<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 416 to 430.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-november-28-2018-kul-bhushan-amazon-launches-machine-learning-based-platform-for-healthcare-space"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/icann-work-stream-2-recommendations-on-accountability"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/speculative-futures-lab-on-artificial-intelligence-in-media-entertainment-and-gaming"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/workshop-on-cybersecurity-illustrations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-31-on-icanns-fellowship-program"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/roundtable-on-intermediary-liability-and-gender-based-violence-at-the-digital-citizen-summit-2018"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/human-rights-review-of-the-verification-code-extension-for-epp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/connections-2018"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindu-businessline-arindrajit-basu-october-30-2018-lessons-from-us-response-to-cyber-attacks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/october-2018-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-november-28-2018-kul-bhushan-amazon-launches-machine-learning-based-platform-for-healthcare-space">
    <title>Amazon launches Machine Learning-based platform for healthcare space</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-november-28-2018-kul-bhushan-amazon-launches-machine-learning-based-platform-for-healthcare-space</link>
    <description>
        &lt;b&gt;Amazon’s Comprehend Medical platform uses a new HIPAA-eligible machine learning service to process unstructured medical text and information such as dosages, symptoms and signs, and patient diagnosis.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kul Bhushan was published in the &lt;a class="external-link" href="https://www.hindustantimes.com/tech/nov-28-amazon-launches-machine-learning-driven-platform-for-healthcare-space/story-3EuXjDiVO8NLBxjOMKkopO.html"&gt;Hindustan Times&lt;/a&gt; on November 28, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;With an objective to push deeper into the health space, Amazon has introduced a new &lt;a href="https://www.hindustantimes.com/topic/machine-learning"&gt;Machine Learning&lt;/a&gt; (ML) software to analyse medical records for better treatments of patients and reduce overall expenditure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unveiled  at the company’s re:Invent cloud conference in Las Vegas, Amazon’s  Comprehend Medical platform uses a new “HIPAA-eligible machine learning  service that allows developers to process unstructured medical text and  identify information such as patient diagnosis, treatments, dosages,  symptoms and signs, and more.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Comprehend Medical helps health  care providers, insurers, researchers, and clinical trial investigators  as well as health care IT, biotech, and pharmaceutical companies to  improve clinical decision support, streamline revenue cycle and clinical  trials management, and better address data privacy and protected health  information (PHI) requirements,” explains the company on its &lt;a href="https://aws.amazon.com/blogs/machine-learning/introducing-medical-language-processing-with-amazon-comprehend-medical/" rel="nofollow"&gt;website&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amazon  aims to mitigate the time spent on manually analysing medical data of a  patient. The company hopes the software will ultimately empower users  to make a more informed decision about their health and even things like  scheduling care visits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Unlocking this information from medical language makes a variety of  common medical use cases easier and cost-effective, including: clinical  decision support (e.g., getting a historical snapshot of a patient’s  medical history), revenue cycle management (e.g., simplifying the  time-intensive manual process of data entry), clinical trial management  (e.g., by identifying and recruiting patients with certain attributes  into clinical trials), building population health platforms, and helping  address (PHI) requirements (e.g., for privacy and security  assurance.),” the company added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amazon also pointed out that some  of the medical institutes such as Seattle’s Fred Hutchinson Cancer  Research Center and Roche Diagnostics have already implemented the  software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amazon’s expansion into the healthcare space comes after it acquired  health-focused startup PillPack for $1 billion earlier this year. Apart  from Amazon, other technology companies like Apple and Microsoft are  investing into the healthcare space.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apple is already offering  HealthKit and CareKit platforms to develop apps focused on health. The  company earlier this year launched &lt;a href="https://www.hindustantimes.com/tech/apple-watch-series-4-launched-with-ecg-compatibility-new-design/story-2LqdNq7YjAXGU3HEH5om8N.html"&gt;Apple Watch Series 4 with ECG support&lt;/a&gt;.  Microsoft, however, has deeper footprints in the health segment. The  company is building a bunch of Artificial Intelligence-based tools for  healthcare.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, Microsoft’s Project InnerEye uses machine learning  technology to build tools for automatic, quantitative analysis of  three-dimensional radiological images.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to various  reports, Artificial Intelligence is going to make a big impact in the  healthcare industry. An Accenture report in 2017 &lt;a href="https://www.accenture.com/t20171215T032059Z__w__/us-en/_acnmedia/PDF-49/Accenture-Health-Artificial-Intelligence.pdf" rel="nofollow" target="_blank"&gt;predicted&lt;/a&gt; that the AI apps can create $150 billion in annual savings for the United States alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Back in India, the adoption of AI in healthcare is growing. According  to a report by the Centre for Internet and Society India, “the use of  AI in healthcare in India is increasing with new startups and large ICT  companies offering AI solutions for healthcare challenges in the  country.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bengalure-based startup mfine has developed an AI-based  healthcare platform which learns medical standards and protocols and  diagnosis and treatment methods to further help the doctors with  necessary data and analysis. The company earlier this year raised $4.2  million in funding.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-november-28-2018-kul-bhushan-amazon-launches-machine-learning-based-platform-for-healthcare-space'&gt;https://cis-india.org/internet-governance/news/hindustan-times-november-28-2018-kul-bhushan-amazon-launches-machine-learning-based-platform-for-healthcare-space&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2018-12-03T00:23:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/icann-work-stream-2-recommendations-on-accountability">
    <title>ICANN Workstream 2 Recommendations on Accountability</title>
    <link>https://cis-india.org/internet-governance/blog/icann-work-stream-2-recommendations-on-accountability</link>
    <description>
        &lt;b&gt;One of the most significant initiatives to improve the accountability of the Internet Corporation of Assigned Names and Numbers (ICANN) commenced in 2014, when the Cross Community Working Group on Accountability was created. Its role was to develop a set of proposed enhancements to ICANN’s accountability to the global Internet community. This resulted in the first Work Stream (WS1) recommendations, which were eventually approved and incorporated into the bylaws of ICANN in 2016. These included a provision expressing the need for a second WS since the first one, done on a tight deadline,did not cover all the requisite issues. Instead WS1 only focused on issues that were needed to complete the Internet Assigned Numbers Authority(IANA) transition. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;At the ICANN meeting in March of 2017 in Finland, the second Work Stream (WS2) was launched. The Cross Community Working Group submitted their final report at the end of June 2018 and the purpose of this blog is to look at the main recommendations given and the steps ahead to its implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The new Workstream was structured into the following 8 independent sub groups as per the topics laid down in the WS1 final report, each headed by a Rapporteur:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Diversity&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.  Guidelines for Standards of Conduct Presumed to be in Good Faith Associated   with Exercising Removal of Individual ICANN Board  Directors. (Guidelines for Good Faith)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Human Rights Framework of Interpretation (HR-FOI)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Jurisdiction&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Office of the Ombuds&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Supporting Organization/ Advisory Committee Accountability&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Staff Accountability&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. ICANN Transparency&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt;&lt;b&gt;&lt;span&gt;DIVERSITY Recommendations &lt;/span&gt;&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The sub-group on Diversity suggested ways by which ICANN can define, measure, report, support and promote diversity. They proposed  7 key factors to guide all diversity considerations: Language, Gender, Age, Physical Disability, Diverse skills, Geographical representation and stakeholder group. Each charting organization within ICANN is asked to undertake an exercise whereby they publish their diversity obligations on their website, for each level of employment including leadership either under their own charter or ICANN Bylaws. This should be followed by a diversity assessment of their existing structures and consequently used to formulate their diversity objectives/criteria and steps on how to achieve the same along with the timeline to do so. These diversity assessments should be conducted annually and at the very least, every 3 years.  ICANN staff has been tasked with developing a mechanism for dealing with complaints arising out of diversity and related issues. Eventually, it is envisioned that ICANN will create a Diversity section on their website where an Annual Diversity Report will be published. All information regarding Diversity should also be published in their Annual Report.&lt;/p&gt;
&lt;p&gt;The recommendations leave much upto the organization without establishing specific recruitment policies for equal opportunities. In their 7 parameters, race was left out as a criteria for diversity. The criteria of ‘diverse skills’ is also ambiguous; and within stakeholder group, it would have been more useful to highlight the priority for diversity of opinions within the same stakeholder group. So for example, to have two civil society organizations (CSOs) advocating for contrasting stances as opposed to having many CSO’s supporting one stance. However, these steps should be a good starting point to improve the diversity of an organization which in our earlier research we have found to be &lt;a href="https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder"&gt;neither global nor multistakeholder&lt;/a&gt;. In fact, our &lt;a href="https://cis-india.org/internet-governance/blog/icann-diversity-analysis"&gt;recent diversity analysis &lt;/a&gt;has shown concerns such as the vast number of the end users participating and as an extension, influencing ICANN work are male. The mailing list where the majority of discussions take place are dominated by individuals from industry bodies. This coupled with the relative minority presence of the other stakeholders, especially geographically (14.7% participation from Asian countries), creates an environment where concerns emanating from other sections of the society could be overshadowed. Moreover, when we have questioned ICANN’s existing diversity of employees based on their race and citizenship, they &lt;a href="https://cis-india.org/internet-governance/blog/didp-31-diversity-of-employees-at-icann"&gt;did not give us&lt;/a&gt; the figures citing either lack of information or confidentiality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt;&lt;b&gt;&lt;span&gt;HUMAN RIGHTS FRAMEWORK OF INTERPRETATION (HR-FOI)&lt;/span&gt;&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A Framework of Interpretation was developed by the WS2 for ICANN Bylaws relating to Human Rights which clarified that Human Rights are not a Commitment for the organization but is a Core Value. The former being an obligation while the latter are &lt;i&gt;“&lt;span&gt;not necessarily intended to apply consistently and comprehensively to ICANN’s activities&lt;/span&gt;&lt;/i&gt;&lt;span&gt;”.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To summarize the FOI, if the applicable law i.e. the law practiced in the jurisdiction where ICANN is operating, does not mandate certain human rights then they do not raise issues under the core value.  As such, there can be no enforcement of human rights obligations by ICANN or any other party against any other party. Thus, contingent on the seat of the operations the law can vary though by in large ICANN recognizes and can be guided by significant internationally respected human rights such as those enumerated in the Universal Declaration of Human Rights. The United Nations Guiding Principles for Business and Human Rights was recognized as useful in the process of applying the core value in operations since it discusses corporate responsibility to respect human rights. Building on this, Human Right Impact Assessments (HRIA) with respect to ICANN policy development processes are currently being formulated by the Cross Community Working Group on Human Rights. Complementing this, ICANN is also undertaking an internal HRIA of the organization’s operations. It is important to remember that the international human rights instruments that are relevant here are those required by the applicable law.&lt;/p&gt;
&lt;p&gt;Apart from its legal responsibility to uphold the HR laws of an area, the framework is worded negatively in that it says ICANN should in general avoid violating human rights. It is also said that they should take into account HR when making policies but these fall short from saying that HR considerations should be given prominent weightage and since there are many core values, at any point one of the others can be used to sidestep human rights. One core value in particular says that ICANN should duly consider the public policy advice of governments and other authorities when arriving at a decision. Thus, if governments want to promote a decision to further national interests at the expense of citizen’s human rights then that would be very much possible within this FOI.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3. &lt;/b&gt;&lt;b&gt;&lt;span&gt;JURISDICTION&lt;/span&gt;&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;A highly contentious issue in WS2 was that of Jurisdiction, and the recommendations formed to tackle it were quite disappointing. Despite initial discussion by the group on ICANN’s location, they did not address the elephant in the room in their report. Even after the transition, ICANN’s new by-laws state that it is subject to California Law since it was incorporated there. This is partly the fault of the first Workstream because when enumerating the issues for WS2 with respect to jurisdiction, they left it ambiguous by stating: :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;“At this point in the CCWG Accountability’s work, the main issues that need within Work Stream 2 relate to the influence that ICANN ́s existing jurisdiction may have on the actual operation of policies and accountability mechanisms. This refers primarily to the process for the settlement of disputes within ICANN, involving the choice of jurisdiction and of the applicable laws, &lt;b&gt;&lt;span&gt;but not necessarily the location where ICANN is incorporated.”&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jurisdiction can often play a significant role in the laws that ICANN will have to abide by in terms of financial reporting, consumer protection, competition and labour laws, legal challenges to ICANN’s actions and finally, in resolving contractual disputes. In its present state, the operations of ICANN could, if such a situation arises, see interference from US authorities by way of legislature, tribunals, enforcement agencies and regulatory bodies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS has, in the past, discussed the concept of “&lt;a href="https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann"&gt;jurisdictional resilience”&lt;/a&gt;, which calls for:&lt;/p&gt;
&lt;ul type="disc"&gt;
&lt;li&gt;Legal      immunity for core technical operators of Internet functions (as opposed to      policymaking venues) from legal sanctions or orders from the state in      which they are legally situated.&lt;/li&gt;
&lt;li&gt;Division      of core Internet operators among multiple jurisdictions&lt;/li&gt;
&lt;li&gt;Jurisdictional      division of policymaking functions from technical implementation functions&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Proposing to change ICANN’s seat of headquarters or at the very least, suggest ways for ICANN to gain partial immunity for its policy development processes under the US law would have gone a long way in making ICANN truly a global body. It would have also ensured that as an organization, ICANN would have been equally accountable to all its stakeholders as opposed to now, where by virtue of its incorporation, it has higher legal and possible political, obligations to the United States. This was (initially?) expressed by Brazil who dissented from the majority conclusions of the sub-group and drafted their own minority report, which was supported by countries like Russia.  They were unhappy that all countries are still not at an equal footing in the participation of management of Internet resources, which goes against the fundamentals of the multi-stakeholder system approach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recommendations:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The recommendations passed were in two categories:&lt;/p&gt;
&lt;ol type="1"&gt;
&lt;li style="text-align: justify; "&gt;Office of Foreign Asset Control (OFAC)&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;OFAC is an office of the US Treasury administering and enforcing economic and trade sanctions based on the American foreign policy and national security objectives. It is pertinent because, for ICANN to enter into a Registration Accreditation Agreement (RAA) with an applicant from a sanctioned country, it will need an OFAC license. What happens right now is that ICANN is under no obligation to request for this license and in either case, OFAC can refuse to provide it.  The sub group recommended that the terms of the RAA be modified so that ICANN is required to apply for and put their best efforts in securing the license if the applicant is qualified to be a registrar and not individually subject to sanctions. While the licensing process is underway they should also be helpful and transparent, and maintain on-going communication with the applicant. The same recommendation was made for applicants to the new gTLD program, from sanctioned countries. Other general licenses are needed from OFAC for certain ICANN transactions and hence it was proposed that ICANN pursue the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Choice of law and Choice of Venue Provisions in ICANN Agreements&lt;/p&gt;
&lt;p&gt;In ICANN’S Registry Agreements (RA) and Registration Accreditation Agreement (RAA) the absence of a choice of law provision means that the governing law of these contracts is undetermined until later decided by a judge or arbitrator or an agreement between the parties. It was collectively seen that increased freedom of choice for the parties in the agreement could help in customizing the agreements and make it easier for registries and such to contractually engage with ICANN. Out of various options, the group decided that a Menu approach would be best whereby a host of options(decided by ICANN) can be provided and the party in case choose the most appropriate from them such as the jurisdiction of their incorporation.In RAs, the choice of venue was pre determined as Los Angeles, California but the group recommended that instead of imposing this choice on the party it would be better to offer a list of possible venues for arbitration. The registry can then choose amongst these options when entering into the contract.  There were other issues discussed which did not reach fruition due to lack of unanimity such as discussions on immunity of ICANN from US jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt;&lt;b&gt;&lt;span&gt;OFFICE OF THE OMBUDS&lt;/span&gt;&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Subsequent to the external evaluation of the ICANN Office of the Ombuds (IOO), there were a couple of recommendations to strengthen the office. They were divided into procedural aspects that the office should carry out to improve their complaint mechanism such as differentiating between categories of complaints and explaining how each type would be handled with. The issues that would not invoke actions from the IOO should also be established clearly and if and where these could be transferred to any other channel. The response from all the relevant parties of ICANN to a formal request or report from the IOO should take place within 90 days, and 120 at the maximum if an explanation for the same can be provided. An internal timeline will be defined by the office for handling of complaints and document a report on these every quarter or annually. A recommendation for the IOO to be formally trained in mediation and have such experience within its ranks was further given. Reiterating the importance of diversity, even this sub group emphasized on the IOO bearing a diverse group in terms of gender and other parameters. This ensures that a complainant has a choice in who to approach in the office making them more comfortable. To enhance the independence of the Ombuds, their employment contract should have a 5 year fixed term which only allows for one extension of maximum 3 years. An Ombuds Advisory Panel is to be constituted by ICANN comprising five members to act as advisers, supporters and counsel for the IOO with at least 2 members having Ombudsman experience and the remaining possessing extensive ICANN experience. They would be responsible for selecting the new Ombuds and conducting the IOO’s evaluation every 5 years amongst others. Lastly, the IOO should proactively document their work by publishing reports on activity, collecting and publicizing statistics, user satisfaction information a well any improvements to the process.&lt;/p&gt;
&lt;p&gt;These proposals still do not address the opacity of how the Office of the Ombuds resolve these cases since it does not call for; a) a compilation of all the cases that have been decided by the office in the history of the organization b) the details of the parties that are involved if the parties have allowed that to be revealed and if not at the very least, the non sensitive data such as their nationality and stakeholder affiliation and c) a description of the proceedings of the case and who won in each of them. When CIS &lt;a href="https://cis-india.org/internet-governance/blog/didp-request-5-the-ombudsman-and-icanns-misleading-response-to-our-request-1"&gt;asked&lt;/a&gt; for the above in 2015, the information was denied on ground of confidentiality. Yet, it is vital to know these details since the Ombuds hear complaints against the Board, Staff and other constituent bodies and by not reporting on this, ICANN is rendering the process much less accountable and transparent. This conflict resolution process and its efficacy is even more essential in a multi-stakeholder environment so as to give parties the faith to engage in the process, knowing that the redressal mechanisms are strong. It is also problematic that sexual harassments complaints are dealt by the Ombuds and that ICANN does not have a specific Anti-Sexual Harassment Committee. The committee should be neutral and approachable and while it is useful for the Office of the Ombuds to be trained in sexual harassment cases, it is by no means a comprehensive and ideal approach to deal with complaints of this nature. Despite ICANN facing a sexual harassment claim i&lt;a href="https://cis-india.org/internet-governance/blog/cis-statement-on-sexual-harrasment-at-icann55"&gt;n 2016&lt;/a&gt;, the recommendations do not specifically address the approach the Ombuds should take in tackling sexual harassment.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt;&lt;b&gt;&lt;span&gt;SUPPORTING ORGANIZATION/ ADVISORY COMMITTEE ACCOUNTABILITY&lt;/span&gt;&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The sub group presented the outcomes under the main heads of Accountability, Transparency, Participation, Outreach and Updates to policies and procedures. They suggested these as good practices that can be followed by the organizations and did not recommend that implementation of the same be required. The accountability aspect had suggestions of better documentation of procedures and decision-making.  Proposals of listing members of such organizations publicly, making their meetings open to public observation including minutes and transcripts along with disclosing their correspondence with ICANN were aimed at making these entities more transparent. In the same vein, rules of membership and eligibility criteria, the process of application and a process of appeal should be well defined. Newsletters should be published by the SO/AC to help non-members understand the benefit and the process of becoming a member. Policies were asked to be reviewed at regular intervals and these internal reviews should not extend beyond a year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt;&lt;b&gt;&lt;span&gt;STAFF ACCOUNTABILITY&lt;/span&gt;&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Improving the ICANN staff’s Accountability was the job of a different group who assessed it at the service delivery, departmental or organizational level not at an individual or personnel level. They did this by analysing the roles and responsibilities of the Board, staff and community members and the nexus between them. Their observations culminated in the understanding that ICANN needs to take steps such as make visible their performance management system and process, their vision for the departmental goals and how they tie in to the organization’s strategic goals and objectives. They note that several new mechanisms have already been established yet have not been used enough to ascertain their efficacy and thus, propose a regular information acquisition mechanism. Most importantly, they have asked ICANN to standardize and publish guidelines for suitable timeframes for acknowledging and responding to requests from the community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt;&lt;b&gt;&lt;span&gt;ICANN TRANSPARENCY&lt;/span&gt;&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The last group of the WS2 was one specifically looking at the transparency of the organization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;a.   &lt;span&gt;The Documentary Information Disclosure Policy (DIDP)&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently the DIDP process only applies to ICANN’s “operational activities”, it was recommended to delete this caveat to cover a wider breadth of the organization’s activities. As CIS has experienced, request for information is often met with an answer that such information is not documented and to remedy the same, a documentation policy was proposed where if significant elements of a decision making process are taking place orally then the participants will be required to document the substance of the conversation. Many a times DIDP requests are refused because one aspect of the information sought is subject to confidentiality. hus one of the changes is to introduce a severability clause so that in such cases, information can still be disclosed with the sensitive aspect redacted or severed. In scenarios of redaction, the rationale should be provided citing one of the given DIDP exceptions along with the process for appeal. ICANN’s contracts should be under the purview of the DIDP except when subject to a non-disclosure agreement and further, the burden is on the other party to convince ICANN that it has a legitimate commercial reason for requested the NDA. No longer would any information pertaining to the security and stability of the Internet be outside the ambit of the DIDP but only if it is harmful to the security and stability. Finally, ICANN should review the DIDP every five years to see how it can be improved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;b.   &lt;span&gt;Documenting and Reporting on ICANN’s Interactions with the Government&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a prominent step towards being more transparent with their expenditure and lobbying, the group recommended that ICANN begins disclosing publicly on at least an annual basis, sums of $20,000 per year devoted to “political activities” both in the US and abroad. All expenditures should be done on an itemized basis by ICANN for both outside contractors and internal personnel along with the identities of the persons engaging in such activities and the type of engagement used for such activities amongst others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;cc.  &lt;span&gt;Transparency of Board Deliberations&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;The bylaws were recommended to be revised so that material may be removed from the minutes of the Board if subject to a DIDP exception. The exception for deliberative processes should not apply to any factual information, technical report or reports on the performance or effectiveness of a particular body or strategy. When any information is removed from the minutes of the Board meeting, they should be disclosed after a particular period of time as and when the window of harm has passed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;d.     &lt;span&gt;ICANN’s Anonymous Hotline (Whistle-blower Protection)&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To begin with, ICANN was recommended to devise a way such that when anyone searches their website for the term “whistle-blower”, it should redirect to their Hotline policy since people are unlikely to be aware that in ICANN parlance it is referred to as the Hotline policy.  Instead of only “serious crimes” that are currently reported, all issues and concerns that violate local laws should be. Complaints should not be classified as ‘urgent’ and ‘non-urgent’ but all reports should be a priority and receive a formal acknowledgment within 48 hours at the maximum. ICANN should make it clear that any retaliation against the reporter will be taken and investigated as seriously as the original alleged wrongdoing. Employees should be provided with data about the use of the Hotline, including the types of incidents reported. Few member of this group came out with a Minority Statement expressing their disapproval with one particular aspect of the recommendations that they felt was not developed enough, the one pertaining to ICANN’s attorney-client privilege. The recommendation did not delve into specifics but merely stated that ICANN should expand transparency in their legal processes including clarifying how attorney-client privilege is invoked. The dissidents thought ICANN should go farther and enumerate principles where the privilege would be waived in the interests of transparency and account for voluntary disclosure as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The transparency recommendations did not focus on the financial reporting aspects of ICANN which &lt;a href="https://cis-india.org/internet-governance/blog/analysis-of-icann-financials-from-2012-2016"&gt;we have found ambiguities&lt;/a&gt; with before. Some examples are; the Registries and Registrars are the main sources of revenue though there is ambiguity as to the classifications provided by ICANN such as the difference between RYG and RYN. The mode of contribution of sponsors isn’t clear either so we do not know if this was done through travel, money, media partnerships etc. Several entities have been listed from different places in different years, sometimes depending on the role they have played such as whether they are a sponsor or registry. Moreover, the Regional Internet Registries are clubbed under one heading and as a consequence it is not possible to determine individual RIR     contribution like how much did APNIC pay for the Asia and Pacific region. Thus, there is a lot more scope for ICANN to be transparent which goes beyond the proposals in the report.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;It is worth noting that whereas the mandate of the WS1 included the implementation of the recommendations, this is not the case for WS2 and thus, by creating a report itself the mission of the group is concluded. This difference can be attributed to the fact that during the first WS, there was a need to see it through since the IANA transition would not happen otherwise. The change in circumstances and the corresponding lack of urgency render the process less powerful, the second time round. The final recommendations are now being discussed in the relevant charting organizations within ICANN such as the Government Advisory Council (GAC) and subsequent to their approval,, it will be sent to the Board who will decide to adopt them or not. If adopted, ICANN and its sub organizations will have to see how they can implement these recommendations. The co-chairs of the group will be the point of reference for the chartering organizations and an implementation oversight team has been formed, consisting of the Rapporteurs of the sub teams and the co-chairs. A Feasibility Assessment Report will be made public in due time which will describe the resources that would take to implement the recommendations. Since it would be a huge undertaking for ICANN to implement the above, the compliance process is expected to take a few years. .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p&gt;The link to report can be found&lt;a href="https://community.icann.org/display/WEIA/WS2+-+Enhancing+ICANN+Accountability+Home?preview=/59640761/88575033/FULL%20WS2%20REPORT%20WITH%20ANNEXES.pdf"&gt; here.&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/icann-work-stream-2-recommendations-on-accountability'&gt;https://cis-india.org/internet-governance/blog/icann-work-stream-2-recommendations-on-accountability&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>akriti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    

   <dc:date>2018-11-23T14:56:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act">
    <title>Budapest Convention and the Information Technology Act</title>
    <link>https://cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act</link>
    <description>
        &lt;b&gt;The Convention on Cybercrime adopted in Budapest (“Convention”) is the fist and one of the most important multilateral treaties addressing the issue of internet and computer crimes.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;br /&gt;It was drafted by the Council of Europe along with Canada, Japan, South Africa and the United States of America.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; The importance of the Convention is also indicated by the fact that adherence to it (whether by outright adoption or by otherwise making domestic laws in compliance with it) is one of the conditions mentioned in the Clarifying Lawful Overseas Use of Data Act passed in the USA (CLOUD Act) whereby a process has been established to enable security agencies of in India and the United States to directly access data stored in each other’s territories. Our analysis of the CLOUD Act vis-à-vis India can be found &lt;a href="https://cis-india.org/internet-governance/blog/an-analysis-of-the-cloud-act-and-implications-for-india"&gt;here&lt;/a&gt;. It is in continuation of that analysis that we have undertaken here a detailed comparison of the Information Technology Act, 2000 (“&lt;b&gt;IT Act&lt;/b&gt;”) and how it stacks up against the provisions of Chapter I and Chapter II of the Convention.&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before we get into a comparison of the Convention with the IT Act, we must point out the distinction between the two legal instruments, for the benefit of readers from a non legal background. An international instrument such as the Convention on Cybercrime (generally speaking) is essentially a promise made by the States which are a party to that instrument, that they will change or modify their local laws to get them in line with the requirements or principles laid out in said instrument. In case the signatory State does not make such amendments to its local laws, (usually) the citizens of that State cannot enforce any rights that they may have been granted under such an international instrument. The situation is the same with the Convention on Cybercrime, unless the signatory State amends its local laws to bring them in line with the provisions of the Convention, there cannot be any enforcement of the provisions of the Convention within that State.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; This however is not the case for India and the IT Act since India is not a signatory to the Convention on Cybercrime and therefore is not obligated to amend its local laws to bring them in line with the Convention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although India and the Council of Europe cooperated to amend the IT Act through major amendments brought about vide the Information Technology (Amendment) Act, 2008, India still has not become a signatory to the Convention on Cybercrime. The reasons for this appear to be unclear and it has been suggested that these reasons may range from the fact that India was not involved in the original drafting, to issues of sovereignty regarding the provisions for international cooperation and extradition.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 2 – Illegal access&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the access to the whole or any part of a computer system without right. A Party may require that the offence be committed by infringing security measures, with the intent of obtaining computer data or other dishonest intent, or in relation to a computer system that is connected to another computer system.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Section 43&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) accesses or secures access to such computer, computer system or computer network or computer resource&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;Section 66&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two &lt;b&gt;three &lt;/b&gt;years or with fine which may extend to five lakh rupees or with both.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention gives States the right to further qualify the offence of “illegal access” or “hacking” by adding elements such as infringing security measures, special intent to obtain computer data, other dishonest intent that justifies criminal culpability, or the requirement that the offence is committed in relation to a computer system that is connected remotely to another computer system.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, Indian law deals with the distinction by making the act of unathorised access without dishonest or fraudulent intent a civil offence, where the offender is liable to pay compensation. If the same act is done with dishonest and fraudulent intent, it is treated as a criminal offence punishable with fine and imprisonment which may extend to 3 years.&lt;/p&gt;
