<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1151 to 1165.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-request-18-icann2019s-internal-website-will-stay-internal"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-request-17-how-icann-chooses-their-contractual-compliance-auditors"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-request-16-icann-has-no-documentation-on-registrars2019-201cabuse-contacts201d"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-request-15-what-is-going-on-between-verisign-and-icann"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/roundtable-identifying-and-limiting-hate-speech-and-harassment-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-request-14-keeping-track-of-icann2019s-contracted-parties-registrars"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-request-13-keeping-track-of-icann2019s-contracted-parties-registries"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/washington-post-july-27-2016-rama-lakshmi-facebook-is-censoring-some-posts-on-indian-kashmir"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-request-9-exactly-how-involved-is-icann-in-the-netmundial-initiative"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-request-10-icann-does-not-know-how-much-each-rir-contributes-to-its-budget"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/stand-up-for-digital-rights-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-17-2016-one-pokemon-to-rule-them-all"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-3-2016-gay-pride-charade"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-today-july-13-2016-bisakha-datta-belling-the-trolls"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/perumal-murugan-and-the-law-on-obscenity"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-request-18-icann2019s-internal-website-will-stay-internal">
    <title>DIDP Request #18 - ICANN’s Internal Website will Stay Internal</title>
    <link>https://cis-india.org/internet-governance/blog/didp-request-18-icann2019s-internal-website-will-stay-internal</link>
    <description>
        &lt;b&gt;ICANN maintains an internal website accessible to staff and employees. We requested ICANN to provide us with a document with the contents of that website in the interest of transparency and accountability.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span id="docs-internal-guid-6ae20cf4-3723-9313-1ca4-571610febfac"&gt;The request filed by Padmini Baruah can be found &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/didp-request-20150901-6-01sep15-en.pdf"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. To no one’s surprise, not only did ICANN not have this document in “ICANN's possession, custody, or control,” even if it did it would be subject to &lt;a class="external-link" href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;DIDP conditions for non-disclosure&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span id="docs-internal-guid-6ae20cf4-3724-8d54-05ca-866fe5bc62b5"&gt;ICANN's response to our DIDP request may be found &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/didp-response-20150901-6-cis-wiki-01oct15-en.pdf"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-request-18-icann2019s-internal-website-will-stay-internal'&gt;https://cis-india.org/internet-governance/blog/didp-request-18-icann2019s-internal-website-will-stay-internal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>asvatha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>DIDP</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-29T14:53:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-request-17-how-icann-chooses-their-contractual-compliance-auditors">
    <title>DIDP Request #17 - How ICANN Chooses their Contractual Compliance Auditors </title>
    <link>https://cis-india.org/internet-governance/blog/didp-request-17-how-icann-chooses-their-contractual-compliance-auditors</link>
    <description>
        &lt;b&gt;At a congressional hearing on internet governance and progress, then President of ICANN Fadi Chehadi indicated that the number of people working on compliance audits grew substantially—from 6 to 24 (we misquoted it as 25)— in the span of a few years.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span id="docs-internal-guid-88ef1d6f-3472-3cd6-bf11-e5bb7d2ea6a9"&gt;It is clear to us at CIS that the people in charge of these compliance audits perform an important function at ICANN. To that effect, we requested information on the 24 individuals mentioned by Mr Chehadi as well as the third party auditors who perform this powerful watchdog function. More specifically, we requested documents calling for appointments of the auditors and copies of their contracts with ICANN.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span id="docs-internal-guid-88ef1d6f-3472-5ef2-432a-dbb3e446057d"&gt;The request filed by Padmini Baruah can be found &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/didp-request-20150901-5-01sep15-en.pdf"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;What ICANN said&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr" id="docs-internal-guid-88ef1d6f-3472-81e4-8a58-7815de9e725d" style="text-align: justify; "&gt;&lt;span&gt;In their response to the first part of our question, ICANN linked us to a webpage containing the names and titles of all employees working on contractual compliance. This page contains 26 names including the Contractual Compliance Risk and Audit Manager: &lt;/span&gt;&lt;a href="https://www.icann.org/resources/pages/about-2014-10-10-en"&gt;&lt;span&gt;https://www.icann.org/resources/pages/about-2014-10-10-en&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p dir="ltr" id="docs-internal-guid-88ef1d6f-3472-cda1-dd73-6b12b9aa1fc5" style="text-align: justify; "&gt;&lt;span&gt;ICANN also described the process of selecting KPMG as their third party auditor in detail. A pre-selection process shortlists 5 companies  that fit the following criteria: knowledge of ICANN, global presence, size, expertise and reputation. Then, ICANN issues a targeted Request For Proposal (RFP) to these companies asking them for their audit proposals. After a question and answer session, a proposal analysis and rating the scorecards, a “cross-functional steering committee” decided to go with KPMG. While the process has been discussed transparently, our questions remain unanswered.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" id="docs-internal-guid-88ef1d6f-3473-0cee-aa58-9889a6de22eb" style="text-align: justify; "&gt;&lt;span&gt;The RFP would qualify as the document requested by us in the second part of the question (i.e.)  a “document that calls for appointments to the post of the contractual compliance auditor.” Unfortunately, ICANN has not published the RFP citing the DIDP Conditions for Non-disclosure. However, the timeline for the RFP and other details have been posted &lt;/span&gt;&lt;a href="https://www.icann.org/resources/pages/governance/rfps-en"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt; after our DIDP request. In addition, the contract between  KPMG and ICANN has also not been published. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" id="docs-internal-guid-88ef1d6f-3473-2c8e-1679-7191963f7ad9" style="text-align: justify; "&gt;&lt;span&gt;ICANN's response to our DIDP request may be found &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/didp-response-20150901-5-cis-auditor-appt-01oct15-en.pdf"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-request-17-how-icann-chooses-their-contractual-compliance-auditors'&gt;https://cis-india.org/internet-governance/blog/didp-request-17-how-icann-chooses-their-contractual-compliance-auditors&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>asvatha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>DIDP</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-29T02:20:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-request-16-icann-has-no-documentation-on-registrars2019-201cabuse-contacts201d">
    <title>DIDP Request #16 - ICANN has no Documentation on Registrars’ “Abuse Contacts”</title>
    <link>https://cis-india.org/internet-governance/blog/didp-request-16-icann-has-no-documentation-on-registrars2019-201cabuse-contacts201d</link>
    <description>
        &lt;b&gt;Registrars on contract with ICANN are required to maintain an “abuse contact” - a 24/7 dedicated phone line and e-mail address to receive reports of abuse regarding the registered names sponsored by the registrar.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We wrote to ICANN requesting information on these abuse complaints received by registrars over the last year. We specifically wanted reports of illegal activity on the internet submitted to these abuse contacts as well as details on actions taken by registrars in response to these complaints.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="docs-internal-guid-9b05b54d-3465-1c5e-3830-7af0d8e37b19"&gt;The request filed by Padmini Baruah can be found &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/didp-request-20150901-4-01sep15-en.pdf"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;What ICANN said&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Our request to ICANN very specifically dealt with reported illegal activities. However, in their response, ICANN first broadened it to abuse complaints and then failed to give a narrowed down list of even those complaints.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In their response, ICANN indicated that they do not store records of complaints made to the abuse contact. This is stored by the registrars and is available to ICANN only upon request. However, since ICANN is only obliged to publish documents it already has in its possession, we did not receive an answer to our first question. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span id="docs-internal-guid-9b05b54d-3467-44df-1aed-bbe876d6dc71"&gt;As for the second item, ICANN gave a familiarly vague answer, linking us to the&lt;/span&gt;&lt;a href="https://www.icann.org/compliance/notices"&gt;&lt;span&gt; Contractual Compliance Complaints&lt;/span&gt;&lt;/a&gt;&lt;span&gt; page with a list of all the breach notices that have been issued by ICANN to registrars. A breach notice is relevant to our request only if it is in response to an abuse complaint, and the abuse complaint specifically deals with illegal activity. Even discounting that, this is not a comprehensive list when you take into account that a breach notice is published only “if a &lt;/span&gt;&lt;span&gt;formal contractual compliance enforcement process has been initiated &lt;/span&gt;&lt;span&gt;relating to an abuse complaint and resulted in a breach.”&lt;a href="#ftn1"&gt;[1] &lt;/a&gt;What about the rest of the complaints received by the registrar?&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;In addition, ICANN refused to publish any communication or documentation of ICANN requesting reports of illegal activity under the DIDP non-disclosure conditions. &lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span id="docs-internal-guid-9b05b54d-3469-bdb4-1603-805eb7dc6a97"&gt;ICANN's response to our DIDP request may be found &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/didp-response-20150901-4-cis-abuse-complaints-01oct15-en.pdf"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p dir="ltr" id="docs-internal-guid-9b05b54d-346a-e343-097c-9bedf6f32f17"&gt;&lt;a name="ftn1"&gt;[1] &lt;/a&gt;&lt;span&gt;See ICANN response here (Pg 4): https://www.icann.org/en/system/files/files/didp-response-20150901-4-cis-abuse-complaints-01oct15-en.pdf&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-request-16-icann-has-no-documentation-on-registrars2019-201cabuse-contacts201d'&gt;https://cis-india.org/internet-governance/blog/didp-request-16-icann-has-no-documentation-on-registrars2019-201cabuse-contacts201d&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>asvatha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>DIDP</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-29T02:11:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-request-15-what-is-going-on-between-verisign-and-icann">
    <title>DIDP Request #15: What is going on between Verisign and ICANN?</title>
    <link>https://cis-india.org/internet-governance/blog/didp-request-15-what-is-going-on-between-verisign-and-icann</link>
    <description>
        &lt;b&gt;During a hearing of the House Committee on Energy and Commerce on “Internet Governance Progress After ICANN 53,” President and CEO of ICANN - Mr Fadi Chehade indicated that ICANN follows up with registries and registrars on receipt of any complaint against them about violations of their contract with ICANN.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;At CIS, we believe that any exchange of dialogue or any outcome from ICANN acting on these complaints needs to be in the public domain. Thus, our 15th DIDP request to ICANN were for documents pertinent to Verisign’s contractual compliance and actions taken by ICANN stemming from any discrepancies of Verisign’s compliance with its ICANN contract.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="docs-internal-guid-f679a3d5-345d-67c5-6d95-690f07d56d1f"&gt;The DIDP request filed by Padmini Baruah can be found &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/didp-request-20150901-3-01sep15-en.pdf"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;What ICANN said&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;After sorting through a response designed to obfuscate information, it was clear that ICANN was not going to provide any of the details we requested. As mentioned in their previous responses, individual audit reports and the names of the registries associated with discrepancies are confidential under the DIDP Defined Conditions of Nondisclosure. Nevertheless, some details from the response are worth mentioning.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;According to the response, “As identified in Appendix B of the 2012 Contractual Compliance Year One Audit Program Report, the following TLDs were selected for auditing: DotAsia Organisation Limited (.ASIA), Telnic Limited (.TEL), Public Interest Registry (.ORG), Verisign (.NET), Afilias (.INFO), and Employ Media LLC (.JOBS).” The response goes on to state that out of these 6 registries that were selected, only 5 chose to participate in the audit, the identies of which are once again confidential. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However, on further examination, it can be seen that Verisign (.NET) was chosen to participate in  the audit the year after as well. Therefore, it’s clear that 2013 was the year Verisign was audited. Unfortunately, that was pretty much all that was relevant to our request in ICANN’s response.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Once again, ICANN was able to use the DIDP Defined Conditions of Nondisclosure, especially the following conditions to allow itself the ability not to answer the public: &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;span&gt;Information exchanged, prepared for, or derived from the deliberative and decision-making process between ICANN, its constituents, and/or other entities with which ICANN cooperates that, if disclosed, would or would be likely to compromise the integrity of the deliberative and decision-making process between and among ICANN, its constituents, and/or other entities with which ICANN cooperates by inhibiting the candid exchange of ideas and communications.&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Information provided to ICANN by a party that, if disclosed, would or would be likely to materially prejudice the commercial interests, financial interests, and/or competitive position of such party or was provided to ICANN pursuant to a nondisclosure agreement or nondisclosure provision within an agreement.&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Confidential business information and/or internal policies and procedures.&lt;a href="#ftn1"&gt;[1]&lt;/a&gt;&lt;/span&gt;&lt;span&gt; &lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="docs-internal-guid-f679a3d5-345f-fcdf-ba09-26b6f74477d8"&gt;ICANN’s response to our request can be found &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/didp-response-20150901-3-cis-contractual-violations-verisign-01oct15-en.pdf"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn1"&gt;[1] &lt;/a&gt;&lt;span id="docs-internal-guid-f679a3d5-3461-1364-7277-525329280407"&gt;See DIDP https://www.icann.org/resources/pages/didp-2012-02-25-en&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-request-15-what-is-going-on-between-verisign-and-icann'&gt;https://cis-india.org/internet-governance/blog/didp-request-15-what-is-going-on-between-verisign-and-icann&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>asvatha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>DIDP</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-29T02:01:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/roundtable-identifying-and-limiting-hate-speech-and-harassment-online">
    <title>Roundtable: Identifying and Limiting Hate Speech and Harassment Online</title>
    <link>https://cis-india.org/internet-governance/news/roundtable-identifying-and-limiting-hate-speech-and-harassment-online</link>
    <description>
        &lt;b&gt;Japreet Grewal attended this event organized by Software Freedom Law Centre at Constitution Club Of India, Rafi Marg, New Delhi on July 28, 2016.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;See the original report published by SFLC &lt;a class="external-link" href="http://sflc.in/summary-report-roundtable-on-identifying-and-limiting-hate-speech-and-harassment-online-new-delhi-july-28-2016/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;SFLC.in organized a roundtable discussion on 28&lt;sup&gt;th&lt;/sup&gt; July, 2016 in New Delhi to initiate a focused and collaborative  dialogue around the increasingly important issues of online harassment  and hate speech. This roundtable was intended as the first in a series  of discussions around said issues, and was attended by representatives  from various stakeholder groups including intermediary platforms, civil  society groups, and media houses, along with individuals who had  personally experienced such online abuse &amp;amp; harassment. The core  objective of this discussion was to recognize and understand the vast  range of concerns that exist in this sphere, in an effort to develop a  framework for the regulation of such activities, without stepping on the  right to freedom of expression. The discussion was conducted under  Chatham House rules so as to facilitate an uninhibited exchange of  views.&lt;/p&gt;
&lt;p align="justify"&gt;Over the course of the event, the complex and  multifaceted nature of its overarching theme unraveled, as the  discussion moved from underlying social constructs, to responsibilities  of intermediary platforms, adequacy of existing laws, sensitization of  everyday users and effective handling of grievances by law enforcement  agencies. At the very outset, it was highlighted that social media  platforms, with their increasing popularity, are being considered  centralized hubs for businesses and others. However, individuals,  communities &amp;amp; institutions often find themselves at the receiving  end of sustained abuse and threats either on grounds of their actual or  perceived characteristics, or over their online expression. The dynamic  discussion that ensued brought to light significant concerns that would  require a collaborative effort across stakeholder groups to address. For  the sake of clarity, we are categorizing these learnings under the  following heads:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="justify"&gt;&lt;span&gt;Conceptual understanding of online harassment and hate &lt;/span&gt;&lt;span&gt;speech&lt;/span&gt;&lt;span&gt;:&lt;/span&gt; It was discussed at length that hate speech and speech that culminates  in harassment on the online sphere, are reflective of the social outlook  of the country at large. Women were seen as more frequent targets of  harassment in the form of rape threats, sexual remarks, and name  calling, whereas men are mostly called out for their beliefs and  opinions. When discussing hate speech relations, it was considered  important to take note of the power dynamics at play amongst the  stronger groups, and the vulnerable ones. Limiting such content gets  specially complicated considering the apprehension that in an effort to  monitor hate speech and harassment, free speech may get stifled. The  paradox of anonymity being an enabler of free speech, as well the reason  for unabashed harassment adds yet another layer of complexity to the  issue. Moreover, it was felt that a nuanced distinction needed to be  made regarding the systematic attacks by online mobs against a  particular person, as opposed to hateful and/or harassing speech that  engages on a one to one level. This all culminated in a realization that  this issue goes beyond the online domain, into the societal mindset  that is amplified on the Internet, and that the faint line between free  speech, and hateful &amp;amp; harassing speech is very difficult to  pin-point.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="justify"&gt;&lt;span&gt;Role of intermediaries&lt;/span&gt;:  It was the opinion of the representatives of intermediary platforms at  the roundtable that the current legal frameworks in the country are  sufficient to tackle this issue and they should operate in compliance  with such laws. While the specific terms of service may differ in terms  of permissible content depending on the type of service being provided  by the intermediary, these platforms do invariably keep a check on the  content being generated and evaluate them for compliance with the  applicable terms of service. Additionally, platforms that have the  option of users creating &amp;amp; generating their own content, give the  user various tools such as block, filter, un-follow, and other  customized options to moderate the content they receive. though the  intermediaries, in their own words ‘ are not a delete squad, but a  compliance team’, it was said that they ran the perpetual risk of either  censoring content that should not have been censored, or not censoring  enough of the content that should have been censored. This incentivizes  them to exercise zero-tolerance policies in certain areas such as child  sexual abuse or terrorism, and resort to immediate take down of content  related to such themes. However, in spite of the sheer volume of  material that is generated and reported, it was felt that a completely  automated approach cannot be followed for filtering hateful and  harassing content that violates terms of service Taking down content and  expression requires processing various factors that determine the  context of that material, and this calls for a subjective approach that  requires a set of human eyes. Therefore, the intermediaries do have  tools for users that protect them from hate and harassing speech, and  they work with certain safety experts to ensure that the users feel safe  while using their services.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="justify"&gt;&lt;span&gt;Adequacy of legal frameworks&lt;/span&gt;:  A distinction was drawn over the course of the discussion between hate  speech as a social as opposed to a legal concept. For legal purposes,  speech would not attract penalties until it incites a real threat of  violence and civic disorder. However, the law is not sufficiently  equipped to deal with speech that does not incite violence, but causes  psychological damage. It was undisputed that the concerns in this area  cannot be solved by creating more statutes. Going down this road could  lead to the creation of a Section 66A equivalent that would lead to  censorship through law and cause a chilling effect on freedom of  expression. It was emphasized that the existing laws have adequate  provisions, but a strict implementation is required.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="justify"&gt;&lt;span&gt;Response from law enforcement agencies&lt;/span&gt;:  An evaluation of this point led to the conclusion that people who are  harassed online, or are the targets of hate speech, are hesitant to  approach the police and law enforcement agencies for their help. There  have been instances where the police is unable to help due to the  limited application of laws in such cases, as mentioned above.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="justify"&gt;&lt;span&gt;Possible remedies&lt;/span&gt;: As a part of this roundtable, SFLC.in had proposed a set of &lt;a href="http://sflc.in/wp-content/uploads/2016/08/BestPractices_OnlineHarassment_SFLCin.pdf"&gt;best practices&lt;/a&gt; aimed at limiting hateful and harassing content online. These were  intended as self-regulatory measures that could be followed by  intermediaries functioning as speech platforms, where users could create  and publish content without pre-filtrations. Amongst the measures that  was discussed extensively was the practice of promoting ‘counter speech’  on the platforms that are most frequently used to spread hateful  propaganda and harassment. This was generally seen as an effective  counter-measure deserving further exploration, and one of the  intermediaries mentioned a project they were formulating on ‘counter  radicalization’. However, concerns were raised with respect to the  identification of areas that would benefit from counter speech, and its  effectiveness with respect to mob attacks. Another unique approach  suggested by the participants was to ‘vaccinate’ first time users by  educating them about the enormity and complexity of the Internet,  including intiation of such users to the idea that freedom of expression  online often crosses over to hate speech and harassment. This would act  as an initiation process to understand the working of the Internet and  the prevalence of hateful and harassing content on its numerous speech  platforms, so that first-time users are not discouraged from using the  Internet merely due to the presence of negative content. An interesting  suggestion for the platforms was to work towards a mechanism that is  more offender centric, and facilitates the tracking of repeat offenders  along with providing tools of blocking for users.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="justify"&gt;This roundtable served in exploring the many layers  of hateful and harassing speech that runs across roles and  responsibilities of various stakeholder groups and concerns that are  deeply entrenched in our societal outlook. The increasing frequency and  amount of such content on the Internet is an indication of the urgent  need to collaborate and develop a framework for limiting such speech,  while balancing the fundamental right to freedom of expression. We thank  all the participants and appreciate their valuable contributions that  facilitated a better understanding of the overall theme.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/roundtable-identifying-and-limiting-hate-speech-and-harassment-online'&gt;https://cis-india.org/internet-governance/news/roundtable-identifying-and-limiting-hate-speech-and-harassment-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-08-09T13:31:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-request-14-keeping-track-of-icann2019s-contracted-parties-registrars">
    <title>DIDP Request #14: Keeping track of ICANN’s contracted parties: Registrars</title>
    <link>https://cis-india.org/internet-governance/blog/didp-request-14-keeping-track-of-icann2019s-contracted-parties-registrars</link>
    <description>
        &lt;b&gt;In September 2016, we filed two separate DIDP requests regarding ICANN’s Contractual Compliance Goals.&lt;/b&gt;
        &lt;p&gt;&lt;span id="docs-internal-guid-bf51bf89-322e-256d-7606-417c64dfd392"&gt;The first one which we have written about here,&lt;/span&gt;&lt;a href="#ftn1"&gt;[1] &lt;/a&gt;was regarding ICANN contracts with registries while the second one about registrars is briefed below. In our second request, we specifically asked for the following information:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Copies of the registrar contractual compliance audit reports for all the audits carried out as well as external audit reports from the last year (2014-2015).&lt;/li&gt;
&lt;li&gt;A generic template of the notice served by ICANN before conducting such an audit.&lt;/li&gt;
&lt;li&gt;A list of the registrars to whom such notices were served in the last year.&lt;/li&gt;
&lt;li&gt;An account of the expenditure incurred by ICANN in carrying out the audit process.&lt;/li&gt;
&lt;li&gt;A list of the registrars that did not respond to the notice within a reasonable period of time.&lt;/li&gt;
&lt;li&gt;Reports of the site visits conducted by ICANN to ascertain compliance.&lt;/li&gt;
&lt;li&gt;Documents which identify the registrars who had committed material discrepancies in the terms of the contract.&lt;/li&gt;
&lt;li&gt;Documents pertaining to the actions taken in the event that there was found to be some form of contractual non-compliance.&lt;/li&gt;
&lt;li&gt;A copy of the registrar self-assessment form which is to be submitted to ICANN. &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The DIDP request filed by Padmini Baruah can be viewed here.&lt;/p&gt;
&lt;h3&gt;What ICANN said&lt;/h3&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-bf51bf89-3234-6693-c084-c898ecb92ff6"&gt;Information pertinent to item 1 and 3 can be found in the 2014 Contractual Compliance Annual Report here:https://&lt;/span&gt;&lt;a href="http://www.icann.org/en/system/files/files/annual-2014-13feb15-en.pdf"&gt;&lt;span&gt;www.icann.org/en/system/files/files/annual-2014-13feb15-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. While this report contains detailed information regarding the audit, individual audit reports are subject to the DIDP Defined Conditions for Nondisclosure.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span id="docs-internal-guid-bf51bf89-3234-d617-f932-ee71027bdaf6"&gt;ICANN provided a link to all the communication templates used during the audit process, including the notice served by ICANN prior to conducting audits. (Item 2) It can be found here:&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/audit-communication-template-04dec15-en.pdf"&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/audit-communication-template-04dec15-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. As mentioned in an earlier blog post, ICANN set aside USD 0.6 million for the Three Year Audit plan.&lt;a href="#ftn2"&gt;[2] &lt;/a&gt;(item 4)&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;According to the Audit FAQ on ICANN website,&lt;a href="#ftn3"&gt;[3]&lt;/a&gt; &lt;span id="docs-internal-guid-bf51bf89-323a-156a-af6f-d315baa30ccd"&gt;“If a contracted party reaches the enforcement phase per process, ICANN will issue a notice of breach in which the outstanding issues are noted. The response links us to the ICANN webpage where these breach notices are listed:&lt;/span&gt;&lt;a href="https://www.icann.org/compliance/notices#notices-2014"&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;https://www.icann.org/compliance/notices#notices-2014&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. (Item 5) According to the link, 61 registrars received breach notices in 2014; a full explanation has been provided for each notice. (Item 7 and 8) Since no site visits were conducted, ICANN does not possess any document regarding this.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;According to the ICANN website, “The 2013 Registrar Accreditation Agreement (RAA) requires ICANN-accredited registrars to complete an annual self-assessment and provide ICANN with a compliance certification by 20 January.”&lt;a href="#ftn4"&gt;[4] &lt;/a&gt;&lt;span id="docs-internal-guid-bf51bf89-3244-56d6-a94a-37347d37616b"&gt;The form for the same can be found here: &lt;/span&gt;&lt;a href="https://www.icann.org/resources/pages/approved-with-specs-2013-09-17-en#compliance"&gt;&lt;span&gt;https://www.icann.org/resources/pages/approved-with-specs-2013-09-17-en#compliance&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="docs-internal-guid-bf51bf89-3244-91f8-830f-b40c5a82d02a"&gt;ICANN’s response to our request can be found &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/didp-response-20150901-1-response-20150901-2-cis-ry-rr-audits-01oct15-en.pdf"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a name="ftn1"&gt;[1] &lt;/a&gt;&lt;span id="docs-internal-guid-bf51bf89-3258-80b4-c7aa-aea9801aceac"&gt;To be linked to the first post&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn2"&gt;[2] &lt;/a&gt;&lt;span id="docs-internal-guid-bf51bf89-3258-28cd-a693-d1605b22ce9e"&gt;See FY15 budget (pg72): &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/adopted-opplan-budget-fy15-01dec14-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/adopted-opplan-budget-fy15-01dec14-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn3"&gt;[3] &lt;/a&gt;&lt;span id="docs-internal-guid-bf51bf89-3257-ded2-6793-607c741261a7"&gt;See Audit FAQ: https://www.icann.org/resources/pages/faqs-2012-10-31-en&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn4"&gt;[4] &lt;/a&gt;See CEO certification: https://www.icann.org/resources/pages/ceo-certification-2014-01-29-en&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-request-14-keeping-track-of-icann2019s-contracted-parties-registrars'&gt;https://cis-india.org/internet-governance/blog/didp-request-14-keeping-track-of-icann2019s-contracted-parties-registrars&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>asvatha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>DIDP</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-28T16:34:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-request-13-keeping-track-of-icann2019s-contracted-parties-registries">
    <title>DIDP Request #13: Keeping track of ICANN’s contracted parties: Registries</title>
    <link>https://cis-india.org/internet-governance/blog/didp-request-13-keeping-track-of-icann2019s-contracted-parties-registries</link>
    <description>
        &lt;b&gt;On multiple occasions, Fadi Chehade, then President and CEO of ICANN has emphasized the importance of conducting audits (internal and external) to ensure compliance of ICANN’s contracted parties. At a US congressional hearing, he spoke about the contract monitoring function of ICANN. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In September 2015, we filed two separate DIDP requests regarding ICANN’s Contractual Compliance Goals. The first one, briefed below, is regarding the contracts with registries and the second one is regarding ICANN contracts with registrars. This post contains some additional background information on the Contractual Compliance Goals at ICANN. In our first request, we specifically asked for the following information:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Copies of the registry contractual compliance audit reports for all the audits carried out as well as external audit reports from the last year (2014-2015).&lt;/li&gt;
&lt;li&gt;A generic template of the notice served by ICANN before conducting such an audit. &lt;/li&gt;
&lt;li&gt;A list of the registries to whom such notices were served in the last year. &lt;/li&gt;
&lt;li&gt;An account of the expenditure incurred by ICANN in carrying out the audit process. &lt;/li&gt;
&lt;li&gt;A list of the registries that did not respond to the notice within a reasonable period of time. &lt;/li&gt;
&lt;li&gt;Reports of the site visits conducted by ICANN to ascertain compliance.&lt;/li&gt;
&lt;li&gt;Documents which identifies the registry operators who had committed material discrepancies in the terms of the contract. &lt;/li&gt;
&lt;li&gt;Documents pertaining to the actions taken in the event that there was found to be some form of contractual non-compliance. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="docs-internal-guid-36e025c6-3214-1f40-f34c-66e56df641b6"&gt;The DIDP request filed by Padmini Baruah can be viewed &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/didp-request-20150901-1-01sep15-en.pdf"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;What ICANN said&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;ICANN’s Contractual Compliance Goal is to ensure that all the parties that ICANN has entered into a contract with complies with the stipulations of the contract. This is done in several ways, including Contractual Compliance complaints and Audits.&lt;a href="#ftn1"&gt;[1]&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" id="docs-internal-guid-36e025c6-3223-35f4-9e89-5d38d93e81e3" style="text-align: justify; "&gt;&lt;span&gt;In 2012, ICANN initiated the Three Year Audit plan where one-third of registries were selected each year for an audit. In 2014, the third set of registries were audited. In response to Item 1,  information about the audit for 2014 can be found here: &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/contractual-compliance-ra-audit-report-2014-03feb15-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/contractual-compliance-ra-audit-report-2014-03feb15-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. At this link, we can also find the list of registries that went through the audit process in 2014 (item 3). Monthly updates on overall contractual compliance can be found here:&lt;/span&gt;&lt;a href="https://www.icann.org/resources/pages/update-2013-03-15-en"&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;https://www.icann.org/resources/pages/update-2013-03-15-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" id="docs-internal-guid-36e025c6-3223-80b1-a31b-01ccfb91f71d" style="text-align: justify; "&gt;&lt;span&gt;ICANN linked us to all the communication templates used during the audit process, including the notice served by ICANN prior to conducting audits. (Item 2) It can be found here: &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/audit-communication-template-04dec15-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/audit-communication-template-04dec15-en.pdf &lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;&lt;span id="docs-internal-guid-36e025c6-3223-c0d0-b744-b06fc20af7d3"&gt;In the operating plan and budget for FY15, ICANN sets aside USD 0.2 million for the New Registry Agreement Audit and USD 0.6 million for the Three Year Audit plan.&lt;a href="#ftn2"&gt;[2]&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Other documents to answer this question such as invoices from the external auditing firm are subject to non-disclosure under DIDP policies. Since all registries responded in a timely manner and no site visits were conducted, there are no documents to answer items 5 and 6. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The audit report linked above contains information on deficiencies identified during the audit. ICANN states that registries addressed these deficiencies during the remediation process. However, there is a caveat to this discussion. The names of the registries that are associated with these discrepancies remains confidential, subject to the DIDP Defined Conditions for Nondisclosure. (Item 7) ICANN goes on to state that it is not required to confirm if the registries have taken appropriate action and thus does not have any documents in response to item 8. While ICANN’s audit process seems thorough, does this last statement indicate a lack of enforcement mechanisms on ICANN’s part?  &lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" id="docs-internal-guid-36e025c6-3225-cbec-186e-0694f7918168" style="text-align: justify; "&gt;&lt;span&gt;ICANN’s response to our request can be found &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/didp-response-20150901-1-response-20150901-2-cis-ry-rr-audits-01oct15-en.pdf"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn1"&gt;[1]. &lt;/a&gt;&lt;span id="docs-internal-guid-36e025c6-3227-7c19-f04b-6258c3ad1fbc"&gt;See Contractual Compliance website: https://www.icann.org/resources/pages/compliance-2012-02-25-en&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn2"&gt;[2]. &lt;/a&gt;&lt;span id="docs-internal-guid-36e025c6-3228-1009-f91a-30ea4972689f"&gt;See FY15 budget (pg72): &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/adopted-opplan-budget-fy15-01dec14-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/adopted-opplan-budget-fy15-01dec14-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-request-13-keeping-track-of-icann2019s-contracted-parties-registries'&gt;https://cis-india.org/internet-governance/blog/didp-request-13-keeping-track-of-icann2019s-contracted-parties-registries&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>asvatha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>DIDP</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-28T15:40:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/washington-post-july-27-2016-rama-lakshmi-facebook-is-censoring-some-posts-on-indian-kashmir">
    <title>Facebook is censoring some posts on Indian Kashmir</title>
    <link>https://cis-india.org/internet-governance/news/washington-post-july-27-2016-rama-lakshmi-facebook-is-censoring-some-posts-on-indian-kashmir</link>
    <description>
        &lt;b&gt;Film makers, activists and journalists accused Facebook of blocking their accounts this week after they posted messages and images related to the violence in the trouble-torn province of Kashmir. In recent weeks, the India administered, Muslim-majority Kashmir state has been facing violence and curfews after protests erupted against the killing of a popular leader of a terrorist group.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by         Rama Lakshmi was published by &lt;a href="https://www.washingtonpost.com/news/worldviews/wp/2016/07/27/facebook-is-censoring-posts-on-indian-kashmir-some-say/"&gt;Washington Post&lt;/a&gt; on July 27. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As people         posted images, videos and stories about police violence and         people injured by&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="https://www.washingtonpost.com/news/worldviews/wp/2016/07/12/in-kashmir-indian-security-forces-use-pellet-guns-that-often-blind-protesters/"&gt;pellet&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;wounds         on Facebook, some discovered their accounts were disabled. On         Monday, the account of Arif Ayaz Parrey, an editor with an         environmental magazine in New Delhi, was disabled for more than         a day. He administers the Facebook account of a discussion group         called the Kashmir Solidarity Network, whose page was also         removed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Kashmir         Solidarity page was started by a Kashmiri anthropology student         in New York. This is not a hate forum, we share stories,” Parrey         said. More than 47 people have died and hundreds injured in         angry clashes between the police and protesters in Kashmir this         month, the worst outbreak of bloody violence in six years in the         region claimed by both India and neighboring Pakistan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Our Community         Standards prohibit content that praises or supports terrorists,         terrorist organizations or terrorism, and we remove it as soon         as we’re made aware of it,” said a Facebook spokesman in         India. “We welcome discussion on these subjects but any         terrorist content has to be clearly put in a context which         condemns these organizations or their violent activities.”India and the United States topped the         list of governments that&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://blogs.wsj.com/indiarealtime/2016/04/29/facebook-receives-highest-ever-number-of-requests-for-indian-user-data/"&gt;request&lt;/a&gt;Facebook for details of         accounts in the second half of 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has more         than 340 million mobile Internet users and has the second         largest number of Facebook users after the United States. The         company is seeking to expand its footprint here by introducing a&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="https://www.washingtonpost.com/world/indian-telecom-regulator-bans-facebooks-free-internet-for-the-poor/2016/02/08/561fc6a7-e87d-429d-ab62-7cdec43f60ae_story.html"&gt;pared&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;down version called         “Free Basics.” But earlier this year, New Delhi shot it down,         saying service providers cannot charge discriminatory prices for         Internet users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A journalist in         Kashmir said that many who shared stories about a new band of         militants and videos of police brutality have been blocked. “It         looks more like Facebook censorship rather than something         initiated by the government. Maybe they are trying to please the         government proactively,” said Sunil Abraham, executive director         of Center for Internet and Society. “Nevertheless it will have a         chilling effect. You will think twice before exercising free         speech on Facebook now.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ather Zia, a         political commentator from Kashmir who teaches anthropology at         the University of Northern Colorado, said after her account was         disabled on Tuesday: "It is safe to assume creating awareness         for Kashmir using social media or writing about the ground         reality is under severe threat." Meanwhile, users struggled to         restore their accounts on Wednesday as they uploaded new         documents requested by the company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I use my         Facebook account not as a personal page to tell people about my         last haircut or last holiday. I use it for work, I share media         stories about whatever bothers me in the universe,” said Sanjay         Kak, a documentary film maker whose account was disabled         Tuesday. “Nothing I shared can be considered inflammatory or         incendiary.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/washington-post-july-27-2016-rama-lakshmi-facebook-is-censoring-some-posts-on-indian-kashmir'&gt;https://cis-india.org/internet-governance/news/washington-post-july-27-2016-rama-lakshmi-facebook-is-censoring-some-posts-on-indian-kashmir&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-28T03:03:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-request-9-exactly-how-involved-is-icann-in-the-netmundial-initiative">
    <title>DIDP Request #9 - Exactly how involved is ICANN in the NETmundial Initiative?</title>
    <link>https://cis-india.org/internet-governance/blog/didp-request-9-exactly-how-involved-is-icann-in-the-netmundial-initiative</link>
    <description>
        &lt;b&gt;The importance and relevance of knowing ICANN’s involvement in the NETmundial Initiative cannot be overstated.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It was reported recently that ICANN contributed US$200,000 to the Initiative.&lt;a href="#ftn1"&gt;[1] &lt;/a&gt;Following this report, we requested the details of all expenses incurred by ICANN for NMI till date. This includes formal contributions to NMI as well as costs incurred towards travel and accommodation of ICANN board and staff to meetings relevant to the NMI discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from these financial details, we also requested information regarding the number of staff working on NMI from ICANN and the hours clocked by them for the same. We further specified that we would like this information to gauge ICANN’s involvement beyond its technical mandate. &lt;span id="docs-internal-guid-fb3cc834-2cf9-6ca2-744a-a463d372cec8"&gt;The request filed by &lt;/span&gt;&lt;span&gt;Geetha Hariharan&lt;/span&gt;&lt;span&gt; can be found &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/cis-request-13jan15-en.pdf"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;What ICANN said&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In its response, ICANN separated the questions in the request into two categories: a) Expenses incurred by ICANN towards the NETmundial Initiative and b) Other resources (personnel and hours) allocated to the Initiative by ICANN. The first category in the request includes: formal contribution to the NETmundial Initiative; travel costs of ICANN board and staff; and costs of maintenance of other sponsored parties. The second includes the number of staff involved in the NETmundial Initiative from ICANN and the number of hours spent working on it.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;To answer both, the response directs us to the Memorandum of Collaboration (MOC)&lt;a href="#ftn2"&gt;[2]&lt;/a&gt;&lt;span id="docs-internal-guid-fb3cc834-2cff-6122-a30e-e27cf1377dd2"&gt;signed by the Brazilian Internet Steering Committee (&lt;/span&gt;&lt;a href="http://cgi.br"&gt;&lt;span&gt;CGI.br&lt;/span&gt;&lt;/a&gt;&lt;span&gt;), ICANN and the World Economic Forum (WEF) to set up the NETmundial Initiative according to the outcome document from the initial NETmundial meeting in Sao Paulo, Brazil. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Some of the important takeaways from the MOC that are relevant to our request are the following:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;Each party to the MOC agrees to pay $201,667 towards operational expenses on signature of the agreement.&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;Total anticipated cost of the NETmundial Initiative is $605,000 (also mentioned in the response).&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;Each party will assign 1 staff member to the NETmundial Initiative secretariat during the inaugural period to smoothen the process. This staff member will commit at least 50% of their time towards Secretariat work.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;This information is important but it does not provide a comprehensive answer to our query. It does not, for example, answer if ICANN contributed anything more than the $201,667 the MOC specifies. It also does not tell us if ICANN allotted any staff apart from the designated secretariat member to work on NETmundial Initiative.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Further, the response states that ICANN does not keep track of costs according to the number of hours or the topic but rather according to strategic objectives. Since ICANN is not required to create a document that does not already exist to answer a DIDP enquiry,&lt;a href="#ftn3"&gt;[3] &lt;/a&gt;we have no way of knowing the specific amount of  time or money spent on the NETmundial Initiative by ICANN. The response instead directs us to the financial presentation at ICANN50 where the costs of attending the NETmundial Meeting at Sao Paulo is detailed. While this is interesting (ICANN spent $1.5 million)&lt;a href="#ftn4"&gt;[4] &lt;/a&gt;&lt;/span&gt;&lt;/span&gt;it is not a satisfactory answer to our question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN justifies its lack of direct answers by expressing that not only is the request “overbroad", it is also “subject to the following DIDP Condition of Nondisclosure: Information requests: (i) which are not reasonable; (ii) which are excessive or overly burdensome; and (iii) complying with which is not feasible.”&lt;a href="#ftn5"&gt;[5] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="docs-internal-guid-fb3cc834-2d0e-b79e-fcb8-784e3a998046"&gt;ICANN's response to our DIDP request may be found &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/cis-response-12feb15-en.pdf"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn1"&gt;[1] &lt;/a&gt;&lt;span id="docs-internal-guid-fb3cc834-2d0d-0c56-8105-394e1c8d2cac"&gt;See McCarthy, &lt;/span&gt;&lt;span&gt;‘I’m Begging You To Join’ – ICANN’s NETmundial Initiative gets desperate&lt;/span&gt;&lt;span&gt;, THE REGISTER (12 December 2014), &lt;/span&gt;&lt;span&gt;http://www.theregister.co.uk/2014/12/12/im begging you to join netmundial initiative gets d esperate/&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn2"&gt;[2] &lt;/a&gt;See MOC: https://www.netmundial.org/sites/default/files/MOC-%20CGI.br,%20ICANN%20&amp;amp;%20WEF.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn3"&gt;[3] &lt;/a&gt;&lt;span id="docs-internal-guid-fb3cc834-2d0b-01ff-7d33-5afd3d4e7aec"&gt;See Disclosure Policy: https://www.icann.org/resources/pages/didp-2012-02-25-en&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn4"&gt;[4] &lt;/a&gt;See ICANN50 Finance Presentation (Pg 4): https://london50.icann.org/en/schedule/thu-finance/presentation-finance-26jun14-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn5"&gt;[5] &lt;/a&gt;See ICANN conditions for non-disclosure: https://www.icann.org/resources/pages/didp-2012-02-25-en&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-request-9-exactly-how-involved-is-icann-in-the-netmundial-initiative'&gt;https://cis-india.org/internet-governance/blog/didp-request-9-exactly-how-involved-is-icann-in-the-netmundial-initiative&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>asvatha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>DIDP</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-27T15:53:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-request-10-icann-does-not-know-how-much-each-rir-contributes-to-its-budget">
    <title>DIDP Request #10 - ICANN does not know how much each RIR contributes to its Budget</title>
    <link>https://cis-india.org/internet-governance/blog/didp-request-10-icann-does-not-know-how-much-each-rir-contributes-to-its-budget</link>
    <description>
        &lt;b&gt;In an effort to understand the relationship between the Regional Internet Registries (RIRs) and ICANN, we requested current and historical information on the contract fees paid by the five RIRs (AfriNIC, ARIN, APNIC, LACNIC and RIPE NCC) to ICANN annually.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We acknowledged that the independently audited financial reports on ICANN’s website list the total amount from all RIRs as a lump sum.&lt;a href="#ftn1"&gt;[1] &lt;/a&gt;However, we specifically sought a breakdown of these fees detailing contributions made by each RIR from 1999 to 2014. Not only will this information help understand the RIR-ICANN relationship, it will also be relevant to the IANA transition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The request filed by Protyush Choudhury can be found &lt;a class="external-link" href="https://www.icann.org/en/system/files/files/cis-request-06feb15-en.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What ICANN said&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to ICANN’s response to our request, the five RIRs (AfriNIC, ARIN, APNIC, LACNIC and RIPE NCC) make a voluntary annual contribution to ICANN’s budget through the Number Resource Organization (NRO). &lt;a href="#ftn2"&gt;[2] &lt;/a&gt; Since Financial Year 2000, this contribution has been made to ICANN as an aggregate amount without the kind of breakdown requested by us with the exception of FY03, FY04 and FY05. The breakdown of the contribution for those years is as below:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;FY03: APNIC - $129,400; ARIN - $159,345; RIPE - $206,255&lt;/li&gt;
&lt;li&gt;FY04: APNIC - $160,500; ARIN - $144,450; RIPE - $224,700; LACNIC - $5,350&lt;/li&gt;
&lt;li&gt;FY05: APNIC - $220,976; ARIN - $218,507; RIPE - $358,086; LACNIC - $25,431&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The response links back to the independent financial reports mentioned by us in the request. &lt;span id="docs-internal-guid-ca5a7bda-2a44-cdfd-627f-3534a44a9ae4"&gt;These reports can be found on the ICANN website &lt;/span&gt;&lt;a href="https://www.icann.org/resources/pages/governance/current-en"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;On closer examination of the audit reports of FY03, 04 and 05, it is clear that the information provided in their response is either incomplete or incorrect. According to KPMG’s audit report of FY03, the total contribution from Address Registries is US$535,000. The breakdown in the response adds up only to $494,600. The response does not account for the extra $40,400. If only APNIC, ARIN and RIPE contributed to ICANN in 2003, where did the other $40,400 come from? Moreover, why is it listed as an Address Registry Fee in the audit report if it was a voluntary contribution?&lt;/span&gt;&lt;a href="#ftn3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The “Address Registry Fees” in the audit reports for FY04 and FY05 match the amounts in the response: $535,000 and $823,00 respectively. &lt;span id="docs-internal-guid-ca5a7bda-2a48-4c9a-4b9e-1793f74078dd"&gt;ICANN's response to our DIDP request may be found &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/cis-response-08mar15-en.pdf"&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;For the reader’s reference, the audit reports for FY00 - FY14 are linked below:&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;span&gt;FY00: &lt;/span&gt;&lt;a href="https://www.icann.org/resources/unthemed-pages/financial-report-fye-2000-06-30-en"&gt;&lt;span&gt;https://www.icann.org/resources/unthemed-pages/financial-report-fye-2000-06-30-en &lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;FY01: &lt;/span&gt;&lt;a href="https://www.icann.org/resources/unthemed-pages/financial-report-fye-2001-06-30-en"&gt;&lt;span&gt;https://www.icann.org/resources/unthemed-pages/financial-report-fye-2001-06-30-en&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;FY02:&lt;/span&gt;&lt;a href="https://www.icann.org/resources/unthemed-pages/financial-report-fye-2002-06-30-en"&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;https://www.icann.org/resources/unthemed-pages/financial-report-fye-2002-06-30-en&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;FY03: &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/financial-report-fye-30jun03-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/financial-report-fye-30jun03-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;FY04: &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/financial-report-fye-30jun04-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/financial-report-fye-30jun04-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;FY05: &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/financial-report-fye-30jun05-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/financial-report-fye-30jun05-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;FY06: &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/financial-report-fye-30jun06-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/financial-report-fye-30jun06-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;FY07: &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/financial-report-fye-30jun07-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/financial-report-fye-30jun07-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;FY08: &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/financial-report-fye-30jun07-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/financial-report-fye-30jun08-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;FY09: &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/financial-report-fye-30jun09-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/financial-report-fye-30jun09-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;FY10:&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/financial-report-fye-30jun10-en.pdf"&gt;&lt;span&gt; https://www.icann.org/en/system/files/files/financial-report-fye-30jun10-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;FY11: &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/financial-report-fye-30jun11-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/financial-report-fye-30jun11-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;FY12: &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/financial-report-fye-30jun12-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/financial-report-fye-30jun12-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;FY13:&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/financial-report-fye-30jun13-en.pdf"&gt;&lt;span&gt; https://www.icann.org/en/system/files/files/financial-report-fye-30jun13-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; &lt;span&gt;FY14: &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/financial-report-fye-30jun14-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/financial-report-fye-30jun14-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn1"&gt;[1] &lt;/a&gt;&lt;span id="docs-internal-guid-ca5a7bda-2a4b-7429-43b1-6785f6f611ea"&gt;See audited financial reports: &lt;/span&gt;&lt;a href="https://www.icann.org/resources/pages/governance/current-en"&gt;&lt;span&gt;https://www.icann.org/resources/pages/governance/current-en&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn2"&gt;[2] &lt;/a&gt;&lt;span id="docs-internal-guid-ca5a7bda-2a4b-2ee6-07b6-012828ea134f"&gt;See letter from NRO to ICANN:&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/akplogan-to-twomey-23mar09-en.pdf"&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/akplogan-to-twomey-23mar09-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p dir="ltr" id="docs-internal-guid-ca5a7bda-2a4a-bcc8-755d-d325f935f7e4" style="text-align: justify; "&gt;&lt;a name="ftn3"&gt;[3]. &lt;/a&gt;&lt;span&gt;See report for FY03 (pg 4): &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/financial-report-fye-30jun03-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/financial-report-fye-30jun03-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-request-10-icann-does-not-know-how-much-each-rir-contributes-to-its-budget'&gt;https://cis-india.org/internet-governance/blog/didp-request-10-icann-does-not-know-how-much-each-rir-contributes-to-its-budget&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>asvatha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>DIDP</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-27T14:57:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/stand-up-for-digital-rights-1">
    <title>Stand up for Digital Rights</title>
    <link>https://cis-india.org/internet-governance/events/stand-up-for-digital-rights-1</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) invites you to a discussion on a set of Recommendations for Ethical Research, a report on human rights and private online intermediaries which describes key areas where such actors have responsibilities. The discussion is on coming Friday, July 29, 2016 at the Centre for Internet &amp; Society's Delhi office from 3.00 p.m. to 5.00 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The discussion intends to launch a report on human rights and private online intermediaries, which describes key areas where such actors have responsibilities and provides a detailed set of Recommendations for Ethical Tech. This work is the culmination of a year-long research project led by the Centre for Law and Democracy (CLD), in collaboration with the Arabic Network for Human Rights Information (ANHRI), the Centre for Internet and Society (CIS), Open Net Korea, the Center for Studies on Freedom of Expression and Access to Information at the University of Palermo (CELE) and researchers with the University of Ottawa and the Munk School of Global Affairs at the University of Toronto. The key themes for discussion would include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;General Human Rights Responsibilities and Private Online Intermediaries&lt;/li&gt;
&lt;li&gt;Expanding Access&lt;/li&gt;
&lt;li&gt;Net Neutrality&lt;/li&gt;
&lt;li&gt;Content Moderation&lt;/li&gt;
&lt;li&gt;Privacy&lt;/li&gt;
&lt;li&gt;Transparency and Informed Consent&lt;/li&gt;
&lt;li&gt;Responding to State Interferences&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We look forward to meeting you and making this a forum for knowledge exchange a success.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/stand-up-for-digital-rights-1'&gt;https://cis-india.org/internet-governance/events/stand-up-for-digital-rights-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-25T15:29:41Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-17-2016-one-pokemon-to-rule-them-all">
    <title>One Pokémon to Rule Them All</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-17-2016-one-pokemon-to-rule-them-all</link>
    <description>
        &lt;b&gt;America’s head start on the augmented reality game Pokémon Go shows that the interweb is not an egalitarian space.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/technology-others/one-pokemon-to-rule-them-all-2917316/"&gt;published in the Indian Express&lt;/a&gt; on July 17, 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I was busy, writing, when a Telegram message trickled in. It was a friend who asked me if I had looked at the new Pokémon Go game which has been getting more attention than national elections and global warfare in the USA lately. A location-based augmented reality game that involves the users moving around their physical environments “collecting” pokemon characters that appear hiding in different locations has a large part of the American population in a frenzy, leading to aching soles, traffic accidents, and involuntary bumping into things and people as the players move around, their eyes glued to their screens. The global release of the game is still in the pipeline, and so the rest of us will have to make do with the videos and screen grabs of the game.&lt;br /&gt;&lt;br /&gt;While a big Pikachu fan myself, I don’t see myself going crazy over this game as and when my geography allows me for it, but the friend who had written to me about it is perturbed. An avid gamer and a self-proclaimed Pokémon fan, he is devastated that the users in privileged geography are going to get a head start in the global leader boards that he can never catch up with. The interwebz is already abuzz with players sharing hacks, cracks, bugs, cheat codes, and tips to collect more Pokémon, discover hidden powers, and rise quickly in the ranks as they drive, walk, run and jog around their neighbourhoods, in the quest of catching those delightful monsters on their phones. While my friend is aware that this cloud-based game will have multiple servers for different geographies, and so there will be relative rankings and customised interfaces for each community of players, he was feeling cheated about living in India and not having access to the first release of the game that has all the attention on the social web right now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘It almost makes me want to leave India and move to the USA,’ he said in mock frustration. It made me think about the privilege of geography when it comes to the presumed flatness of the digital world. One of the imaginations of the peer-to-peer architectures of the internet is its promise of flatness. With a series of non-discriminatory principles like #NetNeutrality and #ZeroRating enshrined as the fundamental attributes of the digital internet, we are often led to believe that when we are online, we are equal. This idea is so prevalent that in most of our technology-based development practices and policies, we think of access as the “be all”, if not the “end all”, of our activities. The rhetoric promises that if we get everybody online, we will have an egalitarian society where everybody will have equal access to resources, and equity by participating in the decision-making processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite overwhelming evidence that the digital world is anecdotally and systemically a space of exclusion, contestation, and intimidation, we continue to propagate the idea that these are “human” problems. Humans, fragile, frail and foolish in their being, contaminate the digital space. Humans, mired in the analogue systems of hatred and abuse, appropriate technologies to perpetuate these older forms of discrimination. The technological structures are imagined as pure, sterile, and committed to constructing parameters of equality through their neutral promises of universal access and seamless connectivity. Technology is clean, the human being is impure. Technology is robust, the human frail. Technology is flat, human hierarchical. These narratives of a neutral and egalitarian technology consequently lead us to put more importance and faith in algorithmic decisions and data-driven governance and policing. We have come to believe that because technologies are neutral, they will do a better job of regulating us than we do ourselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pokémon Go, and its obvious geographical privilege reminds us that the digital is not flat. It is oriented towards a very obvious logic of geopolitical, economic, racial, and identity privileging that continues to promote some parts of the world as favoured standards of first access. The exclusive release of Pokémon Go reminds us that the digital is as subject to Euro-American centrism which treat these erstwhile imperial geographies as the beginning points of all digital activities, slowly expanding their fold to other regions through a trickle-down politics and economics. Whether you are waiting impatiently to join the global bandwagon of Pokémon collection, or are ready to shrug this off as another thing that people do on the web, this differential, preferential, and variable access of the internet is something we definitely want to consider as we continue to push for the digital as the solution to human problems.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-17-2016-one-pokemon-to-rule-them-all'&gt;https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-17-2016-one-pokemon-to-rule-them-all&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-25T01:16:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-3-2016-gay-pride-charade">
    <title>The Gay Pride Charade</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-3-2016-gay-pride-charade</link>
    <description>
        &lt;b&gt;For most of the milllenials, news is formed by trends, what goes viral, and often open to speculation, projection, manipulation and deceit.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/the-gay-pride-charade-2889743/"&gt;published in Indian Express&lt;/a&gt; on July 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The world of social media can be a minefield of misinformation, and it does get difficult to verify facts and ensure the veracity of the information that comes to us on the winged notifications of our apps. This becomes starkly clear in times of crises. Hence, when the historic and heinous shootout at a gay night club in Orlando, USA, shook the world with horror and grief a couple of weeks ago, when the first tweets appeared on my timeline, my initial reaction was denial. Instead of believing those first responders, I was already searching for more credible news lines that could confirm — or hopefully deny — the massacre. It took only a few minutes, though, to realise that #StandWithOrlando was a reality that we will have to accommodate in the story of continued violence and abuse of sexual minorities around the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, not all deception is bad. One of the most fantastic responses to the shoot-out was from a Quebec-based satirical website called JournalDemourreal.com that published a photoshopped image showing the Canadian PM Justin Trudeau kissing the leader of the Canadian opposition party Tom Mulcair, with a headline that the two, despite their differences, are “united against homophobia”. I know that I liked this fake story four times on different newsfeeds, half-believing, half-wishing that it was true, before I realised that it is a hoax. Morphed as it might be, the doctored image enabled people to talk about the tragedy as demanding a personal and a policy-level action, ranging from acceptance and freedom, to control of guns and protecting the rights of life and dignity for the sexual minorities who continue to remain persecuted in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The image also allowed many queer people in different parts of the  world — especially in the countries where homosexuality continues to be  criminalised and severely punished — to participate not only in the  global grief but also to demand that their governments take more  responsibility towards its queer population.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this photoshopped picture was making the rounds, another  tweet showed up on my timeline. This time it was a tweet from our  media-savvy PM, &lt;a href="http://indianexpress.com/profile/politician/narendra-modi/"&gt;Narendra Modi&lt;/a&gt;,  who claimed that he was “shocked at the shootout in Orlando.”And  further added that his “thoughts and prayers are with the bereaved  families and the injured”. When I saw this tweet, my reaction again, was  that this must be another joke. Because even as queer rights activists  in the country struggle to fight for the decriminalisation of  homosexuality, through their curative petitions in the Supreme Court in  India, PM Modi’s government has continued its hateful diatribe against  queer people in the country. His party has called homosexuality  “anti-Indian” and “anti-family”. The party’s favourite, Baba Ramdev,  continues his hate speech, offering to cure homosexuality through yoga.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ever since the current government took power, documented hate crimes against queer people have more than doubled in the country. So when the PM decided to offer his condolences to those in Orlando, I figured that either it was a fake Twitter account masquerading as the PM or it was some kind of a hacker troll — maybe Anonymous, the online guerrilla activists, who recently took over ISIS- friendly websites and filled them up with information about male homosexuality as a response to the shoot-out — had taken control of the Twitter account. But it turned out that this piece of information was not photoshopped or hacked. It was actually true, and we were to believe in earnest that while the government doesn’t care about the millions of queer people being denied their rights to live and love in their country, it is heartbroken about what happened in the USA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It does make you wonder about the world we live in, where a photoshopped image sounded more plausible than an undoctored tweet. It emphasises why Orlando cannot be treated as one isolated instance in another country, but that #WeAreOrlando. For right now, Orlando is also in India. It is a reminder that while we have been fortunate not to have such an instance of dramatic violence, there are millions of people in the country who are forced to live and die in deception for their sexual orientation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-3-2016-gay-pride-charade'&gt;https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-3-2016-gay-pride-charade&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-25T01:10:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-today-july-13-2016-bisakha-datta-belling-the-trolls">
    <title>Belling the trolls</title>
    <link>https://cis-india.org/internet-governance/news/india-today-july-13-2016-bisakha-datta-belling-the-trolls</link>
    <description>
        &lt;b&gt;Online abuse - specially against women - is like one of those rapidly-mutating viruses that resists all antibodies.&lt;/b&gt;
        &lt;p&gt;The article by Bishakha Datta was &lt;a class="external-link" href="http://indiatoday.intoday.in/story/social-media-trolls-rape-threats-online/1/714343.html"&gt;published in India Today&lt;/a&gt; on July 13, 2016. Rohini Lakshane was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;We have always known that the proof of the pudding lies in the eating. And the pleasure with which it is savoured. This month, we saw its online avatar. Barely had Maneka Gandhi launched the Twitter hashtag #IAmTrolledHelp than the trolls were all over it. Trolling with all their might. Abusing both Gandhi and textile minister Smriti Irani, thereby proving her point: that something needs to be done about the unending stream of online abuse that women face every day.&lt;/p&gt;
&lt;p&gt;Online abuse - specially against women - is like one of those rapidly-mutating viruses that resists all antibodies. It's everywhere, in many different forms. I'm not talking about the everyday sexism that's our daily bread. That we deal with. I'm not talking about androcentrism, or the assumption that men, and male experience, are at the centre of the universe. That we live with, constantly rolling our eyes in our heads.&lt;/p&gt;
&lt;p&gt;I'm talking rape threats. Gang rape threats. Graphic gang rape threats with vivid descriptions of postures. Death threats. Those, in my view, are not free speech. They are a call to arms, incitement to violence. Especially when it's an invisible cyber-army behind the threats, backing each other up, preying on a woman. Wilding. Trying to break her. Trying to humiliate her. Trying to get her to shut up, out of the misplaced notion that only men have the right to air their thoughts and opinions online. In a public space.&lt;/p&gt;
&lt;p&gt;In one of her essays, Egyptian writer Fatima Mernissi introduces the concept of 'trespassing in the nude' to explain how men in Morocco think of public spaces-as a men-only zone. Social norms dictate that Moroccan women not seek to be part of public space; women who break that rule are seen to be trespassing. But women who dare to step into public spaces without their veils-that's even worse. That's trespassing in the nude. And trespassing, of course, demands punishment.&lt;/p&gt;
&lt;p&gt;On the internet, women who speak out are seen as trespassers. And women who speak about things men consider their preserve are seen to doubly trespass. Or trespass in the nude. As British writer Laurie Penny famously said, "A woman's opinion is the short skirt of the internet." It is an excuse to harass.&lt;/p&gt;
&lt;p&gt;The women on Morocco's streets were punished by stoning, as are the women who loiter on the streets of the internet. Online abuse is as good as stoning someone who has an opinion with words. When journalist Swati Chaturvedi got massively harassed last year, she wrote about her experience: "Journalists, specially women, are hunted for sport, abused, slandered and hounded by trolls who hunt in hyena-like packs. The problem is that you have an opinion and are behaving like a journalist, not a cheerleader."&lt;/p&gt;
&lt;p&gt;Little wonder than that Chaturvedi, like many other women online, have welcomed Gandhi's initiative to curb online abuse. As do I. I'm writing this in the middle of conducting a digital security workshop. At lunch, one of the participants described how she can't bear to be on her company's social media feed for more than an hour each morning. It's just an endless stream of filth. And something needs to be done about this filth if we want a #SwachhBharat.&lt;/p&gt;
&lt;p&gt;Many women have tried ignoring online abuse. It continues. Others have tried fighting back. It continues. Some have tried humour, including the Peng Collective's brilliant Zero Trollerance campaign. The trolls march on, undeterred, like Tolkien's orcs. Of course, it's important to distinguish between trolling and abuse, but sometimes when you're facing the shitstream, there's just so much semantic jugglery you can take. No matter what you call it, you just want it off.&lt;/p&gt;
&lt;p&gt;And that's where Gandhi's initiative makes sense, as one more pathway to a #SwachhBharat, since we now live both on and offline. But one that'll work only if she can take on her party's trolls. Who are now trolling her too. Yes, cybercells and cops do exist, but that route doesn't always work. Social media platforms make promises to their users, but they are rarely kept. "Not a single tweet that I've ever reported has been taken down," says Rohini Lakshane of the Centre for Internet and Society, who's helping us with our digital security workshop.&lt;/p&gt;
&lt;p&gt;This is not only about safety. It's about digital citizenship. Women are neither interlopers nor outsiders online. We belong there just as we belong here. We intend to loiter online full-throated. We're not content with a purely offline #SwachhBharat that cleans rivers and ponds. We want online #SwachhStreams too.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-today-july-13-2016-bisakha-datta-belling-the-trolls'&gt;https://cis-india.org/internet-governance/news/india-today-july-13-2016-bisakha-datta-belling-the-trolls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-24T16:44:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/perumal-murugan-and-the-law-on-obscenity">
    <title>Perumal Murugan and the Law on Obscenity </title>
    <link>https://cis-india.org/internet-governance/perumal-murugan-and-the-law-on-obscenity</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;On July 5, 2016, the Madras High Court saved Perumal Murugan’s novel, &lt;i&gt;Mathorubhagan&lt;/i&gt; from oblivion when it dismissed the claims against Murugan on the grounds of obscenity, spreading disharmony between communities, blasphemy, and defamation and upheld his freedom of expression in &lt;i&gt;S. Tamilselvan &amp;amp; Perumal Murugan versus Government of Tamil Nadu&lt;/i&gt;. This judgment has received wide appreciation for its support for freedom of expression. What made it applause-worthy? Do we have reservations with the view of the High Court?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Murugan’s book is about a married couple, Kali and Ponna, who fail to have a child despite decades of their marriage. They succumb to social and familial pressures to allow Ponna (the wife) to participate in a sexual orgy (unrestrained sexual encounter involving many people) at a religious festival (the Vaikasi Car Festival) that takes place in Arthanareeswarar Temple, for begetting a child. The local community claimed that in the book, Murugan denigrated the Arthanareeswarar Temple, the deity, Lord Arthanareeswarar, festivities relating to Vaikasi Car Festival and the women of the Kongu Vellala Gounder community. Some sections of the community believed that the facts in the story were not true and found that the sexual mores associated with the community in the book were offensive.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Court was required to evaluate, whether the novel was obscene (&lt;/span&gt;&lt;i&gt;Section 292 of Indian Penal Code, 1860 (IPC)&lt;/i&gt;&lt;span&gt;), offensive to the community (&lt;/span&gt;&lt;i&gt;Section 153A of IPC&lt;/i&gt;&lt;span&gt;) and the religion (&lt;/span&gt;&lt;i&gt;Section 295 of IPC&lt;/i&gt;&lt;span&gt;); and whether the State had the responsibility to protect the writer from mob violence on account of his controversial book. The Court held that the book was neither offensive nor did it hurt community or religious sentiments. The Court also held that the State had a positive obligation to protect Murugan against the mob. It would be useful to look at the analysis of the Court in drawing these conclusions and see if we completely agree with it.&lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The Court relied on the standard for determining obscenity in &lt;a href="https://indiankanoon.org/doc/195958005/"&gt;&lt;i&gt;Aveek Sarkar v. State of West Bengal&lt;/i&gt;&lt;/a&gt; wherein, it was held that what is lascivious/appealing to the prurient interest/depraved or corrupt has to be tested using the contemporary ‘community standards. The Court was of the view that the novel was not offensive by the current mores (&lt;i&gt;para 150 and 151&lt;/i&gt;). &lt;span&gt;The Court further relied on &lt;/span&gt;&lt;a href="https://indiankanoon.org/doc/1191397/"&gt;&lt;i&gt;MF Hussain v. Rajkumar Pandey&lt;/i&gt;&lt;/a&gt;&lt;span&gt;, (&lt;/span&gt;&lt;i&gt;also decided by Justice Sanjay Kishan Kaul&lt;/i&gt;&lt;span&gt;) wherein it was held, that while evaluating obscenity in a work, “&lt;/span&gt;&lt;i&gt;the judge has to place himself in the position of the author in order to appreciate what the author really wishes to convey and thereafter, placing himself in the position of the reader in every age group in whose hand the book is likely to fall, arrive at a dispassionate conclusion&lt;/i&gt;&lt;span&gt;.”It is necessary to mention here that the community standards test has been criticised by scholars, worldwide, as it is difficult to divorce subjective morality of an individual and ascertain what those standards are. This indeterminacy interferes with the ability of judges to apply these standards. There is established scholarship that says that judges cannot divorce themselves from their subjectivities while evaluating obscenity in work of art or literature and may often reinforce the moral norms of the majority in the society thus crushing the moral standards of the minority. In India, we have a mixed bag of judgments that address the issue of obscenity. Seeing the difficulty in application of the community standards test, it is noteworthy that the ultimate fate of a book, painting or a film is dependent on the morality of an individual judge. In fact, the Court had asked a pertinent question in the judgment, “&lt;/span&gt;&lt;i&gt;Would it be desirable for the Courts to intervene or should it be left to the readers to learn for themselves what they think and feel of the issue in question?&lt;/i&gt;&lt;span&gt;” (&lt;/span&gt;&lt;i&gt;para 136&lt;/i&gt;&lt;span&gt;) However, it eventually reinforced these standards by applying the existing precedents on obscenity. &lt;/span&gt;&lt;span&gt;The Court added thatunder Section 292, it was required to first prove whether the novel was obscene at all and only if it was found to be obscene it should be tested within the parameters of exceptionsit would fall under. The Court found that the novel was not obscene. There was no need to evaluate its social character to save it from a ban. While drawing this conclusion, the Court stated that, “&lt;/span&gt;&lt;i&gt;sex, per se, was not treated as undesirable, but was an integral part right from the existence of civilization&lt;/i&gt;&lt;span&gt;” (&lt;/span&gt;&lt;i&gt;para 149&lt;/i&gt;&lt;span&gt;) and that “&lt;/span&gt;&lt;i&gt;in our society, we seem to be more bogged down by conservative Victorian philosophy rather than draw inspiration from our own literature and scriptures.&lt;/i&gt;&lt;span&gt;”The Court also said, “&lt;/span&gt;&lt;i&gt;there are different kinds of books available on the shelves of book stores to be read by different age groups from different strata. If you do not like a book, simply close it.&lt;/i&gt;&lt;span&gt;”&lt;/span&gt;&lt;i&gt;(para 148&lt;/i&gt;&lt;span&gt;) While this reflects a progressive view of the judges on sexual morality, we have reservations on court’s reliance on ancient literature to justify why sex and its depiction in art or literature is not obscene.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;We appreciate the observations that the Court has made while determining whether the novel hurt community or religious sentiments. The Court has acknowledged the declining tolerance level of the society (&lt;/span&gt;&lt;i&gt;para 154&lt;/i&gt;&lt;span&gt;) and stated that “&lt;/span&gt;&lt;i&gt;any contra view or social thinking is met at times with threats or violent behaviour&lt;/i&gt;&lt;span&gt;” (&lt;/span&gt;&lt;i&gt;para 142&lt;/i&gt;&lt;span&gt;).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;The Court addressed the issue of harassment of writers and artists at the hands of a mob and held that there should “&lt;i&gt;be a presumption in favour of free speech and expression as envisaged under Article 19(1)(a) of the Constitution of India&lt;/i&gt;” and emphasized the need for the State to protect those who suffer from hostility of several sections of a society as a consequence of holding a different view (&lt;i&gt;para 175&lt;/i&gt;).Citing &lt;i&gt;MF Hussain v. Rajkumar Pandey&lt;/i&gt;, the Court said “&lt;i&gt;freedom of speech has no meaning if there is no freedom after speech.&lt;/i&gt;”The Court has identified the problematic sphere of mob violence and how it affects freedom of expression. However, we do not agree with what the Court held subsequently. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;Reproducing an extract of the judgment here, &lt;/span&gt;&lt;span style="text-align: justify; "&gt;“&lt;/span&gt;&lt;i style="text-align: justify; "&gt;There is bound to be a presumption in favour of free speech and expression as envisaged under Article 19(1)(a) of the Constitution of India unless a court of law finds it otherwise as falling within the domain of a reasonable restriction under Article 19(2) of the Constitution of India.” &lt;/i&gt;&lt;span style="text-align: justify; "&gt;(&lt;/span&gt;&lt;i style="text-align: justify; "&gt;para 184&lt;/i&gt;&lt;span style="text-align: justify; "&gt;) &lt;/span&gt;&lt;span style="text-align: justify; "&gt;The words, “&lt;/span&gt;&lt;i style="text-align: justify; "&gt;unless a court of law finds it otherwise as falling within the domain of a reasonable restriction under Article 19(2) of the Constitution of India.&lt;/i&gt;&lt;span style="text-align: justify; "&gt;” indicate that the judiciary has the power to determine whether a certain type of speech could be restricted under Article 19 (2) of the Constitution of India. This understanding is incorrect. &lt;/span&gt;&lt;span style="text-align: justify; "&gt;The language of Article 19 (2) makes it clear that speech could only be restricted by ‘law’ and judiciary cannot assume the authority to restrict speech. It has the authority to decide the applicability and the constitutionality of the law that restricts speech. The relevant part of Article 19 (2) is reproduced below for reference. &lt;/span&gt;&lt;i style="text-align: justify; "&gt;“&lt;/i&gt;&lt;i style="text-align: justify; "&gt;(2) Nothing in sub clause (a) of clause ( 1 ) shall affect the operation of any existing law, or prevent the State from making any law, in so far as such law imposes reasonable restrictions on the exercise of the right….&lt;/i&gt;&lt;span style="text-align: justify; "&gt;” &lt;/span&gt;&lt;span style="text-align: justify; "&gt;The Court further acknowledged that &lt;/span&gt;&lt;i style="text-align: justify; "&gt;“the State and the police authorities would not be the best ones to judge such literary and cultural issues, which are best left to the wisdom of the specialists in the field and thereafter, if need be, the Courts”&lt;/i&gt;&lt;span style="text-align: justify; "&gt; (&lt;/span&gt;&lt;i style="text-align: justify; "&gt;para 181&lt;/i&gt;&lt;span style="text-align: justify; "&gt;). The Court thus issued directions to the Government &lt;/span&gt;&lt;i style="text-align: justify; "&gt;to constitute an expert body to deal with situations arising from such conflicts of views so that an independent opinion is forthcoming, keeping in mind the law evolved by the judiciary&lt;/i&gt;&lt;span style="text-align: justify; "&gt;(&lt;/span&gt;&lt;i style="text-align: justify; "&gt;para 181&lt;/i&gt;&lt;span style="text-align: justify; "&gt;)&lt;/span&gt;&lt;i style="text-align: justify; "&gt;. &lt;/i&gt;&lt;span style="text-align: justify; "&gt;There are concerns with this mandate of the Court; firstly, constituting an expert body to resolve conflict of views will not serve any purpose unless there are guidelines to evaluate work. It is difficult to dissociate subjectivity and ascertain objective standards for evaluating offensiveness of literary or artistic work. Secondly, reliance on expert opinion and then courts completely disregards existing law. Under Section 95 of the Code of Criminal Procedure,1973, the Government has the power to declare forfeiture of works which, it considers in violation of section 153A or section 153B or section 292 or section 293 or section 295A of the Indian Penal Code, 1860. The power to evaluate a piece of writing or other work has already been given to the government. The Court has created a parallel mechanism for evaluation by giving directions to constitute an expert panel. In the event this mechanism fails to resolve the conflict, it is suggested that courts would then be approached to address the matter. This is in complete disregard of the powers of the Government under Section 95.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In the Murugan judgment, the Court has attempted to provide a narrow interpretation of what is considered obscene, emphasized the need for the society to be more tolerant and for State to protect those members of the society who, on account of their views, suffer at the hands of an intolerant society. It is for these reasons, the judgment is, undoubtedly a sound precedent for protection of speech in India. However, it is concerning to see that in drawing these conclusions, the Court has reinforced vague legal standards of obscenity and in that regard, it remains yet another addition to the mixed bag of judgments.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/perumal-murugan-and-the-law-on-obscenity'&gt;https://cis-india.org/internet-governance/perumal-murugan-and-the-law-on-obscenity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Japreet Grewal</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Hate Speech</dc:subject>
    
    
        <dc:subject>Article 19(1)(a)</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-08-09T13:01:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
