directed to by the competent authority. &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="31"&gt;[31].Rule 16 of the Interception Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="32"&gt;[32].Rule 18 of the Interception Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="33"&gt;[33]. Rule 20 of the Interception Rules 2009; Rules 10 &amp;amp; 11 of the Monitoring and Collecting of Traffic Data Rules 2009. Failure to maintain secrecy of data may attract punishment under Section 72 of the Information Technology Act.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="34"&gt;[34].Supra n. 6 for definition&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="35"&gt;[35].Section 43A defines "'body corporate" as any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="36"&gt;[36].This does not necessarily mean that these entitles are exempt from taking reasonable care to safeguard information that they collect, maintain or control – only that remedies against the government must be sought under general common law, rather than under the IT Act. &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="37"&gt;[37].Anon, 2005. The MphasiS Scandal – And How it Concerns U.S. Companies Considering Offshore BPO. Carretek. Available at: http://www.carretek.com/main/news/articles/MphasiS_scandal.htm [Accessed March 29, 2011]. See also Anon, 2005. MphasiS case: BPOs feel need to tighten security. Indian Express. Available at: http://www.expressindia.com/news/fullstory.php?newsid=44856 [Accessed March 29, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="38"&gt;[38]. The Information Technology (Reasonable security practices and procedures and sensitive personal information) Rules, 2011. Available at http://www.mit.gov.in/sites/upload_files/dit/files/senstivepersonainfo07_02_11.pdf, last accessed February 15th, 2011.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="39"&gt;[39].Rule 5 of the Draft Rules.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="39"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="39"&gt;&lt;/a&gt;&lt;a name="40"&gt;[40]. This is perhaps a bit vague, since the potential ‘lawful uses’ are numerous and could be inexhaustible. It is unclear whether “lawful usage” is coterminous with “the uses which are disclosed to the individual at the time of collection”. In addition, this rule is framed rather weakly since it does not impose a positive obligation (although this is implied) to destroy information that is no longer required or in use.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="41"&gt;[41].“Provider of data” is not the same as individuals to whom the data pertains, and could possibly include intermediaries who have custody over the data. We feel this privacy policy should be made available for view generally – and not only to providers of information. In addition, it might be advisable to mandate registration of privacy policies with designated data controllers.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="42"&gt;[42]. This is well framed since it does not permit body corporates to frame privacy policies that detract from Rule 6. &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="43"&gt;[43].One wonders about the convoluted language used here when a simpler phrase like “take reasonable steps” alone might have sufficed - reasonableness has generally been interpreted by courts contextually. As the Supreme Court has remarked, “`Reasonable’ means prima facie in law reasonable in regard to those circumstances of which the actor, called upon to act reasonably, knows or ought to know. See Gujarat Water Supply and Sewage Board v. Unique Erectors (Guj) AIR 1989 SC 973.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="44"&gt;[44].Sub-Rule 5(7).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="45"&gt;[45].Sub-Rule 5(6). It is unclear what would count as a ‘necessary’ circumstance and who would be the authority to determine such necessity. &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="46"&gt;[46].Sub-Rule 5(8).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="47"&gt;[47].Sub-Rule 5(5).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="48"&gt;[48].Sub-Rule 5(9).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="49"&gt;[49]. Sub-Rule 6(1) There are two problems with this rule. First, it requires prior permission only from the provider of information, and not the individual to whom the data pertains. In effect this whittles down the agency of the individual in being able to control the manner in which information pertaining to her is used. Second, it is not clear whether this information includes “sensitive personal information”. The proviso to this rule includes the phrase “sensitive information”, which would suggest that such information would be included. This makes it even more important that the rule require that prior permission be obtained from the individual to whom the data pertains and not merely from the provider of information. &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="50"&gt;[50].Sub-Rule 6(3).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="51"&gt;[51].Sub-Rule 6(4).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="52"&gt;[52].This is a curious insertion since it begs the question as to the utility of such a statement issued by the requesting agency. What are the sanctions under the IT Act that may be attached to a government agencies that betrays this statement? Why not instead, insert a peremptory prohibition on government agencies from disclosing such information (with the exception, perhaps, of securing conviction of offenders)?&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="53"&gt;[53].This sub-rule does not distinguish between orders issued by a court and those issued by an administrative/quasi-judicial body.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="54"&gt;[54]. “Wrongful loss” and “wrongful gain” have been defined by Section 23 of the Indian Penal Code. Accordingly, "Wrongful gain" is gain by unlawful means of property which the person gaining is not legally entitled. "Wrongful loss"- "Wrongful loss" is the loss by unlawful means of property to which the person losing it is legally entitled.” The section also includes this interesting explanation “Gaining wrongfully, losing wrongfully- A person is said to gain wrongfully when such person retains wrongfully, as well as when such person acquires wrongfully. A person is said to lose wrongfully when such person is wrongfully kept out of any property as well as when such person is wrongfully deprived of property”. Following this, it could be possible to argue that the retention of data beyond the period of its use would amount to a “wrongful gain”.