&lt;p&gt;It must be noted that this provision was included in the Act only through the Amendment of 2008 and was not present in the Information Technology Act, 2000 in its original iteration.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 3 – Illegal Interception&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the interception without right, made by technical means, of non-public transmissions of computer data to, from or within a computer system, including electromagnetic emissions from a computer system carrying such computer data. A Party may require that the offence be committed with dishonest intent, or in relation to a computer system that is connected to another computer system.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Although the Information Technology Act, 2000 does not specifically criminalise the interception of communications by a private person. It is possible that under the provisions of Rule 43(a) the act of accessing a “computer network” could be interpreted as including unauthorised interception within its ambit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other way in which illegal interception may be considered to be illegal is through a combined reading of Sections 69 (Interception) and 45 (Residuary Penalty) with Rule 3 of the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 which prohibits interception, monitoring and decryption of information under section 69(2) of the IT Act except in a manner as provided by the Rules. However, it must be noted that section 69(2) only talks about interception by the government and Rule 3 only provides for procedural safeguards for such an interception. It could therefore be argued that the prohibition under Rule 3 is only applicable to the government and not to private individuals since section 62, the provision under which Rule 3 has been issued, itself is not applicable to private individuals.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 4 – Data interference&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the damaging, deletion, deterioration, alteration or suppression of computer data without right.&lt;/p&gt;
&lt;p&gt;2 A Party may reserve the right to require that the conduct described in paragraph 1 result in serious harm.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 43&lt;/p&gt;
&lt;p&gt;If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -&lt;/p&gt;
&lt;p&gt;(d) damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network;&lt;/p&gt;
&lt;p&gt;(i) destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means;&lt;/p&gt;
&lt;p&gt;(j) Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage,&lt;/p&gt;
&lt;p&gt;he shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected. (change vide ITAA 2008)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Section 66&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two &lt;b&gt;three &lt;/b&gt;years or with fine which may extend to five lakh rupees or with both.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Damage, deletion, diminishing in value and alteration of data is considered a crime as per Section 66 read with section 43 of the IT Act if done with fraudulent or dishonest intention. &lt;b&gt;While the Convention only requires such acts to be crimes if committed intentionally, however the Information Technology Act requires that such intention be either dishonest or fraudulent only then such an act will be a criminal offence, otherwise it will only incur civil consequences requiring the perpetrator to pay damages by way of compensation.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It must be noted that the optional requirement of such an act causing serious harm has not been adopted by Indian law, i.e. the act of such damage, deletion, etc. by itself is enough to constitute the offence, and there is no requirement of such an act causing serious harm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the Explanatory Report to the Convention on Cybercrime, “&lt;b&gt;Suppressing&lt;/b&gt; of computer data means any action that prevents or terminates the availability of the data to the person who has access to the computer or the data carrier on which it was stored.” Strictly speaking the act of suppression of data in another system is not covered by the language of section 43, but looking at the tenor of the section it is likely that if a court is faced with a situation of intentional/malicious denial of access to data, the court could expand the scope of the term “damage” as contained in sub-section (d) to include such malicious acts.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 5 – System interference&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, &lt;b&gt;when committed intentionally, the serious hindering without right of the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data&lt;/b&gt;.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Section 43&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) disrupts or causes disruption of any computer, computer system or computer network;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Explanation &lt;/b&gt;- for the purposes of this section -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) "Computer Contaminant" means any set of computer instructions that are designed -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) to modify, destroy, record, transmit data or programme residing within a computer, computer system or computer network; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) by any means to usurp the normal operation of the computer, computer system, or computer network;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) "Computer Virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;Section 66&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two &lt;b&gt;three &lt;/b&gt;years or with fine which may extend to five lakh rupees or with both.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The offence of causing hindrance to the functioning of a computer system with fraudulent or dishonest intention is an offence under the IT Act.  &lt;b&gt;While the Convention only requires such acts to be crimes if committed intentionally, however the IT Act requires that such intention be either dishonest or fraudulent only then such an act will be a criminal offence, otherwise it will only incur civil consequences requiring the perpetrator to pay damages by way of compensation.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT Act does not require such disruption to be caused in any particular manner as is required under the Convention, although the acts of introducing computer viruses as well as damaging or deleting data themselves have been classified as offences under the IT Act.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 6 – Misuse of devices&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a the production, sale, procurement for use, import, distribution or otherwise making available of:&lt;/p&gt;
&lt;p&gt;i a device, including a computer program, designed or adapted primarily for the purpose of committing any of the offences established in accordance with Articles 2 through 5;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii a computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed, with intent that it be used for the purpose of committing any of the offences established in Articles 2 through 5; and&lt;/p&gt;
&lt;p&gt;b the possession of an item referred to in paragraphs a.i or ii above, with intent that it be used for the purpose of committing any of the offences established in Articles 2 through 5. A Party may require by law that a number of such items be possessed before criminal liability attaches.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 This article shall not be interpreted as imposing criminal liability where the production, sale, procurement for use, import, distribution or otherwise making available or possession referred to in paragraph 1 of this article is not for the purpose of committing an offence established in accordance with Articles 2 through 5 of this Convention, such as for the authorised testing or protection of a computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 Each Party may reserve the right not to apply paragraph 1 of this article, provided that the reservation does not concern the sale, distribution or otherwise making available of the items referred to in paragraph 1 a.ii of this article.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision establishes as a separate and independent criminal offence the intentional commission of specific illegal acts regarding certain devices or access data to be misused for the purpose of committing offences against the confidentiality, the integrity and availability of computer systems or data. While the IT Act does not by itself makes the production, sale, procurement for use, import, distribution of devices designed to be adopted for such purposes, sub-section (g) of section 43 along with section 120A of the Indian Penal Code, 1860 which deals with “conspiracy” could perhaps be used to bring such acts within the scope of the penal statutes.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 7 – Computer related forgery&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right, the input, alteration, deletion, or suppression of computer data, resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible. A Party may require an intent to defraud, or similar dishonest intent, before criminal liability attaches.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The acts of deletion, alteration and suppression of data by itself is a crime as discussed above, there is no specific offence for doing such acts for the purpose of forgery. However this does not mean that the crime of online forgery is not punishable in India at all, such crimes would be dealt with under the relevant provisions of the Indian Penal Code, 1860 (Chapter 18) read with section 4 of the IT Act.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 8 – Computer-related fraud&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right, the causing of a loss of property to another person by:&lt;/p&gt;
&lt;p&gt;a any input, alteration, deletion or suppression of computer data,&lt;/p&gt;
&lt;p&gt;b any interference with the functioning of a computer system,&lt;/p&gt;
&lt;p&gt;with fraudulent or dishonest intent of procuring, without right, an economic benefit for oneself or for another person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Just as in the case of forgery, there is no specific provision in the IT Act whereby online fraud would be considered as a crime, however specific acts such as charging services availed of by one person to another (section 43(h), identity theft (section 66C), cheating by impersonation (section 66D) have been listed as criminal offences. Further, as with forgery, fraudulent acts to procure economic benefits would also get covered by the provisions of the Indian Penal Code that deal with cheating.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 9 – Offences related to child pornography&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right, the following conduct:&lt;/p&gt;
&lt;p&gt;a producing child pornography &lt;b&gt;for the purpose of its distribution &lt;/b&gt;through a computer system;&lt;/p&gt;
&lt;p&gt;b offering or making available child pornography through a computer system;&lt;/p&gt;
&lt;p&gt;c distributing or transmitting child pornography through a computer system;&lt;/p&gt;
&lt;p&gt;d procuring child pornography through a computer system for oneself or for another person;&lt;/p&gt;
&lt;p&gt;e possessing child pornography in a computer system or on a computer-data storage medium.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 For the purpose of paragraph 1 above, the term "child pornography" shall include pornographic material that visually depicts:&lt;/p&gt;
&lt;p&gt;a a minor engaged in sexually explicit conduct;&lt;/p&gt;
&lt;p&gt;b a person appearing to be a minor engaged in sexually explicit conduct;&lt;/p&gt;
&lt;p&gt;c realistic images representing a minor engaged in sexually explicit conduct.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 For the purpose of paragraph 2 above, the term "minor" shall include all persons under 18 years of age. A Party may, however, require a lower age-limit, which shall be not less than 16 years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4 Each Party may reserve the right not to apply, in whole or in part, paragraphs 1, subparagraphs d and e, and 2, sub-paragraphs b and c.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;67 B Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Whoever,-&lt;/p&gt;
&lt;p&gt;(a) publishes or transmits or causes to be published or transmitted material in any electronic form which depicts children engaged in sexually explicit act or conduct or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) creates text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form depicting children in obscene or indecent or sexually explicit manner or&lt;/p&gt;
&lt;p&gt;(c) cultivates, entices or induces children to online relationship with one or more children for and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource or&lt;/p&gt;
&lt;p&gt;(d) facilitates abusing children online or&lt;/p&gt;
&lt;p&gt;(e) records in any electronic form own abuse or that of others pertaining to sexually explicit act with children,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with a fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that the provisions of section 67, section 67A and this section does not extend to any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) The publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper writing, drawing, painting, representation or figure is in the interest of science, literature, art or learning or other objects of general concern; or&lt;/p&gt;
&lt;p&gt;(ii) which is kept or used for bonafide heritage or religious purposes&lt;/p&gt;
&lt;p&gt;Explanation: For the purposes of this section, "children" means a person who has not completed the age of 18 years.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The publishing, transmission, creation, collection, seeking, browsing, etc. of child pornography is an offence under Indian law punishable with imprisonment for upto 5 years for a first offence and upto 7 years for a subsequent offence, along with fine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is important to note that bona fide depictions for the public good, such as for publication in pamphlets, reading or educational material are specifically excluded from the rigours of the section, Similarly material kept for heritage or religious purposes is also exempted under this section. Such exceptions are in line with the intent of the Convention, since the Explanatory statement itself states that “The term "pornographic material" in paragraph 2 is governed by national standards pertaining to the classification of materials as obscene, inconsistent with public morals or similarly corrupt. Therefore, material having an artistic, medical, scientific or similar merit may be considered not to be pornographic.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 10 – Offences related to infringements of copyright and related rights&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law the infringement of copyright, as defined under the law of that Party, pursuant to the obligations it has undertaken under the Paris Act of 24 July 1971 revising the Bern Convention for the Protection of Literary and Artistic Works, the Agreement on Trade-Related Aspects of Intellectual Property Rights and the WIPO Copyright Treaty, with the exception of any moral rights conferred by such conventions, where such acts are committed wilfully, on a commercial scale and by means of a computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law the infringement of related rights, as define under the law of that Party, pursuant to the obligations it has undertaken under the International Convention for the Protection of Performers, Producers of Phonograms and Broadcasting Organisations (Rome Convention), the Agreement on Trade-Related Aspects of Intellectual Property Rights and the WIPO Performances and Phonograms Treaty, with the exception of any moral rights conferred by such conventions, where such acts are committed wilfully, on a commercial scale and by means of a computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 A Party may reserve the right not to impose criminal liability under paragraphs 1 and 2 of this article in limited circumstances, provided that other effective remedies are available and that such reservation does not derogate from the Party’s international obligations set forth in the international instruments referred to in paragraphs 1 and 2 of this article.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;81 Act to have Overriding effect &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The provisions of this Act shall have effect notwithstanding anything inconsistent therewith contained in any other law for the time being in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that nothing contained in this Act shall restrict any person from exercising any right conferred under the Copyright Act, 1957 or the Patents Act, 1970&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The use of the term "pursuant to the obligations it has undertaken" in both paragraphs makes it clear that a Contracting Party to the Convention is not bound to apply agreements cited (TRIPS, WIPO, etc.) to which it is not a Party; moreover, if a Party has made a reservation or declaration permitted under one of the agreements, that reservation may limit the extent of its obligation under the present Convention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT Act does not try to intervene in the existing copyright regime of India and creates a special exemption for the Copyright Act and the Patents Act in the clause which provides this Act overriding effect. India’s obligations under the various treaties and conventions on intellectual property rights are enshrined in these legislations.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 11 – Attempt and aiding or abetting&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, aiding or abetting the commission of any of the offences established in accordance with Articles 2 through 10 of the present Convention with intent that such offence be committed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, an attempt to commit any of the offences established in accordance with Articles 3 through 5, 7, 8, and 9.1.a and c of this Convention.&lt;/p&gt;
