<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 591 to 605.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2018-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/indian-express-asad-ali-tabassum-barnagarwala-april-29-2018-you-are-not-the-only-one-india-stares-at-a-loneliness-epidemic"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/new-indian-express-april-26-2018-aadhaar-data-over-89-lakh-mnrega-workers-in-andhra-pradesh-leaked-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-request-29-revenue-breakdown-by-source-for-fy-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/pai-wg-labor-and-economy-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/jobs/vacancy-for-short-term-consultant-ietf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/jobs/vacancy-for-short-term-consultant-cyber-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/artificial-intelligence-in-governance-a-report-of-the-roundtable-held-in-new-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-april-17-2018-sad-truth-brutality-porn-has-many-takers-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/icann-61-readout"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-april-13-2018-facebooks-fake-news-clean-up-hits-language-barrier"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2018-newsletter">
    <title>April 2018 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/april-2018-newsletter</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;Dear readers,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;In 2016, WhatsApp Inc announced it was rolling out end-to-end encryption, but is the company doing what it claims to be doing? Sunil Abraham and Aayush Rathi explores this in an article which was &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp"&gt;published in Asia Times&lt;/a&gt; on April 20, 2018.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act"&gt;submitted comments to the Ministry of Health &amp;amp; Family Welfare, Government of India&lt;/a&gt; on the draft Digital Information Security in Healthcare Act on April 21, 2018. CIS had conducted research on the issues of privacy, data protection and data security since 2010 and is thankful for the opportunity to put forth its views.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill"&gt;blog post&lt;/a&gt; by Swaraj Paul Barooah examines two badly drafted provisions of the new Anti-Trafficking bill that have the potential to severely impinge upon the Freedom of Expression, including through a misunderstanding of intermediary liability.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A chapter by P.P. Sneha was published in '&lt;a class="external-link" href="https://cis-india.org/raw/making-humanities-in-the-digital-embodiment-and-framing-in-bichitra-and-indiancine.ma"&gt;Making Things and Drawing Boundaries: Experiments in the Digital Humanities&lt;/a&gt;' edited by Jentery Sayers. The chapter throws light on some of the questions that arise around the processes by which digital objects are ‘made’ and made available for arts and humanities research and practice, by drawing on recent work in text and film archival initiatives in India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS made a &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/cis-submission-on-statement-of-working-of-patents"&gt;submission to the Indian Patent Office on the issue of Statement of Working as per Form 27 under the Patents Act, 1970&lt;/a&gt;. Select stakeholders were invited to the consultation meeting held on April 6, 2018. Anubha Sinha attended it along with a few other public-spirited stakeholders. She made a statement stressing on the requirement of the patent system to serve the welfare-purpose and not create mere non-working/ blocking monopolies; and that the argument of representatives of patentees about non-working of patents being the existing norm, and that they cannot be questioned about this, is absolutely against the central tenets of patent law.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;Articles:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-april-8-2018-digital-native-delete-facebook"&gt;Digital Native: Delete Facebook?&lt;/a&gt; (Nishant Shah; Indian Express; April 8, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/digital-native-the-e-wasteland-of-our-times"&gt;Digital Native: The e-wasteland of our times&lt;/a&gt; (Nishant Shah; Indian Express; April 22, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp"&gt;What’s up with WhatsApp?&lt;/a&gt;&lt;span&gt; (Aayush Rathi and Sunil Abraham; Asia Times; April 23, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;CIS in the News:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindustan-times-vidhi-choudhary-and-yashwant-raj-facebook-data-breach-hit-over-5-6-lakh-users-in-india"&gt;Cambridge Analytica row: Facebook data breach hit 560K Indian users&lt;/a&gt; (Vidhi Choudhury and Yashwant Raj; Hindustan Times; April 5, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindu-businessline-april-6-2018-govt-websites-face-major-outage-hacking-ruled-out"&gt;Govt websites face major outage; hacking ruled out&lt;/a&gt; (Hindu Businessline; April 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/business-standard-romita-majumdar-and-kiran-rathee-after-data-leak-row-facebook-imposes-restrictions-on-user-data-access"&gt;After data leak row, Facebook imposes restrictions on user data access&lt;/a&gt; (Romita Majumdar and Kiran Rathee; Business Standard; April 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/news-18-subhajit-sengupta-how-just-355-indians-put-data-of-5-6-lakh-facebook-users-at-risk"&gt;It Took Just 355 Indians to Mine the Data of 5.6 Lakh Facebook Users. Here's How&lt;/a&gt; (CNN-News 18; April 7, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-week-anita-babu-april-8-2018-it-feeds-on-you"&gt;It feeds on you! &lt;/a&gt;(Anita Babu; The Week; April 8, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-prashant-k-nanda-and-komal-gupta-pension-wont-be-denied-for-want-of-aadhaar-epfo"&gt;Pension won’t be denied for want of Aadhaar, says EPFO &lt;/a&gt;(Prashant K. Nanda and Komal Gupta; Livemint; April 11, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-april-13-2018-facebooks-fake-news-clean-up-hits-language-barrier"&gt;Facebook’s fake news clean-up hits language barrier&lt;/a&gt; (Nilesh Christopher; Economic Times; April 13, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/bloomberg-quint-aayush-ailawadi-april-15-2018-is-this-the-beginning-of-the-end-for-facebook"&gt;Is This The Beginning Of The End For Facebook?&lt;/a&gt; (Bloomberg Quint; April 15, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-april-17-2018-sad-truth-brutality-porn-has-many-takers-in-india"&gt;Metrolife: Brutality porn has sadly many takers in India&lt;/a&gt; (Nina C. George; Deccan Herald; April 18, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/new-indian-express-april-26-2018-aadhaar-data-over-89-lakh-mnrega-workers-in-andhra-pradesh-leaked-online"&gt;Aadhaar data of over 89 lakh MNREGA workers in Andhra Pradesh leaked online&lt;/a&gt; (New Indian Express; April 27, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/indian-express-asad-ali-tabassum-barnagarwala-april-29-2018-you-are-not-the-only-one-india-stares-at-a-loneliness-epidemic"&gt;You Are Not the Only One: India stares at a loneliness epidemic&lt;/a&gt; (Asad Ali and Tabassum Barnagarwala; Indian Express; April 29, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/hindustan-times-april-30-2018-prasun-sonwalkar-vidhi-choudhury-now-twitter-too-caught-up-in-cambridge-analytica-controversy"&gt;Now, Twitter too caught up in Cambridge Analytica controversy&lt;/a&gt; (Prasun Sonwalkar and Vidhi Choudhury; Hindustan Times; April 30, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Copyright and Patent&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Submission&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/cis-submission-on-statement-of-working-of-patents"&gt;CIS' Submission on Statement of Working of Patents&lt;/a&gt; (Anubha Sinha; April 10, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;►Wikipedia&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Event Organized&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/sambad-health-and-women-edit-a-thon"&gt;Sambad Health and Women Edit-a-thon&lt;/a&gt; (April 15, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/article-on-telugu-wikisource-feature-book-in-pustakam"&gt;Telugu Wikisource Feature Book in Pustakam.net&lt;/a&gt;&lt;span&gt; (Pavan Santhosh; April 17, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/institutional-partnership-with-tribal-research-training-institute"&gt;Institutional Partnership with Tribal Research &amp;amp; Training Institute&lt;/a&gt; (Subodh Kulkarni; April 18, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/exploring-wikimedia-platforms-in-dialogue-on-the-urban-rivers-of-maharashtra"&gt;Exploring Wikimedia platforms in Dialogue on the Urban Rivers of Maharashtra&lt;/a&gt; (Subodh Kulkarni; April 22, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;strong&gt;Submission&lt;/strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act"&gt;Comments on the Draft Digital Information Security in Healthcare Act&lt;/a&gt;&lt;span&gt; (Amber Sinha and Shweta Mohandas; April 22, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;div&gt;&lt;strong&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world"&gt;Revenge Porn Laws across the World&lt;/a&gt;&lt;span&gt; (Shradha Nigam; April 25, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/government-giving-free-publicity-worth-40-k-to-twitter-and-facebook"&gt;Government gives free publicity worth 40k to Twitter and Facebook&lt;/a&gt;&lt;span&gt; (Akriti Bopanna; April 10, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://https//cis-india.org/internet-governance/blog/artificial-intelligence-in-governance-a-report-of-the-roundtable-held-in-new-delhi"&gt;Artificial Intelligence in Governance: A Report of the Roundtable held in New Delhi&lt;/a&gt; (Saman Goudarzi and Natallia Khaniejo; April 19, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;br /&gt;►Free Speech and Expression&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Blog Entries&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill"&gt;A look at two problematic provisions of the draft Anti-trafficking bill&lt;/a&gt; (Swaraj Paul Barooah; April 21, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/didp-request-29-revenue-breakdown-by-source-for-fy-2017"&gt;DIDP Request #29 - Revenue breakdown by source for FY 2017&lt;/a&gt; (Akriti Bopanna; April 26, 2018).&lt;/li&gt;
&lt;/ul&gt;
&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt; &lt;strong&gt;&lt;span style="text-align: justify; "&gt;►Cyber Security &lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;&lt;span style="text-align: justify; "&gt;Event Organized&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/workshop-on-python"&gt;Workshop on Python&lt;/a&gt; (April 14, 2018; CIS, Bengaluru).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;span style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;-----------------------------------&lt;br /&gt;&lt;/span&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;br /&gt;&lt;/a&gt;&lt;span&gt;----------------------------------- &lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;strong&gt;Article&lt;/strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/making-humanities-in-the-digital-embodiment-and-framing-in-bichitra-and-indiancine.ma"&gt;Making Humanities in the Digital: Embodiment and Framing in Bichitra and Indiancine.ma&lt;/a&gt;&lt;span&gt; (P.P. Sneha; Making Things and Drawing Boundaries: Experiments in the Digital Humanities (2017), edited by Jentery Sayers, University of Minnesota Press, Minneapolis, London April 1, 2018).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;strong&gt; &lt;/strong&gt;
&lt;div class="keyResearch"&gt;
&lt;div id="parent-fieldname-text-8a5942eb6f4249c5b6113fdd372e636c"&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;► Support Us&lt;/p&gt;
&lt;div&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/div&gt;
&lt;p&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="viewlet-below-content-body"&gt;
&lt;div class="visualClear"&gt;&lt;/div&gt;
&lt;div class="documentActions"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2018-newsletter'&gt;https://cis-india.org/about/newsletters/april-2018-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2018-05-20T14:57:47Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/indian-express-asad-ali-tabassum-barnagarwala-april-29-2018-you-are-not-the-only-one-india-stares-at-a-loneliness-epidemic">
    <title>You Are Not the Only One: India stares at a loneliness epidemic</title>
    <link>https://cis-india.org/internet-governance/news/indian-express-asad-ali-tabassum-barnagarwala-april-29-2018-you-are-not-the-only-one-india-stares-at-a-loneliness-epidemic</link>
    <description>
        &lt;b&gt;“To anyone looking at me from the outside, I seem like a fairly successful woman. I have a good job with great pay. I am in a relationship and have a bunch of close friends. I couldn’t figure out why I felt so angry or so lonely all the time.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Asad Ali and Tabassum Barnagarwala was published in the &lt;a class="external-link" href="http://indianexpress.com/article/express-sunday-eye/you-are-not-the-only-one-5154976/"&gt;Indian Express&lt;/a&gt; on April 29, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Most people will presume that throwing a bunch of hangers on the bed is a harmless act of venting. Akanksha Joshi knew it was the tipping point for her. Her mood swings had become more mercurial and she had been lashing out at people close to her or simply shutting herself in her room, watching Netflix for hours. But that day was different. “I had opened my cupboard and a hanger fell out. I don’t know what happened to me, but I suddenly picked up all the hangers and threw them on the bed in rage. The impulse lasted for 30 to 40 seconds, but it left me shaken. I had changed my job recently. It was a good one with great pay. It was what I wanted. I was in a relationship, had a bunch of close friends. I couldn’t figure out why I felt so angry or so lonely,” says Joshi, 32, who had moved to Mumbai from Dehradun in 2008 to look after her ageing grandparents and to work with a business process outsourcing firm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first inkling of trouble had come when her three-year-old marriage ended in divorce in 2013. Joshi underwent counselling for nearly two years, and, slowly, life seemed to get back on track. She entered into a new relationship, moved up the job ladder, formed new friendships. But the anger and the loneliness wouldn’t go. “To anyone looking at me from the outside, I seem like a fairly successful woman,” she says. But it has come at a cost.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2004, the National Sample Survey Office reported that 4.91 million people in India were living alone and suffered from loneliness. More recently, the National Mental Health Survey of India (2015-16) reported that high suicidal risk is an increasing concern in India; that children and adolescents are vulnerable to mental disorders; and, mental disorders, including depression and anxiety, affect nearly 10 per cent of the population. In 2016, the Centre for the Study of Developing Societies in partnership with Konrad Adenauer Stiftung conducted a survey of the attitudes, anxieties and aspirations of India’s young population (aged 15-34 years). The findings, released in April 2017, revealed that 12 per cent of the youth reported feeling depressed often, and 8 per cent said they felt lonely quite frequently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Youngsters who move from tier-II and III cities to metropolises find a sudden change in lifestyle. Even if you have friends, it is difficult to meet them in a city like Mumbai. Having a social life does not mean they have good social support,” says Dr Vishal Sawant, who is currently treating Joshi. When she first approached Dr Sawant, Joshi had great reservations. “Opening up to treatment makes you feel vulnerable. I am at a senior marketing position. To talk about mental health issues is also to put myself out in the open at this point in my career. But I knew I needed intervention,” she says. Now, after six months, she says her reactions to situations are more even.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In January this year, British Prime Minister Theresa May announced a minister for loneliness to address the condition that afflicts 14 per cent of UK’s population. In Japan, it has been an affliction that has affected generations. In India, though, conversations around mental health are only getting started. Apart from a lack of information and widespread social stigma, the cost of treatment also remains prohibitively expensive. Each session, depending on the therapist, may cost between Rs 2,000 and Rs 7,000. Besides the cost of medication, therapy and consultations, there is also the possibility of reduced work efficiency. In addition to these, despite multiple reports and surveys indicating that there might be a serious health problem at hand, the conversation around loneliness doesn’t go beyond conventional markers, such as the isolation of the elderly. But loneliness can be an equally debilitating experience for other demographies, including the youth. A 2010 research in the Indian Journal of Psychiatry finds that women suffer more from depression than men. The National Mental Health Survey (2015-16) in 12 states of India covering 39,532 people found that one in 20 people suffers from depression. “Depression was reported to be higher in females, in the age-group of 40-49 years and among those residing in urban metros,” the report observes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, psychologists say, conversations around loneliness need to expand in scope and look at the condition born out of conflicts in gender identity, class, or isolation even within the framework of a family or a relationship. When 18-year-old Harshit Patel (name changed), a resident of south Mumbai’s plush Charni Road, visited psychiatrist Dr Sagar Mundada at his Fort clinic last November, he already had suicidal thoughts. He lived in a joint family of 10 in a well-to-do Gujarati household. He had just joined engineering college and was struggling to find his feet. Patel had tried discussing his feelings with his parents, but they had brushed it off as adolescent mood swings. They also refused to entertain thoughts of therapy when a tutor brought it up. Patel had called Mundada on his own, seeking help. The doctor advised him to call whenever he felt suicidal. Within 10 days, a call came: “Nobody notices me at home. What is the point of living?” Patel was contemplating throwing himself in front of a train, he said. Mundada immediately called him to his clinic and got in touch with his parents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The road to therapy has been littered with obstacles for Patel. His parents are still not entirely convinced about therapy and refuse to attend sessions at the clinic. Instead, they meet at a McDonald’s outlet near the clinic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even as a 10-year-old child with a physically abusive father, Dharmesh Mekala knew — through all the loneliness and trauma that he hadn’t yet developed a vocabulary to articulate — that he had to escape. He wrote the entrance test for Navodaya Vidyalaya in Nalgonda, Telengana. “I just knew that I had to leave home somehow,” says Mekala, 29, a freelance artist, now based in Delhi. The arc of his loneliness had started developing early in his childhood — the beatings he received; the bouts of sadness that enveloped him; the isolation he felt from his family; and, finally, the suicidal thoughts that he had all the time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mekala made it to boarding school, but the reprieve that he had sought did not come to pass. His sense of isolation grew more acute when Mekala started discovering his sexuality, much later, he says, than his friends. By the time Mekala reached college he knew he was homosexual, but could not bring himself to admit it. “Being homosexual in a hetero world is a lonely life in any case, but when I first came to Delhi in 2010 — a dusky South Indian man with an accent, not well read or fluent in English, with far too little money — I felt adrift,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr Neetu Rana, psychologist at the Vidya Sagar Institute of Mental Health and Neurosciences, Delhi, says, people like Mekala are more prone to mental health issues. “When we can’t find our social anchor we feel lonely. It could be a result of bullying, isolation and being ostracised, but it could also reflect changes in the family structures due to urbanisation and a shift towards an individualistic society,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="custom-caption"&gt;&lt;img class="size-full wp-image-5155042" src="http://images.indianexpress.com/2018/04/loneliness-epidemic.jpg" /&gt;More recently, the National Mental Health Survey of India (2015-16) reported that high suicidal risk is an increasing concern in India; that children and adolescents are vulnerable to mental disorders.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UK-based National Society for the Prevention and Cruelty to Children (NSPCC) released data in 2017 on the number of calls received by its helpline to deal with loneliness. In 2016-17, the helpline counselled 4,063 children on loneliness, 73 per cent of whom were girls. Parul Tank, a psychiatrist who counsels students studying in a foreign country, says, many Indian students who venture abroad for higher studies, come to her with complaints of loneliness and depression. “In the US or UK, students have no structured classes. They lead an isolated life, the only idea of socialisation is to go out in cafes or pubs. Many do not know how to deal with this lifestyle,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sahil, 45, a media professional, remembers how things started spiralling out of control for him when he went to London for a post-graduate degree. He had lived in Mumbai all his life and found London disconcerting. Soon, he wanted to “remain in my room all day” or spent time in the college library “figuring out a way to kill myself”. A friend took him to the university psychiatrist but the drugs he was prescribed didn’t help. By the time he came to Delhi in the mid-’90s for a job, he could barely hold it together; he had also become addicted to drugs and alcohol. “You feel lonely, and then you drink, and you feel even more lonely,” he says. Around this time, he got married. The thoughts of suicide receded somewhat, only to be replaced by an insatiable appetite for sex. “You don’t talk about things like loneliness when you are married. My wife and I never discussed my sex addiction either, though she was aware of it,” says Sahil, who is undergoing therapy at Sex Addicts Anonymous.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the &lt;a href="http://indianexpress.com/about/economic-survey-2018/"&gt;Economic Survey&lt;/a&gt; 2016-17, the inter-state migration of workers in India has increased to 9 million annually during 2011-16 compared to previous years. A large section of these people leave their families behind in search of better prospects. In the hierarchy of visible discourse on loneliness, perhaps the migrant worker is the most affected, says Surinder Jodhka, professor of sociology at &lt;a href="http://indianexpress.com/about/jawaharlal-nehru"&gt;Jawaharlal Nehru&lt;/a&gt; University, Delhi. “The family structure is non-existent in the urban cities, and even in rural societies, there has been a disintegration. So, their feeling of loneliness is more pronounced.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When his father died, Manik left his hometown in West Bengal’s Malda district for Delhi, more than 10 years ago. He was about 20 years old then. A distant uncle of his, a driver with a private company in the city, had promised to set him up with a job. But when Manik showed up, the uncle looked “surprised that I had actually come and grew distant.” Desperate, Manik began taking up odd jobs to survive. “I didn’t have friends and didn’t speak Hindi. The only person I knew refused to acknowledge me. I felt lonely and lost,” says Manik. He found a job as a cook/peon at a small company, but the pay was minimal and Manik says he spent it on “cheap alcohol and women”. “Otherwise, I’d be crying in my room all the time. I used to keep the radio on, not to feel less lonely but to not hear myself cry. I was so ashamed of my feebleness,” says Manik. He still can’t bear to be in a room without the radio on, but he doesn’t believe that his condition merits medical attention. In any case, it is a luxury he can’t afford. “It’s a personal battle, which only you can fight, no?” he asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A first-of-its-kind study conducted by Brihanmumbai Municipal Corporation, between October 2015 till September 2017 analysing patients in its major hospitals — KEM, Sion, Nair and RN Cooper — found that 31 per cent patients visiting these hospitals suffered from mental disorders. At least 1,70,000 patients attended these four major hospitals for psychiatric aid. Depression formed the second-most common mental disorder in out-patient departments forming 20 per cent of the total chunk. All of them came from a low income group. “We realised that there is a need to have more treatment facilities in primary healthcare centres for mental health. Rates of depression are high even in urban poor, and diagnosis shouldn’t be delayed until they reach a tertiary centre,” says dean of KEM hospital, Dr Avinash Supe. “For poor people, it is unemployment, frustrated political environment that affects their livelihood, that leads to depression. Take for instance, the farmers who are committing suicide. They feel isolated in the agrarian and financial distress, they have no one to seek aid from,” says Dr Vinayak Kale, head of psychiatry department in JJ Group of Hospitals, Mumbai. For affluent sections, he says, it’s the opposite. Steady career growth is not enough. The stress to win the corporate race often leads to loneliness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the biggest contributors to loneliness, say psychologists and social scientists is our increasing reliance on technology. “One may have hundreds of friends on social media, but communication on that platform is virtual. Our culture is not individualised and we still need physical proximity. Social media has widened the gap of physical interaction,” says Dr Shubhangi Parkar, head of psychiatry at KEM hospital.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah, co-founder of The Centre for Internet and Society, Bengaluru, points out how “technologies have transformed what we understand as sociality, friendship and intimacy”. He says that young people — constant consumers of social media like Snapchat and WhatsApp — are “being told that they are always connected. Which means that they can, by definition, not feel lonely”. Yet, especially within the Indian context, says Shah, the pace of life and the rapid transformation of societies means that we no longer pay attention to the emotional needs of belonging, which actually alleviate loneliness. “We have replaced belonging with connectivity and this is going to have dire consequences in how we reshape our cities and lives,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rachna Saxena (name changed), 31, agrees. Saxena migrated to Mumbai from a small town in Uttar Pradesh 14 years ago. “It was a big shift from the protective environment of home,” she says. She moulded herself to the demands of her new life once she joined the creative team in a multinational FMCG firm. She had been dating a Christian boy, but, at 28, when she finally broached the topic of marriage, the boy dithered on grounds of religious differences. The relationship crumbled, but something shifted inside her. “On &lt;a href="http://indianexpress.com/about/facebook/"&gt;Facebook&lt;/a&gt;, I’d look at photographs of my friends on their honeymoon. Everyone looked so happy, I felt depressed. I really wanted to get married, have a stable relationship. But that was just one part of my problems. I was a star performer at work, my social media feed showcased my ‘happening’ life, but no one could sense the immense pressure to live up to it,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last year, a colleague she was close to died of a sudden heart attack at the age of 36. She saw his family squabble over property and his pregnant widow shunted out. “Another very close friend of mine, with whom I would share my distress, committed suicide. One fine day, he just shot himself,” says Saxena. She stopped meeting friends or inviting people over. In February this year, Saxena fell unconscious in her office. She had been sleeping fitfully and now had constant headaches. During her medical leave, she went home. “I ate and slept well, and, after a long time, felt happy. My parents are super supportive. But when I returned to Mumbai, it all came back. I realised I live two lives and I just couldn’t handle the stress of it,” she says. She started undergoing counselling sessions, and, a month ago, she deactivated her WhatsApp and Facebook accounts, choosing to travel and forge real friendships instead. “Now that I observe things more closely, I see that a lot of people around me are lonely even if they don’t look it. It can happen to anyone, you know,” she says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/indian-express-asad-ali-tabassum-barnagarwala-april-29-2018-you-are-not-the-only-one-india-stares-at-a-loneliness-epidemic'&gt;https://cis-india.org/internet-governance/news/indian-express-asad-ali-tabassum-barnagarwala-april-29-2018-you-are-not-the-only-one-india-stares-at-a-loneliness-epidemic&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-29T16:15:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/new-indian-express-april-26-2018-aadhaar-data-over-89-lakh-mnrega-workers-in-andhra-pradesh-leaked-online">
    <title>Aadhaar data of over 89 lakh MNREGA workers in Andhra Pradesh leaked online</title>
    <link>https://cis-india.org/internet-governance/news/new-indian-express-april-26-2018-aadhaar-data-over-89-lakh-mnrega-workers-in-andhra-pradesh-leaked-online</link>
    <description>
        &lt;b&gt;Independent security researcher Kodali Srinivas tweeted screenshots of Aadhaar data of 89,38,138 MNREGA workers available on the Andhra Pradesh Benefit Disbursement Portal.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.newindianexpress.com/states/andhra-pradesh/2018/apr/26/aadhaar-data-of-over-89-lakh-mnrega-workers-in-andhra-pradesh-leaked-online-1806717.html"&gt;published in New Indian Express&lt;/a&gt; on April 27, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Independent security researcher Kodali Srinivas, who exposed the leakage of Aadhaar and other personal data of 1.34 lakh beneficiaries on the State Housing Corporation website, on Thursday tweeted screenshots of Aadhaar data of 89,38,138 MNREGA workers availalbe on the Andhra Pradesh Benefit Disbursement Portal, which is maintained by APOnline, a joint venture between the Tata Consultancy Services (TCS) and the State government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hours after he blew the whistle, the website administrators began masking the data. In May 2017, Srinivas had co-authored a report for the Centre for Internet and Society, exposing how the Aadhaar data of 13.5 crore card holders was leaked online. The data was then leaked by four government portals, National Social Assistance Programme, National Rural Employment Guarantee Scheme, Chandranna Bima Scheme of the Government of Andhra Pradesh and Daily Online Payment Reports of NREGA of the Government of Andhra Pradesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It appears that almost a year later, nothing much has changed. Srinivas told TNIE he had sent a mail to the chief operating officer, APOnline and Universal Identification Authority of India, the National Critical Information Infrastructure Protection Centre, and CERT-In, the Centre's cyber response wing. When contacted, Balasubramanyam, Joint Secretary (NREGS) told TNIE, "I have seen it. It is Benefit Disbursement Portal... not maintained by us. We have been very careful ever since that massive leak of data last year."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Executive (operations), APOnline, S Chandramouleeswara Reddy refused comment saying that he was not the competent authority to speak on the issue. APOnline developed ICT solution for MGNREGA scheme, a framework involving Department of Posts, for disbursement of entitlements after accurate authentication of the entitlements through finger print authentication. TCS implements the ICT solution for MGNREGA in the State.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/new-indian-express-april-26-2018-aadhaar-data-over-89-lakh-mnrega-workers-in-andhra-pradesh-leaked-online'&gt;https://cis-india.org/internet-governance/news/new-indian-express-april-26-2018-aadhaar-data-over-89-lakh-mnrega-workers-in-andhra-pradesh-leaked-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-05-05T08:43:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-request-29-revenue-breakdown-by-source-for-fy-2017">
    <title>DIDP Request #29 - Revenue breakdown by source for FY 2017</title>
    <link>https://cis-india.org/internet-governance/blog/didp-request-29-revenue-breakdown-by-source-for-fy-2017</link>
    <description>
        &lt;b&gt;We requested ICANN for financial information they have not yet provided for the period ending June 2017.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;ICANN publication of its financial records for 2017 were missing  a crucial document which lists down their revenue as per the all the legal entities as sources who  contributed to it including Regional Internet  Registries, various registrars and their source of origin among other  details. We have requested them for this document in order to get a  better idea of the how these entities contribute to ICANN.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In response to our DIDP, ICANN notified us that they are in the process of compiling this report for the year ending June 2017 and will publish the same by 31st of May, 2018. Further they remarked that this procedure of making public their revenue by source was developed as part of ICANN’s enhancements to transparency in response to CIS’s earlier DIDP which was submitted in 2015.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The said report will be published on their Financial page within the time frame mentioned.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-request-29-revenue-breakdown-by-source-for-fy-2017'&gt;https://cis-india.org/internet-governance/blog/didp-request-29-revenue-breakdown-by-source-for-fy-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>akriti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-26T11:06:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/pai-wg-labor-and-economy-meeting">
    <title>PAI WG Labor and Economy Meeting</title>
    <link>https://cis-india.org/internet-governance/news/pai-wg-labor-and-economy-meeting</link>
    <description>
        &lt;b&gt;Elonnai Hickok co-chaired the first PAI Labor and Economy WG in NYC on April 25, 2018.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/pai-wg-labor-and-economy"&gt;Agenda&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/pai-wg-labor-and-economy-meeting'&gt;https://cis-india.org/internet-governance/news/pai-wg-labor-and-economy-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-05-05T09:35:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world">
    <title>Revenge Porn Laws across the World</title>
    <link>https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world</link>
    <description>
        &lt;b&gt;The following is a compilation of laws dealing with revenge porn if and how they exist across multiple countries and jurisdictions.&lt;/b&gt;
        &lt;p&gt;Country-wise legislation on “revenge porn” laws, &lt;a class="external-link" href="https://cis-india.org/internet-governance/files/revenge-porn-laws-across-the-world"&gt;click to download the file&lt;/a&gt; (PDF, 636 Kb)&lt;/p&gt;
&lt;p&gt;&lt;a href="#_Toc511943056"&gt;Europe&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a href="#_Toc511943057"&gt;United Kingdom&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943058"&gt;England and Wales&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943059"&gt;Scotland&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943060"&gt;Northern Ireland&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943061"&gt;Malta&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943062"&gt;Germany&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943063"&gt;France&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="#_Toc511943064"&gt;United States of America&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a href="#_Toc511943065"&gt;Alabama&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943066"&gt;Alaska&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943067"&gt;Arizona&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943068"&gt;Arkansas&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943069"&gt;California&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943070"&gt;Colorado&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943071"&gt;Connecticut&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943072"&gt;Delaware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943073"&gt;District of Columbia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943074"&gt;Florida&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943075"&gt;Georgia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943076"&gt;Hawaii&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943077"&gt;Idaho&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943078"&gt;Illinois&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943079"&gt;Iowa&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943080"&gt;Kansas&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943081"&gt;Louisiana&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943082"&gt;Maine&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943083"&gt;Maryland&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943084"&gt;Michigan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943085"&gt;Minnesota&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943086"&gt;Nevada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943087"&gt;New Hampshire&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943088"&gt;New Jersey&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943089"&gt;New Mexico&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943090"&gt;North Carolina&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943091"&gt;North Dakota&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943092"&gt;Oklahoma&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943093"&gt;Oregon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943094"&gt;Pennsylvania&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943095"&gt;South Dakota&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943096"&gt;Tennessee&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943097"&gt;Texas&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943098"&gt;Utah&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943099"&gt;Vermont&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943100"&gt;Virginia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943101"&gt;Washington&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943102"&gt;West Virginia. 20&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943103"&gt;Wisconsin. 20&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="#_Toc511943104"&gt;Australia&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a href="#_Toc511943105"&gt;New South Wales&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943106"&gt;South Australia.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943107"&gt;Western Australia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943108"&gt;Victoria&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="#_Toc511943109"&gt;Asia and Rest of the World&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a href="#_Toc511943110"&gt;Canada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943111"&gt;Philippines&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943112"&gt;Israel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943113"&gt;Japan&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a name="_Toc511943056"&gt;&lt;/a&gt;&lt;strong&gt;1. &lt;/strong&gt;&lt;strong&gt;&lt;span&gt;Europe&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Country&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Statute&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Year&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Contents – definition, classification, punishment, standard of proof&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Punishment&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Remarks&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="6"&gt;
&lt;h3&gt;&lt;a name="_Toc511943057"&gt;&lt;/a&gt;United Kingdom&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943058"&gt;&lt;/a&gt;&lt;strong&gt;England and Wales&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legislation.gov.uk/ukpga/2015/2/section/33/enacted"&gt;Section 33&lt;/a&gt;, Criminal Justice and Courts Act 2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Makes it an offence in England and Wales to disclose private sexual photographs and films without the consent of the individual depicted and with the intent to cause distress.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;There is a maximum sentence of two years imprisonment&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A call has been made to cover a wider range of offences through enactment of a new Act.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The law is not applicable retroactively.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943059"&gt;&lt;/a&gt;&lt;strong&gt;Scotland&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legislation.gov.uk/asp/2016/22/section/2/enacted"&gt;Part 1, Section 2&lt;/a&gt;, Abusive Behaviour and Sexual Harm Act, 2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person (“A”) commits an offence if—&lt;/p&gt;
&lt;p&gt;(a)A discloses, or threatens to disclose, a photograph or film which shows, or appears to show, another person (“B”) in an intimate situation,&lt;/p&gt;
&lt;p&gt;(b)by doing so, A intends to cause B fear, alarm or distress or A is reckless as to whether B will be caused fear, alarm or distress, and&lt;/p&gt;
&lt;p&gt;(c)the photograph or film has not previously been disclosed to the public at large, or any section of the public, by B or with B’s consent.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;A person who commits such an offence is liable—&lt;br /&gt;
&lt;p&gt;(a)on summary conviction, to imprisonment for a term not exceeding 12 months or a fine not exceeding the statutory maximum (or both),&lt;/p&gt;
&lt;p&gt;(b) on conviction on indictment, to imprisonment for a term not exceeding 5 years or a fine (or both).&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943060"&gt;&lt;/a&gt;&lt;strong&gt;Northern Ireland&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legislation.gov.uk/nia/2016/21/section/51/enacted"&gt;Part 3, Section 51&lt;/a&gt;, Amendment to Justice Act&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is an offence for a person to disclose a private sexual photograph or film if the disclosure is made—&lt;/p&gt;
&lt;p&gt;(a)without the consent of an individual who appears in the photograph or film, and&lt;/p&gt;
&lt;p&gt;(b)with the intention of causing that individual distress.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;A person guilty of an offence under this section is liable—&lt;br /&gt;
&lt;p style="text-align: justify; "&gt;(a) on conviction on indictment, to imprisonment for a term not exceeding 2 years or a fine (or both), and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not exceeding the statutory maximum (or both).&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943061"&gt;&lt;/a&gt;&lt;strong&gt;Malta&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://justice.gov.mt/en/pcac/Documents/Criminal%20code.pdf"&gt;Article 208E&lt;/a&gt;, Maltese Criminal Code&lt;/p&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It punishes whoever, with an intent to cause distress, emotional harm or harm of any nature, discloses a private sexual photograph or film without the consent of the person or persons displayed or depicted in such photograph or film.&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Such person would, on conviction be liable to imprisonment for a term of up to two years or to a fine of not less than €,3000 and not more than €5,000, or to both such imprisonment and fine&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943062"&gt;&lt;/a&gt;&lt;strong&gt;Germany&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://dsgvo-gesetz.de/bdsg-neu/"&gt;General Data Protection Regulation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.gesetze-im-internet.de/urhg/"&gt;Art Copyright Law&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Regulation (EU) 679/2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation (GDPR)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A person also has the right to object to the unauthorised dissemination or public display of his/her photograph (section 22, Art Copyright Law)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;If privacy rights are infringed, the individual affected can seek civil law remedies, which include:&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Cease and desist orders, rectification and&lt;/li&gt;
&lt;li&gt;Compensatory damages.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;In 2014, The Bundesgerichtshof (BGH), upheld an earlier ruling from a regional court in Koblenz, Germany, that said a man did not have the right to keep intimate photos of his ex-lover just because she had consented to taking them in the first place.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943063"&gt;&lt;/a&gt;&lt;strong&gt;France&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.republique-numerique.fr/pages/digital-republic-bill-rationale"&gt;Digital Republic Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Under the new law, the persons have a right to oppose the use of their personal data.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Revenge porn may be sanctioned by 2 years of imprisonment and a 60.000 euro fine.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;a name="_Toc511943064"&gt;&lt;/a&gt;&lt;strong&gt;2. &lt;/strong&gt;&lt;strong&gt;&lt;span&gt;United States of America&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;State&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Statute&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Year&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Constituents of the offence&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Punishment&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Remarks&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943065"&gt;&lt;/a&gt;&lt;strong&gt;Alabama&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://alisondb.legislature.state.al.us/alison/codeofalabama/1975/coatoc.htm"&gt;SB301. Code of Alabama 1975 Secs 15-20A-4 to 15-20A-43 amended.&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2017&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Distribution of an intimate, private image, also known as "revenge porn" or "nonconsensual pornography." The law applies when the depicted person has not consented to the transmission and the sender intends to harass or intimidate the depicted person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A first offense is a Class A misdemeanor, punishable by up to a year in jail. Subsequent offenses are Class C felonies, punishable by up to 10 years in prison.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943066"&gt;&lt;/a&gt;&lt;strong&gt;Alaska&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://codes.findlaw.com/ak/title-11-criminal-law/ak-st-sect-11-61-120.html"&gt;Title 11. Criminal Law § 11.61.120&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Provides that whoever publishes or distributes electronic or printed photographs, pictures, or films that show the genitals, anus, or female breast of the other person or show that person engaged in a sexual act commits a crime of harassment in second degree.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Harassment in the second degree is a class B misdemeanor.&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;Class B misdemeanors are less serious crimes, punishable by up to 90 days in jail and a fine of up to $2,000.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943067"&gt;&lt;/a&gt;&lt;strong&gt;Arizona&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Unlawful Distribution of Private Images, 2016 through amending &lt;a href="https://legiscan.com/AZ/text/HB2001/id/1368420"&gt;Section 13‑1425 of the Arizona Revised Statutes&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It provides that the distribution of images depicting states of nudity or specific sexual activities of another person is unlawful.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If such disclosure is by electronic means, it is a Class 4 felony.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If the person threatens to disclose but does not disclose, then it is a Class 1 Misdemeanor.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       Class 4 felonies are punishable up to 3.75 years in prison.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;·       A class 1 misdemeanor is the most serious misdemeanor offense and is punishable by up to 6 months in jail, 3 years of probation (5 years maximum probation for DUI offenses) and a $2,500 fine plus surcharges.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       The earlier state revenge porn bill was scrapped due to an ACLU Lawsuit.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943068"&gt;&lt;/a&gt;&lt;strong&gt;Arkansas&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.arkleg.state.ar.us/assembly/2015/2015R/Acts/Act304.pdf"&gt;Arkansas Code 5-26-314&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;July, 2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It criminalizes the distribution of an image, picture, video, or voice or audio recording of a sexual nature to harass, frighten, intimidate, threaten, or abuse a family or household member or a person in a current or former dating relationship; and for other purposes.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Such an offence is a Class A misdemeanour.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       A Class A misdemeanor is the most serious type of misdemeanor in Arkansas and it is punishable by up to one year in jail and a fine of up to $2,500.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Defines a “dating relationship” as romantic/ intimate relationship between two individuals and provides additional factors.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943069"&gt;&lt;/a&gt;&lt;strong&gt;California&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201320140SB1255"&gt;Section 647(j)(4) of California Penal Code&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Under this provision an act of revenge porn is defined as someone who “photographs or records by any means the image of the intimate body part or parts of another identifiable person, under circumstances where the parties agree or understand that the image shall remain private, and the person subsequently distributes the image taken, with the intent to cause serious emotional distress, and the depicted person suffers serious emotional distress.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It shall be a disorderly conduct, misdemeanour.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943070"&gt;&lt;/a&gt;&lt;strong&gt;Colorado&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201320140SB1255"&gt;Colorado Revised Statutes 18-7-107 and 18-7-108.&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Posting a Private Image for Harassment and Posting a Private Image for Pecuniary Gain is a Class 1 Misdemeanor.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The defendant can be fined up to $10,000.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943071"&gt;&lt;/a&gt;&lt;strong&gt;Connecticut&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.cga.ct.gov/2015/act/pa/pdf/2015PA-00213-R00HB-06921-PA.pdf"&gt;Section 53a-189a, Connecticut General Statutes&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;October 1, 2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It provides that whoever indulges in Unlawful dissemination of an intimate image is guilty&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The offence is a class A misdemeanor.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943072"&gt;&lt;/a&gt;&lt;strong&gt;Delaware&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://codes.findlaw.com/de/title-11-crimes-and-criminal-procedure/de-code-sect-11-1335.html"&gt;§ 1335, Title 11 of the Delaware Code&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;When  a person knowingly reproduces, distributes, exhibits, publishes, transmits, or otherwise disseminates a visual depiction of a person who is nude, or who is engaging in sexual conduct, when the person knows or should have &lt;span style="text-align: left; "&gt;known that the reproduction, distribution, exhibition, publication, transmission, or other dissemination was without the consent of the person depicted and that the visual depiction was created or provided to the person under circumstances in which the person depicted has a reasonable expectation of privacy, such person shall be guilty of violation of privacy.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is a class A misdemeanor; class G felony.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943073"&gt;&lt;/a&gt;&lt;strong&gt;District of Columbia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://lims.dccouncil.us/Download/32304/B20-0903-Engrossment.pdf"&gt;Criminalization of Non-Consensual Pornography Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;It provides that a person knowingly discloses one or more sexual images of another identified or identifiable person when:&lt;/p&gt;
&lt;p&gt;(1) The person depicted did not consent to the disclosure of the sexual image;&lt;/p&gt;
&lt;p&gt;(2) There was an agreement or understanding between the person depicted and the person disclosing that the sexual image would not be disclosed; and&lt;/p&gt;
&lt;p&gt;(3) The person disclosed the sexual image with the intent to harm the person depicted person depicted or to receive financial gain.&lt;/p&gt;
&lt;p&gt;(b) A person who violates this subsection shall be guilty of a misdemeanour.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Upon conviction such person shall be fined not more than the amount set forth in section 101 of the Criminal Fine Proportionality Amendment Act of 2012, approved June 11, 2013 (D.C. Law 19-317; D.C.42 Official Code § 22-3571.01), imprisoned for not more than 180 days, or both.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943074"&gt;&lt;/a&gt;&lt;strong&gt;Florida&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.flsenate.gov/Session/Bill/2015/0538/BillText/er/PDF"&gt;Florida Statute Section 784.049&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       “Sexually cyberharass” means to publish a sexually&lt;/p&gt;
&lt;p&gt;explicit image of a person that contains or conveys the personal identification information of the depicted person to an Internet website without the depicted person’s consent, for no legitimate purpose, with the intent of causing substantial emotional distress to the depicted person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person who willfully and maliciously sexually cyberharasses another person commits a misdemeanor of the first degree, punishable as provided in s. 775.082 or s. 775.083.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;If a person who has one prior conviction for sexual cyber harassment and who commits a second or subsequent sexual cyber harassment commits a felony of the third degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Aggrieved person can also initiate civil action to recover damages.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943075"&gt;&lt;/a&gt;&lt;strong&gt;Georgia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legis.ga.gov/Legislation/20132014/143392.pdf"&gt;Article 3 of Chapter 11 of Title 16 of the Official Code of Georgia&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       Whoever Electronically transmits or posts or causes such transmission or posting, in one or more transmissions or posts, a photograph or video which depicts nudity or sexually explicit conduct of an adult when the transmission or post is harassment or causes financial loss to the depicted person and serves no legitimate purpose to the depicted person.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Such person shall be guilty of a misdemeanor of a high and aggravated nature; provided, however, that upon a second or subsequent violation of &lt;span&gt;this Code section, he or she shall be guilty of a felony and, upon conviction thereof, shall be punished by imprisonment of not less than one nor more than five years, a fine of not more than $100,000.00, or both.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;There is a rebuttable presumption on the Internet Service Provider that it was not aware of the content of such post&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943076"&gt;&lt;/a&gt;&lt;strong&gt;Hawaii&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.capitol.hawaii.gov/session2014/bills/HB1750_CD1_.pdf"&gt;Section 711-1110.9, Hawaii Revised Statutes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person commits the offense of violation of privacy in the first degree if The person knowingly discloses an image or video of another identifiable person either in the nude, as defined in section 712-1210, or engaging in sexual conduct, as defined in section 712-1210, without the consent of the depicted person, with intent to harm substantially the depicted person with respect to that person’s health, safety, business, calling, career, financial condition, reputation, or personal relationships.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Violation of privacy in the first degree is a class C felony.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In addition to any penalties the court may impose, the court may order the destruction of any recording made in &lt;/span&gt;&lt;span&gt;violation of this section&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Exception has been carved out for When the person was voluntarily nude in public or voluntarily engaging in sexual conduct in public.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943077"&gt;&lt;/a&gt;&lt;strong&gt;Idaho&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://codes.findlaw.com/id/title-18-crimes-and-punishments/id-st-sect-18-8327.html"&gt;Idaho Code 18-6609(2)(b)&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2017&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Intentionally or with reckless disregard disseminating, publishing or selling (or conspiring) any image or images of the intimate areas of another person or persons without the consent of such other person or persons and he knows or reasonably should have known that one or both parties agreed or understood that the images should remain private.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The punishments are decided on a case by case basis, but seem to range from state prison terms of three to five years, and/or a fine of up to $5,000 based on the cases that have emerged&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943078"&gt;&lt;/a&gt;&lt;strong&gt;Illinois&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.ilga.gov/legislation/publicacts/fulltext.asp?Name=098-1138"&gt;Section 11-23.5 of The Illinois Criminal Code of 2012&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Criminalises the Non-Consensual Dissemination of Private Sexual Images.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is a Class 4 Felony.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943079"&gt;&lt;/a&gt;&lt;strong&gt;Iowa&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.legis.iowa.gov/legislation/BillBook?ga=87&amp;amp;ba=HF526"&gt;Section708.7 of the Code of 2017&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2017&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Dissemination, publication, distribution or causing it thereof of photograph or film showing another person in partial or full nudity or engaged in a sex act, without consent, is harassment.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Such an offence is harassment in first degree and is an aggravated misdemeanour&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943080"&gt;&lt;/a&gt;&lt;strong&gt;Kansas&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.kslegislature.org/li_2016/b2015_16/measures/documents/hb2501_enrolled.pdf"&gt;Section 21-6101(a)(8) of Kansas State Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Breach of privacy is knowingly and without lawful &lt;span&gt;authority: disseminating any videotape, photograph, film or image of another identifiable person 18 years of age or older who is nude or engaged in sexual activity and under circumstances in which such identifiable person had a reasonable expectation of privacy, with the intent to harass, threaten or intimidate such identifiable person, and such identifiable person did not consent to such dissemination&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Such an offence is a Severity level 8, person felony&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943081"&gt;&lt;/a&gt;&lt;strong&gt;Louisiana&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legis.la.gov/legis/ViewDocument.aspx?d=954684"&gt;R.S. 14:283.2&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person commits the offense of non-consensual disclosure of a private mage when all of the following occur:&lt;/p&gt;
&lt;p&gt;(1) The person intentionally discloses an image of another person who is seventeen years of age or older, who is identifiable from the image or information displayed in connection with the image, and whose intimate parts are exposed in whole or in part.&lt;/p&gt;
&lt;p&gt;(2) The person who discloses the image obtained it under circumstances in which a reasonable person would know or understand that the image was to remain private.&lt;/p&gt;
&lt;p&gt;(3) The person who discloses the image knew or should have known that the person in the image did not consent to the disclosure of the image.&lt;/p&gt;
&lt;p&gt;(4) The person who discloses the image has the intent to harass or cause emotional distress to the person in the image, and the person who commits the offense knew or should have known that the disclosure could harass or cause emotional distress to the person in the image&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Whoever commits the offense of non-consensual disclosure of a private image shall be fined not more than ten thousand dollars, imprisoned with or without hard labour for not more than two years, or both&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No liability is imposed on the computer service used for posting such image&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943082"&gt;&lt;/a&gt;&lt;strong&gt;Maine&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.mainelegislature.org/legis/bills/getPDF.asp?paper=HP0460&amp;amp;item=5&amp;amp;snum=127"&gt;Section 1 17-A MRSA §511-A&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person is guilty of unauthorized dissemination of certain private images if the person, with the intent to harass, torment or threaten the depicted person or another person, knowingly disseminates, displays or publishes a photograph, videotape, film or digital recording of another person in a state of nudity or engaged in a sexual act or engaged in sexual contact in a manner in which there is no public or newsworthy purpose when the person knows or should have known that the depicted person:&lt;/p&gt;
&lt;p&gt;(1) Is 18 years of age or older;&lt;/p&gt;
&lt;p&gt;(2) Is identifiable from the image itself or information displayed in connection with the image; and&lt;/p&gt;
&lt;p&gt;(3) Has not consented to the dissemination, display or publication of the private image.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Unauthorized dissemination of certain private images is a Class D crime.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943083"&gt;&lt;/a&gt;&lt;strong&gt;Maryland&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://mgaleg.maryland.gov/2014RS/bills/hb/hb0043E.pdf"&gt;§ 3-809, Maryland Code.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person may not intentionally cause serious emotional distress to another by intentionally placing on the internet an identifiable a photograph, film, videotape, recording, or any other reproduction of the image of the other person that reveals the identity of the other person with his or her intimate parts exposed or while engaged in an act of sexual contact:&lt;/p&gt;
&lt;p&gt;(1) knowing that the other person did not consent to &lt;span&gt;the placement of the image on the internet; and&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) under circumstances in which the other person had a reasonable expectation that the image would be kept private.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person who violates this section is guilty of a misdemeanor and on conviction is subject to imprisonment not exceeding 2 years or a fine not exceeding $5,000 or both.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943084"&gt;&lt;/a&gt;&lt;strong&gt;Michigan&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legislature.mi.gov/documents/2015-2016/billenrolled/Senate/pdf/2015-SNB-0508.pdf"&gt;Sec 145e of MCL&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;If a person threatens, coerces, or intimidates dissemination of any sexually explicit visual material of another person shall be punishable under section 145f.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.legislature.mi.gov/documents/2015-2016/billenrolled/Senate/pdf/2015-SNB-0509.pdf"&gt;Section 145f&lt;/a&gt;- first offense punishable by 93 day sentence or fine up to $500.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943085"&gt;&lt;/a&gt;&lt;strong&gt;Minnesota&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.revisor.mn.gov/bills/text.php?number=SF2713&amp;amp;version=2&amp;amp;session=ls89&amp;amp;session_year=2016&amp;amp;session_number=0"&gt;§ 617.261, Minnesota Statutes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A cause of action against a person for the non-consensual dissemination of private sexual images exists when:&lt;/p&gt;
&lt;p&gt;(1) a person disseminated an image without the consent of the person depicted in the image;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) the image is of an individual depicted in a sexual act or whose intimate parts are exposed in whole or in part;&lt;/p&gt;
&lt;p&gt;(3) the person is identifiable:&lt;/p&gt;
&lt;p&gt;(i) from the image itself, by the person depicted in the image or by another person; or&lt;/p&gt;
&lt;p&gt;(ii) from the personal information displayed in connection with the image; and&lt;/p&gt;
&lt;p&gt;(4) the image was obtained or created under circumstances in which the person depicted had a reasonable expectation of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fact that the individual depicted in the image consented to the creation of the image or to the voluntary private transmission of the image is not a defense to liability for a person who has disseminated the image without consent.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Conviction for nonconsensual dissemination of private sexual images qualifies as a prior “qualified domestic violence-related offense” that enhances penalties for convictions for domestic assault, 4th &amp;amp; 5th degree assault, stalking, and violation of a harassment restraining order.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Consent to such image being taken is no defense&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943086"&gt;&lt;/a&gt;&lt;strong&gt;Nevada&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.leg.state.nv.us/Session/78th2015/Bills/AB/AB49_EN.pdf"&gt;Sections 2-6 of Chapter 200 of NRS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person commits the crime of unlawful dissemination of an intimate image when, with the intent to harass, harm or terrorize another person, the person electronically disseminates or sells an intimate image which depicts the other person and the other person:&lt;/p&gt;
&lt;p&gt;(1) did not give prior consent to the electronic dissemination or sale;&lt;/p&gt;
&lt;p&gt;(2) had a reasonable expectation that the intimate image would be kept private and would not be made visible to the public; and&lt;/p&gt;
&lt;p&gt;(3) was at least 18 years of age when the intimate image was created&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Such person is guilty of a category D felony&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943087"&gt;&lt;/a&gt;&lt;strong&gt;New Hampshire&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.gencourt.state.nh.us/bill_Status/billText.aspx?id=962&amp;amp;txtFormat=html%22,%22http://www.gencourt.state.nh.us/bill_Status/billText.aspx?id=962&amp;amp;txtFormat=html"&gt;§ 644:9-a, N.H. Rev. Stat.&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Nonconsensual dissemination of private sexual images with the intent to harass, intimidate, threaten, or coerce the depicted person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is a felony.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943088"&gt;&lt;/a&gt;&lt;strong&gt;New Jersey&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://law.justia.com/codes/new-jersey/2013/title-2c/section-2c-14-9/"&gt;§ 2C:14-9, New Jersey Code&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Making a nonconsensual recording that reveals another person’s "intimate parts" or shows the person engaged in a sexual act without consent.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Felony, three to five years in prison, a fine not to exceed $15,000.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943089"&gt;&lt;/a&gt;&lt;strong&gt;New Mexico&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.nmlegis.gov/Legislation/Legislation?chamber=H&amp;amp;legtype=B&amp;amp;legno=142&amp;amp;year=15&amp;amp;AspxAutoDetectCookieSupport=1"&gt;HB 142, new section added to the New Mexico Criminal Code&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Unauthorised distribution of sensitive images without that person’s consent with the intent to harass, humiliate or intimidate that person or cause substantial emotional distress is a misdemeanour.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is a misdemeanour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Upon a second or subsequent conviction, the offender is guilty of a fourth degree felony&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943090"&gt;&lt;/a&gt;&lt;strong&gt;North Carolina&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.ncleg.net/Sessions/2015/Bills/House/PDF/H792v6.pdf"&gt;§ 14-190.5A, Article 26 of Chapter 14 of the General Statutes&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person is guilty of disclosure of private images if all of the following apply:&lt;/p&gt;
&lt;p&gt;(1) The person knowingly discloses an image of another person with the intent to do either of the following:&lt;/p&gt;
&lt;p&gt;a. Coerce, harass, intimidate, demean, humiliate, or cause financial loss to the depicted person.&lt;/p&gt;
&lt;p&gt;b. Cause others to coerce, harass, intimidate, demean, humiliate, or cause financial loss to the depicted person.&lt;/p&gt;
&lt;p&gt;(2) The depicted person is identifiable from the disclosed image itself or information offered in connection with the image.&lt;/p&gt;
&lt;p&gt;(3) The depicted person's intimate parts are exposed or the depicted person is engaged in sexual conduct in the disclosed image.&lt;/p&gt;
&lt;p&gt;(4) The person discloses the image without the affirmative consent of the depicted person.&lt;/p&gt;
&lt;p&gt;(5) The person discloses the image under circumstances such that the person knew or should have known that the depicted person had a reasonable expectation of privacy.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;For an offense by a person who is 18 years of age or older at the time of the offense, the violation is a Class H felony.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a first offense by a person who is under 18 years of age at the time of the offense, the violation is a Class 1 misdemeanor.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a second or subsequent offense by a person who is under the age of 18 at the time of the offense, the violation is a Class H felony&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The Court may order destruction of such image.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision is in addition to civil and criminal remedies.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943091"&gt;&lt;/a&gt;&lt;strong&gt;North Dakota&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legis.nd.gov/assembly/64-2015/documents/15-0982-03000.pdf?20150621075722"&gt;Section 12.1-17-07.2 of the North Dakota Century Code&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       A person commits the offense of distribution of intimate images if the person knowingly or intentionally distributes to any third party any intimate image of an individual eighteen years of age or older, if:&lt;/p&gt;
&lt;p&gt;(1) The person knows that the depicted individual has not given consent to the person to distribute the intimate image;&lt;/p&gt;
&lt;p&gt;(2) The intimate image was created by or provided to the person under circumstances in which the individual has a reasonable expectation of privacy; and&lt;/p&gt;
&lt;p&gt;(3) Actual emotional distress or harm is caused to the individual as a result of the distribution under this section.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Distribution of an intimate image is a class A misdemeanor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943092"&gt;&lt;/a&gt;&lt;strong&gt;Oklahoma&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://legiscan.com/OK/text/SB1257/2016"&gt;Section 1040.13b of Title 21, Oklahoma Statutes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       A person commits nonconsensual dissemination of private sexual images when he or she:&lt;/p&gt;
&lt;p&gt;(1) Intentionally disseminates an image of another person:&lt;/p&gt;
&lt;p&gt;a. who is at least eighteen (18) years of age,&lt;/p&gt;
&lt;p&gt;b. who is identifiable from the image itself or&lt;/p&gt;
&lt;p&gt;information displayed in connection with the image,&lt;/p&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;p&gt;c. who is engaged in a sexual act or whose intimate parts are exposed, in whole or in part;&lt;/p&gt;
&lt;p&gt;(2) Disseminates the image with the intent to harass, intimidate or coerce the person, or under circumstances in which a reasonable person would know or understand that dissemination of the image would harass, intimidate or coerce the person&lt;/p&gt;
&lt;p&gt;(3) Obtains the image under circumstances in which a reasonable person would know or understand that the image was to remain private; and&lt;/p&gt;
&lt;p&gt;(4) Knows or a reasonable person should have known that the person in the image has not consented to the dissemination.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Any person who violates the provisions of this section shall be guilty of a misdemeanour punishable by imprisonment in a county jail for not more than one (1) year or by a fine of not more than.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One Thousand Dollars ($1,000.00), or both such fine and imprisonment&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The court shall have the authority to order the defendant to remove the disseminated image should the court find it is in the power of the defendant to do so.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943093"&gt;&lt;/a&gt;&lt;strong&gt;Oregon&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://olis.leg.state.or.us/liz/2015R1/Downloads/MeasureDocument/SB188/Enrolled"&gt;ORS 161.005&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       (1) A person commits the crime of unlawful dissemination of an intimate image if:&lt;/p&gt;
&lt;p&gt;(a) The person, with the intent to harass, humiliate or injure another person, knowingly causes to be disclosed through an Internet website an identifiable image of the other person whose intimate parts are visible or who is engaged in sexual conduct;&lt;/p&gt;
&lt;p&gt;(b) The person knows or reasonably should have known that the other person does not consent to the disclosure;&lt;/p&gt;
&lt;p&gt;(c) The other person is harassed, humiliated or injured by the disclosure; and&lt;/p&gt;
&lt;p&gt;(d) A reasonable person would be harassed, humiliated or injured by the disclosure.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Unlawful dissemination of an intimate image is a Class A misdemeanor.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlawful dissemination of an intimate image is a Class C felony if the person has a prior conviction under this section at the time of the offense.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943094"&gt;&lt;/a&gt;&lt;strong&gt;Pennsylvania&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legis.state.pa.us/cfdocs/legis/li/uconsCheck.cfm?yr=2014&amp;amp;sessInd=0&amp;amp;act=115"&gt;Title 18 Pennsylvania Consolidated Statutes § 3131&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person commits the offense of unlawful dissemination of intimate image if, with intent to harass, annoy or alarm a current or former sexual or intimate partner, the person disseminates a visual depiction of the current or former sexual or intimate partner in a state of nudity or engaged in sexual conduct.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       An offense shall be:&lt;/p&gt;
&lt;p&gt;(1)  A misdemeanor of the first degree, when the person depicted is a minor.&lt;/p&gt;
&lt;p&gt;(2)  A misdemeanor of the second degree, when the person depicted is not a minor.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943095"&gt;&lt;/a&gt;&lt;strong&gt;South Dakota&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://sdlegislature.gov/Statutes/Codified_Laws/DisplayStatute.aspx?Type=Statute&amp;amp;Statute=22-21-4"&gt;Section 4 of Chapter 22-21 of South Dakota Code of Laws&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No person may use or disseminate in any form any visual recording or photographic device to photograph or visually record any other person without clothing or under or through the clothing, or with another person depicted in a sexual manner, for the purpose of viewing the body of, or the undergarments worn by, that other person, without the consent or knowledge of that other person, with the intent to self-gratify, to harass, or embarrass and invade the privacy of that other person, under circumstances in which the other person has a reasonable expectation of privacy.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A violation of this section is a Class 1 misdemeanor.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, a violation of this section is a Class 6 felony if the victim is seventeen years of age or younger and the perpetrator is at least twenty-one years old.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943096"&gt;&lt;/a&gt;&lt;strong&gt;Tennessee&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://publications.tnsosfiles.com/acts/109/pub/pc0872.pdf"&gt;Chapter 872 Tenn. Pub. Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2017&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;(a) A person commits unlawful exposure who, with the intent to cause emotional distress, distributes an image of the intimate part or parts of another identifiable person if:&lt;/p&gt;
&lt;p&gt;(1) The image was photographed or recorded under circumstances where the parties agreed or understood that the image would remain private; and&lt;/p&gt;
&lt;p&gt;(2) The person depicted in the image suffers emotional distress.&lt;/p&gt;
&lt;p&gt;(b) As used in this section:&lt;/p&gt;
&lt;p&gt;(1) "Emotional distress" has the same meaning as defined in § 39-17-315; and&lt;/p&gt;
&lt;p&gt;(2) "Intimate part" means any portion of the primary genital area, buttock, or any portion of the female breast below the top of the areola that is either uncovered or visible through less than fully opaque clothing.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A violation of subsection (a) is a Class A misdemeanor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, nothing in this section precludes punishment under any other section of law providing for greater punishment.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943097"&gt;&lt;/a&gt;&lt;strong&gt;Texas&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://capitol.texas.gov/tlodocs/84R/billtext/pdf/SB01135F.pdf#navpanes=0"&gt;Chapter 98B, ATitle 4, Civil Practice and Remedies Code&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;(a)A defendant is liable, as provided by this chapter, to a person depicted in intimate visual material for damages arising from the disclosure of the material if:&lt;/p&gt;
&lt;p&gt;(1)the defendant discloses the intimate visual&lt;/p&gt;
&lt;p&gt;material without the effective consent of the depicted person;&lt;/p&gt;
&lt;p&gt;(2)the intimate visual material was obtained by the&lt;/p&gt;
&lt;p&gt;defendant or created under circumstances in which the depicted person had a reasonable expectation that the material would remain private;&lt;/p&gt;
&lt;p&gt;(3)the disclosure of the intimate visual material &lt;span&gt;causes harm to the depicted person; and&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;(4)the disclosure of the intimate visual material &lt;span&gt;reveals the identity of the depicted person in any manner, including through:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;(A)any accompanying or subsequent information &lt;span&gt;or material related to the intimate visual material; or&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;(B)information or material provided by a third &lt;span&gt;party in response to the disclosure of the intimate visual material&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) defendant is liable, as provided by this chapter, to a person depicted in intimate visual material for damages arising from the promotion of the material if, knowing the character and content of the material, the defendant promotes intimate visual material described by Subsection (a) on an Internet website or other forum for publication that is owned or operated by the defendant.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;An offense under this section is a Class A misdemeanor.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If conduct that constitutes an offense under this section also constitutes an offense under another law, the actor may be prosecuted under this section, the other law, or both.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Aggrieved person may recover actual and exemplary damages.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The provisions shall be liberally construed by the courts to promote its underlying purpose to protect&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Persons from, and provide adequate remedies to victims of, the disclosure or promotion of intimate visual material.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943098"&gt;&lt;/a&gt;&lt;strong&gt;Utah&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://le.utah.gov/~2014/bills/static/HB0071.html"&gt;§ 76-5b-203, Utah Code.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;An actor commits the offense of distribution of intimate images if the actor, with the intent to cause emotional distress or harm, knowingly or intentionally distributes to any third party any intimate image of an individual who is 18 years of age or older, if:&lt;/p&gt;
&lt;p&gt;(a) the actor knows that the depicted individual has not given consent to the actor to distribute the intimate image;&lt;/p&gt;
&lt;p&gt;(b) the intimate image was created by or provided to the actor under circumstances in which the individual has a reasonable expectation of privacy; and&lt;/p&gt;
&lt;p&gt;(c) actual emotional distress or harm is caused to the person as a result of the distribution under this section.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Distribution of an intimate image is a class A misdemeanour.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943099"&gt;&lt;/a&gt;&lt;strong&gt;Vermont&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://legislature.vermont.gov/assets/Documents/2016/Docs/BILLS/H-0105/H-0105%20As%20Passed%20by%20Both%20House%20and%20Senate%20Unofficial.pdf"&gt;Sec. 2. 13 V.S.A. § 2606&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person violates this section if he or she knowingly discloses a visual image of an identifiable person who is nude or who is engaged in sexual conduct, without his or her consent, with the intent to harm, harass, intimidate, threaten, or coerce the person depicted, and the disclosure would cause a reasonable person to suffer harm. A person may be identifiable from the &lt;span style="text-align: left; "&gt;image itself or information offered in connection with the image. Consent to recording of the visual image does not, by itself, constitute consent for disclosure of the image.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person who violates this provision shall be imprisoned not more than two years or fined not more than $2,000.00, or both.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A person who violates this provision with the intent of disclosing the image for financial profit shall be imprisoned not more than five years or fined not more than $10,000.00, or both.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;In addition, the Court may order &lt;span&gt;equitable relief, including a temporary restraining order, a preliminary &lt;/span&gt;&lt;span&gt;injunction, or a permanent injunction ordering the defendant to cease display or disclosure of the image.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court may grant injunctive relief maintaining the confidentiality of a plaintiff using a pseudonym.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943100"&gt;&lt;/a&gt;&lt;strong&gt;Virginia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://law.lis.virginia.gov/vacode/title18.2/chapter8/section18.2-386.2/"&gt;§ 18.2-386.2, Code of Virginia&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Any person who, with the intent to coerce, harass, or intimidate, maliciously disseminates or sells any videographic or still image created by any means whatsoever that depicts another person who is totally nude, or in a state of undress so as to expose the genitals, pubic area, buttocks, or female breast, where such person knows or has reason to know that he is not licensed or authorized to disseminate or sell such videographic or still image is guilty.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Such an offense is a Class 1 misdemeanor.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943101"&gt;&lt;/a&gt;&lt;strong&gt;Washington&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://lawfilesext.leg.wa.gov/biennium/2015-16/Pdf/Bills/House%20Passed%20Legislature/1272-S2.PL.pdf"&gt;Title 9A RCW&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person commits the crime of disclosing intimate images when the person knowingly discloses an intimate image of another person and the person disclosing the image:&lt;/p&gt;
&lt;p&gt;(a) Obtained it under circumstances in which a reasonable person would know or understand that the image was to remain private;&lt;/p&gt;
&lt;p&gt;(b) Knows or should have known that the depicted  person has not consented to the disclosure; and10&lt;/p&gt;
&lt;p&gt;(c) Knows or reasonably should know that disclosure would cause harm to the depicted person.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The crime of disclosing intimate images:&lt;/p&gt;
&lt;p&gt;(a) Is a gross misdemeanor on the first offense; or&lt;/p&gt;
&lt;p&gt;(b) Is a class C felony if the defendant has one or more prior convictions for disclosing intimate images.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person who is under the age of eighteen is not guilty of the crime of disclosing intimate images unless the person:&lt;/p&gt;
&lt;p&gt;(a) Intentionally and maliciously disclosed an intimate image of another person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Obtained it under circumstances in which a reasonable person would know or understand that the image was to remain private; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) Knows or should have known that the depicted person has not consented to the disclosure&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943102"&gt;&lt;/a&gt;&lt;strong&gt;West Virginia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.wvlegislature.gov/Bill_Text_HTML/2017_SESSIONS/RS/Bills/SB240%20SUB1%20enr.htm"&gt;§61-8-28a, Code of West Virginia&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2017&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No person may knowingly and intentionally disclose, cause to be disclosed or threaten to disclose, with the intent to harass, intimidate, threaten, humiliate, embarrass, or coerce, an image of another which shows the intimate parts of the depicted person or shows the depicted person engaged in sexually explicit conduct which was captured under circumstances where the person depicted had a reasonable expectation that the image would not be publicly disclosed.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person convicted is guilty of a misdemeanor and, upon conviction thereof, shall be confined in jail for not more than one year, fined not less than $1,000 nor more than $5,000, or both confined and fined.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943103"&gt;&lt;/a&gt;&lt;strong&gt;Wisconsin&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://docs.legis.wisconsin.gov/2013/related/acts/243"&gt;§ 942.09, Code of Wisconsin&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;It provides for posting or publishing a sexually explicit image without consent and providing a penalty. Such an offence is a Class A misdemeanour.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Class A misdemeanors can result in fines up to $10,000, imprisonment up to 9 months or a combination of the two.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;a name="_Toc511943104"&gt;&lt;/a&gt;&lt;strong&gt;3. &lt;/strong&gt;&lt;strong&gt;&lt;span&gt;Australia&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Country&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Statute&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Year&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Contents – definition, classification, punishment, standard of proof&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Punishment&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Remarks&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943105"&gt;&lt;/a&gt;&lt;strong&gt;New South Wales&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.legislation.nsw.gov.au/#/view/act/1900/40/part3/div15c/sec91q"&gt;Section 91Q, Crimes Act 1900&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2018&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person who intentionally distributes an intimate image of another person:&lt;/p&gt;
&lt;p&gt;(a) without the consent of the person, and&lt;/p&gt;
&lt;p&gt;(b) knowing the person did not consent to the distribution or being reckless as to whether the person consented to the distribution, is guilty of an offence.&lt;/p&gt;
&lt;p&gt;"intimate image" means:&lt;/p&gt;
&lt;p&gt;(a) an image of a person's private parts, or of a person engaged in a private act, in circumstances in which a reasonable person would reasonably expect to be afforded privacy, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) an image that has been altered to appear to show a person's private parts, or a person engaged in a private act, in circumstances in which a reasonable person would reasonably expect to be afforded privacy.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Maximum penalty: 100 penalty units or imprisonment for 3 years, or both.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943106"&gt;&lt;/a&gt;&lt;strong&gt;South Australia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.legislation.sa.gov.au/lz/c/a/summary%20offences%20act%201953/current/1953.55.auth.pdf"&gt;Summary Offences Act 1953&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2018&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person who distributes an invasive image of another person, knowing or having reason to believe that the other person—&lt;/p&gt;
&lt;p&gt;(a) does not consent to that particular distribution of the image; or&lt;/p&gt;
&lt;p&gt;(b) does not consent to that particular distribution of the image and does not consent to distribution of the image generally, is guilty of an offence.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;An image of a person will be taken to be an invasive&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;image of the person if it depicts the person in a place other than a public place—&lt;/p&gt;
&lt;p&gt;(a) engaged in a private act; or&lt;/p&gt;
&lt;p&gt;(b) in a state of undress such that—&lt;/p&gt;
&lt;p&gt;(i) in the case of a female—the bare breasts are visible; or&lt;/p&gt;
&lt;p&gt;(ii) in any case—the bare genital or anal region is visible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) However, an image of a person that falls within the standards of morality, decency and propriety generally accepted by reasonable adults in the community will not be taken to be an invasive image of the person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Maximum penalty:&lt;/p&gt;
&lt;p&gt;(a) if the invasive image is of a person under the age of 17 years—$20000 or imprisonment for 4 years;&lt;/p&gt;
&lt;p&gt;(b) in any other case—$10 000 or imprisonment for 2 years.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943107"&gt;&lt;/a&gt;&lt;strong&gt;Western Australia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://classic.austlii.edu.au/au/legis/wa/bill/roarlavb2016630/"&gt;Section 10G/61, Restraining Orders and Related Legislation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://classic.austlii.edu.au/au/legis/wa/bill/roarlavb2016630/"&gt;Amendment (Family Violence) Act 2016&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A court may restrain the respondent from doing all or any of the following in the case of a family violence restraining order:&lt;/p&gt;
&lt;p&gt;distributing or publishing, or threatening to distribute or publish, intimate personal images of the person seeking to be protected;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2 years imprisonment.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Check comes into play only in case of a family violence restraining order and is not general protection.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943108"&gt;&lt;/a&gt;&lt;strong&gt;Victoria&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www5.austlii.edu.au/au/legis/vic/consol_act/soa1966189/s41c.html"&gt;Section 41C, Summary Offences Act 1966&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2012&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person who visually captures or has visually captured an image of another person's genital or anal region must not intentionally distribute that image.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2 years imprisonment.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;a name="_Toc511943109"&gt;&lt;/a&gt;&lt;strong&gt;4. &lt;/strong&gt;&lt;strong&gt;&lt;span&gt;Asia and Rest of the World&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Country&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Statute&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Year&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Contents – definition, classification, punishment, standard of proof&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Punishment&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Remarks&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943110"&gt;&lt;/a&gt;&lt;strong&gt;Canada&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.cba.org/CMSPages/GetFile.aspx?guid=2f73fcf2-a04e-402a-97e8-de9d56b0ba1a"&gt;Section 162.1, Criminal Code through Bill C-13 or Cyberbullying Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Everyone who knowingly publishes, distributes, transmits, sells, makes available or advertises an intimate image of a person knowing that the person depicted in the image did not give their consent to that conduct, or being reckless as to whether or not that person gave their consent to that conduct, is guilty.&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;In this section, “intimate image” means a visual recording of a person made by any means including a photographic, film or video recording,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;(a) in which the person is nude, is exposing his or her genital organs or anal region or her breasts or is engaged in explicit sexual activity;&lt;/p&gt;
&lt;p&gt;(b) in respect of which, at the time of the recording, there were circumstances that gave rise to a reasonable expectation of privacy; and&lt;/p&gt;
&lt;p&gt;(c) in respect of which the person depicted retains a reasonable expectation of privacy at the time the offence is committed.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Punishment is:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) of an indictable offence and liable to imprisonment for a term of not more than five years; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) of an offence punishable on summary conviction.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943111"&gt;&lt;/a&gt;&lt;strong&gt;Philippines&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.lawphil.net/statutes/repacts/ra2010/ra_9995_2010.html"&gt;Anti-Photo and Video Voyeurism Act of 2009&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;It is hereby prohibited and declared unlawful for any person:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) To take photo or video coverage of a person or group of persons performing sexual act or any similar activity or to capture an image of the private area of a person/s such as the naked or undergarment clad genitals, public area, buttocks or female breast without the consent of the person/s involved and under circumstances in which the person/s has/have a reasonable expectation of privacy;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;(b) To copy or reproduce, or to cause to be copied or reproduced, such photo or video or recording of sexual act or any similar activity with or without consideration;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(c) To sell or distribute, or cause to be sold or distributed, such photo or video or recording of sexual act, whether it be the original copy or reproduction thereof; or&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(d) To publish or broadcast, or cause to be published or broadcast, whether in print or broadcast media, or show or exhibit the photo or video coverage or recordings of such sexual act or any similar activity through VCD/DVD, internet, cellular phones and other similar means or device.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The prohibition under paragraphs (b), (c) and (d) shall apply notwithstanding that consent to record or take photo or video coverage of the same was given by such person/s. Any person who violates this provision shall be liable for photo or video voyeurism as defined herein.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The penalty of imprisonment of not less that three (3) years but not more than seven (7) years and a fine of not less than One hundred thousand pesos (P100,000.00) but not more than Five hundred thousand pesos (P500,000.00), or both, at the discretion of the court shall be imposed upon any person found guilty of violating Section 4 of this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the violator is a juridical person, its license or franchise shall be automatically be deemed revoked and the persons liable shall be the officers thereof including the editor and reporter in the case of print media, and the station manager, editor and broadcaster in the case of a broadcast media.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If the offender is a public officer or employee, or a professional, he/she shall be administratively liable.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If the offender is an alien, he/she shall be subject to deportation proceedings after serving his/her sentence and payment of fines.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943112"&gt;&lt;/a&gt;&lt;strong&gt;Israel&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://mfa.gov.il/MFA/AboutIsrael/State/Law/Pages/Prevention_of_Sexual_Harassment_Law_5758-1998.aspx"&gt;Prevention of Sexual Harassment Law, 5758-1998 amended in 2014&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The distribution of still pictures or video recordings of a person’s image that focuses on his/her sexuality, including by editing or incorporation, is unlawful if made:&lt;/p&gt;
&lt;p&gt;1. without the person’s consent;&lt;/p&gt;
&lt;p&gt;2. in a way that facilitates identification of the person; and&lt;/p&gt;
&lt;p&gt;3. under circumstances that may degrade or shame him/her&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The distribution of such an image constitutes sexual harassment under section 3(a) of the Prevention of Sexual Harassment Law and intentional harm to a person’s privacy under section 5 of the Protection of Privacy Law.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The crimes are punishable with five years of imprisonment, in addition to subjecting the perpetrator to civil liability and the duty to pay monetary compensation to the victim.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943113"&gt;&lt;/a&gt;&lt;strong&gt;Japan&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.loc.gov/law/foreign-news/article/japan-new-revenge-porn-prevention-act/"&gt;Act on Prevention of Damage by Provision of Private Sexual Image Records Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;It criminalizes the provision of a private sexual image of another person without the person’s approval via a means of telecommunication to an unspecified number of or to many people.&lt;/p&gt;
&lt;p&gt;It allows Internet service providers to delete suspected revenge porn images without the uploader’s consent, in cases where:&lt;/p&gt;
&lt;p&gt;1. the victim had notified the provider of the existence of the image;&lt;/p&gt;
&lt;p&gt;2. the provider had requested the consent of the uploader to delete the image; and&lt;/p&gt;
&lt;p&gt;3. the uploader did not respond or delete the image.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A maximum sentence of 500,000 yen or three years in jail.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The Act also obligates the national and local governments to ease victims’ embarrassment when they report the crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For especially young potential victims, the Act further obligates the governments to educate people on how to avoid revenge porn.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world'&gt;https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shradha Nigam</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Revenge Porn</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-25T16:58:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp">
    <title>What’s up with WhatsApp?</title>
    <link>https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp</link>
    <description>
        &lt;b&gt;In 2016, WhatsApp Inc announced it was rolling out end-to-end encryption, but is the company doing what it claims to be doing?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aayush Rathi and Sunil Abraham was published in &lt;a class="external-link" href="http://www.atimes.com/article/whats-up-with-whatsapp/"&gt;Asia Times&lt;/a&gt; on April 20, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Back in April 2016, when WhatsApp Inc announced it was rolling out end-to-end encryption (E2EE) for its billion-plus strong user base as a default setting, the messaging behemoth signaled to its users it was at the forefront of providing technological solutions to protect privacy.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Emphasized in the security white paper explaining the implementation of the technology is the encryption of both forms of communication – one-to-one and group and also of all types of messages shared within such communications – text as well as media.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Simply put, all communication taking place over WhatsApp would be decipherable only to the sender and recipient – it would be virtual gibberish even to WhatsApp.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;This announcement came in the backdrop of &lt;a href="https://www.theguardian.com/us-news/2016/feb/17/apple-ordered-to-hack-iphone-of-san-bernardino-shooter-for-fbi"&gt;Apple locking horns with the FBI&lt;/a&gt; after being asked to provide a backdoor to unlock the San Bernardino mass shooter’s iPhone. This further reinforced WhatsApp Inc’s stand on the ensuing debate between the interplay of privacy and security in the digital age.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Kudos to WhatsApp, for there is &lt;a href="http://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/CallForSubmission.aspx"&gt;growing discussion&lt;/a&gt; around how encryption and anonymity is central to enabling secure online communication which in turn is integral to essential human rights such as those of freedom of opinion and expression.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;WhatsApp may have taken encryption to the masses, but here we outline why WhatsApp’s provisioning of privacy and security measures needs a more granular analysis – is the company doing what it claims to be doing? Security issues with WhatsApp’s messaging protocol certainly are not new.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Man-in-the-middle attacks&lt;/h3&gt;
&lt;p class="p4" style="text-align: justify; "&gt;A &lt;a href="https://eprint.iacr.org/2017/713.pdf"&gt;study&lt;/a&gt; published by a group of German researchers from Ruhr University highlighted issues with WhatsApp’s implementation of its E2EE protocol to group communications. Another &lt;a href="https://courses.csail.mit.edu/6.857/2016/files/36.pdf"&gt;paper&lt;/a&gt; points out how WhatsApp’s session establishment strategy itself could be problematic and potentially be targeted for what are called man-in-the-middle (MITM) attacks.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;An MITM attack takes the form of a malicious actor, as the term suggests, placing itself between the communicating parties to eavesdrop or impersonate. The Electronic Frontier Foundation also &lt;a href="https://www.eff.org/deeplinks/2016/10/where-whatsapp-went-wrong-effs-four-biggest-security-concerns"&gt;highlighted&lt;/a&gt; other security vulnerabilities, or trade-offs, depending upon ideological inclinations, with respect to WhatsApp allowing for storage of unencrypted backups, issues with WhatsApp’s web client and also with its approach to cryptographic key change notifications.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Much has been written questioning WhatsApp’s shifting approach to ensuring privacy too. Quoting straight from &lt;a href="https://www.whatsapp.com/legal/#privacy-policy-affiliated-companies"&gt;WhatsApp’s Privacy Policy:&lt;/a&gt; “We joined the Facebook family of companies in 2014. As part of the Facebook family of companies, WhatsApp receives information from, and shares information with, this family of companies.” Speaking of Facebook …&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Culling out larger issues with WhatsApp’s privacy policies is not the intention here. What we specifically seek to explore is right at the nexus of WhatsApp’s security and privacy provisioning clashing with its marketing strategy: the storage of data on WhatsApp’s servers, or ‘blobs,’ as they are referred to in the technical paper. Facebook’s rather. In WhatsApp’s words: “Once your messages (including your chats, photos, videos, voice messages, files and share location information) are delivered, they are deleted from our servers. Your messages are stored on your own device.”&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;In fact, this non-storage of data on their ‘blobs’ is emphasizes at several other points on the official website. Let us call this the deletion-upon-delivery model.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A simple experiment&lt;/h3&gt;
&lt;p class="p4" style="text-align: justify; "&gt;While drawing up a rigorous proof of concept, made near-impossible thanks to WhatsApp being a closed source messaging protocol, a simple experiment is enough to raise some very pertinent questions about WhatsApp’s outlined deletion-upon-delivery model. It should, however, be mentioned that the Signal Protocol developed by Open Whisper Systems and pivotal in WhatsApp’s rolling out of E2EE is &lt;a href="https://github.com/signalapp"&gt;open source&lt;/a&gt;. Here is how the experiment proceeds:&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Rick sends Morty an attachment.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Morty then switches off the data on her mobile device.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Rick downloads the attachment, an image.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Subsequently, Rick deletes the image from his mobile device’s internal storage.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Rick then logs into a WhatsApp’s web client on his browser. (Prior to this experiment, both Rick and Morty had logged out from all instances of the web client)&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Upon a fresh log-in to the web client and opening the chat with Morty, the option to download the image is available to Rick.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;The experiment concludes with bewilderment at WhatsApp’s claim of deletion-upon-delivery as outlined earlier. The only place from which Morty could have downloaded the image would be from Facebook’s ‘blobs.’ The attachment could not have been retrieved from Morty’s mobile device as it had no way of sending data and neither from Rick’s mobile device as it no longer existed in the device’s storage.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;As per the Privacy Policy, the data is stored on the ‘blobs’ for a period of 30 days after transmission of a message only when it can’t be delivered to the recipient. Upon delivery, the deletion-upon-delivery model is supposed to kick in.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Another straightforward experiment that leads to a similar conclusion is seeing the difference in time taken for a large attachment to be forwarded as opposed to when the same large attachment is uploaded. Forwarding is palpably quicker than uploading afresh: non-storage of attachments on the ‘blob’ would entail that the same amount should be taken for both.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;The plot thickens. WhatsApp’s Privacy Policy goes on to state: “To improve performance and deliver media messages more efficiently, such as when many people are sharing a popular photo or video, we may retain that content on our servers for a longer period of time.”  The technical paper offers no help in understanding how WhatsApp systems assess frequently shared encrypted media messages without decrypting it at its end.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;A possible explanation could be the usage of metadata by WhatsApp, which it discloses in its Privacy Policy while simultaneously being sufficiently vague about the specifics of it. That WhatsApp may be capable of reading encrypted communication through the inclusion of a backdoor bodes well for law enforcement, but not so much for unsuspecting users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The weakest link in the chain&lt;/h3&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Concerns about backdoors in WhatsApp’s product have led the French government to start developing their &lt;a href="https://www.reuters.com/article/us-france-privacy/france-builds-whatsapp-rival-due-to-surveillance-risk-idUSKBN1HN258"&gt;own encrypted messaging service&lt;/a&gt;. This will be built using Matrix – an open protocol designed for real-time communication. Indeed, the Privacy Policy lays out that the company “may collect, use, preserve, and share your information if we have a good-faith belief that it is reasonably necessary to respond pursuant to applicable law or regulations, to legal process, or to government requests.”&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;The Signal Protocol is the undisputed gold standard of E2EE implementations. It is the integration with the surrounding functionality that WhatsApp offers which leads to vulnerabilities. After all, a chain is only as strong as its weakest link. Assuming that the attachments stored on the ‘blobs’ are in encrypted form, indecipherable to all but the intended recipients, this does not pose a privacy risk for the users from a technological point of view.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;However, it is easy lose sight of the fact that the Privacy Policy is a legally binding document and it specifically states that messages are not stored on the ‘blobs’ as a matter of routine. As a side note, WhatsApp’s Privacy Policy and Terms of Service are refreshing in their readability and lack of legalese.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;As we were putting the final touches to this piece, &lt;a href="https://wabetainfo.com/whatsapp-allows-to-redownload-deleted-media/#more-2781"&gt;news from &lt;i&gt;WABetaInfo&lt;/i&gt;&lt;/a&gt;, a well-reputed source of information on WhatsApp features, has broken that newer updates of WhatsApp for Android are permitting users to re-download media deleted up to three months back. WhatsApp cannot possibly achieve this without storing the media in the ‘blobs,’ or in other words, in violation of its Privacy Policy.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;As the aphorism goes: “When the service is free, you are the product.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp'&gt;https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Sunil Abraham</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2018-04-23T16:45:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act">
    <title>Comments on the  Draft Digital Information Security in Healthcare Act </title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society submitted comments to the Ministry of Health &amp; Family Welfare, Government of India on the draft Digital Information Security in Healthcare Act on April 21, 2018.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the Draft Digital Information Security in Healthcare Act, released by Ministry of Health &amp;amp; Family Welfare, Government of India. CIS has conducted research on the issues of privacy, data protection and data security since 2010 and is thankful for the opportunity to put forth its views. This submission was made on April 21, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/comments-on-draft-digital-information-security-in-healthcare-act"&gt;Download the full submission here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha and Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    

   <dc:date>2018-05-01T02:05:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill">
    <title>A look at two problematic provisions of the draft Anti-trafficking bill</title>
    <link>https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill</link>
    <description>
        &lt;b&gt;This post examines two badly drafted provisions of the new Anti-Trafficking bill that have the potential to severely impinge upon the Freedom of Expression, including through a misunderstanding of intermediary liability. &lt;/b&gt;
        
&lt;p style="text-align: justify;" class="normal"&gt;On 28 Feb 2018, the Union Cabinet approved                   ‘The Trafficking of Persons (Prevention, Protection                   and Rehabilitation) Bill, 2018’ (‘the bill’) for                   introduction to the Parliament. This comes after a                   series of consultations on an earlier 2016 draft bill,                   that had faced its fair share of &lt;a href="https://scroll.in/article/813268/six-counts-on-which-the-draft-anti-trafficking-bill-fails-short" target="_blank"&gt;criticism&lt;/a&gt;. As per the Press Information Bureau &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=176878" target="_blank"&gt;announcement&lt;/a&gt;, the Ministry of Women and Child                   Development met with various stakeholders including 60                   NGOs and have incorporated many of the suggestions put                   forth. They’ve also stated that ‘the new law will make                   India a leader among South Asian countries to combat                   trafficking.’&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;However, at first glance, there appear to be                   several issues with overbroad or vague language used                   in the drafting of the bill, that stretch it into                   potentially problematic areas. This current post will                   focus on two such provisions that could lead to a                   deleterious effect on the Freedom of Expression. As                   the bill is currently not publicly available, a                   stakeholder’s copy of the draft is being used to                   source these provisions. The relevant sections have                   been reproduced below for convenience. (Emphasis in                   bold is as provided by the author).&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;Section                     39: Buying or Selling of any person&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;39. (l) Whoever buys or sells any person                     for a consideration, shall be punished with rigorous                     imprisonment for a term which shall not be less than                     seven years but may extend to ten years, and shall                     also be liable to fine which shall not be less than                     one lakh rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;(2) Whoever solicits or publicises                     electronically, taking or distributing obscene                     photographs or videos or providing materials or                     soliciting or guiding tourists or using agents or                     any other form &lt;strong&gt;which may lead                       to the trafficking of a person shall be punished&lt;/strong&gt; with rigorous imprisonment for a term which shall                     not be less than five years but may extend to ten                     years, and shall also be liable to fine which shall                     not be less than fifty thousand rupees but which may                     extend to one lakh rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The grammatical acrobatics of section 39(2)                   aside, this anti-solicitation provision is severely                   problematic in that it mandates punishment even for a                   vaguely defined action or actions that may not                   actually be connected to the trafficking of a person.                   In other words, the provision doesn’t require any of                   the actions to be connected to trafficking in their                   intent or even outcome, but only in &lt;em&gt;potential&lt;/em&gt; &lt;em&gt;connection&lt;/em&gt; to the outcome. At the same time, it says these                   ‘shall’ be punished!&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;This vagary that ignores actual or even                   probabilistic causation flies in the face of standard                   criminal law which requires &lt;em&gt;mens rea&lt;/em&gt; along with &lt;em&gt;actus                     rea&lt;/em&gt;. The excessively wide scope of this badly                   drafted provision leaves it prone to abuse. For                   example, currently the provision allows the following                   interpretation to be included: ‘Whoever publicizes                   electronically, by providing materials in any form,                   which may lead to trafficking of a person shall be                   punished…’. Even the electronic publicizing of an                   academic study on trafficking could fall under the                   provision as it currently reads, if it is argued that                   publishing studies that show the prevalence of                   trafficking ‘may lead to the trafficking of a person’!                   It is not hard to imagine that an academic study that                   shows trafficking numbers at embarrassingly high rates                   could be threatened with this provision. Similarly,                   any of our vast number of self-appointed moral                   guardians could also pull within this provision any                   artistic work that they may personally find offensive                   or ‘obscene’. Simply put, without any burden of                   showing a causal connect, it could be argued that &lt;em&gt;anything&lt;/em&gt; ‘may                   lead’ to the trafficking of a person. Needless to say,                   this paves the way for a severe chilling effect on                   free speech, especially on critical speech around                   trafficking issues.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;Section 41: Offences related to media&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;41. (l) Whoever commits trafficking of a                     person with the aid of media, including, but not                     limited to print, internet, digital or electronic                     media, shall be punished with rigorous imprisonment                     for a term which shall not be less than seven years                     but may extend to ten years and shall also be liable                     to fine which shall not be less than one lakh                     rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;(2) Whoever &lt;strong&gt;distributes,                       or sells or stores&lt;/strong&gt;, in any form in any                     electronic or printed form showing incidence of                     sexual exploitation, sexual assault, or rape for the                     purpose of exploitation or for coercion of the                     victim or his family members, or for unlawful gain &lt;strong&gt;shall be                       punished&lt;/strong&gt; with rigorous imprisonment for a term                     which shall not be less than three years but may                     extend to seven years and shall also be liable to                     fine which shall not be less than one lakh rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The drafters of this bill have perhaps                   overlooked the fact that unlike the physical world,                   the infrastructure of the electronic / digital world                   requires 3rd party intermediaries to handle                   information during most forms of electronic                   activities, whether it is transmission, storage or                   display. As it is not feasible, desirable or even                   practically possible for intermediaries to verify the                   legality of every bit of data that gets transferred or                   stored by the intermediary, ‘safe harbours’ are                   provided in law for intermediaries, protecting them                   from liability of the information being transmitted                   through them. These ensure that entities that act as                   architectural requirements and intermediary platforms                   are able to operate smoothly and without fear. If                   intermediaries are not granted this protection, it                   puts them in the unenviable position of having to                   monitor un-monitorable amounts of data, and face legal                   action for the slip-ups that are bound to happen                   regularly. Furthermore, there are several levels of                   free speech and privacy issues associated with having                   multiple gatekeepers on the expression of speech                   online. A charitable reading of the intent of a                   provision which does not recognise safe harbours for                   3rd party intermediaries, would be that the drafters                   of the bill have simply not realised that users who                   upload and initiate transfer of information online,                   are not the same parties who do the actual                   transmission of the information.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Distribution, selling or storing of                   information online would require the transmission of                   information over intermediaries, as well as the                   temporary storage of such information on intermediary                   platforms. In India, intermediaries engaging with                   transmission or temporary storage of information are                   provided safe harbour&lt;a href="imap://prasad@mail.cis-india.org:143/fetch%3EUID%3E/INBOX%3E176833#_ftn1"&gt;[1]&lt;/a&gt; by Section 79 of the Information Technology Act, 2000                   (‘IT Act’), so long as they:&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;(i) act as a mere ‘conduit’ and do not                   initiate the transmission, select the receiver of the                   transmission, or select or modify the information                   contained in the transmission.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;(ii) exercise due diligence while                   discharging duties under this Act, and observes other                   guidelines that the Central Government may prescribe.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The Information Technology (Intermediary                   Guidelines) Rules, 2011, list out the nature of the                   due diligence to be followed by intermediaries to                   claim exemption under Section 79 of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Intermediaries will not be granted safe                   harbour if they have conspired, abetted, aided or                   induced commission of the unlawful act, or if they do                   not remove or disable access to information upon                   receiving actual knowledge, or notice from the                   Government, of the information that is transmitted or                   stored by the intermediary being used for unlawful                   purposes.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Thus it can be seen that the IT Act already                   provides an in-depth regime for intermediary                   liability, and given its &lt;em&gt;non-obstante &lt;/em&gt;clause                   which states that Section 79 of the IT Act would apply                   “Notwithstanding anything contained in any law for the                   time being in force” ,&amp;nbsp;                   as well as the reiteration of the IT Act’s                   overriding effect via Section 81, which states that                   the provisions of the Act ‘shall have effect                   notwithstanding anything inconsistent therewith                   contained in any other law for the time being in                   force’ (barring the exercise of copyright or patent                   rights), it is generally considered the appropriate                   legal framework for this issue. However, it appears                   that the drafters of the 2018 Anti-trafficking bill                   have not considered this aspect at all, since they                   have not referenced the IT Act in this context in the                   bill, and have additionally added their own &lt;em&gt;non-obstante &lt;/em&gt;clause                   in Section 59 of the bill:&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;59.&lt;em&gt; The provisions                     of this Act, shall be in addition to and not in                     derogation of the provisions of any other law for                     the time being in force and, in case of any                     inconsistency, the provisions of this Act shall have                     overriding effect on the provisions of any such law                     to the extent of the inconsistency.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;So the regime as prescribed by the IT Act                   allows for safe harbours, whereas the regime as                   prescribed by the Anti-Trafficking bill does not allow                   for safe harbours, and both say that they would an                   overriding effect for any conflicting law. This                   legislative bumble could potentially be solved by                   using the settled principle that a special Act                   prevails over a general legislation. This is still a                   little tricky as they are technically both special                   Acts. It could be argued that given the context of the                   Anti-trafficking bill as focusing on trafficking, and                   the context of the IT Act focusing on the interface of                   law and technology, that for the purposes of Section                   41(2) of the Anti-trafficking bill, the IT Act is the                   special legislation. And thus Section 79 of the IT Act                   should make redundant the relevant portion of Section                   41(2) of the Anti-trafficking bill. This reading would                   require the bill to be modified so as to remove the                   redundancy and the conflicting portion of Section                   41(2).&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;[1] In 2016, a division bench of the Delhi High Court held in the case of Myspace Inc vs Super Cassettes Industries Ltd that a safe harbour immunity for intermediaries was necessary as it was not technically feasible to pre-screen content from third parties, and that tasking intermediaries with this responsibility could have a chilling effect on free speech, It held that their responsibility was limited to the extent of acting upon receiving ‘actual knowledge’. Earlier, in determining what ‘actual knowledge’ refers to, in 2015 the Supreme Court of India in the landmark case of Shreya Singhal vs Union of India, required this to be in the form of a notice via a court or government order. Thus under our current law, intermediaries are granted a safe harbour from liability so long as they act upon court or government orders which notify them of content that is required to be taken down.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Clarification (18th August, 2018): A letter sent to the Ministry of Women and Child Development mentioned the Centre for Internet &amp;amp; Society as instituionally endorsing a critique of the The Trafficking of Persons (Prevention, Protection and Rehabilitation) Bill, 2018. We seek to clarify that the Centre for Internet &amp;amp; Society did not endorse the letter to the Ministry.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill'&gt;https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>swaraj</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2018-08-18T09:21:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/jobs/vacancy-for-short-term-consultant-ietf">
    <title>Short-term Consultant (IETF)</title>
    <link>https://cis-india.org/jobs/vacancy-for-short-term-consultant-ietf</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society is seeking an individual with a strong understanding of IETF standards to work with us on writing 7 Human Rights Considerations for Internet standards and active drafts that are relevant to public interest. Additionally, the individual will help develop a longer term work-plan, expertise and approach for engagement in the IETF.&lt;/b&gt;
        &lt;p dir="ltr"&gt;Note: This position is consultancy based on output.&lt;/p&gt;
&lt;p dir="ltr"&gt;Compensation: Based on experience and output.&lt;/p&gt;
&lt;p dir="ltr"&gt;Application requirements: two writing samples or other examples of technical work and CV&lt;/p&gt;
&lt;p dir="ltr"&gt;Contact: sunil@cis-india.org&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/jobs/vacancy-for-short-term-consultant-ietf'&gt;https://cis-india.org/jobs/vacancy-for-short-term-consultant-ietf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Jobs</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-21T15:44:49Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/jobs/vacancy-for-short-term-consultant-cyber-security">
    <title>Short-term Consultant (Cyber Security)</title>
    <link>https://cis-india.org/jobs/vacancy-for-short-term-consultant-cyber-security</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society is seeking an individual with strong understanding of cyber security to contribute research to its cyber security research under its Internet Governance programme.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Research topics include economic incentives for cyber security, cross border sharing of data, India’s cyber security framework, and cybersecurity dimensions of e-governance .&lt;/p&gt;
&lt;p dir="ltr"&gt;Note: This position is consultancy based on output.&lt;/p&gt;
&lt;p dir="ltr"&gt;Compensation: Based on experience and output.&lt;/p&gt;
&lt;p dir="ltr"&gt;Application requirements: two writing samples and CV&lt;/p&gt;
&lt;p dir="ltr"&gt;Contact: &lt;a href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/jobs/vacancy-for-short-term-consultant-cyber-security'&gt;https://cis-india.org/jobs/vacancy-for-short-term-consultant-cyber-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-20T01:27:36Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/artificial-intelligence-in-governance-a-report-of-the-roundtable-held-in-new-delhi">
    <title>Artificial Intelligence in Governance: A Report of the Roundtable held in New Delhi</title>
    <link>https://cis-india.org/internet-governance/blog/artificial-intelligence-in-governance-a-report-of-the-roundtable-held-in-new-delhi</link>
    <description>
        &lt;b&gt;This Report provides an overview of the proceedings of the Roundtable on Artificial Intelligence (AI) in Governance, conducted at the Indian Islamic Cultural Centre, in New Delhi on March 16, 2018. The main purpose of the Roundtable was to discuss the deployment and implementation of AI in various aspects of governance within the Indian context. This report summarises the discussions on the development and implementation of AI in various aspects of governance in India. The event was attended by participants from academia, civil society, the legal sector, the finance sector, and the government.&lt;/b&gt;
        &lt;p&gt;&lt;span&gt;Event Report: &lt;/span&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/files/ai-in-governance"&gt;Download&lt;/a&gt;&lt;span&gt; (PDF)&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This report provides a summary of the proceedings of the Roundtable on Artificial Intelligence (AI) in Governance (hereinafter referred to as ‘the Roundtable’). The Roundtable took place at the India Islamic Cultural Centre in New Delhi on March 16, 2018 and included participation  from academia, civil society, law, finance, and government. The main purpose of the Roundtable was to discuss the deployment and implementation of AI in various aspects of governance within the Indian context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Roundtable began with a presentation by Amber Sinha (Centre for Internet and Society - CIS) providing an overview of the CIS’s research objectives and findings thus far. During this presentation, he defined both AI and the scope of CIS’s research, outlining the areas of law enforcement, defense, education, judicial decision making, and the discharging of administrative functions as the main areas of concerns for the study. The presentation then outlined the key AI deployments and implementations that have been identified by the research in each of these areas. Lastly, the presentation raised some of the ethical and legal concerns related to this phenomenon.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The presentation was followed by the Roundtable discussion that saw various topics in regards to the usages, challenges, ethical considerations and implications of AI in the sector being discussed. This report has identified a number of key themes of importance evident throughout these discussions.These themes include: (1) the meaning and scope of AI, (2) AI’s sectoral applications, (3) human involvement with automated decision making, (4) social and power relations surrounding AI, (5) regulatory approaches to AI and, (6) challenges to adopting AI. These themes in relation to the Roundtable are explored further below.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Meaning and Scope of AI&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-7edcf822-2698-f1fd-35d3-0bcc913c986a"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;One of the first tasks recommended by the group of participants was to define the meaning and scope of AI and the way those terms are used and adopted today. These concerns included the need to establish a distinction between the use of algorithms, machine learning, automation and artificial intelligence. Several participants believed that establishing consensus around these terms was essential before proceeding towards a stage of developing regulatory frameworks around them.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The general fact agreed to was that AI as we understand it does not necessarily extend to complete independence in terms of automated decision making but it refers instead to the varying levels of machine learning (ML), and the automation of certain processes that has already been achieved. Several concerns that emerged during the course of the discussion centred around the question of autonomy and transparency in the process of ML and algorithmic processing. Stakeholders recommended that over and above the debates of humans in the loop [1] on the loop [2] and out of the loop, [3] there were several other gaps with respect to AI and its usage in the industry today which also need to be considered before building a roadmap for future usage. Key issues like information asymmetries, communication lags, a lack of transparency, the increased mystification of the coding process and the centralization of power all needed to be examined and analysed under the rubric of developing regulatory frameworks.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Takeaway Point: The group brought out the need for standardization of terminology as well as the establishment of globally replicable standards surrounding the usage, control and proliferation of AI. The discussion also brought up the problems with universal applicability of norms. One of the participants brought up an issue regarding the lack of normative frameworks around the usage and proliferation of AI. Another participant responded to the concern by alluding to the Asilomar AI principles.[4] The Asilomar AI principles are a set of 23 principles aimed at directing and shaping AI research in the future. The discussion brought out further issues regarding the enforceability as well universal applicability of the principles and their global relevance as well. Participants recommended the development of a shorter, more universally applicable regulatory framework that could address various contextual limitations as well.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;AI Sectoral Applications&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;Participants mentioned a number of both current and potential applications of AI technologies, referencing the defence sector, the financial sector, and the agriculture sector. There are several developments taking place on the Indian military front with the Committee on AI and National Security being established by the Ministry of Defence. Through the course of the discussion it was also stated that the Indian Armed Forces were very interested in the possibilities of using AI for their own strategic and tactical purposes. From a technological standpoint, however, there has been limited progress in India in researching and developing AI. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;While India does deploy some Unmanned Aerial Vehicles (UAVs), they are mostly bought from Israel, and often are not autonomous. It was also pointed out that contrary to reportage in the media, the defence establishment in India is extremely cautious about the adoption of autonomous weapons systems, and that the autonomous technology being rolled out by the CAIR is not yet considered trustworthy enough for deployment.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Discussions further revealed that the few technologies that have a relative degree of autonomy are primarily loitering ammunitions and are used to target radar insulations for reconnaissance purposes. One participant mentioned that while most militaries are interested in deploying AI, it is primarily from an Intelligence, Surveillance and Reconnaissance (ISR) perspective. The only exception to this generalization is China where the military ethos and command structure would work better with increased reliance on independent AI systems. One major AI system rolled out by the US is Project Maven which is primarily an ISR system. The aim of using these systems is to improve decision making and enhance data analysis particularly since battlefields generate a lot of data that isn’t used anywhere.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Another sector discussed was the securities market where algorithms were used from an analytical and data collection perspective. A participant referred to the fact that machine learning was being used for processes like credit and trade scoring -- all with humans on the loop. The participant further suggested that while trade scoring was increasingly automated, the overall predictive nature of such technologies remained within a self limiting capacity wherein statistical models, collected data and pattern analysis were used to predict future trends. The participant questioned whether these algorithms could be considered as AI in the truest sense of the term since they primarily performed statistical functions and data analysis.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;One participant also recommended the application of AI to sectors like agriculture with the intention of gradually acclimatizing users to the technology itself. Respondents also stated that while AI technologies were being used in the agricultural space it was primarily from the standpoint of data collection and analysis as opposed to predictive methods. It was mentioned that a challenge to the broad adoption of AI in this sector is the core problem of adopting AI as a methodology – namely information asymmetries, excessive data collection, limited control/centralization and the obfuscatory nature of code – would not be addressed/modified. Lastly, participants also suggested that within the Indian framework not much was being done aside from addressing farmers’ queries and analysing the data from those concerns.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Takeaway Point: The discussion drew attention to the various sectors where AI was currently being used -- such as the military space, agricultural development and the securities market -- as well as potential spaces of application -- such as healthcare and manual scavenging. The key challenges that emerged were information asymmetries with respect to the usage of these technologies as well as limited capacity in terms of technological advancement.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Human Involvement with Automated Decision Making&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Large parts of discussions throughout the Roundtable event were preoccupied with automated decision making and specifically, the involvement of humans (human on and in the loop) or lack thereof (human out of the loop) in this process. These discussions often took place with considerations of AI for prescriptive and descriptive uses.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Participants expressed that human involvement was not needed when AI was being used for descriptive uses, such as determining relationships between various variables in large data sets. Many agreed to the superior ability of ML and similar AI technologies in describing large and unorganized datasets. It was the prescriptive uses of AI where participants saw the need for human involvement, with many questioning the technology making more important decisions by itself.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The need for human involvement in automated decision making was further justified by references to various instances of algorithmic bias in the American context. One participant, for example, brought up the use of algorithmic decision making by a school board in the United States for human resource practices (hirings, firing, etc.) based on the standardized test scores of students. In this instance, such practices resulted in the termination of teachers primarily from low income neighbourhoods.[5] The main challenge participants identified in regards to human on the loop automated decision making is the issue of capacity, as significant training would have to be achieved for sectors to have employees actively involved in the automated decision making workflow.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;An example in the context of the healthcare field was brought up by one participant arguing for human in the loop in regards to prescriptive scenarios. The participant suggested that AI technology, when given x-ray or MRI data for example, should only be limited to pointing out the correlations of diseases with patients’ scans/x-rays. Analysis of such correlations should be reserved for the medical expertise of doctors who would then determine if any instances of causality can be identified from this data and if it’s appropriate for diagnosing patients.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;It was emphasized that, despite a preference for human on/in the loop in regards to automated decision making, there is a need to be cognisant of techno-solutionism due to the human tendency of over reliance on technology when making decisions. A need for command and control structures and protocols was emphasized for various governance sectors in order to avoid potentially disastrous results through a checks and balances system. It was noted that the defense sector has already developed such protocols, having established a chain of command due to its long history of algorithmic decision making (e.g. the Aegis Combat System being used by the US Navy in the 1980s).&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;One key reason why militaries prefer human in and on the loop systems as opposed to out of the loop systems is because of the protocol associated with human action on the battlefield. International Humanitarian Law has clear indicators of what constitutes a war crime and who is to be held responsible in the scenario but developing such a framework with AI systems would be challenging as it would be difficult to determine which party ought to be held accountable in the case of a transgression or a mistake.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Takeaway Point: It was reiterated by many participants that neither AI technology or India’s regulatory framework is at a point where AI can be trusted to make significant decisions alone -- especially when such decisions are evaluating humans directly. It was recommended that human out of the loop decision making should be reserved for descriptive practices whereas human on and in the loop decision making should be used for prescriptive practices. Lastly, it was also suggested that appropriate protocols be put in place to direct those involved in the automated decision making workflow. Particularly when the process involves judgements and complex decision making in sectors such as jurisprudence and the military.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;The Social and Power Relations Surrounding AI&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some participants emphasized the need to contextualize discussions of AI and governance within larger themes of poverty, global capital and power/social relations. Their concerns were that the use of AI technologies would only create and reinforce existing power structures and should instead be utilized towards ameliorating such issues. Manual scavenging, for example, was identified as an area where AI could be used to good effect if coupled with larger socio-political policy changes. There are several hierarchies that could potentially be reinforced through this process and all these failings needed to be examined thoroughly before such a system was adopted and incorporated within the real world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore the discussion also revealed that the objectivity attributed to AI and ML tends to gloss over the fact that there are nonetheless implicit biases that exist in the minds of the creators that might work themselves into the code. Fears regarding technology recreating a more exclusionary system were not entirely unfounded as participants pointed out the fact that the knowledge base of the user would determine whether technology was used as a tool of centralization or democratization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One participant also questioned the concept of governance itself, contrasting the Indian government’s usage of the term in the 1950s (as it appears in the Directive Principle) with that of the World Bank in the 1990s.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some participants emphasized the need to contextualize discussions of AI and governance within larger themes of poverty, global capital and power/social relations. Their concerns were that the use of AI technologies would only create and reinforce existing power structures and should instead be utilized towards ameliorating such issues. Manual scavenging, for example, was identified as an area where AI could be used to good effect if coupled with larger socio-political policy changes. There are several hierarchies that could potentially be reinforced through this process and all these failings needed to be examined thoroughly before such a system was adopted and incorporated within the real world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Furthermore the discussion also revealed that the objectivity attributed to AI and ML tends to gloss over the fact that there are nonetheless implicit biases that exist in the minds of the creators that might work themselves into the code. Fears regarding technology recreating a more exclusionary system were not entirely unfounded as participants pointed out the fact that the knowledge base of the user would determine whether technology was used as a tool of centralization or democratization. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;One participant also questioned the concept of governance itself, contrasting the Indian government’s usage of the term in the 1950s (as it appears in the Directive Principle) with that of the World Bank in the 1990s. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Takeaway Point: Discussions of the implementation and deployment of AI within the governance landscape should attempt to take into consideration larger power relations and concepts of equity.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Regulatory Approaches to AI&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Many recognized the need for AI-specific regulations across Indian sectors, including governance. These regulations, participants stated, should draw from notions of accountability, algorithmic transparency and efficiency. Furthermore, it was also stated that such regulations should consider the variations across the different legs of the governance sector, especially in regards to defence. One participant, pointing to the larger trends towards automation, recommended the establishment of certain fundamental guidelines aimed at directing the applicability of AI in general. The participant drew attention to the need for a robust evaluation system for various sectors (the criminal justice system, the securities market, etc.) as a way of providing checks on algorithmic biases. Another emphasized for the need of regulations for better quality data as to ensure machine readability and processiblity for various AI systems.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Another key point that emerged was the importance of examining how specific algorithms performed processes like identification or detection. A participant recommended the need to examine the ways in which machines identify humans and what categories/biases could infiltrate machine-judgement. They reiterated that if a new element was introduced in the system, the pre-existing variables would be impacted as well. The participant further recommended that it would be useful to look at these systems in terms of the couplings that get created in order to determine what kinds of relations are fostered within that system.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The roundtable saw some debate regarding the most appropriate approach to developing such regulations. Some participants argued for a harms-based approach, particularly in regards to determining if regulations are needed all together for specific sectors (as opposed to guidelines, best practices, etc.). The need to be cognisant of both individual and structural harms was emphasized, mindful of the possibility of algorithmic biases affecting traditionally marginalized groups.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Others only saw value in a harms based approach insomuch that it could help outline the appropriate penalties in an event of regulations being violated, arguing instead for a rights-based approach as it enabled greater room for technological changes. An approach that kept in mind emerging AI technologies was reiterated by a number of participants as being crucial to any regulatory framework. The need for a regulatory space that allowed for technological experimentation without the fear of constitutional violation was also communicated.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Takeaway Point: The need for a AI-specific regulatory framework cognisant of differentiations across sectors in India was emphasized. There is some debate about the most appropriate approach for such a framework, a harms-based approach being identified by many as providing the best perspective on regulatory need and penalties. Some identified the rights-based approach as providing the most flexibility for an rapidly evolving technological landscape.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Challenges to Adopting AI&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Out of all the concerns regarding the adoption of algorithms, ML and AI, the two key points of resistance that emerged, centred around issues of accountability and transparency. Participants suggested that within an AI system, predictability would be a key concern, and in the absence of predictable outcomes, establishing redressal mechanisms would pose key challenges as well.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p id="_mcePaste"&gt;A discussion was also initiated regarding the problems involved in attributing responsibility within the AI chain as well as the need to demystify the process of using AI in daily life. While reiterating the current landscape, participants spoke about how the usage of AI is currently limited to the automation of certain tasks and processes in certain sectors where algorithmic processing is primarily used as a tool of data collection and analysis as opposed to an independent decision making tool.&lt;/p&gt;
&lt;div id="_mcePaste"&gt;&lt;/div&gt;
&lt;p id="_mcePaste"&gt;One of the suggestions and thought points that emerged during the discussion was whether a gradual adoption of AI on a sectoral basis might be more beneficial as it would provide breathing room in the middle to test the system and establish trust between the developers, providers, and consumers. This prompted a debate about the controllers and the consumers of AI and how the gap between the two would need to be negotiated. The debate also brought up larger concerns regarding the mystification of AI as a process itself and the complications of translating the code into communicable points of intervention.&lt;/p&gt;
&lt;div id="_mcePaste"&gt;&lt;/div&gt;
&lt;p id="_mcePaste"&gt;Another major issue that emerged was the question of attribution of responsibility in the case of mistakes. In the legal process as it currently exists, human imperfections notwithstanding, it would be possible to attribute the blame for decisions taken to certain actants undertaking the action. Similarly in the defence sector, it would be possible to trace the chain of command and identify key points of failure, but in the case of AI based judgements, it would be difficult to place responsibility or blame. This observation led to a debate regarding accountability in the AI chain. It was inconclusive whether the error should be attributed to the developer, the distributor or the consumer.&lt;/p&gt;
&lt;div id="_mcePaste"&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;A suggestion that was offered in order to counter the information asymmetry as well as reduce the mystification of computational method was to make the algorithm and its processes transparent. This sparked a debate, however, as participants stated that while such a state of transparency ought to be sought after and aspired towards, it would be accompanied by certain threats to the system. A key challenge that was pointed out was the fact that if the algorithm was made transparent, and its details were shared, there would be several ways to manipulate it, translate it and misuse it.&lt;/p&gt;
&lt;div id="_mcePaste"&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Another question that emerged was the distribution of AI technologies and the centralization of the proliferation process particularly in terms of service provision. One participant suggested that given the limited nature of research being undertaken and the paucity of resources, a limited number of companies would end up holding the best tech, the best resources and the best people. They further suggested that these technologies might end up being rolled out as a service on a contractual basis. In which case it would be important to track how the service was being controlled and delivered. Models of transference would become central points of negotiation with alternations between procurement based, lease based, and ownership based models of service delivery. Participants suggested that this was going to be a key factor in determining how to approach these issues from a legal and policy standpoint.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;A discussion was also initiated regarding the problems involved in attributing responsibility within the AI chain as well as the need to demystify the process of using AI in daily life. While reiterating the current landscape, participants spoke about how the usage of AI is currently limited to the automation of certain tasks and processes in certain sectors where algorithmic processing is primarily used as a tool of data collection and analysis as opposed to an independent decision making tool.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the suggestions and thought points that emerged during the discussion was whether a gradual adoption of AI on a sectoral basis might be more beneficial as it would provide breathing room in the middle to test the system and establish trust between the developers, providers, and consumers. This prompted a debate about the controllers and the consumers of AI and how the gap between the two would need to be negotiated. The debate also brought up larger concerns regarding the mystification of AI as a process itself and the complications of translating the code into communicable points of intervention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another major issue that emerged was the question of attribution of responsibility in the case of mistakes. In the legal process as it currently exists, human imperfections notwithstanding, it would be possible to attribute the blame for decisions taken to certain actants undertaking the action. Similarly in the defence sector, it would be possible to trace the chain of command and identify key points of failure, but in the case of AI based judgements, it would be difficult to place responsibility or blame. This observation led to a debate regarding accountability in the AI chain. It was inconclusive whether the error should be attributed to the developer, the distributor or the consumer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A suggestion that was offered in order to counter the information asymmetry as well as reduce the mystification of computational method was to make the algorithm and its processes transparent. This sparked a debate, however, as participants stated that while such a state of transparency ought to be sought after and aspired towards, it would be accompanied by certain threats to the system. A key challenge that was pointed out was the fact that if the algorithm was made transparent, and its details were shared, there would be several ways to manipulate it, translate it and misuse it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another question that emerged was the distribution of AI technologies and the centralization of the proliferation process particularly in terms of service provision. One participant suggested that given the limited nature of research being undertaken and the paucity of resources, a limited number of companies would end up holding the best tech, the best resources and the best people. They further suggested that these technologies might end up being rolled out as a service on a contractual basis. In which case it would be important to track how the service was being controlled and delivered. Models of transference would become central points of negotiation with alternations between procurement based, lease based, and ownership based models of service delivery. Participants suggested that this was going to be a key factor in determining how to approach these issues from a legal and policy standpoint.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Takeaway Point: The two key points of resistance that emerged during the course of discussion were accountability and transparency. Participants pointed out the various challenges involved in attributing blame within the AI chain and they also spoke about the complexities of opening up AI code, thereby leaving it vulnerable to manipulation. Certain other challenges that were briefly touched upon were the information asymmetry, excessive data collection, centralization of power in the hands of the controllers and complicated service distribution models.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Roundtable provided some insight into larger debates regarding the deployment and applications of AI in the governance sector of India. The need for a regulatory framework as well as globally replicable standards surrounding AI was emphasized, particularly one mindful of the particular needs of differing fields of the governance sector (especially defence). Furthermore, a need for human on/in the loop practices with regards to automated decision making was highlighted for prescriptive instances, particularly when such decisions are responsible for directly evaluating humans. Contextualising AI within its sociopolitical parameters was another key recommendation as it would help filter out the biases that might work themselves into the code and affect the performance of the algorithm. Further, it is necessary to see the involvement and influence of the private sector in the deployment of AI for governance, it often translating into the delivery of technological services from private actors to public bodies towards discharge of public functions. This has clear implications for requirements of transparency  and procedural fairness even in private sector delivery of these services. Defining the meaning and scope of AI while working to demystify algorithms themselves would serve to strengthen regulatory frameworks as well as make AI more accessible for the user / consumer.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[1]. Automated decision making model where final decisions are made by a human operator&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[2]. Automated decision making model where decisions can be made without human involvement but a human can override the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[3]. A completely autonomous decision making model requiring no human involvement&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[4]. https://futureoflife.org/ai-principles/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[5]. The participant was drawing this example from Cathy O’Neil’s Weapons of Math Destruction, (Penguin,2016), at 4-13.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/artificial-intelligence-in-governance-a-report-of-the-roundtable-held-in-new-delhi'&gt;https://cis-india.org/internet-governance/blog/artificial-intelligence-in-governance-a-report-of-the-roundtable-held-in-new-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Saman Goudarzi and Natallia Khaniejo</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-05-03T15:49:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-april-17-2018-sad-truth-brutality-porn-has-many-takers-in-india">
    <title>Metrolife: Brutality porn has sadly many takers in India</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-april-17-2018-sad-truth-brutality-porn-has-many-takers-in-india</link>
    <description>
        &lt;b&gt;The name of the eight-year old Kathua rape victim is trending not just on social media but also on a porn site.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;On Monday it had topped the list of the most-searched names on a porn site, triggering surprise and outrage. An official at the Centre for Internet &amp;amp; Society, Bengaluru attributes the curiosity to a "depraved, messed-up" mind.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Swaraj Barooah, senior programme manager at the centre, says, "It takes numbers to make something trend online." He attributes the unhealthy curiosity in rape footage to a lack of proper sex education in schools.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Violent acts are ingrained in the power politics and hierarchy of our society, he observes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There are two categories that are searched online...revenge and brutality porn. While revenge porn is usually uploaded by couples who break up, brutality porn is done without recognising the humanity of the person involved," Barooah says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Psychiatrists think people who search for rape videos have a "sick and deviant mind".&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Nina C. George was published in &lt;a class="external-link" href="https://www.deccanherald.com/features/metrolife/sad-truth-brutality-porn-has-many-takers-india-665093.html"&gt;Deccan Herald&lt;/a&gt; on April 18, 2018.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-april-17-2018-sad-truth-brutality-porn-has-many-takers-in-india'&gt;https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-april-17-2018-sad-truth-brutality-porn-has-many-takers-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-19T13:15:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/icann-61-readout">
    <title>ICANN 61 Readout</title>
    <link>https://cis-india.org/internet-governance/news/icann-61-readout</link>
    <description>
        &lt;b&gt;Akriti Bopanna attended an ICANN61 Readout session on the 19th of April at the International Institute of Information Technology at Electronic City in Bengaluru. &lt;/b&gt;
        &lt;p&gt;Click to read the agenda &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/icann-61-agenda"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/icann-61-readout'&gt;https://cis-india.org/internet-governance/news/icann-61-readout&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-05-05T09:18:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-april-13-2018-facebooks-fake-news-clean-up-hits-language-barrier">
    <title>Facebook’s fake news clean-up hits language barrier  </title>
    <link>https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-april-13-2018-facebooks-fake-news-clean-up-hits-language-barrier</link>
    <description>
        &lt;b&gt;The sheer diversity of India’s ethnic languages could defeat Facebook’s move to get content moderators and use artificial intelligence (AI) to counter the spread of misinformation on its platform ahead of the general elections next year, experts said. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nilesh Christopher was published in the &lt;a class="external-link" href="https://economictimes.indiatimes.com/tech/internet/facebooks-fake-news-clean-up-hits-language-barrier/articleshow/63741507.cms"&gt;Economic Times&lt;/a&gt; on April 13, 2018. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;More than a third of Indian users engage on the social media platform in local languages. Experts are sceptical about the extent to which AI tools could be effective in curbing fake news, given that Facebook’s AI engine is primarily trained to recognise English.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If the whole country speaks the same language, it is not a problem. But India is a country with multiple languages and their dialects and the 20,000 global numbers at the face of it doesn’t sound enough,” says Sunil Abraham, executive director for the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In July 2017, India became the largest user base for Facebook with over 241million users, with a majority of them accessing the social network on their smartphones. Facebook has not shared updated user numbers since then.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the use of AI in weeding out fake news, Abraham says that such tools usually work only in languages where there is a history of natural language processing. “Languages like English have a huge corpora (large databases of digitised content from the language). In such cases, the AI analyses the language and will be more accurate,” said Abraham. “Whereas in Indic languages, there is no training data. How they would use AI is not clear. For many Indian languages, the basic infrastructure doesn’t  exist."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I don’t know exactly what FB claimed. But understanding local languages, Indian languages, is still an unsolved problem — either in non-free software or free software,” says Anivar Aravind, executive director of Indic Project, a nonprofit initiative working on language engineering and digital rights of native-language users. Interestingly, the two Facebook-owned platforms: WhatsApp and FB have become the preferred social medium to spread false information and largely through regional languages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook declined to comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Tuesday, Facebook founder Mark Zuckerberg in his testimony to the US congress promised measures such as building and deploying AI tools that take down fake news and increasing the content moderation team to around 20,000. He cited the forthcoming elections in India to point out that Facebook would verify every political advertiser and said, “to make sure that that kind of interference that the Russians were able to do in 2016 is going to be much harder for anyone to pull off in the future.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, Facebook has around 15,000 moderators who review content to identify fake news on the platform, Zuckerberg said last week. The social media giant has been accused of not protecting user privacy and allowing voter-profiling firm Cambridge Analytica to harvest personal information of 87 million Facebook users without explicit permissions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cambridge Analytica has been accused of voter manipulation in several countries, including India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Content moderators in India are seeing business grow driven by internet platforms scrambling to curb fake news across the globe. “Zuckerberg’s mention to prevent misinformation by increasing scrutiny before elections is positive. They are the market leaders. This is likely to create more awareness and it is encouraging to hear Facebook take a proactive role,” said Suman Howladar, Founder of Foiwe Info Global Solutions, a content moderation company.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-april-13-2018-facebooks-fake-news-clean-up-hits-language-barrier'&gt;https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-april-13-2018-facebooks-fake-news-clean-up-hits-language-barrier&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-17T16:15:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