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="55"&gt;[55]. Section 3(39) of the General Clauses Act defines a person to include “any company or association or body of individuals whether incorporated or not”. An interesting question here would be whether the State can be considered “a person” so that it can be held liable for unauthorized disclosure of personal information. In an early case of Shiv Prasad v. Punjab State AIR 1957 Punj 150, the Punjab High Court had excluded this possibility. However, the case law on this point has not been consistent. In Ramanlal Maheshwari v.Municipal Committee, the MP High Court held that the Municipal Council could be treated as a ‘person’ for the purpose of levying a fine attached to a criminal offence. Statutory corporate bodies (such as the proposed UID Authority of India) have been held to be ‘persons’ for purposes of law . See Commissioners, Port of Calcutta v. General Trading Corporation, AIR 1964 Cal 290. Here under the Calcutta Port Act, Port Commissioners were declared to be a “body corporate”, and hence were held to be a ‘person’.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="56"&gt;[56].See supra n. 44.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="57"&gt;[57]. See G.S.R.240(E) New Delhi, the 25th March, 2003 available at &amp;lt; http://www.mit.gov.in/content/it-act-notification-no-240&amp;gt; .&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="58"&gt;[58].See Section 46(1A).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="59"&gt;[59].Schedule I, Part X of the Limitation Act “Suits for which there is no prescribed period.”&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="60"&gt;[60].The powers of the Cyber Appellate Tribunal under Section 58 include the powers of (a) summoning and enforcing the attendance of any person and examining him on oath; (b) requiring the discovery and production of documents or other electronic records; (c) receiving evidence on affidavits; (d) issuing commissions for the examination of witnesses or documents; (e) reviewing its decisions; (f) dismissing an application for default or deciding it ex parte.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="61"&gt;[61].Information Technology (Qualification and Experience of Adjudicating Officers and Manner of holding Enquiry) Rules, 2003 [GSR 220(E)] Available at &amp;lt;http://cca.gov.in/rw/resource/notification-gsr220e.pdf?download=true&amp;gt;.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="62"&gt;[62]. Ibid Rule 4(b).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="63"&gt;[63]. Section 75.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="64"&gt;[64]. Ibid, Rule 4(k).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="65"&gt;[65]. Section 63 of the Act.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="66"&gt;[66].Prior to amendment in 2008, contraventions listed in Section 43 were only liable to be compensated by damages through civil proceedings. Thus in 2007, the Madras High Court annulled an FIR lodged in a police station which listed an activity mentioned in 43(g). See S. Sekar vs The Principal General Manager &amp;lt; http://indiankanoon.org/doc/182565/&amp;gt; This position has however been changed with the new Section 66 which makes all actions listed in Section 43 an offence when committed with dishonest or fraudulent intent. Thus an FIR can be lodged with respect to these activities as well.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="67"&gt;[67].An incomplete list of cyber crime cells of police in different states can be viewed at &amp;lt;http://infosecawareness.in/cyber-crime-cells-in-india&amp;gt;.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="68"&gt;[68]. Home and Transport3 Secretariat, Notification no. HD 173 POP 99 Bangalore, Dated 13th September 2001 Available at &amp;lt; http://cyberpolicebangalore.nic.in/pdf/notification_1.pdf&amp;gt;.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="69"&gt;[69]. Sections 468 and 469 of the Code of Criminal Procedure, 1973.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="70"&gt;[70]. Section 77A of the Information Technology Act.&lt;/a&gt;&lt;/p&gt;
&lt;p class="callout"&gt;&lt;span class="Apple-style-span"&gt;Click below to download files of your choice:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class="Apple-style-span"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-it-act.pdf" class="internal-link" title="Privacy IT Act"&gt;PDF &lt;/a&gt; [347 kb]&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-it-act.odt" class="internal-link" title="Privacy and IT Act (ODT)"&gt;Open Office&lt;/a&gt; [51 kb]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-it-act.docx" class="internal-link" title="Privacy Act and IT"&gt;Word File&lt;/a&gt; [55 kb]&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy'&gt;https://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Prashant Iyengar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-14T10:29:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rti-response-dit-blocking">
    <title>DIT's Response to RTI on Website Blocking</title>
    <link>https://cis-india.org/internet-governance/blog/rti-response-dit-blocking</link>
    <description>
        &lt;b&gt;For the first time in India, we have a list of websites that are blocked by order of the Indian government.  This data was received from the Department of Information Technology in response to an RTI that CIS filed.  Pranesh Prakash of CIS analyzes the implications of these blocks, as well as the shortcomings of the DIT's response.&lt;/b&gt;
        
&lt;h2&gt;Quick Analysis of DIT's Response to the RTI&lt;br /&gt;&lt;/h2&gt;
