<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1166 to 1180.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/meeting-on-net-neutrality-and-related-issues"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/factordaily-pranesh-prakash-and-japreet-grewal-july-13-2016-no-india-did-not-oppose-un-move-to-make-internet-access-a-human-right"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-v-prem-shanker-july-13-2016-tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-telegraph-july-10-2016-place-for-a-safety-net"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ciol-july-7-2016-india-may-not-be-guilty-of-opposing-un-move-to-save-internet-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-week-anuj-srinivas-july-6-2016-india-no-haven-for-net-freedom-but-did-not-oppose-un-move-on-internet-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-now-july-8-2016-flashpoint-troll-control-maneka-versus-ncw"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/catch-news-asad-ali-july-3-2016-fb-and-google-have-already-monopolised-indian-cyberspace"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-s-poorvaja-july-4-2016-cyberstalkers-the-new-bullies-in-town"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-prabhu-mallikarjunan-june-13-2016-why-geospatial-bill-is-draconian-and-how-it-will-hurt-startups"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-today-june-16-2016-here-is-the-entire-list-of-escorts-service-websites-that-govt-has-banned"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-moulishree-srivastava-june-14-2016-isps-start-blocking-escort-websites-following-govt-order"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/meeting-on-net-neutrality-and-related-issues">
    <title>Meeting on Net Neutrality and Related Issues </title>
    <link>https://cis-india.org/internet-governance/news/meeting-on-net-neutrality-and-related-issues</link>
    <description>
        &lt;b&gt;A meeting was convened by the Telecom Regulatory Authority of India on July 15, 2016 in New Delhi to discuss Net Neutrality and related issues. Sunil Abraham attended this meeting. &lt;/b&gt;
        &lt;p&gt;Click to &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/trai-invitation-letter-to-discuss-net-neturality"&gt;view the Invitation Letter&lt;/a&gt; sent by the Telecom Regulatory Authority of India.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/meeting-on-net-neutrality-and-related-issues'&gt;https://cis-india.org/internet-governance/news/meeting-on-net-neutrality-and-related-issues&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-08-02T15:56:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle">
    <title>New Approaches to Information Privacy – Revisiting the Purpose Limitation Principle</title>
    <link>https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle</link>
    <description>
        &lt;b&gt;Article on Aadhaar throwing light on privacy and data protection.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This was &lt;a class="external-link" href="http://www.digitalpolicy.org/revisiting-the-principles-of-purpose-limitation-under-existing-data-protection-norms/"&gt;published in Digital Policy Portal&lt;/a&gt; on July 13, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Last year, Mukul Rohatgi, the Attorney General of India, called into question existing jurisprudence of the last 50 years on the constitutional validity of the right to privacy.&lt;sup&gt;1&lt;/sup&gt; Mohatgi was rebutting the arguments on privacy made against Aadhaar, the unique identity project initiated and implemented in the country without any legislative mandate.&lt;sup&gt;2&lt;/sup&gt; The question of the right to privacy becomes all the more relevant in the context of events over the last few years—among them, the significant rise in data collection by the state through various e-governance schemes,&lt;sup&gt;3&lt;/sup&gt; systematic access to personal data by various wings of the state through a host of surveillance and law enforcement initiatives launched in the last decade,&lt;sup&gt;4&lt;/sup&gt; the multifold increase in the number of Indians online, and the ubiquitous collection of personal data by private parties.&lt;sup&gt;5&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;These developments have led to a call for a comprehensive privacy legislation in India and the adoption of the National Privacy Principles as laid down by the Expert Committee led by Justice AP Shah.&lt;sup&gt;6&lt;/sup&gt; There are privacy-protection legislation currently in place such as the Information Technology Act, 2000 (IT Act), which was enacted to govern digital content and communication and provide legal recognition to electronic transactions. This legislation has provisions that can safeguard—and dilute—online privacy. At the heart of the data protection provisions in the IT Act lies section 43A and the rules framed under it, i.e., Reasonable security practices and procedures and sensitive personal data information.&lt;sup&gt;7&lt;/sup&gt;Section 43A mandates that body corporates who receive, possess, store, deal, or handle any personal data to implement and maintain ‘reasonable security practices’, failing which, they are held liable to compensate those affected. Rules drafted under this provision also mandated a number of data protection obligations on corporations such the need to seek consent before collection, specifying the purposes of data collection, and restricting the use of data to such purposes only. There have been questions raised about the validity of the Section 43A Rules as they seek to do much more than mandate in the parent provisions, Section 43A— requiring entities to maintain reasonable security practices.&lt;/p&gt;
&lt;h3&gt;Privacy as control?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Even setting aside the issue of legal validity, the kind of data protection framework envisioned by Section 43A rules is proving to be outdated in the context of how data is now being collected and processed. The focus of Section 43 A Rules—as well as that of draft privacy legislations in India&lt;sup&gt;8&lt;/sup&gt;—is based on the idea of individual control. Most apt is Alan Westin’s definition of privacy: “the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to other.”&lt;sup&gt;9&lt;/sup&gt; Westin and his followers rely on the normative idea of “informational self- determination”, the notion of a pure, disembodied, and atomistic self, capable of making rational and isolated choices in order to assert complete control over personal information. More and more this has proved to be a fiction especially in a networked society.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Much before the need for governance of information technologies had reached a critical mass in India, Western countries were already dealing with the implications of the use of these technologies on personal data. In 1973, the US Department of Health, Education and Welfare appointed a committee to address this issue, leading to a report called ‘Records, Computers and Rights of Citizens.’&lt;sup&gt;10&lt;/sup&gt; The Committee’s mandate was to “explore the impact of computers on record keeping about individuals and, in addition, to inquire into, and make recommendations regarding, the use of the Social Security number.” The Report articulated five principles which were to be the basis of fair information practices: transparency; use limitation; access and correction; data quality; and security. Building upon these principles, the Committee of Ministers of the Organization for Economic Cooperation and Development (OECD) arrived at the Guidelines on the Protection of Privacy and Transborder Flows of Personal Data in 1980.&lt;sup&gt;11&lt;/sup&gt; These principles— Collection Limitation, Data Quality, Purpose Specification, Use Limitation, Security Safeguards, Openness, Individual Participation and Accountability—are what inform most data protection regulations today including the APEC Framework, the EU Data Protection Directive, and the Section 43A Rules and Justice AP Shah Principles in India.&lt;/p&gt;
&lt;p&gt;Fred Cate describes the import of these privacy regimes as such:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“All of these data protection instruments reflect the same approach: tell individuals what data you wish to collect or use, give them a choice, grant them access, secure those data with appropriate technologies and procedures, and be subject to third-party enforcement if you fail to comply with these requirements or individuals’ expressed preferences”&lt;sup&gt;12&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is in line with Alan Westin’s idea of privacy exercised through individual control. Therefore the focus of these principles is on empowering the individuals to exercise choice, but not on protecting individuals from harmful or unnecessary practices of data collection and processing. The author of this article has earlier written&lt;sup&gt;13&lt;/sup&gt; about the sheer inefficacy of this framework which places the responsibility on individuals. Other scholars like Daniel Solove,&lt;sup&gt;14&lt;/sup&gt; Jonathan Obar&lt;sup&gt;15&lt;/sup&gt; and Fred Cate&lt;sup&gt;16&lt;/sup&gt; have also written about the failure of traditional data protection practices of notice and consent. While these essays dealt with the privacy principles of choice and informed consent, this paper will focus on the principles of purpose limitation.&lt;/p&gt;
&lt;h3&gt;Purpose Limitation and Impact of Big Data&lt;/h3&gt;
&lt;p&gt;The principles of purpose limitation or purpose specification seeks to ensure the following four objectives:&lt;/p&gt;
&lt;ol style="list-style-type: lower-alpha;"&gt;
&lt;li&gt;Personal information collected and processed should be adequate and relevant to the purposes for which they are processed.&lt;/li&gt;
&lt;li&gt;The entities collect, process, disclose, make available, or otherwise use personal information only for the stated purposes.&lt;/li&gt;
&lt;li&gt;In case of change in purpose, the data’s subject needs to be informed and their consent has to be obtained.&lt;/li&gt;
&lt;li&gt;After personal information has been used in accordance with the identified purpose, it has to be destroyed as per the identified procedures.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;The purpose limitation along with the data minimisation principle—which requires that no more data may be processed than is necessary for the stated purpose—aim to limit the use of data to what is agreed to by the data subject. These principles are in direct conflict with new technology which relies on ubiquitous collection and indiscriminate uses of data. The main import of Big Data technologies on the inherent value in data which can be harvested not by the primary purposes of data collection but through various secondary purposes which involve processing of the data repeatedly.&lt;sup&gt;17&lt;/sup&gt;Further, instead to destroying the data when its purpose has been achieved, the intent is to retain as much data as possible for secondary uses. Importantly, as these secondary uses are of an inherently unanticipated nature, it becomes impossible to account for it at the stage of collection and providing the choice to the data subject.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Followers of the discourse on Big Data would be well aware of its potential impacts on privacy. De-identification techniques to protect the identities of individuals in dataset face a threat from an increase in the amount of data available either publicly or otherwise to a party seeking to reverse-engineer an anonymised dataset to re-identify individuals. &lt;sup&gt;18&lt;/sup&gt; Further, Big Data analytics promise to find patterns and connections that can contribute to the knowledge available to the public to make decisions. What is also likely is that it will lead to revealing insights about people that they would have preferred to keep private.&lt;sup&gt;19&lt;/sup&gt;In turn, as people become more aware of being constantly profiled by their actions, they will self-regulate and ‘discipline’ their behaviour. This can lead to a chilling effect.&lt;sup&gt;20&lt;/sup&gt; Meanwhile, Big Data is also fuelling an industry that incentivises businesses to collect more data, as it has a high and growing monetary value. However, Big Data also promises a completely new kind of knowledge that can prove to be revolutionary in fields as diverse as medicine, disaster-management, governance, agriculture, transport, service delivery, and decision-making.&lt;sup&gt;21&lt;/sup&gt; As long as there is a sufficiently large and diverse amount of data, there could be invaluable insights locked in it, accessing which can provide solutions to a number of problems. In light of this, it is important to consider what kind of regulatory framework is most suitable which could facilitate some of the promised benefits of Big Data and at the same time mitigate its potential harm. This, coupled with the fact that the existing data protection principles have, by most accounts, run their course, makes the examination of alternative frameworks even more important. This article will examine some alternate proposals made to the existing framework of purpose limitation below.&lt;/p&gt;
&lt;h3&gt;Harms-based approach&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Some scholars like Fred Cate&lt;sup&gt;22&lt;/sup&gt; and Daniel Solove&lt;sup&gt;23&lt;/sup&gt; have argued that there is a need for the primary focus of data protection law to move from control at the stage of data collection to actual use cases. In his article on the failure of Fair Information Practice Principles,&lt;sup&gt;24&lt;/sup&gt;Cate puts forth a proposal for ‘Consumer Privacy Protection Principles.’ Cate envisions a more interventionist role of the data protection authorities by regulating information flows when required, in order to protect individuals from risky or harmful uses of information. Cate’s attempt is to extend the principles of consumer protection law of prevention and remedy of harms.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In a re-examination of the OECD Privacy Principles, Cate and Viktor Mayer Schöemberger attempt to discard the use of personal data to only purposes specified. They felt that restricting the use of personal to only specified purposes could significantly threaten various research and beneficial uses of Big Data. Instead of articulating a positive obligations of what personal data collected could be used for, they attempt to arrive at a negative obligation of use-cases prevented by law. Their working definition of the Use specification principle broaden the scope of use cases by only preventing use of data “if the use is fraudulent, unlawful, deceptive or discriminatory; society has deemed the use inappropriate through a standard of unfairness; the use is likely to cause unjustified harm to the individual; or the use is over the well-founded objection of the individual, unless necessary to serve an over-riding public interest, or unless required by law.”&lt;sup&gt;25&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While most standards in the above definition have established understanding in jurisprudence, the concept of unjustifiable harm is what we are interested in. Any theory of harms-based approach goes back to John Stuart Mill’s dictum that the only justifiable purpose to exert power over the will of an individual is to prevent harm to others. Therefore, any regulation that seeks to control or prevent autonomy of individuals (in this case, the ability of individuals to allow data collectors to use their personal data, and the ability of data collectors to do so, without any limitation) must clearly demonstrate the harm to the individuals in question.&lt;/p&gt;
&lt;p&gt;Fred Cate articulates the following steps to identify tangible harm and respond to its presence:&lt;sup&gt;26&lt;/sup&gt;&lt;/p&gt;
&lt;ol style="list-style-type: lower-alpha;"&gt;
&lt;li&gt;Focus on Use — Actual use of the data should be considered, not mere possession. The assumption is that the collection, possession, or transfer of information do not significantly harm people, rather it is the use of information following such collection, possession, or transfer.&lt;/li&gt;
&lt;li&gt;Proportionality — Any regulatory measure must be proportional to the likelihood and severity of the harm identified.&lt;/li&gt;
&lt;li&gt;Per se Harmful Uses — Uses which are always harmful must be prohibited by law&lt;/li&gt;
&lt;li&gt;Per se not Harmful Uses — If uses can be considered inherently not harmful, they should not be regulated.&lt;/li&gt;
&lt;li&gt;Sensitive Uses — In case where the uses are not per se harmful or not harmful, individual consent must be sought for using that data for those purposes.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;The proposal by Cate argues for what is called a ‘use based system’, which is extremely popular with American scholars. Under this system, data collection itself is not subject to restrictions; rather, only the use of data is regulated. This argument has great appeal for both businesses who can reduce their overheads significantly if consent obligations are done away with as long as they use the data in ways which are not harmful, as well as critics of the current data protection framework which relies on informed consent. Lokke Moerel explains the philosophy of ‘harms based approach’ or ‘use based system’ in United States by juxtaposing it against the ‘rights based approach’ in Europe.&lt;sup&gt;27&lt;/sup&gt; In Europe, rights of individuals with regard to processing of their personal data is a fundamental human right and therefore, a precautionary principle is followed with much greater top-down control upon data collection. However, in the United States, there is a far greater reliance on market mechanisms and self-regulating organisations to check inappropriate processing activities, and government intervention is limited to cases where a clear harm is demonstrable.&lt;sup&gt;28&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Continuing research by the Centre for Information Policy Leadership under its Privacy Risk Framework Project looks at a system of articulating what harms and risks arising from use of collected data. They have arrived a matrix of threats and harms. Threats are categorised as —a) inappropriate use of personal information and b) personal information in the wrong hands. More importantly for our purposes, harms are divided into: a) tangible harms which are physical or economic in nature (bodily harm, loss of liberty, damage to earning power and economic interests); b) intangible harms which can be demonstrated (chilling effects, reputational harm, detriment from surveillance, discrimination and intrusion into private life); and c) societal harm (damage to democratic institutions and loss of social trust).&lt;sup&gt;29&lt;/sup&gt;For any harms-based system, a matrix like above needs to emerge clearly so that regulation can focus on mitigating practices leading to the harms.&lt;/p&gt;
&lt;h3&gt;Legitimate interests&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Lokke Moerel and Corien Prins, in their article “Privacy for Homo Digitalis – Proposal for a new regulatory framework for data protection in the light of Big Data and Internet of Things”&lt;sup&gt;30&lt;/sup&gt; use the ideal of responsive regulation which considers empirically observable practices and institutions while determining the regulation and enforcement required. They state that current data protection frameworks—which rely on mandating some principles of how data has to be processed—is exercised through merely procedural notification and consent requirements. Further, Moerel and Prins feel that data protection law cannot only involve a consideration of individual interest but also needs to take into account collective interest. Therefore, the test must be a broader assessment than merely the purpose limitation articulating the interests of the parties directly involved, but whether a legitimate interest is achieved.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Legitimate interest has been put forth as an alternative to the purpose limitation. Legitimate is not a new concept and has been a part of the EU Data Protection Directive and also finds a place in the new General Data Protection Regulation. Article 7 (f) of the EU Directive&lt;sup&gt;31&lt;/sup&gt; provided for legitimate interest balanced against the interests or fundamental rights and freedoms of the data subject as the last justifiable reason for use of data. Due to confusion in its interpretation, the Article 29 Working Party, in 2014,&lt;sup&gt;32&lt;/sup&gt;looked into the role of legitimate interest and arrived at the following factors to determine the presence of a legitimate interest— a) the status of the individual (employee, consumer, patient) and the controller (employer, company in a dominant position, healthcare service); b) the circumstances surrounding the data processing (contract relationship of data subject and processor); c) the legitimate expectations of the individual.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Federico Ferretti has criticised the legitimate interest principle as vague and ambiguous. The balancing of legitimate interest in using the data against fundamental rights and freedoms of the data subject gives the data controllers some degree of flexibility in determining whether data may be processed; however, this also reduces the legal certainty that data subject have of their data not being used for purposes they have not agreed to.&lt;sup&gt;33&lt;/sup&gt;However, it is this paper’s contention that it is not the intent of the legitimate interest criteria but the lack of consensus on its application which creates an ambiguity. Moerel and Prins articulate a test for using legitimate interest which is cognizant of the need to use data for the purpose of Big Data processing, as well as ensuring that the rights of data subjects are not harmed.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As demonstrated earlier, the processing of data and its underlying purposes have become exceedingly complex and the conventional tool to describe these processes ‘privacy notices’ are too lengthy, too complex and too profuse in numbers to have any meaningful impact.&lt;sup&gt;34&lt;/sup&gt;The idea of information self-determination, as contemplated by Westin in American jurisprudence, is not achieved under the current framework. Moerel and Prins recommend five factors&lt;sup&gt;35&lt;/sup&gt; as relevant in determining the legitimate interest. Of the five, the following three are relevant to the present discussion:&lt;/p&gt;
