<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 586 to 600.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/artificial-intelligence-for-growth-leveraging-ai-and-robotics-for-indias-economic-transformation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/namapolicy-on-online-content-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-may-2-2018-cyber-experts-say-playground-open-for-influencing-elections"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ani-may-2-2018-data-usage-by-political-parties"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-april-30-2018-prasun-sonwalkar-vidhi-choudhury-now-twitter-too-caught-up-in-cambridge-analytica-controversy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2018-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/indian-express-asad-ali-tabassum-barnagarwala-april-29-2018-you-are-not-the-only-one-india-stares-at-a-loneliness-epidemic"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/new-indian-express-april-26-2018-aadhaar-data-over-89-lakh-mnrega-workers-in-andhra-pradesh-leaked-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-request-29-revenue-breakdown-by-source-for-fy-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/pai-wg-labor-and-economy-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/jobs/vacancy-for-short-term-consultant-ietf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/artificial-intelligence-for-growth-leveraging-ai-and-robotics-for-indias-economic-transformation">
    <title>Artificial Intelligence for Growth: Leveraging AI and Robotics for India's Economic Transformation</title>
    <link>https://cis-india.org/internet-governance/news/artificial-intelligence-for-growth-leveraging-ai-and-robotics-for-indias-economic-transformation</link>
    <description>
        &lt;b&gt;Amber Sinha took part in the second international conference organized by ASSOCHAM at Hotel Shangri-La in New Delhi on April 27, 2018.&lt;/b&gt;
        &lt;h3&gt;Keynote Address&lt;/h3&gt;
&lt;p&gt;12.15 p.m. - 12.30 p.m.: Shri Gopalakrishnan S., Joint Secretary, Ministry of Electronics and IT, Government of India&lt;/p&gt;
&lt;h3&gt;Special Address&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;12.30 p.m. - 12.45 p.m.: Dr. Pushpak Bhattacharyya, Director and Professor, Computer Science and Engg, IIT Patna and Chairman, BIS Committee for Standardisation in Artificial Intelligence&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Panel Discussion&lt;/h2&gt;
&lt;h3&gt;Session Moderator&lt;/h3&gt;
&lt;p&gt;12.45 p.m. - 1.40 p.m.: Shri Sudipta Ghosh, India                         Leader, Data and Analytics, PwC&lt;/p&gt;
&lt;h3&gt;Panelists&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Shri                           Amber Sinha, Senior Programme Manager, Centre                           for Internet and Society&lt;/li&gt;
&lt;li&gt;Shri                           Utpal Chakraborty, Lead Architect - AI,                           L&amp;amp;T Infotech &lt;/li&gt;
&lt;li&gt;Shri                           Atul Rai, CEO &amp;amp; Co-Founder, Staqu                           Technologies&lt;/li&gt;
&lt;li&gt;Shri                           Prabhat Manocha, IBM&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/artificial-intelligence-for-growth-leveraging-ai-and-robotics-for-indias-economic-transformation'&gt;https://cis-india.org/internet-governance/news/artificial-intelligence-for-growth-leveraging-ai-and-robotics-for-indias-economic-transformation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-05-05T09:08:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/namapolicy-on-online-content-regulation">
    <title>#NAMApolicy on Online Content Regulation</title>
    <link>https://cis-india.org/internet-governance/news/namapolicy-on-online-content-regulation</link>
    <description>
        &lt;b&gt;Swaraj Barooah attended the #NAMApolicy on Online Content Regulation organized by Media Nama at India Habitat Centre in New Delhi on May 3, 2018.&lt;/b&gt;
        &lt;h2&gt;Agenda&lt;/h2&gt;
&lt;div id="_mcePaste"&gt;01:30 p.m. - 03:00 p.m.: Panel #1 &amp;amp; Open House - News&lt;/div&gt;
&lt;div id="_mcePaste"&gt;03:00 p.m. - 03:15 p.m.: Tea break&lt;/div&gt;
&lt;div id="_mcePaste"&gt;03:15 p.m. - 04:45 p.m.: Panel #2 &amp;amp; Open House - Entertainment&lt;/div&gt;
&lt;div id="_mcePaste"&gt;04:45 p.m. - 05:15 p.m.: Remaining issues&lt;/div&gt;
&lt;div id="_mcePaste"&gt;05:15 p.m. - 06:00 p.m.: High-tea&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p&gt;01:30 p.m. - 03:00 p.m.: Panel #1 &amp;amp; Open House - News03:00 p.m. - 03:15 p.m.: Tea break03:15 p.m. - 04:45 p.m.: Panel #2 &amp;amp; Open House - Entertainment&lt;br /&gt;&lt;span&gt;04:45 p.m. - 05:15 p.m.: Remaining issues&lt;br /&gt;05:15 p.m. - 06:00 p.m.: High-tea&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/namapolicy-on-online-content-regulation'&gt;https://cis-india.org/internet-governance/news/namapolicy-on-online-content-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-05-05T01:52:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-may-2-2018-cyber-experts-say-playground-open-for-influencing-elections">
    <title>Cyber experts say 'playground open' for influencing elections</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-may-2-2018-cyber-experts-say-playground-open-for-influencing-elections</link>
    <description>
        &lt;b&gt;Cyber experts said that under the provisions provided by 43 (A) of Indian IT Act, two types of data collection are completely legal: first, the data shared by the user in the public domain and secondly, the data published by the social platforms, like Facebook.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This article was published in the &lt;a class="external-link" href="https://cio.economictimes.indiatimes.com/news/digital-security/cyber-experts-say-playground-open-for-influencing-elections/63994457"&gt;Economic Times&lt;/a&gt; on May 2, 2018. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;With the Karnataka Assembly &lt;a href="https://cio.economictimes.indiatimes.com/tag/elections"&gt;elections&lt;/a&gt; round the corner, the cyber experts have said that it is quite possible to influence elections in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Talking to ANI, cyber expert Sunil Abraham did not rule out the possibility of influencing the voters as India does not have &lt;a href="https://cio.economictimes.indiatimes.com/tag/data+protection"&gt;data protection&lt;/a&gt; law in place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said under the provisions provided by 43 (A) of Indian IT Act, two types of data collection are completely legal: first, the data shared by the user in the public domain and secondly, the data published by the social platforms, like &lt;a href="https://cio.economictimes.indiatimes.com/tag/facebook"&gt;Facebook&lt;/a&gt; and Twitter, which was shared by the user for his/her friends.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Both these types of data are not considered sensitive personal data. Under Indian law, if they are collecting your biometrics, passwords and health information only then they need your consent," Abraham told in an exclusive interview.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Replying a question about the chances of &lt;a href="https://cio.economictimes.indiatimes.com/tag/political+parties"&gt;political parties&lt;/a&gt; influencing elections, Abraham said, "One cannot answer this question with a clear yes or no. But, the more a political party has in its database about you; the more they can micro-target you for various types of advertising."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He, however, said with the literacy level of Indian internet users, the chances are high that they can be manipulated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Once they do this, especially in a country where 30 percent of the public is illiterate and only 10 percent of public knows English and many-many users have just come online, there is a high chance that these users can be manipulated," the cyber expert said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When asked can it be termed influence, he said, "It will definitely be an influence. Most of the internet users in India have just come online, they don't have media literacy; they have not consumed older technologies like television and broadcast media like radio sufficiently enough so it is easy for these users to get fooled by the content that is propaganda and fake news etcetera."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham said it is unlikely that India will have a data protection law before 2019 general elections, which means the playground is open for people with a clever idea to manipulate voters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"India is working on data protection laws from last eight years. With the existing laws; all the political parties, social media companies, and search engine optimization companies etcetera can do what they want and they won't get into trouble. So, it is very unlikely that this data protection law is going to be approved by Parliament the 2019 elections. So for the 2019 elections, it is going to be very exciting times because anybody who has any clever idea when it comes to manipulating voters, they will definitely try it. Because, there is no law to stop them from trying those tricks," the cyber expert said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Replying to another question about India's position in data &lt;a href="https://cio.economictimes.indiatimes.com/news/digital-security"&gt;security&lt;/a&gt;, he said, 'India is lagging as per the global trend across the world. The European Union's world-class data protection law called 'General Data Protection Regulation' is being followed by all the countries with the exception of the US. About 108 countries have the data protection laws which look similar to the EU's General Data Protection Regulation."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He, however, added, "We shouldn't be upset because making a law in a big country like India takes time. Shri Krishna Committee is going to present the draft of the Indian data protection law and hopefully, within one or two years India will have data protection law."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another expert Shubhamangala Sunil told ANI that "In India, our data is not secure today. Be it politicians or businesses, they want the database of people. Many data &lt;a href="https://cio.economictimes.indiatimes.com/tag/breaches"&gt;breaches&lt;/a&gt; have already happened and they are being used for different propagandas".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She said the union government and state governments should come forward and tell people about data security measures instead of people complaining about the data breach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She also said India is at least 10 years behind in comparison with the world in the &lt;a href="https://cio.economictimes.indiatimes.com/tag/cyber+security"&gt;cyber security&lt;/a&gt; domain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The comments of the experts have come in the backdrop of recently data breach in the Facebook wherein its CEO Mark Zuckerberg faced US Congress for two days over the data theft. The Facebook-Cambridge Analytica &lt;a href="https://cio.economictimes.indiatimes.com/tag/data+scandal"&gt;data scandal&lt;/a&gt; involves the collection of personally identifiable information of up to 87 million Facebook users and almost certainly a much greater number that Cambridge Analytica began collecting in 2014.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-may-2-2018-cyber-experts-say-playground-open-for-influencing-elections'&gt;https://cis-india.org/internet-governance/news/economic-times-may-2-2018-cyber-experts-say-playground-open-for-influencing-elections&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-05-03T03:17:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ani-may-2-2018-data-usage-by-political-parties">
    <title>Data Usage by Political Parties</title>
    <link>https://cis-india.org/internet-governance/news/ani-may-2-2018-data-usage-by-political-parties</link>
    <description>
        &lt;b&gt;Sunil Abraham spoke to ANI regarding collection of data and its use by political parties for electoral gains.&lt;/b&gt;
        &lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/SunilAbraham.jpg/@@images/19202b15-4087-4780-bfcb-05045600c705.jpeg" alt="Sunil" class="image-inline" title="Sunil" /&gt;&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;In law, if bio metrics, passwords &amp;amp; health info are collected, only then consent is needed. The more a political party has in its database, the more they can micro-target you. It'll be an influence: Sunil Abraham,cyber expert on date usage by political parties &lt;a href="https://twitter.com/hashtag/KarnatakaElections?src=hash&amp;amp;ref_src=twsrc%5Etfw"&gt;#KarnatakaElections&lt;/a&gt; &lt;a href="https://t.co/eUk478jJbB"&gt;pic.twitter.com/eUk478jJbB&lt;/a&gt;&lt;/p&gt;
— ANI (@ANI) &lt;a href="https://twitter.com/ANI/status/991329177973510149?ref_src=twsrc%5Etfw"&gt;1 May 2018&lt;/a&gt;&lt;/blockquote&gt;
&lt;hr /&gt;
&lt;p&gt;See the &lt;a class="external-link" href="https://twitter.com/ANI/status/991329177973510149?s=19"&gt;original here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ani-may-2-2018-data-usage-by-political-parties'&gt;https://cis-india.org/internet-governance/news/ani-may-2-2018-data-usage-by-political-parties&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-05-03T03:14:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-april-30-2018-prasun-sonwalkar-vidhi-choudhury-now-twitter-too-caught-up-in-cambridge-analytica-controversy">
    <title>Now, Twitter too caught up in Cambridge Analytica controversy</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-april-30-2018-prasun-sonwalkar-vidhi-choudhury-now-twitter-too-caught-up-in-cambridge-analytica-controversy</link>
    <description>
        &lt;b&gt;Twitter does not share a break-up of users by region, the platform has less than 100 million users in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Prasun Sonwalkar and Vidhi Choudhury was published in the &lt;a class="external-link" href="https://www.hindustantimes.com/tech/now-twitter-too-caught-up-in-cambridge-analytica-controversy/story-3SMBniRitMG7Ne85AX86wL.html"&gt;Hindustan Times&lt;/a&gt; on April 30, 2018. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Social media company Twitter Inc sold data to the University of Cambridge academic Aleksandr Kogan who harvested millions of Facebook users’ information without their knowledge, it has emerged, although the company has clarified that no private data was accessed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It isn’t clear whether any of the data pertained to Indian users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter does not share a break-up of users by region, the platform has less than 100 million users in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kogan, who created tools that allowed political consultancy Cambridge Analytica to psychologically profile and target voters, bought the data from the microblogging website in 2015, well before the recent scandal, involving use of the data of Facebook users, came to light.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to The Daily Telegraph, Kogan bought data on tweets, user names, photos, profiles and locations over a five-month period between December 2014 and April 2015 through his company Global Science Research (GSR). Twitter said it had banned GSR and Cambridge Analytica from buying data or running advertisements on the website and that no private data had been accessed, while Kogan insisted the data had only been used to create "brand reports" and "survey extender tools" and that he had not violated Twitter's policies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The daily reported that Twitter charges companies and organisations for large data sets that are particularly useful for gleaning public opinion or receptiveness to certain topics and ideas, although Twitter bans companies from using the data to derive sensitive political information or matching it with personal information obtained elsewhere.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A Twitter spokesman confirmed the ban and said: "Twitter has also made the policy decision to off-board advertising from all accounts owned and operated by Cambridge Analytica. This decision is based on our determination that Cambridge Analytica operates using a business model that inherently conflicts with acceptable Twitter Ads business practices. "Cambridge Analytica may remain an organic user on our platform, in accordance with the Twitter Rules."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The company said it does not allow "inferring or deriving sensitive information like race or political affiliation, or attempts to match a user's Twitter information with other personal identifiers" and that it had staff in place to police this "rigorously".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, founder for think tank Centre for Internet and Society said: “Even though Twitter claims it has contracts in place and staff for contractual enforcement, I cannot understand how they will prevent those buying their data from inferring race and political affiliation. Especially in jurisdictions like ours without comprehensive data protection law.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A Cambridge Analytica spokesman said the company used Twitter for political advertising but insisted that it had never "undertaken a project with GSR focusing on Twitter data and Cambridge Analytica has never received Twitter data from GSR”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Delhi-based lawyer Apar Gupta said, “Since we do not have a data protection law at present we are more or less dependent on the proactive disclosures by Twitter. Facebook is not a gold standard of upholding user rights and it is hoped that we soon have a regulator that can enforce such disclosures and place penalties.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On 5 April, Facebook said user data of more than 560,000 Indians may have been harvested by British researcher Cambridge Analytica, at the centre of a recent storm over data breaches and potential privacy violations on the social media network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Twitter or Facebook are not alone in harvesting and storing user data. This is a widespread industry practice that relies on profiling. Such breaches and malpractices will continue to occur till we have a set of defined norms and enforceable penalties to protect user rights,” Gupta further added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Only 335 users in India installed the thisisyourdigitallife app developed by academic Kogan and his company Global Science Research that may have been possibly at the centre of the data breaches, according to Facebook. The 335 people make up just 0.1% of the app’s total worldwide installs. Users agreed to take a personality test and have their data collected by the app, which then went on to also access information about the test-takers’ Facebook friends, leading to the accumulation of a much larger data pool.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter Inc’s spokesperson said in an e-mail that an internal review conducted by it showed GSR had not accessed any private data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Unlike many other services, Twitter is public by its nature. People come to Twitter to speak publicly, and public Tweets are viewable and searchable by anyone. In 2015, Global Science Research (GSR) did have one-time API access to a random sample of public Tweets from a five-month period from December 2014 to April 2015,” the company statement added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is basically information that users chose to make public.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-april-30-2018-prasun-sonwalkar-vidhi-choudhury-now-twitter-too-caught-up-in-cambridge-analytica-controversy'&gt;https://cis-india.org/internet-governance/news/hindustan-times-april-30-2018-prasun-sonwalkar-vidhi-choudhury-now-twitter-too-caught-up-in-cambridge-analytica-controversy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-05-02T02:49:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2018-newsletter">
    <title>April 2018 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/april-2018-newsletter</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;Dear readers,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;In 2016, WhatsApp Inc announced it was rolling out end-to-end encryption, but is the company doing what it claims to be doing? Sunil Abraham and Aayush Rathi explores this in an article which was &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp"&gt;published in Asia Times&lt;/a&gt; on April 20, 2018.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act"&gt;submitted comments to the Ministry of Health &amp;amp; Family Welfare, Government of India&lt;/a&gt; on the draft Digital Information Security in Healthcare Act on April 21, 2018. CIS had conducted research on the issues of privacy, data protection and data security since 2010 and is thankful for the opportunity to put forth its views.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill"&gt;blog post&lt;/a&gt; by Swaraj Paul Barooah examines two badly drafted provisions of the new Anti-Trafficking bill that have the potential to severely impinge upon the Freedom of Expression, including through a misunderstanding of intermediary liability.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A chapter by P.P. Sneha was published in '&lt;a class="external-link" href="https://cis-india.org/raw/making-humanities-in-the-digital-embodiment-and-framing-in-bichitra-and-indiancine.ma"&gt;Making Things and Drawing Boundaries: Experiments in the Digital Humanities&lt;/a&gt;' edited by Jentery Sayers. The chapter throws light on some of the questions that arise around the processes by which digital objects are ‘made’ and made available for arts and humanities research and practice, by drawing on recent work in text and film archival initiatives in India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS made a &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/cis-submission-on-statement-of-working-of-patents"&gt;submission to the Indian Patent Office on the issue of Statement of Working as per Form 27 under the Patents Act, 1970&lt;/a&gt;. Select stakeholders were invited to the consultation meeting held on April 6, 2018. Anubha Sinha attended it along with a few other public-spirited stakeholders. She made a statement stressing on the requirement of the patent system to serve the welfare-purpose and not create mere non-working/ blocking monopolies; and that the argument of representatives of patentees about non-working of patents being the existing norm, and that they cannot be questioned about this, is absolutely against the central tenets of patent law.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;Articles:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-april-8-2018-digital-native-delete-facebook"&gt;Digital Native: Delete Facebook?&lt;/a&gt; (Nishant Shah; Indian Express; April 8, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/digital-native-the-e-wasteland-of-our-times"&gt;Digital Native: The e-wasteland of our times&lt;/a&gt; (Nishant Shah; Indian Express; April 22, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp"&gt;What’s up with WhatsApp?&lt;/a&gt;&lt;span&gt; (Aayush Rathi and Sunil Abraham; Asia Times; April 23, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;CIS in the News:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindustan-times-vidhi-choudhary-and-yashwant-raj-facebook-data-breach-hit-over-5-6-lakh-users-in-india"&gt;Cambridge Analytica row: Facebook data breach hit 560K Indian users&lt;/a&gt; (Vidhi Choudhury and Yashwant Raj; Hindustan Times; April 5, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindu-businessline-april-6-2018-govt-websites-face-major-outage-hacking-ruled-out"&gt;Govt websites face major outage; hacking ruled out&lt;/a&gt; (Hindu Businessline; April 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/business-standard-romita-majumdar-and-kiran-rathee-after-data-leak-row-facebook-imposes-restrictions-on-user-data-access"&gt;After data leak row, Facebook imposes restrictions on user data access&lt;/a&gt; (Romita Majumdar and Kiran Rathee; Business Standard; April 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/news-18-subhajit-sengupta-how-just-355-indians-put-data-of-5-6-lakh-facebook-users-at-risk"&gt;It Took Just 355 Indians to Mine the Data of 5.6 Lakh Facebook Users. Here's How&lt;/a&gt; (CNN-News 18; April 7, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-week-anita-babu-april-8-2018-it-feeds-on-you"&gt;It feeds on you! &lt;/a&gt;(Anita Babu; The Week; April 8, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-prashant-k-nanda-and-komal-gupta-pension-wont-be-denied-for-want-of-aadhaar-epfo"&gt;Pension won’t be denied for want of Aadhaar, says EPFO &lt;/a&gt;(Prashant K. Nanda and Komal Gupta; Livemint; April 11, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-april-13-2018-facebooks-fake-news-clean-up-hits-language-barrier"&gt;Facebook’s fake news clean-up hits language barrier&lt;/a&gt; (Nilesh Christopher; Economic Times; April 13, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/bloomberg-quint-aayush-ailawadi-april-15-2018-is-this-the-beginning-of-the-end-for-facebook"&gt;Is This The Beginning Of The End For Facebook?&lt;/a&gt; (Bloomberg Quint; April 15, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-april-17-2018-sad-truth-brutality-porn-has-many-takers-in-india"&gt;Metrolife: Brutality porn has sadly many takers in India&lt;/a&gt; (Nina C. George; Deccan Herald; April 18, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/new-indian-express-april-26-2018-aadhaar-data-over-89-lakh-mnrega-workers-in-andhra-pradesh-leaked-online"&gt;Aadhaar data of over 89 lakh MNREGA workers in Andhra Pradesh leaked online&lt;/a&gt; (New Indian Express; April 27, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/indian-express-asad-ali-tabassum-barnagarwala-april-29-2018-you-are-not-the-only-one-india-stares-at-a-loneliness-epidemic"&gt;You Are Not the Only One: India stares at a loneliness epidemic&lt;/a&gt; (Asad Ali and Tabassum Barnagarwala; Indian Express; April 29, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindustan-times-april-30-2018-prasun-sonwalkar-vidhi-choudhury-now-twitter-too-caught-up-in-cambridge-analytica-controversy"&gt;Now, Twitter too caught up in Cambridge Analytica controversy&lt;/a&gt; (Prasun Sonwalkar and Vidhi Choudhury; Hindustan Times; April 30, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Copyright and Patent&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Submission&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/cis-submission-on-statement-of-working-of-patents"&gt;CIS' Submission on Statement of Working of Patents&lt;/a&gt; (Anubha Sinha; April 10, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;►Wikipedia&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Event Organized&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/sambad-health-and-women-edit-a-thon"&gt;Sambad Health and Women Edit-a-thon&lt;/a&gt; (April 15, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/article-on-telugu-wikisource-feature-book-in-pustakam"&gt;Telugu Wikisource Feature Book in Pustakam.net&lt;/a&gt;&lt;span&gt; (Pavan Santhosh; April 17, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/institutional-partnership-with-tribal-research-training-institute"&gt;Institutional Partnership with Tribal Research &amp;amp; Training Institute&lt;/a&gt; (Subodh Kulkarni; April 18, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/exploring-wikimedia-platforms-in-dialogue-on-the-urban-rivers-of-maharashtra"&gt;Exploring Wikimedia platforms in Dialogue on the Urban Rivers of Maharashtra&lt;/a&gt; (Subodh Kulkarni; April 22, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;strong&gt;Submission&lt;/strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act"&gt;Comments on the Draft Digital Information Security in Healthcare Act&lt;/a&gt;&lt;span&gt; (Amber Sinha and Shweta Mohandas; April 22, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;div&gt;&lt;strong&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world"&gt;Revenge Porn Laws across the World&lt;/a&gt;&lt;span&gt; (Shradha Nigam; April 25, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/government-giving-free-publicity-worth-40-k-to-twitter-and-facebook"&gt;Government gives free publicity worth 40k to Twitter and Facebook&lt;/a&gt;&lt;span&gt; (Akriti Bopanna; April 10, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://https//cis-india.org/internet-governance/blog/artificial-intelligence-in-governance-a-report-of-the-roundtable-held-in-new-delhi"&gt;Artificial Intelligence in Governance: A Report of the Roundtable held in New Delhi&lt;/a&gt; (Saman Goudarzi and Natallia Khaniejo; April 19, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;br /&gt;►Free Speech and Expression&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Blog Entries&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill"&gt;A look at two problematic provisions of the draft Anti-trafficking bill&lt;/a&gt; (Swaraj Paul Barooah; April 21, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/didp-request-29-revenue-breakdown-by-source-for-fy-2017"&gt;DIDP Request #29 - Revenue breakdown by source for FY 2017&lt;/a&gt; (Akriti Bopanna; April 26, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt; &lt;strong&gt;&lt;span style="text-align: justify; "&gt;►Cyber Security &lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;&lt;span style="text-align: justify; "&gt;Event Organized&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/workshop-on-python"&gt;Workshop on Python&lt;/a&gt; (April 14, 2018; CIS, Bengaluru).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;span style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;-----------------------------------&lt;br /&gt;&lt;/span&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;br /&gt;&lt;/a&gt;&lt;span&gt;----------------------------------- &lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;strong&gt;Article&lt;/strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/making-humanities-in-the-digital-embodiment-and-framing-in-bichitra-and-indiancine.ma"&gt;Making Humanities in the Digital: Embodiment and Framing in Bichitra and Indiancine.ma&lt;/a&gt;&lt;span&gt; (P.P. Sneha; Making Things and Drawing Boundaries: Experiments in the Digital Humanities (2017), edited by Jentery Sayers, University of Minnesota Press, Minneapolis, London April 1, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;div class="keyResearch"&gt;
&lt;div id="parent-fieldname-text-8a5942eb6f4249c5b6113fdd372e636c"&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;► Support Us&lt;/p&gt;
&lt;div&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/div&gt;
&lt;p&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="viewlet-below-content-body"&gt;
&lt;div class="visualClear"&gt;&lt;/div&gt;
&lt;div class="documentActions"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2018-newsletter'&gt;https://cis-india.org/about/newsletters/april-2018-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2018-05-20T14:57:47Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/indian-express-asad-ali-tabassum-barnagarwala-april-29-2018-you-are-not-the-only-one-india-stares-at-a-loneliness-epidemic">
    <title>You Are Not the Only One: India stares at a loneliness epidemic</title>
    <link>https://cis-india.org/internet-governance/news/indian-express-asad-ali-tabassum-barnagarwala-april-29-2018-you-are-not-the-only-one-india-stares-at-a-loneliness-epidemic</link>
    <description>
        &lt;b&gt;“To anyone looking at me from the outside, I seem like a fairly successful woman. I have a good job with great pay. I am in a relationship and have a bunch of close friends. I couldn’t figure out why I felt so angry or so lonely all the time.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Asad Ali and Tabassum Barnagarwala was published in the &lt;a class="external-link" href="http://indianexpress.com/article/express-sunday-eye/you-are-not-the-only-one-5154976/"&gt;Indian Express&lt;/a&gt; on April 29, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Most people will presume that throwing a bunch of hangers on the bed is a harmless act of venting. Akanksha Joshi knew it was the tipping point for her. Her mood swings had become more mercurial and she had been lashing out at people close to her or simply shutting herself in her room, watching Netflix for hours. But that day was different. “I had opened my cupboard and a hanger fell out. I don’t know what happened to me, but I suddenly picked up all the hangers and threw them on the bed in rage. The impulse lasted for 30 to 40 seconds, but it left me shaken. I had changed my job recently. It was a good one with great pay. It was what I wanted. I was in a relationship, had a bunch of close friends. I couldn’t figure out why I felt so angry or so lonely,” says Joshi, 32, who had moved to Mumbai from Dehradun in 2008 to look after her ageing grandparents and to work with a business process outsourcing firm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first inkling of trouble had come when her three-year-old marriage ended in divorce in 2013. Joshi underwent counselling for nearly two years, and, slowly, life seemed to get back on track. She entered into a new relationship, moved up the job ladder, formed new friendships. But the anger and the loneliness wouldn’t go. “To anyone looking at me from the outside, I seem like a fairly successful woman,” she says. But it has come at a cost.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2004, the National Sample Survey Office reported that 4.91 million people in India were living alone and suffered from loneliness. More recently, the National Mental Health Survey of India (2015-16) reported that high suicidal risk is an increasing concern in India; that children and adolescents are vulnerable to mental disorders; and, mental disorders, including depression and anxiety, affect nearly 10 per cent of the population. In 2016, the Centre for the Study of Developing Societies in partnership with Konrad Adenauer Stiftung conducted a survey of the attitudes, anxieties and aspirations of India’s young population (aged 15-34 years). The findings, released in April 2017, revealed that 12 per cent of the youth reported feeling depressed often, and 8 per cent said they felt lonely quite frequently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Youngsters who move from tier-II and III cities to metropolises find a sudden change in lifestyle. Even if you have friends, it is difficult to meet them in a city like Mumbai. Having a social life does not mean they have good social support,” says Dr Vishal Sawant, who is currently treating Joshi. When she first approached Dr Sawant, Joshi had great reservations. “Opening up to treatment makes you feel vulnerable. I am at a senior marketing position. To talk about mental health issues is also to put myself out in the open at this point in my career. But I knew I needed intervention,” she says. Now, after six months, she says her reactions to situations are more even.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In January this year, British Prime Minister Theresa May announced a minister for loneliness to address the condition that afflicts 14 per cent of UK’s population. In Japan, it has been an affliction that has affected generations. In India, though, conversations around mental health are only getting started. Apart from a lack of information and widespread social stigma, the cost of treatment also remains prohibitively expensive. Each session, depending on the therapist, may cost between Rs 2,000 and Rs 7,000. Besides the cost of medication, therapy and consultations, there is also the possibility of reduced work efficiency. In addition to these, despite multiple reports and surveys indicating that there might be a serious health problem at hand, the conversation around loneliness doesn’t go beyond conventional markers, such as the isolation of the elderly. But loneliness can be an equally debilitating experience for other demographies, including the youth. A 2010 research in the Indian Journal of Psychiatry finds that women suffer more from depression than men. The National Mental Health Survey (2015-16) in 12 states of India covering 39,532 people found that one in 20 people suffers from depression. “Depression was reported to be higher in females, in the age-group of 40-49 years and among those residing in urban metros,” the report observes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, psychologists say, conversations around loneliness need to expand in scope and look at the condition born out of conflicts in gender identity, class, or isolation even within the framework of a family or a relationship. When 18-year-old Harshit Patel (name changed), a resident of south Mumbai’s plush Charni Road, visited psychiatrist Dr Sagar Mundada at his Fort clinic last November, he already had suicidal thoughts. He lived in a joint family of 10 in a well-to-do Gujarati household. He had just joined engineering college and was struggling to find his feet. Patel had tried discussing his feelings with his parents, but they had brushed it off as adolescent mood swings. They also refused to entertain thoughts of therapy when a tutor brought it up. Patel had called Mundada on his own, seeking help. The doctor advised him to call whenever he felt suicidal. Within 10 days, a call came: “Nobody notices me at home. What is the point of living?” Patel was contemplating throwing himself in front of a train, he said. Mundada immediately called him to his clinic and got in touch with his parents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The road to therapy has been littered with obstacles for Patel. His parents are still not entirely convinced about therapy and refuse to attend sessions at the clinic. Instead, they meet at a McDonald’s outlet near the clinic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even as a 10-year-old child with a physically abusive father, Dharmesh Mekala knew — through all the loneliness and trauma that he hadn’t yet developed a vocabulary to articulate — that he had to escape. He wrote the entrance test for Navodaya Vidyalaya in Nalgonda, Telengana. “I just knew that I had to leave home somehow,” says Mekala, 29, a freelance artist, now based in Delhi. The arc of his loneliness had started developing early in his childhood — the beatings he received; the bouts of sadness that enveloped him; the isolation he felt from his family; and, finally, the suicidal thoughts that he had all the time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mekala made it to boarding school, but the reprieve that he had sought did not come to pass. His sense of isolation grew more acute when Mekala started discovering his sexuality, much later, he says, than his friends. By the time Mekala reached college he knew he was homosexual, but could not bring himself to admit it. “Being homosexual in a hetero world is a lonely life in any case, but when I first came to Delhi in 2010 — a dusky South Indian man with an accent, not well read or fluent in English, with far too little money — I felt adrift,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr Neetu Rana, psychologist at the Vidya Sagar Institute of Mental Health and Neurosciences, Delhi, says, people like Mekala are more prone to mental health issues. “When we can’t find our social anchor we feel lonely. It could be a result of bullying, isolation and being ostracised, but it could also reflect changes in the family structures due to urbanisation and a shift towards an individualistic society,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="custom-caption"&gt;&lt;img class="size-full wp-image-5155042" src="http://images.indianexpress.com/2018/04/loneliness-epidemic.jpg" /&gt;More recently, the National Mental Health Survey of India (2015-16) reported that high suicidal risk is an increasing concern in India; that children and adolescents are vulnerable to mental disorders.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UK-based National Society for the Prevention and Cruelty to Children (NSPCC) released data in 2017 on the number of calls received by its helpline to deal with loneliness. In 2016-17, the helpline counselled 4,063 children on loneliness, 73 per cent of whom were girls. Parul Tank, a psychiatrist who counsels students studying in a foreign country, says, many Indian students who venture abroad for higher studies, come to her with complaints of loneliness and depression. “In the US or UK, students have no structured classes. They lead an isolated life, the only idea of socialisation is to go out in cafes or pubs. Many do not know how to deal with this lifestyle,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sahil, 45, a media professional, remembers how things started spiralling out of control for him when he went to London for a post-graduate degree. He had lived in Mumbai all his life and found London disconcerting. Soon, he wanted to “remain in my room all day” or spent time in the college library “figuring out a way to kill myself”. A friend took him to the university psychiatrist but the drugs he was prescribed didn’t help. By the time he came to Delhi in the mid-’90s for a job, he could barely hold it together; he had also become addicted to drugs and alcohol. “You feel lonely, and then you drink, and you feel even more lonely,” he says. Around this time, he got married. The thoughts of suicide receded somewhat, only to be replaced by an insatiable appetite for sex. “You don’t talk about things like loneliness when you are married. My wife and I never discussed my sex addiction either, though she was aware of it,” says Sahil, who is undergoing therapy at Sex Addicts Anonymous.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the &lt;a href="http://indianexpress.com/about/economic-survey-2018/"&gt;Economic Survey&lt;/a&gt; 2016-17, the inter-state migration of workers in India has increased to 9 million annually during 2011-16 compared to previous years. A large section of these people leave their families behind in search of better prospects. In the hierarchy of visible discourse on loneliness, perhaps the migrant worker is the most affected, says Surinder Jodhka, professor of sociology at &lt;a href="http://indianexpress.com/about/jawaharlal-nehru"&gt;Jawaharlal Nehru&lt;/a&gt; University, Delhi. “The family structure is non-existent in the urban cities, and even in rural societies, there has been a disintegration. So, their feeling of loneliness is more pronounced.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When his father died, Manik left his hometown in West Bengal’s Malda district for Delhi, more than 10 years ago. He was about 20 years old then. A distant uncle of his, a driver with a private company in the city, had promised to set him up with a job. But when Manik showed up, the uncle looked “surprised that I had actually come and grew distant.” Desperate, Manik began taking up odd jobs to survive. “I didn’t have friends and didn’t speak Hindi. The only person I knew refused to acknowledge me. I felt lonely and lost,” says Manik. He found a job as a cook/peon at a small company, but the pay was minimal and Manik says he spent it on “cheap alcohol and women”. “Otherwise, I’d be crying in my room all the time. I used to keep the radio on, not to feel less lonely but to not hear myself cry. I was so ashamed of my feebleness,” says Manik. He still can’t bear to be in a room without the radio on, but he doesn’t believe that his condition merits medical attention. In any case, it is a luxury he can’t afford. “It’s a personal battle, which only you can fight, no?” he asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A first-of-its-kind study conducted by Brihanmumbai Municipal Corporation, between October 2015 till September 2017 analysing patients in its major hospitals — KEM, Sion, Nair and RN Cooper — found that 31 per cent patients visiting these hospitals suffered from mental disorders. At least 1,70,000 patients attended these four major hospitals for psychiatric aid. Depression formed the second-most common mental disorder in out-patient departments forming 20 per cent of the total chunk. All of them came from a low income group. “We realised that there is a need to have more treatment facilities in primary healthcare centres for mental health. Rates of depression are high even in urban poor, and diagnosis shouldn’t be delayed until they reach a tertiary centre,” says dean of KEM hospital, Dr Avinash Supe. “For poor people, it is unemployment, frustrated political environment that affects their livelihood, that leads to depression. Take for instance, the farmers who are committing suicide. They feel isolated in the agrarian and financial distress, they have no one to seek aid from,” says Dr Vinayak Kale, head of psychiatry department in JJ Group of Hospitals, Mumbai. For affluent sections, he says, it’s the opposite. Steady career growth is not enough. The stress to win the corporate race often leads to loneliness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the biggest contributors to loneliness, say psychologists and social scientists is our increasing reliance on technology. “One may have hundreds of friends on social media, but communication on that platform is virtual. Our culture is not individualised and we still need physical proximity. Social media has widened the gap of physical interaction,” says Dr Shubhangi Parkar, head of psychiatry at KEM hospital.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah, co-founder of The Centre for Internet and Society, Bengaluru, points out how “technologies have transformed what we understand as sociality, friendship and intimacy”. He says that young people — constant consumers of social media like Snapchat and WhatsApp — are “being told that they are always connected. Which means that they can, by definition, not feel lonely”. Yet, especially within the Indian context, says Shah, the pace of life and the rapid transformation of societies means that we no longer pay attention to the emotional needs of belonging, which actually alleviate loneliness. “We have replaced belonging with connectivity and this is going to have dire consequences in how we reshape our cities and lives,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rachna Saxena (name changed), 31, agrees. Saxena migrated to Mumbai from a small town in Uttar Pradesh 14 years ago. “It was a big shift from the protective environment of home,” she says. She moulded herself to the demands of her new life once she joined the creative team in a multinational FMCG firm. She had been dating a Christian boy, but, at 28, when she finally broached the topic of marriage, the boy dithered on grounds of religious differences. The relationship crumbled, but something shifted inside her. “On &lt;a href="http://indianexpress.com/about/facebook/"&gt;Facebook&lt;/a&gt;, I’d look at photographs of my friends on their honeymoon. Everyone looked so happy, I felt depressed. I really wanted to get married, have a stable relationship. But that was just one part of my problems. I was a star performer at work, my social media feed showcased my ‘happening’ life, but no one could sense the immense pressure to live up to it,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last year, a colleague she was close to died of a sudden heart attack at the age of 36. She saw his family squabble over property and his pregnant widow shunted out. “Another very close friend of mine, with whom I would share my distress, committed suicide. One fine day, he just shot himself,” says Saxena. She stopped meeting friends or inviting people over. In February this year, Saxena fell unconscious in her office. She had been sleeping fitfully and now had constant headaches. During her medical leave, she went home. “I ate and slept well, and, after a long time, felt happy. My parents are super supportive. But when I returned to Mumbai, it all came back. I realised I live two lives and I just couldn’t handle the stress of it,” she says. She started undergoing counselling sessions, and, a month ago, she deactivated her WhatsApp and Facebook accounts, choosing to travel and forge real friendships instead. “Now that I observe things more closely, I see that a lot of people around me are lonely even if they don’t look it. It can happen to anyone, you know,” she says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/indian-express-asad-ali-tabassum-barnagarwala-april-29-2018-you-are-not-the-only-one-india-stares-at-a-loneliness-epidemic'&gt;https://cis-india.org/internet-governance/news/indian-express-asad-ali-tabassum-barnagarwala-april-29-2018-you-are-not-the-only-one-india-stares-at-a-loneliness-epidemic&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-29T16:15:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/new-indian-express-april-26-2018-aadhaar-data-over-89-lakh-mnrega-workers-in-andhra-pradesh-leaked-online">
    <title>Aadhaar data of over 89 lakh MNREGA workers in Andhra Pradesh leaked online</title>
    <link>https://cis-india.org/internet-governance/news/new-indian-express-april-26-2018-aadhaar-data-over-89-lakh-mnrega-workers-in-andhra-pradesh-leaked-online</link>
    <description>
        &lt;b&gt;Independent security researcher Kodali Srinivas tweeted screenshots of Aadhaar data of 89,38,138 MNREGA workers available on the Andhra Pradesh Benefit Disbursement Portal.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.newindianexpress.com/states/andhra-pradesh/2018/apr/26/aadhaar-data-of-over-89-lakh-mnrega-workers-in-andhra-pradesh-leaked-online-1806717.html"&gt;published in New Indian Express&lt;/a&gt; on April 27, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Independent security researcher Kodali Srinivas, who exposed the leakage of Aadhaar and other personal data of 1.34 lakh beneficiaries on the State Housing Corporation website, on Thursday tweeted screenshots of Aadhaar data of 89,38,138 MNREGA workers availalbe on the Andhra Pradesh Benefit Disbursement Portal, which is maintained by APOnline, a joint venture between the Tata Consultancy Services (TCS) and the State government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hours after he blew the whistle, the website administrators began masking the data. In May 2017, Srinivas had co-authored a report for the Centre for Internet and Society, exposing how the Aadhaar data of 13.5 crore card holders was leaked online. The data was then leaked by four government portals, National Social Assistance Programme, National Rural Employment Guarantee Scheme, Chandranna Bima Scheme of the Government of Andhra Pradesh and Daily Online Payment Reports of NREGA of the Government of Andhra Pradesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It appears that almost a year later, nothing much has changed. Srinivas told TNIE he had sent a mail to the chief operating officer, APOnline and Universal Identification Authority of India, the National Critical Information Infrastructure Protection Centre, and CERT-In, the Centre's cyber response wing. When contacted, Balasubramanyam, Joint Secretary (NREGS) told TNIE, "I have seen it. It is Benefit Disbursement Portal... not maintained by us. We have been very careful ever since that massive leak of data last year."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Executive (operations), APOnline, S Chandramouleeswara Reddy refused comment saying that he was not the competent authority to speak on the issue. APOnline developed ICT solution for MGNREGA scheme, a framework involving Department of Posts, for disbursement of entitlements after accurate authentication of the entitlements through finger print authentication. TCS implements the ICT solution for MGNREGA in the State.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/new-indian-express-april-26-2018-aadhaar-data-over-89-lakh-mnrega-workers-in-andhra-pradesh-leaked-online'&gt;https://cis-india.org/internet-governance/news/new-indian-express-april-26-2018-aadhaar-data-over-89-lakh-mnrega-workers-in-andhra-pradesh-leaked-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-05-05T08:43:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-request-29-revenue-breakdown-by-source-for-fy-2017">
    <title>DIDP Request #29 - Revenue breakdown by source for FY 2017</title>
    <link>https://cis-india.org/internet-governance/blog/didp-request-29-revenue-breakdown-by-source-for-fy-2017</link>
    <description>
        &lt;b&gt;We requested ICANN for financial information they have not yet provided for the period ending June 2017.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;ICANN publication of its financial records for 2017 were missing  a crucial document which lists down their revenue as per the all the legal entities as sources who  contributed to it including Regional Internet  Registries, various registrars and their source of origin among other  details. We have requested them for this document in order to get a  better idea of the how these entities contribute to ICANN.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In response to our DIDP, ICANN notified us that they are in the process of compiling this report for the year ending June 2017 and will publish the same by 31st of May, 2018. Further they remarked that this procedure of making public their revenue by source was developed as part of ICANN’s enhancements to transparency in response to CIS’s earlier DIDP which was submitted in 2015.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The said report will be published on their Financial page within the time frame mentioned.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-request-29-revenue-breakdown-by-source-for-fy-2017'&gt;https://cis-india.org/internet-governance/blog/didp-request-29-revenue-breakdown-by-source-for-fy-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>akriti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-26T11:06:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/pai-wg-labor-and-economy-meeting">
    <title>PAI WG Labor and Economy Meeting</title>
    <link>https://cis-india.org/internet-governance/news/pai-wg-labor-and-economy-meeting</link>
    <description>
        &lt;b&gt;Elonnai Hickok co-chaired the first PAI Labor and Economy WG in NYC on April 25, 2018.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/pai-wg-labor-and-economy"&gt;Agenda&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/pai-wg-labor-and-economy-meeting'&gt;https://cis-india.org/internet-governance/news/pai-wg-labor-and-economy-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-05-05T09:35:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world">
    <title>Revenge Porn Laws across the World</title>
    <link>https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world</link>
    <description>
        &lt;b&gt;The following is a compilation of laws dealing with revenge porn if and how they exist across multiple countries and jurisdictions.&lt;/b&gt;
        &lt;p&gt;Country-wise legislation on “revenge porn” laws, &lt;a class="external-link" href="https://cis-india.org/internet-governance/files/revenge-porn-laws-across-the-world"&gt;click to download the file&lt;/a&gt; (PDF, 636 Kb)&lt;/p&gt;
&lt;p&gt;&lt;a href="#_Toc511943056"&gt;Europe&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a href="#_Toc511943057"&gt;United Kingdom&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943058"&gt;England and Wales&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943059"&gt;Scotland&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943060"&gt;Northern Ireland&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943061"&gt;Malta&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943062"&gt;Germany&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943063"&gt;France&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="#_Toc511943064"&gt;United States of America&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a href="#_Toc511943065"&gt;Alabama&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943066"&gt;Alaska&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943067"&gt;Arizona&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943068"&gt;Arkansas&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943069"&gt;California&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943070"&gt;Colorado&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943071"&gt;Connecticut&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943072"&gt;Delaware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943073"&gt;District of Columbia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943074"&gt;Florida&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943075"&gt;Georgia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943076"&gt;Hawaii&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943077"&gt;Idaho&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943078"&gt;Illinois&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943079"&gt;Iowa&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943080"&gt;Kansas&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943081"&gt;Louisiana&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943082"&gt;Maine&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943083"&gt;Maryland&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943084"&gt;Michigan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943085"&gt;Minnesota&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943086"&gt;Nevada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943087"&gt;New Hampshire&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943088"&gt;New Jersey&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943089"&gt;New Mexico&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943090"&gt;North Carolina&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943091"&gt;North Dakota&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943092"&gt;Oklahoma&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943093"&gt;Oregon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943094"&gt;Pennsylvania&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943095"&gt;South Dakota&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943096"&gt;Tennessee&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943097"&gt;Texas&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943098"&gt;Utah&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943099"&gt;Vermont&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943100"&gt;Virginia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943101"&gt;Washington&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943102"&gt;West Virginia. 20&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943103"&gt;Wisconsin. 20&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="#_Toc511943104"&gt;Australia&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a href="#_Toc511943105"&gt;New South Wales&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943106"&gt;South Australia.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943107"&gt;Western Australia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943108"&gt;Victoria&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="#_Toc511943109"&gt;Asia and Rest of the World&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a href="#_Toc511943110"&gt;Canada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943111"&gt;Philippines&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943112"&gt;Israel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943113"&gt;Japan&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a name="_Toc511943056"&gt;&lt;/a&gt;&lt;strong&gt;1. &lt;/strong&gt;&lt;strong&gt;&lt;span&gt;Europe&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Country&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Statute&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Year&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Contents – definition, classification, punishment, standard of proof&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Punishment&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Remarks&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="6"&gt;
&lt;h3&gt;&lt;a name="_Toc511943057"&gt;&lt;/a&gt;United Kingdom&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943058"&gt;&lt;/a&gt;&lt;strong&gt;England and Wales&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legislation.gov.uk/ukpga/2015/2/section/33/enacted"&gt;Section 33&lt;/a&gt;, Criminal Justice and Courts Act 2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Makes it an offence in England and Wales to disclose private sexual photographs and films without the consent of the individual depicted and with the intent to cause distress.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;There is a maximum sentence of two years imprisonment&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A call has been made to cover a wider range of offences through enactment of a new Act.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The law is not applicable retroactively.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943059"&gt;&lt;/a&gt;&lt;strong&gt;Scotland&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legislation.gov.uk/asp/2016/22/section/2/enacted"&gt;Part 1, Section 2&lt;/a&gt;, Abusive Behaviour and Sexual Harm Act, 2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person (“A”) commits an offence if—&lt;/p&gt;
&lt;p&gt;(a)A discloses, or threatens to disclose, a photograph or film which shows, or appears to show, another person (“B”) in an intimate situation,&lt;/p&gt;
&lt;p&gt;(b)by doing so, A intends to cause B fear, alarm or distress or A is reckless as to whether B will be caused fear, alarm or distress, and&lt;/p&gt;
&lt;p&gt;(c)the photograph or film has not previously been disclosed to the public at large, or any section of the public, by B or with B’s consent.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;A person who commits such an offence is liable—&lt;br /&gt;
&lt;p&gt;(a)on summary conviction, to imprisonment for a term not exceeding 12 months or a fine not exceeding the statutory maximum (or both),&lt;/p&gt;
&lt;p&gt;(b) on conviction on indictment, to imprisonment for a term not exceeding 5 years or a fine (or both).&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943060"&gt;&lt;/a&gt;&lt;strong&gt;Northern Ireland&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legislation.gov.uk/nia/2016/21/section/51/enacted"&gt;Part 3, Section 51&lt;/a&gt;, Amendment to Justice Act&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is an offence for a person to disclose a private sexual photograph or film if the disclosure is made—&lt;/p&gt;
&lt;p&gt;(a)without the consent of an individual who appears in the photograph or film, and&lt;/p&gt;
&lt;p&gt;(b)with the intention of causing that individual distress.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;A person guilty of an offence under this section is liable—&lt;br /&gt;
&lt;p style="text-align: justify; "&gt;(a) on conviction on indictment, to imprisonment for a term not exceeding 2 years or a fine (or both), and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not exceeding the statutory maximum (or both).&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943061"&gt;&lt;/a&gt;&lt;strong&gt;Malta&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://justice.gov.mt/en/pcac/Documents/Criminal%20code.pdf"&gt;Article 208E&lt;/a&gt;, Maltese Criminal Code&lt;/p&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It punishes whoever, with an intent to cause distress, emotional harm or harm of any nature, discloses a private sexual photograph or film without the consent of the person or persons displayed or depicted in such photograph or film.&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Such person would, on conviction be liable to imprisonment for a term of up to two years or to a fine of not less than €,3000 and not more than €5,000, or to both such imprisonment and fine&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943062"&gt;&lt;/a&gt;&lt;strong&gt;Germany&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://dsgvo-gesetz.de/bdsg-neu/"&gt;General Data Protection Regulation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.gesetze-im-internet.de/urhg/"&gt;Art Copyright Law&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Regulation (EU) 679/2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation (GDPR)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A person also has the right to object to the unauthorised dissemination or public display of his/her photograph (section 22, Art Copyright Law)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;If privacy rights are infringed, the individual affected can seek civil law remedies, which include:&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Cease and desist orders, rectification and&lt;/li&gt;
&lt;li&gt;Compensatory damages.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;In 2014, The Bundesgerichtshof (BGH), upheld an earlier ruling from a regional court in Koblenz, Germany, that said a man did not have the right to keep intimate photos of his ex-lover just because she had consented to taking them in the first place.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943063"&gt;&lt;/a&gt;&lt;strong&gt;France&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.republique-numerique.fr/pages/digital-republic-bill-rationale"&gt;Digital Republic Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Under the new law, the persons have a right to oppose the use of their personal data.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Revenge porn may be sanctioned by 2 years of imprisonment and a 60.000 euro fine.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;a name="_Toc511943064"&gt;&lt;/a&gt;&lt;strong&gt;2. &lt;/strong&gt;&lt;strong&gt;&lt;span&gt;United States of America&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;State&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Statute&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Year&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Constituents of the offence&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Punishment&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Remarks&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943065"&gt;&lt;/a&gt;&lt;strong&gt;Alabama&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://alisondb.legislature.state.al.us/alison/codeofalabama/1975/coatoc.htm"&gt;SB301. Code of Alabama 1975 Secs 15-20A-4 to 15-20A-43 amended.&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2017&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Distribution of an intimate, private image, also known as "revenge porn" or "nonconsensual pornography." The law applies when the depicted person has not consented to the transmission and the sender intends to harass or intimidate the depicted person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A first offense is a Class A misdemeanor, punishable by up to a year in jail. Subsequent offenses are Class C felonies, punishable by up to 10 years in prison.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943066"&gt;&lt;/a&gt;&lt;strong&gt;Alaska&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://codes.findlaw.com/ak/title-11-criminal-law/ak-st-sect-11-61-120.html"&gt;Title 11. Criminal Law § 11.61.120&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Provides that whoever publishes or distributes electronic or printed photographs, pictures, or films that show the genitals, anus, or female breast of the other person or show that person engaged in a sexual act commits a crime of harassment in second degree.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Harassment in the second degree is a class B misdemeanor.&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;Class B misdemeanors are less serious crimes, punishable by up to 90 days in jail and a fine of up to $2,000.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943067"&gt;&lt;/a&gt;&lt;strong&gt;Arizona&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Unlawful Distribution of Private Images, 2016 through amending &lt;a href="https://legiscan.com/AZ/text/HB2001/id/1368420"&gt;Section 13‑1425 of the Arizona Revised Statutes&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It provides that the distribution of images depicting states of nudity or specific sexual activities of another person is unlawful.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If such disclosure is by electronic means, it is a Class 4 felony.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If the person threatens to disclose but does not disclose, then it is a Class 1 Misdemeanor.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       Class 4 felonies are punishable up to 3.75 years in prison.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;·       A class 1 misdemeanor is the most serious misdemeanor offense and is punishable by up to 6 months in jail, 3 years of probation (5 years maximum probation for DUI offenses) and a $2,500 fine plus surcharges.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       The earlier state revenge porn bill was scrapped due to an ACLU Lawsuit.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943068"&gt;&lt;/a&gt;&lt;strong&gt;Arkansas&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.arkleg.state.ar.us/assembly/2015/2015R/Acts/Act304.pdf"&gt;Arkansas Code 5-26-314&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;July, 2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It criminalizes the distribution of an image, picture, video, or voice or audio recording of a sexual nature to harass, frighten, intimidate, threaten, or abuse a family or household member or a person in a current or former dating relationship; and for other purposes.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Such an offence is a Class A misdemeanour.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       A Class A misdemeanor is the most serious type of misdemeanor in Arkansas and it is punishable by up to one year in jail and a fine of up to $2,500.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Defines a “dating relationship” as romantic/ intimate relationship between two individuals and provides additional factors.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943069"&gt;&lt;/a&gt;&lt;strong&gt;California&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201320140SB1255"&gt;Section 647(j)(4) of California Penal Code&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Under this provision an act of revenge porn is defined as someone who “photographs or records by any means the image of the intimate body part or parts of another identifiable person, under circumstances where the parties agree or understand that the image shall remain private, and the person subsequently distributes the image taken, with the intent to cause serious emotional distress, and the depicted person suffers serious emotional distress.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It shall be a disorderly conduct, misdemeanour.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943070"&gt;&lt;/a&gt;&lt;strong&gt;Colorado&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201320140SB1255"&gt;Colorado Revised Statutes 18-7-107 and 18-7-108.&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Posting a Private Image for Harassment and Posting a Private Image for Pecuniary Gain is a Class 1 Misdemeanor.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The defendant can be fined up to $10,000.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943071"&gt;&lt;/a&gt;&lt;strong&gt;Connecticut&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.cga.ct.gov/2015/act/pa/pdf/2015PA-00213-R00HB-06921-PA.pdf"&gt;Section 53a-189a, Connecticut General Statutes&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;October 1, 2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It provides that whoever indulges in Unlawful dissemination of an intimate image is guilty&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The offence is a class A misdemeanor.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943072"&gt;&lt;/a&gt;&lt;strong&gt;Delaware&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://codes.findlaw.com/de/title-11-crimes-and-criminal-procedure/de-code-sect-11-1335.html"&gt;§ 1335, Title 11 of the Delaware Code&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;When  a person knowingly reproduces, distributes, exhibits, publishes, transmits, or otherwise disseminates a visual depiction of a person who is nude, or who is engaging in sexual conduct, when the person knows or should have &lt;span style="text-align: left; "&gt;known that the reproduction, distribution, exhibition, publication, transmission, or other dissemination was without the consent of the person depicted and that the visual depiction was created or provided to the person under circumstances in which the person depicted has a reasonable expectation of privacy, such person shall be guilty of violation of privacy.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is a class A misdemeanor; class G felony.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943073"&gt;&lt;/a&gt;&lt;strong&gt;District of Columbia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://lims.dccouncil.us/Download/32304/B20-0903-Engrossment.pdf"&gt;Criminalization of Non-Consensual Pornography Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;It provides that a person knowingly discloses one or more sexual images of another identified or identifiable person when:&lt;/p&gt;
&lt;p&gt;(1) The person depicted did not consent to the disclosure of the sexual image;&lt;/p&gt;
&lt;p&gt;(2) There was an agreement or understanding between the person depicted and the person disclosing that the sexual image would not be disclosed; and&lt;/p&gt;
&lt;p&gt;(3) The person disclosed the sexual image with the intent to harm the person depicted person depicted or to receive financial gain.&lt;/p&gt;
&lt;p&gt;(b) A person who violates this subsection shall be guilty of a misdemeanour.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Upon conviction such person shall be fined not more than the amount set forth in section 101 of the Criminal Fine Proportionality Amendment Act of 2012, approved June 11, 2013 (D.C. Law 19-317; D.C.42 Official Code § 22-3571.01), imprisoned for not more than 180 days, or both.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943074"&gt;&lt;/a&gt;&lt;strong&gt;Florida&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.flsenate.gov/Session/Bill/2015/0538/BillText/er/PDF"&gt;Florida Statute Section 784.049&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       “Sexually cyberharass” means to publish a sexually&lt;/p&gt;
&lt;p&gt;explicit image of a person that contains or conveys the personal identification information of the depicted person to an Internet website without the depicted person’s consent, for no legitimate purpose, with the intent of causing substantial emotional distress to the depicted person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person who willfully and maliciously sexually cyberharasses another person commits a misdemeanor of the first degree, punishable as provided in s. 775.082 or s. 775.083.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;If a person who has one prior conviction for sexual cyber harassment and who commits a second or subsequent sexual cyber harassment commits a felony of the third degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Aggrieved person can also initiate civil action to recover damages.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943075"&gt;&lt;/a&gt;&lt;strong&gt;Georgia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legis.ga.gov/Legislation/20132014/143392.pdf"&gt;Article 3 of Chapter 11 of Title 16 of the Official Code of Georgia&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       Whoever Electronically transmits or posts or causes such transmission or posting, in one or more transmissions or posts, a photograph or video which depicts nudity or sexually explicit conduct of an adult when the transmission or post is harassment or causes financial loss to the depicted person and serves no legitimate purpose to the depicted person.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Such person shall be guilty of a misdemeanor of a high and aggravated nature; provided, however, that upon a second or subsequent violation of &lt;span&gt;this Code section, he or she shall be guilty of a felony and, upon conviction thereof, shall be punished by imprisonment of not less than one nor more than five years, a fine of not more than $100,000.00, or both.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;There is a rebuttable presumption on the Internet Service Provider that it was not aware of the content of such post&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943076"&gt;&lt;/a&gt;&lt;strong&gt;Hawaii&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.capitol.hawaii.gov/session2014/bills/HB1750_CD1_.pdf"&gt;Section 711-1110.9, Hawaii Revised Statutes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person commits the offense of violation of privacy in the first degree if The person knowingly discloses an image or video of another identifiable person either in the nude, as defined in section 712-1210, or engaging in sexual conduct, as defined in section 712-1210, without the consent of the depicted person, with intent to harm substantially the depicted person with respect to that person’s health, safety, business, calling, career, financial condition, reputation, or personal relationships.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Violation of privacy in the first degree is a class C felony.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In addition to any penalties the court may impose, the court may order the destruction of any recording made in &lt;/span&gt;&lt;span&gt;violation of this section&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Exception has been carved out for When the person was voluntarily nude in public or voluntarily engaging in sexual conduct in public.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943077"&gt;&lt;/a&gt;&lt;strong&gt;Idaho&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://codes.findlaw.com/id/title-18-crimes-and-punishments/id-st-sect-18-8327.html"&gt;Idaho Code 18-6609(2)(b)&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2017&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Intentionally or with reckless disregard disseminating, publishing or selling (or conspiring) any image or images of the intimate areas of another person or persons without the consent of such other person or persons and he knows or reasonably should have known that one or both parties agreed or understood that the images should remain private.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The punishments are decided on a case by case basis, but seem to range from state prison terms of three to five years, and/or a fine of up to $5,000 based on the cases that have emerged&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943078"&gt;&lt;/a&gt;&lt;strong&gt;Illinois&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.ilga.gov/legislation/publicacts/fulltext.asp?Name=098-1138"&gt;Section 11-23.5 of The Illinois Criminal Code of 2012&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Criminalises the Non-Consensual Dissemination of Private Sexual Images.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is a Class 4 Felony.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943079"&gt;&lt;/a&gt;&lt;strong&gt;Iowa&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.legis.iowa.gov/legislation/BillBook?ga=87&amp;amp;ba=HF526"&gt;Section708.7 of the Code of 2017&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2017&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Dissemination, publication, distribution or causing it thereof of photograph or film showing another person in partial or full nudity or engaged in a sex act, without consent, is harassment.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Such an offence is harassment in first degree and is an aggravated misdemeanour&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943080"&gt;&lt;/a&gt;&lt;strong&gt;Kansas&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.kslegislature.org/li_2016/b2015_16/measures/documents/hb2501_enrolled.pdf"&gt;Section 21-6101(a)(8) of Kansas State Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Breach of privacy is knowingly and without lawful &lt;span&gt;authority: disseminating any videotape, photograph, film or image of another identifiable person 18 years of age or older who is nude or engaged in sexual activity and under circumstances in which such identifiable person had a reasonable expectation of privacy, with the intent to harass, threaten or intimidate such identifiable person, and such identifiable person did not consent to such dissemination&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Such an offence is a Severity level 8, person felony&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943081"&gt;&lt;/a&gt;&lt;strong&gt;Louisiana&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legis.la.gov/legis/ViewDocument.aspx?d=954684"&gt;R.S. 14:283.2&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person commits the offense of non-consensual disclosure of a private mage when all of the following occur:&lt;/p&gt;
&lt;p&gt;(1) The person intentionally discloses an image of another person who is seventeen years of age or older, who is identifiable from the image or information displayed in connection with the image, and whose intimate parts are exposed in whole or in part.&lt;/p&gt;
&lt;p&gt;(2) The person who discloses the image obtained it under circumstances in which a reasonable person would know or understand that the image was to remain private.&lt;/p&gt;
&lt;p&gt;(3) The person who discloses the image knew or should have known that the person in the image did not consent to the disclosure of the image.&lt;/p&gt;
&lt;p&gt;(4) The person who discloses the image has the intent to harass or cause emotional distress to the person in the image, and the person who commits the offense knew or should have known that the disclosure could harass or cause emotional distress to the person in the image&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Whoever commits the offense of non-consensual disclosure of a private image shall be fined not more than ten thousand dollars, imprisoned with or without hard labour for not more than two years, or both&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No liability is imposed on the computer service used for posting such image&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943082"&gt;&lt;/a&gt;&lt;strong&gt;Maine&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.mainelegislature.org/legis/bills/getPDF.asp?paper=HP0460&amp;amp;item=5&amp;amp;snum=127"&gt;Section 1 17-A MRSA §511-A&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person is guilty of unauthorized dissemination of certain private images if the person, with the intent to harass, torment or threaten the depicted person or another person, knowingly disseminates, displays or publishes a photograph, videotape, film or digital recording of another person in a state of nudity or engaged in a sexual act or engaged in sexual contact in a manner in which there is no public or newsworthy purpose when the person knows or should have known that the depicted person:&lt;/p&gt;
&lt;p&gt;(1) Is 18 years of age or older;&lt;/p&gt;
&lt;p&gt;(2) Is identifiable from the image itself or information displayed in connection with the image; and&lt;/p&gt;
&lt;p&gt;(3) Has not consented to the dissemination, display or publication of the private image.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Unauthorized dissemination of certain private images is a Class D crime.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943083"&gt;&lt;/a&gt;&lt;strong&gt;Maryland&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://mgaleg.maryland.gov/2014RS/bills/hb/hb0043E.pdf"&gt;§ 3-809, Maryland Code.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person may not intentionally cause serious emotional distress to another by intentionally placing on the internet an identifiable a photograph, film, videotape, recording, or any other reproduction of the image of the other person that reveals the identity of the other person with his or her intimate parts exposed or while engaged in an act of sexual contact:&lt;/p&gt;
&lt;p&gt;(1) knowing that the other person did not consent to &lt;span&gt;the placement of the image on the internet; and&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) under circumstances in which the other person had a reasonable expectation that the image would be kept private.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person who violates this section is guilty of a misdemeanor and on conviction is subject to imprisonment not exceeding 2 years or a fine not exceeding $5,000 or both.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943084"&gt;&lt;/a&gt;&lt;strong&gt;Michigan&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legislature.mi.gov/documents/2015-2016/billenrolled/Senate/pdf/2015-SNB-0508.pdf"&gt;Sec 145e of MCL&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;If a person threatens, coerces, or intimidates dissemination of any sexually explicit visual material of another person shall be punishable under section 145f.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.legislature.mi.gov/documents/2015-2016/billenrolled/Senate/pdf/2015-SNB-0509.pdf"&gt;Section 145f&lt;/a&gt;- first offense punishable by 93 day sentence or fine up to $500.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943085"&gt;&lt;/a&gt;&lt;strong&gt;Minnesota&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.revisor.mn.gov/bills/text.php?number=SF2713&amp;amp;version=2&amp;amp;session=ls89&amp;amp;session_year=2016&amp;amp;session_number=0"&gt;§ 617.261, Minnesota Statutes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A cause of action against a person for the non-consensual dissemination of private sexual images exists when:&lt;/p&gt;
&lt;p&gt;(1) a person disseminated an image without the consent of the person depicted in the image;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) the image is of an individual depicted in a sexual act or whose intimate parts are exposed in whole or in part;&lt;/p&gt;
&lt;p&gt;(3) the person is identifiable:&lt;/p&gt;
&lt;p&gt;(i) from the image itself, by the person depicted in the image or by another person; or&lt;/p&gt;
&lt;p&gt;(ii) from the personal information displayed in connection with the image; and&lt;/p&gt;
&lt;p&gt;(4) the image was obtained or created under circumstances in which the person depicted had a reasonable expectation of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fact that the individual depicted in the image consented to the creation of the image or to the voluntary private transmission of the image is not a defense to liability for a person who has disseminated the image without consent.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Conviction for nonconsensual dissemination of private sexual images qualifies as a prior “qualified domestic violence-related offense” that enhances penalties for convictions for domestic assault, 4th &amp;amp; 5th degree assault, stalking, and violation of a harassment restraining order.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Consent to such image being taken is no defense&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943086"&gt;&lt;/a&gt;&lt;strong&gt;Nevada&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.leg.state.nv.us/Session/78th2015/Bills/AB/AB49_EN.pdf"&gt;Sections 2-6 of Chapter 200 of NRS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person commits the crime of unlawful dissemination of an intimate image when, with the intent to harass, harm or terrorize another person, the person electronically disseminates or sells an intimate image which depicts the other person and the other person:&lt;/p&gt;
&lt;p&gt;(1) did not give prior consent to the electronic dissemination or sale;&lt;/p&gt;
&lt;p&gt;(2) had a reasonable expectation that the intimate image would be kept private and would not be made visible to the public; and&lt;/p&gt;
&lt;p&gt;(3) was at least 18 years of age when the intimate image was created&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Such person is guilty of a category D felony&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943087"&gt;&lt;/a&gt;&lt;strong&gt;New Hampshire&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.gencourt.state.nh.us/bill_Status/billText.aspx?id=962&amp;amp;txtFormat=html%22,%22http://www.gencourt.state.nh.us/bill_Status/billText.aspx?id=962&amp;amp;txtFormat=html"&gt;§ 644:9-a, N.H. Rev. Stat.&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Nonconsensual dissemination of private sexual images with the intent to harass, intimidate, threaten, or coerce the depicted person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is a felony.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943088"&gt;&lt;/a&gt;&lt;strong&gt;New Jersey&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://law.justia.com/codes/new-jersey/2013/title-2c/section-2c-14-9/"&gt;§ 2C:14-9, New Jersey Code&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Making a nonconsensual recording that reveals another person’s "intimate parts" or shows the person engaged in a sexual act without consent.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Felony, three to five years in prison, a fine not to exceed $15,000.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943089"&gt;&lt;/a&gt;&lt;strong&gt;New Mexico&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.nmlegis.gov/Legislation/Legislation?chamber=H&amp;amp;legtype=B&amp;amp;legno=142&amp;amp;year=15&amp;amp;AspxAutoDetectCookieSupport=1"&gt;HB 142, new section added to the New Mexico Criminal Code&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Unauthorised distribution of sensitive images without that person’s consent with the intent to harass, humiliate or intimidate that person or cause substantial emotional distress is a misdemeanour.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is a misdemeanour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Upon a second or subsequent conviction, the offender is guilty of a fourth degree felony&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943090"&gt;&lt;/a&gt;&lt;strong&gt;North Carolina&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.ncleg.net/Sessions/2015/Bills/House/PDF/H792v6.pdf"&gt;§ 14-190.5A, Article 26 of Chapter 14 of the General Statutes&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person is guilty of disclosure of private images if all of the following apply:&lt;/p&gt;
&lt;p&gt;(1) The person knowingly discloses an image of another person with the intent to do either of the following:&lt;/p&gt;
&lt;p&gt;a. Coerce, harass, intimidate, demean, humiliate, or cause financial loss to the depicted person.&lt;/p&gt;
&lt;p&gt;b. Cause others to coerce, harass, intimidate, demean, humiliate, or cause financial loss to the depicted person.&lt;/p&gt;
&lt;p&gt;(2) The depicted person is identifiable from the disclosed image itself or information offered in connection with the image.&lt;/p&gt;
&lt;p&gt;(3) The depicted person's intimate parts are exposed or the depicted person is engaged in sexual conduct in the disclosed image.&lt;/p&gt;
&lt;p&gt;(4) The person discloses the image without the affirmative consent of the depicted person.&lt;/p&gt;
&lt;p&gt;(5) The person discloses the image under circumstances such that the person knew or should have known that the depicted person had a reasonable expectation of privacy.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;For an offense by a person who is 18 years of age or older at the time of the offense, the violation is a Class H felony.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a first offense by a person who is under 18 years of age at the time of the offense, the violation is a Class 1 misdemeanor.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a second or subsequent offense by a person who is under the age of 18 at the time of the offense, the violation is a Class H felony&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The Court may order destruction of such image.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision is in addition to civil and criminal remedies.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943091"&gt;&lt;/a&gt;&lt;strong&gt;North Dakota&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legis.nd.gov/assembly/64-2015/documents/15-0982-03000.pdf?20150621075722"&gt;Section 12.1-17-07.2 of the North Dakota Century Code&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       A person commits the offense of distribution of intimate images if the person knowingly or intentionally distributes to any third party any intimate image of an individual eighteen years of age or older, if:&lt;/p&gt;
&lt;p&gt;(1) The person knows that the depicted individual has not given consent to the person to distribute the intimate image;&lt;/p&gt;
&lt;p&gt;(2) The intimate image was created by or provided to the person under circumstances in which the individual has a reasonable expectation of privacy; and&lt;/p&gt;
&lt;p&gt;(3) Actual emotional distress or harm is caused to the individual as a result of the distribution under this section.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Distribution of an intimate image is a class A misdemeanor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943092"&gt;&lt;/a&gt;&lt;strong&gt;Oklahoma&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://legiscan.com/OK/text/SB1257/2016"&gt;Section 1040.13b of Title 21, Oklahoma Statutes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       A person commits nonconsensual dissemination of private sexual images when he or she:&lt;/p&gt;
&lt;p&gt;(1) Intentionally disseminates an image of another person:&lt;/p&gt;
&lt;p&gt;a. who is at least eighteen (18) years of age,&lt;/p&gt;
&lt;p&gt;b. who is identifiable from the image itself or&lt;/p&gt;
&lt;p&gt;information displayed in connection with the image,&lt;/p&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;p&gt;c. who is engaged in a sexual act or whose intimate parts are exposed, in whole or in part;&lt;/p&gt;
&lt;p&gt;(2) Disseminates the image with the intent to harass, intimidate or coerce the person, or under circumstances in which a reasonable person would know or understand that dissemination of the image would harass, intimidate or coerce the person&lt;/p&gt;
&lt;p&gt;(3) Obtains the image under circumstances in which a reasonable person would know or understand that the image was to remain private; and&lt;/p&gt;
&lt;p&gt;(4) Knows or a reasonable person should have known that the person in the image has not consented to the dissemination.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Any person who violates the provisions of this section shall be guilty of a misdemeanour punishable by imprisonment in a county jail for not more than one (1) year or by a fine of not more than.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One Thousand Dollars ($1,000.00), or both such fine and imprisonment&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The court shall have the authority to order the defendant to remove the disseminated image should the court find it is in the power of the defendant to do so.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943093"&gt;&lt;/a&gt;&lt;strong&gt;Oregon&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://olis.leg.state.or.us/liz/2015R1/Downloads/MeasureDocument/SB188/Enrolled"&gt;ORS 161.005&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       (1) A person commits the crime of unlawful dissemination of an intimate image if:&lt;/p&gt;
&lt;p&gt;(a) The person, with the intent to harass, humiliate or injure another person, knowingly causes to be disclosed through an Internet website an identifiable image of the other person whose intimate parts are visible or who is engaged in sexual conduct;&lt;/p&gt;
&lt;p&gt;(b) The person knows or reasonably should have known that the other person does not consent to the disclosure;&lt;/p&gt;
&lt;p&gt;(c) The other person is harassed, humiliated or injured by the disclosure; and&lt;/p&gt;
&lt;p&gt;(d) A reasonable person would be harassed, humiliated or injured by the disclosure.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Unlawful dissemination of an intimate image is a Class A misdemeanor.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlawful dissemination of an intimate image is a Class C felony if the person has a prior conviction under this section at the time of the offense.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943094"&gt;&lt;/a&gt;&lt;strong&gt;Pennsylvania&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legis.state.pa.us/cfdocs/legis/li/uconsCheck.cfm?yr=2014&amp;amp;sessInd=0&amp;amp;act=115"&gt;Title 18 Pennsylvania Consolidated Statutes § 3131&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person commits the offense of unlawful dissemination of intimate image if, with intent to harass, annoy or alarm a current or former sexual or intimate partner, the person disseminates a visual depiction of the current or former sexual or intimate partner in a state of nudity or engaged in sexual conduct.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       An offense shall be:&lt;/p&gt;
&lt;p&gt;(1)  A misdemeanor of the first degree, when the person depicted is a minor.&lt;/p&gt;
&lt;p&gt;(2)  A misdemeanor of the second degree, when the person depicted is not a minor.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943095"&gt;&lt;/a&gt;&lt;strong&gt;South Dakota&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://sdlegislature.gov/Statutes/Codified_Laws/DisplayStatute.aspx?Type=Statute&amp;amp;Statute=22-21-4"&gt;Section 4 of Chapter 22-21 of South Dakota Code of Laws&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No person may use or disseminate in any form any visual recording or photographic device to photograph or visually record any other person without clothing or under or through the clothing, or with another person depicted in a sexual manner, for the purpose of viewing the body of, or the undergarments worn by, that other person, without the consent or knowledge of that other person, with the intent to self-gratify, to harass, or embarrass and invade the privacy of that other person, under circumstances in which the other person has a reasonable expectation of privacy.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A violation of this section is a Class 1 misdemeanor.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, a violation of this section is a Class 6 felony if the victim is seventeen years of age or younger and the perpetrator is at least twenty-one years old.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943096"&gt;&lt;/a&gt;&lt;strong&gt;Tennessee&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://publications.tnsosfiles.com/acts/109/pub/pc0872.pdf"&gt;Chapter 872 Tenn. Pub. Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2017&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;(a) A person commits unlawful exposure who, with the intent to cause emotional distress, distributes an image of the intimate part or parts of another identifiable person if:&lt;/p&gt;
&lt;p&gt;(1) The image was photographed or recorded under circumstances where the parties agreed or understood that the image would remain private; and&lt;/p&gt;
&lt;p&gt;(2) The person depicted in the image suffers emotional distress.&lt;/p&gt;
&lt;p&gt;(b) As used in this section:&lt;/p&gt;
&lt;p&gt;(1) "Emotional distress" has the same meaning as defined in § 39-17-315; and&lt;/p&gt;
&lt;p&gt;(2) "Intimate part" means any portion of the primary genital area, buttock, or any portion of the female breast below the top of the areola that is either uncovered or visible through less than fully opaque clothing.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A violation of subsection (a) is a Class A misdemeanor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, nothing in this section precludes punishment under any other section of law providing for greater punishment.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943097"&gt;&lt;/a&gt;&lt;strong&gt;Texas&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://capitol.texas.gov/tlodocs/84R/billtext/pdf/SB01135F.pdf#navpanes=0"&gt;Chapter 98B, ATitle 4, Civil Practice and Remedies Code&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;(a)A defendant is liable, as provided by this chapter, to a person depicted in intimate visual material for damages arising from the disclosure of the material if:&lt;/p&gt;
&lt;p&gt;(1)the defendant discloses the intimate visual&lt;/p&gt;
&lt;p&gt;material without the effective consent of the depicted person;&lt;/p&gt;
&lt;p&gt;(2)the intimate visual material was obtained by the&lt;/p&gt;
&lt;p&gt;defendant or created under circumstances in which the depicted person had a reasonable expectation that the material would remain private;&lt;/p&gt;
&lt;p&gt;(3)the disclosure of the intimate visual material &lt;span&gt;causes harm to the depicted person; and&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;(4)the disclosure of the intimate visual material &lt;span&gt;reveals the identity of the depicted person in any manner, including through:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;(A)any accompanying or subsequent information &lt;span&gt;or material related to the intimate visual material; or&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;(B)information or material provided by a third &lt;span&gt;party in response to the disclosure of the intimate visual material&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) defendant is liable, as provided by this chapter, to a person depicted in intimate visual material for damages arising from the promotion of the material if, knowing the character and content of the material, the defendant promotes intimate visual material described by Subsection (a) on an Internet website or other forum for publication that is owned or operated by the defendant.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;An offense under this section is a Class A misdemeanor.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If conduct that constitutes an offense under this section also constitutes an offense under another law, the actor may be prosecuted under this section, the other law, or both.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Aggrieved person may recover actual and exemplary damages.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The provisions shall be liberally construed by the courts to promote its underlying purpose to protect&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Persons from, and provide adequate remedies to victims of, the disclosure or promotion of intimate visual material.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943098"&gt;&lt;/a&gt;&lt;strong&gt;Utah&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://le.utah.gov/~2014/bills/static/HB0071.html"&gt;§ 76-5b-203, Utah Code.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;An actor commits the offense of distribution of intimate images if the actor, with the intent to cause emotional distress or harm, knowingly or intentionally distributes to any third party any intimate image of an individual who is 18 years of age or older, if:&lt;/p&gt;
&lt;p&gt;(a) the actor knows that the depicted individual has not given consent to the actor to distribute the intimate image;&lt;/p&gt;
&lt;p&gt;(b) the intimate image was created by or provided to the actor under circumstances in which the individual has a reasonable expectation of privacy; and&lt;/p&gt;
&lt;p&gt;(c) actual emotional distress or harm is caused to the person as a result of the distribution under this section.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Distribution of an intimate image is a class A misdemeanour.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943099"&gt;&lt;/a&gt;&lt;strong&gt;Vermont&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://legislature.vermont.gov/assets/Documents/2016/Docs/BILLS/H-0105/H-0105%20As%20Passed%20by%20Both%20House%20and%20Senate%20Unofficial.pdf"&gt;Sec. 2. 13 V.S.A. § 2606&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person violates this section if he or she knowingly discloses a visual image of an identifiable person who is nude or who is engaged in sexual conduct, without his or her consent, with the intent to harm, harass, intimidate, threaten, or coerce the person depicted, and the disclosure would cause a reasonable person to suffer harm. A person may be identifiable from the &lt;span style="text-align: left; "&gt;image itself or information offered in connection with the image. Consent to recording of the visual image does not, by itself, constitute consent for disclosure of the image.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person who violates this provision shall be imprisoned not more than two years or fined not more than $2,000.00, or both.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A person who violates this provision with the intent of disclosing the image for financial profit shall be imprisoned not more than five years or fined not more than $10,000.00, or both.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;In addition, the Court may order &lt;span&gt;equitable relief, including a temporary restraining order, a preliminary &lt;/span&gt;&lt;span&gt;injunction, or a permanent injunction ordering the defendant to cease display or disclosure of the image.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court may grant injunctive relief maintaining the confidentiality of a plaintiff using a pseudonym.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943100"&gt;&lt;/a&gt;&lt;strong&gt;Virginia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://law.lis.virginia.gov/vacode/title18.2/chapter8/section18.2-386.2/"&gt;§ 18.2-386.2, Code of Virginia&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Any person who, with the intent to coerce, harass, or intimidate, maliciously disseminates or sells any videographic or still image created by any means whatsoever that depicts another person who is totally nude, or in a state of undress so as to expose the genitals, pubic area, buttocks, or female breast, where such person knows or has reason to know that he is not licensed or authorized to disseminate or sell such videographic or still image is guilty.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Such an offense is a Class 1 misdemeanor.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943101"&gt;&lt;/a&gt;&lt;strong&gt;Washington&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://lawfilesext.leg.wa.gov/biennium/2015-16/Pdf/Bills/House%20Passed%20Legislature/1272-S2.PL.pdf"&gt;Title 9A RCW&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person commits the crime of disclosing intimate images when the person knowingly discloses an intimate image of another person and the person disclosing the image:&lt;/p&gt;
&lt;p&gt;(a) Obtained it under circumstances in which a reasonable person would know or understand that the image was to remain private;&lt;/p&gt;
&lt;p&gt;(b) Knows or should have known that the depicted  person has not consented to the disclosure; and10&lt;/p&gt;
&lt;p&gt;(c) Knows or reasonably should know that disclosure would cause harm to the depicted person.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The crime of disclosing intimate images:&lt;/p&gt;
&lt;p&gt;(a) Is a gross misdemeanor on the first offense; or&lt;/p&gt;
&lt;p&gt;(b) Is a class C felony if the defendant has one or more prior convictions for disclosing intimate images.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person who is under the age of eighteen is not guilty of the crime of disclosing intimate images unless the person:&lt;/p&gt;
&lt;p&gt;(a) Intentionally and maliciously disclosed an intimate image of another person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Obtained it under circumstances in which a reasonable person would know or understand that the image was to remain private; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) Knows or should have known that the depicted person has not consented to the disclosure&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943102"&gt;&lt;/a&gt;&lt;strong&gt;West Virginia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.wvlegislature.gov/Bill_Text_HTML/2017_SESSIONS/RS/Bills/SB240%20SUB1%20enr.htm"&gt;§61-8-28a, Code of West Virginia&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2017&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No person may knowingly and intentionally disclose, cause to be disclosed or threaten to disclose, with the intent to harass, intimidate, threaten, humiliate, embarrass, or coerce, an image of another which shows the intimate parts of the depicted person or shows the depicted person engaged in sexually explicit conduct which was captured under circumstances where the person depicted had a reasonable expectation that the image would not be publicly disclosed.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person convicted is guilty of a misdemeanor and, upon conviction thereof, shall be confined in jail for not more than one year, fined not less than $1,000 nor more than $5,000, or both confined and fined.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943103"&gt;&lt;/a&gt;&lt;strong&gt;Wisconsin&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://docs.legis.wisconsin.gov/2013/related/acts/243"&gt;§ 942.09, Code of Wisconsin&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;It provides for posting or publishing a sexually explicit image without consent and providing a penalty. Such an offence is a Class A misdemeanour.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Class A misdemeanors can result in fines up to $10,000, imprisonment up to 9 months or a combination of the two.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;a name="_Toc511943104"&gt;&lt;/a&gt;&lt;strong&gt;3. &lt;/strong&gt;&lt;strong&gt;&lt;span&gt;Australia&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Country&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Statute&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Year&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Contents – definition, classification, punishment, standard of proof&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Punishment&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Remarks&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943105"&gt;&lt;/a&gt;&lt;strong&gt;New South Wales&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.legislation.nsw.gov.au/#/view/act/1900/40/part3/div15c/sec91q"&gt;Section 91Q, Crimes Act 1900&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2018&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person who intentionally distributes an intimate image of another person:&lt;/p&gt;
&lt;p&gt;(a) without the consent of the person, and&lt;/p&gt;
&lt;p&gt;(b) knowing the person did not consent to the distribution or being reckless as to whether the person consented to the distribution, is guilty of an offence.&lt;/p&gt;
&lt;p&gt;"intimate image" means:&lt;/p&gt;
&lt;p&gt;(a) an image of a person's private parts, or of a person engaged in a private act, in circumstances in which a reasonable person would reasonably expect to be afforded privacy, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) an image that has been altered to appear to show a person's private parts, or a person engaged in a private act, in circumstances in which a reasonable person would reasonably expect to be afforded privacy.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Maximum penalty: 100 penalty units or imprisonment for 3 years, or both.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943106"&gt;&lt;/a&gt;&lt;strong&gt;South Australia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.legislation.sa.gov.au/lz/c/a/summary%20offences%20act%201953/current/1953.55.auth.pdf"&gt;Summary Offences Act 1953&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2018&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person who distributes an invasive image of another person, knowing or having reason to believe that the other person—&lt;/p&gt;
&lt;p&gt;(a) does not consent to that particular distribution of the image; or&lt;/p&gt;
&lt;p&gt;(b) does not consent to that particular distribution of the image and does not consent to distribution of the image generally, is guilty of an offence.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;An image of a person will be taken to be an invasive&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;image of the person if it depicts the person in a place other than a public place—&lt;/p&gt;
&lt;p&gt;(a) engaged in a private act; or&lt;/p&gt;
&lt;p&gt;(b) in a state of undress such that—&lt;/p&gt;
&lt;p&gt;(i) in the case of a female—the bare breasts are visible; or&lt;/p&gt;
&lt;p&gt;(ii) in any case—the bare genital or anal region is visible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) However, an image of a person that falls within the standards of morality, decency and propriety generally accepted by reasonable adults in the community will not be taken to be an invasive image of the person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Maximum penalty:&lt;/p&gt;
&lt;p&gt;(a) if the invasive image is of a person under the age of 17 years—$20000 or imprisonment for 4 years;&lt;/p&gt;
&lt;p&gt;(b) in any other case—$10 000 or imprisonment for 2 years.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943107"&gt;&lt;/a&gt;&lt;strong&gt;Western Australia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://classic.austlii.edu.au/au/legis/wa/bill/roarlavb2016630/"&gt;Section 10G/61, Restraining Orders and Related Legislation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://classic.austlii.edu.au/au/legis/wa/bill/roarlavb2016630/"&gt;Amendment (Family Violence) Act 2016&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A court may restrain the respondent from doing all or any of the following in the case of a family violence restraining order:&lt;/p&gt;
&lt;p&gt;distributing or publishing, or threatening to distribute or publish, intimate personal images of the person seeking to be protected;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2 years imprisonment.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Check comes into play only in case of a family violence restraining order and is not general protection.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943108"&gt;&lt;/a&gt;&lt;strong&gt;Victoria&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www5.austlii.edu.au/au/legis/vic/consol_act/soa1966189/s41c.html"&gt;Section 41C, Summary Offences Act 1966&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2012&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person who visually captures or has visually captured an image of another person's genital or anal region must not intentionally distribute that image.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2 years imprisonment.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;a name="_Toc511943109"&gt;&lt;/a&gt;&lt;strong&gt;4. &lt;/strong&gt;&lt;strong&gt;&lt;span&gt;Asia and Rest of the World&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Country&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Statute&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Year&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Contents – definition, classification, punishment, standard of proof&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Punishment&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Remarks&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943110"&gt;&lt;/a&gt;&lt;strong&gt;Canada&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.cba.org/CMSPages/GetFile.aspx?guid=2f73fcf2-a04e-402a-97e8-de9d56b0ba1a"&gt;Section 162.1, Criminal Code through Bill C-13 or Cyberbullying Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Everyone who knowingly publishes, distributes, transmits, sells, makes available or advertises an intimate image of a person knowing that the person depicted in the image did not give their consent to that conduct, or being reckless as to whether or not that person gave their consent to that conduct, is guilty.&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;In this section, “intimate image” means a visual recording of a person made by any means including a photographic, film or video recording,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;(a) in which the person is nude, is exposing his or her genital organs or anal region or her breasts or is engaged in explicit sexual activity;&lt;/p&gt;
&lt;p&gt;(b) in respect of which, at the time of the recording, there were circumstances that gave rise to a reasonable expectation of privacy; and&lt;/p&gt;
&lt;p&gt;(c) in respect of which the person depicted retains a reasonable expectation of privacy at the time the offence is committed.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Punishment is:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) of an indictable offence and liable to imprisonment for a term of not more than five years; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) of an offence punishable on summary conviction.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943111"&gt;&lt;/a&gt;&lt;strong&gt;Philippines&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.lawphil.net/statutes/repacts/ra2010/ra_9995_2010.html"&gt;Anti-Photo and Video Voyeurism Act of 2009&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;It is hereby prohibited and declared unlawful for any person:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) To take photo or video coverage of a person or group of persons performing sexual act or any similar activity or to capture an image of the private area of a person/s such as the naked or undergarment clad genitals, public area, buttocks or female breast without the consent of the person/s involved and under circumstances in which the person/s has/have a reasonable expectation of privacy;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;(b) To copy or reproduce, or to cause to be copied or reproduced, such photo or video or recording of sexual act or any similar activity with or without consideration;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(c) To sell or distribute, or cause to be sold or distributed, such photo or video or recording of sexual act, whether it be the original copy or reproduction thereof; or&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(d) To publish or broadcast, or cause to be published or broadcast, whether in print or broadcast media, or show or exhibit the photo or video coverage or recordings of such sexual act or any similar activity through VCD/DVD, internet, cellular phones and other similar means or device.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The prohibition under paragraphs (b), (c) and (d) shall apply notwithstanding that consent to record or take photo or video coverage of the same was given by such person/s. Any person who violates this provision shall be liable for photo or video voyeurism as defined herein.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The penalty of imprisonment of not less that three (3) years but not more than seven (7) years and a fine of not less than One hundred thousand pesos (P100,000.00) but not more than Five hundred thousand pesos (P500,000.00), or both, at the discretion of the court shall be imposed upon any person found guilty of violating Section 4 of this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the violator is a juridical person, its license or franchise shall be automatically be deemed revoked and the persons liable shall be the officers thereof including the editor and reporter in the case of print media, and the station manager, editor and broadcaster in the case of a broadcast media.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If the offender is a public officer or employee, or a professional, he/she shall be administratively liable.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If the offender is an alien, he/she shall be subject to deportation proceedings after serving his/her sentence and payment of fines.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943112"&gt;&lt;/a&gt;&lt;strong&gt;Israel&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://mfa.gov.il/MFA/AboutIsrael/State/Law/Pages/Prevention_of_Sexual_Harassment_Law_5758-1998.aspx"&gt;Prevention of Sexual Harassment Law, 5758-1998 amended in 2014&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The distribution of still pictures or video recordings of a person’s image that focuses on his/her sexuality, including by editing or incorporation, is unlawful if made:&lt;/p&gt;
&lt;p&gt;1. without the person’s consent;&lt;/p&gt;
&lt;p&gt;2. in a way that facilitates identification of the person; and&lt;/p&gt;
&lt;p&gt;3. under circumstances that may degrade or shame him/her&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The distribution of such an image constitutes sexual harassment under section 3(a) of the Prevention of Sexual Harassment Law and intentional harm to a person’s privacy under section 5 of the Protection of Privacy Law.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The crimes are punishable with five years of imprisonment, in addition to subjecting the perpetrator to civil liability and the duty to pay monetary compensation to the victim.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943113"&gt;&lt;/a&gt;&lt;strong&gt;Japan&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.loc.gov/law/foreign-news/article/japan-new-revenge-porn-prevention-act/"&gt;Act on Prevention of Damage by Provision of Private Sexual Image Records Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;It criminalizes the provision of a private sexual image of another person without the person’s approval via a means of telecommunication to an unspecified number of or to many people.&lt;/p&gt;
&lt;p&gt;It allows Internet service providers to delete suspected revenge porn images without the uploader’s consent, in cases where:&lt;/p&gt;
&lt;p&gt;1. the victim had notified the provider of the existence of the image;&lt;/p&gt;
&lt;p&gt;2. the provider had requested the consent of the uploader to delete the image; and&lt;/p&gt;
&lt;p&gt;3. the uploader did not respond or delete the image.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A maximum sentence of 500,000 yen or three years in jail.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The Act also obligates the national and local governments to ease victims’ embarrassment when they report the crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For especially young potential victims, the Act further obligates the governments to educate people on how to avoid revenge porn.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world'&gt;https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shradha Nigam</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Revenge Porn</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-25T16:58:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp">
    <title>What’s up with WhatsApp?</title>
    <link>https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp</link>
    <description>
        &lt;b&gt;In 2016, WhatsApp Inc announced it was rolling out end-to-end encryption, but is the company doing what it claims to be doing?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aayush Rathi and Sunil Abraham was published in &lt;a class="external-link" href="http://www.atimes.com/article/whats-up-with-whatsapp/"&gt;Asia Times&lt;/a&gt; on April 20, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Back in April 2016, when WhatsApp Inc announced it was rolling out end-to-end encryption (E2EE) for its billion-plus strong user base as a default setting, the messaging behemoth signaled to its users it was at the forefront of providing technological solutions to protect privacy.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Emphasized in the security white paper explaining the implementation of the technology is the encryption of both forms of communication – one-to-one and group and also of all types of messages shared within such communications – text as well as media.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Simply put, all communication taking place over WhatsApp would be decipherable only to the sender and recipient – it would be virtual gibberish even to WhatsApp.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;This announcement came in the backdrop of &lt;a href="https://www.theguardian.com/us-news/2016/feb/17/apple-ordered-to-hack-iphone-of-san-bernardino-shooter-for-fbi"&gt;Apple locking horns with the FBI&lt;/a&gt; after being asked to provide a backdoor to unlock the San Bernardino mass shooter’s iPhone. This further reinforced WhatsApp Inc’s stand on the ensuing debate between the interplay of privacy and security in the digital age.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Kudos to WhatsApp, for there is &lt;a href="http://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/CallForSubmission.aspx"&gt;growing discussion&lt;/a&gt; around how encryption and anonymity is central to enabling secure online communication which in turn is integral to essential human rights such as those of freedom of opinion and expression.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;WhatsApp may have taken encryption to the masses, but here we outline why WhatsApp’s provisioning of privacy and security measures needs a more granular analysis – is the company doing what it claims to be doing? Security issues with WhatsApp’s messaging protocol certainly are not new.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Man-in-the-middle attacks&lt;/h3&gt;
&lt;p class="p4" style="text-align: justify; "&gt;A &lt;a href="https://eprint.iacr.org/2017/713.pdf"&gt;study&lt;/a&gt; published by a group of German researchers from Ruhr University highlighted issues with WhatsApp’s implementation of its E2EE protocol to group communications. Another &lt;a href="https://courses.csail.mit.edu/6.857/2016/files/36.pdf"&gt;paper&lt;/a&gt; points out how WhatsApp’s session establishment strategy itself could be problematic and potentially be targeted for what are called man-in-the-middle (MITM) attacks.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;An MITM attack takes the form of a malicious actor, as the term suggests, placing itself between the communicating parties to eavesdrop or impersonate. The Electronic Frontier Foundation also &lt;a href="https://www.eff.org/deeplinks/2016/10/where-whatsapp-went-wrong-effs-four-biggest-security-concerns"&gt;highlighted&lt;/a&gt; other security vulnerabilities, or trade-offs, depending upon ideological inclinations, with respect to WhatsApp allowing for storage of unencrypted backups, issues with WhatsApp’s web client and also with its approach to cryptographic key change notifications.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Much has been written questioning WhatsApp’s shifting approach to ensuring privacy too. Quoting straight from &lt;a href="https://www.whatsapp.com/legal/#privacy-policy-affiliated-companies"&gt;WhatsApp’s Privacy Policy:&lt;/a&gt; “We joined the Facebook family of companies in 2014. As part of the Facebook family of companies, WhatsApp receives information from, and shares information with, this family of companies.” Speaking of Facebook …&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Culling out larger issues with WhatsApp’s privacy policies is not the intention here. What we specifically seek to explore is right at the nexus of WhatsApp’s security and privacy provisioning clashing with its marketing strategy: the storage of data on WhatsApp’s servers, or ‘blobs,’ as they are referred to in the technical paper. Facebook’s rather. In WhatsApp’s words: “Once your messages (including your chats, photos, videos, voice messages, files and share location information) are delivered, they are deleted from our servers. Your messages are stored on your own device.”&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;In fact, this non-storage of data on their ‘blobs’ is emphasizes at several other points on the official website. Let us call this the deletion-upon-delivery model.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A simple experiment&lt;/h3&gt;
&lt;p class="p4" style="text-align: justify; "&gt;While drawing up a rigorous proof of concept, made near-impossible thanks to WhatsApp being a closed source messaging protocol, a simple experiment is enough to raise some very pertinent questions about WhatsApp’s outlined deletion-upon-delivery model. It should, however, be mentioned that the Signal Protocol developed by Open Whisper Systems and pivotal in WhatsApp’s rolling out of E2EE is &lt;a href="https://github.com/signalapp"&gt;open source&lt;/a&gt;. Here is how the experiment proceeds:&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Rick sends Morty an attachment.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Morty then switches off the data on her mobile device.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Rick downloads the attachment, an image.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Subsequently, Rick deletes the image from his mobile device’s internal storage.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Rick then logs into a WhatsApp’s web client on his browser. (Prior to this experiment, both Rick and Morty had logged out from all instances of the web client)&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Upon a fresh log-in to the web client and opening the chat with Morty, the option to download the image is available to Rick.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;The experiment concludes with bewilderment at WhatsApp’s claim of deletion-upon-delivery as outlined earlier. The only place from which Morty could have downloaded the image would be from Facebook’s ‘blobs.’ The attachment could not have been retrieved from Morty’s mobile device as it had no way of sending data and neither from Rick’s mobile device as it no longer existed in the device’s storage.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;As per the Privacy Policy, the data is stored on the ‘blobs’ for a period of 30 days after transmission of a message only when it can’t be delivered to the recipient. Upon delivery, the deletion-upon-delivery model is supposed to kick in.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Another straightforward experiment that leads to a similar conclusion is seeing the difference in time taken for a large attachment to be forwarded as opposed to when the same large attachment is uploaded. Forwarding is palpably quicker than uploading afresh: non-storage of attachments on the ‘blob’ would entail that the same amount should be taken for both.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;The plot thickens. WhatsApp’s Privacy Policy goes on to state: “To improve performance and deliver media messages more efficiently, such as when many people are sharing a popular photo or video, we may retain that content on our servers for a longer period of time.”  The technical paper offers no help in understanding how WhatsApp systems assess frequently shared encrypted media messages without decrypting it at its end.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;A possible explanation could be the usage of metadata by WhatsApp, which it discloses in its Privacy Policy while simultaneously being sufficiently vague about the specifics of it. That WhatsApp may be capable of reading encrypted communication through the inclusion of a backdoor bodes well for law enforcement, but not so much for unsuspecting users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The weakest link in the chain&lt;/h3&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Concerns about backdoors in WhatsApp’s product have led the French government to start developing their &lt;a href="https://www.reuters.com/article/us-france-privacy/france-builds-whatsapp-rival-due-to-surveillance-risk-idUSKBN1HN258"&gt;own encrypted messaging service&lt;/a&gt;. This will be built using Matrix – an open protocol designed for real-time communication. Indeed, the Privacy Policy lays out that the company “may collect, use, preserve, and share your information if we have a good-faith belief that it is reasonably necessary to respond pursuant to applicable law or regulations, to legal process, or to government requests.”&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;The Signal Protocol is the undisputed gold standard of E2EE implementations. It is the integration with the surrounding functionality that WhatsApp offers which leads to vulnerabilities. After all, a chain is only as strong as its weakest link. Assuming that the attachments stored on the ‘blobs’ are in encrypted form, indecipherable to all but the intended recipients, this does not pose a privacy risk for the users from a technological point of view.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;However, it is easy lose sight of the fact that the Privacy Policy is a legally binding document and it specifically states that messages are not stored on the ‘blobs’ as a matter of routine. As a side note, WhatsApp’s Privacy Policy and Terms of Service are refreshing in their readability and lack of legalese.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;As we were putting the final touches to this piece, &lt;a href="https://wabetainfo.com/whatsapp-allows-to-redownload-deleted-media/#more-2781"&gt;news from &lt;i&gt;WABetaInfo&lt;/i&gt;&lt;/a&gt;, a well-reputed source of information on WhatsApp features, has broken that newer updates of WhatsApp for Android are permitting users to re-download media deleted up to three months back. WhatsApp cannot possibly achieve this without storing the media in the ‘blobs,’ or in other words, in violation of its Privacy Policy.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;As the aphorism goes: “When the service is free, you are the product.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp'&gt;https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Sunil Abraham</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2018-04-23T16:45:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act">
    <title>Comments on the  Draft Digital Information Security in Healthcare Act </title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society submitted comments to the Ministry of Health &amp; Family Welfare, Government of India on the draft Digital Information Security in Healthcare Act on April 21, 2018.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the Draft Digital Information Security in Healthcare Act, released by Ministry of Health &amp;amp; Family Welfare, Government of India. CIS has conducted research on the issues of privacy, data protection and data security since 2010 and is thankful for the opportunity to put forth its views. This submission was made on April 21, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/comments-on-draft-digital-information-security-in-healthcare-act"&gt;Download the full submission here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha and Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    

   <dc:date>2018-05-01T02:05:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill">
    <title>A look at two problematic provisions of the draft Anti-trafficking bill</title>
    <link>https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill</link>
    <description>
        &lt;b&gt;This post examines two badly drafted provisions of the new Anti-Trafficking bill that have the potential to severely impinge upon the Freedom of Expression, including through a misunderstanding of intermediary liability. &lt;/b&gt;
        
&lt;p style="text-align: justify;" class="normal"&gt;On 28 Feb 2018, the Union Cabinet approved                   ‘The Trafficking of Persons (Prevention, Protection                   and Rehabilitation) Bill, 2018’ (‘the bill’) for                   introduction to the Parliament. This comes after a                   series of consultations on an earlier 2016 draft bill,                   that had faced its fair share of &lt;a href="https://scroll.in/article/813268/six-counts-on-which-the-draft-anti-trafficking-bill-fails-short" target="_blank"&gt;criticism&lt;/a&gt;. As per the Press Information Bureau &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=176878" target="_blank"&gt;announcement&lt;/a&gt;, the Ministry of Women and Child                   Development met with various stakeholders including 60                   NGOs and have incorporated many of the suggestions put                   forth. They’ve also stated that ‘the new law will make                   India a leader among South Asian countries to combat                   trafficking.’&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;However, at first glance, there appear to be                   several issues with overbroad or vague language used                   in the drafting of the bill, that stretch it into                   potentially problematic areas. This current post will                   focus on two such provisions that could lead to a                   deleterious effect on the Freedom of Expression. As                   the bill is currently not publicly available, a                   stakeholder’s copy of the draft is being used to                   source these provisions. The relevant sections have                   been reproduced below for convenience. (Emphasis in                   bold is as provided by the author).&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;Section                     39: Buying or Selling of any person&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;39. (l) Whoever buys or sells any person                     for a consideration, shall be punished with rigorous                     imprisonment for a term which shall not be less than                     seven years but may extend to ten years, and shall                     also be liable to fine which shall not be less than                     one lakh rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;(2) Whoever solicits or publicises                     electronically, taking or distributing obscene                     photographs or videos or providing materials or                     soliciting or guiding tourists or using agents or                     any other form &lt;strong&gt;which may lead                       to the trafficking of a person shall be punished&lt;/strong&gt; with rigorous imprisonment for a term which shall                     not be less than five years but may extend to ten                     years, and shall also be liable to fine which shall                     not be less than fifty thousand rupees but which may                     extend to one lakh rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The grammatical acrobatics of section 39(2)                   aside, this anti-solicitation provision is severely                   problematic in that it mandates punishment even for a                   vaguely defined action or actions that may not                   actually be connected to the trafficking of a person.                   In other words, the provision doesn’t require any of                   the actions to be connected to trafficking in their                   intent or even outcome, but only in &lt;em&gt;potential&lt;/em&gt; &lt;em&gt;connection&lt;/em&gt; to the outcome. At the same time, it says these                   ‘shall’ be punished!&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;This vagary that ignores actual or even                   probabilistic causation flies in the face of standard                   criminal law which requires &lt;em&gt;mens rea&lt;/em&gt; along with &lt;em&gt;actus                     rea&lt;/em&gt;. The excessively wide scope of this badly                   drafted provision leaves it prone to abuse. For                   example, currently the provision allows the following                   interpretation to be included: ‘Whoever publicizes                   electronically, by providing materials in any form,                   which may lead to trafficking of a person shall be                   punished…’. Even the electronic publicizing of an                   academic study on trafficking could fall under the                   provision as it currently reads, if it is argued that                   publishing studies that show the prevalence of                   trafficking ‘may lead to the trafficking of a person’!                   It is not hard to imagine that an academic study that                   shows trafficking numbers at embarrassingly high rates                   could be threatened with this provision. Similarly,                   any of our vast number of self-appointed moral                   guardians could also pull within this provision any                   artistic work that they may personally find offensive                   or ‘obscene’. Simply put, without any burden of                   showing a causal connect, it could be argued that &lt;em&gt;anything&lt;/em&gt; ‘may                   lead’ to the trafficking of a person. Needless to say,                   this paves the way for a severe chilling effect on                   free speech, especially on critical speech around                   trafficking issues.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;Section 41: Offences related to media&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;41. (l) Whoever commits trafficking of a                     person with the aid of media, including, but not                     limited to print, internet, digital or electronic                     media, shall be punished with rigorous imprisonment                     for a term which shall not be less than seven years                     but may extend to ten years and shall also be liable                     to fine which shall not be less than one lakh                     rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;(2) Whoever &lt;strong&gt;distributes,                       or sells or stores&lt;/strong&gt;, in any form in any                     electronic or printed form showing incidence of                     sexual exploitation, sexual assault, or rape for the                     purpose of exploitation or for coercion of the                     victim or his family members, or for unlawful gain &lt;strong&gt;shall be                       punished&lt;/strong&gt; with rigorous imprisonment for a term                     which shall not be less than three years but may                     extend to seven years and shall also be liable to                     fine which shall not be less than one lakh rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The drafters of this bill have perhaps                   overlooked the fact that unlike the physical world,                   the infrastructure of the electronic / digital world                   requires 3rd party intermediaries to handle                   information during most forms of electronic                   activities, whether it is transmission, storage or                   display. As it is not feasible, desirable or even                   practically possible for intermediaries to verify the                   legality of every bit of data that gets transferred or                   stored by the intermediary, ‘safe harbours’ are                   provided in law for intermediaries, protecting them                   from liability of the information being transmitted                   through them. These ensure that entities that act as                   architectural requirements and intermediary platforms                   are able to operate smoothly and without fear. If                   intermediaries are not granted this protection, it                   puts them in the unenviable position of having to                   monitor un-monitorable amounts of data, and face legal                   action for the slip-ups that are bound to happen                   regularly. Furthermore, there are several levels of                   free speech and privacy issues associated with having                   multiple gatekeepers on the expression of speech                   online. A charitable reading of the intent of a                   provision which does not recognise safe harbours for                   3rd party intermediaries, would be that the drafters                   of the bill have simply not realised that users who                   upload and initiate transfer of information online,                   are not the same parties who do the actual                   transmission of the information.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Distribution, selling or storing of                   information online would require the transmission of                   information over intermediaries, as well as the                   temporary storage of such information on intermediary                   platforms. In India, intermediaries engaging with                   transmission or temporary storage of information are                   provided safe harbour&lt;a href="imap://prasad@mail.cis-india.org:143/fetch%3EUID%3E/INBOX%3E176833#_ftn1"&gt;[1]&lt;/a&gt; by Section 79 of the Information Technology Act, 2000                   (‘IT Act’), so long as they:&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;(i) act as a mere ‘conduit’ and do not                   initiate the transmission, select the receiver of the                   transmission, or select or modify the information                   contained in the transmission.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;(ii) exercise due diligence while                   discharging duties under this Act, and observes other                   guidelines that the Central Government may prescribe.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The Information Technology (Intermediary                   Guidelines) Rules, 2011, list out the nature of the                   due diligence to be followed by intermediaries to                   claim exemption under Section 79 of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Intermediaries will not be granted safe                   harbour if they have conspired, abetted, aided or                   induced commission of the unlawful act, or if they do                   not remove or disable access to information upon                   receiving actual knowledge, or notice from the                   Government, of the information that is transmitted or                   stored by the intermediary being used for unlawful                   purposes.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Thus it can be seen that the IT Act already                   provides an in-depth regime for intermediary                   liability, and given its &lt;em&gt;non-obstante &lt;/em&gt;clause                   which states that Section 79 of the IT Act would apply                   “Notwithstanding anything contained in any law for the                   time being in force” ,&amp;nbsp;                   as well as the reiteration of the IT Act’s                   overriding effect via Section 81, which states that                   the provisions of the Act ‘shall have effect                   notwithstanding anything inconsistent therewith                   contained in any other law for the time being in                   force’ (barring the exercise of copyright or patent                   rights), it is generally considered the appropriate                   legal framework for this issue. However, it appears                   that the drafters of the 2018 Anti-trafficking bill                   have not considered this aspect at all, since they                   have not referenced the IT Act in this context in the                   bill, and have additionally added their own &lt;em&gt;non-obstante &lt;/em&gt;clause                   in Section 59 of the bill:&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;59.&lt;em&gt; The provisions                     of this Act, shall be in addition to and not in                     derogation of the provisions of any other law for                     the time being in force and, in case of any                     inconsistency, the provisions of this Act shall have                     overriding effect on the provisions of any such law                     to the extent of the inconsistency.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;So the regime as prescribed by the IT Act                   allows for safe harbours, whereas the regime as                   prescribed by the Anti-Trafficking bill does not allow                   for safe harbours, and both say that they would an                   overriding effect for any conflicting law. This                   legislative bumble could potentially be solved by                   using the settled principle that a special Act                   prevails over a general legislation. This is still a                   little tricky as they are technically both special                   Acts. It could be argued that given the context of the                   Anti-trafficking bill as focusing on trafficking, and                   the context of the IT Act focusing on the interface of                   law and technology, that for the purposes of Section                   41(2) of the Anti-trafficking bill, the IT Act is the                   special legislation. And thus Section 79 of the IT Act                   should make redundant the relevant portion of Section                   41(2) of the Anti-trafficking bill. This reading would                   require the bill to be modified so as to remove the                   redundancy and the conflicting portion of Section                   41(2).&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;[1] In 2016, a division bench of the Delhi High Court held in the case of Myspace Inc vs Super Cassettes Industries Ltd that a safe harbour immunity for intermediaries was necessary as it was not technically feasible to pre-screen content from third parties, and that tasking intermediaries with this responsibility could have a chilling effect on free speech, It held that their responsibility was limited to the extent of acting upon receiving ‘actual knowledge’. Earlier, in determining what ‘actual knowledge’ refers to, in 2015 the Supreme Court of India in the landmark case of Shreya Singhal vs Union of India, required this to be in the form of a notice via a court or government order. Thus under our current law, intermediaries are granted a safe harbour from liability so long as they act upon court or government orders which notify them of content that is required to be taken down.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Clarification (18th August, 2018): A letter sent to the Ministry of Women and Child Development mentioned the Centre for Internet &amp;amp; Society as instituionally endorsing a critique of the The Trafficking of Persons (Prevention, Protection and Rehabilitation) Bill, 2018. We seek to clarify that the Centre for Internet &amp;amp; Society did not endorse the letter to the Ministry.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill'&gt;https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>swaraj</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2018-08-18T09:21:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/jobs/vacancy-for-short-term-consultant-ietf">
    <title>Short-term Consultant (IETF)</title>
    <link>https://cis-india.org/jobs/vacancy-for-short-term-consultant-ietf</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society is seeking an individual with a strong understanding of IETF standards to work with us on writing 7 Human Rights Considerations for Internet standards and active drafts that are relevant to public interest. Additionally, the individual will help develop a longer term work-plan, expertise and approach for engagement in the IETF.&lt;/b&gt;
        &lt;p dir="ltr"&gt;Note: This position is consultancy based on output.&lt;/p&gt;
&lt;p dir="ltr"&gt;Compensation: Based on experience and output.&lt;/p&gt;
&lt;p dir="ltr"&gt;Application requirements: two writing samples or other examples of technical work and CV&lt;/p&gt;
&lt;p dir="ltr"&gt;Contact: sunil@cis-india.org&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/jobs/vacancy-for-short-term-consultant-ietf'&gt;https://cis-india.org/jobs/vacancy-for-short-term-consultant-ietf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Jobs</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-21T15:44:49Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