&lt;h3&gt;Blocked websites&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;The eleven websites that the DIT acknowledges are blocked in India are:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.zone-h.org"&gt;http://www.zone-h.org&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://donotdial100.webs.com"&gt;http://donotdial100.webs.com&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.bloggernews.net/124029"&gt;http://www.bloggernews.net/124029&lt;/a&gt; [&lt;strong&gt;accessible from Tata DSL, but not from others like Reliance Broadband and BSNL Broadband&lt;/strong&gt;]&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.google.co.in/#h1=en&amp;amp;source=hp&amp;amp;biw=1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=g10&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp;gs_rfai=&amp;amp;fp=e791fe993fa412ba"&gt;http://www.google.co.in/#h1=en&amp;amp;source=hp&amp;amp;biw=1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=g10&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp;gs_rfai=&amp;amp;fp=e791fe993fa412ba&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.cinemahd.net/desktop-enhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html"&gt;http://www.cinemahd.net/desktop-enhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.chakpak.com/find/images/kamasutra-hindi-movie"&gt;http://www.chakpak.com/find/images/kamasutra-hindi-movie&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html"&gt;http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html"&gt;http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.facebook.com/pages/l-Hate-Ambedkar/172025102828076"&gt;http://www.facebook.com/pages/l-Hate-Ambedkar/172025102828076&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.indybay.org"&gt;http://www.indybay.org&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://arizona.indymedia.org"&gt;http://arizona.indymedia.org&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Of the eleven blocked websites, one was still accessible on a Tata Communications DSL connection.&amp;nbsp; Two of the blocked websites are grassroots news organizations connected to the Independent Media Centre: IndyBay (San Francisco Bay Area IMC) and the Arizona Indymedia website.&amp;nbsp; The Bloggernews.net page that is on the blocked list is in fact an article by N. Vijayashankar (Naavi) from March 12, 2010 titled "Is E2 labs right in getting zone-h.org blocked?", criticising the judicial blocking of Zone-H.org by E2 Labs (with E2 Labs being represented by lawyer Pawan Duggal).&amp;nbsp; The Zone-H.org case is still going through the judicial motions in the District Court of Delhi, but E2 Labs managed to&amp;nbsp; get an &lt;a class="external-link" href="http://www.naavi.org/cl_editorial_10/e2labs_zoneh_org.pdf"&gt;&lt;em&gt;ex parte&lt;/em&gt; (i.e., without Zone-H being heard) interim order from the judge&lt;/a&gt; asking Designated Officer (Mr. Gulshan Rai of DIT) to block access to Zone-H.org.&lt;/p&gt;
&lt;p&gt;As has happened in the past, the government (or the court) &lt;a class="external-link" href="http://support.webs.com/webs/topics/india_problems_seeing_your_site_read_this_first"&gt;accidentally ordered the blocking of all of website host webs.com&lt;/a&gt;, instead of blocking only http://donotdial100.webs.com (which subdomain apparently hosted &lt;a class="external-link" href="http://www.dnaindia.com/mumbai/report_police-still-to-shut-down-fake-account-maligning-force_1419951"&gt;'defamatory' and 'abusive' information about mafia links within the Maharashtra police and political circles&lt;/a&gt;).&lt;/p&gt;
&lt;p&gt;It is interesting to note that for most of the websites on most ISPs one gets a 'request timed out' error 
while trying to access the blocked websites, and not a sign saying: 
"site blocked for XYZ reason on request dated DD-MM-YYYY received from the DIT".&amp;nbsp; On Reliance broadband connections, for some of the above websites an error message appears, which states: "This site has been blocked as per instructions from Department of Telecom".&lt;/p&gt;
&lt;h3&gt;Judicial blocking&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;As per the response of the government, all eleven seem to have been blocked on orders received from the judiciary.&amp;nbsp; While they don't state this directly, this is the conclusion one is led to since the Department admits to blocking eleven websites and also notes that there have been eleven requests for blocking from the judiciary.&amp;nbsp; Normally the judiciary is often thought of as a check on the executive's penchant for banning (seen especially in the recent book banning cases in Maharashtra, for instance, where the Bombay High Court has overturned most of the government's banning orders).&amp;nbsp; However, in these cases the ill-informed lower judiciary seem to be manipulated by lawyers to suppress freedom of speech and expression, even going to the extent of blocking grassroots activist news organizations like the Independent Media Centre.&lt;/p&gt;
&lt;h3&gt;Websites not blocked by DIT&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;The DIT also notes that the blocks on Typepad.com was not authorized by it (nor, according to the RTI response received by Nikhil Pahwa of Medianama was the &lt;a class="external-link" href="http://www.medianama.com/2011/04/223-indiablocks-indias-it-depts-response-to-our-rti-request-our-stand/"&gt;Mobango.com block authorised by the DIT&lt;/a&gt;).&amp;nbsp; Typepad.com, Mobango.com, and Clickatell.com don't seem to be blocked currently.&amp;nbsp; However, &lt;a class="external-link" href="http://www.medianama.com/2011/03/223-indian-government-blocks-typepad-mobango-clickatell/"&gt;as was reported by Medianama&lt;/a&gt;, for a while when they were being blocked, some sites and ISPs (such as Typepad.com on Bharti Airtel DSL) showed a message stating that the website was blocked on request from the Department of Telecom, which we don't believe has the authority to order blocking of websites.&amp;nbsp; While we still await a response from the Department of Telecom to the RTI we filed with them on this topic, in a letter to the Hindu, &lt;a class="external-link" href="http://www.thehindu.com/news/national/article1574444.ece"&gt;the Department of Telecom has clarified&lt;/a&gt; that it did not order any block on Typepad.com or any of the other websites.&amp;nbsp; This leaves us unsure as to who ordered these blocks.&amp;nbsp; Further, it points out a lacuna in our information policy that ISPs can &lt;em&gt;suo motu&lt;/em&gt; block websites without justifications (such as violation of terms of use), proper notice to customers, or any kind of repercussions for wrongful blocking.&lt;/p&gt;
&lt;h3&gt;Insufficient information on Committee for Examination of Requests&lt;/h3&gt;
&lt;p&gt;All requests for websites blocking (except those directly from the judiciary) must be vetted by the Committee for Examination of Requests (CER) under Rule 8(4) of the Rules under s.69A of the IT Act.&amp;nbsp; Given that the DIT admits that the Designated Officer (who carries out the blocking) has received 21 requests to date, there should be at least 21 recommendations of the CER.&amp;nbsp; However, the DIT has not provided us with the details of those 21 requests and the 21 recommendations.&amp;nbsp; We are filing another RTI to uncover this information.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Text of the DIT's Response&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Government of India &lt;br /&gt;Ministry of Communications &amp;amp; Information Technology &lt;br /&gt;Department of Information Technology &lt;br /&gt;Electronics Niketan, 6 CGO Complex, &lt;br /&gt;New Delhi-110003&lt;br /&gt;&amp;nbsp;&lt;br /&gt;No : 14(3)/2011-ESD&lt;br /&gt;&lt;br /&gt;Shri Pranesh Prakash &lt;br /&gt;Centre for Internet and Society &lt;br /&gt;194, 2-C Cross, &lt;br /&gt;Domulur Stage II, &lt;br /&gt;Bangalore- 560071.&lt;br /&gt;&lt;br /&gt;Subject: Request for information under RTI Act,&lt;br /&gt;&lt;br /&gt;Sir,&lt;br /&gt;Reference your request dated 28lh February 2011 on the above subject.&lt;br /&gt;The point wise information as received from the custodian of Information is enclosed for your reference and records.&lt;br /&gt;&lt;br /&gt;sd/-&lt;br /&gt;(A.K.Kaushik) &lt;br /&gt;Additional Director &amp;amp; CPIO &lt;br /&gt;Tel: 011-24364803&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Subject : RTI on website blocking requested by Shri Pranesh Prakash&lt;/p&gt;
&lt;blockquote&gt;(i) Did the Department order Airtel to block TypePad under S.69A of the Information Technology Act ("IT Act"), 2000 read with the Information Technology (Procedures and Safeguards for Blocking Access of Information by Public) Rules, 2009 ("Rules") or any other law for the time being in force? If so, please provide a copy of such order or orders. If not, what action, if at all, has been taken by the Department against Airtel for blocking of websites in contravention of S.69A of the IT Act?&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply &lt;/strong&gt;- This Department did not order Airtel to block the said site.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;blockquote&gt;(ii) Has the Department ever ordered a block under s.69A of the IT Act? If so, what was the information that was ordered to be blocked?&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The Department has issued directions for blocking under section 69A for the following websites:&lt;br /&gt;(a) www.zone-h.org.&lt;br /&gt;(b) http://donotdial100.webs.com (IP 216.52.115.50)&lt;br /&gt;(c) www.bloggernews.net/124029&lt;br /&gt;(d) http://www.google.co.in/#h 1 =en&amp;amp;source=hp&amp;amp; biw=1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+ wallpaper&amp;amp;aq=4&amp;amp;aqi=g10&amp;amp;aql =&amp;amp;oq=dr+ babas&amp;amp; gs_rfai=&amp;amp;fp=e791 fe993fa412ba&lt;br /&gt;(e) http://www.cinemahd.net/desktop-enhancements/wallpaper/23945- wallpapers-beautiful-girl-wallpaper.html&lt;br /&gt;(f) http://www.chakpak.com/find/images/ kamasutra-hindi-movie&lt;br /&gt;(g) http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged- to.html&lt;br /&gt;(h) http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta- wardrobe.html.&lt;br /&gt;(i) http://www.facebook.com/pages/l-Hate-Ambedkar/172025102828076&lt;br /&gt;(j) www.indybay.org&lt;br /&gt;(k) www.arizona.indymedia.org&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;blockquote&gt;(iii) How many requests for blocking of information has the Designated Officer received, and how many of those requests have been accepted and how many rejected? How many of those requests were for emergency blocking under Rule 9 of the Rules?&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Designated Officer received 21 request for blocking of information. 11 websites have been blocked on the basis of orders received from court of law. One request has been rejected. For other requests, additional input/information has been sought from the Nodal Officer.&lt;br /&gt;&lt;br /&gt;No request for emergency blocking under rule 9 of the Rules have been received.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;blockquote&gt;(iv) Please provide use the present composition of the Committee for Examination of Requests constituted under Rule 7 of the Rules.&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The present composition of the Committee is :&lt;br /&gt;(a) Designated Officer (Group Coordinator - Cyber Law)&lt;br /&gt;(b) Joint Secretary, Ministry of Home Affairs&lt;br /&gt;(c) Joint Secretary, Ministry of Information and Broadcasting&lt;br /&gt;(d) Additional Secretary and Ministry of Law &amp;amp; Justice&lt;br /&gt;(e) Senior Director, Indian Computer Emergency Response Team&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;blockquote&gt;(v) Please provide us the dates and copies of the minutes of all meetings held by the Committee for Examination of Requests under Rule 8(4) of the Rules, and copies of their recommendations.&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The Committee had met on 24-08-2010 with respect to request for blocking of website www.betfair.com.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;blockquote&gt;(vi) Please provide us the present composition of the Review Committee constituted under rule 419A of the Indian Telegraph Rules, 1951.&lt;br /&gt;(vii) Please provide us the dates and copies of the minutes of all meetings held by the Review Committee under Rule 14 of the Rules, and copies of all orders issued by the Review Committee.&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply&lt;/strong&gt; - This Department do not have details for above. The said information may be available with Department of Telecommunications.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rti-response-dit-blocking'&gt;https://cis-india.org/internet-governance/blog/rti-response-dit-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-08-02T07:13:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough">
    <title>Is Data Protection Enough? </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough</link>
    <description>
        &lt;b&gt;The following note looks briefly at different sides of the privacy debate, and asks the question whether a Data Protection law is enough privacy protection for India.&lt;/b&gt;
        
&lt;p&gt;In a recent article, Rahul Matthan explained how many threats to personal privacy come from a lack of data protection laws – particularly in the context of the UID – and he thus urges&amp;nbsp;India&amp;nbsp;to pass a law that is focused on data protection. He said, “We don’t question this lack of personal space.&amp;nbsp;&amp;nbsp;It is part of the compromise we make when we choose to live in&amp;nbsp;India.”&amp;nbsp;&amp;nbsp;Though his argument has a surface appeal, there are also many cases emerging in the news today that suggest that&amp;nbsp;India&amp;nbsp;is concerned with a much broader scope of privacy than just data protection. In the DNA, a news article covered a recent court decision that concluded that watching pornography at home is not an obscenity and does not qualify as a public exhibition, even when there are visitors to the home. In that case, police arrested persons who hosted a party under section 292 (obscenity) of the Indian Penal Code for watching pornography and housing strippers. The judge ruled that the activities that were taking place were done in private and thus did not amount to an offense under section 292. This is an important decision about the protections of spatial privacy being afforded to individuals. The bungalow was considered a private space, and the computer a private possession. In other words,&amp;nbsp;India&amp;nbsp;does have a greater understanding of privacy and the need for its protection, and it extends beyond data protection. In another news item, the Hindu reported that 5,000 to 6,000 phones are tapped on average daily. The article speculated that this number could increase in response to the 2G scam and other scams that are coming out. The type of privacy violation that wiretapping poses is likewise not a question of data protection, but of how a nation guards against an unwanted invasion of personal space and when security takes precedence over privacy. Are Indian citizens willing to subject themselves to phone taps to try to eliminate – or at least minimize – the number of scams that are occurring?&amp;nbsp;&amp;nbsp;In yet another news item, it was reported that in the North, councils are attempting to ban the sale of cell phones to unmarried women to help prevent unsolicited affairs with members from different castes. This again raises questions not of data protection or informational privacy, but of personal privacy. How will phone companies know that a woman is married? Will parents suddenly begin regulating their daughters’ phones? Does an existing legislation afford protection to women in this situation? Though data protection is a component of&amp;nbsp;&amp;nbsp;privacy, it is only one component. There are many definitions of privacy, and privacy in itself is somewhat of a difficult word to define, but&amp;nbsp;India&amp;nbsp;should recognize that there are privacy protections and privacy debates that extend beyond data protection.&amp;nbsp;&amp;nbsp;It is too easy to characterize&amp;nbsp;India&amp;nbsp;as large and communal and overlook these important questions.&lt;/p&gt;
&lt;p&gt;Returning to Rahul Matthan’s article,&amp;nbsp; Matthan says, “The vast majority of our country that remains under-served by the government will gladly exchange personal privacy for better public service.”&amp;nbsp;&amp;nbsp;I was particularly intrigued by this statement, because it suggests that privacy is an expendable right, and that government service cannot improve without privacy compromises. The logical extension of this concept is that privacy is not a fundamental right but only a consumer issue, and that policymakers can always trade off privacy in exchange for better public benefits, for better security, and for cheaper products. A legal system needs to address the case at hand, but it needs to be mindful of the larger consequences as well. There is no doubt that the UID project demands a data protection law, but India is facing questions of privacy that extend beyond data protection, and the steps that are being taken to answer those questions need to be applauded and brought into the current debate.&amp;nbsp;&amp;nbsp;If we legislate away rights, we must do so by weighing the cost and finding it acceptable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.thehindu.com/news/national/article905944.ece"&gt;http://www.thehindu.com/news/national/article905944.ece&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://is.gd/hJWD8 http://is.gd/hJWSX"&gt;http://is.gd/hJWD8 http://is.gd/hJWSX&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://news.yahoo.com/s/afp//lifestyleindiatelecommarriage"&gt;http://news.yahoo.com/s/afp//lifestyleindiatelecommarriage&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Matthan, Rahul. The Mint:Technology. Nov. 24 2010&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough'&gt;https://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:28:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies">
    <title>Surveillance Technologies </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies</link>
    <description>
        &lt;b&gt;The following post briefly looks at different surveillance technologies, and the growing use of the them in India. &lt;/b&gt;
        
&lt;h3&gt;Surveillance...&lt;/h3&gt;
&lt;p&gt;New security technologies are constantly emerging that push the edge between privacy and a reasonable level of security. Society's tolerance level is constantly being tested by governments who use surveillance and monitoring technologies to protect the nation. Governments claim that they need absolute access to citizens life. They need to monitor phones, look through emails, peer into files – in-order to maintain security and protect against terrorism. Though as a side note, in an Economic Times article published on Nov. 4&amp;nbsp;2010 it was reported that government computers were being hacked into through viruses, and top secret documents were being stolen. The irony of the story is that the viruses were introduced to the computers through porn websites visited by officials.&lt;/p&gt;
&lt;h3&gt;...In a Car? On the Street? In an Airport?&lt;/h3&gt;
&lt;p&gt;Despite the fact that governmental monitoring might make the common man uncomfortable, the reality is that governments will always win the national security vs privacy fight. The story becomes more complicated when it moves from the government directly monitoring individuals, to security agencies monitoring individuals. For instance the use of full body scanners at airports, or trucks equipped with scatter x-ray machines used to control crime in neighborhoods - is a much more heated debate. There are other ways in which to check passengers for banned items, and other ways to keep crime off the streets without mandating that individuals submit themselves to invasive scans, or scanning unaware individuals.&lt;/p&gt;
&lt;h3&gt;...In the Movie Theater????..for Marketing Purposes????&lt;/h3&gt;
&lt;p&gt;Surveillance technology has now been taken even another step further. No longer is it being just used to prevent violent crimes or terrorist attacks. Today the movie industry is using controversial anti-piracy tools to protect the films they produce. For instance the security company Aralia Systems manufacturers products such as: CCTV cameras and anti-camcorder systems that shine infrared light beams on audiences as they watch a movie. The light beams reflect off camcorders and alerts the theater that there are camcorders present. Though this practice can be seen as invasive - individuals might be opposed to being probed by light beams throughout movies, the extent of potential privacy invasion does not stop there. Aralia Systems has partnered with Machine Vision Lab and has created a system that harvests audiences emotions and movements as they watch movies. The data can then be used by market researchers to better tailor their behavioral advertising schemes. Essentially movie theater monitoring has merged surveillance technologies with behavioral marketing technologies in a twisted invasion of movie watchers personal privacy.&lt;/p&gt;
&lt;h3&gt;Is this technology in India?&lt;/h3&gt;
&lt;p&gt;Though behavioral monitoring and piracy technologies such as ones produced by Aralia Systems are not yet used in Indian movie theaters – security measures against piracy are used. Movie theaters across India are equipped with metal detectors at the door, and security personel check your handbag or back pack for camcorders. According to a Indian Express article, the organization Allegiance Against Copyright Theft believes one of the reasons monitoring technology is not yet used in theaters is because there is no present Indian legislation that penalizes recording in halls. Once legislation is passed, they speculate there will be a push to use these technologies. Even though monitoring technology is not yet used in theaters, monitoring of consumers behavior is increasing. Recently in India the WPP owned research agency IMRB International has developed an online audience measurement system that uses tailored metering technology to track the sites that users visit. The Web Audience Measurement System has launched this technology in a sample size of 21,000 Indian households, covering 90,000 individuals. IMRB has said that the meters are capable of capturing usage data from multiple computers, and that they can then use the information to market to the individual. Does it seem ironic to anyone that companies now charge for a service – movie tickets, internet services, telephone services – and make an extra profit by data mining at the expense of a persons privacy?&lt;/p&gt;
&lt;h3&gt;Sources&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;http://economictimes.indiatimes.com/news/politics/nation/Govt-depts-asked-not-to-store-sensitive-info-on-Net-connected-computers/articleshow/6874631.cms&lt;/li&gt;&lt;li&gt;http://www.research-live.com/news/technology/imrb-unveils-web-measurement-service-for-indian-market/4003941.article&lt;/li&gt;&lt;li&gt;http://blogs.computerworld.com/17276/anti_piracy_tool_will_harvest_market_your_emotions?source=rss_blogs&lt;/li&gt;&lt;li&gt;&amp;nbsp;http://www.indianexpress.com/news/antipiracy-unit-joins-hands-with-cinema-halls-to-curb-camcording/695439/2&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies'&gt;https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:40:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/privacy-by-design">
    <title>Privacy, By Design</title>
    <link>https://cis-india.org/events/privacy-by-design</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society invites people and organizations in the business of 'privacy online' to engage with it in Privacy, By Design — an open space discussion that brings together coders, developers, users and entrepreneurs interested in the design of privacy online.   &lt;/b&gt;
        
&lt;p&gt;&lt;img class="image-left" src="../advocacy/igov/it-act/PrivacybyDesignPoster.jpg/image_preview" alt="Privacy by Design " height="266" width="344" /&gt;Is Privacy something we are born with or is it constructed for us? Different actors like governments, markets, cultural negotiators, are often attributed the responsibility of defining what it means to be 'private'.&amp;nbsp; In our rapidly digitizing world, Internet and digital technologies have emerged as new factors that influence the design of privacy. Ranging from social networking systems to e-governance projects and economic transactions to interpersonal relationships, the design of privacy online has become a central concern.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Privacy, By Design&lt;/em&gt; is a part of The Identity Project (TIP), a collaboration between the Centre for Internet and Society and the Centre for the Study of Culture and Society. It is a research inquiry that hopes to consolidate multiple perspectives, and ideas in an attempt to initiate a dialogue between people who are in the business of designing platforms and applications that pivot around privacy. For instance: How do the platforms we use define our understanding of privacy? What does privacy in the cloud look like? What are the parameters by which privacy is defined within the digital world? What role do digital technologies play in producing the 'privacy effect?'&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/privacy-by-design'&gt;https://cis-india.org/events/privacy-by-design&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-12T06:45:36Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/march%20-2011-bulletin">
    <title>March 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/march%20-2011-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage.&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research knowledge base, the RAW programme has been collaborating with different organisations and individuals to focus on its three year thematic of Histories of the Internets in India. Monographs finalised from these projects are online for peer review.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New Blog Entry by Zainab Bawa in Transparency and Politics&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/cis-raw/histories/transparency/transparency-politics-it-in-india" target="_blank"&gt;A History of      Transparency, Politics and Information Technologies in India&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives with a Cause?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a knowledge programme initiated by CIS and Hivos, Netherlands. It is a research inquiry that seeks to look at the changing landscape of social change and political participation and the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who want to critically engage with the dominant discourse on youth, technology and social change, in order to look at the alternative practices and ideas in the Global South. It also aims at building new ecologies that amplify and augment the interventions and actions of the digitally young as they shape our futures.&lt;/p&gt;
&lt;h3&gt;Column on Digital Natives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A fortnightly column on ‘Digital Natives’ authored by Nishant Shah is featured in the Sunday Eye, the national edition of Indian Express, Delhi, from 19 September 2010 onwards. The following was published recently:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/dn/watson-knows" target="_blank"&gt;Watson knows the Question&lt;/a&gt; [Indian Express, March 6, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entries by Maesey Angelina&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Maesey Angelina works as a programme officer at Hivos, Jakarta on gender, women and development while exploring research initiatives on Digital Natives in Indonesia. She spent one month in CIS, working on her dissertation, exploring the Blank Noise project under the Digital Natives with a Cause framework.  She writes a series of blog entries. The new ones are:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/dn/reflecting-from-the-beyond" target="_blank"&gt;Reflecting      from the Beyond&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/dn/activism-unraveling-the-term" target="_blank"&gt;Activism:      Unraveling the Term&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/dn/the-many-faces-within" target="_blank"&gt;The Many      Faces Within&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entries by Samuel Tettner&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Samuel Tettner is a Digital Natives Coordinator in CIS. He has written the following blog entries:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/dn/i-believe-that-______-should-be-a-right-in-the-digital-age" target="_blank"&gt;I Believe      that .......... should be a Right in the Digital Age&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/dn/science-technology-and-society-conference-in-indore-march-12-13" target="_blank"&gt;Science,      Technology and Society International Conference – Some Afterthoughts&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;Featured Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/accessibility/blog/accessible-mobile-handsets" target="_blank"&gt;Accessible      Mobile Handsets in India: An Overview&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/accessibility/blog/rights-of-persons-with-disabilities" target="_blank"&gt;Note on the      Authorities under the Working Draft of Persons with Disabilities Act, 2011      (9th February 2011)&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS believes that access to knowledge and culture is essential as it promotes creativity and innovation and bridges the gaps between the developed and developing world positively. Hence, the campaigns for an international treaty on copyright exceptions for print-impaired, advocating against PUPFIP Bill, calls for the WIPO Broadcast Treaty to be restricted to broadcast, questioning the demonization of 'pirates', and supporting endeavours that explore and question the current copyright regime. Its latest endeavour has resulted into these:&lt;/p&gt;
&lt;h3&gt;Featured Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/ipr/blog/plagiarism-in-indian-academia" target="_blank"&gt;Pirates,      Plagiarisers, Publishers&lt;/a&gt; [ Written by Prashant Iyengar and      originally published in the Economic &amp;amp; Political Weekly, February 26,      2011, Vol XLVI No 9]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submission&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/ipr/blog/wipo-broadcast-treaty-comments-march-2011" target="_blank"&gt;Comments to      the Ministry on WIPO Broadcast Treaty&lt;/a&gt; (March 2011)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;h3&gt;Workshops organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/design-public" target="_blank"&gt;Design!publiC&lt;/a&gt; [Taj      Vivanta, New Delhi, March 18, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/open-access" target="_blank"&gt;Open Access to Scientific      Information Indian International Centre&lt;/a&gt; [New Delhi, March      16, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Although there may not be one centralized authority that rules the Internet, the Internet does not just run by its own volition: for it to operate in a stable and reliable manner, there needs to be in place infrastructure, a functional domain name system, ways to curtail cyber crime across borders, etc. The Tunis Agenda of the second World Summit on the Information Society (WSIS), paragraph 34 defined Internet governance as “the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.”  CIS involvement in the field of Internet governance has taken the following shape:&lt;/p&gt;
&lt;h3&gt;Submissions&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/accessibility/blog/electronic-delivery-of-services-comments" target="_blank"&gt;The Draft      Electronic Delivery of Services Bill, 2011 – Comments by CIS&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/policy-for-governments-presence-in-social-media-recommendations" target="_blank"&gt;Policy for      Government's Presence in Social Media - Recommendations&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/rtis-on-website-blocking" target="_blank"&gt;RTI      Applications on Blocking of Websites&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing a project, ‘Privacy in Asia’. &lt;i&gt;It is funded by Privacy International (PI), UK and the International Development Research Centre, Canada and is being administered in collaboration with the Society and Action Group, Gurgaon&lt;/i&gt;. The two-year project commenced on 24 March 2010 and will be completed as agreed to by the stakeholders. It was set up with the objective of raising awareness, sparking civil action and promoting democratic dialogue around challenges and violations of privacy in India. In furtherance of these goals it aims to draft and promote over-arching privacy legislation in India by drawing upon legal and academic resources and consultations with the public.&lt;/p&gt;
&lt;h3&gt;Submission&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/privacy_govdatabase" target="_blank"&gt;Privacy and      Governmental Database&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Workshops organized&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/privacy-matters-ahmedabad" target="_blank"&gt;Privacy      Matters - A Public Conference in Ahmedabad&lt;/a&gt; [Ahmedabad,      March 26, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/ian" target="_blank"&gt;Public Talk by Dr. Ian Brown on      Privacy, Trust and Biometrics&lt;/a&gt; [Centre for Contemporary      Studies, IISc, Bangalore, March 21, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/electronication" target="_blank"&gt;Electronication:      Ragas and the Future&lt;/a&gt; [Jaaga, Bangalore, March 6, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/fostering-freedom-of-expression" target="_blank"&gt;Role of the      Internet in Fostering Freedom of Expression and Strengthening Activism in      India - A Workshop in Delhi&lt;/a&gt; [Constitution Club, New Delhi,      March 4, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/global-freedom-expression" target="_blank"&gt;Global      Challenges to Freedom of Expression&lt;/a&gt; [Constitution Club,      New Delhi, March 4, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers. CIS campaigns to facilitate this:&lt;/p&gt;
&lt;h3&gt;Featured Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/telecom/blog/untapped-potential" target="_blank"&gt;India's      untapped potential: Are a billion people losing out because of spectrum?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Column&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website as well.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/telecom/blog/big-bang-budgets" target="_blank"&gt;Big-Bang Budgets?&lt;/a&gt; [published in the Business Standard on March 3, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Forthcoming Events&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is organising some conferences/workshops in the month of March/April:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/w3c-conference-hyderabad" target="_blank"&gt;Web Sites      Accessibility Evaluation Methodologies: A New Imperative for State Parties      to the Convention on the Rights of Persons with Disabilities&lt;/a&gt;[Hyderabad      International Convention Centre, Hyderabad]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/shadow-search-in-cis" target="_blank"&gt;Shadow      Search Project (SSP) in CIS&lt;/a&gt; [CIS, Bangalore]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/facebook-resistance" target="_blank"&gt;Facebook      Resistance Workshop&lt;/a&gt; [CIS, Bangalore]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/networking-better-governance" target="_blank"&gt;Networking its way to better governance&lt;/a&gt; (Hindu, March 28, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/failed-uk-nir-project" target="_blank"&gt;‘Learn from failed UK NIR project’&lt;/a&gt; (Deccan Chronicle, March 22, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/design-public-livemint-coverage" target="_blank"&gt;Design!publiC - News from Livemint&lt;/a&gt; (Livemint, March 18, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/muzzling-internet" target="_blank"&gt;Muzzling the Internet&lt;/a&gt; (Outlook, March 17, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/battle-internet" target="_blank"&gt;Battle for the Internet&lt;/a&gt; (Down to Earth, Issue: March 15, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/cause-and-effect" target="_blank"&gt;Cause and effect Facebook-style&lt;/a&gt; (Hindustan Times, March 13, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/catch-all" target="_blank"&gt;Catch-all approach to Net freedom draws activist ire&lt;/a&gt; (Sunday Guardian, March 13, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/suspended-in-web" target="_blank"&gt;Lives suspended in the Web&lt;/a&gt; (Indian Express, March 11, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/it-guidelines-gag-internet-freedom" target="_blank"&gt;Draft IT guidelines may gag internet freedom&lt;/a&gt; (Times of India, March 11, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/govt-proposal" target="_blank"&gt;Govt proposal to muzzle bloggers sparks outcry&lt;/a&gt; (Times of India, March 10, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/online-censorship" target="_blank"&gt;New Indian Rules May Make Online Censorship Easier&lt;/a&gt; (Yahoo News, March 7, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/anti-social-network" target="_blank"&gt;Anti-Social Network&lt;/a&gt; (Mail Today, February 27, 2011)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Follow us elsewhere&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Get short, timely messages from us on &lt;a href="http://twitter.com/cis_india" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Follow CIS on &lt;a href="http://identi.ca/main/remote?nickname=cis" target="_blank"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Join the CIS group on &lt;a href="http://www.facebook.com/group.php?gid=28535315687" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Visit us at &lt;a href="http://www.cis-india.org/" target="_blank"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/march%20-2011-bulletin'&gt;https://cis-india.org/about/newsletters/march%20-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-30T10:59:46Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