&lt;p&gt;3 Each Party may reserve the right not to apply, in whole or in part, paragraph 2 of this article.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;84 B Punishment for abetment of offences &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whoever abets any offence shall, if the act abetted is committed in consequence of the abetment, and no express provision is made by this Act for the punishment of such abetment, be punished with the punishment provided for the offence under this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Explanation: An Act or offence is said to be committed in consequence of abetment, when it is committed in consequence of the instigation, or in pursuance of the conspiracy, or with the aid which constitutes the abetment.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;84 C Punishment for attempt to commit offences &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whoever attempts to commit an offence punishable by this Act or causes such an offence to be committed, and in such an attempt does any act towards the commission of the offence, shall, where no express provision is made for the punishment of such attempt, be punished with imprisonment of any description provided for the offence, for a term which may extend to one-half of the longest term of imprisonment provided for that offence, or with such fine as is provided for the offence or with both.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;As can be seen, both attempts as well as abetment of criminal offences under the IT Act have also been criminalised.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 12 – Corporate liability&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to ensure that legal persons can be held liable for a criminal offence established in accordance with this Convention, committed for their benefit by any natural person, acting either individually or as part of an organ of the legal person, who has a leading position within it, based on:&lt;/p&gt;
&lt;p&gt;a a power of representation of the legal person;&lt;/p&gt;
&lt;p&gt;b an authority to take decisions on behalf of the legal person;&lt;/p&gt;
&lt;p&gt;c an authority to exercise control within the legal person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 In addition to the cases already provided for in paragraph 1 of this article, each Party shall take the measures necessary to ensure that a legal person can be held liable where the lack of supervision or control by a natural person referred to in paragraph 1 has made possible the commission of a criminal offence established in accordance with this Convention for the benefit of that legal person by a natural person acting under its authority.&lt;/p&gt;
&lt;p&gt;3 Subject to the legal principles of the Party, the liability of a legal person may be criminal, civil or administrative.&lt;/p&gt;
&lt;p&gt;4 Such liability shall be without prejudice to the criminal liability of the natural persons who have committed the offence.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;85 Offences by Companies. &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Where a person committing a contravention of any of the provisions of this Act or of any rule, direction or order made there under is a Company, every person who, at the time the contravention was committed, was in charge of, and was responsible to, the company for the conduct of business of the company as well as the company, shall be guilty of the contravention and shall be liable to be proceeded against and punished accordingly:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Provided &lt;/b&gt;that nothing contained in this sub-section shall render any such person liable to punishment if he proves that the contravention took place without his knowledge or that he exercised all due diligence to prevent such contravention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Notwithstanding anything contained in sub-section (1), where a contravention of any of the provisions of this Act or of any rule, direction or order made there under has been committed by a company and it is proved that the contravention has taken place with the consent or connivance of, or is attributable to any neglect on the part of, any director, manager, secretary or other officer of the company, such director, manager, secretary or other officer shall also be deemed to be guilty of the contravention and shall be liable to be proceeded against and punished accordingly.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Explanation&lt;/b&gt;-&lt;/p&gt;
&lt;p&gt;For the purposes of this section&lt;/p&gt;
&lt;p&gt;(i) "Company" means any Body Corporate and includes a Firm or other Association of individuals; and&lt;/p&gt;
&lt;p&gt;(ii) "Director", in relation to a firm, means a partner in the firm.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The liability of a company or other body corporate has been laid out in the IT Act in a manner similar to the Budapest Convention. While, the test to determine the relationship between the legal entity and the natural person who has committed the act on behalf of the legal entity is a little more detailed&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; in the Convention, the substance of the test is laid out in the IT Act as “a person who is in charge of, and was responsible to, the company”.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 14&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish the powers and procedures provided for in this section for the purpose of specific criminal investigations or proceedings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Except as specifically provided otherwise in Article 21, each Party shall apply the powers and procedures referred to in paragraph 1 of this article to:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a the criminal offences established in accordance with Articles 2 through 11 of this Convention;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b other criminal offences committed by means of a computer system; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c the collection of evidence in electronic form of a criminal offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 a Each Party may reserve the right to apply the measures referred to in Article 20 only to offences or categories of offences specified in the reservation, provided that the range of such offences or categories of offences is not more restricted than the range of offences to which it applies the measures referred to in Article 21. Each Party shall consider restricting such a reservation to enable the broadest application of the measure referred to in Article 20.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b Where a Party, due to limitations in its legislation in force at the time of the adoption of the present Convention, is not able to apply the measures referred to in Articles 20 and 21 to communications being transmitted within a computer system of a service provider, which system:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i is being operated for the benefit of a closed group of users, and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii does not employ public communications networks and is not connected with another computer system, whether public or private, that Party may reserve the right not to apply these measures to such communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Party shall consider restricting such a reservation to enable the broadest application of the measures referred to in Articles 20 and 21.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This is a provision of a general nature that need not have any equivalence in domestic law. The provision clarifies that all the powers and procedures provided for in this section (Articles 14 to 21) are for the purpose of “specific criminal investigations or proceedings”.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 15 – Conditions and safeguards&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall ensure that the establishment, implementation and application of the powers and procedures provided for in this Section are subject to conditions and safeguards provided for under its domestic law, which shall provide for the adequate protection of human rights and liberties, including rights arising pursuant to obligations it has undertaken under the 1950 Council of Europe Convention for the Protection of Human Rights and Fundamental Freedoms, the 1966 United Nations International Covenant on Civil and Political Rights, and other applicable international human rights instruments, and which shall incorporate the principle of proportionality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Such conditions and safeguards shall, as appropriate in view of the nature of the procedure or power concerned, &lt;i&gt;inter alia&lt;/i&gt;, include judicial or other independent supervision, grounds justifying application, and limitation of the scope and the duration of such power or procedure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 To the extent that it is consistent with the public interest, in particular the sound administration of justice, each Party shall consider the impact of the powers and procedures in this section upon the rights, responsibilities and legitimate interests of third parties.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This again is a provision of a general nature which need not have a corresponding clause in the domestic law. India is a signatory to a number of international human rights conventions and treaties, it has acceded to the International Covenant on Civil and Political Rights (ICCPR), 1966, International Covenant on Economic, Social and Cultural Rights (ICESCR), 1966, ratified the International Convention on the Elimination of All Forms of Racial Discrimination (ICERD), 1965, with certain reservations, signed the Convention on the Elimination of All Forms of Discrimination against Women (CEDAW), 1979 with certain reservations, Convention on the Rights of the Child (CRC), 1989 and signed the Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment (CAT), 1984. Further the right to life guaranteed under Article 21 of the Constitution takes within its fold a number of human rights such as the right to privacy. Freedom of expression, right to fair trial, freedom of assembly, right against arbitrary arrest and detention are all fundamental rights guaranteed under the Constitution of India, 1950.&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, India has enacted the Protection of Human Rights Act, 1993 for the constitution of a National Human Rights Commission, State Human Rights Commission in States and Human Rights Courts for better protection of “human rights” and for matters connected therewith or incidental thereto. Thus, there does exist a statutory mechanism for the enforcement of human rights&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; under Indian law. It must be noted that the definition of human rights also incorporates rights embodied in International Covenants and are enforceable by Courts in India.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 16 – Expedited preservation of stored computer data&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to enable its competent authorities to order or similarly obtain the expeditious preservation of specified computer data, including traffic data, that has been stored by means of a computer system, in particular where there are grounds to believe that the computer data is particularly vulnerable to loss or modification.&lt;/p&gt;
&lt;p&gt;2 Where a Party gives effect to paragraph 1 above by means of an order to a person to preserve specified stored computer data in the person’s possession or control, the Party shall adopt such legislative and other measures as may be necessary to oblige that person to preserve and maintain the integrity of that computer data for a period of time as long as necessary, up to a maximum of ninety days, to enable the competent authorities to seek its disclosure. A Party may provide for such an order to be subsequently renewed.&lt;/p&gt;
&lt;p&gt;3 Each Party shall adopt such legislative and other measures as may be necessary to oblige the custodian or other person who is to preserve the computer data to keep confidential the undertaking of such procedures for the period of time provided for by its domestic law.&lt;/p&gt;
&lt;p&gt;4 The powers and procedures referred to in this article shall be subject to Articles 14 and 15.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Article 17 – Expedited preservation and partial disclosure of traffic data&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt, in respect of traffic data that is to be preserved under Article 16, such legislative and other measures as may be necessary to:&lt;/p&gt;
&lt;p&gt;a ensure that such expeditious preservation of traffic data is available regardless of whether one or more service providers were involved in the transmission of that communication; and&lt;/p&gt;
&lt;p&gt;b ensure the expeditious disclosure to the Party’s competent authority, or a person designated by that authority, of a sufficient amount of traffic data to enable the Party to identify the service providers and the path through which the communication was transmitted.&lt;/p&gt;
&lt;p&gt;2 The powers and procedures referred to in this article shall be subject to Articles 14 and 15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;29 Access to computers and data. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(1) Without prejudice to the provisions of sub-section (1) of section 69, the Controller or any person authorized by him shall, if he has reasonable cause to suspect that any contravention of the provisions of this chapter made there under has been committed, have access to any computer system, any apparatus, data or any other material connected with such system, for the purpose of searching or causing a search to be made for obtaining any information or data contained in or available to such computer system. (Amended vide ITAA 2008)&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;(2) For the purposes of sub-section (1), the Controller or any person authorized by him may, by order, direct any person in charge of, or otherwise concerned with the operation of the computer system, data apparatus or material, to provide him with such reasonable technical and other assistant as he may consider necessary.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;67 C&lt;/b&gt; &lt;b&gt;Preservation and Retention of information by intermediaries &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(1) Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;Rule 3(7) of the Information Technology (Intermediary Guidelines) Rules, 2011&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;3(7) - When required by lawful order, the intermediary shall provide information &lt;b&gt;or any such assistance&lt;/b&gt; to Government Agencies who are lawfully authorised for investigative, protective, cyber security activity. The information or any such assistance shall be provided for the purpose of verification of identity, or for prevention, detection, investigation, prosecution, cyber security incidents and punishment of offences under any law for the time being in force, on a request in writing staling clearly the purpose of seeking such information or any such assistance.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;It must be noted that Article 16 and Article 17 refer only to data preservation and not data retention. “Data preservation” means to keep data, which already exists in a stored form, protected from anything that would cause its current quality or condition to change or deteriorate. Data retention means to keep data, which is currently being generated, in one’s possession into the future.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In short, the article provides only for preservation of existing stored data, pending subsequent disclosure of the data, in relation to specific criminal investigations or proceedings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention uses the term "order or similarly obtain", which is intended to allow the use of other legal methods of achieving preservation than merely by means of a judicial or administrative order or directive (e.g. from police or prosecutor). In some States, preservation orders do not exist in the procedural law, and data can only be preserved and obtained through search and seizure or production order. Flexibility was therefore intended by the use of the phrase "or otherwise obtain" to permit the implementation of this article by the use of these means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Indian law does not have a specific provision for issuing an order for preservation of data, the provisions of section 29 as well as sections 99 to 101 of the Code of Criminal Procedure, 1973 may be utilized to achieve the result intended by Articles 16 and 17. Although section 67C of the IT Act uses the term “preserve and retain such information”, this provision is intended primarily for the purpose of data retention and not data preservation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another provision which may conceivably be used for issuing preservation orders is Rule 3(7) of the Information Technology (Intermediary Guidelines) Rules, 2011 which requires intermediaries to provide “any such assistance” to Government Agencies who are lawfully authorised for investigative, protective, cyber security activity. However, in the absence of a power of preservation in the main statute (IT Act) it remains to be seen whether such an order would be enforced if challenged in a court of law.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 18 – Production order&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to order:&lt;/p&gt;
&lt;p&gt;a. a person in its territory to submit specified computer data in that person’s possession or control, which is stored in a computer system or a computer-data storage medium; and&lt;/p&gt;
&lt;p&gt;b. a service provider offering its services in the territory of the Party to submit subscriber information relating to such services in that service provider’s possession or control.&lt;/p&gt;
&lt;p&gt;2 The powers and procedures referred to in this article shall be subject to Articles 14 and 15.&lt;/p&gt;
&lt;p&gt;3 For the purpose of this article, the term “subscriber information” means any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data and by which can be established:&lt;/p&gt;
&lt;p&gt;a the type of communication service used, the technical provisions taken thereto and the period of service;&lt;/p&gt;
&lt;p&gt;b the subscriber’s identity, postal or geographic address, telephone and other access number, billing and payment information, available on the basis of the service agreement or arrangement;&lt;/p&gt;
&lt;p&gt;c any other information on the site of the installation of communication equipment, available on the basis of the service agreement or arrangement.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Section 28(2)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(2) The Controller or any officer authorized by him in this behalf shall exercise the like powers which are conferred on Income-tax authorities under Chapter XIII of the Income-Tax Act, 1961 and shall exercise such powers, subject to such limitations laid down under that Act.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Section 58(2)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(2) The Cyber Appellate Tribunal shall have, for the purposes of discharging their functions under this Act, the same powers as are vested in a civil court under the Code of Civil Procedure, 1908, while trying a suit, in respect of the following matters, namely -&lt;/p&gt;
&lt;p&gt;(b) requiring the discovery and production of documents or other electronic records;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;While the Cyber Appellate Tribunal and the Controller of Certifying Authorities both have the power to call for information under the IT Act, these powers can be exercised only for limited purposes since the jurisdiction of both authorities is limited to the procedural provisions of the IT Act and they do not have the jurisdiction to investigate penal provisions. In practice, the penal provisions of the IT Act are investigated by the regular law enforcement apparatus of India, which use statutory provisions for production orders applicable in the offline world to computer systems as well. It is a very common practice amongst law enforcement authorities to issue orders under the Code of Criminal Procedure, 1973 (section 91) or the relevant provisions of the Income Tax Act, 1961 to compel production of information contained in a computer system. The power to order production of a “document or other thing” under section 91 of the Criminal Procedure Code is wide enough to cover all types of information which may be residing in a computer system and can even include the entire computer system itself.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 19 – Search and seizure of stored computer data&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to search or similarly access:&lt;/p&gt;
&lt;p&gt;a a computer system or part of it and computer data stored therein; and&lt;/p&gt;
&lt;p&gt;b a computer-data storage medium in which computer data may be stored in its territory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Each Party shall adopt such legislative and other measures as may be necessary to ensure that where its authorities search or similarly access a specific computer system or part of it, pursuant to paragraph 1.a, and have grounds to believe that the data sought is stored in another computer system or part of it in its territory, and such data is lawfully accessible from or available to the initial system, the authorities shall be able to expeditiously extend the search or similar accessing to the other system.&lt;/p&gt;
&lt;p&gt;3 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to seize or similarly secure computer data accessed according to paragraphs 1 or 2. These measures shall include the power to:&lt;/p&gt;
&lt;p&gt;a seize or similarly secure a computer system or part of it or a computer-data storage&lt;/p&gt;
&lt;p&gt;medium;&lt;/p&gt;
&lt;p&gt;b make and retain a copy of those computer data;&lt;/p&gt;
&lt;p&gt;c maintain the integrity of the relevant stored computer data;&lt;/p&gt;
&lt;p&gt;d render inaccessible or remove those computer data in the accessed computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to order any person who has knowledge about the functioning of the computer system or measures applied to protect the computer data therein to provide, as is reasonable, the necessary information, to enable the undertaking of the measures referred to in paragraphs 1 and 2.&lt;/p&gt;
&lt;p&gt;5 The powers and procedures referred to in this article shall be subject to Articles 14 and15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;76 Confiscation &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any computer, computer system, floppies, compact disks, tape drives or any other accessories related thereto, in respect of which any provision of this Act, rules, orders or regulations made thereunder has been or is being contravened, shall be liable to confiscation:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Provided &lt;/b&gt;that where it is established to the satisfaction of the court adjudicating the confiscation that the person in whose possession, power or control of any such computer, computer system, floppies, compact disks, tape drives or any other accessories relating thereto is found is not responsible for the contravention of the provisions of this Act, rules, orders or regulations made there under, the court may, instead of making an order for confiscation of such computer, computer system, floppies, compact disks, tape drives or any other accessories related thereto, make such other order authorized by this Act against the person contravening of the provisions of this Act, rules, orders or regulations made there under as it may think fit.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;While Article 19 provides for the power to search and seize computer systems for the investigation into criminal offences of any type of kind, section 76 of the IT Act is limited only to contraventions of the provisions of the Act, rules, orders or regulations made thereunder. However, this does not mean that Indian law enforcement authorities do not have the power to search and seize a computer system for crimes other than those contained in the IT Act; just as in the case of Article 18, the authorities in India are free to use the provisions contained in the Criminal Procedure Code and other sectoral legislations which allow for seizure of property to seize computer systems when investigating criminal offences.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 20 – Real-time collection of traffic data&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to:&lt;/p&gt;
&lt;p&gt;a collect or record through the application of technical means on the territory of that Party, and&lt;/p&gt;
&lt;p&gt;b compel a service provider, within its existing technical capability:&lt;/p&gt;
&lt;p&gt;i to collect or record through the application of technical means on the territory of that Party; or&lt;/p&gt;
&lt;p&gt;ii to co-operate and assist the competent authorities in the collection or recording of,&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;traffic data, in real-time, associated with specified communications in its territory transmitted by means of a computer system.&lt;/p&gt;
&lt;p&gt;2 Where a Party, due to the established principles of its domestic legal system, cannot adopt the measures referred to in paragraph 1.a, it may instead adopt legislative and other measures as may be necessary to ensure the real-time collection or recording of traffic data associated with specified communications transmitted in its territory, through the application of technical means on that territory.&lt;/p&gt;
&lt;p&gt;3 Each Party shall adopt such legislative and other measures as may be necessary to oblige a service provider to keep confidential the fact of the execution of any power provided for in this article and any information relating to it.&lt;/p&gt;
&lt;p&gt;4 The powers and procedures referred to in this article shall be subject to Articles 14 and 15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;69B Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber Security &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(1) The Central Government may, to enhance Cyber Security and for identification, analysis and prevention of any intrusion or spread of computer contaminant in the country, by notification in the official Gazette, authorize any agency of the Government to monitor and collect traffic data or information generated, transmitted, received or stored in any computer resource.&lt;/p&gt;
&lt;p&gt;(2) The Intermediary or any person in-charge of the Computer resource shall when called upon by the agency which has been authorized under sub-section (1), provide technical assistance and extend all facilities to such agency to enable online access or to secure and provide online access to the computer resource generating , transmitting, receiving or storing such traffic data or information.&lt;/p&gt;
&lt;p&gt;(3) The procedure and safeguards for monitoring and collecting traffic data or information, shall be such as may be prescribed.&lt;/p&gt;
&lt;p&gt;(4) Any intermediary who intentionally or knowingly contravenes the provisions of sub-section (2) shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.&lt;/p&gt;
&lt;p&gt;Explanation: For the purposes of this section, (i) "Computer Contaminant" shall have the meaning assigned to it in section 43.&lt;/p&gt;
&lt;p&gt;(ii) "traffic data" means any data identifying or purporting to identify any person, computer system or computer network or location to or from which the communication is or may be transmitted and includes communications origin, destination, route, time, date, size, duration or type of underlying service or any other information.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Section 69B in the IT Act enables the government to authorise the monitoring and collection of traffic data through any computer system. Under the Convention, orders for collection and recording of traffic data can be given for the purposes mentioned in Articles 14 and 15. On the other hand, as per the Information Technology (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009, an order for monitoring may be issued for any of the following purposes relating to cyber security:&lt;/p&gt;
&lt;p&gt;(a) forecasting of imminent cyber incidents;&lt;/p&gt;
&lt;p&gt;(b) monitoring network application with traffic data or information on computer resource;&lt;/p&gt;
&lt;p&gt;(c) identification and determination of viruses or computer contaminant;&lt;/p&gt;
&lt;p&gt;(d) tracking cyber security breaches or cyber security incidents;&lt;/p&gt;
&lt;p&gt;(e) tracking computer resource breaching cyber security or spreading virus or computer contaminants;&lt;/p&gt;
&lt;p&gt;(f) identifying or tracking of any person who has breached, or is suspected of having breached or being likely to breach cyber security;&lt;/p&gt;
&lt;p&gt;(g) undertaking forensic of the concerned computer resource as a part of investigation or internal audit of information security practices in the computer resources;&lt;/p&gt;
&lt;p&gt;(h) accessing a stored information for enforcement of any provisions of the laws relating to cyber security for the time being in force;&lt;/p&gt;
&lt;p&gt;(i) any other matter relating to cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As can be seen from the above, the reasons for which an order for monitoring traffic data can be issued are extremely wide, this is in stark contrast to the reasons for which an order for interception of content data may be issued under section 69. The Rules also provide that the intermediary shall not disclose the existence of a monitoring order to any third party and shall take all steps necessary to ensure extreme secrecy in the matter of monitoring of traffic data.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 21 – Interception of content data&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary, in relation to a range of serious offences to be determined by domestic law, to empower its competent authorities to:&lt;/p&gt;
&lt;p&gt;a collect or record through the application of technical means on the territory of that Party, and&lt;/p&gt;
&lt;p&gt;b compel a service provider, within its existing technical capability:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i to collect or record through the application of technical means on the territory of that Party, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii to co-operate and assist the competent authorities in the collection or recording of,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;content data, in real-time, of specified communications in its territory transmitted by means of a computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Where a Party, due to the established principles of its domestic legal system, cannot adopt the measures referred to in paragraph 1.a, it may instead adopt legislative and other measures as may be necessary to ensure the real-time collection or recording of content data on specified communications in its territory through the application of technical means on that territory.&lt;/p&gt;
&lt;p&gt;3 Each Party shall adopt such legislative and other measures as may be necessary to oblige a service provider to keep confidential the fact of the execution of any power provided for in this article and any information relating to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4 The powers and procedures referred to in this article shall be subject to Articles 14 and 15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;69 Powers to issue directions for interception or monitoring or decryption of any information through any computer resource &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Where the central Government or a State Government or any of its officer specially authorized by the Central Government or the State Government, as the case may be, in this behalf may, if is satisfied that it is necessary or expedient to do in the interest of the sovereignty or integrity of India, defense of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above or for investigation of any offence, it may, subject to the provisions of sub-section (2), for reasons to be recorded in writing, by order, direct any agency of the appropriate Government to intercept, monitor or decrypt or cause to be intercepted or monitored or decrypted any information transmitted received or stored through any computer resource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Procedure and safeguards subject to which such interception or monitoring or decryption may be carried out, shall be such as may be prescribed&lt;/p&gt;
&lt;p&gt;(3) The subscriber or intermediary or any person in charge of the computer resource shall, when called upon by any agency which has been directed under sub section (1), extend all facilities and technical assistance to -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) provide access to &lt;b&gt;or secure access to &lt;/b&gt;the computer resource containing such information; generating, transmitting, receiving or storing such information; or&lt;/p&gt;
&lt;p&gt;(b) intercept or monitor or decrypt the information, as the case may be&lt;b&gt;; &lt;/b&gt;or&lt;/p&gt;
&lt;p&gt;(c) provide information stored in computer resource.&lt;/p&gt;
&lt;p&gt;(4) The subscriber or intermediary or any person who fails to assist the agency referred to in sub-section (3) shall be punished with an imprisonment for a term which may extend to seven years and shall also be liable to fine.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;There has been a lot of academic research and debate around the exercise of powers under section 69 of the IT Act, but the current piece is not the place for a standalone critique of section 69.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; The analysis here is limited to a comparison of the provisions of Article 20 vis-à-vis section 69 of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In that background, it needs to be pointed out that two important issues mentioned in Article 20 of the Convention are not specifically mentioned in section 69B, viz. (i) that the order should be only for specific computer data, and (ii) that the intermediary should keep such an order confidential; these requirements are covered by Rules 9 and 20 of the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009, respectively.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 22 – Jurisdiction&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish jurisdiction over any offence established in accordance with Articles 2 through 11 of this Convention, when the offence is committed:&lt;/p&gt;
&lt;p&gt;a in its territory; or&lt;/p&gt;
&lt;p&gt;b on board a ship flying the flag of that Party; or&lt;/p&gt;
&lt;p&gt;c on board an aircraft registered under the laws of that Party; or&lt;/p&gt;
&lt;p&gt;d by one of its nationals, if the offence is punishable under criminal law where it was committed or if the offence is committed outside the territorial jurisdiction of any State.&lt;/p&gt;
&lt;p&gt;2 Each Party may reserve the right not to apply or to apply only in specific cases or conditions the jurisdiction rules laid down in paragraphs 1.b through 1.d of this article or any part thereof.&lt;/p&gt;
&lt;p&gt;3 Each Party shall adopt such measures as may be necessary to establish jurisdiction over the offences referred to in Article 24, paragraph 1, of this Convention, in cases where an alleged offender is present in its territory and it does not extradite him or her to another Party, solely on the basis of his or her nationality, after a request for extradition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4 This Convention does not exclude any criminal jurisdiction exercised by a Party in accordance with its domestic law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5 When more than one Party claims jurisdiction over an alleged offence established in accordance with this Convention, the Parties involved shall, where appropriate, consult with a view to determining the most appropriate jurisdiction for prosecution.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;1. Short Title, Extent, Commencement and Application &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) It shall extend to the whole of India and, save as otherwise provided in this Act, it applies also to any offence or contravention hereunder committed outside India by any person.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;75 Act to apply for offence or contraventions committed outside India &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Subject to the provisions of sub-section (2), the provisions of this Act shall apply also to any offence or contravention committed outside India by any person irrespective of his nationality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) For the purposes of sub-section (1), this Act shall apply to an offence or contravention committed outside India by any person if the act or conduct constituting the offence or contravention involves a computer, computer system or computer network located in India.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The Convention provides for extra territorial jurisdiction only for crimes committed outside the State by nationals of that State. However, the IT Act applies even to offences under the Act committed by foreign nationals outside India, as long as the act involves a computer system or computer network located in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike para 3 of Article 22 of the Convention, the IT Act does not touch upon the issue of extradition. Cases involving extradition would therefore be dealt with by the general law of the land in respect of extradition requests contained in the Extradition Act, 1962. The Convention requires that in cases where the state refuses to extradite an alleged offender, it should establish jurisdiction over the offences referred to in Article 21(1) so that it can proceed against that offender itself. In this regard, it must be pointed out that Section 34A of the Extradition Act, 1962 provides that “Where the  Central Government is  of the  opinion that  a  fugitive  criminal  cannot  be surrendered or  returned pursuant  to a request for extradition from a foreign State,  it may, as it thinks fit, take steps to prosecute such fugitive criminal in India.” Thus the Extradition Act gives the Indian government the power to prosecute an individual in the event that such individual cannot be extradited.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;International Cooperation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chapter III of the Convention deals specifically with international cooperation between the signatory parties. Such co-operation is to be carried out both "in accordance with the provisions of this Chapter" and "through application of relevant international agreements on international cooperation in criminal matters, arrangements agreed to on the basis of uniform or reciprocal legislation, and domestic laws." The latter clause establishes the general principle that the provisions of Chapter III do not supersede the provisions of international agreements on mutual legal assistance and extradition or the relevant provisions of domestic law pertaining to international co-operation.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Although the Convention grants primacy to mutual treaties and agreements between member States, in certain specific circumstances it also provides for an alternative if such treaties do not exist between the member states (Article 27 and 28). The Convention also provides for international cooperation on certain issues which may not have been specifically provided for in mutual assistance treaties entered into between the parties and need to be spelt out due to the unique challenges posed by cyber crimes, such as expedited preservation of stored computer data (Article 29) and expedited disclosure of preserved traffic data (Article 30). Contentious issues such as access to stored computer data, real time collection of traffic data and interception of content data have been specifically left by the Convention to be dealt with as per existing international instruments or arrangements between the parties.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The broad language and wide terminology used IT Act seems to cover a number of the cyber crimes mentioned in the Budapest Convention, even though India has not signed and ratified the same. Penal provisions such as illegal access (Article 2), data interference (Article 4), system interference (Article 5), offence related to child pornography (Article 9), attempt and aiding or abetting (Article 11), corporate liability (Article 12) are substantially covered and reflected in the IT Act in a manner very similar to the requirements of the Convention. Similarly procedural provisions such as search and seizure of stored computer data (Article 19), real-time collection of traffic data (Article 20), interception of content data (Article 21) and Jurisdiction (Article 22) are also substantially reflected in the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However certain penal provisions mentioned in the Convention such as computer related forgery (Article 7), computer related fraud (Article 8) are not provided for specifically in the IT Act but such offences are covered when provisions of the Indian Penal Code, 1860 are read in conjugation with provisions of the IT Act. Similarly procedural provisions such as expedited preservation of stored computer data (Article 16) and production order (Article 18) are not specifically provided for in the IT Act but are covered under Indian law through the provisions of the Code of Criminal Procedure, 1973.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the above two categories there are certain provisions such as misuse of devices (Article 6) and Illegal interception (Article 3) which may not be specifically covered at all under Indian law, but may conceivably be said to be covered through an expansive reading of provisions of the Indian Penal Code and the IT Act. It may therefore be said that even though India has not signed or ratified the Budapest Convention, the legal regime in India is substantially in compliance with the provisions and requirements contained therein.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, the Convention on Cybercrime is perhaps the most important international multi state instruments that may be used to combat cybercrime, not merely because the provisions thereunder may be used as a model to bolster national/local laws by any State, be it a signatory or not (as in the case of India) but also because of the mechanism it lays down for international cooperation in the field of cyber terrorism. In an increasingly interconnected world where more and more information of individuals is finding its way to the cloud or other networked infrastructure the international community is making great efforts to generate norms for increased international cooperation to combat cybercrime and cyber terrorism. While the Convention is one such multilateral effort, States are also proposing to use bilateral treaties to enable them to better fight cybercrime, the United States CLOUD Act, being one such effort. In the backdrop of these novel efforts the role to be played by older instruments such as the Convention on Cybercrime as well as by important States such as India is extremely crucial.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Explanatory Report to the Convention on Cybercrime, Para 304, https://rm.coe.int/16800cce5b.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; The analysis here has been limited to only Chapter I and Chapter II of the Convention, as it is only adherence to these two chapters that is required under the CLOUD Act.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; The only possible enforcement that may be done with regard to the Convention on Cybercrime is that the Council of Europe may put pressure on the signatory State to amend its local laws (if it is refusing to do so) otherwise it would be in violation of its obligations as a member of the European Union.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Alexander Seger, “India and the Budapest Convention: Why Not?”, &lt;a href="https://www.orfonline.org/expert-speak/india-and-the-budapest-convention-why-not/"&gt;https://www.orfonline.org/expert-speak/india-and-the-budapest-convention-why-not/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Explanatory Report to the Convention on Cybercrime, Para 50, https://rm.coe.int/16800cce5b.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; India is a party to the Berne Convention on Literary and Artistic Works, the Agreement on Trade Related Intellectual Property Rights and the Rome Convention. India has also recently (July 4, 2018) announced that it will accede to the WIPO Copyright Treaty as well as the WIPO Performances and Phonographs Treaty.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; The test under the Convention is that the relevant person would be the one who has a leading position within the company, based on:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;a power of representation of the legal person;&lt;/li&gt;
&lt;li&gt;an authority to take decisions on behalf of the legal person;&lt;/li&gt;
&lt;li&gt;an authority to exercise control within the legal person.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt;Vipul Kharbanda and Elonnai Hickock, “MLATs and the proposed Amendments to the US Electronic Communications Privacy Act”, &lt;a href="https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act"&gt;https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; The term “human rights” has been defined in the Act as “rights relating to life, liberty, equality and dignity of the individual guaranteed by the Constitution or embodied in the International Covenants and enforceable by courts in India”.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Explanatory Report to the Convention on Cybercrime, Para 151, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;. .&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; A similar power of interception is available under section 5 of the Telegraph Act, 1885, but that extends only to interception of telegraphic communication and does not extend to communications exchanged through computer networks.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Explanatory Report to the Convention on Cybercrime, Para 244, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act'&gt;https://cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-11-20T16:18:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/speculative-futures-lab-on-artificial-intelligence-in-media-entertainment-and-gaming">
    <title>Speculative Futures Lab on Artificial Intelligence in Media, Entertainment, and Gaming</title>
    <link>https://cis-india.org/internet-governance/news/speculative-futures-lab-on-artificial-intelligence-in-media-entertainment-and-gaming</link>
    <description>
        &lt;b&gt;Pranav Manjesh Bidare attended the event organised by Quicksand between November 16 and 18, 2018 in Bangalore as a panelist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Pranav was a panelist in the session discussing "Ethics of AI in the Creative  spaces" on November 17, alongside Urvashi Aneja, and Abishek Reddy from  Tandem Research. For more info &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/Quicksand%20AI%20Futures%20Lab.pdf"&gt;see this&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/speculative-futures-lab-on-artificial-intelligence-in-media-entertainment-and-gaming'&gt;https://cis-india.org/internet-governance/news/speculative-futures-lab-on-artificial-intelligence-in-media-entertainment-and-gaming&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2018-12-05T03:12:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads">
    <title>Briefing on BBC News pan-India research on how 'fake news' / digital misinformation spreads </title>
    <link>https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads</link>
    <description>
        &lt;b&gt;Amber Sinha participated in a special private briefing on the BBC's pan India research on how misinformation spreads. The briefing was conducted on November 16, 2018 in New Delhi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The briefing was very useful in understanding both the methodology employed by the researchers, and how they arrived ate certain findings. The report can be &lt;a class="external-link" href="https://downloads.bbc.co.uk/mediacentre/duty-identity-credibility.pdf"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads'&gt;https://cis-india.org/internet-governance/news/briefing-on-bbc-news-pan-india-research-on-how-fake-news-digital-misinformation-spreads&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-05T14:01:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners">
    <title>Building a Community of Practice: Reflections from 2nd All Partners</title>
    <link>https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners</link>
    <description>
        &lt;b&gt;On Wednesday, November 14th, the Partnership on AI held its 2nd annual All Partners Meeting in San Francisco, California. Representatives from our 80+ member organizations – for-profit companies, civil society organizations, academic institutions, and advocacy groups – traveled from across the globe to reflect on 2018 progress, and to plan for the future.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Elonnai Hickok participated in the event held in San Francisco on November 14 and 15, 2018. The event was organized by Partnership on AI. On November 14, Elonnai spoke on the panel on the PAI working groups and on November 15 she co-lead the AI Labor and Economy working group meeting as co-chair of the group. More details can be &lt;a class="external-link" href="https://www.partnershiponai.org/building-a-community-of-practice-reflections-from-our-2nd-all-partners-meeting/"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners'&gt;https://cis-india.org/internet-governance/news/building-a-community-of-practice-reflections-from-2nd-all-partners&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-01T04:18:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/workshop-on-cybersecurity-illustrations">
    <title>Workshop on Cybersecurity Illustrations</title>
    <link>https://cis-india.org/internet-governance/events/workshop-on-cybersecurity-illustrations</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) is organizing a workshop to engage with the design community in order to examine, explore, and expand this visual narrative of cybersecurity.&lt;/b&gt;
        
&lt;h2&gt;Concept Note&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The notions around cybersecurity are deeply influenced by the visual associations available on it in the public sphere. The existing imagery on cybersecurity usually consists of stereotypical visual elements such as a silhouette of a man, binary codes, locks, etc. The dark colour palette in these visuals primarily comprising shades of blues and greens adds to the masculine imagery. The conception of the term is limited by these images. The Centre for Internet and Society hence, plans to engage with the design community in order to examine, explore, and expand this visual narrative of cybersecurity. CIS is organising a workshop on the 15th of November, in collaboration with a design collective in order to brainstorm ideas on creating illustrations for cybersecurity that shift the focus from coding to the human aspects.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Presently, the visuals suggest only data breaches when it comes to cybersecurity. Several nuanced concepts such as the implication on more vulnerable populations are not reflected in the images. The illustrations can also present the different stakeholders in the cybersecurity ecosystem. The workshop would be directed at generating more dialogues on cybersecurity through visuals.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Agenda&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;10:00 a.m. to 11:00 a.m.: Introduction and Presentation of the Brief&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;11:30 a.m. to 1:30 p.m.: Brainstorming session (ideation and suggestions from participants for keywords)&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;1:30 p.m. to 2:30 p.m.: Lunch&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;2:30 p.m. to 5:30 p.m.: Breakaway session in groups (creation of draft illustrations)&lt;/li&gt;&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/workshop-on-cybersecurity-illustrations.pdf"&gt;Download the file to read more&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;You can find the event report &lt;a href="https://cis-india.org/internet-governance/workshop-on-cyber-security-illustrations" class="internal-link" title="Workshop on Cyber Security Illustrations"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/workshop-on-cybersecurity-illustrations'&gt;https://cis-india.org/internet-governance/events/workshop-on-cybersecurity-illustrations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-10T06:13:50Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-31-on-icanns-fellowship-program">
    <title>DIDP #32 On ICANN's Fellowship Program </title>
    <link>https://cis-india.org/internet-governance/blog/didp-31-on-icanns-fellowship-program</link>
    <description>
        &lt;b&gt;In furtherance of its capacity building functions, ICANN selects Fellows for every public meeting. These are individuals from underserved and underrepresented communities who are trained to become active participants in the ICANN community.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;These fellows are assigned a mentor and receive training on ICANN's various areas of engagement. They are also given travel assistance to attend the meeting. While the process and selection criteria is detailed on their website, CIS had some questions as to the execution of these.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Our DIDP questioned the following aspects:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Has any individual received the ICANN Fellowship more than the stated maximum limit of 3 times?&lt;/li&gt;
&lt;li&gt;If so, whose decision and what was the justification given for awarding it the 4th time and any other times after that?&lt;/li&gt;
&lt;li&gt;What countries did any such individuals belong to?&lt;/li&gt;
&lt;li&gt;How many times has the limit of 3 been breached while giving fellowships?&lt;/li&gt;
&lt;li&gt;What recording mechanisms are being used to ensure that awarding of these fellowships is kept track of, stored and updated? Are these public or privately made available anywhere? &lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;You can &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/fellowship-didp"&gt;access the request here&lt;/a&gt;.&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-31-on-icanns-fellowship-program'&gt;https://cis-india.org/internet-governance/blog/didp-31-on-icanns-fellowship-program&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>akriti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-11-12T15:58:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/roundtable-on-intermediary-liability-and-gender-based-violence-at-the-digital-citizen-summit-2018">
    <title>Roundtable on Intermediary Liability and Gender Based Violence at the Digital Citizen Summit, 2018</title>
    <link>https://cis-india.org/internet-governance/news/roundtable-on-intermediary-liability-and-gender-based-violence-at-the-digital-citizen-summit-2018</link>
    <description>
        &lt;b&gt;Akriti Bopanna and Ambika Tandon conducted a panel on 'Gender and Intermediary Liability' at the Digital Citizen Summit, hosted by the Digital Empowerment Foundation, on November 1, 2018 at India International Centre, New Delhi.&lt;/b&gt;
        &lt;p class="moz-quote-pre"&gt;Ambika was the moderator for the panel, with Apar Gupta, Jyoti Pandey, Amrita Vasudevan, Anja Kovacs, and Japleen Pasricha as speakers. Click to read the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/concept-note-digital-citizen-summit"&gt;concept note&lt;/a&gt; and the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/dcs-2018-agenda"&gt;agenda&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/roundtable-on-intermediary-liability-and-gender-based-violence-at-the-digital-citizen-summit-2018'&gt;https://cis-india.org/internet-governance/news/roundtable-on-intermediary-liability-and-gender-based-violence-at-the-digital-citizen-summit-2018&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2018-11-07T02:55:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/human-rights-review-of-the-verification-code-extension-for-epp">
    <title>Human rights review of the verification code extension for EPP</title>
    <link>https://cis-india.org/internet-governance/news/human-rights-review-of-the-verification-code-extension-for-epp</link>
    <description>
        &lt;b&gt;On September 20, 2018 Gurshabad Grover sent a review of the human rights considerations in the Internet Draft, 'Verification Code Extension for the Extensible Provisioning Protocol (EPP)' (draft-ietf-regext-verificationcode-04), which is a document adopted by the Registration Protocols Extensions (regext) Working Group at the IETF.&lt;/b&gt;
        &lt;p&gt;The review was drafted with research assistance Paul Kurian. You can read the review (and find the subsequent discussion) &lt;a class="external-link" href="https://www.ietf.org/mail-archive/web/regext/current/msg01768.html"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/human-rights-review-of-the-verification-code-extension-for-epp'&gt;https://cis-india.org/internet-governance/news/human-rights-review-of-the-verification-code-extension-for-epp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-10T16:04:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/connections-2018">
    <title>Connections 2018</title>
    <link>https://cis-india.org/internet-governance/news/connections-2018</link>
    <description>
        &lt;b&gt;Gurshabad Grover attended Connections 2018, a pre-IETF event organised by the India Internet Engineering Society (IIESoc) in Bangalore on October 31 and November 1, 2018. &lt;/b&gt;
        &lt;p&gt;IIESoC organized the event with an objective to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Discuss the interests and issues important to the network deployment, operation and design of networks in India as they impact IETF standards.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Educate and prepare new members for IETF involvement. Facilitate member involvement in IETF areas. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Provide information, guidance and direction to assist Indian community in involvement in the IETF.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;Work from different IETF working groups was discussed in four tracks: IoT Standardisation, SDN and Network Operations, IPv6, and Deployments.&lt;/div&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;a class="external-link" href="https://www.connections.iiesoc.in/programme"&gt;Click&lt;/a&gt; to view the agenda&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/connections-2018'&gt;https://cis-india.org/internet-governance/news/connections-2018&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IoT</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-10T15:32:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindu-businessline-arindrajit-basu-october-30-2018-lessons-from-us-response-to-cyber-attacks">
    <title>Lessons from US response to cyber attacks</title>
    <link>https://cis-india.org/internet-governance/blog/hindu-businessline-arindrajit-basu-october-30-2018-lessons-from-us-response-to-cyber-attacks</link>
    <description>
        &lt;b&gt;Publicly attributing the attacks to a state or non-state actor is vital for building a credible cyber deterrence strategy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://www.thehindubusinessline.com/opinion/lessons-from-us-response-to-cyber-attacks-ep/article25372326.ece"&gt;Hindu Businessline&lt;/a&gt; on October 30, 2018. The article was edited by Elonnai Hickok.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In September, amidst the brewing of a new found cross-continental romance between Kim Jong-Un and Donald Trump, the US Department of Justice filed a criminal complaint indicting North Korean hacker Park Jin Hyok for playing a role in at least three massive cyber operations against the US. This included the Sony data breach of 2014; the Bangladesh bank heist of 2016 and the WannaCry ransomware attack in 2017. This indictment was followed by one on October 4, of seven officers in the GRU, Russia’s military agency, for “persistent and sophisticated computer intrusions.” Evidence adduced in support included forensic cyber evidence like similarities in lines of code or analysis of malware and other factual details regarding the relationship between the employers of the indicted individuals and the state in question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it is unlikely that prosecutions will ensue, indicting  individuals responsible for cyber attacks offers an attractive option  for states looking to develop a credible cyber deterrence strategy.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Attributing cyber attacks&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Technical  uncertainty in attributing attacks to a specific actor has long  fettered states from adopting defensive or offensive measures in  response to an attack and garnering support from multilateral fora.  Cyber attacks are multi-stage, multi-step and multi-jurisdictional,  which complicates the attribution process and removes the attacker from  the infected networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts at the RAND Corporation have argued  that technical challenges to attribution should not detract from  international efforts to adopt a robust, integrated and  multi-disciplinary approach to attribution, which should be seen as a  political process operating in symbiosis with technical efforts. A  victim state must communicate its findings and supporting evidence to  the attacking state in a bid to apply political pressure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clear  publication of the attribution process becomes crucial as it furthers  public credibility in investigating authorities; enables information  exchange among security researchers and fosters deterrence by the  adversary and potential adversaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although public attributions  need not take the form of a formal indictment and are often conducted  through statements by foreign ministries, a criminal indictment is more  legitimate as it needs to comply with the rigorous legal and evidentiary  standards required by the country’s legal system. Further, an  indictment allows for the attack to be conceptualised as a violation of  the rule of law in addition to being a geopolitical threat vector.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Lessons for India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India  is yet to publicly attribute a cyber attack to any state or non-state  actor. This is surprising given that an overwhelming percentage of  attacks on Indian websites are perpetrated by foreign states or  non-state actors, with 35 per cent of attacks emanating from China, as  per a report by the Indian Computer Emergency Response Team (CERT-IN),  the national nodal agency under the Ministry of Electronics and  Information Technology (MEITY) which deals with cyber threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Along  with other bodies, such as the National Critical Information Protection  Centre (NCIIPC) which is the nodal central agency for the protection of  critical information infrastructure, CERT-IN forms part of an ecosystem  of nodal agencies designed to guarantee national cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There  are three key lessons that policy makers involved in this ecosystem can  take away from the WannaCry attribution process and the Park  indictment. First, there is a need for multi-stakeholder collaboration  through sharing of research, joint investigations and combined  vulnerability identification among the various actors employed by the  government, law enforcement authorities and private cyber security  firms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The affidavit suggested that the FBI had used information  from various law enforcement personnel, computer scientists at the FBI;  Mandiant — a cyber security firm retained by the US Attorney’s Office  and publicly available materials produced by cyber security companies.  Second, the standards of attribution need to demonstrate compliance both  with the evidentiary requirements of Indian criminal law and the  requirements in the International Law on State Responsibility. The  latter requires an attribution to demonstrate that a state had  ‘effective control’ over the non-state actor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, the  attribution must be communicated to the adversary in a manner that does  not risk military escalation. Despite the delicate timing of the  indictment, Park’s prosecution by the FBI did not dampen the temporary  thaw in relations between US and North Korea.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While building  capacity to improve resilience, detect attacks and improve attribution  capabilities should be a priority, we need to remember that regardless  of the breakthrough in both human and infrastructural capacities,  attributing cyber attacks will never be an exercise in certainty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India  will need to marry its improved capacity with strategic geopolitical  posturing. Lengthy indictments may not deter all potential adversaries  but may be a tool in fostering a culture of accountability in  cyberspace.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindu-businessline-arindrajit-basu-october-30-2018-lessons-from-us-response-to-cyber-attacks'&gt;https://cis-india.org/internet-governance/blog/hindu-businessline-arindrajit-basu-october-30-2018-lessons-from-us-response-to-cyber-attacks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-11-01T05:53:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/october-2018-newsletter">
    <title>October 2018 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/october-2018-newsletter</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Published an article titled &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/digital-technology-engaging-pedagogy-through-hindi-wikipedia-a-case-study"&gt;"Digital Technology Engaging Pedagogy through Hindi Wikipedia - A Case Study"&lt;/a&gt; in International Journal of English Language, Literature in Humanities. The authors of the article were Hindi faculty members of Christ University. Ananth Subray from Centre for Internet &amp;amp; Society provided research assistance. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ananth Subray wrote an article &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/history-of-wikipedia-education-programme-at-christ-deemed-to-be-university"&gt;"History of Wikipedia Education programme at Christ University"&lt;/a&gt; which has given an insight of Christ Wikipedia Education Program, how students are involved in different capacities in the program and shares the best practices of the Education Program.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS-A2K &lt;a class="external-link" href="http://cis-india.org/a2k/events/van-bodh-workshop-for-content-development-on-forest-resources-at-gadchiroli"&gt;has collaborated with Tribal Research and Training Institute (TRTI) to facilitate development of Open knowledge resources on Community Forest Resource and content development in Wikimedia projects&lt;/a&gt; with community participation. These contents will become a part of "Van Bodh Knowledge repository". &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Elonnai Hickok and Arindrajit Basu &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/conceptualizing-an-international-security-regime-for-cyberspace"&gt;co-authored a research paper&lt;/a&gt; that was published as part of the Briefings from the Research and Advisory Group (RAG) of the Global Commission on the Stability of Cyberspace (GCSC) for the Full Commission Meeting held at Bratislava in 2018.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Arindrajit Basu in an &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/oxford-human-rights-hub-arindrajit-basu-october-23-2018-discrimination-in-the-age-of-artificial-intelligence"&gt;article published by Oxford Human Rights Hub&lt;/a&gt; has argued that artificial Intelligence offers the potential to augment many existing bureaucratic processes and improve human capacity, if implemented in accordance with principles of the rule of law and international human rights norms.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Agnidipto Tarafder and Arindrajit Basu in an &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/socio-legal-review-national-law-school-of-india-university-agnidipto-tarafder-and-arandrajit-basu-377-bites-the-dust"&gt;article published in Socio-Legal Review&lt;/a&gt; has traced the journey of the recent 377 (Navtej Johar v Union of India) and assessed its societal implications.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS invites applications for &lt;a class="external-link" href="https://cis-india.org/jobs/call-for-research-fellows-field-studies-of-platform-work"&gt;*three Research Fellow positions*&lt;/a&gt; to undertake field studies of platform-work in two cities, including Bangalore and another city (to be decided). The project seeks to produce a comparative understanding of at least two different kinds of platform-work as unfolding across Indian cities. Each fellow will be responsible for one field study (one form of work in one city) based on their language fluency and research experience.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Articles&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/socio-legal-review-national-law-school-of-india-university-agnidipto-tarafder-and-arandrajit-basu-377-bites-the-dust"&gt;377 Bites the Dust: Unpacking the long and winding road to the judicial decriminalization of homosexuality in India&lt;/a&gt; (Agnidipto Tarafder and Arindrajit Basu; Socio Legal Review; October 11, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-october-14-2018-digital-native-time-to-walk-the-talk"&gt;Digital Native: Time to Walk the Talk &lt;/a&gt;(Nishant Shah; Indian Express; October 14, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/bloomberg-quint-pranesh-prakash-october-15-2018-why-data-localisation-might-lead-to-unchecked-surveillance"&gt;Why Data Localisation Might Lead To Unchecked Surveillance&lt;/a&gt; (Pranesh Prakash; Bloomberg Quint; October 15, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/oxford-human-rights-hub-arindrajit-basu-october-23-2018-discrimination-in-the-age-of-artificial-intelligence"&gt;Discrimination in the Age of Artificial Intelligence&lt;/a&gt; (Arindrajit Basu; Oxford Human Rights Hub; October 23, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-october-28-2018-digital-native-hashtag-fatigue"&gt;Digital Native: Hashtag Fatigue&lt;/a&gt; (Nishant Shah; Indian Express; October 28, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/hindu-businessline-arindrajit-basu-october-30-2018-lessons-from-us-response-to-cyber-attacks"&gt;Lessons from US response to cyber attacks&lt;/a&gt; (Arindrajit Basu; Hindu Businessline; October 30, 2018). The article was edited by Elonnai Hickok.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Media Coverage&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-herald-october-4-2018-surupasree-sarmmah-gmail-users-beware-while-giving-access"&gt;Gmail users beware while giving access&lt;/a&gt; (Surupasree Sarmmah; Deccan Herald; October 4, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-herald-october-10-2018-anila-kurian-are-online-shows-obscene"&gt;Are online shows obscene?&lt;/a&gt; (Anila Kurian; Deccan Herald; October 10, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindustan-times-october-12-2018-internet-services-not-to-be-affected-as-dns-servers-undergo-update"&gt;Internet services not to be affected as DNS servers undergo update&lt;/a&gt; (Hindustan Times; October 12, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-divya-shekhar-october-13-2018-spending-too-much-time-on-social-media"&gt;Spending too much time on social media? Tech abuse may lead to mental health issues&lt;/a&gt; (Divya Shekhar; Economic Times; October 13, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-october-14-2018-sales-of-surveillance-cameras-are-soaring-raising-questions-about-privacy"&gt;Sales of surveillance cameras are soaring, raising questions about privacy&lt;/a&gt; (Rahul Sachitanand; Economic Times; October 14, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/vccircle-october-17-2018-anand-j-not-surprised-by-indian-govt-data-localisation-directives"&gt;Not Surprised by Indian govt's data localisation directives: Michael Dell&lt;/a&gt; (Anand J.; VC Circle; October 17, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/scroll-kanishk-karan-october-18-2018-factcheck-no-phones-of-users-who-provided-only-aadhaar-as-proof-of-identity-wont-be-disconnected"&gt;Factcheck: No, phones of users who provided only Aadhaar as proof of identity won’t be disconnected&lt;/a&gt; (Kanishk Karan; Scroll.in; October 18, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindustan-times-october-19-2018-vidhi-choudhary-rural-indians-don-t-trust-messages-on-whatsapp-blindly-survey"&gt;Rural Indians don’t trust messages on WhatsApp blindly: Survey&lt;/a&gt; (Vidhi Choudhary; Hindustan Times; October 19, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindustan-times-vidhi-choudhary-october-21-2018-brazil-s-experience-a-red-flag-for-whatsapp-in-indian-polls-say-experts"&gt;Brazil’s experience a red flag for WhatsApp in Indian polls, say experts&lt;/a&gt; (Vidhi Choudhary; Hindustan Times; October 21, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-logical-indian-october-27-2018-reliance-jio-users-complain-of-porn-websites-being-blocked"&gt;Reliance-Jio Users Complain Of Porn Websites Being Blocked; Company Yet To Issue Official Statement&lt;/a&gt; (Logical Indian; October 27, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt;Our       Access to Knowledge programme currently consists of two projects.    The    Pervasive Technologies project, conducted under a grant from  the      International Development Research Centre (IDRC), aims to  conduct      research on the complex interplay between low-cost  pervasive      technologies and intellectual property, in order to  encourage the      proliferation and development of such technologies as  a social good. The      Wikipedia project, which is under a 	grant from  the Wikimedia      Foundation, is for the growth of Indic language  communities and projects      by designing community collaborations and  partnerships 	that  recruit     and cultivate new editors and explore  innovative approaches  to   building   projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by       organizing more than 100 outreach events and catalysed the release of       encyclopaedic and other content under the 	Creative Commons   (CC-BY-3.0)     license in four Indian languages (21 books in Telugu, 13   in Odia, 4     volumes of encyclopaedia in Konkani and 6 volumes in   Kannada, and 1  book    on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Peer Reviewed Article&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/digital-technology-engaging-pedagogy-through-hindi-wikipedia-a-case-study"&gt;Digital Technology Engaging Pedagogy through Hindi Wikipedia - A Case Study&lt;/a&gt; (Dr. George Joseph,Dr. Sebastian K.A, and Kavitha A with research assistance from Ananth Subray; International Journal of English Language, Literature in Humanities, Volume 6, Issue 8, August 2018).&lt;br /&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/south-india-copyright-workshop"&gt;South India Copyright Workshop&lt;/a&gt; (Subodh Kulkarni; October 21, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/history-of-wikipedia-education-programme-at-christ-deemed-to-be-university"&gt;History of Wikipedia Education programme at Christ&lt;/a&gt; (Deemed to be University) (Ananth Subray; Wikimedia Blog; October 29, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;br /&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/events/van-bodh-workshop-for-content-development-on-forest-resources-at-gadchiroli"&gt;Van Bodh Workshop for content development on Forest Resources at Gadchiroli&lt;/a&gt; (Co-organized by TRTI and CIS-A2K; &lt;span class="kssattr-macro-string-field-view kssattr-templateId-widgets/string kssattr-atfieldname-location " id="parent-fieldname-location-da411fe9124e4c3bbca165d09e7c7d27"&gt;Gadchiroli;&lt;/span&gt; October 2 - 5, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/news/community-toolkit-for-greater-diversity"&gt;Community Toolkit for Greater Diversity&lt;/a&gt; (Organized by Wikipedia Community; Mandrem, Goa; October 5 - 7, 2018). P.P. Sneha participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Copyright and Patent&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/news/5th-global-congress-on-ip-and-the-public-interest-successes-strategies-highlighted"&gt;5th Global Congress On IP And The Public Interest: Successes, Strategies Highlighted&lt;/a&gt; (David Branigan; Intellectual Property Watch; October 3, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/news/kei-seminar-on-appraising-the-wipo-broadcast-treaty-and-its-implications-on-access-to-culture"&gt;KEI Seminar on "Appraising the WIPO Broadcast Treaty and its Implications on Access to Culture"&lt;/a&gt; (Organized by KEI; Geneva; October 3 - 4, 2018). Anubha Sinha spoke on the panel titled "Rationale, Beneficiaries and Scope (of the Treaty)".&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/news/stakeholders-consultation-on-draft-wipo-treaty-to-protect-broadcasting-organization"&gt;Stakeholders Consultation on draft WIPO Treaty to Protect Broadcasting Organization&lt;/a&gt; (Organized by Ministry of Commerce and Industry, Govt. of India; Copyright Office, New Delhi; October 23, 2018). Anubha Sinha participated in the meeting.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Openness&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Our    work in the Openness programme    focuses on open data, especially open    government data, open  access,  open  education resources, open  knowledge   in Indic  languages, open  media, and  open technologies and  standards -    hardware and software. We  approach  openness as a  cross-cutting    principle for knowledge  production and  distribution,  and not as a    thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;&lt;br /&gt;Participation in Event&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/openness/news/panel-discussion-on-equitable-access-to-knowledge"&gt;Panel Discussion on Equitable Access to Knowledge&lt;/a&gt; (Organized by DST Centre for Policy Research (IISc); Bangalore; October 23, 2018). Pranesh Prakash was a panelist and moderator at the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/openness/news/business-standard-ians-october-11-2018-sting-job-by-hyderabad-scientist-exposes-fake-journals"&gt;Sting job by Hyderabad scientist exposes fake journals&lt;/a&gt; (Business Standard; October 11, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;b&gt; -----------------------------------&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As    part of its research on privacy  and   free speech, CIS is engaged with    two different projects. The  first  one  (under a grant from Privacy    International and IDRC) is on   surveillance  and freedom of expression    (SAFEGUARDS). The second  one  (under a grant  from MacArthur  Foundation)   is on restrictions  that the  Indian government  has placed  on freedom  of  expression  online.&lt;/p&gt;
&lt;p&gt;►Privacy&lt;/p&gt;
&lt;b&gt;Participation in Events&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/confidentiality-of-communications-and-privacy-of-data-in-the-digital-age"&gt;Confidentiality of Communications and Privacy of Data in the Digital Age&lt;/a&gt; (Organized by INCLO and Privacy International; Human Rights Council 39th ordinary session; September 25, 2018). Elonnai Hickok participated in the event.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques"&gt;&lt;span class="external-link"&gt;Meetings of ISO/IEC JTC 1/SC 27 'IT Security techniques'&lt;/span&gt;&lt;/a&gt; (Organized by Standards Norway with support from NTNU, Microsoft, Telenor, et.al.; Gjøvik, Norway; September 30 - October 4, 2018). Gurshabad Grover participated in the meetings.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/state-of-work-in-india"&gt;State of Work in India&lt;/a&gt; (Organized by Bangalore International Centre, TERI and Azim Premji University; Bangalore; October 3, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/technology-foresight-group-tandem-researchs-ai-policy-lab-on-the-theme-ai-and-environment"&gt;Technology Foresight Group Tandem Research's AI policy lab on the theme AI and Environment&lt;/a&gt; (Organized by Tandem Research; Goa; October 5, 2018). Shweta Mohandas attended a roundtable discussion on artificial intelligence and environment.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/indian-feminist-judgment-project-workshop"&gt;Indian Feminist Judgment Project Workshop&lt;/a&gt; (Organized by Jindal Industries; New Delhi; October 6 - 7, 2018). Swaraj Paul Barooah participated in the discussions.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/community-standards-roundtable-conversations"&gt;Community Standards Roundtable Conversations&lt;/a&gt; (Organized by Facebook, School of Media &amp;amp; Cultural Studies, and Tata Institute of Social Sciences; Bangalore; October 7, 2018). Ambika Tandon participated in the roundtable discussions.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance"&gt;Surveillance Stories: Optimizing rights and governance&lt;/a&gt; (Organized by National Centre for Biological Sciences; Bangalore; October 16, 2018). Sunil Abraham gave a talk.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/debating-ethics-dignity-and-respect-in-data-driven-life"&gt;Debating Ethics: Dignity and Respect in Data Driven Life&lt;/a&gt; (Organized by International Conference of Data Protection and Privacy Commissioners; Brussels; October 24 - 25, 2018). Elonnai Hickok was a speaker in the panel "Move Slower and Fix Things".&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;►Cyber Security
&lt;p&gt;&lt;b&gt;Research Paper&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/conceptualizing-an-international-security-regime-for-cyberspace"&gt;Conceptualizing an International Security Regime for Cyberspace&lt;/a&gt; (Elonnai Hickok and Arindrajit Basu; October 26, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;b&gt;Event Organized&lt;br /&gt;&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/roundtable-on-cyber-security-and-the-private-sector"&gt;Roundtable on Cyber-security and the Private Sector&lt;/a&gt; (Omidyar Network Office; Bangalore; October 17, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/cyfy-2018"&gt;CyFy 2018&lt;/a&gt; (Organized by Observer Research Foundation; New Delhi; October 3 - 5, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
----------------------------------- 	&lt;br /&gt;
&lt;p&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt; ----------------------------------- &lt;b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/b&gt;CIS    is involved in promoting access and accessibility to      telecommunications services and resources, and has provided inputs to      ongoing policy discussions 	and consultation papers published by TRAI.      It has prepared reports on unlicensed spectrum and accessibility of      mobile phones for persons with disabilities 	and also works with  the     USOF to include funding projects for persons with disabilities  in its     mandate:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Article&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-october-4-2018-shyam-ponappa-policies-and-the-public-interest"&gt;Policies &amp;amp; the Public Interest&lt;/a&gt; (Shyam Ponappa; Business Standard; October 4, 2018 and Organizing India Blogspot; October 4, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;-----------------------------------&lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary       research initiative driven by an emerging need to understand the       reconfigurations of 	social practices and structures through the       Internet and digital media technologies, and vice versa. It aims to       produce local and contextual 	accounts of interactions, negotiations,       and resolutions between the Internet, and socio-material and       geo-political processes:&lt;/p&gt;
&lt;b&gt;Job&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/jobs/call-for-research-fellows-field-studies-of-platform-work"&gt;Call for Research Fellows - Field Studies of Platform-Work&lt;/a&gt;: The Research Fellows will be associated with CIS from December 2018 to June 2019, undertake fieldwork, participate in two research workshops, and prepare an Ethnographic Report based on the fieldwork. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation       that undertakes interdisciplinary research on internet and digital       technologies from 	policy and academic perspectives. The areas of   focus     include digital accessibility for persons with disabilities,    access    to knowledge, intellectual 	property rights, openness   (including   open   data, free and open source software, open standards,   open access,   open   educational resources, and open video), 	 internet  governance,     telecommunication reform, digital privacy, and   cyber-security. The     academic research at CIS seeks to understand  the  reconfigurations 	of     social and cultural processes and  structures  as mediated through the     internet and digital media  technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div style="text-align: justify; "&gt;Please    help us defend consumer and    citizen rights on the Internet! Write a    cheque in favour of 'The  Centre   for Internet and Society' and mail  it   to us at No. 	194, 2nd  'C'  Cross,  Domlur, 2nd Stage, Bengaluru -   5600  71.&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;We    invite researchers,  practitioners,   artists, and theoreticians, both    organisationally  and as individuals,  to  engage with us on topics    related internet 	 and society, and improve  our  collective   understanding  of this  field. To discuss such  possibilities,  please   write to Sunil   Abraham, Executive Director, at 	  sunil@cis-india.org   (for policy  research), or Sumandro Chattapadhyay,   Research Director,   at  sumandro@cis-india.org  (for academic research),   with an 	  indication of  the form and the  content of the collaboration  you  might   be interested  in. To discuss  collaborations on Indic  language    Wikipedia projects, 	 write to  Tanveer Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;i&gt;CIS    is grateful to its primary    donor the Kusuma Trust founded by Anurag    Dikshit and Soma Pujari,    philanthropists of Indian origin for its   core  funding and 	support  for   most of its projects. CIS is also   grateful to  its other donors,    Wikimedia Foundation, Ford Foundation,   Privacy  International, UK,  Hans  	 Foundation, MacArthur Foundation,   and IDRC for  funding its  various   projects&lt;/i&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/october-2018-newsletter'&gt;https://cis-india.org/about/newsletters/october-2018-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2018-11-15T02:44:58Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance">
    <title>Surveillance Stories: Optimizing rights and governance</title>
    <link>https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance</link>
    <description>
        &lt;b&gt;Sunil Abraham gave a talk at the National Centre for Biological Sciences, Tata Institute of Fundamental Research, Bangalore on October 16, 2018. Sunil used a series of stories to explain how surveillance works and fails in the context of theft, murder, insider trading, terrorism, demonetization and encounter killings. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Abraham.jpg/@@images/27cd9d50-b82d-4556-aad2-431d99174b07.jpeg" alt="Surveillance Talk" class="image-inline" title="Surveillance Talk" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These stories were used to explore multiple technical solutions for solving the “surveillance optimization problem”. Policy makers have to simultaneously maximize various rights — the right to privacy, the right to transparency, the right to free speech — and uphold the imperatives of the nation state: national security, law enforcement and effective governance. &lt;br /&gt; &lt;br /&gt;Two decades ago, Lawrence Lessig introduced a socioeconomic theory of regulation called the ‘pathetic dot theory’, which discusses how individuals in a society are regulated by four forces — law, code or technical infrastructure, market and social norms. The talk will explore how these four regulatory options contribute to solving the surveillance optimization problem.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was published on the website of &lt;a class="external-link" href="https://www.ncbs.res.in/events/apls-20181016-surveillance-abraham"&gt;National Centre for Biological Sciences&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance'&gt;https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-31T01:39:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques">
    <title>Participation in the meetings of ISO/IEC JTC 1/SC 27 'IT Security techniques'</title>
    <link>https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques</link>
    <description>
        &lt;b&gt;From 30 September 2018 to 4 October 2018, Gurshabad Grover participated in the meetings of the working groups of ISO/IEC JTC 1/SC 27 'IT Security techniques' held in Gjøvik, Norway. The meetings were organized by Standards Norway with support from NTNU, Microsoft, Telenor, et.al.&lt;/b&gt;
        &lt;p&gt;Gurshabad mainly focused on the meetings of Working Group 5 responsible for standards and research in "Identity management and privacy technologies" in SC 27. I attended sessions discussing work related to current ISO/IEC standards and upcoming work in the WG, such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Establishing a PII deletion concept in organizations&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Privacy guidelines for smart cities&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Additional privacy-enhancing data de-identification standards&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;User-centric framework for PII handling based on user privacy preferences&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Gurshabad will be a co-rapporteur on a 12-month study period to investigate the 'Impact of Artificial Intelligence on Privacy' which was initiated by the WG in the meeting. Additionally, I was a part of the drafting committee which prepared the final resolutions and liaison statements from the meeting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gurshabad also attended the Norwegian Business Forum on cyber security which was held on October 4th, which featured talks by professionals and academicians working in cyber security in their different sectors. The agenda for the business forum can be &lt;a class="external-link" href="http://www.standard.no/en/kurs-og-arrangementer/arrangement-standard-norge-og-nek/arrangement-fra-standard-norge/business-forum---cyber-security/"&gt;found here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques'&gt;https://cis-india.org/internet-governance/news/participation-in-the-meetings-of-iso-iec-jtc-1-sc-27-it-security-techniques&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-31T01:28:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