&lt;ol style="list-style-type: lower-alpha;"&gt;
&lt;li style="text-align: justify;"&gt;Collective Interest — A cost-benefit analysis should be conducted, which examines the implications for privacy for the data subjects as well as the society, as a whole.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The nature of the data — Rather than having specific categories of data, the nature of data needs to be assessed contextually to determine legitimate interest.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Contractual relationship and consent not independent grounds — This test has two parts. First, in case of contractual relationship between data subject and data controller: the more specific the contractual relationship, the more restrictions apply to the use of the data. Second, consent does not function as a separate principle which, once satisfied, need not be revisited. The nature of the consent (opportunities made available to data subject, opt in/opt out, and others) will continue to play a role in determining legitimate interest.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Replacing the purpose limitation principles with a use-based system as articulated above poses the danger of allowing governments and the private sector to carry out indiscriminate data collection under the blanket guise that any and all data may be of some use in the future. The harms-based approach has many merits and there is a stark need for more use of risk assessments techniques and privacy impact assessments in data governance. However, it is important that it merely adds to the existing controls imposed at data collection, and not replace them in their entirety. On the other hand, the legitimate interests principle, especially as put forth by Moerel and Prins, is more cognizant of the different factors at play — the inefficacy of existing purpose limitation principles, the need for businesses to use data for purposes unidentified at the stage of collection, and the need to ensure that it is not misused for indiscriminate collection and purposes. However, it also poses a much heavier burden on data controllers to take into account various factors before determining legitimate interest. If legitimate interest has to emerge as a realistic alternative to purpose limitation, there needs to be greater clarity on how data controllers must apply this principle.&lt;/p&gt;
&lt;h3&gt;Endnotes&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Prachi Shrivastava, “Privacy not a fundamental right, argues Mukul Rohatgi for Govt as Govt affidavit says otherwise,” Legally India, Jyly 23, 2015, http://www.legallyindia.com/Constitutional-law/privacy-not-a-fundamental-right-argues-mukul-rohatgi-for-govt-as-govt-affidavit-says-otherwise.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Rebecca Bowe, “Growing Mistrust of India’s Biometric ID Scheme,” Electronic Frontier Foundation, May 4, 2012, https://www.eff.org/deeplinks/2012/05/growing-mistrust-india-biometric-id-scheme.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Lisa Hayes, “Digital India’s Impact on Privacy: Aadhaar numbers, biometrics, and more,” Centre for Democracy and Technology, January 20, 2015, https://cdt.org/blog/digital-indias-impact-on-privacy-aadhaar-numbers-biometrics-and-more/.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;“India’s Surveillance State,” Software Freedom Law Centre, http://sflc.in/indias-surveillance-state-our-report-on-communications-surveillance-in-india/.&lt;/li&gt;
&lt;li&gt;“Internet Privacy in India,” Centre for Internet and Society, http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Vivek Pai, “Indian Government says it is still drafting privacy law, but doesn’t give timelines,” Medianama, May 4, 2016, http://www.medianama.com/2016/05/223-government-privacy-draft-policy/.&lt;/li&gt;
&lt;li&gt;Information Technology (Intermediaries Guidelines) Rules, 2011,&lt;br /&gt; http://deity.gov.in/sites/upload_files/dit/files/GSR314E_10511%281%29.pdf.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Discussion Points for the Meeting to be taken by Home Secretary at 2:30 pm on 7-10-11 to discuss the drat Privacy Bill, http://cis-india.org/internet-governance/draft-bill-on-right-to-privacy.&lt;/li&gt;
&lt;li&gt;Alan Westin, Privacy and Freedom (New York: Atheneum, 2015).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;US Secretary’s Advisory Committee on Automated Personal Data Systems, Records, Computers and the Rights of Citizens, http://www.justice.gov/opcl/docs/rec-com-rights.pdf.&lt;/li&gt;
&lt;li&gt;OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fred Cate, “The Failure of Information Practice Principles,” in Consumer Protection in the Age of the Information Economy, ed. Jane K. Winn (Burlington: Aldershot, Hants, England, 2006) http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1156972.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Amber Sinha and Scott Mason, “A Critique of Consent in Informational Privacy,” Centre for Internet and Society, January 11, 2016, http://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy.&lt;/li&gt;
&lt;li&gt;Daniel Solove, “Privacy self-management and consent dilemma,” Harvard Law Review 126, (2013): 1880.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Jonathan Obar, “Big Data and the Phantom Public: Walter Lippmann and the fallacy of data privacy self management,” Big Data and Society 2(2), (2015), doi: 10.1177/2053951715608876.&lt;/li&gt;
&lt;li&gt;Supra Note 12.&lt;/li&gt;
&lt;li&gt;Supra Note 14.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Paul Ohm, “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization” available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006; Arvind Narayanan and Vitaly Shmatikov, “Robust De-anonymization of Large Sparse Datasets” available at https://www.cs.utexas.edu/~shmat/shmat_oak08netflix.pdf.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;D. Hirsch, “That’s Unfair! Or is it? Big Data, Discrimination and the FTC’s Unfairness Authority,” Kentucky Law Journal, Vol. 103, available at: http://www.kentuckylawjournal.org/wp-content/uploads/2015/02/103KyLJ345.pdf&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;A Marthews and C Tucker, “Government Surveillance and Internet Search Behavior”, available at http://ssrn.com/abstract=2412564; Danah Boyd and Kate Crawford, “Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon”, Information, Communication &amp;amp; Society, Vol. 15, Issue 5, (2012).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Scott Mason, “Benefits and Harms of Big Data”, Centre for Internet and Society, available at http://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data#_ftn37.&lt;/li&gt;
&lt;li&gt;Cate, “The Failure of Information Practice Principles.”&lt;/li&gt;
&lt;li&gt;Solove, “Privacy self-management and consent dilemma,” 1882.&lt;/li&gt;
&lt;li&gt;Cate, “The Failure of Information Practice Principles.”&lt;/li&gt;
&lt;li&gt;Fred Cate and Viktor Schoenberger, “Notice and Consent in a world of Big Data,” International Data Privacy Law 3(2), (2013): 69.&lt;/li&gt;
&lt;li&gt;Solove, “Privacy self-management and consent dilemma,” 1883.&lt;/li&gt;
&lt;li&gt;Lokke Moerel, “Netherlands: Big Data Protection: How To Make The Draft EU Regulation On Data Protection Future Proof”, Mondaq, March 11. 2014, http://www.mondaq.com/x/298416/data+protection/Big+Data+Protection+How+To+Make+The+Dra%20ft+EU+Regulation+On+Data+Protection+Future+Proof%20al%20Lecture.&lt;/li&gt;
&lt;li&gt;Moerel, “Netherlands: Big Data Protection.”&lt;/li&gt;
&lt;li&gt;Centre for Information Policy Leadership, “A Risk-based Approach to Privacy: Improving Effectiveness in Practice,” Hunton and Williams LLP, June 19, 2014, https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/white_paper_1-a_risk_based_approach_to_privacy_improving_effectiveness_in_practice.pdf.&lt;/li&gt;
&lt;li&gt;Lokke Moerel and Corien Prins, “Privacy for Homo Digitalis: Proposal for a new regulatory framework for data protection in the light of Big Data and Internet of Things”, Social Science Research Network, May 25, 2016, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2784123.&lt;/li&gt;
&lt;li&gt;EU Directive 95/46/EC – The Data Protection Directive, https://www.dataprotection.ie/docs/EU-Directive-95-46-EC-Chapter-2/93.htm.&lt;/li&gt;
&lt;li&gt;Article 29 Data Protection Working Party, “Opinion 06/2014 on the notion of legitimate interests of the data controller under Article 7 of Directive 95/46/EC,” http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp217_en.pdf.&lt;/li&gt;
&lt;li&gt;Frederico Ferretti, “Data protection and the legitimate interest of data controllers: Much ado about nothing or the winter of rights?,” Common Market Law Review 51(2014): 1-26. http://bura.brunel.ac.uk/bitstream/2438/9724/1/Fulltext.pdf.&lt;/li&gt;
&lt;li&gt;Sinha and Mason, “A Critique of Consent in Informational Privacy.”&lt;/li&gt;
&lt;li&gt;Moerel and Prins, “Privacy for Homo Digitalis.”&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle'&gt;https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-11-09T13:54:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/factordaily-pranesh-prakash-and-japreet-grewal-july-13-2016-no-india-did-not-oppose-un-move-to-make-internet-access-a-human-right">
    <title>No, India did NOT oppose the United Nations move to “make internet access a human right”</title>
    <link>https://cis-india.org/internet-governance/blog/factordaily-pranesh-prakash-and-japreet-grewal-july-13-2016-no-india-did-not-oppose-un-move-to-make-internet-access-a-human-right</link>
    <description>
        &lt;b&gt;Last Friday, the United Nations Human Rights Council (UNHRC) passed a resolution titled “The promotion, protection and enjoyment of human rights on the Internet.”&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Pranesh Prakash and Japreet Grewal &lt;a class="external-link" href="http://factordaily.com/no-india-not-oppose-united-nations-move-make-internet-access-human-right/"&gt;was published in Factordaily&lt;/a&gt; on July 13, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Several media outlets, including &lt;a href="http://www.theverge.com/2016/7/4/12092740/un-resolution-condemns-disrupting-internet-access"&gt;T&lt;/a&gt;&lt;a href="http://www.theverge.com/2016/7/4/12092740/un-resolution-condemns-disrupting-internet-access" target="_blank"&gt;he Verge&lt;/a&gt;, &lt;a href="http://indiatoday.intoday.in/technology/story/un-seeks-to-make-web-access-human-right-india-joins-saudi-arabia-in-opposing-it/1/707353.html"&gt;India Today&lt;/a&gt;, and &lt;a href="https://www.buzzfeed.com/sheerafrenkel/intentionally-banning-access-to-the-internet-is-not-ok-says?utm_term=.uxVr5YzNpQ#.xrwYvzrpLy" target="_blank"&gt;BuzzFeed&lt;/a&gt;,  reported that the resolution was ‘opposed’ by China, Russia, Saudi  Arabia, South Africa and India. The Verge, for instance, reported that  these countries “specifically opposed” a clause of the resolution that “&lt;i&gt;condemns unequivocally measures to intentionally prevent or disrupt access to or dissemination of information online&lt;/i&gt; &lt;i&gt;and calls for all countries to refrain from such measures&lt;/i&gt;”.   This is pure bunkum.  Some media organisations have also been reporting  that the UNHRC resolution “declares that access to the Internet is a  human right”. This too is fiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What’s the truth?  The UNHRC resolution covers wide ground, including  the reaffirmations of two previous resolutions, which stated that the  same rights that people have offline must also be protected online as  well.  As ARTICLE19, an international free speech NGO, &lt;a href="https://www.article19.org/resources.php/resource/38428/en/unhrc:-reject-attempts-to-weaken-resolution-on-human-rights-and-the-internet" target="_blank"&gt;notes&lt;/a&gt;:  “The draft resolution goes further than its predecessors, including by  stressing the importance of an accessible and open Internet to the  achievement of the Sustainable Development Goals, as well as in calling  for accountability for extrajudicial killings, arbitrary detentions and  other violations against people for expressing themselves online.”   Importantly, the resolution “unequivocally condemns” internet shutdowns,  such as the one that happened in Kashmir just last week after security  forces killed guerrilla Burhan Wani.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This resolution was, in fact, adopted without any opposition. So why the brouhaha over countries like India?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Here are the facts&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There were four separate amendments, two of which were proposed by Belarus, China and Russia (referred as &lt;a href="https://documents-dds-ny.un.org/doc/UNDOC/LTD/G16/139/31/PDF/G1613931.pdf?OpenElement"&gt;L85&lt;/a&gt;, &lt;a href="https://documents-dds-ny.un.org/doc/UNDOC/LTD/G16/138/28/PDF/G1613828.pdf?OpenElement"&gt;L86&lt;/a&gt; in this article) and the other two were proposed by Belarus, China, Russia and Iran (referred as &lt;a href="https://documents-dds-ny.un.org/doc/UNDOC/LTD/G16/138/37/PDF/G1613837.pdf?OpenElement"&gt;L87&lt;/a&gt; and &lt;a href="https://documents-dds-ny.un.org/doc/UNDOC/LTD/G16/138/52/PDF/G1613852.pdf?OpenElement"&gt;L88&lt;/a&gt;).   None of these amendments comment on the paragraph in the resolution  that condemns intentional disruption of access or dissemination of  internet services. So the headlines in most of the reports are just  plain wrong. Let’s examine each of these four amendments one by one&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;b&gt;L85&lt;/b&gt;, an amendment was suggested to a paragraph  that refers to past resolutions by the UNHRC and the UN General Assembly  relating to freedom of expression and the right to privacy online. The  amendment, which proposed including a reference to a previous UNHRC  resolution on the rights of children online, was later withdrawn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;b&gt;L86&lt;/b&gt; the proposed amendments both added and  removed some text, and was hotly opposed by organisations like  ARTICLE19. The proposed amendment said that the same rights people have  offline must also be protected online, in particular, freedom of  expression and the right to privacy, in accordance with articles 17 and  19 of the International Covenant on Civil and Political Rights (ICCPR), a  multilateral treaty adopted by the United National General Assembly to  respect civil and political rights of individuals. Major additions: Some  text on right to privacy and a reference to Article 17 of the ICCPR,  which is about privacy. Major deletions: a reference to the Universal  Declaration on Human Rights, and language stating that that freedom of  expression is “applicable regardless of frontiers and through any media  of one’s choice”, which is present in article 19 of the ICCPR.  However,  article 19 of the ICCPR is incorporated by reference even in the  proposed amendment!  So is there a real loss in purely legal terms?  Not  really.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendments in &lt;b&gt;L87&lt;/b&gt; sought to replace the term  “human rights based approach” that stressed on the need to provide and  expand access to the internet, and to replace it with the term  “comprehensive and integrated approach.” The problem is that there is no  clarity about what a “human rights based approach” to providing and  expanding access to the internet is. What does it even mean? Is there a  “human rights based approach” to spectrum auctions and spectrum sharing?  Or the laying of fibre optic cables? Or anything else associated with  internet access?  If there is, indeed, a human rights based approach to  providing and expanding access to the internet, it should be spelt out,  rather than simply calling it that. Similarly, the term “comprehensive  and integrated approach” is equally vague.&lt;/p&gt;
&lt;div class="pullquote-align-left vcard perfect-pullquote" style="text-align: justify; "&gt;
&lt;blockquote&gt;
&lt;p&gt;Even  if one harbours reservations about these amendments, none of these  amendments could be reasonably be characterised as “opposing” the  condemnation of Internet shutdowns or “opposing” online freedoms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Finally, in &lt;b&gt;L88&lt;/b&gt;, the amendments proposed that the UN  resolution should acknowledge concerns about using the internet and  information technology for spreading ideas about “racial superiority or  hatred, incitement to racial discrimination, xenophobia and related  intolerance.” In the light of this, it is difficult to understand how  adding concerns relating to hate speech to the resolution is seen as  “being opposed” to online freedoms, especially when there is no direct  action contemplated in the proposed amendment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, in Paragraph 9, gender violence is mentioned, and in  Paragraph 11, incitement to hatred is mentioned.  Adding an additional,  more specific reference can &lt;a href="https://www.article19.org/data/files/pdfs/conferences/iccpr-links-between-articles-19-and-20.pdf"&gt;hardly be construed as being opposed to online freedoms&lt;/a&gt;.  After all, states have a positive obligation to enact laws to prohibit  hate speech under Article 20 (2) of the ICCPR, which is a centrepiece of  international human rights law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if one harbours reservations about these amendments, none of  these amendments could be reasonably be characterised as “opposing” the  condemnation of Internet shutdowns or “opposing” online freedoms. And  factually, no states (including India, China, South Africa, Russia, and  more) voted against the resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A game of Chinese whispers&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So why did so many prominent news organisations around the world get  it so wrong? My theory is that it happened because organisation like  ARTICLE19 put out press releases on what they perceived as the  ‘weakening’ of the resolutions by the amendments examined above, and  their regret that even democratic states like India and South Africa  voted for these amendments.  This was wrongly portrayed in much of the  media as opposition by these countries to the resolution itself, to  online freedoms, and particularly as opposition to the idea of  condemning internet shutdowns.  Thanks to the Chinese whispers nature of  news reporting, this mistaken idea spread far and wide without any of  the reporters bothering to check the original UN documents.&lt;/p&gt;
&lt;div class="pullquote-align-right vcard perfect-pullquote" style="text-align: justify; "&gt;
&lt;blockquote&gt;
&lt;p&gt;It  is shameful if India condemns internet shutdowns at the UNHRC while  deploying them for purposes such as preventing cheating during an  examinations, during Ganesha &lt;i&gt;visarjan&lt;/i&gt;, during Eid, during wrestling matches, and during protests.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;However, regardless of the faulty reportage, there is a real crisis  in India, with organisations like Medianama and  the Software Freedom  Law Centre having counted at least nine internet shutdowns this year  alone, and at least 30 since 2013. It is shameful if India condemns  internet shutdowns at the UNHRC while deploying them for purposes such  as preventing cheating during an examinations, during Ganesha &lt;i&gt;visarjan&lt;/i&gt;, during Eid, during wrestling matches, and during protests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We at the Centre for Internet and Society have previously explained  why a Gujarat High Court order allowing for an internet shutdown during  riots &lt;a href="http://cis-india.org/internet-governance/blog/the-legal-validity-of-bans-on-internet-part-i"&gt;was wrong&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/the-legal-validity-of-internet-bans-part-ii"&gt;in law&lt;/a&gt;,  and violated our Constitution as well as our international human rights  obligations.  That is something the India media ought to be focussing  far more on, but aren’t.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lastly, it would also be welcome for the individual civil society  organisations that signed an open letter to UNHRC members to explain why  they too believed that these amendments would have significantly harmed  our freedoms online.  We see it instead as a case of ‘human rights  politics’ being played out, when none of the proposed amendments would  have had much of a negative legal impact, but only a political impact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Should civil society organisations really get worked up about these?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Edited by: &lt;a href="http://factordaily.com/author/pranav/"&gt;Pranav Dixit&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/factordaily-pranesh-prakash-and-japreet-grewal-july-13-2016-no-india-did-not-oppose-un-move-to-make-internet-access-a-human-right'&gt;https://cis-india.org/internet-governance/blog/factordaily-pranesh-prakash-and-japreet-grewal-july-13-2016-no-india-did-not-oppose-un-move-to-make-internet-access-a-human-right&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pranesh Prakash and Japreet Grewal</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-13T16:09:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-v-prem-shanker-july-13-2016-tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case">
    <title>Tamil Nadu likely to hold Facebook accountable for suicide case</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-v-prem-shanker-july-13-2016-tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case</link>
    <description>
        &lt;b&gt;The recent suicide of a 21-year-old woman from Salem district in Tamil Nadu over her morphed pictures being uploaded on Facebook could turn into a flash-point between the state police and the world's most-popular social networking site.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by V. Prem Shanker was &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/politics-and-nation/tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case/articleshow/53182832.cms"&gt;published in the Economic Times&lt;/a&gt; on July 13, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"We are exploring the possibility of holding Facebook accountable for the delay in responding to our requests since that was one of the factors which led to the young lady committing suicide," Salem superintendent of police Amit Kumar Singh told ET in an exclusive interaction. On June 23, the Salem police had received a complaint from the father of the 21-year-old stating that someone had uploaded her morphed nude pictures on Facebook. The father had requested the police to get the photographs removed from the site and also find and warn the perpetrator.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The police recorded the complaint the same evening and later sent what is called a 'Law Enforcement Online Request' to Facebook asking for details of the IP address from which the morphed photographs were uploaded on the website. Officials also requested Facebook to take down the objectionable photographs of the young woman.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Five days after the request was sent, Facebook responded with the IP address on June 28 and within 12 hours after that the police cracked the case and nabbed the suspect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, all this was a bit too late because the previous day, on June 27, the young woman had ended her life. Her morphed nude photographs were taken down only on the day of her death, according to the police.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Apart from addressing Facebook, we also investigated the case from other angles but couldn't make headway. Thus, there was nothing we could do about the pictures still being online apart from waiting for Facebook to act," Singh said, adding "enforcement of compliance is a matter of grave concern."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Officials are considering charging Facebook with abetment to suicide and including Facebook in the chargesheet if the site is found culpable after investigations. However, the state police is said to be discussing with legal experts on how this can be done as there is no precedent for a website having been charged in a crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook did not reply to an email seeking comment. Earlier in a communique, responding to criticisms of police inaction in this case, Singh had pointed out that "Only Facebook can block a page and it exercises this discretion as per its Facebook Community Standards and not the law of the land it is being viewed in. Facebook does not provide the police with any special powers to take down a page even if the police receive a cognizable complaint of identity theft and uploading of obscene content. There is no tool available, at least as of now, with the police to coerce or goad Facebook to act expeditiously even if the matter is very urgent and there is a flagrant violation of Indian law."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts point out that the disparity with which Facebook treats child abuse laws and copyright infringements as opposed to violation of women's rights is stark.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Look at the war against child pornography. In the United Kingdom there is an independent foundation that has immunity under UK child pornography law. They generate a database and circulate it across all platforms and ensure that it is kept absolutely squeaky clean," points out Sunil Abraham, executive director of Bengaluru based research organisation, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There definitely needs to be a law to ensure that such platforms do not violate the law of the land, especially when it comes to women's rights. But in interim, the government can create an information escrow or a platform where the victims can place on record their problems and it is there for these sites to see and take action," Abraham added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-v-prem-shanker-july-13-2016-tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case'&gt;https://cis-india.org/internet-governance/news/economic-times-v-prem-shanker-july-13-2016-tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-13T13:44:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-telegraph-july-10-2016-place-for-a-safety-net">
    <title>Place for a safety net</title>
    <link>https://cis-india.org/internet-governance/news/the-telegraph-july-10-2016-place-for-a-safety-net</link>
    <description>
        &lt;b&gt;Vinupriya took her life last week, humiliated by the morphed images of her naked body posted on a social media site. Experts warn that the spike in Internet traffic brings with it an increase in online sexual crimes. Measures must be taken urgently to save lives, they tell T.V. Jayan.

&lt;/b&gt;
        &lt;p align="justify"&gt;&lt;a class="external-link" href="http://www.telegraphindia.com/1160710/jsp/7days/story_95759.jsp"&gt;The article was published in the Telegraph on July 10, 2016&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="justify"&gt;Sangeeta (not her name) was 25 and working for a private company in  Mumbai when she suddenly told her family that she was going to quit her  job and stay at home. Her parents were flummoxed, but questioning and  coaxing yielded no answers. As the days rolled on, the management  graduate slipped into depression. Her worried family took her to a  counsellor. And it was only then that she came out with her story.&lt;/p&gt;
&lt;p align="justify"&gt;Soon after she joined the company, Sangeeta got romantically involved  with her boss. By the time she learnt he was married, the involvement  had taken a physical turn. And when she tried to put an end to it, the  man, who had recorded their intimate moments, used the video clips to  blackmail her for sexual favours. After Sangeeta's confession and a  police complaint, the blackmailing boss was nabbed and put behind bars.&lt;/p&gt;
&lt;p align="justify"&gt;Vinupriya, an undergraduate student from Salem, Tamil Nadu, was not  so lucky. She found that her morphed images had been uploaded on  Facebook. She committed suicide last week after her parents refused to  believe her story, and the police failed to act swiftly.&lt;/p&gt;
&lt;p align="justify"&gt;Cyber experts are alarmed by the increase in online crimes against  women in India. According to them, what is more worrying is that though  the risks are catastrophic, the issues are not being addressed at a  larger level.&lt;/p&gt;
&lt;p align="justify"&gt;"Vinupriya's case is particularly frightening. I suspect this would  be the first of many such tragedies. They might even result in honour  killings, as such crimes can destroy the reputation of families," says  American cyber lawyer Parry Aftab, executive director of the voluntary  organisation, Wired Safety, which she founded 20 years ago, and which  deals extensively with cyber stalking and other crimes.&lt;/p&gt;
&lt;p align="justify"&gt;Earlier this week, a man was arrested in Delhi for sending obscene  messages to more than 1,500 women in the National Capital Region.  According to the police, the miscreant would randomly dial any number  and if the caller turned out to be a woman, he would save the number and  later check out her WhatsApp profile picture. He would then send  obscene clips to the woman. One news report said some of the marriages  were in trouble because husbands had seen the messages and suspected  that their wives were in a relationship with the man sending those  explicit messages.&lt;/p&gt;
&lt;p align="justify"&gt;Aftab has been studying the dangers of online stalking for a while.  There are no figures on this in India, but a top United Nations  official, stationed in New Delhi and dealing with trafficking, told her  that about 500 rape and sexual assault cases were recorded and shared  over WhatsApp in India this year.&lt;/p&gt;
&lt;p align="justify"&gt;She referred to a study conducted in the US that said one in three  girls and boys engaged in sexting. Children involved in sexting  contemplated suicide three times more than others of the same age, she  said.&lt;/p&gt;
&lt;p align="justify"&gt;According to her, Wired Safety volunteers come across five cases of  sextortion and sexting every day from Asian countries, including India,  and act upon them by red-flagging social media organisations where such  images are posted.&lt;/p&gt;
&lt;p align="justify"&gt;Pavan Duggal, a cyber lawyer based in Delhi, feels that social media  service providers are not doing enough to stop online sexual abuse.  "They are hiding behind a 2015 Supreme Court judgment, which said  content can be removed only on judicial orders or in response to  government notifications," he says.&lt;/p&gt;
&lt;p align="justify"&gt;The verdict he refers to was delivered in a case filed by a student  called Shreya Singhal. In 2012, two girls were arrested over their  Facebook post questioning the Mumbai shutdown for Shiv Sena patriarch  Bal Thackeray's funeral. The incident made an impression on Singhal, a  student of astrophysics at the University of Bristol, who was in India  at the time.&lt;/p&gt;
&lt;p align="justify"&gt;Upon research she discovered that Section 66(A) of India's IT Act was  subjective and any seemingly offensive social media post could land  anyone in jail. Singhal filed a writ petition in the Supreme Court  protesting that the section violated the constitutional right to freedom  of speech and expression, and in 2015, the apex court ruled in her  favour.&lt;/p&gt;
&lt;p align="justify"&gt;This judgment, however, emboldened cyber miscreants. "All the cyber  bullies and cyber stalkers now have a misplaced feeling that nothing can  happen to them," says Duggal. He points out that while the delivery of  justice takes time, the harassment happens 24x7.&lt;/p&gt;
&lt;p align="justify"&gt;"Who do the victims turn to for help? There are provisions in the  2011 IT rules that clearly say that social medial service providers  should have rules and regulations in place to deal with objectionable  content, but they do not act," he holds.&lt;/p&gt;
&lt;p align="justify"&gt;Aftab, however, believes that some efforts are in place. She cites  the example of Microsoft's PhotoDNA technology, which is used by many  social media and online search firms, including Facebook, Google and  Twitter, to prevent child pornography on the Internet. PhotoDNA works by  creating a number of mini hashes on a single image and combining them  to have a full hash. If anything is changed, even a pixel, then the hash  signature will not match.&lt;/p&gt;
&lt;p align="justify"&gt;But she holds that on a larger scale, it is difficult to  technologically deal with revenge porn, sextortion (using a sexual or  provocative image to blackmail people for sexual favours) and sexting  (sharing sexually provocative images of people, especially women) with  the intention of damaging reputation.&lt;/p&gt;
&lt;p align="justify"&gt;Sunil Abraham, executive director of the Bangalore-based Centre for  Internet and Society, hints at a lack of initiative on the part of the  social media organisations. "When it comes to enforcing intellectual  property, organisations like Facebook do an excellent job of keeping  their platform free of copyright infringement," he says. "So, clearly  these companies can police activities on their platform when it affects  their bottom-line."&lt;/p&gt;
&lt;p align="justify"&gt;And while this debate continues, more and more Indians join the  online experience, thereby increasing the chances of more such cases.  Aftab, who plans to set up a voluntary organisation relating to cyber  safety in India, says it is best to focus on proactive measures in the  interim.&lt;/p&gt;
&lt;p align="justify"&gt;Last month, she addressed 1,200 teenage girls from a Bangalore  college. "One of the first questions posed to me was from a young girl  who said she was currently being blackmailed by someone who threatened  to morph her pictures into sexually explicit images and send them to her  family and others. Morphed image issue seems to be a lot more serious  in India than in the West."&lt;/p&gt;
&lt;p align="justify"&gt;The problem, she stresses, is that such incidents can lead to  self-harm. To counter this, the affected person needs to inform his or  her family and enlist their support. Together, they should approach  social media organisations to ensure that the objectionable content is  removed in time. To prevent the offenders from doing further harm, they  then need to take the help of law enforcement agencies.&lt;/p&gt;
&lt;p align="justify"&gt;"The government for its part must amplify the voices of women and  hold these Internet corporations accountable for an information escrow.  There should be an independent mechanism to monitor whether Internet  platforms are taking complaints from women seriously," Abraham says.  Only then can a young girl like Vinupriya pluck up the courage to fight  online abuse.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-telegraph-july-10-2016-place-for-a-safety-net'&gt;https://cis-india.org/internet-governance/news/the-telegraph-july-10-2016-place-for-a-safety-net&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-13T02:45:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy">
    <title>Trans Pacific Partnership and Digital 2 Dozen: Implications for Data Protection and Digital Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy</link>
    <description>
        &lt;b&gt;In this essay, Shubhangi Heda explores the concerns related to data protection and digital privacy under the Trans Pacific Partnership (TPP) agreement signed recently between United States of America and eleven countries located around the pacific ocean region, across South America, Australia, and Asia. TPP  is a free trade agreement (FTA) that emphasises, among other things, the need for liberalising global digital economy. The essay also analyses the critical document titled ‘Digital 2 Dozen’ (D2D), which compiles the key action items within TPP addressing liberalisation of digital economy, and sets up the relevant goals for the member nations.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;1. &lt;strong&gt;&lt;a href="#1"&gt;Introduction&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;2. &lt;strong&gt;&lt;a href="#2"&gt;Analysis of TPP and D2D&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;2.1. &lt;strong&gt;&lt;a href="#2-1"&gt;Trans Pacific Partnership (TPP)&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;2.2. &lt;strong&gt;&lt;a href="#2-2"&gt;Digital 2 Dozen (D2D)&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;3. &lt;strong&gt;&lt;a href="#3"&gt;Major Criticisms of the Digital Agenda of TPP&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;3.1. &lt;strong&gt;&lt;a href="#3-1"&gt;Data Protection&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;3.2. &lt;strong&gt;&lt;a href="#3-2"&gt;Digital Privacy&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;4. &lt;strong&gt;&lt;a href="#4"&gt;Implications of TPP for RCEP&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;5. &lt;strong&gt;&lt;a href="#5"&gt;Implications of TPP in the Context of EU Safe Harbour Judgement&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;6. &lt;strong&gt;&lt;a href="#6"&gt;Implications of TPP for India after US-India Cyber Relationship Agreement&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;7. &lt;strong&gt;&lt;a href="#7"&gt;Conclusion&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;8. &lt;strong&gt;&lt;a href="#8"&gt;Endnotes&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;9. &lt;strong&gt;&lt;a href="#9"&gt;Author Profile&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 id="1"&gt;1. Introduction&lt;/h2&gt;
&lt;p&gt;This essay explores the concerns related to data protection and digital privacy under the Trans Pacific Partnership (TPP) agreement signed recently between United States of America and eleven countries located around the pacific ocean region, across South America, Australia, and Asia &lt;strong&gt;[1]&lt;/strong&gt;. TPP is a free trade agreement (FTA) that emphasises, among other things, the need for liberalising global digital economy. The essay also analyses the critical document titled ‘Digital 2 Dozen’ (D2D), which compiles the key action items within TPP addressing liberalisation of digital economy, and sets up the relevant goals for the member nations. TPP requires the member countries to facilitate unhindered digital data flow across nations, for commercial and governmental purposes, which evidently have major implications for national and regional data protection and privacy regimes. These implications must also be seen in the context the recent judgement by  the EU Court of Justice against the validity of the EU-USA data transfer agreement of 2000. Further, the essay discusses the potential impacts that TPP/D2D might have on India, in the context of the ongoing USA-India Cyber Relationship dialogue. If the privacy concerns are not raised right now TPP might act as a model framework for future FTAs which will fail to encompass proper data protection and digital privacy regime within it.&lt;/p&gt;
&lt;h2 id="2"&gt;2. Analysis of TPP and D2D&lt;/h2&gt;
&lt;h3 id="2-1"&gt;2.1. Trans Pacific Partnership (TPP)&lt;/h3&gt;
&lt;p&gt;Trans Pacific Partnership (TPP) is a large multi-partner free trade agreement amongst twelve Asia-Pacific countries, which is closely led by geo-political and economic strategies of the USA. Countries started the negotiation of TPP in 2008 when USA joined Pacific Four (P-4) negotiations and in 2015 negotiations of TPP was concluded  and text  was released. Ministers from the member countries signed the agreement on February 4, 2016 &lt;strong&gt;[2]&lt;/strong&gt;. The main aim of TPP is to liberalise trade and investment beyond what is provided for within the WTO. It is also considered to be a strategic move by the US to counter the trade linkages that are being established in the Asian region. TPP largely covers topics of market access, and rules on various related issues such as intellectual property rights, labour laws, and environment standards &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Between 1992 -2012 there has been an upsurge in bilateral trade agreements being signed in Asia from 25 to 103 and the effect of these FTAs is called the ‘noodle bowl effect’. TPP is seen as framework which will replace these FTAs which  are causing the ‘noodle bowl effect’.While these FTAs are being replaced but with TPP being signed there are various bilateral arrangements signed along with TPP. USA has also stated that TPP will not affect the already existing NAFTA &lt;strong&gt;[4]&lt;/strong&gt;. While TPP is being concluded  there is another free trade agreement being negotiated between USA and EU , which is Trans Trade and Investment Partnership (TTIP). Both  TPP and TTIP  and are considered to be serving similar objective  which is to deal with new and modern trade issues. Also both the  agreements are US led and since negotiation for TPP are now finalised it may have a significant impact on TTIP &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;TPP is one of the first document which deals specifically with digital economy and applies across borders.  The main aims of TPP are to promote free flow of data across borders without data localisation. It aims to remove national clouts and regional internets. It also includes provisions to combat theft of trade secrets. It allows you to create transparent regulatory process with inputs from various stakeholders. It also aims to provide access to tools and procedures for conduct of e-commerce &lt;strong&gt;[6]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Some of the major criticism to TPP were regarding the issues related to &lt;strong&gt;[7]&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;environment, wherein it does not address the issue of climate change  and the language used in the agreement  is very weak;&lt;/li&gt;
