<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 596 to 610.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/jobs/vacancy-for-short-term-consultant-ietf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/jobs/vacancy-for-short-term-consultant-cyber-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/artificial-intelligence-in-governance-a-report-of-the-roundtable-held-in-new-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-april-17-2018-sad-truth-brutality-porn-has-many-takers-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/icann-61-readout"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-april-13-2018-facebooks-fake-news-clean-up-hits-language-barrier"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-aayush-ailawadi-april-15-2018-is-this-the-beginning-of-the-end-for-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-prashant-k-nanda-and-komal-gupta-pension-wont-be-denied-for-want-of-aadhaar-epfo"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-week-anita-babu-april-8-2018-it-feeds-on-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/workshop-on-python"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/government-giving-free-publicity-worth-40-k-to-twitter-and-facebook"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world">
    <title>Revenge Porn Laws across the World</title>
    <link>https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world</link>
    <description>
        &lt;b&gt;The following is a compilation of laws dealing with revenge porn if and how they exist across multiple countries and jurisdictions.&lt;/b&gt;
        &lt;p&gt;Country-wise legislation on “revenge porn” laws, &lt;a class="external-link" href="https://cis-india.org/internet-governance/files/revenge-porn-laws-across-the-world"&gt;click to download the file&lt;/a&gt; (PDF, 636 Kb)&lt;/p&gt;
&lt;p&gt;&lt;a href="#_Toc511943056"&gt;Europe&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a href="#_Toc511943057"&gt;United Kingdom&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943058"&gt;England and Wales&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943059"&gt;Scotland&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943060"&gt;Northern Ireland&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943061"&gt;Malta&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943062"&gt;Germany&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943063"&gt;France&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="#_Toc511943064"&gt;United States of America&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a href="#_Toc511943065"&gt;Alabama&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943066"&gt;Alaska&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943067"&gt;Arizona&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943068"&gt;Arkansas&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943069"&gt;California&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943070"&gt;Colorado&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943071"&gt;Connecticut&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943072"&gt;Delaware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943073"&gt;District of Columbia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943074"&gt;Florida&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943075"&gt;Georgia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943076"&gt;Hawaii&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943077"&gt;Idaho&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943078"&gt;Illinois&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943079"&gt;Iowa&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943080"&gt;Kansas&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943081"&gt;Louisiana&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943082"&gt;Maine&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943083"&gt;Maryland&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943084"&gt;Michigan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943085"&gt;Minnesota&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943086"&gt;Nevada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943087"&gt;New Hampshire&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943088"&gt;New Jersey&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943089"&gt;New Mexico&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943090"&gt;North Carolina&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943091"&gt;North Dakota&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943092"&gt;Oklahoma&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943093"&gt;Oregon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943094"&gt;Pennsylvania&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943095"&gt;South Dakota&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943096"&gt;Tennessee&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943097"&gt;Texas&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943098"&gt;Utah&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943099"&gt;Vermont&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943100"&gt;Virginia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943101"&gt;Washington&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943102"&gt;West Virginia. 20&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943103"&gt;Wisconsin. 20&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="#_Toc511943104"&gt;Australia&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a href="#_Toc511943105"&gt;New South Wales&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943106"&gt;South Australia.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943107"&gt;Western Australia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943108"&gt;Victoria&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="#_Toc511943109"&gt;Asia and Rest of the World&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a href="#_Toc511943110"&gt;Canada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943111"&gt;Philippines&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943112"&gt;Israel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#_Toc511943113"&gt;Japan&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a name="_Toc511943056"&gt;&lt;/a&gt;&lt;strong&gt;1. &lt;/strong&gt;&lt;strong&gt;&lt;span&gt;Europe&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Country&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Statute&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Year&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Contents – definition, classification, punishment, standard of proof&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Punishment&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Remarks&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="6"&gt;
&lt;h3&gt;&lt;a name="_Toc511943057"&gt;&lt;/a&gt;United Kingdom&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943058"&gt;&lt;/a&gt;&lt;strong&gt;England and Wales&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legislation.gov.uk/ukpga/2015/2/section/33/enacted"&gt;Section 33&lt;/a&gt;, Criminal Justice and Courts Act 2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Makes it an offence in England and Wales to disclose private sexual photographs and films without the consent of the individual depicted and with the intent to cause distress.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;There is a maximum sentence of two years imprisonment&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A call has been made to cover a wider range of offences through enactment of a new Act.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The law is not applicable retroactively.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943059"&gt;&lt;/a&gt;&lt;strong&gt;Scotland&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legislation.gov.uk/asp/2016/22/section/2/enacted"&gt;Part 1, Section 2&lt;/a&gt;, Abusive Behaviour and Sexual Harm Act, 2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person (“A”) commits an offence if—&lt;/p&gt;
&lt;p&gt;(a)A discloses, or threatens to disclose, a photograph or film which shows, or appears to show, another person (“B”) in an intimate situation,&lt;/p&gt;
&lt;p&gt;(b)by doing so, A intends to cause B fear, alarm or distress or A is reckless as to whether B will be caused fear, alarm or distress, and&lt;/p&gt;
&lt;p&gt;(c)the photograph or film has not previously been disclosed to the public at large, or any section of the public, by B or with B’s consent.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;A person who commits such an offence is liable—&lt;br /&gt;
&lt;p&gt;(a)on summary conviction, to imprisonment for a term not exceeding 12 months or a fine not exceeding the statutory maximum (or both),&lt;/p&gt;
&lt;p&gt;(b) on conviction on indictment, to imprisonment for a term not exceeding 5 years or a fine (or both).&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943060"&gt;&lt;/a&gt;&lt;strong&gt;Northern Ireland&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legislation.gov.uk/nia/2016/21/section/51/enacted"&gt;Part 3, Section 51&lt;/a&gt;, Amendment to Justice Act&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is an offence for a person to disclose a private sexual photograph or film if the disclosure is made—&lt;/p&gt;
&lt;p&gt;(a)without the consent of an individual who appears in the photograph or film, and&lt;/p&gt;
&lt;p&gt;(b)with the intention of causing that individual distress.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;A person guilty of an offence under this section is liable—&lt;br /&gt;
&lt;p style="text-align: justify; "&gt;(a) on conviction on indictment, to imprisonment for a term not exceeding 2 years or a fine (or both), and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) on summary conviction, to imprisonment for a term not exceeding 6 months or a fine not exceeding the statutory maximum (or both).&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943061"&gt;&lt;/a&gt;&lt;strong&gt;Malta&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://justice.gov.mt/en/pcac/Documents/Criminal%20code.pdf"&gt;Article 208E&lt;/a&gt;, Maltese Criminal Code&lt;/p&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It punishes whoever, with an intent to cause distress, emotional harm or harm of any nature, discloses a private sexual photograph or film without the consent of the person or persons displayed or depicted in such photograph or film.&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Such person would, on conviction be liable to imprisonment for a term of up to two years or to a fine of not less than €,3000 and not more than €5,000, or to both such imprisonment and fine&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943062"&gt;&lt;/a&gt;&lt;strong&gt;Germany&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://dsgvo-gesetz.de/bdsg-neu/"&gt;General Data Protection Regulation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.gesetze-im-internet.de/urhg/"&gt;Art Copyright Law&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Regulation (EU) 679/2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation (GDPR)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A person also has the right to object to the unauthorised dissemination or public display of his/her photograph (section 22, Art Copyright Law)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;If privacy rights are infringed, the individual affected can seek civil law remedies, which include:&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Cease and desist orders, rectification and&lt;/li&gt;
&lt;li&gt;Compensatory damages.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;In 2014, The Bundesgerichtshof (BGH), upheld an earlier ruling from a regional court in Koblenz, Germany, that said a man did not have the right to keep intimate photos of his ex-lover just because she had consented to taking them in the first place.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943063"&gt;&lt;/a&gt;&lt;strong&gt;France&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.republique-numerique.fr/pages/digital-republic-bill-rationale"&gt;Digital Republic Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Under the new law, the persons have a right to oppose the use of their personal data.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Revenge porn may be sanctioned by 2 years of imprisonment and a 60.000 euro fine.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;a name="_Toc511943064"&gt;&lt;/a&gt;&lt;strong&gt;2. &lt;/strong&gt;&lt;strong&gt;&lt;span&gt;United States of America&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;State&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Statute&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Year&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Constituents of the offence&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Punishment&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Remarks&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943065"&gt;&lt;/a&gt;&lt;strong&gt;Alabama&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://alisondb.legislature.state.al.us/alison/codeofalabama/1975/coatoc.htm"&gt;SB301. Code of Alabama 1975 Secs 15-20A-4 to 15-20A-43 amended.&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2017&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Distribution of an intimate, private image, also known as "revenge porn" or "nonconsensual pornography." The law applies when the depicted person has not consented to the transmission and the sender intends to harass or intimidate the depicted person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A first offense is a Class A misdemeanor, punishable by up to a year in jail. Subsequent offenses are Class C felonies, punishable by up to 10 years in prison.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943066"&gt;&lt;/a&gt;&lt;strong&gt;Alaska&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://codes.findlaw.com/ak/title-11-criminal-law/ak-st-sect-11-61-120.html"&gt;Title 11. Criminal Law § 11.61.120&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Provides that whoever publishes or distributes electronic or printed photographs, pictures, or films that show the genitals, anus, or female breast of the other person or show that person engaged in a sexual act commits a crime of harassment in second degree.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Harassment in the second degree is a class B misdemeanor.&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;Class B misdemeanors are less serious crimes, punishable by up to 90 days in jail and a fine of up to $2,000.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943067"&gt;&lt;/a&gt;&lt;strong&gt;Arizona&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Unlawful Distribution of Private Images, 2016 through amending &lt;a href="https://legiscan.com/AZ/text/HB2001/id/1368420"&gt;Section 13‑1425 of the Arizona Revised Statutes&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It provides that the distribution of images depicting states of nudity or specific sexual activities of another person is unlawful.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If such disclosure is by electronic means, it is a Class 4 felony.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If the person threatens to disclose but does not disclose, then it is a Class 1 Misdemeanor.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       Class 4 felonies are punishable up to 3.75 years in prison.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;·       A class 1 misdemeanor is the most serious misdemeanor offense and is punishable by up to 6 months in jail, 3 years of probation (5 years maximum probation for DUI offenses) and a $2,500 fine plus surcharges.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       The earlier state revenge porn bill was scrapped due to an ACLU Lawsuit.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943068"&gt;&lt;/a&gt;&lt;strong&gt;Arkansas&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.arkleg.state.ar.us/assembly/2015/2015R/Acts/Act304.pdf"&gt;Arkansas Code 5-26-314&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;July, 2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It criminalizes the distribution of an image, picture, video, or voice or audio recording of a sexual nature to harass, frighten, intimidate, threaten, or abuse a family or household member or a person in a current or former dating relationship; and for other purposes.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Such an offence is a Class A misdemeanour.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       A Class A misdemeanor is the most serious type of misdemeanor in Arkansas and it is punishable by up to one year in jail and a fine of up to $2,500.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Defines a “dating relationship” as romantic/ intimate relationship between two individuals and provides additional factors.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943069"&gt;&lt;/a&gt;&lt;strong&gt;California&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201320140SB1255"&gt;Section 647(j)(4) of California Penal Code&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Under this provision an act of revenge porn is defined as someone who “photographs or records by any means the image of the intimate body part or parts of another identifiable person, under circumstances where the parties agree or understand that the image shall remain private, and the person subsequently distributes the image taken, with the intent to cause serious emotional distress, and the depicted person suffers serious emotional distress.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It shall be a disorderly conduct, misdemeanour.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943070"&gt;&lt;/a&gt;&lt;strong&gt;Colorado&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201320140SB1255"&gt;Colorado Revised Statutes 18-7-107 and 18-7-108.&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Posting a Private Image for Harassment and Posting a Private Image for Pecuniary Gain is a Class 1 Misdemeanor.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The defendant can be fined up to $10,000.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943071"&gt;&lt;/a&gt;&lt;strong&gt;Connecticut&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.cga.ct.gov/2015/act/pa/pdf/2015PA-00213-R00HB-06921-PA.pdf"&gt;Section 53a-189a, Connecticut General Statutes&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;October 1, 2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It provides that whoever indulges in Unlawful dissemination of an intimate image is guilty&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The offence is a class A misdemeanor.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943072"&gt;&lt;/a&gt;&lt;strong&gt;Delaware&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://codes.findlaw.com/de/title-11-crimes-and-criminal-procedure/de-code-sect-11-1335.html"&gt;§ 1335, Title 11 of the Delaware Code&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;When  a person knowingly reproduces, distributes, exhibits, publishes, transmits, or otherwise disseminates a visual depiction of a person who is nude, or who is engaging in sexual conduct, when the person knows or should have &lt;span style="text-align: left; "&gt;known that the reproduction, distribution, exhibition, publication, transmission, or other dissemination was without the consent of the person depicted and that the visual depiction was created or provided to the person under circumstances in which the person depicted has a reasonable expectation of privacy, such person shall be guilty of violation of privacy.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is a class A misdemeanor; class G felony.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943073"&gt;&lt;/a&gt;&lt;strong&gt;District of Columbia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://lims.dccouncil.us/Download/32304/B20-0903-Engrossment.pdf"&gt;Criminalization of Non-Consensual Pornography Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;It provides that a person knowingly discloses one or more sexual images of another identified or identifiable person when:&lt;/p&gt;
&lt;p&gt;(1) The person depicted did not consent to the disclosure of the sexual image;&lt;/p&gt;
&lt;p&gt;(2) There was an agreement or understanding between the person depicted and the person disclosing that the sexual image would not be disclosed; and&lt;/p&gt;
&lt;p&gt;(3) The person disclosed the sexual image with the intent to harm the person depicted person depicted or to receive financial gain.&lt;/p&gt;
&lt;p&gt;(b) A person who violates this subsection shall be guilty of a misdemeanour.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Upon conviction such person shall be fined not more than the amount set forth in section 101 of the Criminal Fine Proportionality Amendment Act of 2012, approved June 11, 2013 (D.C. Law 19-317; D.C.42 Official Code § 22-3571.01), imprisoned for not more than 180 days, or both.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943074"&gt;&lt;/a&gt;&lt;strong&gt;Florida&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.flsenate.gov/Session/Bill/2015/0538/BillText/er/PDF"&gt;Florida Statute Section 784.049&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       “Sexually cyberharass” means to publish a sexually&lt;/p&gt;
&lt;p&gt;explicit image of a person that contains or conveys the personal identification information of the depicted person to an Internet website without the depicted person’s consent, for no legitimate purpose, with the intent of causing substantial emotional distress to the depicted person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person who willfully and maliciously sexually cyberharasses another person commits a misdemeanor of the first degree, punishable as provided in s. 775.082 or s. 775.083.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;If a person who has one prior conviction for sexual cyber harassment and who commits a second or subsequent sexual cyber harassment commits a felony of the third degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Aggrieved person can also initiate civil action to recover damages.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943075"&gt;&lt;/a&gt;&lt;strong&gt;Georgia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legis.ga.gov/Legislation/20132014/143392.pdf"&gt;Article 3 of Chapter 11 of Title 16 of the Official Code of Georgia&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       Whoever Electronically transmits or posts or causes such transmission or posting, in one or more transmissions or posts, a photograph or video which depicts nudity or sexually explicit conduct of an adult when the transmission or post is harassment or causes financial loss to the depicted person and serves no legitimate purpose to the depicted person.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Such person shall be guilty of a misdemeanor of a high and aggravated nature; provided, however, that upon a second or subsequent violation of &lt;span&gt;this Code section, he or she shall be guilty of a felony and, upon conviction thereof, shall be punished by imprisonment of not less than one nor more than five years, a fine of not more than $100,000.00, or both.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;There is a rebuttable presumption on the Internet Service Provider that it was not aware of the content of such post&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943076"&gt;&lt;/a&gt;&lt;strong&gt;Hawaii&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.capitol.hawaii.gov/session2014/bills/HB1750_CD1_.pdf"&gt;Section 711-1110.9, Hawaii Revised Statutes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person commits the offense of violation of privacy in the first degree if The person knowingly discloses an image or video of another identifiable person either in the nude, as defined in section 712-1210, or engaging in sexual conduct, as defined in section 712-1210, without the consent of the depicted person, with intent to harm substantially the depicted person with respect to that person’s health, safety, business, calling, career, financial condition, reputation, or personal relationships.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Violation of privacy in the first degree is a class C felony.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In addition to any penalties the court may impose, the court may order the destruction of any recording made in &lt;/span&gt;&lt;span&gt;violation of this section&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Exception has been carved out for When the person was voluntarily nude in public or voluntarily engaging in sexual conduct in public.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943077"&gt;&lt;/a&gt;&lt;strong&gt;Idaho&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://codes.findlaw.com/id/title-18-crimes-and-punishments/id-st-sect-18-8327.html"&gt;Idaho Code 18-6609(2)(b)&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2017&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Intentionally or with reckless disregard disseminating, publishing or selling (or conspiring) any image or images of the intimate areas of another person or persons without the consent of such other person or persons and he knows or reasonably should have known that one or both parties agreed or understood that the images should remain private.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The punishments are decided on a case by case basis, but seem to range from state prison terms of three to five years, and/or a fine of up to $5,000 based on the cases that have emerged&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943078"&gt;&lt;/a&gt;&lt;strong&gt;Illinois&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.ilga.gov/legislation/publicacts/fulltext.asp?Name=098-1138"&gt;Section 11-23.5 of The Illinois Criminal Code of 2012&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Criminalises the Non-Consensual Dissemination of Private Sexual Images.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is a Class 4 Felony.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943079"&gt;&lt;/a&gt;&lt;strong&gt;Iowa&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.legis.iowa.gov/legislation/BillBook?ga=87&amp;amp;ba=HF526"&gt;Section708.7 of the Code of 2017&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2017&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Dissemination, publication, distribution or causing it thereof of photograph or film showing another person in partial or full nudity or engaged in a sex act, without consent, is harassment.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Such an offence is harassment in first degree and is an aggravated misdemeanour&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943080"&gt;&lt;/a&gt;&lt;strong&gt;Kansas&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.kslegislature.org/li_2016/b2015_16/measures/documents/hb2501_enrolled.pdf"&gt;Section 21-6101(a)(8) of Kansas State Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Breach of privacy is knowingly and without lawful &lt;span&gt;authority: disseminating any videotape, photograph, film or image of another identifiable person 18 years of age or older who is nude or engaged in sexual activity and under circumstances in which such identifiable person had a reasonable expectation of privacy, with the intent to harass, threaten or intimidate such identifiable person, and such identifiable person did not consent to such dissemination&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Such an offence is a Severity level 8, person felony&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943081"&gt;&lt;/a&gt;&lt;strong&gt;Louisiana&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legis.la.gov/legis/ViewDocument.aspx?d=954684"&gt;R.S. 14:283.2&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person commits the offense of non-consensual disclosure of a private mage when all of the following occur:&lt;/p&gt;
&lt;p&gt;(1) The person intentionally discloses an image of another person who is seventeen years of age or older, who is identifiable from the image or information displayed in connection with the image, and whose intimate parts are exposed in whole or in part.&lt;/p&gt;
&lt;p&gt;(2) The person who discloses the image obtained it under circumstances in which a reasonable person would know or understand that the image was to remain private.&lt;/p&gt;
&lt;p&gt;(3) The person who discloses the image knew or should have known that the person in the image did not consent to the disclosure of the image.&lt;/p&gt;
&lt;p&gt;(4) The person who discloses the image has the intent to harass or cause emotional distress to the person in the image, and the person who commits the offense knew or should have known that the disclosure could harass or cause emotional distress to the person in the image&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Whoever commits the offense of non-consensual disclosure of a private image shall be fined not more than ten thousand dollars, imprisoned with or without hard labour for not more than two years, or both&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No liability is imposed on the computer service used for posting such image&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943082"&gt;&lt;/a&gt;&lt;strong&gt;Maine&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.mainelegislature.org/legis/bills/getPDF.asp?paper=HP0460&amp;amp;item=5&amp;amp;snum=127"&gt;Section 1 17-A MRSA §511-A&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person is guilty of unauthorized dissemination of certain private images if the person, with the intent to harass, torment or threaten the depicted person or another person, knowingly disseminates, displays or publishes a photograph, videotape, film or digital recording of another person in a state of nudity or engaged in a sexual act or engaged in sexual contact in a manner in which there is no public or newsworthy purpose when the person knows or should have known that the depicted person:&lt;/p&gt;
&lt;p&gt;(1) Is 18 years of age or older;&lt;/p&gt;
&lt;p&gt;(2) Is identifiable from the image itself or information displayed in connection with the image; and&lt;/p&gt;
&lt;p&gt;(3) Has not consented to the dissemination, display or publication of the private image.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Unauthorized dissemination of certain private images is a Class D crime.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943083"&gt;&lt;/a&gt;&lt;strong&gt;Maryland&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://mgaleg.maryland.gov/2014RS/bills/hb/hb0043E.pdf"&gt;§ 3-809, Maryland Code.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person may not intentionally cause serious emotional distress to another by intentionally placing on the internet an identifiable a photograph, film, videotape, recording, or any other reproduction of the image of the other person that reveals the identity of the other person with his or her intimate parts exposed or while engaged in an act of sexual contact:&lt;/p&gt;
&lt;p&gt;(1) knowing that the other person did not consent to &lt;span&gt;the placement of the image on the internet; and&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) under circumstances in which the other person had a reasonable expectation that the image would be kept private.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person who violates this section is guilty of a misdemeanor and on conviction is subject to imprisonment not exceeding 2 years or a fine not exceeding $5,000 or both.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943084"&gt;&lt;/a&gt;&lt;strong&gt;Michigan&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legislature.mi.gov/documents/2015-2016/billenrolled/Senate/pdf/2015-SNB-0508.pdf"&gt;Sec 145e of MCL&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;If a person threatens, coerces, or intimidates dissemination of any sexually explicit visual material of another person shall be punishable under section 145f.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.legislature.mi.gov/documents/2015-2016/billenrolled/Senate/pdf/2015-SNB-0509.pdf"&gt;Section 145f&lt;/a&gt;- first offense punishable by 93 day sentence or fine up to $500.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943085"&gt;&lt;/a&gt;&lt;strong&gt;Minnesota&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.revisor.mn.gov/bills/text.php?number=SF2713&amp;amp;version=2&amp;amp;session=ls89&amp;amp;session_year=2016&amp;amp;session_number=0"&gt;§ 617.261, Minnesota Statutes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A cause of action against a person for the non-consensual dissemination of private sexual images exists when:&lt;/p&gt;
&lt;p&gt;(1) a person disseminated an image without the consent of the person depicted in the image;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) the image is of an individual depicted in a sexual act or whose intimate parts are exposed in whole or in part;&lt;/p&gt;
&lt;p&gt;(3) the person is identifiable:&lt;/p&gt;
&lt;p&gt;(i) from the image itself, by the person depicted in the image or by another person; or&lt;/p&gt;
&lt;p&gt;(ii) from the personal information displayed in connection with the image; and&lt;/p&gt;
&lt;p&gt;(4) the image was obtained or created under circumstances in which the person depicted had a reasonable expectation of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fact that the individual depicted in the image consented to the creation of the image or to the voluntary private transmission of the image is not a defense to liability for a person who has disseminated the image without consent.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Conviction for nonconsensual dissemination of private sexual images qualifies as a prior “qualified domestic violence-related offense” that enhances penalties for convictions for domestic assault, 4th &amp;amp; 5th degree assault, stalking, and violation of a harassment restraining order.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Consent to such image being taken is no defense&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943086"&gt;&lt;/a&gt;&lt;strong&gt;Nevada&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.leg.state.nv.us/Session/78th2015/Bills/AB/AB49_EN.pdf"&gt;Sections 2-6 of Chapter 200 of NRS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person commits the crime of unlawful dissemination of an intimate image when, with the intent to harass, harm or terrorize another person, the person electronically disseminates or sells an intimate image which depicts the other person and the other person:&lt;/p&gt;
&lt;p&gt;(1) did not give prior consent to the electronic dissemination or sale;&lt;/p&gt;
&lt;p&gt;(2) had a reasonable expectation that the intimate image would be kept private and would not be made visible to the public; and&lt;/p&gt;
&lt;p&gt;(3) was at least 18 years of age when the intimate image was created&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Such person is guilty of a category D felony&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943087"&gt;&lt;/a&gt;&lt;strong&gt;New Hampshire&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.gencourt.state.nh.us/bill_Status/billText.aspx?id=962&amp;amp;txtFormat=html%22,%22http://www.gencourt.state.nh.us/bill_Status/billText.aspx?id=962&amp;amp;txtFormat=html"&gt;§ 644:9-a, N.H. Rev. Stat.&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Nonconsensual dissemination of private sexual images with the intent to harass, intimidate, threaten, or coerce the depicted person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is a felony.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943088"&gt;&lt;/a&gt;&lt;strong&gt;New Jersey&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://law.justia.com/codes/new-jersey/2013/title-2c/section-2c-14-9/"&gt;§ 2C:14-9, New Jersey Code&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Making a nonconsensual recording that reveals another person’s "intimate parts" or shows the person engaged in a sexual act without consent.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Felony, three to five years in prison, a fine not to exceed $15,000.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943089"&gt;&lt;/a&gt;&lt;strong&gt;New Mexico&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.nmlegis.gov/Legislation/Legislation?chamber=H&amp;amp;legtype=B&amp;amp;legno=142&amp;amp;year=15&amp;amp;AspxAutoDetectCookieSupport=1"&gt;HB 142, new section added to the New Mexico Criminal Code&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Unauthorised distribution of sensitive images without that person’s consent with the intent to harass, humiliate or intimidate that person or cause substantial emotional distress is a misdemeanour.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;It is a misdemeanour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Upon a second or subsequent conviction, the offender is guilty of a fourth degree felony&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943090"&gt;&lt;/a&gt;&lt;strong&gt;North Carolina&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.ncleg.net/Sessions/2015/Bills/House/PDF/H792v6.pdf"&gt;§ 14-190.5A, Article 26 of Chapter 14 of the General Statutes&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person is guilty of disclosure of private images if all of the following apply:&lt;/p&gt;
&lt;p&gt;(1) The person knowingly discloses an image of another person with the intent to do either of the following:&lt;/p&gt;
&lt;p&gt;a. Coerce, harass, intimidate, demean, humiliate, or cause financial loss to the depicted person.&lt;/p&gt;
&lt;p&gt;b. Cause others to coerce, harass, intimidate, demean, humiliate, or cause financial loss to the depicted person.&lt;/p&gt;
&lt;p&gt;(2) The depicted person is identifiable from the disclosed image itself or information offered in connection with the image.&lt;/p&gt;
&lt;p&gt;(3) The depicted person's intimate parts are exposed or the depicted person is engaged in sexual conduct in the disclosed image.&lt;/p&gt;
&lt;p&gt;(4) The person discloses the image without the affirmative consent of the depicted person.&lt;/p&gt;
&lt;p&gt;(5) The person discloses the image under circumstances such that the person knew or should have known that the depicted person had a reasonable expectation of privacy.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;For an offense by a person who is 18 years of age or older at the time of the offense, the violation is a Class H felony.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a first offense by a person who is under 18 years of age at the time of the offense, the violation is a Class 1 misdemeanor.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a second or subsequent offense by a person who is under the age of 18 at the time of the offense, the violation is a Class H felony&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The Court may order destruction of such image.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision is in addition to civil and criminal remedies.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943091"&gt;&lt;/a&gt;&lt;strong&gt;North Dakota&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legis.nd.gov/assembly/64-2015/documents/15-0982-03000.pdf?20150621075722"&gt;Section 12.1-17-07.2 of the North Dakota Century Code&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       A person commits the offense of distribution of intimate images if the person knowingly or intentionally distributes to any third party any intimate image of an individual eighteen years of age or older, if:&lt;/p&gt;
&lt;p&gt;(1) The person knows that the depicted individual has not given consent to the person to distribute the intimate image;&lt;/p&gt;
&lt;p&gt;(2) The intimate image was created by or provided to the person under circumstances in which the individual has a reasonable expectation of privacy; and&lt;/p&gt;
&lt;p&gt;(3) Actual emotional distress or harm is caused to the individual as a result of the distribution under this section.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Distribution of an intimate image is a class A misdemeanor&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943092"&gt;&lt;/a&gt;&lt;strong&gt;Oklahoma&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://legiscan.com/OK/text/SB1257/2016"&gt;Section 1040.13b of Title 21, Oklahoma Statutes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       A person commits nonconsensual dissemination of private sexual images when he or she:&lt;/p&gt;
&lt;p&gt;(1) Intentionally disseminates an image of another person:&lt;/p&gt;
&lt;p&gt;a. who is at least eighteen (18) years of age,&lt;/p&gt;
&lt;p&gt;b. who is identifiable from the image itself or&lt;/p&gt;
&lt;p&gt;information displayed in connection with the image,&lt;/p&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;p&gt;c. who is engaged in a sexual act or whose intimate parts are exposed, in whole or in part;&lt;/p&gt;
&lt;p&gt;(2) Disseminates the image with the intent to harass, intimidate or coerce the person, or under circumstances in which a reasonable person would know or understand that dissemination of the image would harass, intimidate or coerce the person&lt;/p&gt;
&lt;p&gt;(3) Obtains the image under circumstances in which a reasonable person would know or understand that the image was to remain private; and&lt;/p&gt;
&lt;p&gt;(4) Knows or a reasonable person should have known that the person in the image has not consented to the dissemination.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Any person who violates the provisions of this section shall be guilty of a misdemeanour punishable by imprisonment in a county jail for not more than one (1) year or by a fine of not more than.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One Thousand Dollars ($1,000.00), or both such fine and imprisonment&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The court shall have the authority to order the defendant to remove the disseminated image should the court find it is in the power of the defendant to do so.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943093"&gt;&lt;/a&gt;&lt;strong&gt;Oregon&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://olis.leg.state.or.us/liz/2015R1/Downloads/MeasureDocument/SB188/Enrolled"&gt;ORS 161.005&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       (1) A person commits the crime of unlawful dissemination of an intimate image if:&lt;/p&gt;
&lt;p&gt;(a) The person, with the intent to harass, humiliate or injure another person, knowingly causes to be disclosed through an Internet website an identifiable image of the other person whose intimate parts are visible or who is engaged in sexual conduct;&lt;/p&gt;
&lt;p&gt;(b) The person knows or reasonably should have known that the other person does not consent to the disclosure;&lt;/p&gt;
&lt;p&gt;(c) The other person is harassed, humiliated or injured by the disclosure; and&lt;/p&gt;
&lt;p&gt;(d) A reasonable person would be harassed, humiliated or injured by the disclosure.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Unlawful dissemination of an intimate image is a Class A misdemeanor.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlawful dissemination of an intimate image is a Class C felony if the person has a prior conviction under this section at the time of the offense.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943094"&gt;&lt;/a&gt;&lt;strong&gt;Pennsylvania&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.legis.state.pa.us/cfdocs/legis/li/uconsCheck.cfm?yr=2014&amp;amp;sessInd=0&amp;amp;act=115"&gt;Title 18 Pennsylvania Consolidated Statutes § 3131&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person commits the offense of unlawful dissemination of intimate image if, with intent to harass, annoy or alarm a current or former sexual or intimate partner, the person disseminates a visual depiction of the current or former sexual or intimate partner in a state of nudity or engaged in sexual conduct.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;·       An offense shall be:&lt;/p&gt;
&lt;p&gt;(1)  A misdemeanor of the first degree, when the person depicted is a minor.&lt;/p&gt;
&lt;p&gt;(2)  A misdemeanor of the second degree, when the person depicted is not a minor.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943095"&gt;&lt;/a&gt;&lt;strong&gt;South Dakota&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://sdlegislature.gov/Statutes/Codified_Laws/DisplayStatute.aspx?Type=Statute&amp;amp;Statute=22-21-4"&gt;Section 4 of Chapter 22-21 of South Dakota Code of Laws&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No person may use or disseminate in any form any visual recording or photographic device to photograph or visually record any other person without clothing or under or through the clothing, or with another person depicted in a sexual manner, for the purpose of viewing the body of, or the undergarments worn by, that other person, without the consent or knowledge of that other person, with the intent to self-gratify, to harass, or embarrass and invade the privacy of that other person, under circumstances in which the other person has a reasonable expectation of privacy.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A violation of this section is a Class 1 misdemeanor.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, a violation of this section is a Class 6 felony if the victim is seventeen years of age or younger and the perpetrator is at least twenty-one years old.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943096"&gt;&lt;/a&gt;&lt;strong&gt;Tennessee&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://publications.tnsosfiles.com/acts/109/pub/pc0872.pdf"&gt;Chapter 872 Tenn. Pub. Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2017&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;(a) A person commits unlawful exposure who, with the intent to cause emotional distress, distributes an image of the intimate part or parts of another identifiable person if:&lt;/p&gt;
&lt;p&gt;(1) The image was photographed or recorded under circumstances where the parties agreed or understood that the image would remain private; and&lt;/p&gt;
&lt;p&gt;(2) The person depicted in the image suffers emotional distress.&lt;/p&gt;
&lt;p&gt;(b) As used in this section:&lt;/p&gt;
&lt;p&gt;(1) "Emotional distress" has the same meaning as defined in § 39-17-315; and&lt;/p&gt;
&lt;p&gt;(2) "Intimate part" means any portion of the primary genital area, buttock, or any portion of the female breast below the top of the areola that is either uncovered or visible through less than fully opaque clothing.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A violation of subsection (a) is a Class A misdemeanor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, nothing in this section precludes punishment under any other section of law providing for greater punishment.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943097"&gt;&lt;/a&gt;&lt;strong&gt;Texas&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://capitol.texas.gov/tlodocs/84R/billtext/pdf/SB01135F.pdf#navpanes=0"&gt;Chapter 98B, ATitle 4, Civil Practice and Remedies Code&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;(a)A defendant is liable, as provided by this chapter, to a person depicted in intimate visual material for damages arising from the disclosure of the material if:&lt;/p&gt;
&lt;p&gt;(1)the defendant discloses the intimate visual&lt;/p&gt;
&lt;p&gt;material without the effective consent of the depicted person;&lt;/p&gt;
&lt;p&gt;(2)the intimate visual material was obtained by the&lt;/p&gt;
&lt;p&gt;defendant or created under circumstances in which the depicted person had a reasonable expectation that the material would remain private;&lt;/p&gt;
&lt;p&gt;(3)the disclosure of the intimate visual material &lt;span&gt;causes harm to the depicted person; and&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;(4)the disclosure of the intimate visual material &lt;span&gt;reveals the identity of the depicted person in any manner, including through:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;(A)any accompanying or subsequent information &lt;span&gt;or material related to the intimate visual material; or&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;(B)information or material provided by a third &lt;span&gt;party in response to the disclosure of the intimate visual material&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) defendant is liable, as provided by this chapter, to a person depicted in intimate visual material for damages arising from the promotion of the material if, knowing the character and content of the material, the defendant promotes intimate visual material described by Subsection (a) on an Internet website or other forum for publication that is owned or operated by the defendant.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;An offense under this section is a Class A misdemeanor.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If conduct that constitutes an offense under this section also constitutes an offense under another law, the actor may be prosecuted under this section, the other law, or both.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Aggrieved person may recover actual and exemplary damages.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The provisions shall be liberally construed by the courts to promote its underlying purpose to protect&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Persons from, and provide adequate remedies to victims of, the disclosure or promotion of intimate visual material.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943098"&gt;&lt;/a&gt;&lt;strong&gt;Utah&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://le.utah.gov/~2014/bills/static/HB0071.html"&gt;§ 76-5b-203, Utah Code.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;An actor commits the offense of distribution of intimate images if the actor, with the intent to cause emotional distress or harm, knowingly or intentionally distributes to any third party any intimate image of an individual who is 18 years of age or older, if:&lt;/p&gt;
&lt;p&gt;(a) the actor knows that the depicted individual has not given consent to the actor to distribute the intimate image;&lt;/p&gt;
&lt;p&gt;(b) the intimate image was created by or provided to the actor under circumstances in which the individual has a reasonable expectation of privacy; and&lt;/p&gt;
&lt;p&gt;(c) actual emotional distress or harm is caused to the person as a result of the distribution under this section.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Distribution of an intimate image is a class A misdemeanour.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943099"&gt;&lt;/a&gt;&lt;strong&gt;Vermont&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://legislature.vermont.gov/assets/Documents/2016/Docs/BILLS/H-0105/H-0105%20As%20Passed%20by%20Both%20House%20and%20Senate%20Unofficial.pdf"&gt;Sec. 2. 13 V.S.A. § 2606&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person violates this section if he or she knowingly discloses a visual image of an identifiable person who is nude or who is engaged in sexual conduct, without his or her consent, with the intent to harm, harass, intimidate, threaten, or coerce the person depicted, and the disclosure would cause a reasonable person to suffer harm. A person may be identifiable from the &lt;span style="text-align: left; "&gt;image itself or information offered in connection with the image. Consent to recording of the visual image does not, by itself, constitute consent for disclosure of the image.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person who violates this provision shall be imprisoned not more than two years or fined not more than $2,000.00, or both.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A person who violates this provision with the intent of disclosing the image for financial profit shall be imprisoned not more than five years or fined not more than $10,000.00, or both.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;In addition, the Court may order &lt;span&gt;equitable relief, including a temporary restraining order, a preliminary &lt;/span&gt;&lt;span&gt;injunction, or a permanent injunction ordering the defendant to cease display or disclosure of the image.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court may grant injunctive relief maintaining the confidentiality of a plaintiff using a pseudonym.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943100"&gt;&lt;/a&gt;&lt;strong&gt;Virginia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://law.lis.virginia.gov/vacode/title18.2/chapter8/section18.2-386.2/"&gt;§ 18.2-386.2, Code of Virginia&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Any person who, with the intent to coerce, harass, or intimidate, maliciously disseminates or sells any videographic or still image created by any means whatsoever that depicts another person who is totally nude, or in a state of undress so as to expose the genitals, pubic area, buttocks, or female breast, where such person knows or has reason to know that he is not licensed or authorized to disseminate or sell such videographic or still image is guilty.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Such an offense is a Class 1 misdemeanor.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943101"&gt;&lt;/a&gt;&lt;strong&gt;Washington&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://lawfilesext.leg.wa.gov/biennium/2015-16/Pdf/Bills/House%20Passed%20Legislature/1272-S2.PL.pdf"&gt;Title 9A RCW&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person commits the crime of disclosing intimate images when the person knowingly discloses an intimate image of another person and the person disclosing the image:&lt;/p&gt;
&lt;p&gt;(a) Obtained it under circumstances in which a reasonable person would know or understand that the image was to remain private;&lt;/p&gt;
&lt;p&gt;(b) Knows or should have known that the depicted  person has not consented to the disclosure; and10&lt;/p&gt;
&lt;p&gt;(c) Knows or reasonably should know that disclosure would cause harm to the depicted person.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The crime of disclosing intimate images:&lt;/p&gt;
&lt;p&gt;(a) Is a gross misdemeanor on the first offense; or&lt;/p&gt;
&lt;p&gt;(b) Is a class C felony if the defendant has one or more prior convictions for disclosing intimate images.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person who is under the age of eighteen is not guilty of the crime of disclosing intimate images unless the person:&lt;/p&gt;
&lt;p&gt;(a) Intentionally and maliciously disclosed an intimate image of another person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Obtained it under circumstances in which a reasonable person would know or understand that the image was to remain private; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) Knows or should have known that the depicted person has not consented to the disclosure&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943102"&gt;&lt;/a&gt;&lt;strong&gt;West Virginia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.wvlegislature.gov/Bill_Text_HTML/2017_SESSIONS/RS/Bills/SB240%20SUB1%20enr.htm"&gt;§61-8-28a, Code of West Virginia&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2017&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No person may knowingly and intentionally disclose, cause to be disclosed or threaten to disclose, with the intent to harass, intimidate, threaten, humiliate, embarrass, or coerce, an image of another which shows the intimate parts of the depicted person or shows the depicted person engaged in sexually explicit conduct which was captured under circumstances where the person depicted had a reasonable expectation that the image would not be publicly disclosed.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person convicted is guilty of a misdemeanor and, upon conviction thereof, shall be confined in jail for not more than one year, fined not less than $1,000 nor more than $5,000, or both confined and fined.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943103"&gt;&lt;/a&gt;&lt;strong&gt;Wisconsin&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://docs.legis.wisconsin.gov/2013/related/acts/243"&gt;§ 942.09, Code of Wisconsin&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;It provides for posting or publishing a sexually explicit image without consent and providing a penalty. Such an offence is a Class A misdemeanour.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Class A misdemeanors can result in fines up to $10,000, imprisonment up to 9 months or a combination of the two.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;a name="_Toc511943104"&gt;&lt;/a&gt;&lt;strong&gt;3. &lt;/strong&gt;&lt;strong&gt;&lt;span&gt;Australia&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Country&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Statute&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Year&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Contents – definition, classification, punishment, standard of proof&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Punishment&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Remarks&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943105"&gt;&lt;/a&gt;&lt;strong&gt;New South Wales&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.legislation.nsw.gov.au/#/view/act/1900/40/part3/div15c/sec91q"&gt;Section 91Q, Crimes Act 1900&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2018&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person who intentionally distributes an intimate image of another person:&lt;/p&gt;
&lt;p&gt;(a) without the consent of the person, and&lt;/p&gt;
&lt;p&gt;(b) knowing the person did not consent to the distribution or being reckless as to whether the person consented to the distribution, is guilty of an offence.&lt;/p&gt;
&lt;p&gt;"intimate image" means:&lt;/p&gt;
&lt;p&gt;(a) an image of a person's private parts, or of a person engaged in a private act, in circumstances in which a reasonable person would reasonably expect to be afforded privacy, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) an image that has been altered to appear to show a person's private parts, or a person engaged in a private act, in circumstances in which a reasonable person would reasonably expect to be afforded privacy.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Maximum penalty: 100 penalty units or imprisonment for 3 years, or both.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943106"&gt;&lt;/a&gt;&lt;strong&gt;South Australia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.legislation.sa.gov.au/lz/c/a/summary%20offences%20act%201953/current/1953.55.auth.pdf"&gt;Summary Offences Act 1953&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2018&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A person who distributes an invasive image of another person, knowing or having reason to believe that the other person—&lt;/p&gt;
&lt;p&gt;(a) does not consent to that particular distribution of the image; or&lt;/p&gt;
&lt;p&gt;(b) does not consent to that particular distribution of the image and does not consent to distribution of the image generally, is guilty of an offence.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;An image of a person will be taken to be an invasive&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;image of the person if it depicts the person in a place other than a public place—&lt;/p&gt;
&lt;p&gt;(a) engaged in a private act; or&lt;/p&gt;
&lt;p&gt;(b) in a state of undress such that—&lt;/p&gt;
&lt;p&gt;(i) in the case of a female—the bare breasts are visible; or&lt;/p&gt;
&lt;p&gt;(ii) in any case—the bare genital or anal region is visible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) However, an image of a person that falls within the standards of morality, decency and propriety generally accepted by reasonable adults in the community will not be taken to be an invasive image of the person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Maximum penalty:&lt;/p&gt;
&lt;p&gt;(a) if the invasive image is of a person under the age of 17 years—$20000 or imprisonment for 4 years;&lt;/p&gt;
&lt;p&gt;(b) in any other case—$10 000 or imprisonment for 2 years.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943107"&gt;&lt;/a&gt;&lt;strong&gt;Western Australia&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://classic.austlii.edu.au/au/legis/wa/bill/roarlavb2016630/"&gt;Section 10G/61, Restraining Orders and Related Legislation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://classic.austlii.edu.au/au/legis/wa/bill/roarlavb2016630/"&gt;Amendment (Family Violence) Act 2016&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2016&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A court may restrain the respondent from doing all or any of the following in the case of a family violence restraining order:&lt;/p&gt;
&lt;p&gt;distributing or publishing, or threatening to distribute or publish, intimate personal images of the person seeking to be protected;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2 years imprisonment.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Check comes into play only in case of a family violence restraining order and is not general protection.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943108"&gt;&lt;/a&gt;&lt;strong&gt;Victoria&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www5.austlii.edu.au/au/legis/vic/consol_act/soa1966189/s41c.html"&gt;Section 41C, Summary Offences Act 1966&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2012&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;A person who visually captures or has visually captured an image of another person's genital or anal region must not intentionally distribute that image.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2 years imprisonment.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;a name="_Toc511943109"&gt;&lt;/a&gt;&lt;strong&gt;4. &lt;/strong&gt;&lt;strong&gt;&lt;span&gt;Asia and Rest of the World&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Country&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Statute&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Year&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Contents – definition, classification, punishment, standard of proof&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Punishment&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Remarks&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943110"&gt;&lt;/a&gt;&lt;strong&gt;Canada&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.cba.org/CMSPages/GetFile.aspx?guid=2f73fcf2-a04e-402a-97e8-de9d56b0ba1a"&gt;Section 162.1, Criminal Code through Bill C-13 or Cyberbullying Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Everyone who knowingly publishes, distributes, transmits, sells, makes available or advertises an intimate image of a person knowing that the person depicted in the image did not give their consent to that conduct, or being reckless as to whether or not that person gave their consent to that conduct, is guilty.&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;In this section, “intimate image” means a visual recording of a person made by any means including a photographic, film or video recording,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;(a) in which the person is nude, is exposing his or her genital organs or anal region or her breasts or is engaged in explicit sexual activity;&lt;/p&gt;
&lt;p&gt;(b) in respect of which, at the time of the recording, there were circumstances that gave rise to a reasonable expectation of privacy; and&lt;/p&gt;
&lt;p&gt;(c) in respect of which the person depicted retains a reasonable expectation of privacy at the time the offence is committed.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Punishment is:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) of an indictable offence and liable to imprisonment for a term of not more than five years; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) of an offence punishable on summary conviction.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943111"&gt;&lt;/a&gt;&lt;strong&gt;Philippines&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://www.lawphil.net/statutes/repacts/ra2010/ra_9995_2010.html"&gt;Anti-Photo and Video Voyeurism Act of 2009&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;It is hereby prohibited and declared unlawful for any person:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) To take photo or video coverage of a person or group of persons performing sexual act or any similar activity or to capture an image of the private area of a person/s such as the naked or undergarment clad genitals, public area, buttocks or female breast without the consent of the person/s involved and under circumstances in which the person/s has/have a reasonable expectation of privacy;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;(b) To copy or reproduce, or to cause to be copied or reproduced, such photo or video or recording of sexual act or any similar activity with or without consideration;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(c) To sell or distribute, or cause to be sold or distributed, such photo or video or recording of sexual act, whether it be the original copy or reproduction thereof; or&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(d) To publish or broadcast, or cause to be published or broadcast, whether in print or broadcast media, or show or exhibit the photo or video coverage or recordings of such sexual act or any similar activity through VCD/DVD, internet, cellular phones and other similar means or device.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The prohibition under paragraphs (b), (c) and (d) shall apply notwithstanding that consent to record or take photo or video coverage of the same was given by such person/s. Any person who violates this provision shall be liable for photo or video voyeurism as defined herein.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The penalty of imprisonment of not less that three (3) years but not more than seven (7) years and a fine of not less than One hundred thousand pesos (P100,000.00) but not more than Five hundred thousand pesos (P500,000.00), or both, at the discretion of the court shall be imposed upon any person found guilty of violating Section 4 of this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the violator is a juridical person, its license or franchise shall be automatically be deemed revoked and the persons liable shall be the officers thereof including the editor and reporter in the case of print media, and the station manager, editor and broadcaster in the case of a broadcast media.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If the offender is a public officer or employee, or a professional, he/she shall be administratively liable.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If the offender is an alien, he/she shall be subject to deportation proceedings after serving his/her sentence and payment of fines.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943112"&gt;&lt;/a&gt;&lt;strong&gt;Israel&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://mfa.gov.il/MFA/AboutIsrael/State/Law/Pages/Prevention_of_Sexual_Harassment_Law_5758-1998.aspx"&gt;Prevention of Sexual Harassment Law, 5758-1998 amended in 2014&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The distribution of still pictures or video recordings of a person’s image that focuses on his/her sexuality, including by editing or incorporation, is unlawful if made:&lt;/p&gt;
&lt;p&gt;1. without the person’s consent;&lt;/p&gt;
&lt;p&gt;2. in a way that facilitates identification of the person; and&lt;/p&gt;
&lt;p&gt;3. under circumstances that may degrade or shame him/her&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The distribution of such an image constitutes sexual harassment under section 3(a) of the Prevention of Sexual Harassment Law and intentional harm to a person’s privacy under section 5 of the Protection of Privacy Law.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The crimes are punishable with five years of imprisonment, in addition to subjecting the perpetrator to civil liability and the duty to pay monetary compensation to the victim.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="_Toc511943113"&gt;&lt;/a&gt;&lt;strong&gt;Japan&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="http://www.loc.gov/law/foreign-news/article/japan-new-revenge-porn-prevention-act/"&gt;Act on Prevention of Damage by Provision of Private Sexual Image Records Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;It criminalizes the provision of a private sexual image of another person without the person’s approval via a means of telecommunication to an unspecified number of or to many people.&lt;/p&gt;
&lt;p&gt;It allows Internet service providers to delete suspected revenge porn images without the uploader’s consent, in cases where:&lt;/p&gt;
&lt;p&gt;1. the victim had notified the provider of the existence of the image;&lt;/p&gt;
&lt;p&gt;2. the provider had requested the consent of the uploader to delete the image; and&lt;/p&gt;
&lt;p&gt;3. the uploader did not respond or delete the image.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A maximum sentence of 500,000 yen or three years in jail.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The Act also obligates the national and local governments to ease victims’ embarrassment when they report the crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For especially young potential victims, the Act further obligates the governments to educate people on how to avoid revenge porn.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world'&gt;https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shradha Nigam</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Revenge Porn</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-25T16:58:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp">
    <title>What’s up with WhatsApp?</title>
    <link>https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp</link>
    <description>
        &lt;b&gt;In 2016, WhatsApp Inc announced it was rolling out end-to-end encryption, but is the company doing what it claims to be doing?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aayush Rathi and Sunil Abraham was published in &lt;a class="external-link" href="http://www.atimes.com/article/whats-up-with-whatsapp/"&gt;Asia Times&lt;/a&gt; on April 20, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Back in April 2016, when WhatsApp Inc announced it was rolling out end-to-end encryption (E2EE) for its billion-plus strong user base as a default setting, the messaging behemoth signaled to its users it was at the forefront of providing technological solutions to protect privacy.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Emphasized in the security white paper explaining the implementation of the technology is the encryption of both forms of communication – one-to-one and group and also of all types of messages shared within such communications – text as well as media.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Simply put, all communication taking place over WhatsApp would be decipherable only to the sender and recipient – it would be virtual gibberish even to WhatsApp.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;This announcement came in the backdrop of &lt;a href="https://www.theguardian.com/us-news/2016/feb/17/apple-ordered-to-hack-iphone-of-san-bernardino-shooter-for-fbi"&gt;Apple locking horns with the FBI&lt;/a&gt; after being asked to provide a backdoor to unlock the San Bernardino mass shooter’s iPhone. This further reinforced WhatsApp Inc’s stand on the ensuing debate between the interplay of privacy and security in the digital age.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Kudos to WhatsApp, for there is &lt;a href="http://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/CallForSubmission.aspx"&gt;growing discussion&lt;/a&gt; around how encryption and anonymity is central to enabling secure online communication which in turn is integral to essential human rights such as those of freedom of opinion and expression.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;WhatsApp may have taken encryption to the masses, but here we outline why WhatsApp’s provisioning of privacy and security measures needs a more granular analysis – is the company doing what it claims to be doing? Security issues with WhatsApp’s messaging protocol certainly are not new.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Man-in-the-middle attacks&lt;/h3&gt;
&lt;p class="p4" style="text-align: justify; "&gt;A &lt;a href="https://eprint.iacr.org/2017/713.pdf"&gt;study&lt;/a&gt; published by a group of German researchers from Ruhr University highlighted issues with WhatsApp’s implementation of its E2EE protocol to group communications. Another &lt;a href="https://courses.csail.mit.edu/6.857/2016/files/36.pdf"&gt;paper&lt;/a&gt; points out how WhatsApp’s session establishment strategy itself could be problematic and potentially be targeted for what are called man-in-the-middle (MITM) attacks.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;An MITM attack takes the form of a malicious actor, as the term suggests, placing itself between the communicating parties to eavesdrop or impersonate. The Electronic Frontier Foundation also &lt;a href="https://www.eff.org/deeplinks/2016/10/where-whatsapp-went-wrong-effs-four-biggest-security-concerns"&gt;highlighted&lt;/a&gt; other security vulnerabilities, or trade-offs, depending upon ideological inclinations, with respect to WhatsApp allowing for storage of unencrypted backups, issues with WhatsApp’s web client and also with its approach to cryptographic key change notifications.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Much has been written questioning WhatsApp’s shifting approach to ensuring privacy too. Quoting straight from &lt;a href="https://www.whatsapp.com/legal/#privacy-policy-affiliated-companies"&gt;WhatsApp’s Privacy Policy:&lt;/a&gt; “We joined the Facebook family of companies in 2014. As part of the Facebook family of companies, WhatsApp receives information from, and shares information with, this family of companies.” Speaking of Facebook …&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Culling out larger issues with WhatsApp’s privacy policies is not the intention here. What we specifically seek to explore is right at the nexus of WhatsApp’s security and privacy provisioning clashing with its marketing strategy: the storage of data on WhatsApp’s servers, or ‘blobs,’ as they are referred to in the technical paper. Facebook’s rather. In WhatsApp’s words: “Once your messages (including your chats, photos, videos, voice messages, files and share location information) are delivered, they are deleted from our servers. Your messages are stored on your own device.”&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;In fact, this non-storage of data on their ‘blobs’ is emphasizes at several other points on the official website. Let us call this the deletion-upon-delivery model.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A simple experiment&lt;/h3&gt;
&lt;p class="p4" style="text-align: justify; "&gt;While drawing up a rigorous proof of concept, made near-impossible thanks to WhatsApp being a closed source messaging protocol, a simple experiment is enough to raise some very pertinent questions about WhatsApp’s outlined deletion-upon-delivery model. It should, however, be mentioned that the Signal Protocol developed by Open Whisper Systems and pivotal in WhatsApp’s rolling out of E2EE is &lt;a href="https://github.com/signalapp"&gt;open source&lt;/a&gt;. Here is how the experiment proceeds:&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Rick sends Morty an attachment.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Morty then switches off the data on her mobile device.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Rick downloads the attachment, an image.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Subsequently, Rick deletes the image from his mobile device’s internal storage.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Rick then logs into a WhatsApp’s web client on his browser. (Prior to this experiment, both Rick and Morty had logged out from all instances of the web client)&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Upon a fresh log-in to the web client and opening the chat with Morty, the option to download the image is available to Rick.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;The experiment concludes with bewilderment at WhatsApp’s claim of deletion-upon-delivery as outlined earlier. The only place from which Morty could have downloaded the image would be from Facebook’s ‘blobs.’ The attachment could not have been retrieved from Morty’s mobile device as it had no way of sending data and neither from Rick’s mobile device as it no longer existed in the device’s storage.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;As per the Privacy Policy, the data is stored on the ‘blobs’ for a period of 30 days after transmission of a message only when it can’t be delivered to the recipient. Upon delivery, the deletion-upon-delivery model is supposed to kick in.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Another straightforward experiment that leads to a similar conclusion is seeing the difference in time taken for a large attachment to be forwarded as opposed to when the same large attachment is uploaded. Forwarding is palpably quicker than uploading afresh: non-storage of attachments on the ‘blob’ would entail that the same amount should be taken for both.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;The plot thickens. WhatsApp’s Privacy Policy goes on to state: “To improve performance and deliver media messages more efficiently, such as when many people are sharing a popular photo or video, we may retain that content on our servers for a longer period of time.”  The technical paper offers no help in understanding how WhatsApp systems assess frequently shared encrypted media messages without decrypting it at its end.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;A possible explanation could be the usage of metadata by WhatsApp, which it discloses in its Privacy Policy while simultaneously being sufficiently vague about the specifics of it. That WhatsApp may be capable of reading encrypted communication through the inclusion of a backdoor bodes well for law enforcement, but not so much for unsuspecting users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The weakest link in the chain&lt;/h3&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Concerns about backdoors in WhatsApp’s product have led the French government to start developing their &lt;a href="https://www.reuters.com/article/us-france-privacy/france-builds-whatsapp-rival-due-to-surveillance-risk-idUSKBN1HN258"&gt;own encrypted messaging service&lt;/a&gt;. This will be built using Matrix – an open protocol designed for real-time communication. Indeed, the Privacy Policy lays out that the company “may collect, use, preserve, and share your information if we have a good-faith belief that it is reasonably necessary to respond pursuant to applicable law or regulations, to legal process, or to government requests.”&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;The Signal Protocol is the undisputed gold standard of E2EE implementations. It is the integration with the surrounding functionality that WhatsApp offers which leads to vulnerabilities. After all, a chain is only as strong as its weakest link. Assuming that the attachments stored on the ‘blobs’ are in encrypted form, indecipherable to all but the intended recipients, this does not pose a privacy risk for the users from a technological point of view.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;However, it is easy lose sight of the fact that the Privacy Policy is a legally binding document and it specifically states that messages are not stored on the ‘blobs’ as a matter of routine. As a side note, WhatsApp’s Privacy Policy and Terms of Service are refreshing in their readability and lack of legalese.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;As we were putting the final touches to this piece, &lt;a href="https://wabetainfo.com/whatsapp-allows-to-redownload-deleted-media/#more-2781"&gt;news from &lt;i&gt;WABetaInfo&lt;/i&gt;&lt;/a&gt;, a well-reputed source of information on WhatsApp features, has broken that newer updates of WhatsApp for Android are permitting users to re-download media deleted up to three months back. WhatsApp cannot possibly achieve this without storing the media in the ‘blobs,’ or in other words, in violation of its Privacy Policy.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;As the aphorism goes: “When the service is free, you are the product.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp'&gt;https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Sunil Abraham</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2018-04-23T16:45:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act">
    <title>Comments on the  Draft Digital Information Security in Healthcare Act </title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society submitted comments to the Ministry of Health &amp; Family Welfare, Government of India on the draft Digital Information Security in Healthcare Act on April 21, 2018.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the Draft Digital Information Security in Healthcare Act, released by Ministry of Health &amp;amp; Family Welfare, Government of India. CIS has conducted research on the issues of privacy, data protection and data security since 2010 and is thankful for the opportunity to put forth its views. This submission was made on April 21, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/comments-on-draft-digital-information-security-in-healthcare-act"&gt;Download the full submission here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha and Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    

   <dc:date>2018-05-01T02:05:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill">
    <title>A look at two problematic provisions of the draft Anti-trafficking bill</title>
    <link>https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill</link>
    <description>
        &lt;b&gt;This post examines two badly drafted provisions of the new Anti-Trafficking bill that have the potential to severely impinge upon the Freedom of Expression, including through a misunderstanding of intermediary liability. &lt;/b&gt;
        
&lt;p style="text-align: justify;" class="normal"&gt;On 28 Feb 2018, the Union Cabinet approved                   ‘The Trafficking of Persons (Prevention, Protection                   and Rehabilitation) Bill, 2018’ (‘the bill’) for                   introduction to the Parliament. This comes after a                   series of consultations on an earlier 2016 draft bill,                   that had faced its fair share of &lt;a href="https://scroll.in/article/813268/six-counts-on-which-the-draft-anti-trafficking-bill-fails-short" target="_blank"&gt;criticism&lt;/a&gt;. As per the Press Information Bureau &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=176878" target="_blank"&gt;announcement&lt;/a&gt;, the Ministry of Women and Child                   Development met with various stakeholders including 60                   NGOs and have incorporated many of the suggestions put                   forth. They’ve also stated that ‘the new law will make                   India a leader among South Asian countries to combat                   trafficking.’&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;However, at first glance, there appear to be                   several issues with overbroad or vague language used                   in the drafting of the bill, that stretch it into                   potentially problematic areas. This current post will                   focus on two such provisions that could lead to a                   deleterious effect on the Freedom of Expression. As                   the bill is currently not publicly available, a                   stakeholder’s copy of the draft is being used to                   source these provisions. The relevant sections have                   been reproduced below for convenience. (Emphasis in                   bold is as provided by the author).&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;Section                     39: Buying or Selling of any person&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;39. (l) Whoever buys or sells any person                     for a consideration, shall be punished with rigorous                     imprisonment for a term which shall not be less than                     seven years but may extend to ten years, and shall                     also be liable to fine which shall not be less than                     one lakh rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;(2) Whoever solicits or publicises                     electronically, taking or distributing obscene                     photographs or videos or providing materials or                     soliciting or guiding tourists or using agents or                     any other form &lt;strong&gt;which may lead                       to the trafficking of a person shall be punished&lt;/strong&gt; with rigorous imprisonment for a term which shall                     not be less than five years but may extend to ten                     years, and shall also be liable to fine which shall                     not be less than fifty thousand rupees but which may                     extend to one lakh rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The grammatical acrobatics of section 39(2)                   aside, this anti-solicitation provision is severely                   problematic in that it mandates punishment even for a                   vaguely defined action or actions that may not                   actually be connected to the trafficking of a person.                   In other words, the provision doesn’t require any of                   the actions to be connected to trafficking in their                   intent or even outcome, but only in &lt;em&gt;potential&lt;/em&gt; &lt;em&gt;connection&lt;/em&gt; to the outcome. At the same time, it says these                   ‘shall’ be punished!&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;This vagary that ignores actual or even                   probabilistic causation flies in the face of standard                   criminal law which requires &lt;em&gt;mens rea&lt;/em&gt; along with &lt;em&gt;actus                     rea&lt;/em&gt;. The excessively wide scope of this badly                   drafted provision leaves it prone to abuse. For                   example, currently the provision allows the following                   interpretation to be included: ‘Whoever publicizes                   electronically, by providing materials in any form,                   which may lead to trafficking of a person shall be                   punished…’. Even the electronic publicizing of an                   academic study on trafficking could fall under the                   provision as it currently reads, if it is argued that                   publishing studies that show the prevalence of                   trafficking ‘may lead to the trafficking of a person’!                   It is not hard to imagine that an academic study that                   shows trafficking numbers at embarrassingly high rates                   could be threatened with this provision. Similarly,                   any of our vast number of self-appointed moral                   guardians could also pull within this provision any                   artistic work that they may personally find offensive                   or ‘obscene’. Simply put, without any burden of                   showing a causal connect, it could be argued that &lt;em&gt;anything&lt;/em&gt; ‘may                   lead’ to the trafficking of a person. Needless to say,                   this paves the way for a severe chilling effect on                   free speech, especially on critical speech around                   trafficking issues.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;Section 41: Offences related to media&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;41. (l) Whoever commits trafficking of a                     person with the aid of media, including, but not                     limited to print, internet, digital or electronic                     media, shall be punished with rigorous imprisonment                     for a term which shall not be less than seven years                     but may extend to ten years and shall also be liable                     to fine which shall not be less than one lakh                     rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;(2) Whoever &lt;strong&gt;distributes,                       or sells or stores&lt;/strong&gt;, in any form in any                     electronic or printed form showing incidence of                     sexual exploitation, sexual assault, or rape for the                     purpose of exploitation or for coercion of the                     victim or his family members, or for unlawful gain &lt;strong&gt;shall be                       punished&lt;/strong&gt; with rigorous imprisonment for a term                     which shall not be less than three years but may                     extend to seven years and shall also be liable to                     fine which shall not be less than one lakh rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The drafters of this bill have perhaps                   overlooked the fact that unlike the physical world,                   the infrastructure of the electronic / digital world                   requires 3rd party intermediaries to handle                   information during most forms of electronic                   activities, whether it is transmission, storage or                   display. As it is not feasible, desirable or even                   practically possible for intermediaries to verify the                   legality of every bit of data that gets transferred or                   stored by the intermediary, ‘safe harbours’ are                   provided in law for intermediaries, protecting them                   from liability of the information being transmitted                   through them. These ensure that entities that act as                   architectural requirements and intermediary platforms                   are able to operate smoothly and without fear. If                   intermediaries are not granted this protection, it                   puts them in the unenviable position of having to                   monitor un-monitorable amounts of data, and face legal                   action for the slip-ups that are bound to happen                   regularly. Furthermore, there are several levels of                   free speech and privacy issues associated with having                   multiple gatekeepers on the expression of speech                   online. A charitable reading of the intent of a                   provision which does not recognise safe harbours for                   3rd party intermediaries, would be that the drafters                   of the bill have simply not realised that users who                   upload and initiate transfer of information online,                   are not the same parties who do the actual                   transmission of the information.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Distribution, selling or storing of                   information online would require the transmission of                   information over intermediaries, as well as the                   temporary storage of such information on intermediary                   platforms. In India, intermediaries engaging with                   transmission or temporary storage of information are                   provided safe harbour&lt;a href="imap://prasad@mail.cis-india.org:143/fetch%3EUID%3E/INBOX%3E176833#_ftn1"&gt;[1]&lt;/a&gt; by Section 79 of the Information Technology Act, 2000                   (‘IT Act’), so long as they:&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;(i) act as a mere ‘conduit’ and do not                   initiate the transmission, select the receiver of the                   transmission, or select or modify the information                   contained in the transmission.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;(ii) exercise due diligence while                   discharging duties under this Act, and observes other                   guidelines that the Central Government may prescribe.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The Information Technology (Intermediary                   Guidelines) Rules, 2011, list out the nature of the                   due diligence to be followed by intermediaries to                   claim exemption under Section 79 of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Intermediaries will not be granted safe                   harbour if they have conspired, abetted, aided or                   induced commission of the unlawful act, or if they do                   not remove or disable access to information upon                   receiving actual knowledge, or notice from the                   Government, of the information that is transmitted or                   stored by the intermediary being used for unlawful                   purposes.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Thus it can be seen that the IT Act already                   provides an in-depth regime for intermediary                   liability, and given its &lt;em&gt;non-obstante &lt;/em&gt;clause                   which states that Section 79 of the IT Act would apply                   “Notwithstanding anything contained in any law for the                   time being in force” ,&amp;nbsp;                   as well as the reiteration of the IT Act’s                   overriding effect via Section 81, which states that                   the provisions of the Act ‘shall have effect                   notwithstanding anything inconsistent therewith                   contained in any other law for the time being in                   force’ (barring the exercise of copyright or patent                   rights), it is generally considered the appropriate                   legal framework for this issue. However, it appears                   that the drafters of the 2018 Anti-trafficking bill                   have not considered this aspect at all, since they                   have not referenced the IT Act in this context in the                   bill, and have additionally added their own &lt;em&gt;non-obstante &lt;/em&gt;clause                   in Section 59 of the bill:&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;59.&lt;em&gt; The provisions                     of this Act, shall be in addition to and not in                     derogation of the provisions of any other law for                     the time being in force and, in case of any                     inconsistency, the provisions of this Act shall have                     overriding effect on the provisions of any such law                     to the extent of the inconsistency.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;So the regime as prescribed by the IT Act                   allows for safe harbours, whereas the regime as                   prescribed by the Anti-Trafficking bill does not allow                   for safe harbours, and both say that they would an                   overriding effect for any conflicting law. This                   legislative bumble could potentially be solved by                   using the settled principle that a special Act                   prevails over a general legislation. This is still a                   little tricky as they are technically both special                   Acts. It could be argued that given the context of the                   Anti-trafficking bill as focusing on trafficking, and                   the context of the IT Act focusing on the interface of                   law and technology, that for the purposes of Section                   41(2) of the Anti-trafficking bill, the IT Act is the                   special legislation. And thus Section 79 of the IT Act                   should make redundant the relevant portion of Section                   41(2) of the Anti-trafficking bill. This reading would                   require the bill to be modified so as to remove the                   redundancy and the conflicting portion of Section                   41(2).&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;[1] In 2016, a division bench of the Delhi High Court held in the case of Myspace Inc vs Super Cassettes Industries Ltd that a safe harbour immunity for intermediaries was necessary as it was not technically feasible to pre-screen content from third parties, and that tasking intermediaries with this responsibility could have a chilling effect on free speech, It held that their responsibility was limited to the extent of acting upon receiving ‘actual knowledge’. Earlier, in determining what ‘actual knowledge’ refers to, in 2015 the Supreme Court of India in the landmark case of Shreya Singhal vs Union of India, required this to be in the form of a notice via a court or government order. Thus under our current law, intermediaries are granted a safe harbour from liability so long as they act upon court or government orders which notify them of content that is required to be taken down.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Clarification (18th August, 2018): A letter sent to the Ministry of Women and Child Development mentioned the Centre for Internet &amp;amp; Society as instituionally endorsing a critique of the The Trafficking of Persons (Prevention, Protection and Rehabilitation) Bill, 2018. We seek to clarify that the Centre for Internet &amp;amp; Society did not endorse the letter to the Ministry.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill'&gt;https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>swaraj</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2018-08-18T09:21:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/jobs/vacancy-for-short-term-consultant-ietf">
    <title>Short-term Consultant (IETF)</title>
    <link>https://cis-india.org/jobs/vacancy-for-short-term-consultant-ietf</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society is seeking an individual with a strong understanding of IETF standards to work with us on writing 7 Human Rights Considerations for Internet standards and active drafts that are relevant to public interest. Additionally, the individual will help develop a longer term work-plan, expertise and approach for engagement in the IETF.&lt;/b&gt;
        &lt;p dir="ltr"&gt;Note: This position is consultancy based on output.&lt;/p&gt;
&lt;p dir="ltr"&gt;Compensation: Based on experience and output.&lt;/p&gt;
&lt;p dir="ltr"&gt;Application requirements: two writing samples or other examples of technical work and CV&lt;/p&gt;
&lt;p dir="ltr"&gt;Contact: sunil@cis-india.org&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/jobs/vacancy-for-short-term-consultant-ietf'&gt;https://cis-india.org/jobs/vacancy-for-short-term-consultant-ietf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Jobs</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-21T15:44:49Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/jobs/vacancy-for-short-term-consultant-cyber-security">
    <title>Short-term Consultant (Cyber Security)</title>
    <link>https://cis-india.org/jobs/vacancy-for-short-term-consultant-cyber-security</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society is seeking an individual with strong understanding of cyber security to contribute research to its cyber security research under its Internet Governance programme.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Research topics include economic incentives for cyber security, cross border sharing of data, India’s cyber security framework, and cybersecurity dimensions of e-governance .&lt;/p&gt;
&lt;p dir="ltr"&gt;Note: This position is consultancy based on output.&lt;/p&gt;
&lt;p dir="ltr"&gt;Compensation: Based on experience and output.&lt;/p&gt;
&lt;p dir="ltr"&gt;Application requirements: two writing samples and CV&lt;/p&gt;
&lt;p dir="ltr"&gt;Contact: &lt;a href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/jobs/vacancy-for-short-term-consultant-cyber-security'&gt;https://cis-india.org/jobs/vacancy-for-short-term-consultant-cyber-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-20T01:27:36Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/artificial-intelligence-in-governance-a-report-of-the-roundtable-held-in-new-delhi">
    <title>Artificial Intelligence in Governance: A Report of the Roundtable held in New Delhi</title>
    <link>https://cis-india.org/internet-governance/blog/artificial-intelligence-in-governance-a-report-of-the-roundtable-held-in-new-delhi</link>
    <description>
        &lt;b&gt;This Report provides an overview of the proceedings of the Roundtable on Artificial Intelligence (AI) in Governance, conducted at the Indian Islamic Cultural Centre, in New Delhi on March 16, 2018. The main purpose of the Roundtable was to discuss the deployment and implementation of AI in various aspects of governance within the Indian context. This report summarises the discussions on the development and implementation of AI in various aspects of governance in India. The event was attended by participants from academia, civil society, the legal sector, the finance sector, and the government.&lt;/b&gt;
        &lt;p&gt;&lt;span&gt;Event Report: &lt;/span&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/files/ai-in-governance"&gt;Download&lt;/a&gt;&lt;span&gt; (PDF)&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This report provides a summary of the proceedings of the Roundtable on Artificial Intelligence (AI) in Governance (hereinafter referred to as ‘the Roundtable’). The Roundtable took place at the India Islamic Cultural Centre in New Delhi on March 16, 2018 and included participation  from academia, civil society, law, finance, and government. The main purpose of the Roundtable was to discuss the deployment and implementation of AI in various aspects of governance within the Indian context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Roundtable began with a presentation by Amber Sinha (Centre for Internet and Society - CIS) providing an overview of the CIS’s research objectives and findings thus far. During this presentation, he defined both AI and the scope of CIS’s research, outlining the areas of law enforcement, defense, education, judicial decision making, and the discharging of administrative functions as the main areas of concerns for the study. The presentation then outlined the key AI deployments and implementations that have been identified by the research in each of these areas. Lastly, the presentation raised some of the ethical and legal concerns related to this phenomenon.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The presentation was followed by the Roundtable discussion that saw various topics in regards to the usages, challenges, ethical considerations and implications of AI in the sector being discussed. This report has identified a number of key themes of importance evident throughout these discussions.These themes include: (1) the meaning and scope of AI, (2) AI’s sectoral applications, (3) human involvement with automated decision making, (4) social and power relations surrounding AI, (5) regulatory approaches to AI and, (6) challenges to adopting AI. These themes in relation to the Roundtable are explored further below.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Meaning and Scope of AI&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-7edcf822-2698-f1fd-35d3-0bcc913c986a"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;One of the first tasks recommended by the group of participants was to define the meaning and scope of AI and the way those terms are used and adopted today. These concerns included the need to establish a distinction between the use of algorithms, machine learning, automation and artificial intelligence. Several participants believed that establishing consensus around these terms was essential before proceeding towards a stage of developing regulatory frameworks around them.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The general fact agreed to was that AI as we understand it does not necessarily extend to complete independence in terms of automated decision making but it refers instead to the varying levels of machine learning (ML), and the automation of certain processes that has already been achieved. Several concerns that emerged during the course of the discussion centred around the question of autonomy and transparency in the process of ML and algorithmic processing. Stakeholders recommended that over and above the debates of humans in the loop [1] on the loop [2] and out of the loop, [3] there were several other gaps with respect to AI and its usage in the industry today which also need to be considered before building a roadmap for future usage. Key issues like information asymmetries, communication lags, a lack of transparency, the increased mystification of the coding process and the centralization of power all needed to be examined and analysed under the rubric of developing regulatory frameworks.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Takeaway Point: The group brought out the need for standardization of terminology as well as the establishment of globally replicable standards surrounding the usage, control and proliferation of AI. The discussion also brought up the problems with universal applicability of norms. One of the participants brought up an issue regarding the lack of normative frameworks around the usage and proliferation of AI. Another participant responded to the concern by alluding to the Asilomar AI principles.[4] The Asilomar AI principles are a set of 23 principles aimed at directing and shaping AI research in the future. The discussion brought out further issues regarding the enforceability as well universal applicability of the principles and their global relevance as well. Participants recommended the development of a shorter, more universally applicable regulatory framework that could address various contextual limitations as well.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;AI Sectoral Applications&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;Participants mentioned a number of both current and potential applications of AI technologies, referencing the defence sector, the financial sector, and the agriculture sector. There are several developments taking place on the Indian military front with the Committee on AI and National Security being established by the Ministry of Defence. Through the course of the discussion it was also stated that the Indian Armed Forces were very interested in the possibilities of using AI for their own strategic and tactical purposes. From a technological standpoint, however, there has been limited progress in India in researching and developing AI. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;While India does deploy some Unmanned Aerial Vehicles (UAVs), they are mostly bought from Israel, and often are not autonomous. It was also pointed out that contrary to reportage in the media, the defence establishment in India is extremely cautious about the adoption of autonomous weapons systems, and that the autonomous technology being rolled out by the CAIR is not yet considered trustworthy enough for deployment.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Discussions further revealed that the few technologies that have a relative degree of autonomy are primarily loitering ammunitions and are used to target radar insulations for reconnaissance purposes. One participant mentioned that while most militaries are interested in deploying AI, it is primarily from an Intelligence, Surveillance and Reconnaissance (ISR) perspective. The only exception to this generalization is China where the military ethos and command structure would work better with increased reliance on independent AI systems. One major AI system rolled out by the US is Project Maven which is primarily an ISR system. The aim of using these systems is to improve decision making and enhance data analysis particularly since battlefields generate a lot of data that isn’t used anywhere.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Another sector discussed was the securities market where algorithms were used from an analytical and data collection perspective. A participant referred to the fact that machine learning was being used for processes like credit and trade scoring -- all with humans on the loop. The participant further suggested that while trade scoring was increasingly automated, the overall predictive nature of such technologies remained within a self limiting capacity wherein statistical models, collected data and pattern analysis were used to predict future trends. The participant questioned whether these algorithms could be considered as AI in the truest sense of the term since they primarily performed statistical functions and data analysis.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;One participant also recommended the application of AI to sectors like agriculture with the intention of gradually acclimatizing users to the technology itself. Respondents also stated that while AI technologies were being used in the agricultural space it was primarily from the standpoint of data collection and analysis as opposed to predictive methods. It was mentioned that a challenge to the broad adoption of AI in this sector is the core problem of adopting AI as a methodology – namely information asymmetries, excessive data collection, limited control/centralization and the obfuscatory nature of code – would not be addressed/modified. Lastly, participants also suggested that within the Indian framework not much was being done aside from addressing farmers’ queries and analysing the data from those concerns.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Takeaway Point: The discussion drew attention to the various sectors where AI was currently being used -- such as the military space, agricultural development and the securities market -- as well as potential spaces of application -- such as healthcare and manual scavenging. The key challenges that emerged were information asymmetries with respect to the usage of these technologies as well as limited capacity in terms of technological advancement.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Human Involvement with Automated Decision Making&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Large parts of discussions throughout the Roundtable event were preoccupied with automated decision making and specifically, the involvement of humans (human on and in the loop) or lack thereof (human out of the loop) in this process. These discussions often took place with considerations of AI for prescriptive and descriptive uses.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Participants expressed that human involvement was not needed when AI was being used for descriptive uses, such as determining relationships between various variables in large data sets. Many agreed to the superior ability of ML and similar AI technologies in describing large and unorganized datasets. It was the prescriptive uses of AI where participants saw the need for human involvement, with many questioning the technology making more important decisions by itself.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The need for human involvement in automated decision making was further justified by references to various instances of algorithmic bias in the American context. One participant, for example, brought up the use of algorithmic decision making by a school board in the United States for human resource practices (hirings, firing, etc.) based on the standardized test scores of students. In this instance, such practices resulted in the termination of teachers primarily from low income neighbourhoods.[5] The main challenge participants identified in regards to human on the loop automated decision making is the issue of capacity, as significant training would have to be achieved for sectors to have employees actively involved in the automated decision making workflow.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;An example in the context of the healthcare field was brought up by one participant arguing for human in the loop in regards to prescriptive scenarios. The participant suggested that AI technology, when given x-ray or MRI data for example, should only be limited to pointing out the correlations of diseases with patients’ scans/x-rays. Analysis of such correlations should be reserved for the medical expertise of doctors who would then determine if any instances of causality can be identified from this data and if it’s appropriate for diagnosing patients.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;It was emphasized that, despite a preference for human on/in the loop in regards to automated decision making, there is a need to be cognisant of techno-solutionism due to the human tendency of over reliance on technology when making decisions. A need for command and control structures and protocols was emphasized for various governance sectors in order to avoid potentially disastrous results through a checks and balances system. It was noted that the defense sector has already developed such protocols, having established a chain of command due to its long history of algorithmic decision making (e.g. the Aegis Combat System being used by the US Navy in the 1980s).&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;One key reason why militaries prefer human in and on the loop systems as opposed to out of the loop systems is because of the protocol associated with human action on the battlefield. International Humanitarian Law has clear indicators of what constitutes a war crime and who is to be held responsible in the scenario but developing such a framework with AI systems would be challenging as it would be difficult to determine which party ought to be held accountable in the case of a transgression or a mistake.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Takeaway Point: It was reiterated by many participants that neither AI technology or India’s regulatory framework is at a point where AI can be trusted to make significant decisions alone -- especially when such decisions are evaluating humans directly. It was recommended that human out of the loop decision making should be reserved for descriptive practices whereas human on and in the loop decision making should be used for prescriptive practices. Lastly, it was also suggested that appropriate protocols be put in place to direct those involved in the automated decision making workflow. Particularly when the process involves judgements and complex decision making in sectors such as jurisprudence and the military.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;The Social and Power Relations Surrounding AI&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some participants emphasized the need to contextualize discussions of AI and governance within larger themes of poverty, global capital and power/social relations. Their concerns were that the use of AI technologies would only create and reinforce existing power structures and should instead be utilized towards ameliorating such issues. Manual scavenging, for example, was identified as an area where AI could be used to good effect if coupled with larger socio-political policy changes. There are several hierarchies that could potentially be reinforced through this process and all these failings needed to be examined thoroughly before such a system was adopted and incorporated within the real world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore the discussion also revealed that the objectivity attributed to AI and ML tends to gloss over the fact that there are nonetheless implicit biases that exist in the minds of the creators that might work themselves into the code. Fears regarding technology recreating a more exclusionary system were not entirely unfounded as participants pointed out the fact that the knowledge base of the user would determine whether technology was used as a tool of centralization or democratization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One participant also questioned the concept of governance itself, contrasting the Indian government’s usage of the term in the 1950s (as it appears in the Directive Principle) with that of the World Bank in the 1990s.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some participants emphasized the need to contextualize discussions of AI and governance within larger themes of poverty, global capital and power/social relations. Their concerns were that the use of AI technologies would only create and reinforce existing power structures and should instead be utilized towards ameliorating such issues. Manual scavenging, for example, was identified as an area where AI could be used to good effect if coupled with larger socio-political policy changes. There are several hierarchies that could potentially be reinforced through this process and all these failings needed to be examined thoroughly before such a system was adopted and incorporated within the real world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Furthermore the discussion also revealed that the objectivity attributed to AI and ML tends to gloss over the fact that there are nonetheless implicit biases that exist in the minds of the creators that might work themselves into the code. Fears regarding technology recreating a more exclusionary system were not entirely unfounded as participants pointed out the fact that the knowledge base of the user would determine whether technology was used as a tool of centralization or democratization. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;One participant also questioned the concept of governance itself, contrasting the Indian government’s usage of the term in the 1950s (as it appears in the Directive Principle) with that of the World Bank in the 1990s. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Takeaway Point: Discussions of the implementation and deployment of AI within the governance landscape should attempt to take into consideration larger power relations and concepts of equity.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Regulatory Approaches to AI&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Many recognized the need for AI-specific regulations across Indian sectors, including governance. These regulations, participants stated, should draw from notions of accountability, algorithmic transparency and efficiency. Furthermore, it was also stated that such regulations should consider the variations across the different legs of the governance sector, especially in regards to defence. One participant, pointing to the larger trends towards automation, recommended the establishment of certain fundamental guidelines aimed at directing the applicability of AI in general. The participant drew attention to the need for a robust evaluation system for various sectors (the criminal justice system, the securities market, etc.) as a way of providing checks on algorithmic biases. Another emphasized for the need of regulations for better quality data as to ensure machine readability and processiblity for various AI systems.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Another key point that emerged was the importance of examining how specific algorithms performed processes like identification or detection. A participant recommended the need to examine the ways in which machines identify humans and what categories/biases could infiltrate machine-judgement. They reiterated that if a new element was introduced in the system, the pre-existing variables would be impacted as well. The participant further recommended that it would be useful to look at these systems in terms of the couplings that get created in order to determine what kinds of relations are fostered within that system.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The roundtable saw some debate regarding the most appropriate approach to developing such regulations. Some participants argued for a harms-based approach, particularly in regards to determining if regulations are needed all together for specific sectors (as opposed to guidelines, best practices, etc.). The need to be cognisant of both individual and structural harms was emphasized, mindful of the possibility of algorithmic biases affecting traditionally marginalized groups.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Others only saw value in a harms based approach insomuch that it could help outline the appropriate penalties in an event of regulations being violated, arguing instead for a rights-based approach as it enabled greater room for technological changes. An approach that kept in mind emerging AI technologies was reiterated by a number of participants as being crucial to any regulatory framework. The need for a regulatory space that allowed for technological experimentation without the fear of constitutional violation was also communicated.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Takeaway Point: The need for a AI-specific regulatory framework cognisant of differentiations across sectors in India was emphasized. There is some debate about the most appropriate approach for such a framework, a harms-based approach being identified by many as providing the best perspective on regulatory need and penalties. Some identified the rights-based approach as providing the most flexibility for an rapidly evolving technological landscape.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Challenges to Adopting AI&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Out of all the concerns regarding the adoption of algorithms, ML and AI, the two key points of resistance that emerged, centred around issues of accountability and transparency. Participants suggested that within an AI system, predictability would be a key concern, and in the absence of predictable outcomes, establishing redressal mechanisms would pose key challenges as well.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p id="_mcePaste"&gt;A discussion was also initiated regarding the problems involved in attributing responsibility within the AI chain as well as the need to demystify the process of using AI in daily life. While reiterating the current landscape, participants spoke about how the usage of AI is currently limited to the automation of certain tasks and processes in certain sectors where algorithmic processing is primarily used as a tool of data collection and analysis as opposed to an independent decision making tool.&lt;/p&gt;
&lt;div id="_mcePaste"&gt;&lt;/div&gt;
&lt;p id="_mcePaste"&gt;One of the suggestions and thought points that emerged during the discussion was whether a gradual adoption of AI on a sectoral basis might be more beneficial as it would provide breathing room in the middle to test the system and establish trust between the developers, providers, and consumers. This prompted a debate about the controllers and the consumers of AI and how the gap between the two would need to be negotiated. The debate also brought up larger concerns regarding the mystification of AI as a process itself and the complications of translating the code into communicable points of intervention.&lt;/p&gt;
&lt;div id="_mcePaste"&gt;&lt;/div&gt;
&lt;p id="_mcePaste"&gt;Another major issue that emerged was the question of attribution of responsibility in the case of mistakes. In the legal process as it currently exists, human imperfections notwithstanding, it would be possible to attribute the blame for decisions taken to certain actants undertaking the action. Similarly in the defence sector, it would be possible to trace the chain of command and identify key points of failure, but in the case of AI based judgements, it would be difficult to place responsibility or blame. This observation led to a debate regarding accountability in the AI chain. It was inconclusive whether the error should be attributed to the developer, the distributor or the consumer.&lt;/p&gt;
&lt;div id="_mcePaste"&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;A suggestion that was offered in order to counter the information asymmetry as well as reduce the mystification of computational method was to make the algorithm and its processes transparent. This sparked a debate, however, as participants stated that while such a state of transparency ought to be sought after and aspired towards, it would be accompanied by certain threats to the system. A key challenge that was pointed out was the fact that if the algorithm was made transparent, and its details were shared, there would be several ways to manipulate it, translate it and misuse it.&lt;/p&gt;
&lt;div id="_mcePaste"&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Another question that emerged was the distribution of AI technologies and the centralization of the proliferation process particularly in terms of service provision. One participant suggested that given the limited nature of research being undertaken and the paucity of resources, a limited number of companies would end up holding the best tech, the best resources and the best people. They further suggested that these technologies might end up being rolled out as a service on a contractual basis. In which case it would be important to track how the service was being controlled and delivered. Models of transference would become central points of negotiation with alternations between procurement based, lease based, and ownership based models of service delivery. Participants suggested that this was going to be a key factor in determining how to approach these issues from a legal and policy standpoint.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;A discussion was also initiated regarding the problems involved in attributing responsibility within the AI chain as well as the need to demystify the process of using AI in daily life. While reiterating the current landscape, participants spoke about how the usage of AI is currently limited to the automation of certain tasks and processes in certain sectors where algorithmic processing is primarily used as a tool of data collection and analysis as opposed to an independent decision making tool.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the suggestions and thought points that emerged during the discussion was whether a gradual adoption of AI on a sectoral basis might be more beneficial as it would provide breathing room in the middle to test the system and establish trust between the developers, providers, and consumers. This prompted a debate about the controllers and the consumers of AI and how the gap between the two would need to be negotiated. The debate also brought up larger concerns regarding the mystification of AI as a process itself and the complications of translating the code into communicable points of intervention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another major issue that emerged was the question of attribution of responsibility in the case of mistakes. In the legal process as it currently exists, human imperfections notwithstanding, it would be possible to attribute the blame for decisions taken to certain actants undertaking the action. Similarly in the defence sector, it would be possible to trace the chain of command and identify key points of failure, but in the case of AI based judgements, it would be difficult to place responsibility or blame. This observation led to a debate regarding accountability in the AI chain. It was inconclusive whether the error should be attributed to the developer, the distributor or the consumer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A suggestion that was offered in order to counter the information asymmetry as well as reduce the mystification of computational method was to make the algorithm and its processes transparent. This sparked a debate, however, as participants stated that while such a state of transparency ought to be sought after and aspired towards, it would be accompanied by certain threats to the system. A key challenge that was pointed out was the fact that if the algorithm was made transparent, and its details were shared, there would be several ways to manipulate it, translate it and misuse it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another question that emerged was the distribution of AI technologies and the centralization of the proliferation process particularly in terms of service provision. One participant suggested that given the limited nature of research being undertaken and the paucity of resources, a limited number of companies would end up holding the best tech, the best resources and the best people. They further suggested that these technologies might end up being rolled out as a service on a contractual basis. In which case it would be important to track how the service was being controlled and delivered. Models of transference would become central points of negotiation with alternations between procurement based, lease based, and ownership based models of service delivery. Participants suggested that this was going to be a key factor in determining how to approach these issues from a legal and policy standpoint.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Takeaway Point: The two key points of resistance that emerged during the course of discussion were accountability and transparency. Participants pointed out the various challenges involved in attributing blame within the AI chain and they also spoke about the complexities of opening up AI code, thereby leaving it vulnerable to manipulation. Certain other challenges that were briefly touched upon were the information asymmetry, excessive data collection, centralization of power in the hands of the controllers and complicated service distribution models.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Roundtable provided some insight into larger debates regarding the deployment and applications of AI in the governance sector of India. The need for a regulatory framework as well as globally replicable standards surrounding AI was emphasized, particularly one mindful of the particular needs of differing fields of the governance sector (especially defence). Furthermore, a need for human on/in the loop practices with regards to automated decision making was highlighted for prescriptive instances, particularly when such decisions are responsible for directly evaluating humans. Contextualising AI within its sociopolitical parameters was another key recommendation as it would help filter out the biases that might work themselves into the code and affect the performance of the algorithm. Further, it is necessary to see the involvement and influence of the private sector in the deployment of AI for governance, it often translating into the delivery of technological services from private actors to public bodies towards discharge of public functions. This has clear implications for requirements of transparency  and procedural fairness even in private sector delivery of these services. Defining the meaning and scope of AI while working to demystify algorithms themselves would serve to strengthen regulatory frameworks as well as make AI more accessible for the user / consumer.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[1]. Automated decision making model where final decisions are made by a human operator&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[2]. Automated decision making model where decisions can be made without human involvement but a human can override the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[3]. A completely autonomous decision making model requiring no human involvement&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[4]. https://futureoflife.org/ai-principles/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[5]. The participant was drawing this example from Cathy O’Neil’s Weapons of Math Destruction, (Penguin,2016), at 4-13.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/artificial-intelligence-in-governance-a-report-of-the-roundtable-held-in-new-delhi'&gt;https://cis-india.org/internet-governance/blog/artificial-intelligence-in-governance-a-report-of-the-roundtable-held-in-new-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Saman Goudarzi and Natallia Khaniejo</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-05-03T15:49:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-april-17-2018-sad-truth-brutality-porn-has-many-takers-in-india">
    <title>Metrolife: Brutality porn has sadly many takers in India</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-april-17-2018-sad-truth-brutality-porn-has-many-takers-in-india</link>
    <description>
        &lt;b&gt;The name of the eight-year old Kathua rape victim is trending not just on social media but also on a porn site.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;On Monday it had topped the list of the most-searched names on a porn site, triggering surprise and outrage. An official at the Centre for Internet &amp;amp; Society, Bengaluru attributes the curiosity to a "depraved, messed-up" mind.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Swaraj Barooah, senior programme manager at the centre, says, "It takes numbers to make something trend online." He attributes the unhealthy curiosity in rape footage to a lack of proper sex education in schools.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Violent acts are ingrained in the power politics and hierarchy of our society, he observes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There are two categories that are searched online...revenge and brutality porn. While revenge porn is usually uploaded by couples who break up, brutality porn is done without recognising the humanity of the person involved," Barooah says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Psychiatrists think people who search for rape videos have a "sick and deviant mind".&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Nina C. George was published in &lt;a class="external-link" href="https://www.deccanherald.com/features/metrolife/sad-truth-brutality-porn-has-many-takers-india-665093.html"&gt;Deccan Herald&lt;/a&gt; on April 18, 2018.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-april-17-2018-sad-truth-brutality-porn-has-many-takers-in-india'&gt;https://cis-india.org/internet-governance/news/deccan-herald-nina-c-george-april-17-2018-sad-truth-brutality-porn-has-many-takers-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-19T13:15:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/icann-61-readout">
    <title>ICANN 61 Readout</title>
    <link>https://cis-india.org/internet-governance/news/icann-61-readout</link>
    <description>
        &lt;b&gt;Akriti Bopanna attended an ICANN61 Readout session on the 19th of April at the International Institute of Information Technology at Electronic City in Bengaluru. &lt;/b&gt;
        &lt;p&gt;Click to read the agenda &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/icann-61-agenda"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/icann-61-readout'&gt;https://cis-india.org/internet-governance/news/icann-61-readout&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-05-05T09:18:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-april-13-2018-facebooks-fake-news-clean-up-hits-language-barrier">
    <title>Facebook’s fake news clean-up hits language barrier  </title>
    <link>https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-april-13-2018-facebooks-fake-news-clean-up-hits-language-barrier</link>
    <description>
        &lt;b&gt;The sheer diversity of India’s ethnic languages could defeat Facebook’s move to get content moderators and use artificial intelligence (AI) to counter the spread of misinformation on its platform ahead of the general elections next year, experts said. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nilesh Christopher was published in the &lt;a class="external-link" href="https://economictimes.indiatimes.com/tech/internet/facebooks-fake-news-clean-up-hits-language-barrier/articleshow/63741507.cms"&gt;Economic Times&lt;/a&gt; on April 13, 2018. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;More than a third of Indian users engage on the social media platform in local languages. Experts are sceptical about the extent to which AI tools could be effective in curbing fake news, given that Facebook’s AI engine is primarily trained to recognise English.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If the whole country speaks the same language, it is not a problem. But India is a country with multiple languages and their dialects and the 20,000 global numbers at the face of it doesn’t sound enough,” says Sunil Abraham, executive director for the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In July 2017, India became the largest user base for Facebook with over 241million users, with a majority of them accessing the social network on their smartphones. Facebook has not shared updated user numbers since then.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the use of AI in weeding out fake news, Abraham says that such tools usually work only in languages where there is a history of natural language processing. “Languages like English have a huge corpora (large databases of digitised content from the language). In such cases, the AI analyses the language and will be more accurate,” said Abraham. “Whereas in Indic languages, there is no training data. How they would use AI is not clear. For many Indian languages, the basic infrastructure doesn’t  exist."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I don’t know exactly what FB claimed. But understanding local languages, Indian languages, is still an unsolved problem — either in non-free software or free software,” says Anivar Aravind, executive director of Indic Project, a nonprofit initiative working on language engineering and digital rights of native-language users. Interestingly, the two Facebook-owned platforms: WhatsApp and FB have become the preferred social medium to spread false information and largely through regional languages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook declined to comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Tuesday, Facebook founder Mark Zuckerberg in his testimony to the US congress promised measures such as building and deploying AI tools that take down fake news and increasing the content moderation team to around 20,000. He cited the forthcoming elections in India to point out that Facebook would verify every political advertiser and said, “to make sure that that kind of interference that the Russians were able to do in 2016 is going to be much harder for anyone to pull off in the future.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, Facebook has around 15,000 moderators who review content to identify fake news on the platform, Zuckerberg said last week. The social media giant has been accused of not protecting user privacy and allowing voter-profiling firm Cambridge Analytica to harvest personal information of 87 million Facebook users without explicit permissions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cambridge Analytica has been accused of voter manipulation in several countries, including India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Content moderators in India are seeing business grow driven by internet platforms scrambling to curb fake news across the globe. “Zuckerberg’s mention to prevent misinformation by increasing scrutiny before elections is positive. They are the market leaders. This is likely to create more awareness and it is encouraging to hear Facebook take a proactive role,” said Suman Howladar, Founder of Foiwe Info Global Solutions, a content moderation company.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-april-13-2018-facebooks-fake-news-clean-up-hits-language-barrier'&gt;https://cis-india.org/internet-governance/news/economic-times-nilesh-christopher-april-13-2018-facebooks-fake-news-clean-up-hits-language-barrier&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-17T16:15:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-aayush-ailawadi-april-15-2018-is-this-the-beginning-of-the-end-for-facebook">
    <title>Is This The Beginning Of The End For Facebook?</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-aayush-ailawadi-april-15-2018-is-this-the-beginning-of-the-end-for-facebook</link>
    <description>
        &lt;b&gt;After two days of congressional hearings that collectively lasted over ten hours, there are many questions about Facebook, its policies and its future that experts are debating.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aayush Ailawadi was &lt;a class="external-link" href="https://www.bloombergquint.com/technology/2018/04/15/is-this-the-beginning-of-the-end-for-facebook"&gt;published in Bloomberg Quint&lt;/a&gt; on April 15, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Do Facebook’s privacy policies confuse more than they inform? Is the platform a near monopoly that may need to be broken? And how do you ensure that the vast wealth of data that Facebook has is not misused, particularly in elections?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;BloombergQuint has collected views on some of these issues.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy Policy Or Legalese?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since the Cambrdge Analytica &lt;a href="https://www.bloombergquint.com/quicktakes/2018/03/21/understanding-the-facebook-cambridge-analytica-story-quicktake" target="_blank"&gt;scandal came to light&lt;/a&gt;, Facebook has been receiving a lot of flak for its ambiguous and verbose privacy and data policy. Lawmakers quizzed founder Mark Zuckerberg about how an ordinary user was expected to decipher the terms of the user agreement, something even some of the lawmakers grilling him couldn’t comprehend.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jitendra Waral of Bloomberg Intelligence says, “It’s so complicated that nobody reads it. Essentially the data sharing beyond the Facebook ecosystem came into question here. Is it just necessary to have data sharing for the service to work? Is it restricted to you sharing your content with your friends  in your network or do the restrictions go beyond that? So basically they have a lot of work to do in terms of transparency, in terms how the data is used and shared.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the conversations, it also came to light that Facebook collects data even on those who don’t use the platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In general we collect data on people who are not signed up for Facebook for security purposes," Zuckerberg said Wednesday &lt;a href="https://www.bloomberg.com/news/articles/2018-04-11/zuckerberg-says-facebook-collects-internet-data-on-non-users" target="_blank"&gt;in a hearing about the social network’s privacy practices in Washington&lt;/a&gt;before the House Energy and Commerce Committee.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While privacy experts and tech geeks have been crying foul for years about the data collection and storage practices adopted by tech behemoths like Facebook, this revelation by the Facebook founder was the first public acknowledgement of the fact.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Is Facebook A Monopoly?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It’s not just data concerns that were brought up at the hearings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sen. Lindsey Graham asked Zuckerberg if Facebook enjoys a monopoly on the type of service it provides to its users. He asked, “If I buy a Ford and it doesn’t work well and I don’t like it, I can buy a Chevy, if I’m upset with Facebook, what’s the equivalent product that I can go sign up for?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zuckerberg responded to say that there are other tech companies which operate in the same sphere as Facebook does. He offered statistics of how many Americans use different social apps nowadays, in support of his argument that Facebook does not enjoy a monopoly in the tech world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jeff Hauser, executive director of the Revolving Door Project at the non-partisan Center for Economic and Policy Research says, “ Zuckerberg's answer to who his competitor was kind of comically unsatisfying because there is no competition for Facebook and they do have monopoly power in the United States and in many other countries across the world. ”&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;So one idea is to take Facebook and break it into many other parts that it acquired through previous acquisitions. Instagram would be a powerful competitor to Facebook if it was independent of Facebook. WhatsApp would be a powerful competitor to Facebook if it was an independent competitor to Facebook.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Jeff Hauser, Center for Economic and Policy Research&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Time To Regulate The Internet?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Another big moment during the testimony was when Zuckerberg conceded that it was only a matter of time before the internet would be regulated.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;He said, “The internet is growing in importance around the world in people’s lives and I think that it is inevitable that there will need to be some regulation.”&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Waral agrees that light touch regulation is the way to prevent a Cambridge Analytica like scandal from occurring again in the future. But, he believes that regulation will only raise costs for a company like Facebook. He explains, “What it does is raise compliance costs through out the ecosystem. So, the impact on Facebook from this is that the company is going to increase expenses due to compliance costs.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Big Election(s) Year&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;During his testimony, Zuckerberg did acknowledge that a lot needs to be done to ensure data does not get misused, particularly in elections. Concerns about misuse of user data have emerged in countries like the U.S., but also in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last month, the Union Minister for Law and Information Technology, Ravi Shankar Prasad warned Zuckerberg that if there was any data theft of Indian users due to Facebook’s data collection practices, he would stop at nothing short of summoning the Facebook founder to India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Pranesh Prakash, policy director at the Centre For Internet and Society, doesn’t believe the government would actually summon Zuckerberg to India, he says, “One new concern that's valid across the world, where there are limitations put on freedom of expression during times of campaigning and elections, how do they translate online? There is no typical answer to this.”&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;Most of the speech regulations apply to candidates and apply to  media platforms, which are largely mass media platforms. Now, social media platforms where individuals express themselves might not be regulated the same way or currently at least aren’t regulated the same way.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director, Centre For Internet and Society&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh thinks it is time to re-look at the existing election laws which might not prove to be as useful now as they were some time ago.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_Facebook.png" alt="Facebook" class="image-inline" title="Facebook" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hauser thinks Facebook should help users discern between fakes news and a legitimate source of news.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;In the 2016 elections cycle, for fake news, a lot of bots and trolls liked them and they started appearing in the lot of users’ feeds. So the algorithm of Facebook encouraged manipulation. Facebook needs to address these concerns. I don’t think we can trust Facebook if it doesn’t make hard decisions about its algorithms. Right now, Facebook needs to say this is what the algorithm does.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Jeff Hauser, Center for Economic and Policy Research&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-aayush-ailawadi-april-15-2018-is-this-the-beginning-of-the-end-for-facebook'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-aayush-ailawadi-april-15-2018-is-this-the-beginning-of-the-end-for-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-17T14:44:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-prashant-k-nanda-and-komal-gupta-pension-wont-be-denied-for-want-of-aadhaar-epfo">
    <title>Pension won’t be denied for want of Aadhaar, says EPFO</title>
    <link>https://cis-india.org/internet-governance/news/livemint-prashant-k-nanda-and-komal-gupta-pension-wont-be-denied-for-want-of-aadhaar-epfo</link>
    <description>
        &lt;b&gt;The move is aimed at ensuring that no retired government employee is deprived of pension for want of Aadhaar or failure of fingerprint authentication.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Prashant K. Nanda and Komal Gupta published by &lt;a class="external-link" href="https://www.livemint.com/Politics/J0wTnWuLVVNsejAcJygdRO/Dont-delay-pension-disbursal-in-pretext-of-Aadhaar-linking.html"&gt;Livemint&lt;/a&gt; on April 11, 2018 quoted Pranesh Prakash.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Tens of thousands of pensioners under the employees pension scheme will not be denied their monthly pension if their Aadhaar authentication fails or they do not have the 12-digit unique ID, the Employees Provident Fund Organisation (EPFO) has indicated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The retirement fund manager has asked banks and post offices to facilitate pension disbursement without making senior citizens do the rounds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move comes after EPFO received several complaints of denial of pension by banks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;For paying pension to those whose fingerprint authentication fails, “banks may make provisions for iris scanner, along with the fingerprint scanner in bank branches. It has been observed that in many cases, iris authentication is successful even though fingerprint authentication may have failed. This is particularly true for many senior citizens. In such cases, digital life certificate may be generated on the basis of iris authentication and pension may be given,” the EPFO said in a circular on Monday.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And when both iris and fingerprint authentication are not feasible, “an entry should be made in the exception register with reasons and pension may be provided on the basis of paper life certificate and physical Aadhaar card or E-Aadhaar card of the pensioner after due verification as deemed fit by the bank,” the circular said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move is aimed at ensuring that no senior citizen is deprived of pension for want of Aadhaar or failure of fingerprint authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Banks have been advised to ensure that benefits of the pension scheme reach the citizens and a proper mechanism for “handling exceptions” is put in place.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Banks should make special arrangements for the bed-ridden, differently abled, or senior citizens who are unable to visit the Aadhaar enrolment centre,” the circular said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;EPFO has also instructed pension disbursing banks and post offices to make necessary arrangements for enrolling pensioners for Aadhaar and to carry out authentication through iris, especially for those who cannot be verified through fingerprints.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Unique Identification Authority of India (UIDAI) has been under the scanner over the past few months over allegations of access to pension being denied as the fingerprints of the elderly do not match biometrics in the Aadhaar database.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So far, pensioners had to furnish a life certificate and needed to authenticate it using biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The fact that it is coming now means that the Unique Identification Authority of India’s claim in the Supreme Court about no person having been denied any benefit due to the lack of Aadhaar is simply untrue,” said Bengaluru-based Pranesh Prakash, an affiliated fellow with the Yale Law School’s Information Society Project that works on issues related to the intersection of law, technology and society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Prakash, however, welcomed EPFO’s move laying down “a procedure both for those who don’t have an Aadhaar number, as well as those whose biometrics fail for any reason”.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash further said that “as per the UIDAI’s own data, failure rates for iris authentication are higher (8.54%) than for fingerprints (6%). So the utility of pushing for iris authentication is unclear.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are more than 1.2 billion Aadhaar holders in the country.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-prashant-k-nanda-and-komal-gupta-pension-wont-be-denied-for-want-of-aadhaar-epfo'&gt;https://cis-india.org/internet-governance/news/livemint-prashant-k-nanda-and-komal-gupta-pension-wont-be-denied-for-want-of-aadhaar-epfo&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-10T22:33:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-week-anita-babu-april-8-2018-it-feeds-on-you">
    <title>It feeds on you!</title>
    <link>https://cis-india.org/internet-governance/news/the-week-anita-babu-april-8-2018-it-feeds-on-you</link>
    <description>
        &lt;b&gt;A robust data protection law can prevent Facebook from manipulating users&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Anita Babu was published as a cover story in &lt;a class="external-link" href="https://www.theweek.in/theweek/cover/2018/03/31/facebook-scandal-robust-data-protection-law.html"&gt;The Week&lt;/a&gt; on April 8, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Soon after the Facebook-Cambridge Analytica scandal broke, a meme featuring Donald Duck began circulating on social media. It showed the cartoon character waking up to the news of the data leak, and then going back to sleep realising that the data was as “worthless” as he was.&lt;br /&gt;&lt;br /&gt;The meme struck a chord with the younger generation, which has learnt to laugh at its own triviality. But, what it misses is the fact that technology companies can profit from even the most insignificant set of personal data.&lt;br /&gt;&lt;br /&gt;Facebook, as its users know, is a marketing behemoth in the guise of a social media platform. By using it, people willingly give away information about themselves—their identity, relationship status, places visited and people met, political views, and so on. Facebook collates all this information, which may seem insignificant to an individual user, and then converts it into multiple databases.&lt;br /&gt;&lt;br /&gt;These databases are lucrative, as it helps Facebook target ads at specific individuals or groups. The company earned as much as $40 billion in revenues last year by harvesting ‘worthless’ data. “Data collection at such a granular level is the problem,” said Nikhil Pahwa, Delhi-based digital rights activist and cofounder of Internet Freedom Foundation. “Data once collected is going to get stolen, lost, compromised or sold. Also, the linking of multiple data sets should not be allowed, because, at the end of the day, it has the potential to undermine democracies.”&lt;br /&gt;&lt;br /&gt;The Cambridge Analytica (CA) files have revealed the extent to which tech companies like Facebook and Google profile users. “The fact that micro-targeting of ads were done through Facebook was a known fact,” said Bedasree, copy editor at the education services firm Careers360. “What is dangerous is that data theft can create identical virtual identities, like bots, which is happening. Since everything is digitised we would not be able to differentiate the real from the fake. And, there would be no accountability, because you have given your data to almost everyone.”&lt;br /&gt;&lt;br /&gt;Micro-targeted ads have exposed Facebook to allegations of discrimination.  For instance, a lawsuit filed in the US last year said companies like Amazon and T-Mobile ran recruitment ads in Facebook, allowing only younger workers to see them. “There is a difference between influencing and manipulating people,” said Pranesh Prakash, policy director at the think tank Centre for Internet and Society. “While ‘influencing’ a person politically is something to be celebrated in a democracy, manipulating someone is dangerous…. The problem is not necessarily the content, but the way it is presented: whether it is done transparently and ethically.”&lt;br /&gt;&lt;br /&gt;So, what does the CA scandal mean to users? “They must understand what they are trading for convenience,” said Mishi Choudhary, technology lawyer and legal director at Software Freedom Law Centre, New York. “The technology package, consisting of smartphones and social media companies, peddles a form of convenience that we are all buying into. This convenience ensures that a form of inhuman social control is established, not only in our buying habits, but in our democracy as well.”&lt;br /&gt;&lt;br /&gt;Facebook’s algorithm to determine a user’s newsfeed—the list of updates that a user sees on her Facebook homepage—is a key tool in establishing this control. According to Facebook, the objective of the newsfeed is “to show you the stories that matter the most to you”. It means Facebook determines what a user should see or not see. Studies have shown that Facebook can tweak the algorithm in such a way that only certain types of stories appear in your newsfeed, thereby influencing your mood and behaviour. “The kind of powers that a company like Facebook has, is dangerous,” said Prakash. “Certainly, it is not just Facebook which is problematic in this regard, but all companies with similar business models.”&lt;br /&gt;&lt;br /&gt;In 2016, India campaigned hard and upheld net neutrality in its attempt to stop Facebook's 'Free Basics', a coterie of free web services provided by the social media giant but with controls. Two years later, the data theft scandal, with Facebook at the heart of it, has put the spotlight on India's need for a robust data protection law.&lt;br /&gt;&lt;br /&gt;Last year, the government had appointed a committee of experts under the chairmanship of Justice B.N. Srikrishna to look into the matter. The committee submitted a white paper early this year, which drew criticism from experts for its shortcomings.&lt;br /&gt;&lt;br /&gt;Perhaps, the government should take cues from the current discourse on digital rights. The need of the hour, say experts, is a comprehensive, user-centric data protection law rooted in user consent. The government should hold companies liable for any failure in taking the consent of users and protecting their data.&lt;br /&gt;&lt;br /&gt;The laws should focus on the business model of social media companies, which effectively sell people to advertisers. “The value in digital advertising lies in collecting information about peoples’ behaviour, on a scale previously unimagined in the history of humankind,” said Choudhary. “Gram for gram, the smartphone is the densest collection of sensors ever assembled. It’s a spy satellite in your pocket, aimed at you.”&lt;br /&gt;&lt;br /&gt;Perhaps, the answer lies in building a technology ecosystem that encourages smaller players to take on giants like Facebook. A key to that would be implementing ‘interoperability’ between social networks. Said Hrishikesh Bhaskaran, member of Mozilla India’s Policy and Advocacy Task Force, which works to ensure privacy and data security: “This [interoperability] means that, just like one is able to send mails between Gmail and Yahoo platforms, a user should be able to interact between Facebook and Twitter. There is no technical reason why this cannot be allowed.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-week-anita-babu-april-8-2018-it-feeds-on-you'&gt;https://cis-india.org/internet-governance/news/the-week-anita-babu-april-8-2018-it-feeds-on-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-10T16:16:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/workshop-on-python">
    <title>Workshop on Python</title>
    <link>https://cis-india.org/internet-governance/events/workshop-on-python</link>
    <description>
        &lt;b&gt;A workshop on Python will be organized at the Centre for Internet &amp; Society (CIS) Bangalore office on April 14, 2018. &lt;/b&gt;
        &lt;p&gt;The workshop will be conducted by Bharath Kumar, who works at AppSecCo, Bangalore. He is also volunteering with CIS on the Cyber Security project. &lt;span&gt;Those of you who intend on attending the workshop, please fill up this short questionnaire by Thursday, as Bharath will be using the responses &lt;/span&gt;&lt;span&gt;to finalise the content for the workshop. &lt;a class="external-link" href="https://bharathkumar7.typeform.com/to/JjWE1w"&gt;Fill the questionnaire here&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/workshop-on-python'&gt;https://cis-india.org/internet-governance/events/workshop-on-python&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Python</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-10T14:59:29Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/government-giving-free-publicity-worth-40-k-to-twitter-and-facebook">
    <title>Government gives free publicity worth 40k to Twitter and Facebook </title>
    <link>https://cis-india.org/internet-governance/blog/government-giving-free-publicity-worth-40-k-to-twitter-and-facebook</link>
    <description>
        &lt;b&gt;We conducted a 2 week survey of newspapers for links between government advertisement to social media giants. As citizens, we should be worried about the close nexus between the Indian government and digital behemoths such as Facebook, Google and Twitter. It has become apparent to us after a 2 week print media analysis that our Government has been providing free publicity worth Rs 40,000 to these entities. There are multiple issues with this as this article attempts at pointing out.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/TotalAdvertisementExpenditure.jpg" alt="null" class="image-inline" title="Total Advertisement Expenditure" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We analyzed 5 English language newspapers daily for 2 weeks from March 12&lt;sup&gt;th&lt;/sup&gt; to 26&lt;sup&gt;th&lt;/sup&gt;, one week of the newspapers in Lucknow and the second week in Bangalore. Facebook, Twitter, Instagram and Alphabet backed services such as Youtube and Google Plus were part of our survey. Of a total of 33 advertisements (14 in Lucknow+19 in Bangalore), Twitter stands out as the most prominent advertising platform used by government agencies with 30 ads but Facebook at 29 was more expensive. In order to ascertain the rates of publicity, current advertisement rates for Times of India as our purpose was to solely give a rough estimation of how much the government is spending.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Advertising of this nature is not merely an inherent problem of favoring some social media companies over others but also symptomatic of a bigger problem, the lack of our native e-governance mechanisms which cause the Government to rely and promote others. Where we do have guidelines they are not being followed. By outsourcing their e-governance platforms to Twitter such as TwitterSeva, a feature created by the Twitter India team to help citizens connect better with government services, there is less of an impetus to construct better &lt;a class="external-link" href="https://factordaily.com/twitter-helping-india-reboot-public-services-publicly/"&gt;websites of their own&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;If this is so because we currently do not have the capacity to build them ourselves then it is imperative that this changes. We should either be executing government functions on digital infrastructure owned by them or on open and interoperable systems. If anything, the surveyed social media platforms can be used to enhance pre-existing facilities. However, currently the converse is true with these platforms overshadowing the presence of e-governance websites. Officials have started responding to complaints on Twitter, diluting the significance of such complaint mechanisms on their respective department’s portal. Often enough such features are not available on the relevant government website. This sets a dangerous precedent for a citizen management system as the records of such interactions are then in the hands of these companies who may not exist in the future. As a result, they can control the access to such records or worse tamper with them. Posterity and reliability of such data can be ensured only if they are stored within the Government’s reach or if they are open and public with a first copy stored on Government records which ensures transparency as well. Data portability is an important facet to this issue as well as being a right consumers should possess. It provides for support of many devices, transition to alternative technologies and lastly, makes sure that all the data like other public records will be available upon request through the Right to Information procedure. The last is vital to uphold the spirit of transparency envisioned through the RTI process since interactions of government with citizens are then under its ambit and available for disclosure for whomsoever concerned.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Secondly, such practices by the Government are enhancing the monopoly of the companies in the market effectively discouraging competition and eventually, innovation. While a certain elite strata of the population might opt for Twitter or Facebook as their mode of conveying grievance, this may not hold true for the rest of the online India population.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Picking players in a free market is in violation of technology and vendor neutrality, a practice essential in e-governance to provide a level playing field for all and competing technologies. Projecting only a few platforms as de facto mediums of communication with the government inhibits the freedom of choice of citizens to air their grievances through a vendor or technology they are comfortable with. At the same time it makes the Government a mouthpiece for such companies who are gaining free publicity and consolidating their popularity. Government apps such as the SwachBharat one which is an e-governance platform do not offer much more in terms of functionality but either reflect the website or are a less mature version of the same. This leads to the problem of fracturing with many avenues of complaining such as the website, app, Twitter etc. Consequently, the priority of the people dealing with the complaints in terms of platform of response is unsure. Will I be responded to sooner if I tweet a complaint as opposed to putting it up on the app? Having an interoperable system can solve this where the Government can have a dashboard of their various complaints and responses are then made out evenly. Twitter itself could implement this by having complaints from Facebook for example and then the Twitter Seva would be an equal platform as opposed to the current issue where only they are favored.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Recent events have illustrated how detrimental the storage of data by these giants can be in terms of privacy. Data security concerns are also a consequence of such leaks. Not only is this a long overdue call for a better data protection law but at the same time also for the Government to realize that these platforms cannot be trusted. The hiring of Cambridge Analytica to influence voters in the US elections, based on their Facebook profiles and ancillary data, effectively put the governance of the country on sale by exploiting these privacy and security issues. By basing e-governance on their backbone, India is not far from inviting trouble as well. It is unnecessary and dangerous to have a go-between for matters that pertain between an individual and state.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As this article was being written, it was confirmed by the Election Commission that they are partnering with Facebook for the Karnataka Assemby Elections to promote activities such as encourage enrollment of Voter ID and voter participation. Initiatives like these tying the government even closer to these companies are of concern and cementing the latter’s stronghold.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Note: Our survey data and results are attached to this post. All research was collected by Shradha Nigam, a Vth year student at NLSIU, Bangalore.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify;"&gt;Survey Data and Results&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;This report is based on a survey of government advertisements in English language newspapers in relation to their use of social media platforms and dedicated websites (“&lt;strong&gt;Survey&lt;/strong&gt;”). For the purpose of this report, the ambit of the social media platforms has been limited to the use of Facebook, Twitter, YouTube, Google Plus and Instagram. The report was prepared by Shradha Nigam, a student from National Law School of India University, Bangalore. &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cis-report-on-social-media"&gt;Read the full report here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/government-giving-free-publicity-worth-40-k-to-twitter-and-facebook'&gt;https://cis-india.org/internet-governance/blog/government-giving-free-publicity-worth-40-k-to-twitter-and-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Akriti Bopanna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Google</dc:subject>
    
    
        <dc:subject>Instagram</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Twitter</dc:subject>
    
    
        <dc:subject>YouTube</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Google Plus</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2018-04-27T09:52:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
