<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 761 to 775.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/october-2017-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/why-presumption-of-renewal-is-unsuitable-for-the-current-registry-market-structure"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/roundtable-on-enhancing-indian-cyber-security-through-multi-stakeholder-cooperation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/new-indian-express-october-25-2017-nibbling-away-into-your-bank-account-salami-attackers-cart-away-a-fortune"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-furquan-moharkan-october-24-2017-majority-of-top-politicians-twitter-followers-fake"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/icann2019s-problems-with-accountability-and-the-web-controversy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gdpr-and-india-a-comparative-analysis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/jobs/policy-officer-ig"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/securing-the-digital-payments-ecosystem"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cy-fy-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/revisiting-per-se-vs-rule-of-reason-in-light-of-the-intel-conditional-rebate-case"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/daily-o-october-4-2017-attempted-data-breach-of-uidai-rbi-isro-and-flipkart"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/about/newsletters/october-2017-newsletter">
    <title>October 2017 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/october-2017-newsletter</link>
    <description>
        &lt;b&gt;October 2017 Newsletter&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;Dear readers,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;CIS &lt;a class="external-link" href="https://cis-india.org/accessibility/blog/cis-comments-on-mobile-accessibility-guidelines"&gt;submitted its comments &lt;/a&gt;on mobile accessibility guidelines to the Ministry of Electronics &amp;amp; IT, Govt. of India. &lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;Between 1 to 16 September, an online discussion took place on the creation of social media guidelines and strategy for Telugu Wikimedia handles online. Manasa Rao &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/discussion-on-creation-of-social-media-guidelines-strategy-for-telugu-wikimedia"&gt;captured the developments in a blog post&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;Padma Venkataraman in a blog entry &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann"&gt;chronologically mapped&lt;/a&gt; CIS’ efforts at enhancing financial transparency and accountability at ICANN, while providing an outline of what remains to be done.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;Shyam Ponappa's article on NPAs and structural issues was published in the &lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-shyam-ponappa-october-5-2017-npas-and-structural-issues"&gt;Business Standard&lt;/a&gt; on October 5, 2017.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;CIS in the News:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/daily-o-october-4-2017-attempted-data-breach-of-uidai-rbi-isro-and-flipkart"&gt;Attempted data breach of UIDAI, RBI, ISRO and Flipkart is worrisome&lt;/a&gt; (DailyO, October 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web"&gt;Sex, drugs and the dark web&lt;/a&gt; (Hindu; October 7, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data"&gt;Ahead of data protection law roll out, experts caution that it shouldn't limit collection and use of data&lt;/a&gt; (First Post; October 12, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-economics-and-business-models-of-iot"&gt;#NAMAprivacy: The economics and business models of IoT and other issues&lt;/a&gt; (Medianama; October 18, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-data-standards-for-iot"&gt;#NAMAprivacy: Data standards for IoT and home automation systems&lt;/a&gt; (Medianama; October 18, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-herald-furquan-moharkan-october-24-2017-majority-of-top-politicians-twitter-followers-fake"&gt;Majority of top politicians' Twitter followers fake: audit &lt;/a&gt;(Furquan Moharkan; Deccan Herald; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/news/eastern-mirror-october-23-2017-awards-for-those-working-on-employment-opportunities-for-disabled"&gt;Awards for those working on employment opportunities for disabled&lt;/a&gt; (Eastern Mirror; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/new-indian-express-october-25-2017-nibbling-away-into-your-bank-account-salami-attackers-cart-away-a-fortune"&gt;Nibbling away into your bank account, salami attackers cart away a fortune&lt;/a&gt; (New Indian Express; October 25, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/news/nirmita-narasimhan-wins-the-18th-ncpedp-mindtree-helen-keller-award-2017"&gt;Nirmita Narasimhan wins the 18th NCPEDP-Mindtree Helen Keller Award 2017!&lt;/a&gt; (National Centre for Promotion of Employment for Disabled People; October 31, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;►&lt;/span&gt;Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/odia-wikisource-turns-3"&gt;Odia Wikisource Turns 3&lt;/a&gt; (Manasa Rao; October 22, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/wikimedia-workshop-at-ismailsaheb-mulla-law-college-satara"&gt;Wikimedia Workshop at Ismailsaheb Mulla Law College, Satara&lt;/a&gt; (Subodh Kulkarni; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/marathi-wikipedia-edit-a-thon-at-dalit-mahila-vikas-mandal-satara"&gt;Marathi Wikipedia Edit-a-thon at Dalit Mahila Vikas Mandal, Satara&lt;/a&gt; (Subodh Kulkarni; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/marathi-wikipedia-workshop-at-mgm-trusts-college-of-journalism-and-mass-communication-aurangabad"&gt;Marathi Wikipedia Workshop at MGM Trust's College of Journalism and Mass Communication, Aurangabad&lt;/a&gt; (Subodh Kulkarni; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/orientation-program-at-kannada-university-hampi"&gt;Orientation Program at Kannada University, Hampi&lt;/a&gt; (A. Gopalakrishna; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/marathi-wikipedia-workshop-at-solapur-university"&gt;Marathi Wikipedia Workshop at Solapur University&lt;/a&gt; (Subodh Kulkarni; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/discussion-on-creation-of-social-media-guidelines-strategy-for-telugu-wikimedia"&gt;Discussion on Creation of Social Media Guidelines &amp;amp; Strategy for Telugu Wikimedia&lt;/a&gt; (Manasa Rao; October 24, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;►Openness&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;►&lt;/span&gt;Freedom of Expression&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/icann2019s-problems-with-accountability-and-the-web-controversy"&gt;ICANN’s Problems with Accountability and the .WEB Controversy&lt;/a&gt; (Padma Venkataraman; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/why-presumption-of-renewal-is-unsuitable-for-the-current-registry-market-structure"&gt;Why Presumption of Renewal is Unsuitable for the Current Registry Market Structure&lt;/a&gt; (Padma Venkataraman; October 29, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann"&gt;CIS’ Efforts Towards Greater Financial Disclosure by ICANN&lt;/a&gt; (Padma Venkataraman; October 29, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;►&lt;/strong&gt;Cyber Security&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/cy-fy-2017"&gt;CyFy 2017&lt;/a&gt; (Organized by Observer Research Foundation; New Delhi; October 2 - 4, 2017).  Sunil Abraham was a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/gdpr-and-india-a-comparative-analysis"&gt;GDPR and India: A Comparative Analysis&lt;/a&gt; (Aditi Chaturvedi; October 17, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/securing-the-digital-payments-ecosystem"&gt;Securing The Digital Payments Ecosystem&lt;/a&gt; (Organized by NITI Aayog; October 9, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;br /&gt;
&lt;div&gt;&lt;strong&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;►&lt;/strong&gt;Big Data&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/revisiting-per-se-vs-rule-of-reason-in-light-of-the-intel-conditional-rebate-case"&gt;Revisiting Per Se vs Rule of Reason in Light of the Intel Conditional Rebate Case&lt;/a&gt; (Shruthi Anand; October 4, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;Event Organized&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things"&gt;Emerging Issues in the Internet of Things&lt;/a&gt; (CIS, Bengaluru; October 23, 2017). Andrew Rens gave a talk.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;span style="text-align: justify; "&gt;&lt;strong&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/strong&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources, and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Article &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-shyam-ponappa-october-5-2017-npas-and-structural-issues"&gt;NPAs &amp;amp; Structural Issues&lt;/a&gt; (Shyam Ponappa; Business Standard; October 4, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;span&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Articles&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-october-9-digital-native-there-is-no-spoon-there-is-no-privacy"&gt;Digital Native: There is no spoon, There is no privacy&lt;/a&gt; (Nishant Shah; October 9, 2017).&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-october-22-2017-digital-native-finger-on-the-buzzer"&gt;Digital Native: Finger on the buzzer&lt;/a&gt; (Nishant Shah; October 22, 2017).&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;-----------------------------------&lt;br /&gt;&lt;/span&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;br /&gt;&lt;/a&gt;&lt;span&gt;----------------------------------- &lt;/span&gt;&lt;/p&gt;
&lt;div class="keyResearch"&gt;
&lt;div id="parent-fieldname-text-8a5942eb6f4249c5b6113fdd372e636c"&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;► Support Us&lt;/p&gt;
&lt;div&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/div&gt;
&lt;p&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="viewlet-below-content-body"&gt;
&lt;div class="visualClear"&gt;&lt;/div&gt;
&lt;div class="documentActions"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/october-2017-newsletter'&gt;https://cis-india.org/about/newsletters/october-2017-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2018-01-10T00:53:03Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/why-presumption-of-renewal-is-unsuitable-for-the-current-registry-market-structure">
    <title>Why Presumption of Renewal is Unsuitable for the Current Registry Market Structure</title>
    <link>https://cis-india.org/internet-governance/blog/why-presumption-of-renewal-is-unsuitable-for-the-current-registry-market-structure</link>
    <description>
        &lt;b&gt;With the recent and much protested renewal of the .net legacy Top-Level-Domain (TLD), the question of the appropriate method of renewal has again come to the forefront. While this seems relatively uncontroversial to most, Padma Venkataraman, a law student and intern at CIS looks at presumptive renewal through a critical lens. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;With the recent renewal of the .net legacy Top-Level-Domain (TLD), the question of the appropriate method of renewal is worth reconsidering. When we talk about presumption of renewal for registry agreements, it means that the agreement has a reasonable renewal expectancy at the end of its contractual term. According to the current base registry agreement, it shall be renewed for 10-year periods, upon expiry of the initial (and successive) term, unless the operator commits a fundamental and material breach of the operator’s covenants or breach of its payment obligations to ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/why-presumption-of-renewal-is-unsuitable-for-the-current-registry-market-structure"&gt;Download the entire blog post here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/why-presumption-of-renewal-is-unsuitable-for-the-current-registry-market-structure'&gt;https://cis-india.org/internet-governance/blog/why-presumption-of-renewal-is-unsuitable-for-the-current-registry-market-structure&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padma Venkataraman</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Transparency</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    

   <dc:date>2017-10-31T02:53:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann">
    <title>CIS’ Efforts Towards Greater Financial Disclosure by ICANN</title>
    <link>https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann</link>
    <description>
        &lt;b&gt;CIS has been working towards enhancing transparency and accountability at ICANN since 2014. While initial efforts have resulted in ICANN revealing its sources of income in a granular fashion in 2015, we are yet to see this level of transparency become a default approach within ICANN. Here, Padma Venkataraman chronologically maps CIS’ efforts at enhancing financial transparency and accountability at ICANN, while providing an outline of what remains to be done. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;With the $135 million sale of .web,&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; the much protested renewal of the .net agreement&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; and the continued annual increase in domain name registrations,&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; among other things, it is no surprise that there are still transparency and accountability concerns within the ICANN Community. CIS, as part of its efforts to examine the functioning of ICANN’s accountability mechanisms, has filed many DIDP requests till date, in a bid for greater transparency of the organisation’s sources of revenues.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;1.Efforts towards disclosure of revenue break-up by ICANN&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;- 2014&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;- 2015&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;- 2017&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;2.The need for granularity regarding historical revenues&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;-----&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;1.Efforts towards disclosure of revenue break-up by ICANN&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;- 2014&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In 2014, CIS’ Sunil Abraham demanded greater financial transparency of ICANN at both the Asia Pacific IGF and the ICANN Open Forum at the IGF. Later that year, CIS was provided with a list of ICANN’s sources of revenue for the financial year 2014, including payments from registries, registrars, sponsors, among others, by ICANN India Head Mr. Samiran Gupta.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; This was a big step for CIS and the Internet community, as before this, no details on granular income had ever been publicly divulged by ICANN on request.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However, as no details of historical revenue had been provided, CIS filed a DIDP request in December 2014, seeking financial disclosure of revenues for the years 1999 to 2014, in a detailed manner - similar to the 2014 report that had been provided.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; It sought a list of individuals and entities who had contributed to ICANN’s revenues over the mentioned time period.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In its response, ICANN stated that it possessed no documents in the format that CIS had requested, that is, it had no reports that broke down domain name income and revenue received by each legal entity and individual.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; It stated that as the data for years preceding 2012 were on a different system, compiling reports of the raw data for these years would be time-consuming and overly burdensome. ICANN denied the request citing this specific provision for non-disclosure of information under the DIDP.&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;- 2015&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In July 2015, CIS filed a request for disclosure of raw data regarding granular income for the years 1999 to 2014.&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; ICANN again said that it would be a huge burden ‘to access and review all the raw data for the years 1999 to 2014 in order to identify the raw data applicable to the request’.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; However, it mentioned its commitment to preparing detailed reports on a go-forward basis - all of which would be uploaded on its Financials page.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;- 2017&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;To follow up on ICANN’s commitment to granularity, CIS sought a detailed report on historical data for income and revenue contributions from domain names for FY 2015 and FY 2016 in June 2017.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; In its reply, ICANN stated that the Revenue Detail by Source reports for the last two years would be out by end July and that the report for FY 2012 would be out by end September.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;2.The need for granularity regarding historical revenues&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In 2014, CIS asked for disclosure of a list of ICANN’s sources of revenue and detailed granular income for the years 1999 to 2014. ICANN published the first but cited difficulty in preparing reports of the second. In 2015, CIS again sought detailed reports of historical granular revenue for the same period, and ICANN again denied disclosure claiming that it was burdensome to handle the raw data for those years. However, as ICANN agreed to publish detailed reports for future years, CIS recently asked for publication of reports for the FYs 2012, 2015 and 2016. Reports for these three years were uploaded according to the timeline provided by ICANN.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;CIS appreciates ICANN’s cooperation with its requests and is grateful for their efforts to make the reports for FYs 2012 to 2016 available (and on a continued basis). However, it is important that detailed information of historical revenue and income from domain names for the years 1999 to 2014 be made publicly available. It is also crucial that consistent accounting and disclosure practices are adopted and made known to the Community, in order to avoid omissions of statements such as Detail Revenue by Source and Lobbying Disclosures, among many others, in the annual reports - as has evidently happened for the years preceding 2012. This is necessary to maintain financial transparency and accountability, as an organisation’s sources of revenues can inform the dependant Community about why it functions the way it does. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;It will also allow more informed discussions about problems that the Community has faced in the past and continues to struggle with. For example, while examining problems such as ineffective market competition or biased screening processes for TLD applicants, among others, this data can be useful in assessing the long-term interests, motives and influences of different parties involved.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.icann.org/news/announcement-2-2016-07-28-en"&gt;&lt;span&gt;https://www.icann.org/news/announcement-2-2016-07-28-en&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Report of Public Comment Proceeding on the .net Renewal. &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/report-comments-net-renewal-13jun17-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/report-comments-net-renewal-13jun17-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.icann.org/resources/pages/cct-metrics-domain-name-registration-2016-06-27-en"&gt;&lt;span&gt;https://www.icann.org/resources/pages/cct-metrics-domain-name-registration-2016-06-27-en&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://cis-india.org/internet-governance/blog/cis-receives-information-on-icanns-revenues-from-domain-names-fy-2014"&gt;&lt;span&gt;https://cis-india.org/internet-governance/blog/cis-receives-information-on-icanns-revenues-from-domain-names-fy-2014&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; DIDP &lt;span&gt;Request no - 20141222-1, &lt;/span&gt;22 December 2014. &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/didp-request-2"&gt;&lt;span&gt;https://cis-india.org/internet-governance/blog/didp-request-2&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.icann.org/en/system/files/files/cis-response-21jan15-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/cis-response-21jan15-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Defined Conditions for Non-Disclosure - &lt;span&gt;Information requests: (i) which are not reasonable; (ii) which are excessive or overly burdensome; (iii) complying with which is not feasible; or (iv) are made with an abusive or vexatious purpose or by a vexatious or querulous individual.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;&lt;span&gt;https://www.icann.org/resources/pages/didp-2012-02-25-en&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; DIDP &lt;span&gt;Request no - 20150722-2, 22 July 2015. &lt;/span&gt;&lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/didp-request-12-revenues"&gt;&lt;span&gt;https://cis-india.org/internet-governance/blog/didp-request-12-revenues&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.icann.org/en/system/files/files/didp-response-20150722-2-21aug15-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/didp-response-20150722-2-21aug15-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.icann.org/en/system/files/files/didp-response-20150722-2-21aug15-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/didp-response-20150722-2-21aug15-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;; &lt;/span&gt;&lt;a href="https://www.icann.org/resources/pages/governance/financials-en"&gt;&lt;span&gt;https://www.icann.org/resources/pages/governance/financials-en&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; DIDP Request No. 20170613-1, 14 June 2017. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.icann.org/en/system/files/files/didp-20170613-1-marda-obo-cis-response-13jul17-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/didp-20170613-1-marda-obo-cis-response-13jul17-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann'&gt;https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padma Venkataraman</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Transparency</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    

   <dc:date>2017-10-31T02:10:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/roundtable-on-enhancing-indian-cyber-security-through-multi-stakeholder-cooperation">
    <title>Roundtable on Enhancing Indian Cyber Security through Multi-Stakeholder Cooperation</title>
    <link>https://cis-india.org/internet-governance/events/roundtable-on-enhancing-indian-cyber-security-through-multi-stakeholder-cooperation</link>
    <description>
        &lt;b&gt;A closed door round-table on enhancing Indian cyber security is being organized on 4 November 2017 at Indian Islamic Centre, Lodhi Road in New Delhi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;With the proliferation of digital technologies and the central role they play in national infrastructure and governance, security of systems and services is fundamental to the economic, political, and social development and success of a nation. Digital India, the National Payments Corporation of India, IndiaStack, and the Aadhaar ecosystem are just a few examples of such digital infrastructure.  Yet the digital realm is increasingly becoming more complex and difficult to secure and monitor for vulnerabilities, threats, breaches, and attacks. The responsibility of identifying and monitoring such vulnerabilities can be spearheaded by designated governmental bodies like CERT-IN and NCIIPC, but for effective identification of threats and vulnerabilities, collaboration is needed across stakeholder groups including security researchers, industry, and government bodies. Transparency about breaches and attacks is also key in enabling consumer awareness and building trust with the public. Examples of such mechanisms include bug bounty programs and breach notification frameworks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This closed door roundtable  will seek to bring together government, industry, civil society, academia, and security researchers  to identify different areas and tools of collaboration between stakeholders towards enhancing Indian cyber security.  It will broadly focus on vulnerability identification and reporting and vulnerability/breach notification.    This will include a reflection on:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Existing frameworks, forms of collaborations,  policies and practices in India.&lt;/li&gt;
&lt;li&gt;Practices, standards, certifications, and programmes adopted in other jurisdictions.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The way forward for India addressing issues like establishing trust, harmonization and communication across stakeholders and sectors, and ensuring quality and response.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;RSVP: &lt;a class="mail-link" href="mailto:pranav@cis-india.org"&gt;pranav@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/invitation-for-multi-stakeholder-roundtable-on-cyber-security"&gt;Download the Invite&lt;/a&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/enhancing-indian-cyber-security-through-multi-stakeholder-cooperation"&gt;&lt;b&gt;See the Report&lt;/b&gt;&lt;/a&gt;&lt;/h3&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/roundtable-on-enhancing-indian-cyber-security-through-multi-stakeholder-cooperation'&gt;https://cis-india.org/internet-governance/events/roundtable-on-enhancing-indian-cyber-security-through-multi-stakeholder-cooperation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-02-01T14:04:36Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/new-indian-express-october-25-2017-nibbling-away-into-your-bank-account-salami-attackers-cart-away-a-fortune">
    <title>Nibbling away into your bank account, salami attackers cart away a fortune</title>
    <link>https://cis-india.org/internet-governance/news/new-indian-express-october-25-2017-nibbling-away-into-your-bank-account-salami-attackers-cart-away-a-fortune</link>
    <description>
        &lt;b&gt;A ‘salami’ might sound an innocuous term in the culinary sense. When it comes to cybercrime, a ‘salami’ is a dreaded attack which even the victims are hardly aware of. Like a salami slice, a hacker slices away small sums of money from multiple accounts on a daily basis. By the time the victims realise that they are being ‘sliced’, too little can be done or it’s already too late.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kiran Parashar KM and Akram Mohammed was &lt;a class="external-link" href="http://www.newindianexpress.com/cities/bengaluru/2017/oct/25/nibbling-away-into-your-bank-account-salami-attackers-cart-away-a-fortune-1682273.html"&gt;published in New Indian Express&lt;/a&gt; on October 25, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;This is among the various strategies allegedly used by some bank  employees, working in cahoots with persons working in telecom companies  to defraud customers of their savings. Cyber crime police, who have  arrested several bank employees in the past in similar cases, warn that  throwing caution to the wind while banking online or responding to calls  claiming to be from banks could land you in serious financial trouble.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What’s shocking is law enforcement agencies have failed to nab the culprits in a majority of such crimes.&lt;br /&gt; Speaking to Express, Shubhamangala Sunil, head, Global Cyber Security  Response Team, said that of all the techniques used by bank insiders to  siphon off funds, ‘salami attack’ is probably the stealthiest. “Imagine  you have Rs 2,75,233 in to your account. If someone steals say `3 or 4  from your account every day, would you get an alert? If you did, would  you go and complain to the bank that such a small amount is being  stolen?” she questioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Due to lack of awareness about such threats, a complaint to the bank  about such an issue is unlikely to bring any relief to the victim, she  said. With time, many new techniques will be discovered by fraudsters  and security might not be adequate to thwart all of them, she added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director at the Centre for Internet and  Society said the extent of fraud in the financial sector can be  decreased “by improving security of financial processes, auditing  software for vulnerabilities and fixing them and improving consumer  protection laws.” Processes used by banks, both offline and while  engaging with customers online and through systems such as Unified  Payments Interface, should be improved, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bad practices&lt;br /&gt; Prakash cited bad practices by different banks — such as preventing  right click in password boxes (which curb positive security practices  such as usage of password managers), limiting password lengths, and not  supporting software-based OTPs and stronger security like “Universal 2nd  Factor” — were also putting customers at risk. Stressing the need for  consumer awareness, he said that even if everything works fine at the  bank/financial institutions side customers commit mistakes, leaving them  vulnerable. Therefore, spreading awareness about security best  practices and hassle-free insurance to minimise harm to customers is  essential, he said. “Bank fraud or any other online fraud is inevitable.  We have to ensure that the harms from such fraud are as minimal as  possible,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Insider frauds&lt;br /&gt; While bank fraud cases — both online and offline — are increasing,  police are finding the involvement of insiders who exploit loopholes in  the banking systems. Sources in the CID-Cyber Crime Cell say there have  been multiple cases where there is involvement of at least one bank  employee. Digital banking has increased post demonetisation and yet the  security features are not enhanced. Two days after police caught two  employees of JP Morgan bank who had swindled `12 crore of a US-based  client, police express concern over the security and background checks  in the banking system as one of the accused had been working for four  years with fake documents and on a fake name.  An investigating official  said the insider shares details of debit/credit cards with the conmen  who clone cards for commission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Banking security&lt;br /&gt; Joint Commissioner of Police (Crime), Satish Kumar N said there is a  co-ordination committee of police and Reserve Bank of India. “We share  notes about cases of bank fraud and also recommend some security  features to be adopted in the banking sector. The meeting is held on a  regular basis,” he said. To a question on ‘salami attack’, he said that  police have not come across any such complaints yet. “We have been  vigilant about cyber related issues,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WHODUNNIT?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Case 1: June 2017&lt;br /&gt; Vinod Kumar Pacchiyappan, manager of SBI Cards and Payment Services Pvt  Ltd, located in Embassy Heights on Magrath Road filed a complaint with  police that Know Your Customer (KYC) data of customers was compromised.  Apart from this, fake credit cards were created resulting in a loss of  `38.39 lakh. The investigating officials suspect the involvement of  insiders in the case.&lt;br /&gt; Status: No arrests yet&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Case 2: May 2016&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An US-couple living in Bengaluru was cheated of `6 lakh in just 2  hours.Cyber criminals, using their bank data credentials, had shopped  online.The police, almost a year-and-half after the incident, are yet to  know how their credit card details were extracted, but suspect that a  bank employee was involved in the case.Status: No arrests yet&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Case 3: January 2016&lt;br /&gt; Police lodged a complaint of hacking against unknown persons, who  cheated customers of several lakhs in Karnataka and Telangana. Police  learnt that the fraud was committed by hacking into Axis Bank’s mobile  wallet app LIME and SBI’s Buddy app. Bank account details of the  victims, mobile phone numbers, etc., were stolen by the accused.&lt;br /&gt; Status: Seven people, including G Gopalakrishna, deputy manager of Axis  Bank’s Peddapalli branch in Karimnagar district of Telangana, and others  involved in the crime were arrested.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/new-indian-express-october-25-2017-nibbling-away-into-your-bank-account-salami-attackers-cart-away-a-fortune'&gt;https://cis-india.org/internet-governance/news/new-indian-express-october-25-2017-nibbling-away-into-your-bank-account-salami-attackers-cart-away-a-fortune&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-27T15:35:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-furquan-moharkan-october-24-2017-majority-of-top-politicians-twitter-followers-fake">
    <title>Majority of top politicians' Twitter followers fake: audit</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-furquan-moharkan-october-24-2017-majority-of-top-politicians-twitter-followers-fake</link>
    <description>
        &lt;b&gt;A majority of Twitter users following top Indian politicians, including prime minister Narendra Modi, are fake, according to an audit site.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Furquan Moharkan was published in &lt;a class="external-link" href="http://www.deccanherald.com/content/639075/bots-following-modi-rahul-kejriwal.html"&gt;Deccan Herald&lt;/a&gt; on October 24, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Leaders cutting across party lines generate popularity on social media  using bots, or automated software, according to the data-analytics  website TwitterAudit.&lt;br /&gt;&lt;br /&gt;Delhi chief minister Arvind Kejriwal, Modi,  and Congress vice president Rahul Gandhi have a combined Twitter  credibility of just 35%. In other words, 65 out of 100 followers are  fake.&lt;br /&gt;&lt;br /&gt;Kejriwal, with 1.24 crore followers, has a low credibility  of 22.9% on Twitter, according to TwitterAudit. A good 96.34 lakh of  Kejriwal’s followers are bots.&lt;br /&gt;&lt;br /&gt;Modi, who has two personal Twitter  handles (@narendramodi and @narendramodi_in), has a combined  credibility of just 37.4%. On the handle @narendramodi, of 3.5 crore  followers, just 1.3 crore followers are said to be authentic. The  remaining 2.2 crore are marked as bots by TwitterAudit.&lt;br /&gt;&lt;br /&gt;The handle @narendramodi_in has 5.99 lakh authentic followers, and 8.01 lakh are again marked as bots.&lt;br /&gt;&lt;br /&gt;Congress  heir apparent Rahul Gandhi, relatively new to social media, has seen  much traction of late. His credibility score is 51.6% on Twitter.&lt;br /&gt;&lt;br /&gt;While 19.73 lakh of his followers are authentic, 18.51 lakh are said to be fake.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;Rahul’s story&lt;/b&gt;&lt;br /&gt;Rahul  Gandhi’s handle ‘OfficeofRG’ has been in the news, with a spike in  retweets being cited by rivals in the BJP as evidence of bots at work.&lt;br /&gt;&lt;br /&gt;The  handle got 2,784 retweets in September, as compared to 2,506 for Modi  and and 1,722 for Kejriwal. In October, he’s scoring even better, with  3,812 retweets.&lt;br /&gt;&lt;br /&gt;Sites like TwitterAudit are helpful, but their  results are guesses based on various assumptions about ‘bot-like’  qualities, according to an expert.&lt;br /&gt;&lt;br /&gt;Pranesh Prakash, Policy  Director at Centre for Internet and Society, told DH some users were  also out on ‘false flag operations,’ besmirching opponents by ‘exposing’  their usage of bots. “The idea that social media bots can shape popular  discourse, as is often supposed to be the case with Brexit, is not  backed by research,” he said. “A study by Enders Analysis shows the  opposite to be the case.”&lt;br /&gt;&lt;br /&gt;The score by TwitterAudit is based on the number of tweets, date of the last tweet, and ratio of followers to friends.&lt;br /&gt;&lt;br /&gt;A  news agency alleged the traction came from ‘bots’ with Russian, Kazakh  or Indonesian handles routinely retweeting Rahul’s posts.&lt;br /&gt;&lt;br /&gt;Infact, Prime Minister Office handle (@PMOIndia) also has a low credibility of 39.6%, according to twitter audit.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-furquan-moharkan-october-24-2017-majority-of-top-politicians-twitter-followers-fake'&gt;https://cis-india.org/internet-governance/news/deccan-herald-furquan-moharkan-october-24-2017-majority-of-top-politicians-twitter-followers-fake&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-28T01:10:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/icann2019s-problems-with-accountability-and-the-web-controversy">
    <title>ICANN’s Problems with Accountability and the .WEB Controversy</title>
    <link>https://cis-india.org/internet-governance/blog/icann2019s-problems-with-accountability-and-the-web-controversy</link>
    <description>
        &lt;b&gt;The Post-Transition IANA promised enhanced transparency and accountability to the global multistakeholder community.  The  series of events surrounding the .WEB auction earlier this year has stirred up issues relating to the lack of transparency and accountability of ICANN.  This post examines the .WEB auction as a case study to better understand exact gaps in accountability.&lt;/b&gt;
        &lt;h2&gt;Chronological Background of the .WEB Auction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In June 2012, ICANN launched a new phase for the creation and operation of Generic Top-Level Domains (gTLDs). After confirming the eligibility of seven applicants for the rights of the .WEB domain name, ICANN placed them in a string contention set (a group of applications with similar or identical applied for gTLDs).&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;[&lt;i&gt;Quick Note&lt;/i&gt;: ICANN procedure encourages the resolving of this contention set by voluntary settlement amongst the contending applicants (also referred to as a private auction), wherein individual participation fees of US $185,000 go to ICANN and the auction proceeds are distributed among the bidders. If a private auction fails, the provision for a last resort auction conducted by ICANN is invoked - here the total auction proceeds go to ICANN along with the participation fees.&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;]&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In June 2016, NuDotCo LLC, a bidder that had previously participated in nine private auctions without any objection, withdrew its consent to the voluntary settlement. Ruby Glen LLC, another bidder, contacted NDC to ask if it would reconsider its withdrawal, and was made aware of changes in NDC’s Board membership, financial position, management and a potential change in ownership, by NDC’s Chief Financial Officer.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Concerned about the transparency of the auction process, Ruby Glen requested ICANN to postpone the auction on June 22, in order to investigate the discrepancies between NDC’s official application and its representation to Ruby Glen.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; The Vice President of ICANN’s gTLD Operations and the independent ICANN Ombudsman led separate investigations, both of which were limited to few e-mails seeking NDC’s confirmation of status quo. On the basis of NDC’s denial of any material changes, ICANN announced that the auction would proceed as planned, as no grounds had been found for its postponement.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;On July 27, NDC’s winning bid – USD 135 million – beat the previous record by $90 million, &lt;i&gt;doubling ICANN’s total net proceeds&lt;/i&gt; from the past fifteen auctions it had conducted.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Soon after NDC’s win, Verisign, Inc., the market giant that owns the .com and .net domain names, issued a public statement that it had used NDC as a front for the auction, and that it had been involved in its funding from the very beginning. Verisign agreed to transfer USD 130 million to NDC, allowing the latter to retain a $5 million stake in .WEB.&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Ruby Glen LLC filed for an injunction against the transfer of .WEB rights to NDC, and sought expedited discovery&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; against ICANN and NDC in order to gather evidentiary support for the temporary restraining order.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Donuts Inc., the parent company of Ruby Glen, simultaneously filed for recovery of economic loss due to negligence, fraud and breach of bylaws among other grounds, and Affilias, the second highest bidder, demanded that the .WEB rights be handed over by ICANN.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Furthermore, at ICANN57, Affilias publicly brought up the issue in front of ICANN’s Board, and Verisign followed with a rebuttal. However, ICANN’s Board refused to comment on the issue at that point as the matter was still engaged in ongoing litigation.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Issues Regarding ICANN’s Assurance of Accountability&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Post-Transition IANA promised enhanced transparency and accountability to the global multistakeholder community.  The  series of events surrounding the .WEB auction has stirred up issues relating to the lack of transparency and accountability of ICANN.  ICANN’s arbitrary enforcement of policies that should have been mandatory, with regard to internal accountability mechanisms, fiduciary responsibilities and the promotion of competition, has violated Bylaws that obligate it to operate ‘consistently, neutrally, objectively, and fairly, without singling out any particular party for discriminatory treatment’.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Though the US court ruled in favour of ICANN, the discrepancies that were made visible with regard to ICANN’s differing emphasis on procedural and substantive compliance with its rules and regulations, have forced the community to acknowledge that corporate strategies, latent interests and financial advantages undermine ICANN’s commitment to accountability. The approval of NDC’s ridiculously high bid with minimal investigation or hesitation, even after Verisign’s takeover, signifies pressing concerns that stand in the way of a convincing commitment to accountability, such as:&lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;The Lack of Substantive Fairness and Accountability at ICANN (A Superficial Investigation)&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;ICANN’s Sketchy Tryst with Legal Conformity&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;The Financial Accountability of ICANN’s Auction Proceeds&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt; &lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The Lack of Substantive Fairness and Accountability in its Screening Processes: &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Ruby Glen’s claim that ICANN conducted a cursory investigation of NDC’s misleading and unethical behaviour brought to light the ease and arbitrariness with which applications are deemed valid and eligible. &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Disclosure of Significant Details Unique to Applicant Profiles:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt; &lt;span&gt;In the initial stage, applications for the gTLD auctions require disclosure of background information such as proof of legal establishment, financial statements, primary and secondary contacts to represent the company, officers, directors, partners, major shareholders, etc. At this stage, TAS User Registration IDs, which require VAT/tax/business IDs, principal business address, phone, fax, etc. of the applicants, are created to build unique profiles for different parties in an auction.&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;span&gt;[13]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Any important change in an applicant’s details would thus significantly alter the unique profile, leading to uncertainty regarding the parties involved and the validity of transactions undertaken. NDC’s application clearly didn’t meet the requirements here, as its financial statements, secondary contact, board members and ownership all changed at some point before the auction took place (either prior to or post submission of the application).&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;span&gt;[14]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Mandatory Declaration of Third Party Funding:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; Applications presupposing a future joint venture or any organisational unpredictability are not deemed eligible by ICANN, and if any third party is involved in the funding of the applicant, the latter is to provide evidence of such commitment to funding at the time of submission of its financial documents.&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;span&gt;[15]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Verisign’s public announcement that it was involved in NDC’s funding from the very beginning (well before the auction) and its management later, proves that NDC’s failure to notify ICANN made its application ineligible, or irregular at the very least.&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;span&gt;[16]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Vague Consequences of Failure to Notify ICANN of Changes:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; If in any situation, certain material changes occur in the composition of the management, ownership or financial position of the applicant, ICANN is liable to be notified of the changes by the submission of updated documents. Here, however, the applicant may be subjected to re-evaluation if a &lt;i&gt;material change&lt;/i&gt; is concerned, &lt;i&gt;at ICANN’s will&lt;/i&gt; (there is no mention of what a material change might be). In the event of failure to notify ICANN of changes that would lead the previous information submitted to be false or misleading, ICANN &lt;i&gt;may&lt;/i&gt; reject or deny the application concerned.&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;span&gt;[17]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; NDC’s absolute and repeated denial of any changes, during the extremely brief e-mail ‘investigation’ conducted by ICANN and the Ombudsman, show that at no point was NDC planning on revealing its intimacy with Verisign. No extended evaluation was conducted by ICANN at any point.&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;span&gt;[18]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Note: The arbitrary power allowed here and the vague use of the term ‘material’ obstruct any real accountability on ICANN’s part to ensure that checks are carried out to discourage dishonest behaviour, at all stages.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Arbitrary Enforcement of Background Checks:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; In order to confirm the eligibility of all applicants, ICANN conducts background screening during its initial evaluation process to verify the information disclosed, at the individual and entity levels.&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;span&gt;[19]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; The applicants may be asked to produce any and all documents/evidence to help ICANN complete this successfully, and any relevant information received from ‘any source’ may be taken into account here. However, this screening is conducted only with regard to two criteria: general business diligence and criminal history, and any record of cybersquatting behaviour.&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;span&gt;[20]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; In this case, ICANN’s background screening was clearly not thorough, in light of Verisign’s confirmed involvement since the beginning, and at no point was NDC asked to submit any extra documents (apart from the exchange of e-mails between NDC and ICANN and its Ombudsman) to enable ICANN’s inquiry into its business diligence.&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;span&gt;[21]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Further, ICANN also said that it was not &lt;i&gt;required&lt;/i&gt; to conduct background checks or a screening process, as the provisions only mention that ICANN is &lt;i&gt;allowed&lt;/i&gt; to do so, when it feels the need.&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;span&gt;[22]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; This ludicrous loophole hinders transparency efforts by giving ICANN the authority to ignore any questionable details in applications it desires to deem eligible, based on its own strategic leanings, advantageous circumstances or any other beneficial interests.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;ICANN’s deliberate avoidance of discussing or investigating the ‘allegations’ against NDC (that were eventually proved true), as well as a visible compromise in fairness and equity of the application process point to the conclusion it desired. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;ICANN’s Sketchy Tryst with Legal Conformity:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;ICANN’s lack of &lt;i&gt;substantive compliance&lt;/i&gt;, with California’s laws and its own rules and regulations, leave us with the realisation that efforts towards transparency, enforcement and compliance  (even with emphasis on the IANA Stewardship and Accountability Process) barely meet the procedural minimum. &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Rejection of Request for Postponement of Auction:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; ICANN’s intent to ‘initiate the Auction process once the composition of the set is stabilised’ implies that there must be no pending accountability mechanisms with regard to any applicant.&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;span&gt;[23]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; When ICANN itself determines the opening and closing of investigations or reviews concerning applicants, arbitrariness on ICANN’s part in deciding &lt;i&gt;on which date&lt;/i&gt; the mechanisms are to be deemed as &lt;i&gt;pending&lt;/i&gt;, may affect an applicant’s claim about procedural irregularity. In this case, ICANN had already scheduled the auction for July 27, 2016, before Ruby Glen sent in a request for postponement of the auction and inquiry into NDC’s eligibility on June 22, 2016.&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;span&gt;[24]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Even though the ongoing accountability mechanisms had begun after initiation of the auction process, ICANN confirmed the continuance of the process without assurance about the stability of the contention set as required by procedure. Ruby Glen’s claim about this violation in auction rules was dismissed by ICANN on the basis that there must be no pending accountability mechanisms at the &lt;i&gt;time of scheduling&lt;/i&gt; of the auction.&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;span&gt;[25]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; This means that if any objection is raised or any dispute resolution or accountability mechanism is initiated with regard to an applicant, at any point after fixing the date of the auction, the auction process continues even though the contention set may not be stabilised. This line of defence made by ICANN is not in conformity with the purpose behind the wording of its auction procedure as discussed above.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Lack of Adequate Participation in the Discovery Planning Process:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; In order to gather evidentiary support and start the discovery process for the passing of the injunction, ICANN was required to engage with Ruby Glen in a conference, under Federal law. However, due to a disagreement as to the &lt;i&gt;extent&lt;/i&gt; of participation required from both parties involved in the process, ICANN recorded only a single appearance at court, after which it refused to engage with Ruby Glen.&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;&lt;span&gt;[26]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; ICANN should have conducted a thorough investigation, based on both NDC’s and Verisign’s public statements, and engaged more cooperatively in the conference, to comply substantively with its internal procedure as well jurisdictional obligations. Under ICANN’s Bylaws, it is to ensure that an applicant &lt;i&gt;does not assign&lt;/i&gt; its rights or obligations in connection with the application to another party, as NDC did, in order to promote a competitive market and ensure certainty in transactions.&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;&lt;span&gt;[27]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; However, due to its lack of substantive compliance with due procedure, such bylaws have been rendered weak.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Demand to Dismiss Ruby Glen’s Complaint:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; ICANN demanded the dismissal of Ruby Glen’s complaint on the basis that the complaint was vague and unsubstantiated.&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;span&gt;[28]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; After the auction, Ruby Glen’s allegations and suspicions about NDC’s dishonest behaviour were confirmed publicly by Verisign, making the above demand for dismissal of the complaint ridiculous.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Inapplicability of ICANN’s Bylaws to its Contractual Relationships:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; ICANN maintained that its bylaws are not part of application documents or contracts with applicants (as it is a not-for-profit public benefit corporation), and that ICANN’s liability, with respect to a breach of ICANN’s foundational documents, extends only to officers, directors, members, etc.&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;span&gt;[29]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; In addition, it said that Ruby Glen had not included any facts that suggested a duty of care arose from the contractual relationship with Ruby Glen and Donuts Inc.&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;span&gt;[30]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Its dismissal of and considerable disregard for fiduciary obligations like duty of care and duty of inquiry in contractual relationships, prove the contravention of promised commitments and core values (integral to its entire accountability process), which are to ‘apply in the broadest possible range of circumstances’.&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;sup&gt;&lt;span&gt;[31]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;ICANN’s Legal Waiver and Public Policy:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; Ruby Glen had submitted that, under the California Civil Code 1668, a covenant not to sue was against policy, and that the legal waiver all applicants were made to sign in the application was unenforceable.&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;&lt;span&gt;[32]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; This waiver releases ICANN from ‘any claims arising out of, or related to, any action or failure to act’, and the complaint claimed that such an agreement ‘not to challenge ICANN in court, irrevocably waiving the right to sue on basis of any legal claim’ was unconscionable.&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;sup&gt;&lt;span&gt;[33]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; However, ICANN defended the enforceability of the legal waiver, saying that only a covenant not to sue that is &lt;i&gt;specifically designed&lt;/i&gt; to avoid responsibility for own fraud or willful injury is invalidated under the provisions of the California Civil Code.&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;&lt;span&gt;[34]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; A waiver, incorporating the availability of accountability mechanisms ‘&lt;i&gt;within ICANN’s bylaws&lt;/i&gt; to challenge any final decision of ICANN’s with respect to an application’, was argued as completely valid under California’s laws. It must be kept in mind that challenges to ICANN’s final decisions can make headway &lt;i&gt;only&lt;/i&gt; through its own accountability mechanisms (including the Reconsideration Requests Process, the Independent Review Panel and the Ombudsman), which are mostly conducted by, accountable to and applicable at the discretion of the Board.&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;&lt;span&gt;[35]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; This means that the only recourse for dissatisfied applicants is through processes managed by ICANN, leaving no scope for independence and impartiality in the review or inquiry concerned, as the .WEB case has shown.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Note&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt;: ICANN has also previously argued that its waivers are not restricted by S. 1668 because the parties involved are sophisticated - without an element of oppression, and that these transactions don’t involve public interest as ICANN doesn’t provide necessary services such as health, transportation, etc.&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;span&gt;[36]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Such line of argument shows its continuous refusal to acknowledge responsibility for ensuring access to an essential good, in a diverse community, justifying concerns about ICANN’s commitment to accessibility and human rights.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Required to remain accountable to the stakeholders of the community through &lt;i&gt;mechanisms listed in its Bylaws&lt;/i&gt;, ICANN’s repeated difficulty in ensuring these mechanisms adhere to the purpose behind jurisdictional regulations confirm hindrances to impartiality, independence and effectiveness.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;The Financial Accountability of ICANN’s Auction Proceeds:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The use and distribution of significant auction proceeds accruing to ICANN have been identified by the internet community as issues central to financial transparency, especially in a future of increasing instances of contention sets. &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Private Inurement Prohibition and Legal Requirements of Tax-Exempted Organisations:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt; &lt;span&gt;Subject to California’s state laws as well as federal laws, tax exemptions and tax-deductible charitable donations (available to not-for-profit public benefit corporations) are dependent on the fulfillment of jurisdictional obligations by ICANN, including avoiding contracts that may result in excessive economic benefit to a party involved, or lead to any deviation from purely charitable and scientific purposes.&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;span&gt;[37]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; ICANN’s Articles require that it ‘&lt;i&gt;shall&lt;/i&gt; pursue the charitable and public purposes of lessening the burdens of government and promoting the global public interest in the operational stability of the Internet’.&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;span&gt;[38]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Due to this, ICANN’s accumulation of around USD 60 million (the total net proceeds from over 14 contention sets) since 2014 has been treated with unease, making it impossible to ignore the exponential increase in the same after the .WEB controversy.&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;span&gt;[39]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; With its dedication to a bottom-up, multi-stakeholder policy development process, the use of a single and ambiguous footnote, in ICANN’s Guidebook, to tackle the complications involving significant funds that accrue from last resort auctions (without even mentioning the arbiters of their ‘appropriate’ use) is grossly insufficient.&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;span&gt;[40]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Need for Careful and Inclusive Deliberation Over the Use of Auction Proceeds:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; At the end of the fiscal year 2016, ICANN’s balance sheet showed a total of USD 399.6 million. However, the .WEB sale amount was not included in this figure, as the auction happened after the last date (June 30, 2016).&lt;a href="#_ftn41" name="_ftnref41"&gt;&lt;sup&gt;&lt;span&gt;[41]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Around seven times the average winning bid, a USD 135 million hike in ICANN’s accounts shows the need for greater scrutiny on ICANN’s process of allocation and distribution of these auction proceeds.&lt;a href="#_ftn42" name="_ftnref42"&gt;&lt;sup&gt;&lt;span&gt;[42]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; While finding an ‘appropriate purpose’ for these funds, it is important that ICANN’s legal nature under US jurisdiction as well as its vision, mission and commitments be adhered to, in order to help increase public confidence and financial transparency.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;The CCWG Charter on New gTLD Auction Proceeds:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; ICANN has always maintained that it recognised the concern of ‘significant funds accruing as a result of several auctions’ at the outset.&lt;a href="#_ftn43" name="_ftnref43"&gt;&lt;sup&gt;&lt;span&gt;[43]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; In March 2015, the GNSO brought up issues relating to the distribution of auction proceeds at ICANN52, to address growing concerns of the community.&lt;a href="#_ftn44" name="_ftnref44"&gt;&lt;sup&gt;&lt;span&gt;[44]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; A Charter was then drafted, proposing the formation of a Cross-Community Working Group on New gTLD Auction Proceeds, to help ICANN’s Board in allocating these funds.&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;sup&gt;&lt;span&gt;[45]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; After being discussed in detail at ICANN56, the draft charter was forwarded to the various supporting organisations for comments.&lt;a href="#_ftn46" name="_ftnref46"&gt;&lt;sup&gt;&lt;span&gt;[46]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; The Charter received no objections from 2 organisations and was adopted by the ALAC, ASO, ccNSO and GNSO, following which members and co-chairs were identified from the organisations to constitute the CCWG.&lt;a href="#_ftn47" name="_ftnref47"&gt;&lt;sup&gt;&lt;span&gt;[47]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; It was decided that while ICANN’s Board will have final responsibility in disbursement of the proceeds, the CCWG will be responsible for the submission of proposals regarding the mechanism for the allocation of funds, keeping ICANN’s fiduciary and legal obligations in mind.&lt;a href="#_ftn48" name="_ftnref48"&gt;&lt;sup&gt;&lt;span&gt;[48]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; While creating proposals, the CCWG must recommend how to avoid possible conflicts of interest, maintain ICANN’s tax-exempt status, and ensure diversity and inclusivity in the entire process.&lt;a href="#_ftn49" name="_ftnref49"&gt;&lt;sup&gt;&lt;span&gt;[49]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; It is important to note that the CCWG cannot make recommendations ‘regarding which organisations are to be funded or not’, but is to merely submit a &lt;i&gt;proposal&lt;/i&gt; for the &lt;i&gt;process&lt;/i&gt; by which allocation is undertaken.&lt;a href="#_ftn50" name="_ftnref50"&gt;&lt;sup&gt;&lt;span&gt;[50]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; ICANN’s Guidebook mentions possible uses for proceeds, such as ‘&lt;i&gt;&lt;span&gt;grants to support new gTLD applications or registry operators from communities’&lt;/span&gt;&lt;/i&gt;&lt;span&gt;, the creation of a fund for ‘&lt;i&gt;specific projects for the benefit of the Internet community’, &lt;/i&gt;the ‘&lt;i&gt;establishment of a security fund to expand use of secure protocols’&lt;/i&gt;, among others, to be decided by the Board.&lt;a href="#_ftn51" name="_ftnref51"&gt;&lt;sup&gt;&lt;span&gt;[51]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;A Slow Process and the Need for More Official Updates:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; The lack of sufficient communication/updates about any allocation or the process behind such, in light of ICANN’s current total net auction proceeds of USD 233,455,563, speaks of an urgent need for a decision by the Board (based on a recommendation by CCWG), regarding a &lt;i&gt;timeframe&lt;/i&gt; for the allocation of such proceeds.&lt;a href="#_ftn52" name="_ftnref52"&gt;&lt;sup&gt;&lt;span&gt;[52]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; However, the entire process has been very slow, with the &lt;i&gt;first&lt;/i&gt; CCWG meeting on auction proceeds scheduled for 26 January 2016, and the lists of members and observers being made public only recently.&lt;a href="#_ftn53" name="_ftnref53"&gt;&lt;sup&gt;&lt;span&gt;[53]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Here, even parties interested in applying for the same funds at a later stage are allowed to participate in meetings, as long as they include such information in a Statement of Interest and Declaration of Intention, to satisfy CCWG’s efforts towards transparency and accountability.&lt;a href="#_ftn54" name="_ftnref54"&gt;&lt;sup&gt;&lt;span&gt;[54]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The worrying consequences of ICANN’s lack of financial as well as legal accountability (especially in light of its controversies), reminds us of the need for constant reassessment of its commitment to substantive transparency, enforcement and compliance with its rules and regulations. Its current obsessive courtship with only &lt;i&gt;procedural&lt;/i&gt; regularity must not be mistaken for a greater commitment to accountability, as assured by the post-transition IANA.&lt;/span&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;DECLARATION OF CHRISTINE WILLETT IN SUPPORT OF ICANN’S OPPOSITION TO PLAINTIFF’S &lt;i&gt;EX PARTE &lt;/i&gt;APPLICATION FOR TEMPORARY RESTRAINING ORDER, 2. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.p&lt;/span&gt;&lt;/a&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf"&gt;&lt;span&gt;df&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;4.3, gTLD Applicant Guidebook ICANN, 4-19. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;NOTICE OF AND EX PARTE APPLICATION FOR TEMPORARY RESTRAINING ORDER; MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT THEREOF, 15. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;NOTICE OF AND EX PARTE APPLICATION FOR TEMPORARY RESTRAINING ORDER; MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT THEREOF, 15. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;DECLARATION OF CHRISTINE WILLETT IN SUPPORT OF ICANN’S OPPOSITION TO PLAINTIFF’S &lt;i&gt;EX PARTE &lt;/i&gt;APPLICATION FOR TEMPORARY RESTRAINING ORDER, 4-7. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; PLAINTIFF RUBY GLEN, LLC’S NOTICE OF MOTION AND MOTION FOR LEAVE TO TAKE THIRD PARTY DISCOVERY OR, IN THE ALTERNATIVE, MOTION FOR THE COURT TO ISSUE A SCHEDULING ORDER, 3.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-motion-court-issue-scheduling-order-26oct16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-motion-court-issue-scheduling-order-26oct16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.verisign.com/en_US/internet-technology-news/verisign-press-releases/articles/index.xhtml?artLink=aHR0cDovL3ZlcmlzaWduLm5ld3NocS5idXNpbmVzc3dpcmUuY29tL3ByZXNzLXJlbGVhc2UvdmVyaXNpZ24tc3RhdGVtZW50LXJlZ2FyZGluZy13ZWItYXVjdGlvbi1yZXN1bHRz"&gt;&lt;span&gt;https://www.verisign.com/en_US/internet-technology-news/verisign-press-releases/articles/index.xhtml?artLink=aHR0cDovL3ZlcmlzaWduLm5ld3NocS5idXNpbmVzc3dpcmUuY29tL3ByZXNzLXJlbGVhc2UvdmVyaXNpZ24tc3RhdGVtZW50LXJlZ2FyZGluZy13ZWItYXVjdGlvbi1yZXN1bHRz&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;An expedited discovery request can provide the required evidentiary support needed to meet the Plaintiff’s burden to obtain a preliminary injunction or temporary restraining order. (&lt;/span&gt;&lt;a href="http://apps.americanbar.org/litigation/committees/businesstorts/articles/winter2014-0227-using-expedited-discovery-with-preliminary-injunction-motions.html"&gt;&lt;span&gt;http://apps.americanbar.org/litigation/committees/businesstorts/articles/winter2014-0227-using-expedited-discovery-with-preliminary-injunction-motions.html&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;NOTICE OF AND EX PARTE APPLICATION FOR TEMPORARY RESTRAINING ORDER; MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT THEREOF, 2. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="http://domainincite.com/20789-donuts-files-10-million-lawsuit-to-stop-web-auction"&gt;&lt;span&gt;http://domainincite.com/20789-donuts-files-10-million-lawsuit-to-stop-web-auction&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); (&lt;/span&gt;&lt;a href="https://www.thedomains.com/2016/08/15/afilias-asks-icann-to-disqualify-nu-dot-cos-135-million-winning-bid-for-web/"&gt;&lt;span&gt;https://www.thedomains.com/2016/08/15/afilias-asks-icann-to-disqualify-nu-dot-cos-135-million-winning-bid-for-web/&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="http://www.domainmondo.com/2016/11/news-review-icann57-hyderabad-india.html"&gt;&lt;span&gt;http://www.domainmondo.com/2016/11/news-review-icann57-hyderabad-india.html&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;Art III, Bylaws of Public Technical Identifiers, ICANN. (&lt;/span&gt;&lt;a href="https://pti.icann.org/bylaws"&gt;&lt;span&gt;https://pti.icann.org/bylaws&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;span&gt;[13]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;1.4.1.1, gTLD Applicant Guidebook ICANN, 1-39.(&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;span&gt;[14]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;NOTICE OF AND EX PARTE APPLICATION FOR TEMPORARY RESTRAINING ORDER; MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT THEREOF, 15. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;span&gt;[15]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;1.2.1; 1.2.2, gTLD Applicant Guidebook ICANN, 1-21. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;span&gt;[16]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.verisign.com/en_US/internet-technology-news/verisign-press-releases/articles/index.xhtml?artLink=aHR0cDovL3ZlcmlzaWduLm5ld3NocS5idXNpbmVzc3dpcmUuY29tL3ByZXNzLXJlbGVhc2UvdmVyaXNpZ24tc3RhdGVtZW50LXJlZ2FyZGluZy13ZWItYXVjdGlvbi1yZXN1bHRz"&gt;&lt;span&gt;https://www.verisign.com/en_US/internet-technology-news/verisign-press-releases/articles/index.xhtml?artLink=aHR0cDovL3ZlcmlzaWduLm5ld3NocS5idXNpbmVzc3dpcmUuY29tL3ByZXNzLXJlbGVhc2UvdmVyaXNpZ24tc3RhdGVtZW50LXJlZ2FyZGluZy13ZWItYXVjdGlvbi1yZXN1bHRz&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;span&gt;[17]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;1.2.7, gTLD Applicant Guidebook ICANN, 1-30. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;span&gt;[18]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;DECLARATION OF CHRISTINE WILLETT IN SUPPORT OF ICANN’S OPPOSITION TO PLAINTIFF’S &lt;i&gt;EX PARTE &lt;/i&gt;APPLICATION FOR TEMPORARY RESTRAINING ORDER, 4. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;span&gt;[19]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;1.1.2.5, gTLD Applicant Guidebook ICANN, 1-8. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;span&gt;[20]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;1.2.1, gTLD Applicant Guidebook ICANN, 1-21. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;span&gt;[21]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;DECLARATION OF CHRISTINE WILLETT IN SUPPORT OF ICANN’S OPPOSITION TO PLAINTIFF’S &lt;i&gt;EX PARTE &lt;/i&gt;APPLICATION FOR TEMPORARY RESTRAINING ORDER, 7. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;span&gt;[22]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;6.8; 6.11, gTLD Applicant Guidebook ICANN, 6-5 (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;);&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; DEFENDANT INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS’ MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF MOTION TO DISMISS FIRST AMENDED COMPLAINT, 10. (&lt;/span&gt;&lt;a href="http://domainnamewire.com/wp-content/icann-donuts-motion.pdf"&gt;&lt;span&gt;http://domainnamewire.com/wp-content/icann-donuts-motion.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;span&gt;[23]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;1.1.2.10, gTLD Applicant Guidebook ICANN. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;span&gt;[24]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;NOTICE OF AND EX PARTE APPLICATION FOR TEMPORARY RESTRAINING ORDER; MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT THEREOF, 15. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;&lt;span&gt;[25]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; DEFENDANT INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS’ MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF MOTION TO DISMISS FIRST AMENDED COMPLAINT, 8. (&lt;/span&gt;&lt;a href="http://domainnamewire.com/wp-content/icann-donuts-motion.pdf"&gt;&lt;span&gt;http://domainnamewire.com/wp-content/icann-donuts-motion.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;&lt;sup&gt;&lt;span&gt;[26]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;26(f); 65, Federal Rules of Civil Procedure (&lt;/span&gt;&lt;a href="https://www.federalrulesofcivilprocedure.org/frcp/title-viii-provisional-and-final-remedies/rule-65-injunctions-and-restraining-orders/"&gt;&lt;span&gt;https://www.federalrulesofcivilprocedure.org/frcp/title-viii-provisional-and-final-remedies/rule-65-injunctions-and-restraining-orders/&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); (&lt;/span&gt;&lt;a href="https://www.federalrulesofcivilprocedure.org/frcp/title-v-disclosures-and-discovery/rule-26-duty-to-disclose-general-provisions-governing-discovery/"&gt;&lt;span&gt;https://www.federalrulesofcivilprocedure.org/frcp/title-v-disclosures-and-discovery/rule-26-duty-to-disclose-general-provisions-governing-discovery/&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;&lt;span&gt;[27]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;6.10, gTLD Applicant Guidebook ICANN, 6-6. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); (&lt;/span&gt;&lt;a href="https://www.icann.org/resources/reviews/specific-reviews/cct"&gt;&lt;span&gt;https://www.icann.org/resources/reviews/specific-reviews/cct&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;&lt;span&gt;[28]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; 12(b)(6), Federal Rules of Civil Procedure; DEFENDANT INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS’ MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF MOTION TO DISMISS FIRST AMENDED COMPLAINT, 6. (&lt;/span&gt;&lt;a href="http://domainnamewire.com/wp-content/icann-donuts-motion.pdf"&gt;&lt;span&gt;http://domainnamewire.com/wp-content/icann-donuts-motion.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;) &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;&lt;span&gt;[29]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;DEFENDANT INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS’ MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF MOTION TO DISMISS FIRST AMENDED COMPLAINT, 8. (&lt;/span&gt;&lt;a href="http://domainnamewire.com/wp-content/icann-donuts-motion.pdf"&gt;&lt;span&gt;http://domainnamewire.com/wp-content/icann-donuts-motion.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;&lt;span&gt;[30]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;PLAINTIFF RUBY GLEN, LLC’S OPPOSITION TO DEFENDANT INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS’ MOTION TO DISMISS FIRST AMENDED COMPLAINT; MEMORANDUM OF POINTS AND AUTHORITIES, 12.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-opposition-motion-dismiss-first-amended-complaint-07nov16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-opposition-motion-dismiss-first-amended-complaint-07nov16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;&lt;span&gt;[31]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="https://archive.icann.org/en/accountability/frameworks-principles/legal-corporate.htm"&gt;&lt;span&gt;https://archive.icann.org/en/accountability/frameworks-principles/legal-corporate.htm&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); Art. 1(c), Bylaws for ICANN. (&lt;/span&gt;&lt;a href="https://www.icann.org/resources/pages/governance/bylaws-en"&gt;&lt;span&gt;https://www.icann.org/resources/pages/governance/bylaws-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;&lt;span&gt;[32]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="http://leginfo.legislature.ca.gov/faces/codes_displaySection.xhtml?lawCode=CIV&amp;amp;sectionNum=1668"&gt;&lt;span&gt;http://leginfo.legislature.ca.gov/faces/codes_displaySection.xhtml?lawCode=CIV&amp;amp;sectionNum=1668&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); NOTICE OF AND EX PARTE APPLICATION FOR TEMPORARY RESTRAINING ORDER: MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT THEREOF, 24. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;&lt;span&gt;[33]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; 6.6, gTLD Applicant Guidebook ICANN, 6-4. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;&lt;sup&gt;&lt;span&gt;[34]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;DEFENDANT INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS’ MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF MOTION TO DISMISS FIRST AMENDED COMPLAINT, 18. (&lt;/span&gt;&lt;a href="http://domainnamewire.com/wp-content/icann-donuts-motion.pdf"&gt;&lt;span&gt;http://domainnamewire.com/wp-content/icann-donuts-motion.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;&lt;sup&gt;&lt;span&gt;[35]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.icann.org/resources/pages/mechanisms-2014-03-20-en"&gt;&lt;span&gt;https://www.icann.org/resources/pages/mechanisms-2014-03-20-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;&lt;sup&gt;&lt;span&gt;[36]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;AMENDED REPLY MEMORANDUM IN SUPPORT OF ICANN’S MOTION TO DISMISS FIRST AMENDED COMPLAINT, 4. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-dca-reply-memo-support-icann-motion-dismiss-first-amended-complaint-14apr16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-dca-reply-memo-support-icann-motion-dismiss-first-amended-complaint-14apr16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;&lt;sup&gt;&lt;span&gt;[37]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; 501(c)(3), Internal Revenue Code, USA. (&lt;/span&gt;&lt;a href="https://www.irs.gov/charities-non-profits/charitable-organizations/exemption-requirements-section-501-c-3-organizations"&gt;&lt;span&gt;https://www.irs.gov/charities-non-profits/charitable-organizations/exemption-requirements-section-501-c-3-organizations&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;&lt;sup&gt;&lt;span&gt;[38]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;Art. II, Public Technical Identifiers, Articles of Incorporation, ICANN. (&lt;/span&gt;&lt;a href="https://pti.icann.org/articles-of-incorporation"&gt;&lt;span&gt;https://pti.icann.org/articles-of-incorporation&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;&lt;sup&gt;&lt;span&gt;[39]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://community.icann.org/display/alacpolicydev/At-Large+New+gTLD+Auction+Proceeds+Discussion+Paper+Workspace"&gt;&lt;span&gt;https://community.icann.org/display/alacpolicydev/At-Large+New+gTLD+Auction+Proceeds+Discussion+Paper+Workspace&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;&lt;sup&gt;&lt;span&gt;[40]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.icann.org/policy"&gt;&lt;span&gt;https://www.icann.org/policy&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); 4.3, gTLD Applicant Guidebook ICANN, 4-19. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;&lt;sup&gt;&lt;span&gt;[41]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;5, Internet Corporation for ASsigned Names and Numbers, Fiscal Statements As of and for the Years Ended June 30, 2016 and 2015. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/financial-report-fye-30jun16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/financial-report-fye-30jun16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;);&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="http://domainincite.com/21204-icann-has-400m-in-the-bank?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+DomainIncite+%28DomainIncite.com%29"&gt;&lt;span&gt;http://domainincite.com/21204-icann-has-400m-in-the-bank?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+DomainIncite+%28DomainIncite.com%29&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;&lt;sup&gt;&lt;span&gt;[42]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="http://www.theregister.co.uk/2016/07/28/someone_paid_135m_for_dot_web"&gt;&lt;span&gt;http://www.theregister.co.uk/2016/07/28/someone_paid_135m_for_dot_web&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;&lt;sup&gt;&lt;span&gt;[43]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://community.icann.org/display/CWGONGAP/Cross-Community+Working+Group+on+new+gTLD+Auction+Proceeds+Home"&gt;&lt;span&gt;https://community.icann.org/display/CWGONGAP/Cross-Community+Working+Group+on+new+gTLD+Auction+Proceeds+Home&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;&lt;sup&gt;&lt;span&gt;[44]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="https://www.icann.org/public-comments/new-gtld-auction-proceeds-2015-09-08-en"&gt;&lt;span&gt;https://www.icann.org/public-comments/new-gtld-auction-proceeds-2015-09-08-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;&lt;sup&gt;&lt;span&gt;[45]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="https://www.icann.org/news/announcement-2-2016-12-13-en"&gt;&lt;span&gt;https://www.icann.org/news/announcement-2-2016-12-13-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;&lt;sup&gt;&lt;span&gt;[46]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.icann.org/news/announcement-2-2016-12-13-en"&gt;&lt;span&gt;https://www.icann.org/news/announcement-2-2016-12-13-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;&lt;sup&gt;&lt;span&gt;[47]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.icann.org/news/announcement-2-2016-12-13-en"&gt;&lt;span&gt;https://www.icann.org/news/announcement-2-2016-12-13-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://community.icann.org/display/CWGONGAP/Cross-Community+Working+Group+on+new+gTLD+Auction+Proceeds+Home"&gt;&lt;span&gt;https://community.icann.org/display/CWGONGAP/Cross-Community+Working+Group+on+new+gTLD+Auction+Proceeds+Home&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;&lt;sup&gt;&lt;span&gt;[48]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="https://ccnso.icann.org/workinggroups/ccwg-charter-07nov16-en.pdf"&gt;&lt;span&gt;https://ccnso.icann.org/workinggroups/ccwg-charter-07nov16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); (&lt;/span&gt;&lt;a href="https://www.icann.org/news/announcement-2-2016-12-13-en"&gt;&lt;span&gt;https://www.icann.org/news/announcement-2-2016-12-13-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;&lt;sup&gt;&lt;span&gt;[49]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="https://www.icann.org/public-comments/new-gtld-auction-proceeds-2015-09-08-en"&gt;&lt;span&gt;https://www.icann.org/public-comments/new-gtld-auction-proceeds-2015-09-08-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;&lt;sup&gt;&lt;span&gt;[50]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="https://community.icann.org/display/CWGONGAP/CCWG+Charter"&gt;&lt;span&gt;https://community.icann.org/display/CWGONGAP/CCWG+Charter&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;&lt;sup&gt;&lt;span&gt;[51]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; 4.3, gTLD Applicant Guidebook ICANN, 4-19. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;&lt;sup&gt;&lt;span&gt;[52]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/auctions/proceeds"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/auctions/proceeds&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;&lt;sup&gt;&lt;span&gt;[53]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="https://community.icann.org/pages/viewpage.action?pageId=63150102"&gt;&lt;span&gt;https://community.icann.org/pages/viewpage.action?pageId=63150102&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;&lt;sup&gt;&lt;span&gt;[54]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.icann.org/news/announcement-2-2016-12-13-en"&gt;&lt;span&gt;https://www.icann.org/news/announcement-2-2016-12-13-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/icann2019s-problems-with-accountability-and-the-web-controversy'&gt;https://cis-india.org/internet-governance/blog/icann2019s-problems-with-accountability-and-the-web-controversy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padma Venkataraman</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Transparency</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    

   <dc:date>2017-10-28T15:49:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gdpr-and-india-a-comparative-analysis">
    <title>GDPR and India: A Comparative Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/gdpr-and-india-a-comparative-analysis</link>
    <description>
        &lt;b&gt;At present, companies world over are in the process of assessing the impact that EU General Data Protection Regulations (“GDPR”) will have on their businesses.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The post is written by Aditi Chaturvedi and edited by Amber Sinha&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;High administrative  fines in case of non-compliance with GDPR provisions are a driving force behind these concerns as they can lead to loss of business for various countries such as India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To a large extent, future of business will depend on how well India responds to the changing regulatory  changes unfolding globally. India  will have to  assess her preparedness and make convincing changes to retain the status as a  dependable processing destination. This document gives a brief overview of data protection provisions of the Information Technology Act, 2000 followed by a comparative analysis of the key  provisions of GDPR and Information Technology  Act and the Rules notified under it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/gdpr-and-india"&gt;Download the full blog post&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gdpr-and-india-a-comparative-analysis'&gt;https://cis-india.org/internet-governance/blog/gdpr-and-india-a-comparative-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aditi Chaturvedi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-28T15:17:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/jobs/policy-officer-ig">
    <title>Policy Officer - Internet Governance</title>
    <link>https://cis-india.org/jobs/policy-officer-ig</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is seeking an individual with a background and interest in issues pertaining to internet governance including privacy, big data, freedom of expression, artificial intelligence etc. under its Internet Governance programme.&lt;/b&gt;
        &lt;p&gt;This position will include undertaking field research, developing policy briefs, organizing conferences, and writing research reports, engaging with key stakeholders, and collaborating with project partners in areas under our research.&lt;/p&gt;
&lt;p&gt;This position is for a duration of 1 year. There is currently one vacancy for this post. Selected candidate will work from CIS office in Bangalore.&lt;/p&gt;
&lt;h4&gt;&lt;b&gt;Required Skill Sets&lt;/b&gt;&lt;/h4&gt;
&lt;ol&gt;
&lt;li&gt;Previous work and an interest in issues pertaining to IG including privacy, big data, FoE, and AI.&lt;/li&gt;
&lt;li&gt;Strong writing and analytical skills.&lt;/li&gt;
&lt;li&gt;Experience in conducting research.&lt;/li&gt;
&lt;li&gt;Knowledge of Indian law and policy relevant to the digital sphere.&lt;/li&gt;
&lt;li&gt;Demonstrable research skills and ability to undertake research independently.&lt;/li&gt;
&lt;li&gt;Demonstrable writing and communication skills.&lt;/li&gt;
&lt;li&gt;Ability to work independently or with minimal supervision.&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Compensation:&lt;/b&gt; Based on experience and education.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Application requirements:&lt;/b&gt; two writing samples and CV.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Contact:&lt;/b&gt; &lt;a href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/jobs/policy-officer-ig'&gt;https://cis-india.org/jobs/policy-officer-ig&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-03T07:12:15Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data">
    <title>Ahead of data protection law roll out, experts caution that it shouldn't limit collection and use of data</title>
    <link>https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data</link>
    <description>
        &lt;b&gt;With India planning to roll out a new data protection regime following the landmark Supreme Court judgment upholding right to privacy as fundamental right, experts have cautioned that the new law should not limit collection and use of data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.firstpost.com/tech/news-analysis/ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data-4134753.html"&gt;published by First Post&lt;/a&gt; on October 12, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"The new data protection law should have data-driven innovation at its core," said Kamlesh Bajaj, Founder-CEO, Data Security Council of India (DSCI).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It should not limit data collection and use, but limit harm to citizens," Bajaj added at a seminar on "Data Protection and Privacy" organised by non-profit industry body Internet and Mobile Association of India (IAMAI).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a major boost to individual freedom, the Supreme Court in August declared that right to privacy was a fundamental right and protected as an intrinsic part of life and personal liberty and freedoms guaranteed by the Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Supreme Court judgment calls for production of a new law," said Sunil Abraham, Executive Director of Bangaluru-based research organisation, Centre for Internet and Society (CIS).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The experts noted that the Supreme Court judgment remains meaningless for digital Indians without a proper data protection law in place as all other existing laws, such as the Information Technology Act, 2000, do not adequately address the question of right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recognising the importance of data protection and keeping personal data of citizens secure and protected, the Ministry of Electronics and Information Technology (MeitY) on 31 July, constituted a Committee of Experts under the chairmanship of its former judge Justice BN Srikrishna to study and identify key data protection issues and recommend methods for addressing them. The committee will also suggest a draft Data Protection Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"While the regulator should be given tools to make companies behave better, it should not start with harsh punitive actions," Abraham noted, adding that big fines could challenge the very logic of regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a question to whether a robust data protection regime should come in conflict with issue such as national security, he said that lawmakers should find a way to maximise both imperatives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Surveillance is like salt in cooking. It is necessary, but in limited quantity," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participating in a chat with Google's Public Policy Director Chetan Krishnaswamy at the event, MP Rajeev Chandrasekhar, however, said that regulation should start with the process of data collection itself and consumers cannot be expected to demonstrate harm or inappropriate use of their data to enjoy the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It should not be a free run for companies to mine consumer data," the independent Rajya Sabha member said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He emphasised that the process of formulating a data protection law is as important as the law itself and all stakeholders should be able to openly put forward their views and apprehensions and it is only with such a consultative process that the opportunities for the technology space can be safeguarded.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data'&gt;https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-02T15:20:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/securing-the-digital-payments-ecosystem">
    <title>Securing The Digital Payments Ecosystem</title>
    <link>https://cis-india.org/internet-governance/news/securing-the-digital-payments-ecosystem</link>
    <description>
        &lt;b&gt;Udbhav Tiwari attended a consultation organized by NITI Aayog and Observer Research Foundation on October 9, 2017 in NITI Aayog office in New Delhi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;Since demonetisation, the Indian  government has taken several steps to enable digital payments adoption  across the country. With initiatives like the &lt;i&gt;Digidhan Mission&lt;/i&gt;,  setting a target of 25 billion digital transactions in 2017-18, the Modi  government is setting high benchmarks which necessitate appropriate  ecosystem support. Indeed, the &lt;i&gt;Digidhan Mission&lt;/i&gt;’s ‘Objectives and Functions’, recognise that securing India’s digital payments landscape is critical.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;In light of the exponential rise in  e-commerce and digital payments, this imperative could not have come any  sooner. India's digital transformation has not only highlighted the  need for increased financial inclusion but also the emergent cyber  security threats that it brings with it. This transformation, however,  also represents an opportunity - not only to modernize India's laws and  regulations to respond to global changes but also influence these  changes and set a trajectory of growth for other emerging markets.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Keeping in mind these realities, NITI  Aayog, in association with ORF, is preparing a cyber-security White  Paper that will highlight best practices for the Integrity of Payments  Systems and help enhance trust of the users in the payments ecosystem.  The White Paper, through consultations with relevant stakeholders, will  provide policy inputs to modernise standards for transaction security,  hardware security and information security.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;In this context a meeting was convened constituting experts and practitioners, who can help develop a comprehensive strategy to secure the digital payments ecosystem. The discussion was chaired by Dr. VK Saraswat, Hon’ble Member, NITI Aayog. &lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/securing-the-digital-payments-ecosystem'&gt;https://cis-india.org/internet-governance/news/securing-the-digital-payments-ecosystem&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-28T15:27:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web">
    <title>Sex, drugs and the dark web</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web</link>
    <description>
        &lt;b&gt;Blend anonymity and bitcoins for a ‘guaranteed safe’ cocktail of terrifying potential.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/internet/sex-drugs-and-the-dark-web/article19818872.ece"&gt;Hindu&lt;/a&gt; on October 7, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;It’s hardly a secret that marijuana’s quite easy to get nowadays. Cigarette shop owners, paanwaalas, and otherwise innocuous dealers of innocuous goods hide their stash just out of sight of the unaware. Rustom Juneja is just another marijuana-smoking adult in one of India’s biggest cities. He used to get his ‘stuff’ from local dealers. Till he “got bored of Indian produce,” as he says. So, in 2015, he decided to go to the dark web.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I brought strains of marijuana from the U.S. and Canada, from a marketplace on the dark web,” Juneja says. The packages were shipped from their respective countries, they traversed borders, bypassed stringent security and checks, crossed continents, and landed at Juneja’s doorstep.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That is the dark web for you. Completely unpoliced, willing users can find anything, from the aforementioned marijuana, to “hard” drugs, to military grade-weaponry and even sex workers. All delivered to your doorstep just like books or designer watches from Amazon, Flipkart, or Snapdeal. And yes, some even offer cash-on-delivery. Returns might not be as simple, though.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, a group of students were arrested in Hyderabad on charges of purchasing LSD (also called ‘acid’) on the dark web. But they weren’t arrested because they had made the transaction on the dark web; they were arrested because the purchase and/ or use of LSD is illegal under Indian law (Narcotic Drugs and Psychotropic Substances Act, 1985).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, transactions on the dark web belong to a legal grey area. More importantly, the transactions here are mostly untraceable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, just what is the dark web?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Shadow world&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The world wide web is a Brobdingnagian mass of data, parts of which are ‘indexed’ so that they may be found by users through search engines (Google, Bing, etc). The parts of the web that aren’t indexed, and therefore available for public access, are known as the ‘deep web’. This was the part initially known as the dark web, with the ‘dark’ being more an allusion to being kept away from the light of regular access than its now more nefarious association. While it’s near impossible to put a number to it, unofficial estimates mostly concur that the vast majority of the web is unindexed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then, in the early 2000s, programmers began developing techniques that would be able to offer anonymous access to these hidden bits of the web. In 2002, the U.S. Naval Laboratory released one of the earliest versions of The Onion Router (TOR), a software that would allow anonymous communication between American intelligence agents and operatives on foreign soil.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This didn’t go quite according to plan, though. Tor was soon appropriated by cyberpunks, who began using the protocol to give access to websites that would host, share, and trade illicit goods. Today, the dark web is a sub-section of the deep web, accessed using specialised software like Tor that ensures absolute anonymity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;The onion protocol&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;“If you want to track anything on the &lt;a href="http://www.thehindu.com/tag/541-428/internet/?utm=bodytag"&gt;&lt;span&gt;Internet, &lt;/span&gt;&lt;/a&gt;it can happen at three levels — the level of the person who sends a request, at the level of the person responding to this request, or it can happen in between these two ends,” says Udbhav Tiwari, Policy Officer at the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Because of this structure, it is easy to track actions and resources across the Internet, using the same terminology that makes it so easy to index and search. So, people began thinking this might become a problem.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most of us have heard of the Hyper Text Transfer Protocol Secure or HTTPS, a protocol that ensures that information is encrypted and secure the moment it leaves a computer till the time it reaches a destination computer. But this protocol only protects one of the three levels on which information might be tracked. The dark web is built to ensure that the remaining levels are also protected and kept anonymous.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The reason it’s called the ‘onion’ protocol is because there are bits of information that are encrypted over and over again. So, when something leaves one computer, it is encrypted with a layer, then it hits another computer and is encrypted with another layer, and it hits another computer, where it is encrypted yet again. When this information returns, each layer is peeled off, so that you get the information you requested, with none of the encryption,” Tiwari says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This kind of encryption makes it borderline impossible to figure out who is communicating with who and what they are talking about, unless the physical machines at either end are compromised, or a vulnerability on these machines is exploited by setting up a fake website on the Internet — a technique the FBI uses to track child pornography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And what does it all mean? A level of guaranteed secrecy with terrifying potential. A 2015 study found that light drugs were the most traded commodity on the dark web, and that as much as 26% of its content could be classified as ‘child exploitation’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A 2016 study found that almost 57% of live websites on the dark web hosted illicit material. The ease of access and the minimal chances of being caught has meant a steady rise in the use of the dark web and the murk it peddles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s a market where both buyer and vendor are rated, like Uber. This establishes trust, and authenticates the veracity of a potential transaction. Thus, for instance, buyers are obviously more inclined to buy an assault rifle from a highly-rated seller. And you will be sold grenades only if your ratings assure the vendor you’ll fulfil your end of the transaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once a transaction is finalised, the payment is held ‘in escrow’ — a third party arbitration system which ensures the buyer is paid only after they have met their end of the bargain. The third parties also arbitrate in the event of a dispute.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;As easy as pie&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Juneja bought marijuana three times, all from the same vendor, but only two shipments reached him. The third time, the parcel never landed, but the arbiters decided in favour of the vendor because he had a much better rating and Juneja lost his money.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With no proper method to find out whether the vendor has shipped a product or the buyer has received it, this adjudication is seen as the best stop-gap arrangement. For Juneja, as for many others, the loss was a deal breaker, and he didn’t go back to the dark web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When the first two shipments did arrive though, they came with absolute swagger and nonchalance. “The product was sealed and flattened out, as if it were a magazine or postcard.” It does say something of international security that it can’t differentiate between a shipment of &lt;em&gt;The New Yorker&lt;/em&gt; and marijuana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dark web transactions were initially carried out using legal state-issued currencies. However, the simplicity of tracking online transactions made with property monitored by the government led to the rise of cryptocurrencies — digital or virtual currency that uses cryptographic techniques for security and which would be beyond state control. Besides the need to go underground, there was a political angle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“These people see money as a state incursion into private affairs,” says Jyotirmoy Bhattacharya, economics professor at Delhi’s Ambedkar University.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first, and still most popular, cryptocurrency was released in 2009 — bitcoin. Created by an unknown person or group of people, going only by the pseudonym Satashi Nakamoto, bitcoin was intended as a ‘peer-to-peer electronic cash system’, which would be completely decentralised, with no central server or state authority. This meant that the value and proliferation of bitcoin would be determined by its creators and users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The idea of a virtual currency has been around since before Nakamoto, but a large problem was in limiting creation and supply. Bitcoin was the first to solve this problem. “Bitcoin uses a technique known as the ‘proof-of-work’ (POW). So, to create a new set of this currency, you have to spend some amount of computational resources. This limits how much currency you can generate, thus ensuring that the currency has a value,” says Bhattacharya.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;What is bitcoin?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;“A bitcoin is simply a solution to a puzzle. If there are a set of puzzles that are a part of the bitcoin protocol, one bitcoin is simply one of the solved puzzles of that set, along with a digital signature of who solved the puzzle,” says Bhattacharya. A public ledger tracks the ownership of bitcoins, which ensures that the same one is not used again by the same person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Since there is no central authority, your transaction has to match the globally agreed ledger.” To ensure that ownership of bitcoin is legitimate, every transaction is published in the ledger, thus creating a ‘chain of transactions’ known as a blockchain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the past few years, the value of bitcoin has skyrocketed, so much so that people have begun investing in it, as an asset. When bitcoin was first used as tender in early 2010, it was valued at around $0.003. For a brief while in August, one bitcoin was valued at $4,500, a record high.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the everyday world of eggs and bread, though, bitcoin has limited use. It is still unrecognised by several nations, and deemed illegal in many others. It’s in the dark web that it finds its most votaries. While it would be flippant to suggest that bitcoin is used on the dark web solely for illicit uses, it is difficult to deny its origins for that purpose, and its continuing use there.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bedavyasa Mohanty, an Associate Fellow at Observer Research Foundation Cyber Initiative, says that there are Indian users transacting on the dark web using bitcoin and claims that this number is only likely to increase as accessibility increases. “Bitcoin cannot be tracked,” says Mohanty. “With the ledger and the blockchain, you can trace the trail of a certain bitcoin, but it is anonymised. You can’t point out who owns that bitcoin.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This, in effect, means an entirely anonymous transaction may be made on the dark web for any number of illegal goods or services using a currency that leaves a trail which goes nowhere and leaves no fingerprints. This, in a nutshell, is the danger when bitcoin combines with the dark web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several users I spoke to either claimed that fears about the dark web were mostly unfounded, or that the freedom it offered was an essential facet of the Internet. But it can’t be denied that the sheer possibility that somebody can deal in child porn or hard drugs or deadly weapons right under the nose of the law is a terrifying one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the perspective of Indian law enforcement, given the technical knowhow they have to track down owners and users of bitcoins, the chances of discovery are minimal, says Mohanty. The currency uses a system of public and private ‘keys’, ensuring that an intercepted bitcoin transmission is useless without those keys. To top it, India does not have any clear laws to regulate cryptocurrencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“For India to regulate cryptocurrencies, it would need to legally recognise their existence,” says Mohanty. “And if you do recognise them, what do you treat them as? As a security? Or as a currency that can be traded openly, and so on. That’s part of the reason why the Reserve Bank hasn’t formally recognised cryptocurrencies.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Flagging illegal trades&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Bitcoin exchanges in India insist that they follow strict guidelines and e-KYC (Know Your Customer) rules, ensuring that the identity of every customer on the exchange is verified. “If somebody tries to use a bitcoin from Zebpay or any other recognised exchange, they will definitely be tracked down,” says Saurabh Agrawal, co-founder of Zebpay, one of India’s largest bitcoin exchanges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We use strong software; if any of our users use bitcoins for illegal purposes, we close their accounts. We’ve done this in the past and will do so in future as well.” He claims their software maintains a list of web addresses deemed ‘red alert’ sites, and the moment a bitcoin is sent to such a site, the transaction is flagged.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others are less positive. “While we can track whether a transaction is made through illegal routes, to some extent it’s true that we cannot track all transactions in real time as this takes a large amount of data,” says Sathvik Vishwanath, CEO, Unocoin.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“But if someone is trying to buy or sell from illegal marketplaces, we have a mechanism where we can — and do — stop it.” Given that customers are KYC-verified, “they don’t try to indulge in malicious activities,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pan to Rustom Juneja. Juneja made three transactions in 2015, using bitcoins purchased entirely legally from an exchange. “You have to create an account on any of the markets online, and transfer your bitcoins to that account,” Juneja informs me. His account too was KYC-verified, and they had all his details — PAN number, Aadhar, and so on. He had no clue then that the exchanges had tracking methods. “Look, if these actually worked, there’s no way we wouldn’t have been caught,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Part of the problem, of course, is that Indian law does not recognise the dark web as a separate entity from the ‘surface’ web; there are no special laws for it. Yet, even if laws were put in place, there are few ways in which states can monitor or block the use of the dark web owing to a host of technical and legal reasons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A sense of urgency [regarding the dark web], especially relating to the use of bitcoin for illicit activities, hasn’t been instilled in the government yet,” says Mohanty. “What they are worried about is terrorism, and the use of anonymous technologies and chatrooms for radicalisation, terror planning, or buying and selling weapons.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Juneja is one of a few thousand active Indian users on the dark web. Nothing stops them from buying a strain of marijuana from Canada. But nothing stops them from buying a Kalashnikov either.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Sunny side up&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The dark web isn’t necessarily only a marketplace for all of the world’s nefarious practices. The very anonymity and shrouds that the dark web offers can be used for general practices by users looking merely for privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aritra Ghosh, a Ph.D student of Computational Astrophysics at Yale University says, “(The dark web is) possibly the only way to do something in “secret” away from any kind of surveillance. Onion routing still hasn’t been broken. So, it can play a substantial role in movements against companies, governments and so on.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And this is a quality that many frequenters of the dark web swear by. Even the ability to use anonymous messenger service with a near-complete guarantee of not being ‘watched’ drives a lot of people here.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Akarsh Pandit, 24, says unrestricted access to many resources including books and documents is an area of huge potential. “Another significant pro is the avoidance of national firewalls that exist in some countries. Moreover, you gain access to unindexed search results,” he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web'&gt;https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-01-02T16:13:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cy-fy-2017">
    <title>CyFy 2017</title>
    <link>https://cis-india.org/internet-governance/news/cy-fy-2017</link>
    <description>
        &lt;b&gt;CyFy is a conference on internet governance and cyber security organised by the Observer Research Foundation (ORF) in New Delhi between 2 and 4 October 2017. Sunil Abraham was a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham was a speaker on a panel titled "Security Through Identity?" on the 4 October  2017 and chaired an invite only session titled "Encryption: The End of  Surveillance?" on the 3rd of October, 2017. Saikat Dutta and Udbhav Tiwari also participated in the encryption session. Saikat was a speaker in a session titled "Digital Vulnerabilities: Capacity Building for Tackling Cyber Crime" on 3 October 2017. Udbhav Tiwari chaired a session titled "Dangerous Disclosures: Cyber Security Incident Reporting" on 4 October 2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Conference agenda &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyfy-2017-agenda"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cy-fy-2017'&gt;https://cis-india.org/internet-governance/news/cy-fy-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-26T09:36:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/revisiting-per-se-vs-rule-of-reason-in-light-of-the-intel-conditional-rebate-case">
    <title>Revisiting Per Se vs Rule of Reason in Light of the Intel Conditional Rebate Case</title>
    <link>https://cis-india.org/internet-governance/blog/revisiting-per-se-vs-rule-of-reason-in-light-of-the-intel-conditional-rebate-case</link>
    <description>
        &lt;b&gt;Recent developments in the European Union (EU) regarding the antitrust case against Intel have brought back into focus two rules of competition law analysis- the per se rule and the rule of reason. In light of the decision by the Court of Justice of the European Union in the matter, this Note examines the application of the two rules to the case in detail. Additionally, it analyzes the statutory and judicial basis for the rules in the context of the EU and Indian competition law regimes, and concludes by identifying some areas in which these concepts would be relevant.&lt;/b&gt;
        &lt;p&gt;Click on the link below to read the full article:&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/files/revisiting-per-se-vs-rule-of-reason-in-light-of-intel.pdf"&gt;Revisiting Per Se vs Rule of Reason in Light of the Intel Conditional Rebate Case &lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/revisiting-per-se-vs-rule-of-reason-in-light-of-the-intel-conditional-rebate-case'&gt;https://cis-india.org/internet-governance/blog/revisiting-per-se-vs-rule-of-reason-in-light-of-the-intel-conditional-rebate-case&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruthi Anand</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Competition</dc:subject>
    

   <dc:date>2017-10-04T13:45:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/daily-o-october-4-2017-attempted-data-breach-of-uidai-rbi-isro-and-flipkart">
    <title>Attempted data breach of UIDAI, RBI, ISRO and Flipkart is worrisome</title>
    <link>https://cis-india.org/internet-governance/news/daily-o-october-4-2017-attempted-data-breach-of-uidai-rbi-isro-and-flipkart</link>
    <description>
        &lt;b&gt;Perhaps, we got lucky this time, but the ongoing problem of massive cyber-security breaches wouldn't stop at one thwarted attempt to steal sensitive information from the biggest and most important databases. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="https://www.dailyo.in/variety/uidai-rbi-isro-flipkart-hack-cyber-security-data-breach-dark-net/story/1/19893.html"&gt;DailyO&lt;/a&gt; on October 4, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;An&lt;/span&gt;&lt;span&gt; &lt;a href="http://www.moneycontrol.com/news/trends/current-affairs-trends/uidai-bse-among-6000-indian-organisations-reportedly-affected-by-data-breach-2404223.html/amp" rel="nofollow" target="_blank"&gt;alarming report &lt;/a&gt;&lt;/span&gt;&lt;span&gt;on a potential data breach impacting almost 6,000 Indian organisations — including the Unique Identification Authority of India (UIDAI) that hosts Aadhaar numbers, Reserve Bank of India, Bombay Stock Exchange and Flipkart — has surfaced and supposedly been contained.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A cyber security firm in Pune, Seqrite, had found in its Cyber Intelligence Labs that India's national internet registry, IRINN (Indian Registry for Internet Names and Numbers), which comes under NIXI (National Internet Exchange of India), was compromised, though the issue has reportedly been "addressed".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sequite tracked an advertisement on the "dark net" — the digital underworld — offering access to servers and database dump of more than 6,000 Indian businesses and public assets, including the big ones such as UIDAI, RBI, BSE and Flipkart.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report states that the "dealer could have had access to usernames, email ids, passwords, organisation name, invoices and billing documents, and few more important fields, and could have potentially shut down an entire organisation".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI has &lt;span&gt;&lt;a href="https://twitter.com/UIDAI/status/915528090230517761" rel="nofollow" target="_blank"&gt;denied&lt;/a&gt;&lt;/span&gt; the security breach of Aadhaar data in the IRINN attacks, in an expected move. "UIDAI reiterated that its existing security controls and protocols are robust and capable of countering any such attempts or malicious designs of data breach or hacking," said the report, which is basically a rebuttal from the powerful organisation at the heart of centralising all digital information of all Indians.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the aggrieved parties have been notified, and the NCIIPC (National Critical Information Infrastructure Protection Centre) is looking at the issue, what this means is that digital information is a minefield susceptible to all kinds of threats from criminals as well as foreign adversaries, along with being commercially exploited by major conglomerates.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Till August 2017 alone, around &lt;span&gt;&lt;a href="https://www.medianama.com/2017/08/223-ransomware-india-wannacry-petya/" rel="nofollow" target="_blank"&gt;37 incidents&lt;/a&gt;&lt;/span&gt; of ransomware attacks have been reported, including the notorious WannaCry attacks. But what makes the attacks very, very threatening is the government's insistence — illegal at that — to link Aadhaar with every service, and create a centralised nodal, superior network of all networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This "map of maps" has been rightly called out as a potential &lt;span&gt;&lt;a href="https://thewire.in/118541/national-security-case-aadhaar/" rel="nofollow" target="_blank"&gt;national security threat&lt;/a&gt;&lt;/span&gt;, as it makes a huge reservoir of data vulnerable to cyberthreats from mercenaries, the digital underworld and foreign adversaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="A widely circulated report prepared by the Centre for Internet and Society (CIS) underlined the major flaws in the 2016 Aadhaar Act, that makes it vulnerable to several digital threats. Photo: Reuters" src="https://smedia2.intoday.in/dailyo//story/embed/201710/data-inside_100417083834.jpg" title="data-inside_100417083834.jpg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;A widely circulated report prepared by the Centre for Internet and Society (CIS) underlined the major flaws in the 2016 Aadhaar Act, that makes it vulnerable to several digital threats. Photo: Reuters&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That the data dump in the digital black market provides access to entire servers for a meagre sum of Rs 42 lakh, as mentioned in the report, is a sign of how insecure our personal information could be on the servers of the biggest government organisations and commercial/online retail giants. This includes the likes of Flipkart, which store our passwords, emails, phone numbers and other important information linked to our bank details and more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whilst UIDAI was declared a &lt;span&gt;&lt;a href="http://meity.gov.in/writereaddata/files/UIDAI%20CII%20notification%20Dec15.pdf" rel="nofollow" target="_blank"&gt;"protected system"&lt;/a&gt;&lt;/span&gt; under Section 70 of the Information Technology Act, and a critical information infrastructure, in practice, there are way too many breaches and leaks of Aadhaar data to merit that tag.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Because the current (officially thwarted) attempt to hack into these nodal databases involved the data of hundreds of millions of Indians, the matter has been dealt with the required seriousness. However, as the report states, "among the companies whose emails they found were Tata Consultancy Services, Wipro, Indian Space Research Organisation, Mastercard/Visa, Spectranet, Hathway, IDBI Bank and EY".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a laundry list of the biggest and most significant organisations, with massive digital footprints, which are sitting on enormous databanks. Hacking into ISRO, for example, could pose a formidable risk to India's space programmes as well as jeopardise information safety of crucial space projects that are jointly conducted with friendly countries such as Russia, China and the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A widely circulated report prepared by the Centre for Internet and Society (CIS) on the Aadhaar Act and &lt;span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india" rel="nofollow" target="_blank"&gt;its non-compliance with data protection law&lt;/a&gt;&lt;/span&gt; in India underlined the major flaws in the 2016 Aadhaar Act, that makes it vulnerable to several digital threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, CIS also reported how government websites, especially "those run by National Social Assistance Programme under Ministry of Rural Development, National Rural Employment Guarantee Act (NREGA) run by Ministry of Rural Development, Daily Online Payment Reports under NREGA (Governemnt of Andhra Pradesh) and Chandranna Bima Scheme (also run by Government of Andhra Pradesh) combined were responsible for&lt;a href="http://m.thehindubusinessline.com/info-tech/aadhaar-data-leak-exposes-cyber-security-flaws/article9677360.ece" rel="nofollow" target="_blank"&gt;&lt;span&gt; publicly exposing&lt;/span&gt; &lt;/a&gt;personal and Aadhaar details of over 13 crore citizens".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has been rather lackadaisical about the grave security threats posed by India's shaky digital infrastructure, saying it's robust when it's not: the UIDAI itself has been brushing the allegations of exclusion, data breach and leaking of data from various government and private operators' servers and there have been several documentations of the security threat as well as the human rights violations that the digital breaches pose for India's institutions and its citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted welfare economist Jean Dreze &lt;span&gt;&lt;a href="http://indianexpress.com/article/opinion/columns/dissent-and-aadhaar-4645231/" rel="nofollow" target="_blank"&gt;says&lt;/a&gt;&lt;/span&gt;, "With Aadhaar immensely reinforcing the government's power to reward loyalty and marginalise dissenters, the embers of democracy are likely to be further smothered."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even as India's jurisprudence held privacy and autonomy as supreme, Indians remain vulnerable to institutional failures and an abject lack of awareness on the gravity of digital destabilisation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/daily-o-october-4-2017-attempted-data-breach-of-uidai-rbi-isro-and-flipkart'&gt;https://cis-india.org/internet-governance/news/daily-o-october-4-2017-attempted-data-breach-of-uidai-rbi-isro-and-flipkart&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-02T16:20:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