&lt;li&gt;labour rights  provision mandates parties to adhere to the ILO provision  but it  does not seem to  provide for effective framework  and might not bring the desired change;&lt;/li&gt;
&lt;li&gt;investment chapter is seen to be controversial because of the investor state dispute settlement clause which will allow foreign investor to sue government over policies that might cause harm to them;&lt;/li&gt;
&lt;li&gt;e-commerce and telecommunication chapter raises major privacy concerns;&lt;/li&gt;
&lt;li&gt;intellectual property chapter wherein it includes controversial rules regarding pharmaceutical companies and data exclusivity apart from the privacy concerns.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 id="2-2"&gt;2.2 Digital 2 Dozen (D2D)&lt;/h3&gt;
&lt;p&gt;D2D is set of rules and aims which is specifically drafted to be followed for the trade agreements related to open internet and digital economy. More specific aims of TPP as provided within the ‘Digital 2 Dozen,’ aiming for more liberalised trade in digital goods and services, are &lt;strong&gt;[8]&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;promoting free and open internet,&lt;/li&gt;
&lt;li&gt;prohibiting digital custom duties,&lt;/li&gt;
&lt;li&gt;securing basic non-discrimination principles,&lt;/li&gt;
&lt;li&gt;enabling cross-border data flows,&lt;/li&gt;
&lt;li&gt;preventing localization barriers,&lt;/li&gt;
&lt;li&gt;barring forced technology transfers,&lt;/li&gt;
&lt;li&gt;advancing innovative authentication methods,&lt;/li&gt;
&lt;li&gt;delivering enforceable consumer protections,&lt;/li&gt;
&lt;li&gt;safeguarding network competition,&lt;/li&gt;
&lt;li&gt;fostering innovative encryption products, and&lt;/li&gt;
&lt;li&gt;building an adaptable framework.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Strategic goal of the US in introducing D2D as goals of TPP has been to set up a trend within Asian region for all the trade agreements. It is expected to ensure that if TPP is a success, similar goals and policy frameworks will be followed for other trade agreements as we. For example, the USA-India partnership also enshrines similar aims and so does the USA-Korea partnership. Hence while India is not part of TPP, USA is nonetheless trying to get India into a partnership which is similar to the TPP. The language proposed by the USA in TPP negotiations  has always been supportive for cross border data flows as it claims that companies have mechanism to keep a privacy check and privacy would not be undermined, but countries like New Zealand and Australia which have strong privacy protection laws nationally have raised concerns which will be discussed in further sections &lt;strong&gt;[9]&lt;/strong&gt;. Also not only in  privacy rights but Digital Dozen initiative also affects other digital rights related to - excessive copyright terms  TPP proposed to extend the term of copyright to hundred years which deprive access to knowledge; as in the U.S motive to give more power to private entities , the  ISP obligations enumerated within TPP which puts freedom of expression and privacy at risk as ISPs are allowed to check for copyright infringement and TPP does not put any privacy restriction in this regard; introduction of new fair use rules; ban on circumvention of digital locks or DRMs; no compulsory limitation for persons with disabilities; lack of fair use for journalistic right; while net neutrality is major issue is many developing nations in Asia no effective provision for net neutrality is  aimed at in the D2D initiative; prohibits open source mandates which puts barrier for countries which want to release any software as open source as a policy decision &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id="3"&gt;3. Major Issues Related to Data Protection and Privacy in the TPP&lt;/h2&gt;
&lt;h3 id="3-1"&gt;3.1. Data Protection&lt;/h3&gt;
&lt;p&gt;One of the major concern raised against TPP is regarding data protection provisions that have been integrated within the E- Commerce chapter of the agreement. Article 14.11 and Article 14 .13 are the ones that deal with data flow related to consumer information.Article 14.11 in the agreement puts a requirement on the member states to allow transfer of data across border and  Article 14.13 does not allow the companies to host data on local servers.  Concerns were raised in few member states for instance, Australian Privacy Foundation raised concerns over Article 14.11 which requires transfers to be allowed in context of business activities of service suppliers. It claimed that exception to this provision is very narrow and the repercussion for not following the exception is that investor state dispute settlement proceedings can be initiated, which is not sufficient to protect privacy. Also, it highlighted the issue that with the narrow exception provided under Article 14.13 which relates to prohibition on data localisation, it might have adverse effect on the implementation of national privacy laws within Australia &lt;strong&gt;[11]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Another provision which is of major concern is Article 14.13 which prohibit data localisation. It will raise problems for countries like Indonesia and China which will have to change their local laws to implement the provision &lt;strong&gt;[12]&lt;/strong&gt;. Since there already has been a major concern with regard to USA- EU Safe Harbour Agreement which was later  made subject to the ECJ’s ruling on data protection, which invalidated any arrangement which provides voluntary enterprises responsibility to enforce privacy. But both the USA and EU are in process of renegotiating the agreement.The major concern was that in EU data protection is a fundamental right while in USA data protection is more consumer centric. When similar concerns were raised in TPP negotiations, they were rebutted as USA claimed that FTA does not concern itself with data protection &lt;strong&gt;[13]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In 2012 Australia proposed an alternative language to TPP which allowed countries to place restriction on data flow as long as it was not a barrier to trade. U.S responded to concerns raised by the Australia through a side letter which ensured Australia that U.S and Australia have a mutual understanding in relation to privacy and U.S will ensure the privacy of  data with regards to  Australia. While Australia’s concern was given acknowledgement other countries which raised similar issues were not given any assurances &lt;strong&gt;[14]&lt;/strong&gt;. US instead proposed ad- hoc strategy that gave private companies power to form privacy policy with implementation through state machinery &lt;strong&gt;[15]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3 id="3-2"&gt;3.2. Digital Privacy&lt;/h3&gt;
&lt;p&gt;Article 14.8 in the E- Commerce chapter of the  agreement states that countries can form legal framework for the protection of rights but the kind of ‘legal framework’ is not defined. Also, nowhere it states that the privacy protection or data protection laws are expressly exempted, rather it states that any such policy implemented by member states will be put under review of TPP standards. The standards which TPP proposes to follow are based on the underlying idea that any such policy should not hinder free trade in any way. This test will be applied by tribunals which are experts in trade and investment and not on data protection or human rights &lt;strong&gt;[16]&lt;/strong&gt;. While Article 14.8 provides for protection of private information of consumers but the footnote to the provision renders it ineffective. The footnote states that member countries can adopt legal framework for the protection of data which can be done by self-regulation by industry and does not provide for any comprehensive data protection obligation upon the member states &lt;strong&gt;[17]&lt;/strong&gt;. Similar to this Article 13.4 of the telecommunications chapter under TPP also states that  the countries can apply regulation regarding confidentiality of the messages as long as it is not “a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services" &lt;strong&gt;[18]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Another chapter which raises major concerns about the privacy rights is intellectual property. It affects privacy  through the provisions related to technological protective measures and the provision that regulate ISP’s liability. Regarding the TPM provision, the TPP follows the DMCA model whereby the exception to anti- circumvention provision is very narrow and does not apply to anti- trafficking provision. The exception allows user to circumvent TPM if it affect the user's privacy in any way, although this provision does not apply to ant- trafficking of TPM. The provision regarding ISP’s liability states that there should be cooperation between ISPs and rights holders and it does not prohibit ISPs to monitor its users. Also TPP proposes the notice for takedown and  identification of the infringer  by the ISP  but this  provision is not in consonance with  laws of member states, like that of Peru which does not have any copyright law on ISP . Also many countries have tried to introduce proper privacy laws along with implementation of ISP liability but that is not done within the TPP &lt;strong&gt;[19]&lt;/strong&gt;. TPP as whole aims to give greater power to private regulators without providing for minimum standard for protection of privacy.&lt;/p&gt;
&lt;p&gt;Although TPP  is not a data protection agreement but it consequently deals with various aspects of data protection, hence it is prospective model for privacy and data protection practices in future trade agreements. If positive obligations are included within the free trade agreements it will have an advancing impact on the data protection regime.&lt;/p&gt;
&lt;h2 id="4"&gt;4.Implications of TPP for RCEP&lt;/h2&gt;
&lt;p&gt;While TPP has such lacunas similar provision are proposed in RCEP to which India is a party and which will have serious implication as many of the countries have inadequate data protection laws nationally and with the introduction of such an FTA the exploitation of privacy rights will be rampant &lt;strong&gt;[20]&lt;/strong&gt;. To avoid this EU directive on data protection should be taken into consideration in the negotiations of such FTAs. But for the RCEP negotiations are still going on and in India many companies like Flipkart, Snapdeal etc. have started preparing for the changing norms. The government claims that it is going to accept best practices in the region which indicates that it is going to have same policies as that of TPP. Although people from industry have raised concerns that while there are national laws but it is difficult to check third party involvement within the business and it is becoming increasingly difficult to keep the consumer data confidential &lt;strong&gt;[21]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id="5"&gt;5. Implications of TPP in the Context of  EU Safe-Harbour Judgement&lt;/h2&gt;
&lt;p&gt;Mr. Maximillian Schrems, an Austrian National residing in Austria, has been a user of the Facebook social network since 2008. Any person residing in EU who wishes to use Facebook is required to conclude, at the time of his registration, a contract with Facebook Ireland (a subsidiary of Facebook Inc. which itself is established in Unites States). Some or all of the personal data of the Facebook Ireland’s users who residing in EU is transferred to servers belonging to Facebook Inc. that are located in United States, where it undergoes processing. On 25 June 2013 Mr Schrems made a complaint to the commissioner by which he in essence asked the latter to exercise his statutory powers by prohibiting Facebook Ireland from transferring his personal data to Unites States, and this led to the &lt;em&gt;Maximillian Schrems v Data Protection Commissioner&lt;/em&gt; case &lt;strong&gt;[22]&lt;/strong&gt;. He contended that in his complaint that the law and practice in force in that country did not ensure adequate protection of the personal data held in its territory against the surveillance activities that were engaged in thereby by the public authorities. Mr Schrems referred in this regard to the revelations made by Edward Snowden concerning the activities of the United States intelligence services, in particular those of the NSA.(para 26, 27, 28). The case came in  the court ruled that “that a third country which ensures an adequate level of protection, does not prevent a supervisory authority of a Member State, within the meaning of Article 28 of the EU 94/46 directive as amended, from examining the claim of a person concerning the protection of his rights and freedoms in regard to the processing of personal data relating to him which has been transferred from a Member State to that third country when that person contends that the law and practices in force in the third country do not ensure an adequate level of protection. The ruling implies that personal data cannot be transferred to third country which does not provide adequate level of protection.&lt;/p&gt;
&lt;p&gt;EU safe harbour judgment and EU directive on privacy provide contrasting rules related to privacy. While TPP gives power to private entities to formulate rules regarding privacy while the recent  ECJ judgment  invalidated giving such power to private entities  under EU-US Safe Harbour Agreement. Also in context of the same judgment Hamburg’s Commissioner for Data Privacy And Freedom of Information announced an investigation into the data transfer taking place through Facebook and Google to U.S. Hence in the light of the recent judgment member states within EU are not allowed to permit cross border data flow, in contrast to this one of the main goals of TPP is to maintain free flow of data across border &lt;strong&gt;[23]&lt;/strong&gt;. EU is this regard has also set forth the proposal to introduce General Data Protection Regulation. (GDPR). Although U.S and EU are trying to renegotiate the agreement but the privacy concerns raised cannot be ignored. Hence following the same model as was invalidate  under the ECJ judgment lets US exploit privacy of member states  under TPP. Similar concerns as raised within the judgment are also raised in India as it also following the same model within U.S-India Cyber Relationship Agreement and in RCEP negotiations.&lt;/p&gt;
&lt;h2 id="6"&gt;6. Implications of TPP in the context of USA-India Cyber Relationship&lt;/h2&gt;
&lt;p&gt;While India is not part of TPP  but it might have an effect on the  U.S India Cyber Relationship Agreement. In August 2015 there was re- initiation of the India-U.S cyber dialogue to address common concerns related to cybersecurity and to develop better partnerships between public and private sector for betterment of digital economy &lt;strong&gt;[24]&lt;/strong&gt;. One of the key aim of this agreement is free flow of information between two nations, which suffers from similar problem that it will put privacy of the citizens at risk. Also India does not have any bilateral treaty which ensures cyber data protection in such a scenario the only solution is data localisation, but this agreement will put data at risk &lt;strong&gt;[25]&lt;/strong&gt;. Hence while the TPP negotiations were going on and also RCEP is being discussed the concerns about privacy and data protection need to be raised as mention in earlier section regarding implications of TPP on RCEP, the USA-India Cyber Relationship also faces the same implications..Although  the aim of USA-India Cyber Relationship is to ensure cybersecurity. After the cases of Muzaffarnagar riots, upheaval in  North -Eastern states  and Gujarat riots, India has realised it is important to ensure compliance from the social media companies. India sees the USA-India Cyber Relationship as an opportunity to achieve this goal. The Google Transparency Report states that that India made around three thousand requests to Google for user data &lt;strong&gt;[26]&lt;/strong&gt;, which indicate at the country's interest in having a common data understanding with the major social media companies (almost all of which are located in USA) about requesting and sharing of user activity data. While this concern is being addressed through the agreement, it is difficult to ignore the clause related to free flow of information, and if the meaning of the term is extended and adopted from TPP itself will put digital privacy of Indian citizens at risk &lt;strong&gt;[27]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id="7"&gt;7. Conclusion&lt;/h2&gt;
&lt;p&gt;Even though TPP negotiation are completed but the ratification of the agreement is still underway. TPP is  being seen as one of a kind trade agreement because  it is the first time that countries across the globe have come together as a whole to address concerns of modern trade. Although it fails to address some of the key concerns related to  privacy and data protection which are becoming increasingly important. Data protection and privacy issues cannot be seen in isolation  and needs to merged within the modern day trade agreements. The D2D component by the USA is strategic move to have trade dominance in Asia  and to compete with China’s growth . TPP has privacy and data protection lacunae within the e- commerce , telecommunications and intellectual property discussion.Although it might have serious implications on RCEP negotiation and  USA- India Cyber Relationship Dialogue.  Similar concern regarding data protection has already been  addressed by ECJ judgment invalidating USA-EU  Safe Harbour Agreement but the similar ad - hoc strategy has been incorporated within TPP.  Since TPP might be considered as best practice model for  future FTAs in the Asian region it is important to raise and address these privacy concerns now.&lt;/p&gt;
&lt;h2 id="8"&gt;8. Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt;  The signatory countries include Australia, Canada, Japan, Malaysia, Mexico, Peru, United States of America, Vietnam, Chile, Brunei, Singapore, New Zealand. "The Trans-Pacific Partnership,"
&lt;a href="http://www.ustr.gov/tpp"&gt;http://www.ustr.gov/tpp&lt;/a&gt; (last visited Jul 7, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; "The Origins and Evolution of the Trans-Pacific Partnership (TPP)," Global Research, &lt;a href="http://www.globalresearch.ca/the-origins-and-evolution-of-the-trans-pacific-partnership-tpp/5357495"&gt;http://www.globalresearch.ca/the-origins-and-evolution-of-the-trans-pacific-partnership-tpp/5357495&lt;/a&gt; (last visited Jul 7, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; Fergusson, Ian F., Mark A. McMinimy &amp;amp; Brock R. Williams, "The Trans-Pacific Partnership (TPP): In Brief," (2015), &lt;a href="http://digitalcommons.ilr.cornell.edu/key_workplace/1477/"&gt;http://digitalcommons.ilr.cornell.edu/key_workplace/1477/&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; Gajdos, Lukas, &lt;em&gt;The Trans-Pacific Partnership and its impact on EU trade&lt;/em&gt;, Policy Department, Directorate-General for External Policies, Policy Briefing (2013), &lt;a href="http://www.europarl.europa.eu/RegData/etudes/briefing_note/join/2013/491479/EXPO-INTA_SP(2013)491479_EN.pdf"&gt;http://www.europarl.europa.eu/RegData/etudes/briefing_note/join/2013/491479/EXPO-INTA_SP(2013)491479_EN.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; Twining, Daniel, Hans Kundnani &amp;amp; Peter Sparding, &lt;em&gt;Trans-Pacific Partnership: geopolitical implications for EU-US relations&lt;/em&gt;, Policy Department, Directorate-General for External Policies, June 24 (2016), &lt;a href="http://www.europarl.europa.eu/RegData/etudes/STUD/2016/535008/EXPO_STU(2016)535008_EN.pdf"&gt;http://www.europarl.europa.eu/RegData/etudes/STUD/2016/535008/EXPO_STU(2016)535008_EN.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; USTR, "Remarks by Deputy U.S. Trade Representative Robert Holleyman to the New Democrat Network," &lt;a href="https://ustr.gov/about-us/policy-offices/press-office/speechestranscripts/2015/may/remarks-deputy-us-trade"&gt;https://ustr.gov/about-us/policy-offices/press-office/speechestranscripts/2015/may/remarks-deputy-us-trade&lt;/a&gt; (last visited Jul 4, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt;  Murphy, Katharine, "Trans-Pacific Partnership: four key issues to watch out for," The Guardian, November 6, 2015, &lt;a href="https://www.theguardian.com/business/2015/nov/06/trans-pacific-partnership-four-key-issues-to-watch-out-for"&gt;https://www.theguardian.com/business/2015/nov/06/trans-pacific-partnership-four-key-issues-to-watch-out-for&lt;/a&gt; (last visited Jul 7, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; USTR, "The Digital 2 Dozen" (2016), &lt;a href="https://ustr.gov/sites/default/files/Digital-2-Dozen-Final.pdf"&gt;https://ustr.gov/sites/default/files/Digital-2-Dozen-Final.pdf&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; Fergusson, Ian F.m Mark A. McMinimy &amp;amp; Brock R. Williams, "The Trans-Pacific Partnership (TPP) negotiations and issues for congress," (2015), &lt;a href="http://digitalcommons.ilr.cornell.edu/key_workplace/1412/"&gt;http://digitalcommons.ilr.cornell.edu/key_workplace/1412/&lt;/a&gt; (last visited Jul 8, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; "How the TPP Will Affect You and Your Digital Rights," Electronic Frontier Foundation (2015), &lt;a href="https://www.eff.org/deeplinks/2015/12/how-tpp-will-affect-you-and-your-digital-rights"&gt;https://www.eff.org/deeplinks/2015/12/how-tpp-will-affect-you-and-your-digital-rights&lt;/a&gt; (last visited Jul 7, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; Australian Privacy Foundation (APF), &lt;em&gt;Trans Pacific Partnership Agreement&lt;/em&gt; (2016), &lt;a href="https://www.privacy.org.au/Papers/Parlt-TPP-160310.pdf"&gt;https://www.privacy.org.au/Papers/Parlt-TPP-160310.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[12]&lt;/strong&gt; Greenleaf, Graham, "The TPP &amp;amp; Other Free Trade Agreements: Faustian Bargains for Privacy?," SSRN (2016), &lt;a href="http://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2732386"&gt;http://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2732386&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[13]&lt;/strong&gt; "GED-Project: Transatlantic Data Flows and Data Protection," GED Blog (2015), &lt;a href="https://ged-project.de/topics/competitiveness/transatlantic-data-flows-and-data-protection-the-state-of-the-debate/"&gt;https://ged-project.de/topics/competitiveness/transatlantic-data-flows-and-data-protection-the-state-of-the-debate/&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[14]&lt;/strong&gt; Geist, Michael, "The Trouble with the TPP, Day 14: No U.S. Assurances for Canada on Privacy," (2016), &lt;a href="http://www.michaelgeist.ca/2016/01/the-trouble-with-the-tpp-day-14-no-u-s-assurances-for-canada-on-privacy/"&gt;http://www.michaelgeist.ca/2016/01/the-trouble-with-the-tpp-day-14-no-u-s-assurances-for-canada-on-privacy/&lt;/a&gt; (last visited Jul 4, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[15]&lt;/strong&gt; Aaronson, Susan Ariel, "What does TPP mean for the Open Internet?" From &lt;em&gt;Policy Brief on Trade Agreements and Internet Governance Prepared for the Global Commission on Internet Governance&lt;/em&gt; (2015), &lt;a href="https://www.gwu.edu/~iiep/events/DigitalTrade2016/TPPPolicyBrief.pdf"&gt;https://www.gwu.edu/~iiep/events/DigitalTrade2016/TPPPolicyBrief.pdf&lt;/a&gt; (last visited Jul 5, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[16]&lt;/strong&gt; Lomas, Natasha, "TPP Trade Agreement Slammed For Eroding Online Rights," TechCrunch, &lt;a href="http://social.techcrunch.com/2015/11/05/tpp-vs-privacy/"&gt;http://social.techcrunch.com/2015/11/05/tpp-vs-privacy/&lt;/a&gt; (last visited Jun 30, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[17]&lt;/strong&gt; "Q&amp;amp;A: The Trans-Pacific Partnership," Human Rights Watch (2016), &lt;a href="https://www.hrw.org/news/2016/01/12/qa-trans-pacific-partnership"&gt;https://www.hrw.org/news/2016/01/12/qa-trans-pacific-partnership&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[18]&lt;/strong&gt; "TPP Full Text Released," People Over Politics (2015), &lt;a href="http://peopleoverpolitics.org/2015/11/07/tpp-just-as-bad-as-you-thought/"&gt;http://peopleoverpolitics.org/2015/11/07/tpp-just-as-bad-as-you-thought/&lt;/a&gt; (last visited Jul 7, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[19]&lt;/strong&gt; "Right to Privacy in Trans-Pacific Partnership (TPP ) Negotiations," Knowledge Ecology International, &lt;a href="http://keionline.org/node/1164"&gt;http://keionline.org/node/1164&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[20]&lt;/strong&gt; Asian Trade Centre, "E-Commerce and Digital Trade Proposals for RCEP (2016)," &lt;a href="http://static1.squarespace.com/static/5393d501e4b0643446abd228/t/575a654c86db438e86009fa1/1465541967821/RCEP+E-commerce+June+2016.pdf"&gt;http://static1.squarespace.com/static/5393d501e4b0643446abd228/t/575a654c86db438e86009fa1/1465541967821/RCEP+E-commerce+June+2016.pdf&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[21]&lt;/strong&gt; "E-commerce companies like Flipkart, Snapdeal to beef up data security to meet RCEP norms," The Economic Times, &lt;a href="http://economictimes.indiatimes.com//articleshow/49068419.cms"&gt;http://economictimes.indiatimes.com//articleshow/49068419.cms&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[22]&lt;/strong&gt; ECLI:EU:C:2015:650 (C -362/14)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[23]&lt;/strong&gt; King et al., "Privacy law, cross-border data flows, and the Trans Pacific Partnership Agreement: what counsel need to know," Lexology, &lt;a href="http://www.lexology.com/library/detail.aspx?g=b5c0b400-8161-4439-a4b7-131552ad5209"&gt;http://www.lexology.com/library/detail.aspx?g=b5c0b400-8161-4439-a4b7-131552ad5209&lt;/a&gt; (last visited Jul 4, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[24]&lt;/strong&gt; "U.S.-India Business Council Applauds Resumption of Cybersecurity Dialogue," U.S.-India Business Council (2015), &lt;a href="http://www.usibc.com/press-release/us-india-business-council-applauds-resumption-cybersecurity-dialogue"&gt;http://www.usibc.com/press-release/us-india-business-council-applauds-resumption-cybersecurity-dialogue&lt;/a&gt; (last visited Jul 5, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[25]&lt;/strong&gt; Sukumar, Arun Mohan, "India Is Coming up Against the Limits of Its Strategic Partnership With the United States," The Wire (2016), &lt;a href="http://thewire.in/40403/india-is-coming-up-against-the-limits-of-its-strategic-partnership-with-the-united-states/"&gt;http://thewire.in/40403/india-is-coming-up-against-the-limits-of-its-strategic-partnership-with-the-united-states/&lt;/a&gt; (last visited Jul 4, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[26]&lt;/strong&gt;  Countries – Google Transparency Report, &lt;a href="https://www.google.com/transparencyreport/userdatarequests/countries/"&gt;https://www.google.com/transparencyreport/userdatarequests/countries/&lt;/a&gt; (last visited Jul 8, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[27]&lt;/strong&gt; Sukumar, Arun Mohan, "A case for the Net’s Ctrl+Alt+Del," The Hindu, September 5, 2015, &lt;a href="http://www.thehindu.com/opinion/op-ed/a-case-for-the-nets-ctrlaltdel/article7616355.ece"&gt;http://www.thehindu.com/opinion/op-ed/a-case-for-the-nets-ctrlaltdel/article7616355.ece&lt;/a&gt; (last visited Jul 5, 2016).&lt;/p&gt;
&lt;h2 id="9"&gt;9. Author Profile&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Shubhangi Heda&lt;/strong&gt; is a Student of Jindal Global Law School, O.P Jindal Global University. She has completed her fourth year. She gives due importance to popular culture in her life and loves to read fiction and like to watch TV-shows, her favorite being 'White Collar'.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy'&gt;https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shubhangi Heda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Trans Pacific Partnership</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Free Trade Agreement</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    

   <dc:date>2016-07-12T07:56:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ciol-july-7-2016-india-may-not-be-guilty-of-opposing-un-move-to-save-internet-rights">
    <title>India may not be guilty of opposing UN move to save internet rights</title>
    <link>https://cis-india.org/internet-governance/news/ciol-july-7-2016-india-may-not-be-guilty-of-opposing-un-move-to-save-internet-rights</link>
    <description>
        &lt;b&gt;India is a democratic country, but the standards for freedom of expression promised to us—online and offline—are highly questionable, especially with online content being censured and comedians being threatened to be arrested for sedition.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was &lt;a class="external-link" href="http://www.ciol.com/india-may-not-be-guilty-of-opposing-un-move-to-save-internet-rights/"&gt;published by Ciol&lt;/a&gt; on July 7, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;So the media criticism came as no surprise when India supported the  amendments proposed by countries like China and Russia last week when  the United Nations Human Rights Council (UNHRC) passed a &lt;a href="http://www.ciol.com/internet-access-is-a-basic-human-right-un-resolution/" target="_blank"&gt;resolution&lt;/a&gt; on the “promotion, protection and enjoyment of human rights on the Internet”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to some media reports, countries like Russia, China, and  Saudi Arabia, as well as democracies like South Africa and India, called  for the UN to delete a passage in the resolution that ‘condemns  unequivocally measures to intentionally prevent or disrupt access to our  dissemination of information online’.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has also been struggling to draft a comprehensive privacy bill,  and most recently came out with a geospatial information regulation  bill that would establish ownership over all forms of location data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the fact that the resolution was adopted without a vote  (with oral revision)—as noted by the UNHRC—puts these news reports on a  faulty ground. So technically, India did not ‘vote against’ the  resolution. Moreover, none of the four amendments supported by India  called for the deletion of a passage that condemned the prevention or  disruption of Internet access and online information dissemination, as  noted by the Centre for Internet and Society. Although, India flouts the  said clause in spirit, back at home.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Out of the four amendments—L85-88 in the UNHRC resolution–the first  amendment (L85) sought to include a reference to fighting against the  exploitation of children online. This was withdrawn by Russia before it  was considered by member states. L86 can truly be described as diluting  language regarding freedom of expression online. L88 includes reference  to hate speech, asks to introduce a new paragraph that states “Expresses  its concern at the use of the Internet and information and  communications technology to disseminate ideas based on racial  superiority or hatred, and incitement to racial discrimination,  xenophobia, and related intolerance.” This amendment was proposed by  Belarus, China, Iran and the Russian Federation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering that the Internet and other online media technologies are  increasingly used for incitement and as a means of propagating  intolerance and xenophobia in India and other Asian countries, the  resolution does touch on an important issue. But it doesn’t seek to  limit internet freedom particularly.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ciol-july-7-2016-india-may-not-be-guilty-of-opposing-un-move-to-save-internet-rights'&gt;https://cis-india.org/internet-governance/news/ciol-july-7-2016-india-may-not-be-guilty-of-opposing-un-move-to-save-internet-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-09T02:58:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-week-anuj-srinivas-july-6-2016-india-no-haven-for-net-freedom-but-did-not-oppose-un-move-on-internet-rights">
    <title>India No Haven For Net Freedom But It Did Not Oppose UN Move on Internet Rights</title>
    <link>https://cis-india.org/internet-governance/news/the-week-anuj-srinivas-july-6-2016-india-no-haven-for-net-freedom-but-did-not-oppose-un-move-on-internet-rights</link>
    <description>
        &lt;b&gt;India hasn’t had the best record when it comes to Internet rights. The country regularly carries out Internet shutdowns under flimsy pretexts, is still fumbling when it comes to the drafting of a comprehensive privacy bill, and most recently came out with a geospatial information regulation bill that would establish ownership over all forms of location data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://thewire.in/49131/india-internet-resolution-freedom-rights-vote/"&gt;The article by Anuj Srinivas was published in the Wire on July 6, 2016&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;So, last week, when the United         Nations Human Rights Council (UNHRC)&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=20226&amp;amp;LangID=E" rel="external nofollow" target="_blank" title="passed"&gt;passed&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;a resolution on the         “promotion, protection and enjoyment of human rights on the         Internet”, it wasn’t surprising to see the wave of media         criticism of the amendments that were proposed by countries such         as China and Russia – and which were supported by India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;South Africa’s &lt;i&gt;Mail &amp;amp; Guardian&lt;/i&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://mg.co.za/article/2016-07-04-sa-votes-against-internet-freedoms-in-un-resolution" rel="external nofollow" target="_blank" title="ran "&gt;ran&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;a story headlined         “South Africa votes with China, Russia and India against         Internet freedoms in UN resolution”. &lt;i&gt;Private Internet           Access’s &lt;/i&gt;&lt;a href="https://www.privateinternetaccess.com/blog/2016/07/these-17-countries-dont-believe-that-freedom-of-expression-on-the-internet-is-a-human-right/" rel="external nofollow" target="_blank" title="headline"&gt;headline&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;was “These 17 Countries         Don’t Believe that Freedom of Expression on the Internet is a         Human Right”. Popular tech website &lt;i&gt;The Verge&lt;/i&gt; &lt;a href="http://www.theverge.com/2016/7/4/12092740/un-resolution-condemns-disrupting-internet-access" rel="external nofollow" target="_blank" title="noted"&gt;noted&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;that the resolution was         opposed “by a minority of authoritarian regimes including         Russia, China and Saudi Arabia, as well as democracies like         South Africa and India. These nations called for the UN to         delete a passage in the resolution that ‘condemns unequivocally         measures to intentionally prevent or disrupt access to our         dissemination of information online’.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Verge&lt;/i&gt;‘&lt;i&gt;s &lt;/i&gt;report was followed up         by a number of Indian publications including &lt;i&gt;&lt;a href="http://indiatoday.intoday.in/technology/story/un-seeks-to-make-web-access-human-right-india-joins-saudi-arabia-in-opposing-it/1/707353.html" rel="external nofollow" target="_blank" title="IndiaToday"&gt;IndiaToday&lt;/a&gt; &lt;/i&gt;and &lt;i&gt;&lt;a href="http://www.medianama.com/2016/07/223-right-to-internet-un-resolution/" rel="external nofollow" target="_blank" title="Medianama"&gt;Medianama&lt;/a&gt; – &lt;/i&gt;the         latter incorrectly stating that the UNHRC resolution “recognised         Internet usage as a basic human right – as well a host of other&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="https://www.privateinternetaccess.com/blog/2016/07/these-17-countries-dont-believe-that-freedom-of-expression-on-the-internet-is-a-human-right/" rel="external nofollow" target="_blank" title="global           publications"&gt;global publications&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The facts&lt;/b&gt;&lt;br /&gt; There were two fundamental mistakes with some of these reports.         Firstly, the resolution was adopted without vote (with oral         revision) &lt;a href="http://tion%20which%20recognized%20internet%20usage%20as%20a%20basic%20human%20right./" rel="external nofollow" target="_blank" title="as noted"&gt;as noted&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;by the UNHRC. Therefore,         while there were a number of countries which co-sponsored the         resolution and many that didn’t, it is completely wrong to state         that India – as the&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;i&gt;Mail           &amp;amp; Guardian &lt;/i&gt;reported – or any other country, voted         against the resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondly, as&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="https://twitter.com/pranesh/status/750257769844871168" rel="external nofollow" target="_blank" title="noted"&gt;noted&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;by the Centre for         Internet and Society, none of the four amendments supported by         India called for the deletion of a passage that condemned the         prevention or disruption of Internet access and online         information dissemination. Although it may fit neatly within         India’s history of issuing Internet block orders, no country was         opposed to this paragraph at the UNHRC forum (although many         countries including India flout this clause in spirit back at         home). No such amendment was proposed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What then were these four amendments, which &lt;i&gt;Article           19&lt;/i&gt;, an organisation that advocates freedom of expression,&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="https://www.article19.org/resources.php/resource/38428/en/unhrc:-reject-attempts-to-weaken-resolution-on-human-rights-and-the-internet" rel="external nofollow" target="_blank" title="stated "&gt;stated&lt;/a&gt;would         “substantially weaken the resolution”? Out of the four         amendments (referred to as L85-88 in the UNHRC resolution), the         first amendment (L85) – which sought to include a reference to         fighting against the exploitation of children online – was         withdrawn by Russia before it was considered by member states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other three amendments, while not completely         endorsed by the countries that co-sponsored the resolution, do         carry a certain level of nuance. Only one of the amendments         (L86) can truly be described as diluting language regarding         freedom of expression online, although this could have been         potentially a result of procedural politics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;L88: Including Reference to Hate Speech&lt;/b&gt;&lt;br /&gt; This amendment – proposed by Belarus, China, Iran and the         Russian Federation – asks to introduce a new paragraph that         states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Expresses its concern at the use of the         Internet and information and communications technology         to disseminate ideas based on racial superiority or hatred, and         incitement to racial discrimination, xenophobia and related         intolerance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Article 19&lt;/i&gt; &lt;a href="https://www.article19.org/resources.php/resource/38428/en/unhrc:-reject-attempts-to-weaken-resolution-on-human-rights-and-the-internet" rel="external nofollow" target="_blank" title="says of this           amendment"&gt;says of this           amendment&lt;/a&gt; that it would “undermine the intended focus of         the draft resolution on protecting human rights online, in         particular freedom of expression..” While it is true that a few         paragraphs of the resolution’s preamble include a reference to         hate speech, it is difficult to see what harm this amendment         would have brought in and even more difficult to accept that it         would dilute the focus of the overall resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Using the Internet and other online media technologies         for incitement and as&lt;a href="http://www.bbc.com/news/world-asia-india-19292572" rel="external nofollow" target="_blank" title=" a means "&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;a means&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;of propagating         intolerance and xenophobia is a very real problem in India and         other Asian countries, the most notable example of which was the         role that social media played in the exodus of north-east Indian         migrants from Bangalore four years ago. While shutdowns are         obviously not the best way of dealing with this, it is important         to acknowledge the role of the Internet as a medium in this         aspect. In sum, this amendment certainly would not have diluted         the resolution’s aim of promoting freedom of expression online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;L87: Human-Rights Approach&lt;/b&gt;&lt;br /&gt; The second amendment replaces the term “human rights-based         approach” with “comprehensive and integrated approach” in  two         paragraphs on expanding Internet access:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;PP17: &lt;/span&gt;&lt;span&gt;Stressing the importance of applying           a&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;comprehensive           and integrated&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/b&gt;(&lt;span&gt;human rights-based&lt;/span&gt;&lt;span&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;approach)           in providing and expanding access to the Internet and for the           Internet to be open, accessible and nurtured by           multistakeholder participation,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;OP5: &lt;/span&gt;&lt;span&gt;Affirms also the importance of           applying a&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;comprehensive           and integrated&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/b&gt;(&lt;span&gt;human rights-based&lt;/span&gt;&lt;span&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;approach)           in providing and in expanding access to Internet and requests           all States to make efforts to bridge the many forms of digital           divides..&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This amendment was a little trickier. According to         people involved in the country stakeholder discussions, whom &lt;i&gt;The           Wire&lt;/i&gt;spoke with, the aversion to a ‘human-rights’ approach         towards expanding Internet access came as a result of China and         Russia playing procedural politics. The language that was         proposed in the amendment – “comprehensive and integrated” –         while certainly not the strongest possible language that could         have been used, would not have legally diluted the proposal to         expand Internet access while maintaining an open and         multistakeholder approach towards Internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Stepping back, what would a human rights-based         approach in expanding Internet access look like? Would it         include legitimising the act of zero-rating and the approval of         schemes such as Facebook’s Free Basics? Both of which,         incidentally, have been banned in India. While the proposed         amendment certainly does not speak well of the motivations of         China, Russia and India, the term is also vague enough that its         mere removal doesn’t indicate a lack of support towards Internet         freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;L88 – Right to privacy and removal of UDHR           reference&lt;/b&gt;&lt;br /&gt; This amendment, proposed by China and the Russian Federation,         was more straightforward. In two paragraphs, it sought to add         the specific term ‘right to privacy’, while in another paragraph         it proposed removing reference to language from, and articles         in, the&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://www.un.org/en/universal-declaration-human-rights/" rel="external nofollow" target="_blank" title="Universal           Declaration of Human Rights"&gt;Universal           Declaration of Human Rights&lt;/a&gt;.  Had the amendment been         passed, the changes in the following paragraphs would have been         made:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;PP7: &lt;/span&gt;&lt;i&gt;&lt;span&gt;Noting&lt;/span&gt;&lt;/i&gt;&lt;span&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;that           the exercise of human rights, in particular the right to           freedom of expression&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;and           the right to privacy&lt;/b&gt;&lt;span&gt;, on           the Internet is an issue of increasing interest and importance           as the rapid pace of technological development enables           individuals all over the world to use new information and           communication technologies,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;OP15: &lt;/span&gt;&lt;i&gt;&lt;span&gt;Decides&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt;to continue its consideration of the           promotion, protection and enjoyment of human rights, including           the right to freedom of expression&lt;/span&gt;&lt;b&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;and the right to           privacy&lt;/b&gt;&lt;span&gt;, on the Internet           and other information and communication technology, as well as           of how the Internet can be an important tool for fostering           citizen and civil society participation, for the realisation           of development in every community and for exercising human           rights, in accordance with its programme of work.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;OP1: &lt;/span&gt;&lt;i&gt;&lt;span&gt;Affirms&lt;/span&gt;&lt;/i&gt;&lt;span&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;that           the same rights that people have offline must also be           protected online, in particular freedom of expression&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;del&gt;which is applicable regardless             of frontiers and through any media of one’s choice&lt;/del&gt;, &lt;/span&gt;&lt;b&gt;and           the right to privacy &lt;/b&gt;&lt;span&gt;in           accordance with articles&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;17           and&lt;/b&gt;&lt;span&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;19 of the&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;del&gt;Universal Declaration of Human             Rights and the&lt;/del&gt; &lt;/span&gt;&lt;span&gt;&lt;a href="http://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx" rel="external nofollow" target="_blank" title="International             Covenant on Civil and Political Rights;"&gt;International Covenant on Civil and             Political Rights;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On one hand, this amendment would have added specific         reference to the right to privacy. That specific term doesn’t         appear in the draft resolution, although there are a few         references to privacy in general in the resolution’s preamble.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the addition of a ‘right to privacy’ is         coupled with a watering down of clear references to the         protection of freedom of expression.   Cynical observers would         rightly note that China and Russia are probably less concerned         with online privacy and more irked with the clear support of         freedom of expression “regardless of frontiers” and “in         accordance with the Universal Declaration of Human Rights”;         which is probably why this particular proposed amendment         combined both issues to improve its chances of passing. While         there is little doubt that this amendment would have diluted the         resolution’s focus on protecting freedom of expression, the         alternative phrasing also doesn’t create legal loopholes that         renders it useless. Moreover, it still contains reference to the         International Covenant on Civil and Political Rights, especially         Article 19, which goes beyond Article 19 of the UDHR .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;India, a guardian?&lt;/b&gt;&lt;br /&gt; It would be naive and wrong to take a strong position either         way. To state that the amendments supported by India are         all antithetical to the spirit of the UNHRC resolution, as some         have done, is simply incorrect. On the other hand, this doesn’t         mean India, and even less, China and Russia, are guardians of         Internet freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UNHRC resolution in its entirety&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://www.un.org/ga/search/view_doc.asp?symbol=A/HRC/32/L.20" rel="external nofollow" target="_blank" title="is a fine           document"&gt;is a fine document&lt;/a&gt;.         While non-binding, it provides a foundation for claiming that         the same rights people have offline “must also be protected         online”. Other crucial sections state that governments “should         ensure accountability for all human rights violations and abuses         committed against persons for exercising their human rights         online”, while condemning “measures to intentionally prevent or         disrupt access to or dissemination of information online”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the amendments India supported may not wholly         oppose this resolution, it is also true that successive Indian         governments also do not have an admirable track-record         of upholding the resolution’s aims. Freedom for online speech         had to be reclaimed in the form of court judgements, with the         current government&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://www.newslaundry.com/2016/03/28/is-section-66a-coming-back/" rel="external nofollow" target="_blank" title="still           supporting regulations"&gt;still           supporting regulations&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;that         would allow it clamp down on online freedom of expression. In         certain states within the country, Internet shutdowns happen         without public explanations or justifiable reasoning. Over the         last four years, for instance, Jammu and Kashmir&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://thewire.in/29857/jammu-kashmir-has-lost-18-days-of-mobile-internet-access-over-last-four-years/" target="_blank" title="has lost"&gt;has           lost&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;18 days of         Internet access. While it may not have wholly opposed the UNHRC         resolution, the country still has a ways to go in terms of         Internet freedom.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-week-anuj-srinivas-july-6-2016-india-no-haven-for-net-freedom-but-did-not-oppose-un-move-on-internet-rights'&gt;https://cis-india.org/internet-governance/news/the-week-anuj-srinivas-july-6-2016-india-no-haven-for-net-freedom-but-did-not-oppose-un-move-on-internet-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-07-09T02:25:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-now-july-8-2016-flashpoint-troll-control-maneka-versus-ncw">
    <title>Flashpoint #TrollControl: Maneka versus NCW</title>
    <link>https://cis-india.org/internet-governance/news/times-now-july-8-2016-flashpoint-troll-control-maneka-versus-ncw</link>
    <description>
        &lt;b&gt;Amidst the debate over controlling online trolls - the proposal by Union Women and Child Development Minister to curb violence against women on the internet has triggered a fight between the minister and the National Commission for Women (NCW). &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While Maneka Gandhi asked the NCW to monitor the internet to control trolls against women - NCW Chief Lalitha Kumaramangalam questioning the feasibility of the Minister's proposal, saying the internet is too big a space to be monitored. Sunil Abraham was interviewed. Times Now Television interviewed Sunil Abraham on this. &lt;strong&gt;&lt;a class="external-link" href="http://www.timesnow.tv/videoshow/4491210.cms"&gt;Watch the video here&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-now-july-8-2016-flashpoint-troll-control-maneka-versus-ncw'&gt;https://cis-india.org/internet-governance/news/times-now-july-8-2016-flashpoint-troll-control-maneka-versus-ncw&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-09T02:11:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/catch-news-asad-ali-july-3-2016-fb-and-google-have-already-monopolised-indian-cyberspace">
    <title>FB &amp; Google have already monopolised Indian cyberspace</title>
    <link>https://cis-india.org/internet-governance/news/catch-news-asad-ali-july-3-2016-fb-and-google-have-already-monopolised-indian-cyberspace</link>
    <description>
        &lt;b&gt;In an interview with Catch, Sunil Abraham, executive director of Center for Internet &amp; Society, puts the recent US-India cyber relationship framework into perspective. Abraham also talks about how Indian surveillance policies are outdated and why the country has failed to check the hegemonic tendencies of companies like Facebook and Google.&lt;/b&gt;
        &lt;p&gt;The &lt;a class="external-link" href="http://www.catchnews.com/science-technology/fb-google-have-already-monopolised-indian-cyberspace-1467505123.html/fullview"&gt;interview was published by Catch News&lt;/a&gt; on July 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy6_of_Sunil.png/@@images/d7f757de-b4fc-46a2-a9b3-cca0e46e32e7.png" alt="Sunil Abraham" class="image-inline" title="Sunil Abraham" /&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="quick_pill_news_description"&gt;US-India signed a cyber  relationship framework earlier this month.  Could you explain some of  the takeouts that may have important  implications in the near future?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the framework, both sides have made a "commitment to the multi-stakeholder model of Internet governance" - in immediate practical terms that means India will accept the Internet Assigned Numbers Authority (IANA) transition proposed for the Internet Corporation for Assigned Names and Numbers (ICANN). Unfortunately, as my colleague Pranesh Prakash points out "U.S. state control over the core of the internet's domain name system is not being removed by the transition that is currently underway."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India along with Brazil and other emerging powers should have insisted that the question of jurisdiction be addressed before the transition. We must remember, that the multi-stakeholder model is just a fancy name for open and participatory self-regulation by the private sector. While the multi-stakeholder model is useful as a complement to traditional state-led regulation, it cannot be used to protect human rights or ensure the security of a nation state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[That is precisely why - the very next sentence in the announcement for the the framework for the US-India Cyber Relationship says "a recognition of the leading role for governments in cyber security matters relating to national security". This is because ICANN-style multistakeholderism requires all stakeholders to be on "equal footing" without "distinct roles and responsibilities". In other words, the governments are saying that the multistakeholder model is fine for all Internet Governance areas with the exception of Cyber Security. Given the limits of the multistakeholder model this is indeed the wise thing to do. Since American corporations dominate the Internet, US foreign policy has historically pushed for the multistakeholder model as fig leaf for forbearance and reduced foreign regulatory burden American corporations operating in other jurisdictions. Therefore India must not drink the multistakeholder cool-aid whole sale. It cannot afford a laissez-faire approach where it waits for corporations to self-regulate - it must regulate whenever public interest or human rights are harmed. In other words, it must go beyond the multistakeholder model and produce appropriate regulation where necessary. Needless to add - it must also deregulate in areas where harms don't exist. Apart from this many of the details of the announcement are positive steps that will increase security in India and the USA, and indeed the also across the world.]&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="quick_pill_news_description"&gt;What are some aspects of Intellectual Property Rights that should be looked at, in the context of the framework?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There is some language around Intellectual Property Rights (IPR) that should be examined carefully too. The US corporations benefit from a maximalist IP regime. But Make in India, Digital India and Startup India all depend on flexibilities to the IP regime and therefore India should refuse signing. Trans-Pacific Partnership (TPP) obligations like the "Digital 2 Dozen" which the US is actively proselytizing across the Pacific. If we make that mistake, we will make zero progress in indigenous security research and product development and also many other areas of our economy, health sector and education sector will be severely compromised. Therefore it would be best to keep IP rights expansion and enforcement out of the framework for the US-India Cyber Relationship.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="quick_pill_news_description"&gt;The PIL seeking a ban on  WhatsApp was refused by the SC recently.  Encrypted messaging services  like Telegram however, have been used in  the past by terror groups.  What's your take on such end-to-end  encryption services?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Privacy and security are two sides of the same coin. You cannot have one without the other. End-to-end encryption is the basis for online privacy. End-to-end encryption is a pre-requisite for many legitimate actions of law abiding citizens online such as commerce, banking, tele-medicine, protection of intellectual property, witness/source protection, client confidentiality etc. Therefore, banning end-to-end encryption would mean the death of individual privacy and national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the government wants to promote cyber security it should promote the use of end-to-end encryption amongst law abiding citizens.&lt;br /&gt;&lt;br /&gt;Terrorist have to be stopped through targeted profiling, surveillance and interception. Big data analytics may be useful to watch for patterns in the meta data but there is no replacement for good old fashioned police work.&lt;br /&gt;&lt;br /&gt;Once suspects have been identified the encrypted channels can be compromised by:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Placing trojans on the end-user devices&lt;/li&gt;
&lt;li&gt;Performing man-in-the-middle attacks and&lt;/li&gt;
&lt;li&gt;Using brute force attacks with super computers.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;Snowden's revelations have made it very clear that blanket and mass surveillance does not help foil terror attacks or stop organised crime. So far, research and government reports from across the world indicate that only a minority of terrorists use encryption. However, this situation may change.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;We don't have any proper encryption policy under the IT Act yet. What's taking so long and what are the key points that any policy in this matter must include in future?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We need many different types of encryption policies. We need a policy that mandates encryption and digital signature for all government personnel and also for all government transactions. We need policies that promote research and development in cryptography and mathematics. We need to update our criminal procedure code so that encrypted communications and data can be targeted by law enforcement and used effectively in the criminal justice process.&lt;/p&gt;
&lt;p&gt;However, we should not have any broad encryption policy that tries to regulate encryption as a technology. That would be a highly regressive move and will be impossible to enforce. That would breed contempt for rule of law.&lt;/p&gt;
&lt;h3&gt;Surveillance and the  tech around it has been contentious for various  governments. Where do  we stand vis-a-vis regulating surveillance  measures by the state?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Our   surveillance and interception laws are outdated. They need to be   modernized to deal with advancements in technology and also global   developments when it comes to data protection and privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In   fact, our organisation was part of a global effort called Necessary and   Proportionate which identified 13 principles to modernise surveillance   which are connected to various aspects such as Legality, Legitimate  aim,  Competent judicial authority, Integrity of communications and  systems  and more. Some of these principles may have to be customised  for the  Indian context. [For example, given the load on courts perhaps India should stay with executive authorization of interceptions and data access requests. However, getting the law correct is only half the job. For the law cannot fix what the technology has broken. Some surveillance projects are well designed. For ex. the NATGRID - from what I understand it is a standard and platform that which will allow 12 security, intelligence and law enforcement agencies to temporarily make unions of sub-sets of 21 data sources. These automated temporary databases will be created under existing data access provisions of the law. I also hope the NATGRID is also using cryptography to ensure the maintenance of a non-repudiable log that will identify all officers involved in authorizing the each request and accessing the resultant data. Unfortunately, other surveillance projects are unmitigated disasters. For example, UID or Aadhaar. Many Indians don't realize that Aadhaar is a surveillance project. Biometrics is just a fancy name for remote, covert and non-consensual identification technology. Using the UID database the government can identify every single Indian without their consent. The so called "consent layer" in the India Stack is being developed by volunteers outside the UIDAI to avoid transparency under the Right to Information Act. Nothing in the current layer of the "consent layer" allows citizens to revoke consent. There is no facility in the UID Act to delete yourself from the database. Identity information aka the UID number and authentication information aka your biometrics for about a billion Indians have been collected and stored in a centralized location. It is as if our parliamentarians have written an open letter to criminals and foreign governments says "here is the information you need to wreck whole sale damage - come and get it". Hopefully the Supreme Court will save us from this impending disaster.]&lt;/p&gt;
&lt;h3&gt;With a sluggish US market, India has  the biggest potential for  companies like FB &amp;amp; Google, next only to  China. Do you feel that in  the quest to take over the Indian market, FB  &amp;amp; Google are going to  monopolise cyberspace in India?&lt;/h3&gt;
&lt;p&gt;I   have news for you - they have already monopolised Indian cyberspace.   They have completely wiped out competition in certain domains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One   of the many reasons they have done this is because we don't have laws   and regulations to temper their hegemonic tendencies. For example, we   could use data portability and interoperability mandates for social   media to spark competition in markets where there are entrenched  monopolies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Competition  law can be used to protect other firms  from abuse of market power.  Consumer protection law and privacy law  could be used to ensure that  user's rights are not compromised in the  race for market share. In  addition, a modern privacy law compliant with  the best practices in the  European Data Protection Regulation 2016,  would allow emerging Indian  companies to compete with giants like  Facebook and Google on a level  playing field. [Speaking of level playing field - only recently has the government introduced the "equalization levy". This was long overdue. Imagine the amount of tax that could have been collected so far and damage that has been done to competition. Regardless the current NDA government deserves our kudos for ensuring that Facebook and Google contribute their fair share of taxes. The new IPR Policy was also an opportunity to address the monopoly of Google and Facebook. There should have been a concerted attempt to use free/open source software, open standard and open content to bolster Indic language technologies. A billion dollars from every spectrum auction should be used to create incentives for Indian private sector, research and academic organisation who can contribute openly to the Indic cyberspace. This is the market where we can still build a highly competitive market. Today, given government inaction - millions of Indians are training Google's language platforms every time they use machine translation or speech to text technologies. This corpus of information will not be available for public interest research. Ideally we should also have Indians contributing to commons-based peer production projects like Wikipedia for their Indic language needs. Unfortunately the government totally missed this opportunity.]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/catch-news-asad-ali-july-3-2016-fb-and-google-have-already-monopolised-indian-cyberspace'&gt;https://cis-india.org/internet-governance/news/catch-news-asad-ali-july-3-2016-fb-and-google-have-already-monopolised-indian-cyberspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Google</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-08T15:59:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development">
    <title>Big Data Governance Frameworks for 'Data Revolution for Sustainable Development'</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development</link>
    <description>
        &lt;b&gt;A key component of the process to achieve the Sustainable Development Goals is the call for a global 'data revolution' to better understand, monitor, and implement development interventions. Recently there has been several international proposals to use big data, along with reconfigured national statistical systems, to operationalise this 'data revolution for sustainable development.' This analysis by Meera Manoj highlights the different models of collection, management, sharing, and governance of global development data that are being discussed.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.&lt;/strong&gt; &lt;a href="#1"&gt;What are the Sustainable Development Goals?&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.&lt;/strong&gt; &lt;a href="#2"&gt;The Need for a Data Revolution&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.&lt;/strong&gt; &lt;a href="#3"&gt;Big Data: Characteristics and Use for Development&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.&lt;/strong&gt; &lt;a href="#3-1"&gt;Characteristics of Big Data&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.&lt;/strong&gt; &lt;a href="#3-2"&gt;Using Big Data for Development&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;4.&lt;/strong&gt; &lt;a href="#4"&gt;Sustainable Development and Data Rights&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.&lt;/strong&gt; &lt;a href="#5"&gt;Governance Frameworks Proposed&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.1.&lt;/strong&gt; &lt;a href="#5-1"&gt;UN Sustainable Development Solutions Network&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.2.&lt;/strong&gt; &lt;a href="#5-2"&gt;The UN DATA Revolution Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.3.&lt;/strong&gt; &lt;a href="#5-3"&gt;Organization for Economic Co-Operation and Development&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.4.&lt;/strong&gt; &lt;a href="#5-4"&gt;The Global Partnership for Sustainable Development of Data&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.5.&lt;/strong&gt; &lt;a href="#5-5"&gt;The World Economic Forum (WEF)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.6.&lt;/strong&gt; &lt;a href="#5-6"&gt;Dr. Julia Lane - A Quadruple Data Helix&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.7.&lt;/strong&gt; &lt;a href="#5-7"&gt;Data Pop Alliance&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;6.&lt;/strong&gt; &lt;a href="#6"&gt;Conclusion&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;7.&lt;/strong&gt; &lt;a href="#7"&gt;Endnotes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;8.&lt;/strong&gt; &lt;a href="#8"&gt;Author Profile&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Speaking on Big Data, Dan Ariely commented that, "&lt;em&gt;Everyone talks about it, nobody really knows how to do it, and everyone thinks everyone else is doing it, so everyone claims they are doing it&lt;/em&gt;" &lt;strong&gt;[1]&lt;/strong&gt;. This offers a useful insight into the lack of adequate discourse on the kind of governance and accountability frameworks that are needed to facilitate the developmental, sustainable, and responsible uses of big data.&lt;/p&gt;
&lt;p&gt;In light of the recent international proposals to use big data to track the Sustainable Development Goals, this paper highlights the different models of management, sharing, and governance of data that are being discussed, and concurrently, how they conceptualise the various rights around big data and how are they to be protected.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="1"&gt;1. What are the Sustainable Development Goals?&lt;/h2&gt;
&lt;p&gt;The Sustainable Development Goals, otherwise known as the Global Goals, build on the Millennium Development Goals (MDGs). Adopted on 1 January 2016, these universally applicable 17 goals  of the 2030 Agenda for Sustainable Development, seek to end all forms of poverty, fight inequalities, tackle climate change and address a range of social needs like education, health, social protection and job opportunities over the next 15 years &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_un-sdg.png" alt="Sustainable Development Goals" /&gt;
&lt;h6&gt;Source: UN Data Revolution Group, &lt;em&gt;&lt;a href="http://www.undatarevolution.org/wp-content/uploads/2014/12/A-World-That-Counts2.pdf"&gt;A World that Counts&lt;/a&gt;&lt;/em&gt;, 2014, p.12.&lt;br /&gt;&lt;/h6&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="2"&gt;2. The Need for a Data Revolution&lt;/h2&gt;
&lt;p&gt;An overwhelming cause of concern regarding the precursor to the SDGs, the MDGs, is the data unavailability to monitor their progress. For instance, the figure below indicates that there is no five-year period when the availability of MDG related data is more than 70% of what is required. Entire groups of people and key issues remain invisible &lt;strong&gt;[3]&lt;/strong&gt;. Lack of data is not only a problem for global statisticians, but also for people whose needs and demands remain invisible due to lack of quantitative representation of the same. For instance, the incidences of gender related crimes when not recorded could lead to a misconception on the achievement of the MDG of gender equality.&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_undrg_mdg-data.png" alt="UN Stats - Percentage of MDG data currently available for developing countries by nature of source." /&gt;
&lt;h6&gt;Source: UN, &lt;a href="http://i0.wp.com/www.un.org/sustainabledevelopment/wp-content/uploads/2015/12/english_SDG_17goals_poster_all_languages_with_UN_emblem_1.png"&gt;Sustainable Development Goals&lt;/a&gt;.&lt;br /&gt;&lt;/h6&gt;
&lt;p&gt;As the new goals (SDGs) cover a wider range of issues it is clear that a far higher level of detail is required. To this effect the High-Level Panel of Eminent Persons on the post-2015 agenda has called for a "data revolution for sustainable development" &lt;strong&gt;[4]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The world is experiencing a Data Revolution and a "data deluge." One estimate has it that 90% of the data in the world has been created in the last 2 years. As Eric Schmidt of Google in 2010 famously said, "&lt;em&gt;There were 5 exabytes of information created between the dawn of civilization through 2003, but that much information is now created every 2 days&lt;/em&gt; &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In its report &lt;em&gt;A World that Counts&lt;/em&gt;, the UN Data Revolution Group defines the data revolution as an explosion in the volume of data, the speed with which data are produced, the number of producers of data, the dissemination of data, and the range of things on which there is data, coming from new technologies such as mobile phones and the “internet of things”, and from other sources, such as qualitative data, citizen-generated data and perceptions data &lt;strong&gt;[6]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;This data revolution in the context of sustainable development has been defined by the UN Secretary General’s Independent Expert Advisory Group (IEAG) as follows:&lt;/p&gt;
&lt;blockquote&gt;[T]he integration of data coming from new technologies with traditional data in order to produce relevant high‐quality information with more details and at higher frequencies to foster and monitor sustainable development. This revolution also entails the increase in accessibility to data through much more openness and transparency, and ultimately more empowered people for better policies, better decisions and greater participation and accountability, leading to better outcomes for the people and the planet &lt;strong&gt;[7]&lt;/strong&gt;.&lt;/blockquote&gt;
&lt;p&gt;The majority of such “data coming from new technologies” is what can be called big data. It  is data being generated in real-time, in high velocity and volume, in a variety of forms and formats, and on an increasing range of phenomenon that are being mediated by digital technologies – from governance to human communication. Further, a good part of such big data is not about the content of the phenomenon concerned but about its process – for example, Call Detail Records are generated for each mobile phone call a person makes and it contains data about the process of the call (time, location, duration, recipient, etc.) but not about the content of the call. Big data about various governmental and human processes are becoming a crucial instrument for documenting and monitoring of the same.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="3"&gt;3. Big Data: Characteristics and Use for Development&lt;/h2&gt;
&lt;h3 id="3-1"&gt;3.1. Characteristics of Big Data&lt;/h3&gt;
&lt;p&gt;The simplest definition of big data is that it is a dataset of more than 1 petabyte. The US Bureau of Labour Statistics terms it to be non-sampled data, characterized by the creation of databases from electronic sources whose primary purpose is something other than statistical inference &lt;strong&gt;[8]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The characteristics which broadly distinguish Big Data are sometimes called the “3 V’s”: more volume, more variety and higher rates of velocity &lt;strong&gt;[9]&lt;/strong&gt;. Big data sources generally share some or all of these features &lt;strong&gt;[10]&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Digitally generated,&lt;/li&gt;
&lt;li&gt;Passively produced,&lt;/li&gt;
&lt;li&gt;Automatically collected,&lt;/li&gt;
&lt;li&gt;Geographically or temporally trackable, and&lt;/li&gt;
&lt;li&gt;Continuously analysed.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Increasingly, Big Data is recognised as creating "new possibilities for international development" &lt;strong&gt;[11]&lt;/strong&gt;. It could provide faster, cheaper, more granular data and help meet growing and changing demands. It was claimed, for example, that "&lt;em&gt;Google knows or is in a position to know more about France than INSEE&lt;/em&gt;" &lt;strong&gt;[12]&lt;/strong&gt;, its highly resourceful national statistical agency. To illustrate, Global Pulse gives the example of a hypothetical small household facing soaring commodity prices, particularly food and fuel &lt;strong&gt;[13]&lt;/strong&gt;. They have the options of:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Getting part of their food at a nearby World Food Programme distribution centre,&lt;/li&gt;
&lt;li&gt;Reducing mobile usage,&lt;/li&gt;
&lt;li&gt;Temporarily taking their children out of school,&lt;/li&gt;
&lt;li&gt;Calling a health hotline when children show signs of malnutrition related diseases, and&lt;/li&gt;
&lt;li&gt;Venting about their frustration on social media.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Such a systemic shock of food insecurity will prompt thousands of households to react in roughly similar ways. These collective behavioural changes may show up in different digital data sources:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;WFP might record that it serves twice as many meals a day,&lt;/li&gt;
&lt;li&gt;The local mobile operator may see reduced usage,&lt;/li&gt;
&lt;li&gt;UNICEF data may indicate that school attendance has dropped,&lt;/li&gt;
&lt;li&gt;Health hotlines might see increased volumes of calls reporting malnutrition, and&lt;/li&gt;
&lt;li&gt;Tweets mentioning the difficulty to “afford food” might begin to rise.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Thus the power of real-time, digital data to predict paths for development is immense. Amassing such a large volume of data which tracks practically every aspect of social behavious can revolutionize the field of official statistics and policy making.&lt;/p&gt;
&lt;p&gt;Two points to be noted are: 1) all these data sources are not available for comparison in the real-time by default, so one task before using big data in developmental work is to make data from different sources available across agencies and make them comparable, and 2) finding repeating patterns within large data sets, sourced from varied origins, can not only allow for monitoring but also (statistically) predicting future possibilities and implications for development action.&lt;/p&gt;
&lt;h3 id="3-2"&gt;3.2. Using Big Data for Development&lt;/h3&gt;
&lt;p&gt;There are several international organizations attempting to use such data.&lt;/p&gt;
&lt;p&gt;Global Pulse, a United Nations initiative, launched by the Secretary-General in 2009, seeks to leverage innovations in digital data, rapid data collection and analysis to help decision-makers gain a real-time understanding of how crises impact vulnerable populations. To this end, Global Pulse is establishing an integrated, global network of Pulse Labs, anchored in Pulse Lab New York, to pilot the approach at country level &lt;strong&gt;[14]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The Global Working Group on Big Data for Official Statistics, created in May 2014, pursuant to Statistical Commission, makes an inventory of ongoing activities and examples regarding the use of big data, addresses concerns related to methodology, human resources, quality and confidentiality, and develops guidelines on classifying various types of big data sources &lt;strong&gt;[15]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;There have been applications even on a national and individual level. For instance, in 2013, various sources reported that the CIA had admitted to the “full monitoring of Facebook, Twitter, and other social networks” to identify links between events and sequences or paths leading to national security threats, ultimately leading to forecasting future activities and events &lt;strong&gt;[16]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In the field of conflict prevention is the emerging applications to map and analyse unstructured data generated by politically active Internet use by academics, activists, civil society organizations, and even general citizens. In reference to Iran’s post-election crisis beginning in 2009, it is possible to detect web-based usage of terms that reflect a general shift from awareness towards mobilization, and eventually action within the population &lt;strong&gt;[17]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The "Big Data, Small Credit" report proposes that financial inclusion can be promoted by allowing consumers with mobile phones to access credit formally as customers &lt;strong&gt;[18]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;At a national level, the biggest challenge for most big data projects is the limited or restricted access the government agencies have to potential big data sets owned by the private sector &lt;strong&gt;[19]&lt;/strong&gt;. The overall consensus is that Big Data to track SDGs must complement traditional data sources &lt;strong&gt;[20]&lt;/strong&gt;. This is because big data may not always be available for the entire population, or include a diverse enough sample of the population. Moreover most big data projects measure development indicators through a correlation which may not always be correct unlike official data. For instance big data might help in predicting lowered household income through reducing mobile bills while traditional data directly collects income statistics.&lt;/p&gt;
&lt;p&gt;In a survey by the Global Working Group on Big Data for Official Statistics &lt;strong&gt;[21]&lt;/strong&gt;, it was found that only a few countries have developed a long-term vision for the use of big data, while many are formulating a big data strategy.  Most countries have not yet defined business processes for integrating big data sources and results into their work and do not have a defined structure for managing big data projects.&lt;/p&gt;
&lt;p&gt;Thus there exists a need to identify a governance framework for big data for sustainable development, not only at national level, but also at the international level.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="4"&gt;4. Sustainable Development and Data Rights&lt;/h2&gt;
&lt;p&gt;Any discussion on governance frameworks would be incomplete without defining the kind of data rights they must seek to protect.&lt;/p&gt;
&lt;p&gt;In the famous parable of the six blind men and the elephant they conclude that the elephant is like a wall, snake, spear, tree, fan or rope, depending upon where they touch. Similarly Internet experiences of individual users (what they touch) often contrast drastically with different views (what they conclude) on what would constitute data rights.&lt;/p&gt;
&lt;p&gt;The IEAG in its report has identified the following set of data related rights, but has not defined any actual framework or process for ensuring them (yet) &lt;strong&gt;[22]&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Right to be counted,&lt;/li&gt;
&lt;li&gt;Right to an identity,&lt;/li&gt;
&lt;li&gt;Right to privacy and to ownership of personal data,&lt;/li&gt;
&lt;li&gt;Right to due process (for example when data is used as evidence in proceedings, or in administrative decisions),&lt;/li&gt;
&lt;li&gt;Freedom of expression,&lt;/li&gt;
&lt;li&gt;Right to participation,&lt;/li&gt;
&lt;li&gt;Right to non-discrimination and equality, and&lt;/li&gt;
&lt;li&gt;Principles of consent.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Personal data is broadly defined as "&lt;em&gt;any information relating to an identified or identifiable individual&lt;/em&gt;" &lt;strong&gt;[23]&lt;/strong&gt;. Often primary data producers (users of services and devices generating data) are unaware of individual privacy infringements &lt;strong&gt;[24]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;A survey by the Global Working Group on Big Data for Official Statistics found that only a few countries have a specific privacy framework for big data, while most apply the privacy framework for traditional statistics to big data as well &lt;strong&gt;[25]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Conventionally, safeguards against the re-use of big data to protect data rights have involved the “anonymization” or “de-identification” of data, to conceal individual identities. Global Pulse, for instance, is putting forth the concept of Data Philanthropy, whereby "&lt;em&gt;corporations take the initiative to anonymize (strip out all personal information) their data sets and provide this data to social innovators to mine the data for insights, patterns and trends in real-time or near real-time&lt;/em&gt;" &lt;strong&gt;[26]&lt;/strong&gt;. There however exists a debate on whether data can actually be anonymized effectively. Several state that data can never be effectively de-anonymized due to technological challenges &lt;strong&gt;[27]&lt;/strong&gt;. For instance, when the New York City government released de-anonymised data sets of New York cab drivers were made re-identifiable by approaching a separate method. Within less than 2 hours work, researchers knew which driver drove every single trip in this entire dataset. It would be even be easy to calculate drivers’ gross income, or infer where they live &lt;strong&gt;[28]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Even the OECD opines that the current model of limiting identifiability of individuals is unsustainable. It recommends moving towards one where the focus is on transparency around how data is being used, rather than preventing specific types of use, stating that - "&lt;em&gt;research funding agencies and data protection authorities should collaborate to develop an internationally recognized framework code of conduct covering the use of new forms of personal data, particularly those generated via network communication. This framework, built on best practice procedures for consent from data subjects, data sharing and re-use, anonymization methods, etc., could be adapted as necessary for specific national circumstances&lt;/em&gt;" &lt;strong&gt;[29]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Thus, there is a push for the arguement that the historical approaches to protecting privacy and confidentiality — namely, &lt;em&gt;informed consent&lt;/em&gt; and &lt;em&gt;anonymity&lt;/em&gt; — no longer hold &lt;strong&gt;[30]&lt;/strong&gt;. Some have even suggested using big data itself to keep track of user permissions for each piece of data to act as a legal contract &lt;strong&gt;[31]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;There is an overall consensus that any legal or regulatory mechanisms set up to mobilise the 'data revolution for sustainable development' should protect the data rights of the people &lt;strong&gt;[32]&lt;/strong&gt;, without any clear agreement on what these rights may be.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="5"&gt;5. Governance Frameworks Proposed&lt;/h2&gt;
&lt;p&gt;A largely unanswered question that is posed in light of the emerging consensus on the use of Big Data for monitoring SDGs is within what sort of governance frameworks these data collection and analysis methods will operate. Methods of collection and the key actors involved in data analysis, management, storage and coordination. The role of NGOs and CSOs, if any, within these systems must be delineated. Certain key global organizations and eminent researchers have suggested the following models.&lt;/p&gt;
&lt;h3 id="5-1"&gt;5.1. UN Sustainable Development Solutions Network&lt;/h3&gt;
&lt;p&gt;In 2012, the UN Secretary-General launched the UN Sustainable Development Solutions Network (SDSN) to mobilize global scientific and technological expertise to promote practical problem solving for sustainable development, including the design and implementation of the Sustainable Development Goals (SDGs) &lt;strong&gt;[33]&lt;/strong&gt;. It has proposed the following.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Inter-Agency and Expert Group on Sustainable Development Goal Indicators (IAEGSDG) and the United Nations Statistical Commission are to establish roadmaps for strengthening specific data collection tools that enable the monitoring of SDG indicators.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Based on discussions with a large number of statistical offices, including Eurostat, BPS Indonesia, the OECD, the Philippines, the UK, and many others, 100 is recommended to be the maximum number of global indicators to analyse data for which NSOs can report and communicate effectively in a harmonized manner. This conclusion was strongly endorsed during the 46th UN Statistical Commission and the Expert Group Meeting on SDG indicators &lt;strong&gt;[34]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Specialist indicators developed by thematic communities must be used for data analysis as they include input and process metrics that are helpful complements to official indicators, which tend to be more outcome-focused. For example, the UN Inter-Agency Group on Child Mortality Estimation has developed a specialist hub responsible for analysing, checking, and improving mortality estimation. This is a leading source for child morality information for both governments and non-governmental actors &lt;strong&gt;[35]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Research arms of private companies such as Microsoft Research, IBM research, SAS, and R&amp;amp;D arms of telecom companies could directly partner with official statistical systems to share sophisticated analysing techniques &lt;strong&gt;[36]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Management&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Four levels of monitoring, national, regional, global, and thematic, should be "&lt;em&gt;organized in an integrated architecture&lt;/em&gt;" &lt;strong&gt;[37]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Countries must decide individually whether official data must be complemented with non-official indicators from big data which can add richness to the monitoring of the SDGs.&lt;/p&gt;
&lt;p&gt;Where possible, regional monitoring should build on existing regional mechanisms, such as the Regional Economic Commissions, the Africa Peer Review Mechanism, or the Asia-Pacific Forum on Sustainable Development &lt;strong&gt;[38]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;To coordinate thematic monitoring under the SDGs, each thematic initiative may have one or more lead specialist agencies or “custodians” as per the IAEG-MDG monitoring processes. Lead agencies would be responsible for convening multi-stakeholder groups, compiling detailed thematic reports, and encouraging ongoing dialogues on innovation. These thematic groups can become testing grounds in launching a data revolution for the SDGs, trialling new measurements and metrics that in time can feed into the global monitoring process with annual reports &lt;strong&gt;[39]&lt;/strong&gt;.&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_unsdsn_monitoring.png" alt="UN Sustainable Development Solutions Network - Schematic illustration with explanation of the indicators for national, regional, global, and thematic monitoring." /&gt;
&lt;h6&gt;Schematic illustration with explanation of the indicators for national, regional, global, and thematic monitoring.&lt;br /&gt;Source: UN Sustainable Development Solutions Network, &lt;em&gt;&lt;a href="http://unsdsn.org/wp-content/uploads/2015/05/150612-FINAL-SDSN-Indicator-Report1.pdf"&gt;Indicators and a Monitoring Framework for the Sustainable Development Goals: Launching a Data Revolution for the SDGs&lt;/a&gt;&lt;/em&gt;, 2015, p.3.&lt;br /&gt;&lt;/h6&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Monitoring the SDG agenda will require substantive improvements in national statistical capacity. Assessments of existing capacity to fulfil SDG monitoring expectations must be undertaken and needs be integrated into National Strategies for the Development of Statistics (NSDSs) &lt;strong&gt;[40]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coordination&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A Global Partnership for Sustainable Development Data must be established and a World Forum on Sustainable Development Data be convened in 2016 to create mechanisms for ongoing collaboration and innovation.&lt;/p&gt;
&lt;p&gt;A high-level, powerful group of businesses and states must convene the various data and transparency sustainable development initiatives under one umbrella.&lt;/p&gt;
&lt;p&gt;To ensure comparability, Global Monitoring Indicators must be harmonized across countries by one lead technical or specialist agency which will additionally coordinate data standards and collection and provide technical support.&lt;/p&gt;
&lt;p&gt;The following table indicates the suggested Lead Agencies for individual SDGs &lt;strong&gt;[41]&lt;/strong&gt;.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Number&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Sustainable Development Goal&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lead Agencies&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;No Poverty&lt;/td&gt;
&lt;td&gt;World Bank, UNDP, UNSD, UNICEF, ILO, FAO, UN-Habitat, UNISDR, WHO, CRED, UNFPA, and UN Population Division&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;td&gt;No Hunger&lt;/td&gt;
&lt;td&gt;FAO, WHO, UNICEF, and Internal Fertilizer Industry Associaton (IFA)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;Good Health&lt;/td&gt;
&lt;td&gt;WHO, UN Population Division, UNICEF, World Bank, GAVI, UN AIDS, and UN-Habitat&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.&lt;/td&gt;
&lt;td&gt;Quality Education&lt;/td&gt;
&lt;td&gt;UNESCO, UNICEF, and World Bank&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.&lt;/td&gt;
&lt;td&gt;Gender Equality&lt;/td&gt;
&lt;td&gt;UNICEF, UN Women, WHO, UNSD, ILO, UN Population Division, and UNFPA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.&lt;/td&gt;
&lt;td&gt;Clean Water and Sanitation&lt;/td&gt;
&lt;td&gt;WHO/UNICEF Joint Monitoring Programme (JMP), FAO, UN Water, and UNEP&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7.&lt;/td&gt;
&lt;td&gt;Renewable Energy&lt;/td&gt;
&lt;td&gt;Sustainable Energy for All, IEA, WHO, World Bank, and UNFCC&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8.&lt;/td&gt;
&lt;td&gt;Good Jobs and Economic Growth&lt;/td&gt;
&lt;td&gt;IMF, World Bank, UNSD, and ILO&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9.&lt;/td&gt;
&lt;td&gt;Innovation and Infrastructure&lt;/td&gt;
&lt;td&gt;World Bank, OECD, UNIDO, UNFCC, UNESCO, and ITU&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.&lt;/td&gt;
&lt;td&gt;Reduced Inequalities&lt;/td&gt;
&lt;td&gt;UNSD, World Bank, and OECD&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.&lt;/td&gt;
&lt;td&gt;Sustainable Cities and Communities&lt;/td&gt;
&lt;td&gt;UN-Habitat, Global City Indicators Facility, WHO, CRED, UNISDR, FAO, and UNEP&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.&lt;/td&gt;
&lt;td&gt;Responsible Consumption&lt;/td&gt;
&lt;td&gt;EITI, UNCTAD, UN Global Compact, FAO, UNEP Ozone Secretariat, WBCSD, GRI, IIRC, and Global Compact&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.&lt;/td&gt;
&lt;td&gt;Climate Action&lt;/td&gt;
&lt;td&gt;OECD DAC, UNFCCC, and IEA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.&lt;/td&gt;
&lt;td&gt;Life below Water&lt;/td&gt;
&lt;td&gt;UNEP-WCMC, IUCN, and FMC&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.&lt;/td&gt;
&lt;td&gt;Life on Land&lt;/td&gt;
&lt;td&gt;FAO, UNEP, IUCN, and UNEP- WCMC&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.&lt;/td&gt;
&lt;td&gt;Peace and Justice&lt;/td&gt;
&lt;td&gt;UNODC, WHO, UNOCHA, UNCHR, IOM, OCHA, OECD, UN Global Compact, EITI, UNCTAD, UNICEF, UNESCO, and Transparency International&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.&lt;/td&gt;
&lt;td&gt;Partnership for the Goals&lt;/td&gt;
&lt;td&gt;BIS, IASB, IFRS, IMF, WIPO, WTO, UNSD, OECD, World Bank, OECD DAC, and SDSN&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id="5-2"&gt;5.2. The UN DATA Revolution Group&lt;/h3&gt;
&lt;p&gt;The group constituted by the UN Secretary-General Ban Ki-moon in August 2014, is an Independent Expert Advisory Group with the aim of making concrete recommendations on bringing about a 'data revolution for sustainable development' &lt;strong&gt;[42]&lt;/strong&gt;. In its report, &lt;em&gt;A World that Counts&lt;/em&gt;, it makes the following recommendations &lt;strong&gt;[43]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Clear standards on data collection methods must be developed based on the UN Fundamental Principles of Official Statistics. Periodic audits must be conducted by professional and independent third parties to ensure data quality.&lt;/p&gt;
&lt;p&gt;Governments, civil society, academia and the philanthropic sector must work together strengthening statistical literacy so that all people have capacity to input into and evaluate the quality of data.&lt;/p&gt;
&lt;p&gt;Social entrepreneurs, private sector, academia, media, civil society and other individuals and institutions must be engaged globally with incentives (prizes, data challenges) to encourage data sharing.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A SDGs Analysis and Visualisation Platform is to be set up for fostering private-public partnerships and community-led peer-production efforts for data analysis.&lt;/p&gt;
&lt;p&gt;A dashboard on ”the state of the world” will engage the UN, think-tanks, academics and NGOs in analysing, and auditing data.&lt;/p&gt;
&lt;p&gt;Academics and scientists are to analyse data to provide long-term perspectives, knowledge and data resources at all levels.&lt;/p&gt;
&lt;p&gt;The “Global Forum of SDG-Data Users” will ensure feedback loops between data producers, processors and users to improve the usefulness of data and information produced.&lt;/p&gt;
&lt;p&gt;A “SDGs data lab” to support the development of a first wave of SDG indicators is to be established mobilizing key public, private and civil society data providers, academics and stakeholders working with the Sustainable Development Solutions Network.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Storage&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A “world statistics cloud” will store data and metadata produced by different institutions but according to common standards, rules and specifications.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Civil society organisations must share data and processing methods with private and public counterparts on the basis of agreements. They must hold governments and companies accountable using evidence on the impact of their actions, provide feedback to data producers, develop data literacy and help communities and individuals generate and use data.&lt;/p&gt;
&lt;p&gt;NSOs are the central players of the Data Revolution. Their autonomy must be strengthened to maintain data quality.  They must abandon expensive and cumbersome production processes, incorporate new data sources like big data that is human and machine-readable, compatible with geospatial information systems and available quickly enough to ensure that the data cycle matches the decision cycle. Collaborations with the private sector can boost technical and financial investments.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coordination&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Key stakeholders must create a “Global Consensus on Data”, to adopt principles concerning legal, technical, privacy, geospatial and statistical standards. Best practices related to public data such as the Open Government Partnership (OGP) and the G8 Open Data Charter are recommended foundations for such principles.&lt;/p&gt;
&lt;p&gt;A UN-led “Global Partnership for Sustainable Development Data” is proposed, to coordinate and broker key global public-private partnerships for data sharing &lt;strong&gt;[44]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;A “World Forum on Sustainable Development Data” and “Network of Data Innovation Networks” will be a converging point for the data ecosystem to share ideas and experiences for improvements, innovation and technology transfer.&lt;/p&gt;
&lt;h3 id="5-3"&gt;5.3. Organization for Economic Co-Operation and Development (OECD)&lt;/h3&gt;
&lt;p&gt;The Organisation for Economic Co-operation and Development (OECD) is an inter-governmental organization that seeks to promote policies that will improve the economic and social well-being of people globally. It has made the following proposals &lt;strong&gt;[45]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Data is to be collected from National statistical agencies, national and international researchers and international organisations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;By leveraging the expertise of telecommunications companies and software developers, for instance, national statistical systems could potentially reduce costs and improve the availability of data to monitor development goals &lt;strong&gt;[46]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coordination&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;National Data Forums for Social Science Data must be created for the development of social science data for  improved coordination between social scientists, data producers (national statistical agencies, government departments, large private sector businesses and sources undertaking academic direction), and data curators.&lt;/p&gt;
&lt;p&gt;Social science research communities must contribute to national plans of action after a needs assessment &lt;strong&gt;[47]&lt;/strong&gt;. Research funding agencies must collaborate at the international level for a common system for referencing datasets in research publications &lt;strong&gt;[48]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3 id="5-4"&gt;5.4. The Global Partnership for Sustainable Development of Data&lt;/h3&gt;
&lt;p&gt;The partnership is a global network of governments, NGOs, and businesses working to strengthen the inclusivity, trust, and innovation in the way that data is used to address the world’s sustainable development efforts &lt;strong&gt;[49]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There must be a common framework for information processing. At minimum, a simple lexicon must tag each datum specifying:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;What:&lt;/strong&gt; i.e. the type of information contained in the data,&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Who:&lt;/strong&gt; the observer or reporter,&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;How:&lt;/strong&gt; the channel through which the data was acquired,&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;How much:&lt;/strong&gt; whether the data is quantitative or qualitative, and&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Where and when:&lt;/strong&gt; the spatio-temporal granularity of the data.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Analysis of data involves filtering relevant information, summarising keywords and categorising into indicators. This intensive mining of socioeconomic data, known as “reality mining,” can be done by: (1) Continuous analysis of real time streaming data, (2) Digestion of semi-structured and unstructured data to determine perceptions, needs and wants. (3) Real-time correlation of streaming data with slowly accessible historical data repositories.&lt;/p&gt;
&lt;p&gt;Use of big data for developmental goals can draw upon all three techniques to various degrees depending on availability of data and the specific needs.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;NSOs have a pivotal part to play in the data revolution. Countries and organizations believe that big data cannot replace traditional official statistical data as it is based more on perception than facts. To quote Winston Churchill, "&lt;em&gt;Do not trust any statistics that you did not fake yourself&lt;/em&gt;."&lt;/p&gt;
&lt;p&gt;For instance, a study found that Google Flu Trends, to detect influenza epidemics, predicted nonspecific flu-like respiratory illnesses well but not actual flu. The mismatch was due to popular misconceptions on influenza symptoms. This has important policy implications. Doctors using Google Flu Trends may overstock on flu vaccines or be overly inclined to diagnose normal respiratory illnesses as influenza &lt;strong&gt;[50]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;However Big Data if understood correctly, can inform where further targeted investigation is necessary and give immediate responses to favourably change outcomes.&lt;/p&gt;
&lt;h3 id="5-5"&gt;5.5. The World Economic Forum (WEF)&lt;/h3&gt;
&lt;p&gt;The WEF is an International Organization for Public-Private Cooperation. It engages the foremost political, business and other leaders of society to shape global, regional and industry agendas &lt;strong&gt;[51]&lt;/strong&gt;. In the report titled &lt;em&gt;Big Data, