<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 111 to 125.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/who-is-following-me"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/white-paper-on-data-protection-and-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/whistle-blowers-unite"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-india-september-25-2016-manju-vi-when-the-war-is-on-whatsapp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/when-digital-spills-into-physical"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/revolutions-viral"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-march-11-2014-chanpreet-khurana-when-politics-gets-social"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-crest-edition-april-27-2013-rukmini-shrinivasan-when-netas-network"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-kv-aditya-bharadwaj-march-15-2019-when-laugh-lines-turn-worry-lines"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/when-data-is-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-hindustan-times-aug-26-2012-when-goi-blocks-twitterati-fly-off-their-handles"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/who-is-following-me">
    <title>Who is Following Me: Tracking the Trackers (IGF2012)</title>
    <link>https://cis-india.org/news/who-is-following-me</link>
    <description>
        &lt;b&gt;The Internet Society and the Council of Europe are co-organising a workshop at the IGF (Baku - 8 November 2012 - 09:00 - 10:30) regarding online tracking. Malavika Jayaram is a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Interest in online tracking as a policy issue spiked with the release  of the Preliminary Federal Trade Commission Staff Report in December  2010 entitled &lt;i&gt;Protecting Consumer Privacy in an Era of Rapid Change – A Proposed Framework for Businesses and Policymakers&lt;/i&gt; calling for a “do not track” mechanism, the launch of the W3C Tracking  Protection Workng Group and the recent entry into force of the so-called  European “Cookie Directive” provisions. However, the actual and  potential observation of individuals’ interactions online has long been a  concern for privacy advocates and others.&lt;/p&gt;
&lt;p&gt;Much of the policy attention is currently focused on cookies used to  track users to build profiles for more targeted advertising, but some of  the more difficult issues are:&lt;/p&gt;
&lt;ul class="rteindent1"&gt;
&lt;li style="text-align: justify; "&gt; How to deal with less-observable tracking (e.g. browser and/or device  fingerprinting, monitoring of publicly disclosed information)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; How to develop laws that accommodate different tracking scenarios – for example:  
&lt;ul&gt;
&lt;li&gt; different entities (law enforcement, companies, etc.); &lt;/li&gt;
&lt;li&gt; different and sometimes multiple purposes (security, personalising  user experience, targeting advertising, malicious activity; etc.); &lt;/li&gt;
&lt;li&gt; first-party and third-party tracking o single site and multiple site tracking&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Transparency (particularly on small mobile devices)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Whether a traditional consent model is sufficient and effective&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The panel:&lt;/p&gt;
&lt;ul class="rteindent1"&gt;
&lt;li&gt; Wendy Seltzer, Policy Council, World Wide Web Consortium (W3C)&lt;/li&gt;
&lt;li&gt; Kimon Zorbas, Vice President, Interactive Advertising Bureau (IAB) Europe&lt;/li&gt;
&lt;li&gt; Cornelia Kutterer, Director of Regulatory Policy, Corporate Affairs, LCA, Microsoft EMEA&lt;/li&gt;
&lt;li&gt; Malavika Jayaram, partner at Jayaram &amp;amp; Jayaram, Bangalore&lt;/li&gt;
&lt;li&gt; Shaundra Watson, Counsel for international consumer protection, USA Federal Trade Commission&lt;/li&gt;
&lt;li&gt; Rob van Eijk, Council of Europe expert, Leiden University (PhD student)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The moderators:&lt;/p&gt;
&lt;ul class="rteindent1"&gt;
&lt;li&gt; Christine Runnegar, Internet Society&lt;/li&gt;
&lt;li&gt; Sophie Kwasny, Council of Europe&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The remote moderator:&lt;/p&gt;
&lt;ul class="rteindent1"&gt;
&lt;li&gt; James Lawson, Council of Europe&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This workshop will explore:&lt;/p&gt;
&lt;ul class="rteindent1"&gt;
&lt;li&gt; Current and emerging trends in online tracking (and their related purposes)&lt;/li&gt;
&lt;li&gt; How to give individuals full knowledge of the tracking that occurs when they go online&lt;/li&gt;
&lt;li&gt; Mechanisms to give individuals greater control over tracking and data use&lt;/li&gt;
&lt;li&gt; The respective roles of all actors (government, law enforcement,  Internet intermediaries, businesses, browser vendors, application  developers, advertisers, data brokers, users, Internet technical  community, etc.) &lt;/li&gt;
&lt;li&gt; Whether effective data protection online can be ensured solely by law.&lt;/li&gt;
&lt;li&gt; Whether self-regulation and voluntary consensus standards offer better  options for tuning privacy choice to the rapidly advancing technology  environment.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Please read our &lt;b&gt;&lt;a href="http://www.internetsociety.org/sites/default/files/Tracking%20-%20Background%20paper%2020120711_0.pdf"&gt;background paper&lt;/a&gt;&lt;/b&gt; and &lt;a href="http://www.internetsociety.org/doc/who-following-me-tracking-trackers-part-2"&gt;&lt;b&gt;update&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/who-is-following-me'&gt;https://cis-india.org/news/who-is-following-me&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-07T17:17:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security">
    <title>Who Governs the Internet? Implications for Freedom and National Security</title>
    <link>https://cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security</link>
    <description>
        &lt;b&gt;The second half of last year has been quite momentous for Internet governance thanks to Edward Snowden. German Chancellor Angela Merkel and Brazilian President Dilma Rousseff became aware that they were targets of US surveillance for economic not security reasons. They protested loudly.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article was published in Yojana (April 2014 Issue). &lt;a href="https://cis-india.org/internet-governance/blog/yojana-april-2014-who-governs-the-internet.pdf" class="external-link"&gt;Click to download the original here&lt;/a&gt;. (PDF, 177 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The role of the US perceived by some as the benevolent dictator or primary steward of the Internet because of history, technology, topology and commerce came under scrutiny again. The I star bodies also known as the technical community - Internet Corporation for Assigned Names and Numbers (ICANN); five Regional Internet Registries (RIRs) ie. African,  American, Asia-Pacific, European and Latin American; two standard setting organisations - World Wide Web Consortium (W3C) &amp;amp; Internet Engineering Task Force (IETF); the Internet Architecture Board (IAB); and Internet Society (ISOC) responded by issuing the Montevideo Statement &lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt; on the 7th of October. The statement expressed "strong concern over the undermining of the trust and confidence of Internet users globally due to recent revelations of pervasive monitoring and surveillance." It called for  "accelerating the globalization of ICANN and IANA functions..." - did this mean that the I star bodies were finally willing to end the special role that US played in Internet governance? However, that dramatic shift in position was followed with the following qualifier "...towards an environment in which all stakeholders, including all governments, participate on an equal footing." Clearly indicating that for the I star bodies multistakeholderism was non-negotiable.  Two days later President Rousseff after a meeting with Fadi Chehadé, announced on Twitter that Brazil would host "an international summit of governments, industry, civil society and academia." &lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt; The meeting has now been dubbed Net Mundial and 188 proposals for “principles” or “roadmaps for the further evolution of the Internet governance ecosystem” have been submitted for discussion in São Paulo on the 23rd and 24th of April. The meeting will definitely be an important milestone for multilateral and multi-stakeholder mechanisms in the ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has been more than a decade since this debate between multilateralism and multi-stakeholderism has ignited. Multistakeholderism is a form of governance that seeks to ensure that every stakeholder is guaranteed a seat at the policy formulation table (either in consultative capacity or in decision making capacity depending who you ask). The Tunis Agenda, which was the end result of the 2003-05 WSIS upheld the multistakeholder mode. The 2003–2005 World Summit on the Information Society process was seen by those favouring the status quo at that time as the first attempt by the UN bodies or multilateralism - to takeover the Internet. However, the end result i.e. Tunis Agenda &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; clarified and reaffirmed multi-stakeholderism as the way forward even though multilateral governance mechanisms were also accepted as a valid component of Internet governance. The list of stakeholders included states, the private sector, civil society, intergovernmental organisations, international standards organisations and the “academic and technical communities within those stakeholder groups mentioned” above. The Tunis Agenda also constituted the Internet Governance Forum (IGF) and the process of Enhanced Cooperation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IGF was defined in detail with a twelve point mandate including to “identify emerging issues, bring them to the attention of the relevant bodies and the general public, and, where appropriate, make recommendations.” In brief it was to be a learning Forum, a talk shop and a venue for developing soft law not international treaties. Enhanced Cooperation was defined as “to enable governments, on an equal footing, to carry out their roles and responsibilities, in international public policy issues pertaining to the Internet, but not in the day-to-day technical and operational matters, that do not impact on international public policy issues” –  and to this day, efforts are on to define it more clearly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Seven years later, during the World Conference on Telecommunication in Dubai, the status quoists dubbed it another attempt by the UN to take over the Internet. Even those non-American civil society actors who were uncomfortable with US dominance were willing to settle for the status quo because they were convinced that US court would uphold human rights online more robustly than most other countries. In fact, the US administration had laid a good foundation for the demonization of the UN and other nation states that preferred an international regime. "Internet freedom" was State Department doctrine under the leadership of Hillary Clinton. As per her rhetoric – there were good states, bad states and swing states. The US, UK and some Scandinavian countries were the defenders of freedom. China, Russia and Saudi Arabia were examples of authoritarian states that were balkanizing the Internet. And India, Brazil and Indonesia were examples of swing states – in other words, they could go either way – join the good side or the dark side.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Internet freedom rhetoric was deeply flawed. The US censorship regime is really no better than China’s. China censors political speech – US censors access to knowledge thanks to the intellectual property (IP) rightsholder lobby that has tremendous influence on the Hill. Statistics of television viewership across channels around the world will tell us how the majority privileges cultural speech over political speech on any average day. The great firewall of China only affects its citizens – netizens from other jurisdictions are not impacted by Chinese censorship. On the other hand, the US acts of censorship are usually near global in impact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is because the censorship regime is not predominantly based on blocking or filtering but by placing pressure on identification, technology and financial intermediaries thereby forcing their targets offline. When it comes to surveillance, one could argue that the US is worse than China. Again, as was the case with censorship, China only conducts pervasive blanket surveillance upon its citizens – unlike US surveillance, which not only affects its citizens but targets every single user of the Internet through a multi-layered approach with an accompanying acronym soup of programmes and initiatives that include malware, trojans, software vulnerabilities, back doors in encryption standards, over the top service providers, telcos, ISPs, national backbone infrastructure and submarine fibre optic cables.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Security guru Bruce Schneier tells us that "there is no security without privacy. And liberty requires both security and privacy.” Blanket surveillance therefore undermines the security imperative and compromises functioning markets by make e-commerce, e-banking, intellectual property, personal information and confidential information vulnerable. Building a secure Internet and information society will require ending mass surveillance by states and private actors.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Opportunity for India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Unlike the America with its straitjacketed IP regime, India believes that access to knowledge is a precondition for freedom of speech and expression. As global intellectual property policy or access to knowledge policy is concerned, India is considered a leader both when it comes to domestic policy and international policy development at the World Intellectual Property Organisation. From the 70s our policy-makers have defended the right to health in the form of access to medicines. More recently, India played a critical role in securing the Marrakesh Treaty for Visually Impaired Persons in June 2013 which introduces a user right [also referred to as an exception, flexibility or limitation] which allows the visually impaired to convert books to accessible formats without paying the copyright-holder if an accessible version has not been made available. The Marrakesh Treaty is disability specific [only for the visually impaired] and works specific [only for copyright]. This is the first instance of India successfully exporting policy best practices. India's exception for the disabled in the Copyright Act unlike the Marrakesh Treaty, however, is both disability-neutral and works-neutral.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that the Internet is critical to the successful implementation of the Treaty ie. cross border sharing of works that have been made accessible to disabled persons in one country with the global community, it is perhaps time for India to broaden its influence into the sphere of Internet governance and the governance of information societies more broadly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Post-Snowden, the so called swing states occupy the higher moral ground. It is time for these states to capitalize on this moment using strong political will. Instead of just being a friendly jurisdiction from the perspective of access to medicine, it is time for India to also be the enabling jurisdiction for access to knowledge more broadly. We could use patent pools and compulsory licensing to provide affordable and innovative digital hardware [especially mobile phones] to the developing world. This would ensure that rights-holders, innovators, manufactures, consumers and government would all benefit from India going beyond being the pharmacy of the world to becoming the electronics store of the world. We could explore flat-fee licensing models like a broadband copyright cess or levy to ensure that users get content [text, images, video, audio, games and software] at affordable rates and rights-holders get some royalty from all Internet users in India. This will go a long way in undermining the copyright enforcement based censorship regime that has been established by the US. When it comes to privacy – we could enact a world-class privacy law and establish an independent, autonomous and proactive privacy commissioner who will keep both private and state actors on a short lease. Then we need a scientific, targeted surveillance regime that is in compliance with human rights principles. This will make India simultaneously an IP and privacy haven and thereby attract huge investment from the private sector, and also earn the goodwill of global civil society and independent media. Given that privacy is a precondition for security, this will also make India very secure from a cyber security perspective. Of course this is a fanciful pipe dream given our current circumstances but is definitely a possible future for us as a nation to pursue.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What is the scope of Internet Governance?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Part of the tension between multi-stakeholderism and multilateralism is that there is no single, universally accepted definition of Internet governance. The conservative definitions of Internet Governance limits it to management of critical Internet resources, including the domain name system, IP addresses and root servers – in other words, the ICANN, IANA functions, regional registries and other I* bodies. This is where US dominance has historically been most explicit. This is also where the multi-stakeholder model has clearly delivered so far and therefore we must be most careful about dismantling existing governance arrangements. There are very broadly four approaches for reducing US dominance here – a) globalization [giving other nation-states a role equal to the US within the existing multi-stakeholder paradigm], b) internationalization [bring ICANN, IANA functions, registries and I* bodies under UN control or oversight], c) eliminating the role for nation states in the IANA functions&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; and d) introducing competitors for names and numbers management. Regardless of the final solution, it is clear that those that control domain names and allocate IP addresses will be able to impact the freedom of speech and expression. The impact on the national security of India is very limited given that there are three root servers &lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt; within national borders and it would be near impossible for the US to shut down the Internet in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a more expansive definition – The Working Group on Internet Governance report&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;has four categories for public policy issues that are relevant to Internet governance:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“(a) Issues relating to infrastructure and the management of critical Internet resources, including administration of the domain name system and Internet protocol addresses (IP addresses), administration of the root server system, technical standards, peering and interconnection, telecommunications infrastructure, including innovative and convergent technologies, as well as multilingualization. These issues are matters of direct relevance to Internet governance and fall within the ambit of existing organizations with responsibility for these matters;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Issues relating to the use of the Internet, including spam, network security and cybercrime. While these issues are directly related to Internet governance, the nature of global cooperation required is not well defined;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c)Issues that are relevant to the Internet but have an impact much wider than the Internet and for which existing organizations are responsible, such as intellectual property rights (IPRs) or international trade. ...;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) Issues relating to the developmental aspects of Internet governance, in particular capacity-building in developing countries.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of these categories are addressed via state regulation that has cascaded from multilateral bodies that are associated with the United Nations such as the World Intellectual Property Organisation for "intellectual property rights" and the International Telecommunication Union for “telecommunications infrastructure”. Other policy issues such as  "cyber crime" are currently addressed via plurilateral instruments – for example the Budapest Convention on Cybercrime – and bilateral arrangements like Mutual Legal Assistance Treaties. "Spam" is currently being handled through self-regulatory efforts by the private sector such as Messaging, Malware and Mobile Anti-Abuse Working Group.&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt; Other areas where there is insufficient international or global cooperation include "peering and interconnection" - the private arrangements that exist are confidential and it is unclear whether the public interest is being adequately protected.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;So who really governs the Internet?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;So in conclusion, who governs the Internet is not really a useful question. This is because nobody governs the Internet per se. The Internet is a diffuse collection of standards, technologies and actors and dramatically different across layers, geographies and services. Different Internet actors – the government, the private sector, civil society and the technical and academic community are already regulated using a multiplicity of fora and governance regimes – self regulation, coregulation and state regulation. Is more regulation always the right answer? Do we need to choose between multilateralism and multi-stakeholderism? Do we need stable definitions to process? Do we need different version of multi-stakeholderism for different areas of governance for ex. standards vs. names and numbers? Ideally no, no, no and yes. In my view an appropriate global governance system will be decentralized, diverse or plural in nature yet interoperable, will have both multilateral and multistakeholder institutions and mechanisms and will be as interested in deregulation for the public interest as it is in regulation for the public interest.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Montevideo Statement on the Future of Internet Cooperation &lt;a class="external-link" href="https://www.icann.org/en/news/announcements/announcement-07oct13-en.htm"&gt;https://www.icann.org/en/news/announcements/announcement-07oct13-en.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Brazil to host global internet summit in ongoing fight against NSA surveillance &lt;a class="external-link" href="http://rt.com/news/brazil-internet-summit-fight-nsa-006/"&gt;http://rt.com/news/brazil-internet-summit-fight-nsa-006/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Tunis Agenda For The Information Society &lt;a class="external-link" href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;http://www.itu.int/wsis/docs2/tunis/off/6rev1.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Roadmap for globalizing IANA: Four principles and a proposal for reform: a submission to the Global Multistakeholder Meeting on the Future of Internet Governance by Milton Mueller and Brenden Kuerbis March 3rd 2014  See: &lt;a class="external-link" href="http://www.internetgovernance.org/wordpress/wp-content/uploads/ICANNreformglobalizingIANAfinal.pdf"&gt;http://www.internetgovernance.org/wordpress/wp-content/uploads/ICANNreformglobalizingIANAfinal.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Mumbai (I Root), Delhi (K Root) and Chennai (F Root). See: &lt;a class="external-link" href="http://nixi.in/en/component/content/article/36-other-activities-/77-root-servers"&gt;http://nixi.in/en/component/content/article/36-other-activities-/77-root-servers&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Report of the Working Group on Internet Governance to the President of the Preparatory Committee of the World Summit on the Information Society, Ambassador Janis Karklins, and the WSIS Secretary-General, Mr Yoshio Utsumi. Dated:  14 July 2005 See: &lt;a class="external-link" href="http://www.wgig.org/WGIG-Report.html"&gt;http://www.wgig.org/WGIG-Report.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;].Messaging, Malware and Mobile Anti-Abuse Working Group website See: &lt;a class="external-link" href="http://www.maawg.org/"&gt;http://www.maawg.org/&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The author is is the Executive Director of the Centre for Internet and Society (CIS), Bangalore. He is also the founder of Mahiti, a 15 year old social enterprise aiming to reduce the cost and complexity of information and communication technology for the voluntary sector by using free software. He is an Ashoka fellow. For three years, he also managed the International Open Source Network, a project of United Nations Development Programme's Asia-Pacific Development Information Programme, serving 42 countries in the Asia-Pacific region&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security'&gt;https://cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-05T16:23:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2">
    <title>White Paper on RTI and Privacy V1.2</title>
    <link>https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2</link>
    <description>
        &lt;b&gt;This white paper explores the relationship between privacy and transparency in the context of the right to information in India. Analysing pertinent case law and legislation - the paper highlights how the courts and the law in India address questions of transparency vs. privacy. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Although the right to information is not specifically spelt out in the Constitution of India, 1950, it has been read into Articles 14 (right to equality), 19(1)(a) (freedom of speech and expression) and 21 (right to life) through cases such as &lt;i&gt;Bennet Coleman&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; &lt;i&gt;Tata Press Ltd. &lt;/i&gt;v.&lt;i&gt; Maharashtra Telephone Nigam Ltd.&lt;/i&gt;,&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; etc. The same Articles of the Constitution were also interpreted in &lt;i&gt;Kharak Singh&lt;/i&gt; v.&lt;i&gt;State of U.P.&lt;/i&gt;,&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; &lt;i&gt;Govind&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;,	&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; and a number of other cases, to include within their scope a right to privacy. At the very outset it 	appears that a right to receive information -though achieving greater transparency in public life - could impinge on the right to privacy of certain 	people. The presumed tension between the right to privacy and the right to information has been widely recognized and a framework towards balancing the two 	rights, has been widely discussed across jurisdictions. In India, nowhere is this conflict and the attempt to balance it more evident than under the Right 	to Information Act, 2005 (the "&lt;b&gt;RTI Act&lt;/b&gt;").&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supporting the constitutional right to information enjoyed by the citizens, is the statutorily recognized right to information granted under the RTI Act. 	Any potential infringement of the right to privacy by the provisions of the RTI Act are sought to be balanced by section 8 which provides that no 	information should be disclosed if it creates an unwarranted invasion of the privacy of any individual. This exception states that there is no obligation 	to disclose information which relates to personal information, the disclosure of which has no relationship to any public activity or interest, or which would cause unwarranted invasion of the privacy of the individual unless the larger public interest justifies the disclosure of such information.	&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; The Act further goes on to say that where any information relating to or supplied by a third party and 	treated by that party as confidential, is to be disclosed, the Central Public Information Officer or State Public Information Officer has to give written 	notice to that party within five days of receiving such a request inviting such third party (within ten days) to make its case as to whether such 	information should or should not be disclosed.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A plain reading of section 11 suggests that for the section to apply the following three conditions have to be satisfied, i.e. (i) if the PIO is 	considering disclosing the information (ii) the information relates to the third party or was given to a Public Authority by the third party in confidence; 	and (iii) the third party treated the information to be a confidential. It has been held that in order to satisfy the third part of the test stated above, 	the third party has to be consulted and therefore a notice has to be sent to the third party. Even if the third party claims confidentiality, the proviso 	to the section provides that the information cannot be withheld if the public interest in the disclosure outweighs the possible harm or injury that may be 	caused to the third party, except in cases of trade or commercial secrets.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; The Courts have also held that section 11 should be read keeping in mind the exceptions contained in section 8 (discussed in detail later) and the exceptions contained therein.	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This principle of non disclosure of private information can be found across a number of common law jurisdictions. The United Kingdom's Freedom of 	Information Act, 2000 exempts the disclosure of information where it would violate the data protection principles contained in the Data Protection Act, 	1998 or constitute an actionable breach of confidence.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; The Australian Freedom of Information Act, 1982 	categorizes documents involving unreasonable disclosure of personal information as conditionally exempt i.e. allows for their disclosure unless such 	disclosure would be contrary to public interest.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; The Canadian Access to Information Act also has a provision which allows the authorities to refuse to disclose personal information except in accordance with the provisions of the Canadian Privacy Act.	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An overview of the RTI Act, especially sections 6 to 8 seems to give the impression that the legislature has tried to balance and harmonize conflicting public and private rights and interests by building sufficient safeguards and exceptions to the general principles of disclosure under the Act.	&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; This is why it is generally suggested that section 8, when applied, should be given a strict interpretation as it is a fetter on not only a statutory right granted under the RTI Act but also a pre-existing constitutional right.	&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; Logical as this argument may seem and appropriate in some circumstances, it does present a problem 	when dealing with the privacy exception contained in section 8(1)(j). That is because the right to privacy envisaged in this section is also a pre-existing 	constitutional right which has been traced to the same provisions of the Constitution from which the constitutional right of freedom of information 	emanates.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; Therefore there is an ambiguity regarding the treatment and priority given to the privacy 	exception vs. the disclosure mandate in the RTI Act, as it requires the balancing of not only two competing statutory rights but also two constitutional 	rights.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;The Privacy Exception &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As discussed earlier, the purpose of the RTI Act is to increase transparency and ensure that people have access to as much public information as possible. 	Such a right is critical in a democratic country as it allows for accountability of the State and allows individuals to seek out information and make 	informed decisions. However, it seems from the language of the RTI Act that at the time of its drafting the legislature did realize that there would be a 	conflict between the endeavor to provide information and the right to privacy of individuals over the information kept with public authorities, which is 	why a privacy exception was carved into section 8(1)(j) of the Right to Information Act. The Act does not only protect the privacy of the third party who's 	information is at risk of being disclosed, but also the privacy of the applicant. In fact it has now been held that a private respondent need not give 	his/her ID or address as long as the information provided by him/her is sufficient to contact him/her.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is interesting to note that although the RTI Act gives every citizen a right to information, it does not limit this right with a stipulation as to how the information shall be used by the applicant or the reason for which the applicant wants such information.	&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; This lack of a purpose limitation in the Act may have privacy implications as non sensitive personal 	information could be sought from different sources and processed by any person so as to convert such non-sensitive or anonymous information into 	identifiable information which could directly impact the privacy of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The exception in S. 8(1)(j) prohibits the disclosure of personal information for two reasons (i) its disclosure does not relate to any public activity or 	interest or (ii) it would be an unwarranted invasion into privacy. The above two conditions however get trumped if a larger public interest is satisfied by 	the disclosure of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One interesting thing about the exception contained in section 8(1)(j) is that this exception itself has an exception to it in the form of a proviso. The 	proviso says that any information which cannot be denied to the central or state legislature shall not be denied to any person. Since the proviso has been 	placed at the end of sub-section 8(1) which is also the end of clause 8(1)(j), one might be tempted to ask whether this proviso applies only to the privacy 	exception i.e. clause 8(1)(j) or to the entire sub-section 8(1) (which includes other exceptions such as national interest, etc.). This issue was put to 	rest by the Bombay High Court when it held that since the proviso has been put only after clause 8(1)(j) and not before each and every clause, it would not 	apply to the entire sub-section 8(1) but only to clause 8(1)(j), thus ensuring that the exceptions to disclosure other than the right to privacy are not 	restricted by this proviso.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Scope of Proviso to section 8(1)(j)&lt;/b&gt;&lt;br /&gt;Though the courts have agreed that the proviso is applicable only to section 8(1)(j), the import of the proviso to section 8(1)(j) is a little more 	ambiguous and there are conflicting decisions by different High Courts on this point. Whereas the Bombay High Court has laid emphasis on the letter of the proviso and derived strength from the objects and overall scheme of the Act to water down the provisions of section 8(1)(j),	&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; the Delhi High Court has disagreed with such an approach which gives "undue, even overwhelming 	deference" to Parliamentary privilege in seeking information. Such an approach would render the protection under section 8(1)j) meaningless, and the basic 	safeguard bereft of content.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; In the words of the Delhi High Court:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;" 	&lt;i&gt; The proviso has to be only as confined to what it enacts, to the class of information that Parliament can ordinarily seek; if it were held that all 		information relating to all public servants, even private information, can be accessed by Parliament, Section 8(1)(j) would be devoid of any substance, 		because the provision makes no distinction between public and private information. Moreover there is no law which enables Parliament to demand all such 		information; it has to be necessarily in the context of some matter, or investigation. If the reasoning of the Bombay High Court were to be accepted, 		there would be nothing left of the right to privacy, elevated to the status of a fundamental right, by several judgments of the Supreme Court. &lt;/i&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The interpretation given by the Delhi High Court thus ensures that section 8(1)(j) still has some effect, as otherwise the privacy exception would have 	gotten steamrolled by parliamentary privilege and all sorts of information such as Income Tax Returns, etc. of both private and public individuals would 	have been liable to disclosure under the RTI Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, the RTI Act does not describe the terms "personal information" or "larger public interest" used in section 8(1)(j), which leaves some amount 	of ambiguity in interpreting the privacy exception to the RTI Act. Therefore the only option for anyone to understand these terms in greater depth is to 	discuss and analyse the case laws developed by the Hon'ble Supreme Court and the High Courts which have tried to throw some light on this issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We shall discuss some of these landmark judgments to understand the interpretations given to these terms and then move on to specific instances where 	(applying these principles) information has been disclosed or denied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Personal Information&lt;/b&gt;&lt;br /&gt;The RTI Act defines the term information but does not define the term "personal information". Therefore one has to rely on judicial pronouncements to 	understand the term a more clearly. Looking at the common understanding and dictionary meaning of "personal" as well as the definition of "information" 	contained in the RTI Act it could be said that personal information would be information, information that pertains to a person and as such it takes into 	its fold possibly every kind of information relating to the person. Now, such personal information of the person may, or may not, have relation to any public activity, or to public interest. At the same time, such personal information may, or may not, be private to the person.	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Delhi High Court has tried to draw a distinction between the term "private information" which encompasses the personal intimacies of the home, the 	family, marriage, motherhood, procreation, child rearing and of the like nature and "personal information" which would be any information that pertains to an individual. This would logically imply that all private information would be part of personal information but not the other way round.	&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; The term 'personal information' has in other cases, been variously described as "identity particulars 	of public servants, i.e. details such as their dates of birth, personal identification numbers",&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt; and as 	including tax returns, medical records etc.&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; It is worth noting that just because the term used is 	"personal information" does not mean that the information always has to relate to an actual person, but may even be a juristic entity such as a trust or 	corporation, etc.&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Larger Public Interest&lt;/b&gt;&lt;br /&gt;The term larger public interest has not been discussed or defined in the RTI Act, however the Courts have developed some tests to determine if in a given 	situation, personal information should be disclosed in the larger public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whenever a Public Information Officer is asked for personal information about any person, it has to balance the competing claims of the privacy of the 	third party on the one hand and claim of public interest on the other and determine whether the public interest in such a disclosure satisfies violating a 	person's privacy. The expression "public interest" is not capable of a precise definition and does not have a rigid meaning. It is therefore an elastic 	term and takes its colors from the statute in which it occurs, the concept varying with the time and the state of the society and its needs. This seems to 	be the reason why the legislature and even the Courts have shied away from a precise definition of "public interest". However, the term public interest 	does not mean something that is merely interesting or satisfies the curiosity or love of information or amusement; but something in which a class of the 	community have some interest by which their rights or liabilities are affected.&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have been suggestions that the use of the word "larger" before the term "public interest" denotes that the public interest involved should serve a 	large section of the society and not just a small section of it, i.e. if the information has a bearing on the economy, the moral values in the society; the 	environment; national safety, or the like, the same would qualify as "larger public interest".&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt; However 	this is not a very well supported theory and the usage of the term "larger public interest" cannot be given such a narrow meaning, for example what if the 	disclosure of the information could save the lives of only 10 people or even just 5 children? Would the information not be released just because it 	violates one person's right to privacy and there is not a significant number of lives at stake? This does not seem to be what all the cases on the right to privacy, right from &lt;i&gt;Kharak Singh&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;b&gt;[27]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; all the way to &lt;i&gt;Naz Foundation&lt;/i&gt;,	&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt; seem to suggest. Infact, in the very same judgment where the above interpretation has been suggested, 	the Court undermines this argument by giving the example of a person with a previous crime of sexual assault being employed in an orphanage and says that 	the interest of the small group of children in the orphanage would outweigh the privacy concerns of the individual thus requiring disclosure of all 	information regarding the employee's past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In light of the above understanding of section 8(1)(j), there seem to be two different tests that have been proposed by the Courts, which seem to connote 	the same principle although in different words:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. The test laid down by &lt;i&gt;Union Public Service Commission&lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) The information sought must relate to „Personal information‟ as understood above of a third party. Therefore, if the information sought 	does not qualify as personal information, the exemption would not apply;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Such personal information should relate to a third person, i.e., a person other than the information seeker or the public authority; AND&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) (a) The information sought should not have a relation to any public activity qua such third person, or to public interest. If the information sought 	relates to public activity of the third party, i.e. to his activities falling within the public domain, the exemption would not apply. Similarly, if the 	disclosure of the personal information is found justified in public interest, the exemption would be lifted, otherwise not; OR (b) The disclosure of the information would cause unwarranted invasion of the privacy of the individual, and that there is no larger public interest involved in such disclosure.	&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. The other test was laid down in &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, but in the specific circumstances of disclosure of personal 	information relating to a public official:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) whether the information is deemed to comprise the individual's private details, unrelated to his position in the organization;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) whether the disclosure of the personal information is with the aim of providing knowledge of the proper performance of the duties and tasks assigned 	to the public servant in any specific case; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) whether the disclosure will furnish any information required to establish accountability or transparency in the use of public resources.	&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Constitutional Restrictions&lt;/b&gt;&lt;br /&gt;Since there is not extensive academic discussion on the meaning of the term "larger public interest" or "public interest" as provided in section 8(1)(j), 	one is forced to turn to other sources to get a better idea of these terms. One such source is constitutional law, since the right to privacy, as contained in section 8(1)(j) has its origins in Articles 14,&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; 19(1)(a)	&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt; and 21&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt; of the Constitution of India. The 	constitutional right to privacy in India is also not an absolute right and various cases have carved out a number of exceptions to privacy, a perusal of 	which may give some indication as to what may be considered as 'larger public interest', these restrictions are:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a) Reasonable restrictions can be imposed on the right to privacy in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence;	&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b) Reasonable restrictions can be imposed upon the right to privacy either in the interests of the general public or for the protection of the interests of 	any Scheduled Tribe;&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c) The right to privacy can be restricted by procedure established by law which procedure would have to satisfy the test laid down in the	&lt;i&gt;Maneka Gandhi case&lt;/i&gt;.&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d) The right can be restricted if there is an important countervailing interest which is superior;	&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e) It can be restricted if there is a compelling state interest to be served by doing so;	&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;f) It can be restricted in case there is a compelling public interest to be served by doing so;	&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;g) The &lt;i&gt;Rajagopal tests - &lt;/i&gt;This case lays down three exceptions to the rule that a person's private information cannot be published, &lt;i&gt;viz. &lt;/i&gt; i) person voluntarily thrusts himself into controversy or voluntarily raises or invites a controversy, ii) if publication is based on public records other 	than for sexual assault, kidnap and abduction, iii) there is no right to privacy for public officials with respect to their acts and conduct relevant to 	the discharge of their official duties. It must be noted that although the Court talks about public records, it does not use the term 'public domain' and 	thus it is possible that even if a document has been leaked in the public domain and is freely available, if it is not a matter of public record, the right 	to privacy can still be claimed in regard to it.&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Section 8(1)(j) in Practice &lt;br /&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussion in the previous chapter regarding the interpretation of section 8(1)(j), though (hopefully) helpful still seems a little abstract without 	specific instances and illustrations to drive home the point. In this chapter we shall endeavor to briefly discuss some specific cases regarding 	information disclosure where the issue of violation of privacy of a third party was raised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Private Information of Public Officials&lt;/b&gt;&lt;br /&gt;Some of the most common problems regarding section 8(1)(j) come up when discussing information (personal or otherwise) regarding public officers. The issue 	comes up because an argument can be made that certain information such as income tax details, financial details, medical records, etc. of public officials 	should be disclosed since it has a bearing on their public activities and disclosure of such information in case of crooked officers would serve the 	interests of transparency and cleaner government (hence serving a larger public interest). Although section 8(1)(j) does not make any distinction between a 	private person and a public servant, a distinction in the way their personal information is treated does appear in reality due to the inherent nature of a public servant. Infact it has sometimes been argued that public servants must waive the right to privacy in favour of transparency.&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt; However this argument has been repeatedly rejected by the Courts,	&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt; just because a person assumes public office does not mean that he/she would automatically lose their 	right to privacy in favour of transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If personal information regarding a public servant is asked for, then a distinction must be made between the information that is inherently personal to the 	person and that which has a connection with his/her public functions. The information exempted under section 8(1)(j) is personal information which is so 	intimately private in nature that the disclosure of the same would not benefit any other person, but would result in the invasion of the privacy of the 	third party.&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt; In short, the Courts have concluded that there can be no blanket rule regarding what 	information can and cannot be disclosed when it comes to a public servant, and the disclosure (or lack of it) would depend upon the circumstances of each 	case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the earlier thinking of the CIC as well as various High Courts of the country was that information regarding disciplinary proceedings and service 	records of public officials is to be treated as public information in order to boost transparency,&lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt; however this line of thinking took almost a U-turn in 2012 after the decision of the Supreme Court in &lt;i&gt;Girish Ramchandra Deshpande &lt;/i&gt;v.	&lt;i&gt;Central Information Commissioner,&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;b&gt;[45]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; and now the prevailing principle is that 	such information is personal information and should not be disclosed unless a larger public interest is would be served by the disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would also be helpful to look at a list of the type of information regarding public servants which has been disclosed in the past, gleaned from various 	cases, to get a better understanding of the prevailing trends in such cases:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) Details of postings of public servants at various points of time, since this was not considered as personal information;	&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Copies of posting/ transfer orders of public servants, since it was not considered personal information;	&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Information regarding transfers of colleagues cannot be exempted from disclosure, since disclosure would not cause any unwarranted invasion of 	privacy and non disclosure would defeat the object of the RTI Act;&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Information regarding the criteria adopted and the marks allotted to various academic qualifications, experience and interview in selection process 	for government posts by the state Public Service Commission;&lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Information regarding marks obtained in written test, interview, annual confidential reports of the applicant as well as the marks in the written test and interview of the last candidate selected, since this information was not considered as personal information;	&lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Information relating to the appointment and educational certificates of teachers in an educational institution (which satisfies the requirements of being a public authority) was disclosed since this was considered as relevant to them performing their functions.	&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The performance of an employee/officer in an organization is primarily a matter between the employee and the employer and normally those aspects are 	governed by the service rules which fall under the expression "personal information", the disclosure of which has no relationship to any public activity or 	public interest. To understand this better below is a brief list of the type of information that has been considered by the Courts as personal information 	which is liable to be exempt from disclosure under section 8(1)(j):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) (a) Salary details, (b) show cause notice, memo and censure, (c) return of assets and liabilities, (d) details of investment and other related details, 	(e) details of gifts accepted, (f) complete enquiry proceedings, (g) details of income tax returns;&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) All memos issued, show cause notices and orders of censure/punishment etc. are personal information. Cannot be revealed unless a larger public 	interest justifies such disclosure;&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Disciplinary information of an employee is personal information and is exempt under section 8(1)(j);	&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Medical records cannot be disclosed due to section 8(1)(j) as they come under "personal information", unless a larger public interest can be shown 	meriting such disclosure;&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Copy of personnel records and service book (containing Annual Confidential Reports, etc.) of a public servant is personal information and cannot be 	disclosed due to section 8(1)(j);&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Information regarding sexual disorder, DNA test between an officer and his surrogate mother, name of his biological father and step father, name of 	his mother and surrogate step mother and such other aspects were denied by the Courts as such information was considered beyond the perception of decency 	and was an invasion into another man's privacy.&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is not just the issue of disclosure of personal details of public officials that raises complicated questions regarding the right to information, but 	the opposite is equally true, i.e. what about seemingly "public" details of private individuals. A very complicated question arose with regard to 	information relating to the passport details of private individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Passport Information of Private Individuals&lt;/b&gt;&lt;br /&gt;The disclosure of passport details of private individuals is complicated because for a long time there was some confusion because of the treatment to be 	given to passport details, i.e. would its disclosure cause an invasion of privacy since it contains personally identifying information, specially because 	photocopies of the passport are regularly given for various purposes such as travelling, getting a new phone connection, etc. The Central Information 	Commission used a somewhat convoluted logic that since a person providing information relating to his residence and identity while applying for a passport 	was engaging in a public activity therefore such information relates to a public activity and should be disclosed. This view was rejected by the Delhi High Court in the case of &lt;i&gt;Union of India&lt;/i&gt; v. &lt;i&gt;Hardev Singh&lt;/i&gt;,&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt; and the view taken in&lt;i&gt;Hardev Singh&lt;/i&gt; was later endorsed and relied upon in &lt;i&gt;Union of India &lt;/i&gt;v. &lt;i&gt;Rajesh Bhatia&lt;/i&gt;,	&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt; while hearing a number of petitions to decide what details of a third party's passport should be 	disclosed and what should be exempt from disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A list of the Courts conclusions is given below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;Information that can be revealed:&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) Name of passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Whether a visa was issued to a third party or not;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Details of the passport including dates of first issue, subsequent renewals, dates of application for renewals, numbers of the new passports and date 	of expiry;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Nature of documents submitted as proof;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Name of police station from where verification for passport was done;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Whether any report was called for from the jurisdictional police;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vii) Whether passport was renewed through an agent or through a foreign embassy;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(viii) Whether it was renewed in India or any foreign country;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ix) Whether tatkal facility was availed by the passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;Information that cannot be revealed:&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) Contents of the documents submitted with the passport application;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Marital status and name and address of husband;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Whether person's name figures as mother/guardian in the passport of any minor;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Copy of passport application form;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Residential address of passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Details of cases filed/pending against passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vii) Copy of old passport;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(viii) Report of the police and CID for issuing the passport;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ix) Copy of the Verification Certificate, if any such Verification Certificate was relied upon for the issue of the passport.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Instances &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the above two broad categories of information that has been the subject of intense judicial discussion, certain other situations have also 	arisen where the Courts have had to decide the issue of disclosure under section 8(1)(j), a brief summary of such situations is given below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) names and details of people who received money as donations from the President out of public funds was considered as information which has a definite 	link to public activities and was therefore liable to be disclosed;&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) information regarding the religion practiced by a person, who is alleged to be a public figure, collected by the Census authorities was not disclosed since it was held that the quest to obtain the information about the religion professed or not professed by a citizen cannot be in any event;	&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) information regarding all FIRs against a person was not protected under section 8(1)(j) since it was already a matter of public record and Court 	record and could not be said to be an invasion of the person's privacy;&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) information regarding the income tax returns of a public charitable trust was held not to be exempt under section 8(1)(j), since the trust involved 	was a public charitable trust functioning under a Scheme formulated by the District Court and registered under the Bombay Public Trust Act as such due to 	its character and activities its tax returns would be in relation to public interest or activities.&lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A discussion of the provisions of section 8 and 11 of the RTI Act as well as the case laws under it reveals that the legislature was aware of the dangers 	posed to the privacy of individuals from such a powerful transparency law. However, it did not want the exceptions carved out to protect the privacy of 	individuals to nullify the objects of the RTI Act and therefore drafted the legislation to incorporate the principle that although the RTI Act should not 	be used to violate the privacy of individuals, such an exception will not be applicable if a larger public interest is to be served by the disclosure. This 	principle is in line with other common law jurisdictions such as the U.K, Austalia, Canada, etc. which have similar exceptions based on privacy or 	confidentiality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However it is disappointing to note that the legislature has only left the legislation at the stage of the principle which has left the language of the 	exception very wide and open to varied interpretations. It is understandable that the legislature would try to keep specifics out of the scope of the 	section to make it future proof. It is obvious that it would be impossible for the legislature or the courts to imagine every single circumstance that 	could arise where the right to information and the right to privacy would be at loggerheads. However, such wide and ambiguous drafting has led to cases 	where the Courts and the Central Information Commission have taken opposing views, with the views of the Court obviously prevailing in the end. This was 	illustrated by the issue of disclosure of passport details of private individuals with a large number of CIC cases taking different views till the High 	Court of Delhi gave categorical findings on the issue in the &lt;i&gt;Hardev Singh&lt;/i&gt; and &lt;i&gt;Rajesh Bhatia&lt;/i&gt; cases. Similar was the issue of service 	details of public officials since before the decision of the Supreme Court in the case of &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; in 2012 the prevailing 	thinking of the CIC was that details of disciplinary proceedings against public officials are not covered by section 8(1)(j), however this thinking has now 	taken a U-turn as the Supreme Court's understanding of the right to privacy has taken stronger roots and such information is now outside the scope of the 	RTI Act, unless a larger public interest in the disclosure can be shown.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ambiguity that arises in application when trying to balance the right to privacy against the right to information is a drawback in incorporating only a 	principle and leaving the language ambiguous in any legislation. This paper does not advocate that the legislature try to list out all the instances of 	this problem that are possibly imaginable, this would be too time consuming and may even be counterproductive. However, it is possible for the legislature 	to adopt an accepted practice of legislative drafting and list certain instances where there is an obvious balancing required between the two rights and 	put them as "&lt;i&gt;Illustrations&lt;/i&gt;" to the section. This device has been utilised to great effect by some of the most fundamental legislations in India 	such as the Contract Act, 1872 and the Indian Penal Code, 1860. An alternative to this approach could be to utilize the approach taken in the Australian 	Freedom of Information Act, where the Act itself gives certain factors which should be considered to determine whether access to a particular document 	would be in the public interest or not.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;List of References&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Primary Sources&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Australia Freedom of Information Act, 1982.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;i&gt;Bennet Coleman&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, AIR 1973 SC 106.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;i&gt;Bhagat Singh &lt;/i&gt;v. &lt;i&gt;Chief Information Commissioner, &lt;/i&gt;2008 (64) AIC 284 (Del).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Calcutta High Court, WP (W) No. 33290 of 2013, dated 20-11-2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Canadian Access to Information Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. &lt;i&gt;Canara Bank&lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner&lt;/i&gt;, 2007 (58) AIC Ker 667&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Constitution of India, 1950.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. &lt;i&gt;Govind&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;, Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. &lt;i&gt;Haryana Public Service Commission &lt;/i&gt;v. &lt;i&gt;State Information Commission, &lt;/i&gt;AIR 2009 P &amp;amp; H 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;10. &lt;i&gt;Jamia Millia Islamia v. Sh. Ikramuddin&lt;/i&gt;, Delhi High Court, WP(C) 5677 of 2011 dated 22-11-2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;11. &lt;i&gt;Jitendra Singh&lt;/i&gt; v. &lt;i&gt;State of U.P.&lt;/i&gt;, 2008 (66) AIC 685 (All).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;12. &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of U.P.&lt;/i&gt;, AIR 1963 SC 129.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;13. &lt;i&gt;Maneka Gandhi &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;, Supreme Court of India, WP No. 231 of 1977, dated 25-01-1978.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;14. &lt;i&gt;Naz Foundation&lt;/i&gt; Delhi High Court, WP(C) No.7455/2001 dated 02-07-2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;15. &lt;i&gt;P.C. Wadhwa&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, Punjab and Haryana High Court, LPA No. 1252 of 2009 dated 29-11-2010.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;16. &lt;i&gt;Paardarshita Public Welfare Foundation&lt;/i&gt; v. &lt;i&gt;Union of India and others&lt;/i&gt;, AIR 2011 Del 82.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;17. &lt;i&gt;President's Secretariat&lt;/i&gt; v. &lt;i&gt;Nitish Kumar Tripathi&lt;/i&gt;, Delhi High Court, WP (C) 3382 of 2012, dated 14-06-2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;18. &lt;i&gt;Public Information Officer&lt;/i&gt; v. &lt;i&gt;Andhra Pradesh Information Commission&lt;/i&gt;,2009 (76) AIC 854 (AP).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;19. &lt;i&gt;R. Rajagopal v. Union of India&lt;/i&gt;, Supreme Court of India, dated 7-10-1994.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20. &lt;i&gt;Rajendra Vasantlal Shah&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner, New Delhi&lt;/i&gt;, AIR 2011 Guj 70.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;21. &lt;i&gt;Rajinder Jaina&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, 2010 (86) AIC 510 (Del. H.C.).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;22. Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;23. &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;24. &lt;i&gt;Srikant Pandaya&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;, AIR 2011 MP 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;25. &lt;i&gt;Surendra Singh &lt;/i&gt;v. &lt;i&gt;State of U.P&lt;/i&gt;, AIR 2009 Alld. 106.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;26. &lt;i&gt;Surup Singh Hyra Naik&lt;/i&gt; v. &lt;i&gt;State of Maharashtra&lt;/i&gt;, 2007 (58) AIC 739 (Bom).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;27. &lt;i&gt;Tata Press Ltd. &lt;/i&gt;v.&lt;i&gt; Maharashtra Telephone Nigam Ltd.&lt;/i&gt;, (1995) 5 SCC 139.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;28. U.K. Freedom of Information Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;29. &lt;i&gt;UCO Bank&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner and another&lt;/i&gt;, 2009 (79) AIC 545 (P&amp;amp;H).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30. &lt;i&gt;Union Centre for Earth Science Studies &lt;/i&gt;v. &lt;i&gt;Anson Sebastian, &lt;/i&gt;AIR 2010 Ker. 151&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;31. &lt;i&gt;Union of India&lt;/i&gt; v. &lt;i&gt;Hardev Singh&lt;/i&gt; WP(C) 3444 of 2012 dated 23-08-2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;32. &lt;i&gt;Union of India &lt;/i&gt;v. &lt;i&gt;Rajesh Bhatia&lt;/i&gt; WP(C) 2232/2012 dated 17-09-2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;33. &lt;i&gt;Union Public Service Commission &lt;/i&gt;v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 	13-07-2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;34. &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Secondary Sources&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. "Country Report for U.K.", Privacy International, available at	&lt;a href="https://www.privacyinternational.org/reports/united-kingdom"&gt;https://www.privacyinternational.org/reports/united-kingdom&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. "Country Report for Australia", Privacy International, available at	&lt;a href="https://www.privacyinternational.org/reports/australia"&gt;https://www.privacyinternational.org/reports/australia&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. "Country Report for Canada", Privacy International, available at	&lt;a href="https://www.privacyinternational.org/reports/canada"&gt;https://www.privacyinternational.org/reports/canada&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; AIR 1973 SC 106. This case held that the freedom of the press embodies in itself the right of the people to read.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; (1995) 5 SCC 139.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; AIR 1963 SC 129.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Section 8(1) in its entirety states as follows:&lt;/p&gt;
&lt;p&gt;(1) Notwithstanding anything contained in this Act, there shall be no obligation to give any citizen,-&lt;/p&gt;
&lt;p&gt;(a) information, disclosure of which would prejudicially affect the sovereignty and integrity of India, the security, strategic, scientific or 			economic interests of the State, relation with foreign State or lead to incitement of an offence;&lt;/p&gt;
&lt;p&gt;(b) information which has been expressly forbidden to be published by any court of law or tribunal or the disclosure of which may constitute 			contempt of court;&lt;/p&gt;
&lt;p&gt;(c) information, the disclosure of which would cause a breach of privilege of Parliament or the State Legislature;&lt;/p&gt;
&lt;p&gt;(d) information including commercial confidence, trade secrets or intellectual property, the disclosure of which would harm the competitive 			position of a third party, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information;&lt;/p&gt;
&lt;p&gt;(e) information available to a person in his fiduciary relationship, unless the competent authority is satisfied that the larger public interest 			warrants the disclosure of such information;&lt;/p&gt;
&lt;p&gt;(f) information received in confidence from foreign Government;&lt;/p&gt;
&lt;p&gt;(g) information, the disclosure of which would endanger the life or physical safety of any person or identify the source of information or 			assistance given in confidence for law enforcement or security purposes;&lt;/p&gt;
&lt;p&gt;(h) information which would impede the process of investigation or apprehension or prosecution of offenders;&lt;/p&gt;
&lt;p&gt;(i) cabinet papers including records of deliberations of the Council of Ministers, Secretaries and other officers:&lt;/p&gt;
&lt;p&gt;Provided that the decisions of Council of Ministers, the reasons thereof, and the material on the basis of which the decisions were taken shall be 			made public after the decision has been taken, and the matter is complete, or over:&lt;/p&gt;
&lt;p&gt;Provided further that those matters which come under the exemptions specified in this section shall not be disclosed;&lt;/p&gt;
&lt;p&gt;(j) information which relates to personal information the disclosure of which has no relationship to any public activity or interest, or which 			would cause unwarranted invasion of the privacy of the individual unless the Central Public Information Officer or the State Public Information 			Officer or the appellate authority, as the case may be, is satisfied that the larger public interest justifies the disclosure of such information:&lt;/p&gt;
&lt;p&gt;Provided that the information which cannot be denied to the Parliament or a State Legislature shall not be denied to any person.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Section 11 of the RTI Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;i&gt;The Registrar General&lt;/i&gt; v. &lt;i&gt;A. Kanagaraj&lt;/i&gt;, (Madras High Court, 14 June 2013, available at http://www.indiankanoon.org/doc/36226888/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Arvind Kejriwal v. Central Public Information Officer, (Delhi High Court, 30 September 2011, available at http://www.indiankanoon.org/doc/1923225/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Sections 40 and 41 of the U.K. Freedom of Information Act, 2000.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Section 11A read with section 47-F of the Australia Freedom of Information Act, 1982.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Section 19 of the Canadian Access to Information Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;i&gt;Public Information Officer&lt;/i&gt; v. &lt;i&gt;Andhra Pradesh Information Commission&lt;/i&gt;,2009 (76) AIC 854 (AP).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; &lt;i&gt;Bhagat Singh &lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner, &lt;/i&gt;2008 (64) AIC 284 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Articles 14, 19(1)(a) and 21 of the Constitution of India, 1950.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Calcutta High Court, WP(W) No. 33290 of 2013, dated 20-11-2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;i&gt;Jitendra Singh&lt;/i&gt; v. &lt;i&gt;State of U.P.&lt;/i&gt;, 2008 (66) AIC 685 (All).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; &lt;i&gt;Surup Singh Hyra Naik&lt;/i&gt; v. &lt;i&gt;State of Maharashtra&lt;/i&gt;, 2007 (58) AIC 739 (Bom).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; &lt;i&gt;Surup Singh Hyra Naik&lt;/i&gt; v. &lt;i&gt;State of Maharashtra&lt;/i&gt;, 2007 (58) AIC 739 (Bom), para 14. Where the Court held that since the medical records of a convict cannot be 			denied to Parliament or State legislature therefore they cannot be exempted from disclosure under the Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; &lt;i&gt;Jamia Millia Islamia v. Sh. Ikramuddin&lt;/i&gt; , Delhi High Court, WP(C) 5677 of 2011 dated 22-11-2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; AIR 1963 SC 129.&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Delhi High Court, WP(C) No.7455/2001 dated 02-07-2009.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 (for stay), dated 13-07-2012. This ruling was overturned by a 			Division Bench of the High Court relying upon a subsequent Supreme Court ruling, however, it could be argued that the Division Bench did not per se 			disagree with the discussion and the principles laid down in this case, but only the way they were applied.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; Right to equality.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Freedom of speech and expression.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Right to life.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Article 19(2) of the Constitution of India, 1950.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; Article 19(5) of the Constitution of India, 1950.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; &lt;i&gt;Maneka Gandhi &lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, Supreme Court of India, WP No. 231 of 1977, dated 25-01-1978. The test laid down in this case is universally considered 			to be that the procedure established by law which restricts the fundamental right should be just, fair and reasonable.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; &lt;i&gt;Govind &lt;/i&gt; v.&lt;i&gt; State of M.P&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;, Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; &lt;i&gt;Govind &lt;/i&gt; v.&lt;i&gt; State of M.P&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; &lt;i&gt;Govind &lt;/i&gt; v.&lt;i&gt; State of M.P&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;, Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975. However the Court later used phrases such as 			"reasonable restriction in public interest" and "reasonable restriction upon it for compelling interest of State" interchangeably which seems to 			suggest that the terms "compelling public interest" and "compelling state interest" used by the Court are being used synonymously and the Court 			does not draw any distinction between them. It is also important to note that the wider phrase "countervailing interest is shown to be superior" 			seems to suggest that it is possible, atleast in theory, to have other interests apart from public interest or state interest also which could 			trump the right to privacy.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; &lt;i&gt;R. Rajagopal v. Union of India&lt;/i&gt; , Supreme Court of India, dated 7-10-1994. These tests have been listed as one group since they are all applicable in the specific context of 			publication of private information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010. Also see &lt;i&gt;Vijay Prakash&lt;/i&gt; v.			&lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; &lt;i&gt;Canara Bank&lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner&lt;/i&gt;, 2007 (58) AIC Ker 667. This case also held that information cannot be denied on the ground that it 			would be too voluminous.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; &lt;i&gt;Union Centre for Earth Science Studies &lt;/i&gt; v. &lt;i&gt;Anson Sebastian, &lt;/i&gt;AIR 2010 Ker. 151; &lt;i&gt;Union Public Service Commission &lt;/i&gt;v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 			&amp;amp; C.M. No. 2618/2011 (for stay), dated 13-07-2012&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; &lt;i&gt;Canara Bank&lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner&lt;/i&gt;, 2007 (58) AIC Ker 667.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; &lt;i&gt;Haryana Public Service Commission &lt;/i&gt; v. &lt;i&gt;State Information Commission, &lt;/i&gt;AIR 2009 P &amp;amp; H 14.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; &lt;i&gt;UCO Bank&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner and another&lt;/i&gt;, 2009 (79) AIC 545 (P&amp;amp;H).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; &lt;i&gt;Surendra Singh &lt;/i&gt; v. &lt;i&gt;State of U.P&lt;/i&gt;, AIR 2009 Alld. 106.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; &lt;i&gt;R.K. Jain&lt;/i&gt; v. &lt;i&gt;Union Public Service Commission&lt;/i&gt;, Delhi High Court, LPA No. 618 of 2012, dated 12-11-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; &lt;i&gt;Srikant Pandaya&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;, AIR 2011 MP 14.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; &lt;i&gt;Paardarshita Public Welfare Foundation&lt;/i&gt; v. &lt;i&gt;Union of India and others&lt;/i&gt;, AIR 2011 Del 82. It must be mentioned that this case was not exactly under the procedure prescribed under 			the RTI Act but was a public interest litigation although the courts relied upon the provisions of the RTI Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; WP(C) 3444 of 2012 dated 23-08-2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; WP(C) 2232/2012 dated 17-09-2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; &lt;i&gt;President's Secretariat&lt;/i&gt; v. &lt;i&gt;Nitish Kumar Tripathi&lt;/i&gt;, Delhi High Court, WP (C) 3382 of 2012, dated 14-06-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; &lt;i&gt;P.C. Wadhwa&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, Punjab and Haryana High Court, LPA No. 1252 of 2009 dated 29-11-2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; &lt;i&gt;Rajinder Jaina&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, 2010 (86) AIC 510 (Del. H.C.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; &lt;i&gt;Rajendra Vasantlal Shah&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner, New Delhi&lt;/i&gt;, AIR 2011 Guj 70.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2'&gt;https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-09T02:53:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/white-paper-on-data-protection-and-privacy">
    <title>White Paper on Data Protection and Privacy</title>
    <link>https://cis-india.org/internet-governance/news/white-paper-on-data-protection-and-privacy</link>
    <description>
        &lt;b&gt;National Institute of Public Finance and Policy is organizing a roundtable on data protection and privacy in New Delhi on March 8, 2018. Sunil Abraham is participating as a moderator in the session on Rights and Protections. Amber Sinha is also participating as a panelist.&lt;/b&gt;
        &lt;p&gt;Agenda &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/white-paper-on-data-protection-and-privacy/"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/white-paper-on-data-protection-and-privacy'&gt;https://cis-india.org/internet-governance/news/white-paper-on-data-protection-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-03-07T14:57:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do">
    <title>Wherever you are, whatever you do</title>
    <link>https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do</link>
    <description>
        &lt;b&gt;Facebook recently launched a location-based service called Places. Privacy advocates are resenting to this new development. Sunil Abraham identifies the three prime reasons for this outcry against Facebook. The article was published in the Indian Express on 23 August, 2010.&lt;/b&gt;
        
&lt;p&gt;Privacy activists are up in arms again, at Facebook’s recent launch of a new location-based service called Places. But what’s the new issue here? For years, telecom operators have been able to roughly locate you by triangulating the signal strength between the three nearest cell towers. In India, geo-location is part of the call logs maintained by the operator. That is how the police was able to determine that Bangalore resident Sathish Gupta killed his wife Priyanka. He took her mobile with him during a jog with his friend and then faked a phone call as an alibi. He knew that the time-stamps on the call logs would corroborate his lies. But the location-data nailed him. So, in short, the state and telecom operators know where you are even if you don’t have a smartphone with GPS support.&lt;/p&gt;
&lt;p&gt;For those who can afford it? GPS support provides greater accuracy and reliability, independent of telecom signal strength. The immediate and future benefits are huge. For parents, MyKidIsSafe.com, allows them to create a geo-fence and receive automatic notification when the child leaves the safety zone. In combination with RFID, businesses are able to provide their customers with accurate updates regarding status of deliveries. The Karnataka police is able to verify that the police inspector issuing the challan using a Blackberry for a traffic violation is not doing it from home. Seven hundred and fifty thousand gay men from 162 countries use a geo-social network called Grindr to find love. In the future, most car-pooling services will be GPS-enabled. Geo-location-based crowd-sourcing will be used to predict and avoid traffic jams by measuring the density and velocity of mobile phones on various routes.&lt;/p&gt;
&lt;p&gt;Privacy advocates worry that after helping the police solve crimes and fight terrrorism, telecom companies retain the logs instead of deleting, anonymising or obfuscating them. Especially so in India, given the lack of privacy laws, telecom operators, web and mobile service providers could retain the logs for customer profiling or worse still, sell the raw data or analysis to third parties. Cyber-stalkers, child molesters and rapists benefit. Cat burglars will know when you are away and be able to clean out your house in a more relaxed fashion. Geo-surveillance by a state, obsessed with terrorism, will have negligible benefits while extracting a huge social cost and significantly undermining national security.&lt;/p&gt;
&lt;p&gt;So why this particular outcry against the world’s most successful social networking website? There are three reasons that come immediately to mind. First, Facebook has a terrible record with privacy. In the last five years, the default settings have moved from one where no personal data was available for anonymous access to one with anonymous access to everything except birthday and contact information. And these are settings that affect the majority of the half a billion people who don’t bother changing default settings. So there is no guarantee that Facebook will not get more intrusive with its default geo-location privacy settings.&lt;/p&gt;
&lt;p&gt;Second, a friend can geo-tag you without requiring you to approve or confirm this. Once you are geo-tagged, all your common friends will be notified through the friend-feed system. This is similar to the current system of photo sharing. A friend can upload a inappropriate photograph and tag you almost instantly all your work-mates who also happen to be your Facebook friends get a notification via the feed. Of course, you can always untag the photo, change the settings and defriend the culprit but by then the damage is usually done.&lt;/p&gt;
&lt;p&gt;Third, the Facebook user-interface for privacy settings is notoriously complex and cumbersome. Many users will think that they have managed to bolt down the security settings when in fact their personal data will remain all up for grabs. The half a million third-party products available today on the Facebook platform only compounds this problem.&lt;/p&gt;
&lt;p&gt;Read the original in the&lt;a class="external-link" href="http://www.indianexpress.com/news/Wherever-you-are--whatever-you-do/663810"&gt; Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do'&gt;https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:12:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/whistle-blowers-unite">
    <title>When Whistle Blowers Unite</title>
    <link>https://cis-india.org/internet-governance/blog/whistle-blowers-unite</link>
    <description>
        &lt;b&gt;Leaking corporate or government information in public interest through popular Web service providers is risky but Wikileaks.org is one option that you could try out.&lt;/b&gt;
        
&lt;p&gt;Leaking corporate or government information in public interest in the age of Satyam has new challenges. You couldn't just upload it to a blog, social networking website or even a document management system like &lt;a class="external-link" href="http://www.google.co.in/"&gt;Google&lt;/a&gt; documents. &lt;a class="external-link" href="http://www.google.co.in/"&gt;Google&lt;/a&gt;, &lt;a class="external-link" href="http://m.in.yahoo.com/?p=us"&gt;Yahoo&lt;/a&gt; and most other Web service providers nearly always comply with the national law and cooperate with enforcement agencies. In India there have been several arrests in connection with alleged illegal email messages and content on social networking websites. It did not take court order – just a request from the local police station. Furthermore, you would have to undertake additional risky activity online to draw media attention to your documents. Also those who stand to lose from the leak can send a couple of copyright take down notices which will lead to deletion. So your only real option is &lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks.org&lt;/a&gt;, where they boast:&amp;nbsp; Every source protected. No documents censored. All legal attacks defeated.&lt;/p&gt;
&lt;p&gt;Launched in December 2006, &lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks.org&lt;/a&gt; stands alone on the Internet as the last refuge for the truth. Even though the promoters are European and US academic organisations, journalists and NGOs – a near neutral point of view is realised by sparing no one across the political and ideological spectrum. It is the archive of the whistle-blowers of the world and it is ugly: login information and private emails of a holocaust denier, secret documents from the Church of Scientology, Internet block-lists from Thailand and standard operating procedures for US guards at Guantanamo Bay, et cetera. One could safely assume that these guys have very few friends.&amp;nbsp; Unlike Wikipedia.org whose technology it employs,&amp;nbsp;&lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks&lt;/a&gt; does not have an open and participatory editorial policy. It accepts documents through a trusted journalist–source system.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Leaking controversial documents can result in loss of job, limb and life, so extreme caution is always advised. Remember that India still does not have laws protecting whistle blowers, in spite of a bill being introduced in 2006. What follows is only a very rough guide to digital whistle blowing, so please get expert advice before you try these at home:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Download and install military grade encryption software like Pretty Good Privacy. Generate a pair of keys – a public and a private one. Use your private key in combination to a journalist's public key to send him or her, a 'for your eyes only message' email.&amp;nbsp; Only the journalist will be able to decrypt the message using your public key and his private key.&amp;nbsp; Note however, that an Indian court under the 2008 amendment of the IT Act can ask you to disclose your key-pair.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Step outside. Working from home is a bad idea since DOT mandates that all ISPs retain logs for all users and for all services utilized for an indeterminate time-period. Office is still worse as your network administrator might be also logging your activities.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Find an anonymous public access point. Cyber-cafes, especially in New Delhi, Maharashtra, Karnataka and Tamil Nadu are asking users to provide identity cards and record contact details and in some cases web-cam photographs as well. Using your laptop in a coffee shop may work but DOT is considering cracking down on open wifi networks.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Use an anonymizing service so that the chain of digital evidence leading up to &lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks&lt;/a&gt; is obliterated. TOR is the anonymizing solution of choice. Several TOR servers that provide private tunnels across the Internet work in unison, to form a cloud of anonymity. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;If you were leaking large amounts of data, uploading it may be too risky. Burn the data on DVDs and mail them to &lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks&lt;/a&gt;. However, do ensure that all digital files have been purged of personal information. For word files this can be done by converting to PDF.&amp;nbsp; Also you may not want to leave any finger-prints on the package. India will soon have a database of finger prints thanks to the National Unique Identity (NUID) project. We know this thanks to the leaked NUID project document on &lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks.org&lt;/a&gt;, days before the consultation.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/whistle-blowers-unite'&gt;https://cis-india.org/internet-governance/blog/whistle-blowers-unite&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:17:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-india-september-25-2016-manju-vi-when-the-war-is-on-whatsapp">
    <title>When the war’s on WhatsApp</title>
    <link>https://cis-india.org/internet-governance/news/times-of-india-september-25-2016-manju-vi-when-the-war-is-on-whatsapp</link>
    <description>
        &lt;b&gt;Slick, jingoistic videos are whipping up pro-war rhetoric on social media after the Uri terror attack.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Manju V was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/home/sunday-times/When-the-wars-on-WhatsApp/articleshow/54502035.cms"&gt;published in the Times of India&lt;/a&gt; on September 25, 2016. Nishant Shah was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It packs a meaner punch than any 140-character tweet. In 140 jingoistic  seconds, the cleverly packaged YouTube film veers from Mohammed Rafi to  Chandra Shekhar Azad drumming up pro-war rhetoric to avenge the  Pathankot attack. Set to the tone of chirping crickets on a moonlit  night somewhere along the western border that India shares with its  neighbour, the short film has two armymen in fatigues deliberate over  the absolute need to respond with a counter attack. It ends in a  staccato military drumbeat with a voiceover quoting Azad: "If yet your  blood does not rage, then it is water that flows in your veins."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Posted about 10 days after the Pathankot attack in January, the video  was resurrected last week after the country woke up to the &lt;a href="http://timesofindia.indiatimes.com/topic/Uri-attack"&gt;Uri attack&lt;/a&gt; that killed 18 Indian soldiers in the deadliest assault on security  forces in Kashmir in over two decades. Even as photographs of a grenade  smoke-filled valley, tricolour-draped coffins, grieving sons, daughters  and widows made the rounds in media outlets scores of Indians marched  onto social media, some armed with incendiary prose and other with slick  videos that expressed more anger than anguish.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another video doing the rounds, a jawan, or someone in uniform, sings  a poem warning Pakistan. His mates join in the refrain: "Kashmir toh  hoga, lekin Pakistan nahi hoga."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These videos of jawans threatening to decimate Pakistan were shared by thousands. &lt;a href="http://timesofindia.indiatimes.com/topic/WhatsApp"&gt;WhatsApp&lt;/a&gt; profile pictures and statuses were changed, Facebook posts got longer  and vitriolic, Twitter #UriAttack exploded with expletives as the  enough-is-enough sentiment peaked. It heralded the beginning of an era  where the dynamics of Indo-Pakistan relations will play out not just in  the diplomatic corridors of Delhi and Islamabad, the valley of Kashmir  or the barracks of security forces; but also on the mobile phones,  tablets and laptops of millions of Indians.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When contacted for a comment, the makers of the war-mongering 'Pathankot Tolerance' video didn't endorse war outright. "My individual opinion is that war is not a solution," said producer Santosh Singh, who heads the Mumbai-based V Seven Pictures. "Before we resort to war, we have to solve our internal problems. How can we let infiltration take place so blatantly?" he asked. Why then does the video not talk about this? Singh said that when one hears about such attacks, the instant reaction is to retaliate. "The video is based on that sentiment."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An electronics engineer, Singh also owns an IT recruitment firm. His film production company, which he runs along with his friend Vivek Joshi, made the Mauka Mauka World Cup video that went viral and also produces short films and videos for clients. "We have no political affiliations, in fact we turned down a couple of political parties who approached us," says Singh, adding that his company has made 30-35 films in less than two years. "Of these, about 10 are on issues close to our heart, like those on Afzal Guru and the Pathankot attack. We upload them on YouTube, they are aired without ads. We don't earn money from them," he adds.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Ugly gets outlet&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nitin Pai, director of Takshashila Institution, an independent centre for research and education in public policy, says that social media and some television studios have enabled people to express their subconscious fears and desires. "It is not just today that the people of India have been angry with Pakistan for fomenting terrorism in our country. But it is only now that they have ways to express this anger; unfortunately, social media dynamics amplify this anger in a grotesque, distorted manner, allowing the ugly and less-sensible views to rise to the top of the public discourse," said Pai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tracing the many origins of this phenomenon, psychiatrist Harish Shetty says that in an angst-ridden, globalized world, we need a whipping boy. "With the Uri attacks, the entire nation had a common enemy. In expressing collective anger, there's catharsis." The current outpouring is not just over the deaths of soldiers; such an incident also opens up older wounds, he says. "For a long time, Indians have found their leaders to be helpless. It's like a family that is attacked again and again by a neighbour, but the father does nothing about it. There has been a lack of strong response from 'papa figures' across time, which has led to a sense of anger and rage. After the Uri attacks, the collective self-esteem of the country took a beating, and people felt a need to assert themselves on social media. At such times strong action is viewed as legitimate, valid and free of guilt," he adds.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Amplifying angst&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;If social media brought together protesters in Tunisia and Egypt during the Arab spring, in democratic India it has turned into a platform for expressing mass disenchantment with the government, especially in the wake of such attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media plays several roles in times of crises, says Nishant Shah, professor of digital media and co-founder of the Centre for Internet &amp;amp; Society, Bengaluru. One, it amplifies what is already being said in friend circles and living-room conversations in front of the telly, but spreads it to a larger audience. "The second role it plays is distribution: social media allows people to inherit other people's opinions, thus exposing them to new ways of thinking but also find corroborators for their own viewpoints," he says. The third is catalysis — social media also has the capacity to generate new information. "The format creates new kinds of truths. Things that can be caught in Snapchat videos, or visuals which can be remixed, all become a part of this zeitgeist," Shah says.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Virtual wars&lt;/h3&gt;
&lt;p&gt;But in India at least, social media is no indicator of considered public opinion, points out Pai. Shah adds: "What we are seeing is a filter bubble of a privileged set of people who are engaging in this debate."&lt;/p&gt;
&lt;p&gt;Then again, what's said on social media needn't be endorsed in real life. Vivek Joshi, who wrote and directed the Pathankot video, says nobody in the world would want a war. "But when it comes to the lives of our soldiers, an answer has to be given. If the government had taken any visible action, then there would have been no need to put out a video like this," Joshi adds. And therein probably comes the new-age heuristic of venting out on social media.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-india-september-25-2016-manju-vi-when-the-war-is-on-whatsapp'&gt;https://cis-india.org/internet-governance/news/times-of-india-september-25-2016-manju-vi-when-the-war-is-on-whatsapp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-25T16:36:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one">
    <title>When the virtual world wakes up the real one</title>
    <link>https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one</link>
    <description>
        &lt;b&gt;The unprecedented wave of voices speaking up against sexual harassment in recent times has as much to do with technology as the determination to seek justice. From Twitter to Tumblr, and blogs to pastebin, the internet's anonymity, reach and speed allow small, personal stories of abuse to swell into big stories.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Malini Nair was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-11-24/deep-focus/44411700_1_social-web-sexual-harassment-editor-tarun-tejpal"&gt;published in the Times of India&lt;/a&gt; on November 24. Nishant Shah is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The outrage over the Tehelka case started with a post on pastebin, an  anonymous document sharing site, on Wednesday evening. It contained the  email managing editor Shoma Chaudhury had sent to the Tehelka staff with  editor Tarun Tejpal's "atonement" letter appended below. A few hours  later, the story had ballooned into a heated debate, and the outpouring  forced what was being dismissed as an "internal matter" to be treated as  a criminal case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The two &lt;a href="http://timesofindia.indiatimes.com/topic/Women"&gt;women&lt;/a&gt; who recently spoke up against harassment at the hands of a retired  Supreme Court judge also used Facebook and the blogosphere to tell their  stories, ensuring that the real world was actually moved into taking  action. "The social web's biggest comfort is that we are no longer  alone," says Nishant Shah, director, Research at the Centre for Internet  and Society, Bangalore. "No matter what has happened to us, it has  happened to somebody else. The possibility of finding credulous and  empathetic audiences who but share our pain, understand it, and respond  to it is unprecedented." Retweets and comments have often been described  as the digital equivalent of holding hands.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shah's pick of web  campaigns that highlighted the problems include Blank Noise which calls  women to talk of small, everyday stories of harassment, the Pink Chaddi  drive and Why We Need Feminism, a web venture across American  universities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other reason why the net encourages victims of  abuse who might otherwise have stayed quiet to speak out is its  "pseudonymity", as Shah terms it. In societies where there is shame  attached to talking about sexual assault, the online space saves women  from having to put themselves out in the "physical space" while ensuring  that the perpetrator is exposed, he points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A plus for  social web is that it gets other victims to speak up as well, gathering  force and magnitude in the process. This happened in the instance of the  legal interns. Another instance that surfaced just a month ago was of  two American women science bloggers Danielle Lee and Monica Byrne. When  Lee refused to write a piece for free for Biology Online, she was called  "urban whore" by an enraged editor. She blogged about it and the  ensuing storm over social media got her huge support. After Lee's  expose, Byrne blogged about an acutely sexual conversation a powerful  science writer inflicted on her. The outrage this provoked abated only  after he made amends.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As an article in Gender and Culture blog project puts it: "( The digital world provided) a &lt;a href="http://timesofindia.indiatimes.com/topic/Forum"&gt;forum&lt;/a&gt; for these victims to document their abuse, and a courtroom where the  abusers have been judged and found guilty by public opinion".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of  course there are problems with the internet's version of justice — it  tends to play judge, jury and executioner with giddy recklessness. In  the Tehelka case, the first questionable moment came when the survivor's  email was tweeted and re-tweeted with no concern for her requests for  anonymity. "The problem with Twitter and Facebook is the incredible and  gross violations of privacy of the survivor. And otherwise responsible  adults join lynch mobs calling either the &lt;a href="http://timesofindia.indiatimes.com/topic/Survivor"&gt;survivor&lt;/a&gt; or the accused names, making ridiculous allegations, desperately  looking for an easy narrative to hang everything on," says author Nisha  Susan, who led the Pink Chaddi campaign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commentator Santosh Desai says that it is tough to choose between an  unbridled but powerful social web and one that is cautious and governed  by norms. "Earlier, there were receivers and broadcasters who were few  and governed by licenses and a code of behaviour. Now everyone is a  broadcaster, everyone is a circulator and everyone is an aggregator.  Having no oversight here could be problematic," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Susan says communities need to go beyond social media in such situations. "It should also be a time for us to reflect. On what we would do in such a situation, how we could perhaps prevent it, on the sense of entitlement powerful men have all over the world, on the awful pressures young women face. We should all be reflecting. Instead we are just re-tweeting."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one'&gt;https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-11-30T09:35:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/when-digital-spills-into-physical">
    <title>When the digital spills into the physical</title>
    <link>https://cis-india.org/when-digital-spills-into-physical</link>
    <description>
        &lt;b&gt;Nishant Shah, Director-Research, Centre for Internet and Society, Bengaluru, tells us why flash mobs are an interesting sign of our times, and not just a passing fad.
&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;What is a flash mob?&lt;/strong&gt;&lt;br /&gt;There are many different forms of flash mobs, if you look at their content. In terms of structure, it has to do with a bunch of people, who are connected to each other by common technologies but don't necessarily know each other, and yet, come together in a public space to perform a set of pre-decided actions. Congregate, Orchestrate and Disperse -- that is the anatomy of a flash-mob. Hence it is different from other kinds of mobilisations, because it is very rare for anybody to know who is the organiser of a flash mob. &lt;br /&gt;&lt;br /&gt;There are no long speeches, political expositions or agendas used in order to bring people together for a flash mob. Once the brief performance has been done, people don't stay back to form communities and discuss. The word 'flash' draws its inspiration both from 'flash-floods' and 'flash-in-a-pan', both referring to the immanence and suddenness of a flashmob.&amp;nbsp;&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_copy_of_nishant.jpg/image_preview" alt="nishant" class="image-inline image-inline" title="nishant" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is a smart mob? &lt;/strong&gt;&lt;br /&gt;Howard Rheingold coined the term smart mob in a book by the same name. Smart mobs are a more inclusive form of digital technology-based mobilisation. Rheingold uses the term to refer to a series of sharing, collaborative, performative engagements that have emerged around the world, especially with young people using the Internet. The people don't know each other, but through different Peer-to-Peer (p2p) protocols, are able to share their resources towards a particular purpose. So it might be a group of friends who want to dance at the train station, or geeks sharing their idle computing time to search for records of UFOs, or people using location based applications to meet each other in caf ©s and form friendships. Smart mobs are essentially different from flashmobs because they have a specific agenda and are geared towards a longer, sustained and enduring practice of community belonging and building.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What role does the Internet and digital technology play in organising flash mobs?&lt;/strong&gt;&lt;br /&gt;One of the fundamental tenets of flash mobs is the condition of anonymity. The web offers the necessary condition where the intended participant does not have to disclose any personal information. They are able to interact, communicate, receive and share information while giving out nothing more than their email addresses and cellphone numbers. It would have been impossible to think of a flash mob without the use of these technologies because while the postal service would also offer similar conditions (though the physical address is more of an identifier), the flash mob also requires a speed and scale which would otherwise have been impossible in an analogue world.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is a flash mob best suited to achieve? Is it a form of celebration, a protest, campaign, a quick way to poke fun, or be ironic?&amp;nbsp;&amp;nbsp; &lt;/strong&gt;&lt;br /&gt;I would say the flash mob is a tool — a process that can be deployed for anything that you want. You can use it as a form of celebration or protest. You can also use it to bully somebody, to destroy public property or create conditions of danger. However, that is true of any tool that we use. A hammer, for example, can be used to hit a nail, or hit some one. The flash mob is a symptom of how our digital and physical realities are merging. It uses the aesthetics of p2p, interaction with strangers, gaming elements with more control over the spaces that we occupy, 'avatar'ification which allows for a pseudonymous existence, etc. to organise something in the physical world. And it is these spillages of the digital into the physical (and vice versa) that make flash mobs significantly more interesting than just a passing fad.&lt;/p&gt;
&lt;p&gt;MidDay published this interview in their newspaper on 18 December 2011. The original can be read &lt;a class="external-link" href="http://www.mid-day.com/lifestyle/2011/dec/181211-When-the-digital-spills-into-the-physical.htm"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/when-digital-spills-into-physical'&gt;https://cis-india.org/when-digital-spills-into-physical&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-22T05:42:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/revolutions-viral">
    <title>When revolutions go viral</title>
    <link>https://cis-india.org/news/revolutions-viral</link>
    <description>
        &lt;b&gt;Thanks to Facebook and Twitter, the urban Indian youth, famously detached from the goings-on in the country, came out on the streets to support the anti-corruption movement - not only here but abroad as well. TOI-Crest looks at the anatomy of a modern protest movement.&lt;/b&gt;
        
&lt;p&gt;I try to change my display picture, update my BBM status and send out a tweet as often as possible. I feel like I really need to do my bit for the country, " a college student was overheard saying outside Mumbai's Azad Maidan where protests against the anti-corruption movement are still under way. Once used to reconnect with long-lost school friends or to post vacation pictures, social networking sites have surfaced as the new forum for political activism. The world's attention is now on the potential of the digital sphere in historical revolutions as witnessed in Egypt and Tunisia.&amp;nbsp;Though set in a vastly different political context, and used to different ends, the power of social media to drive citizen action in India has become apparent as Team Anna's call to action resonates through the Internet.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;From earlier this year at Jantar Mantar to the culmination of the protests when Anna Hazare became a household name, the anti-corruption movement has harnessed technology and social media tools to engineer large-scale protests. Not only has the movement deviated from traditional methods of mass mobilisation, but it has also brought young urban India into the fold of political activism. Ritesh Singh, a third-year computer science student at IIT Khargapur, created the 'India Against Corruption' Facebook page in December last year. Since then, the page has gathered more than four lakh supporters. There are also several regional chapters and over 150 unofficial Facebook pages devoted to Anna Hazare and India Against Corruption.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The 'Students Against Corruption' group has been encouraging students to use social media for the cause by sending out messages such as "Students should share and promote this page for the goodness (sic) of the nation . . . This is the thing dat we can do for our nation. . . This is wat India needs. . . Promote it, share it, blog it, discuss it . . . then feel the change. " Petitions, calls to action and encouragement to join Hazare's fast also became commonplace in the last three months. The blog post '10 Ways to Support Anna Hazare on Social Media' by social media manager Sorav Jain has been shared 256 times on Facebook.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Relying on symbolism such as Gandhian photographs and references to the freedom struggle, Team Anna has created a media phenomenon. Text messages such as 'Behri sarkar ko janta ki aawaz sunai nahi de rahi hain! Lets show ppls anger!' and 'ANNA ki aag shuru ho gayi hai, Inquilab Zindabad' have helped in creating mass support. Meanwhile twitter has been abuzz with dialogue, support and reactions to the protests, as Anna Hazare's campaign became the top trending topic in India over the past few weeks. While the image of Hazare meditating at Raj Ghat became iconic on August 15, 2011, Team Anna's voice was heard on the TV, on mobile phones, YouTube and even on T-shirts. Developers are in the process of launching an India Against Corruption game, India Against Corruption mobile applications, India Against Corruption browser toolbars and more.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Though digital activism is often criticised as passive armchair activism or slacktivism, the use of technology in organising social protests has brought a different kind of activist on the street: young, urban India. "It's not as if what is happening is new, but it is happening on an unprecedented scale, " says Nishant Shah, research director for the Centre for Internet and Society, Bangalore. "Traditional media has also done this in different ways, but in the past the protesters have been the disenfranchised. The use of social media has mobilised a new constituency - it has brought the urban middle class to the street. However, the use of such tools is producing a different kind of exclusion. There is a noticeable lack of poor urban people in the protests. This is not the representation of 1. 2 billion Indians as it is being made out to be. "&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The use of social media has garnered support for Team Anna from the unlikeliest parts, catapulting 'India Against Corruption' (IAC) into a global phenomenon. Young Indians living in places like New York, Singapore, London and Hong Kong are tweeting, facebooking, organising and gathering to talk about Hazare and his cause. Some young professionals have even taken time off from their careers to fly down to India and physically support the cause.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Sunil Khaitan, an investment banker working with Deutsche Bank in Hong Kong flew down last Friday to attend the protests at the Ramlila ground and address the crowd at Mumbai's Azad Maidan. Khaitan, 28, is originally from Kolkata and graduated from IIM Bangalore in 2006. "I was involved in the Right to Information movement in 2005, have been in touch with Professor Trilochan Sastry at IIM Bangalore, and have been tracking this movement from the days of Jantar Mantar, " he says.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Khaitan is also active in the Hong Kong chapter of IAC, which organised a meeting on August 21, 2011, attended by over 300 people. "There is a clearly outlined process on the IAC website which tells you how to conduct a meeting, " says Khaitan. "As the news channels are not available in HK, so many people are not aware of the real cause. So we talked about the points of contention and showed videos with Arvind Kejriwal, Kiran Bedi and Hazare addressing the crowd. " He argues that harnessing social media has helped get people from different walks of life involved with the Hazare movement.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Social networking sites have also helped create a close-knit Indian community in Hong Kong. "Anna has also made a big point about the youth being present in the protests, and it is easier to connect with the youth through social media, " says Khaitan.&lt;/p&gt;
&lt;p&gt;"Peer pressure also comes into the picture in that age group - people want to get involved to appear impressive to their friends. " But though technology has brought a new demographic of Indians into the realm of protest, it manifests its power through the oldest form of networking - word of mouth.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This article was published in the Times of India (Crescent Edition) on 27 August 2011, read the original story &lt;a class="external-link" href="http://www.timescrest.com/life/when-revolutions-go-viral-6155"&gt;here&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/revolutions-viral'&gt;https://cis-india.org/news/revolutions-viral&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-01T04:46:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-march-11-2014-chanpreet-khurana-when-politics-gets-social">
    <title>When politics gets social</title>
    <link>https://cis-india.org/news/livemint-march-11-2014-chanpreet-khurana-when-politics-gets-social</link>
    <description>
        &lt;b&gt;In the run-up to the general election, social media companies explain how the political campaigns this time are very different from what they were five years ago. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Chanpreet Khurana was &lt;a class="external-link" href="http://www.livemint.com/Leisure/FhyPs4evRTV3HtgVIN1ZMK/When-politics-gets-social.html"&gt;published in Livemint &lt;/a&gt;on March 11, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“Okay, I didn’t gain anything. I lost,” Aam Aadmi Party (AAP)’s &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Arvind%20Kejriwal"&gt;Arvind Kejriwal &lt;/a&gt;&lt;/span&gt;conceded  disarmingly during a town hall meeting on Facebook last week. He was  responding to a question from Candidates 2014 host &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Madhu%20Trehan"&gt;Madhu Trehan &lt;/a&gt;&lt;/span&gt;on his much critiqued &lt;i&gt;dharna &lt;/i&gt;(sit-in protest) during his 49-day chief ministership of Delhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even as elections to 543 constituencies approach, political parties and  politicians are putting their online campaigns in top gear. Sample some  of the activity in just the last week. On Sunday, the Indian National  Congress party asked voters to share their thoughts on what to include  in the party’s Lok Sabha election manifesto—on Twitter. On 8 March,&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/%20Narendra%20Modi"&gt; Narendra Modi&lt;/a&gt;&lt;/span&gt;,  the Bharatiya Janata Party’s prime ministerial candidate, held the  second session in his Chai Pe Charcha with NaMo series—this time on  women’s empowerment. And All India Trinamool Congress chief Mamata  Banerjee’s “Girls are our assets” post on Facebook was liked more than  22,000 times.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/facebooktalks.png" alt="facebook talks" class="image-inline" title="facebook talks" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Recognizing the high level of engagement around politics on social  media, companies like Facebook and Google are driving initiatives on  this theme in peak election season—polling starts on 7 April. The  Facebook Talks Live’s Candidates 2014 series (also broadcast on NDTV),  which in its first week featured Kejriwal, Banerjee, Rashtriya Janata  Dal chief &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Lalu%20Prasad"&gt;Lalu Prasad &lt;/a&gt;&lt;/span&gt;and the Samajwadi Party’s &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Akhilesh%20Yadav"&gt;Akhilesh Yadav&lt;/a&gt;&lt;/span&gt;, is one example.&lt;/p&gt;
&lt;p&gt;There are many new services being launched online in the run-up to the Lok Sabha election.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Know your candidate&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On 20 April 2011, US President &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Barack%20Obama"&gt;Barack Obama &lt;/a&gt;&lt;/span&gt;appeared  on Facebook Talks Live, opening the floodgates for a new kind of  engagement between political leaders and the electorate. Cut to almost  three years later, and the Facebook-led “town hall” meeting has come to  India. On 4 March, Candidates 2014 launched with Kejriwal taking  questions on issues like women’s safety, reservation for the backward  classes and the plight of contractual workers, and detailing his vision  for the country. A video of the town hall is available on Facebook and  YouTube and has been viewed at least 30,000 times. As part of the format  of the town hall, the questions came in equal parts from the live  audience, Trehan and from a pool of questions submitted on the Facebook  India page.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To the agile leader then, social media can be more than just another  pulpit to broadcast views and give a speech from. It’s something &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;,  executive director of The Centre for Internet And Society, a non-profit  research organization, can’t stress enough. “Social media provides  unmediated access; in that sense it is a tremendously effective tool,”  says Bangalore-based Abraham in a phone interview. “The question is, are  political parties agile enough to take advantage of it?”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-march-11-2014-chanpreet-khurana-when-politics-gets-social'&gt;https://cis-india.org/news/livemint-march-11-2014-chanpreet-khurana-when-politics-gets-social&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T07:52:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-crest-edition-april-27-2013-rukmini-shrinivasan-when-netas-network">
    <title>When Netas Network</title>
    <link>https://cis-india.org/news/times-of-india-crest-edition-april-27-2013-rukmini-shrinivasan-when-netas-network</link>
    <description>
        &lt;b&gt;In September 2009, a freshly re-elected Congress took exception to a light-hearted tweet by its newly inducted minister Shashi Tharoor, chastising him not only for causing offence but also for being too quick to air his views on social media. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Rukmini Shrinivasan was &lt;a class="external-link" href="http://www.timescrest.com/coverstory/when-netas-network-10207"&gt;published in the Times of India&lt;/a&gt; on April 27, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;So much can change in less than four years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rocked by allegations of corruption, and with anti-incumbency firmly  setting in, the Congress is struggling to reconnect with voters, and is  belatedly embracing social media. Tharoor has had the last laugh;his  social media activity has earned him praise and is being emulated by  others in his cabinet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As political discussion spills over from the neighbourhood tea shop and  coffee house to Facebook and Twitter, their potential impact on  electoral politics is something that those in power and those hoping to  get there are taking very, very seriously. &lt;br /&gt;&lt;br /&gt;The BJP runs its  social media operation out of its headquarters in Delhi. Most of the  party's top leaders have an official Facebook page and a verified  Twitter handle, while others, including octogenarian L K Advani, blog.&lt;br /&gt;&lt;br /&gt;The  Congress is late to the party;it does not have an official Twitter  account and has such a halfhearted Facebook presence that it isn't  immediately clear that it's official. But it seems to be waking up -  young leaders including Deepender Hooda are now part of a social media  strategy team, and the younger cabinet ministers are enthusiastic social  media adopters.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Rural India Logs On&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Despite representing a largely rural, relatively impoverished  constituency, 48-year-old Biju Janata Dal MP Baijayant Panda is a  Twitter natural. "Rural Indians are slowly beginning to get more active  online and I am beginning to interact more often with my constituents  there. In fact, particularly on Facebook, there are already a  significant number of Odia users, from all around the world, but also  those living in my constituency, " Panda says. &lt;br /&gt;&lt;br /&gt;Simultaneously,  social media entrepreneurs are responding to what they see as an area of  huge growth. The Australian web-based citizen-politician interaction  platform OurSay has just come to India (see interview on page 5). In the  run-up to the elections, Twitter and Google are both reaching out to  politicians and civil society organisations in the citizen engagement  game and have pitched town-hall style interactions to several  politicians, including union cabinet members and state governments. &lt;br /&gt;&lt;br /&gt;Social  media entrepreneur and analyst Mahesh Murthy believes that Indian  social media users have discovered the wonders of political engagement  online. "Only now are they figuring out that the real news doesn't seem  to get out on traditional media - and more importantly, that their  response on traditional media (at best, a letter to the editor) is puny  in comparison to the impact they can have via social, " he says.  Moreover, says Murthy, the impact is not online alone. "The Nirbhaya  case, the Palghar case, the recent child rape case - all would have gone  generally unnoticed a few years ago. Each of them, thanks to social  media, became a cause to rally around. Add to this disclosures under  RTI, NGOs becoming more transparent, online petitions and more - the  staid and set political world of India is undergoing the first wave of  massive, irreversible change. "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such evangelism about the potentially transformational impact of social  media was echoed in a recent study which claimed that Facebook users  could swing elections in 150 constituencies in the next Lok Sabha  election. Apart from being statistically flawed, the study also failed  to look beyond the number of people on social media, to the kinds of  conversations they are actually having.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A Broadcast Medium?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;With some exceptions, the majority of politicians on Twitter and  Facebook use it as yet another broadcast medium for purely one-way  traffic, a rare few respond to the hundreds who leave comments on their  Facebook and Twitter posts. So while Gujarat chief minister Narendra  Modi might have asked the FICCI ladies to get in touch with him on  social media, what he omitted to mention was that he never responds. &lt;br /&gt;&lt;br /&gt;Most  politicians and parties are not doing a good job of engaging with  citizens through social media, agrees Sunil Abraham, executive director  of the Bangalore-based Centre for Internet and Society. "Most of them  are still outsourcing this function completely. This reminds me of the  early days of email in large corporations and government offices when  every email was printed before it was read by its recipient and the  response dictated and recorded using shorthand before it was entered  into the computer. This approach will not work with social media users.  Personal involvement will be one way to improve results, " says Abraham.  &lt;br /&gt;&lt;br /&gt;Arvind Gupta, who sold off his analytics firm to run the BJP's  IT cell from its Lutyens' Delhi headquarters, disagrees. "The volume of  responses on Twitter or Facebook make it impossible for Sushmaji  [Swaraj] or Modiji to respond to them all, but they often meet online  supporters offline too, or highlight insightful comments on their blogs,  " says Gupta. &lt;br /&gt;Younger leaders tend to be better at online  interaction. So while 89-year-old Karunanidhi of the DMK has a Twitter  account but follows no one, the party's youngest MLA, TRB Rajaa, has  five Facebook pages and a Twitter handle, and replies personally. "I get  several hundred messages on Facebook in a day, but I try to respond to  at least half, especially those who are raising grievances, " he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some times, the proximity of a politician to the blaze of online outrage can force action. "When (IIPM director) Arindam Choudhary got a remote district court to ban a UGC web page, social media turmoil spurred first Shashi Tharoor and then [minister of state for information technology] Milind Deora and then the government into action - and the case was challenged and the ban was overturned, " says Murthy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Influencing First-time Voters&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;But the big question remains - in a country where the internet is for a  privileged few, is it too early to start talking of social media playing  a role in electoral politics?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sanjay Jha who runs the website  Hamara-Congress. com and is a member of the party's social media  strategy team, believes the impact will largely be on youngt voters. "It  will have an impact on first time voters of urban India as also on  voters who are unsure about their political leanings, " he says. &lt;br /&gt;&lt;br /&gt;"Social  media like mainstream media will influence its users. Internet users  are still roughly around 10% of the population. However, they are elites  and can influence wider offline discourse. Social media may have other  benefits as it would help make the elections more transparent and free  from manipulation, " says Abraham. &lt;br /&gt;&lt;br /&gt;"One has to be careful - we  don't know yet how many people on Facebook are registered to vote, and  how many more will do so in time. We also need to understand better the  ability of a youth on Facebook to influence his parents' and family's  voting choices, " says Murthy. &lt;br /&gt;&lt;br /&gt;In number terms, Murthy believes  that social media will have some impact on 8-15 % of the electorate come  2014. "The 2014 elections will be a turning point. But I sense the 8%  to 15% will more than double by 2019 elections - and that will be a  moment when social media is far, far more important. The smarter parties  and politicians will realise this and start making investments and  efforts right away, " says Murthy. &lt;br /&gt;&lt;br /&gt;Gupta strongly believes that a  segment of the population that is politically engaged online but will  not come to dharnas nevertheless votes, and should not be dismissed.  "You often see people who make "I voted today" their Facebook status, "  he says. Moreover, citizens politically engaged online are influencing  each other and changing minds, he says.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Party Time&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Many in politics also believe that besides the voter - who makes his or  her decision based on a complex matrix of reasons - social media plays  an important role in helping the leadership of parties connect with and  energise their cadre and supporters. &lt;br /&gt;&lt;br /&gt;"At the very least, social  media will bring interested volunteers and party-workers closer to  public representatives by making direct interaction possible. Certain  candidates, even independent and otherwise lesser fancied ones, will  have a shot at mobilising supporters at rallies, even though they have  far fewer traditional resources to do so, " says Panda. &lt;br /&gt;Rajaa  agrees. "Not just voters, many motivated cadre also use social media to  keep in touch with our youth wing and with the second-rung leadership, "  he says.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;With additional reporting by Kim Arora.&lt;/p&gt;
&lt;hr /&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-crest-edition-april-27-2013-rukmini-shrinivasan-when-netas-network'&gt;https://cis-india.org/news/times-of-india-crest-edition-april-27-2013-rukmini-shrinivasan-when-netas-network&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-19T06:19:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-kv-aditya-bharadwaj-march-15-2019-when-laugh-lines-turn-worry-lines">
    <title>When laugh lines turn worry lines</title>
    <link>https://cis-india.org/internet-governance/news/hindu-kv-aditya-bharadwaj-march-15-2019-when-laugh-lines-turn-worry-lines</link>
    <description>
        &lt;b&gt;Trolls instil fear in cartoonists’ minds.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by K.V. Aditya Bharadwaj was &lt;a class="external-link" href="https://www.thehindu.com/elections/lok-sabha-2019/when-laugh-lines-turn-worry-lines/article26548206.ece"&gt;published in Hindu&lt;/a&gt; on March 15, 2019. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The election season, with all its colour and drama, had been a  festival for political cartooning. But no longer so. Cartoonists,  especially those using social media platforms to publish their works,  say they are under siege by a polarised electorate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several  cartoonists have reported instances of their work being taken down from  social media platforms and their accounts blocked after they were  flagged by users for “offensive content, abuse and nudity”. They allege  that while they have been experiencing a “tough time” with right-wing  trolls over cartoons critical of the BJP, the situation has become worse  in the run-up to the Lok Sabha election.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;P. Mahmud, a senior  political cartoonist from Karnataka, has been locked out of his Facebook  account for a week. His cartoon on March 8 portraying demonetisation  and GST as an air strike on the economy went viral on social media, but  it was later pulled down after it was allegedly flagged for offensive  content. Shorty after, his account was locked. “This is an attack on my  freedom of expression, robbing me of a platform,” Mr. Mahmud said.  Another work of his, critical of Masood Azhar, founder of the terrorist  organisation Jaish-e-Mohammed, was reported for hurting religious  sentiments as he had called it Jaish rather than by its full name. A  user reported it as an attempt at “obfuscating the religion of terror”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I  can take criticism. But this campaign against my work seems organised  and connected to my religion as well,” Mr. Mahmud said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another  senior cartoonist from the State, Satish Acharya, had to lodge a  complaint with the Udupi police recently when a right-wing troll  threatened to “teach him a lesson in public”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I have had my  Facebook account blocked thrice over the past five years. Each time it  was mass reported over cartoons critical of the Modi &lt;i&gt;Sarkar&lt;/i&gt; [government]. It’s part of a deliberate strategy to ensure that critical perspective doesn’t find currency online,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior  cartoonists Tanmay Tyagi from Delhi and Mumbai-based Manjul have had  similar experiences. Mr. Tyagi’s social media handles have been  suspended over six times since 2014. Last year, his personal computer  was shacked and 20 years of work deleted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cartoonists are worried  about this concerted effort to muzzle them. Manjul expressed sorrow over  the lack of space for nuance, wit, sarcasm, irony and satire — tools  that a cartoonist relies on to get their message across.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“You are  branded and pigeon-holed in a world that seems to operate on a ‘you are  either with us or with them’ narrative. In a polarised society readers  look for a confirmation bias in the cartoons,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A steady  stream of abusive comments is a daily reality for cartoonists. “These  trolls seek to enter your mind and create fear so that the next time a  cartoonist sits at his table to sketch, he will rethink what he draws.  It’s aimed at self-censorship,” Mr. Acharya said. He believes that  traditional media houses are also developing cold feet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil  Abraham, executive director, Centre for Internet and Society, a  Bengaluru-based research organisation, termed it a “private censorship  regime” that was also opaque.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“At most of the social media  platforms the function is done partly by machine and partly in person.  No company has invested heavily on human resources to review content  being reported, making most of the process automated. Once you know what  patterns the machine is looking for, you can game the machine and  provide such patterns. It is an attack on freedom of expression,” he  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last year, Facebook made a detailed document on its internal  community standard policy public explaining the nature of the content  it takes down. An email questionnaire to the company on its redressal  system especially when posts are being falsely flagged for nudity went  unanswered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But is trolling a new phenomenon or restricted to just  right-wing supporters? Manjul said the first time he faced this kind of  censorship was in 2013 when Twitter took down one of his cartoons  critical of the Congress.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His recent cartoon on Triple Talaq  received much flak and a Muslim organisation called up the editor of the  publication threatening to kill him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“My cartoon of Lord Ganesha  taking a taxi during the Surat Plague got me a barrage of hate mail in  1994. It’s an old disease, but the wound is now in the open and it is  rotting. Right-wing trolls are more organised, tech savvy and nasty in  their use of language,” he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-kv-aditya-bharadwaj-march-15-2019-when-laugh-lines-turn-worry-lines'&gt;https://cis-india.org/internet-governance/news/hindu-kv-aditya-bharadwaj-march-15-2019-when-laugh-lines-turn-worry-lines&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>K.V. Aditya Bharadwaj</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-03-20T16:06:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/when-data-is-privacy">
    <title>When Data Means Privacy, What Traces Are You Leaving Behind?</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/when-data-is-privacy</link>
    <description>
        &lt;b&gt;How do you know yourself to be different from others? What defines the daily life that you live and the knowledge you produce in the span of this life? Is all that information yours or are you a mere stakeholder on behalf of the State whose subject you are? What does privacy really mean? In a society that is increasingly relying on information to identify people, collecting and archiving ‘personal’ details of your lives, your name, age, passport details, ration card number, call records etc, how private is your tweet, status update, text message or simply, your restaurant bill? &lt;/b&gt;
        
&lt;p&gt;The CIC (central information commission) that arbitrates decisions on RTI appeals in case of conflict of interest provides interesting notions of what the State thinks is privacy. Ironically, the cornerstones of RTI that is privacy and its invasion are yet to be defined in the context of the judiciary. Then, how does the CIC decide what is private enough and what can be revealed to anyone? Of course, it relies on the discretion of its judges who attempt to draw from a range of sources that include the principles of natural justice drawn from western jurisprudence to quotes by Gandhi and Aristotle to the UK Data Protection Act, 1998 and US Torts that define invasion of privacy. To begin with, let us examine who constitutes the private sphere. As ruled in case of&lt;em&gt;&amp;nbsp;Mr. Ajeet Kumar Khanna vs Punjab &amp;amp; Sind Bank&amp;nbsp;&lt;/em&gt;on 29 July, 2008 and&amp;nbsp;&lt;em&gt;Mr. G. Atchaiah vs State Bank of India&lt;/em&gt;&amp;nbsp;on 22 August, 2008, the appellant can seek information only for himself/herself. Anyone outside the self, commonly believed as the personal connection, sons, daughters, parents or even spouse is not allowed information of a relative. One needs a distinct power of attorney for right to information. The contradiction is that one does not need to state the purpose for asking information, thereby making unnecessary any connection with the person you want information about.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;CIC has been increasingly relying on the UK Data Protection Act, 1998 to make a correlation between data and privacy. Hence, to map privacy and its invasion, the RTI act depends on the UK Data Protection Act that classifies the following as sensitive personal data:&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We have no equivalent of UK's Data Protection Act, 1998, Sec 2 of which, titled Sensitive Personal Data, reads as follows: In this Act "sensitive personal data" means personal data consisting of information as to:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;The racial or ethnic origin of the data subject&lt;/li&gt;&lt;li&gt;His political opinions&lt;/li&gt;&lt;li&gt;His religious beliefs or other beliefs of a similar nature&amp;nbsp;&lt;/li&gt;&lt;li&gt;Whether he is a member of a Trade Union&lt;/li&gt;&lt;li&gt;His physical or mental health or condition&lt;/li&gt;&lt;li&gt;His sexual life&lt;/li&gt;&lt;li&gt;The commission or alleged commission by him of any offence&lt;/li&gt;&lt;li&gt;Any proceedings for any offence committed or alleged to have been committed by him, the disposal of such proceedings or the sentence of any court in such proceedings.&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;While this blanket reference to sensitive personal data does not account for nuances in the Indian context, it also does not capture the essence of public-private interaction. It is mostly at the intersection of the public domain and the individual that the demarcation occurs. While personal family photographs lying in my attic may constitute a beautiful memory that can be proudly displayed on my walls, it is when one acknowledges the dual nature of any information source, the potential of these photographs to contribute to larger politicized information narratives, that their access and usage comes to define the real crux of the privacy debate.&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;The US Restatement of the Law, Second, Torts, defines the Intrusion to Privacy more generally in the following manner: “One, who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person.” Of course, we don’t know whether a father paying for bills and wanting access to his daughter’s cell phone records can be seen as highly offensive to a reasonable person in the Indian context. In the context of the recent&amp;nbsp;&lt;strong&gt;Padmanabhswamy Temple&lt;/strong&gt;treasure trove found in Kerala, since under the Ancient Monuments and Archaeological Sites and Remains Act 1958, such sites qualify as sites of ‘national importance’ and imply a certain larger public interest, would one be able to access such 'nationally personal data' pertaining to a temple (public space) owned by a family trust registered with the government (publicly private), containing a national treasure lying locked on geographical territory (public) that is rightly shared by all citizens?&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Here’s how the CIC defined the personal and the extent of personal in the context of state as illustrated in&amp;nbsp;&lt;em&gt;Mr. Kanhiya Lal vs MCD, GNCT, Delhi&lt;/em&gt;&amp;nbsp;on 13 June, 2011.To qualify for this exemption the information must satisfy the following criteria:&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;It must be personal information&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Words in a law should normally be given the meanings given in common language. In common language we would ascribe the adjective 'personal' to an attribute which applies to an individual and not to an institution or a corporate. From this it flows that 'personal' cannot be related to Institutions, organizations or corporate. (Hence, we could state that section 8 (1) (j) cannot be applied when the information concerns institutions, organizations or corporate). The phrase 'disclosure of which has no relationship to any public activity or interest' means that the information must have some relationship to a public activity. Various public authorities in performing their functions routinely ask for 'personal' information from Citizens, and this is clearly a public activity. When a person applies for a job, or gives information about himself to a public authority as an employee, or asks for a permission, licence or authorisation, all these are public activities. The information sought in this case by the appellant has certainly been obtained in the pursuit of a public activity. We can also look at this from another aspect. The State has no right to invade the privacy of an individual. There are some extraordinary situations where the State may be allowed to invade on the privacy of a Citizen. In those circumstances special provisos of the law apply, always with certain safeguards. Therefore it can be argued that where the State routinely obtains information from Citizens, this information is in relationship to a public activity and will not be an intrusion on privacy.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;In that case, does data at several layers demand for us to relook privacy from the subject positions we acquire at different levels and hence, the larger private collectives that we partake of?&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/when-data-is-privacy'&gt;https://cis-india.org/internet-governance/blog/privacy/when-data-is-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Noopur Raval</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-11-24T09:24:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-hindustan-times-aug-26-2012-when-goi-blocks-twitterati-fly-off-their-handles">
    <title>When #GOIBlocks, twitterati fly off their ‘handles’ </title>
    <link>https://cis-india.org/news/www-hindustan-times-aug-26-2012-when-goi-blocks-twitterati-fly-off-their-handles</link>
    <description>
        &lt;b&gt;Ever since the news broke mid-week that some genuine Twitter accounts and six spoof accounts were blocked, the social networking platform has been in a tizzy.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.hindustantimes.com/technology/SocialMedia-Updates/When-GOIBlocks-twitterati-fly-off-their-handles/SP-Article1-919446.aspx"&gt;Published&lt;/a&gt; in the Hindustan Times on August 26, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Hashtags like #GOIblocks and variations on the same theme began “trending” and the twitterati, functioning like a virtual democracy, have been bombarding the world in real time with posts about the issue. 16 accounts of the 15 million twitter users in India, among them those of a few journalists, spoof accounts like @PM0India, a right-wing parody of @PMOIndia, the official twitter account of the Prime Minister’s office, and a few anonymous accounts like Barbarian Indian (@barbarindian) and Dosabandit (@dosabandit) were blocked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Narendra Modi turned his twitter display picture black in solidarity with the idea of freedom of speech (and was promptly termed a hypocrite with many like @JagPaws, who has 641 followers, tweeting, “Whoa!! Is he supporting Jihadi sites?”), Pankaj Pachauri, (49,827 followers) Communications Adviser to the Prime Minister’s office, has put up twitter rules and the National Security Advisor Shivshankar Menon’s ominously pro-surveillance keynote address at the release of the IDSA report on “India’s Cyber Security Challenge”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many like Nitin Pai @acorn, with 16,988 followers, founder of Takshashila Institute, a public policy think tank, tweeted that “under extraordinary circumstances, the govt must do whatever it can under the constitution to prevent loss of life” and added that targeted and temporary blocks of sites, facebook pages and twitter handles that spewed hate were acceptable. Others like film maker Harini Calamur (@calamur) (11,277 followers) who says she is against censorship tweeted that “Blocking internet handles &amp;amp; sites is silly” and “the Govt’s job is to uphold the constitution &amp;amp; protect our fundamental rights. Not make value judgements.” Much of the debate has led to a genuine exchange, sometimes making comrades of people from opposing camps. Kanchan Gupta, a journalist known for his pro-Hindutva views, whose twitter handle @KanchanGupta (26,424 followers) was among those blocked, accepted on TV that scores of “people from all communities” many of whom “disagreed violently” with him had extended their support on twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others like writer Shivam Vij (@Dilidurast), who has 3,296 followers, whom Hindutvawadis has often branded ‘pseudo sickular’, surprised baiters by speaking against the ban.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many were strident in their criticism of the arbitrary nature of the blocks and tweeted that it was indicative of authoritarianism. “Internet blocks in India have been increasing in frequency&amp;amp;intensity. I wouldn't put this down to knee-jerk/foolishness.There is *intent*,” tweeted Nikhil Pahwa (@nixxin), founder and editor of @medianama. Others like business journalist Samidha Sharma @samidhas worried that the government’s frequent attacks on freedom of expression shows that it is “following china in all the wrong things”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Pranesh Prakash (@pranesh_prakash) of the Centre for Internet and Society tweeted, “They've blocked sites from all parts of the spectrum: Muslim right-wing, Hindu right-wing, neutral news sites, etc. No politics”, many others saw the move as a “self-serving” one. “Dear GoI: why not be honest enough to say that this web censorship has NOTHING to do with security+ all to do with your own arrogance” tweeted Sunny Singh (@sunnysingh_nw3).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-hindustan-times-aug-26-2012-when-goi-blocks-twitterati-fly-off-their-handles'&gt;https://cis-india.org/news/www-hindustan-times-aug-26-2012-when-goi-blocks-twitterati-fly-off-their-handles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-26T05:56:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
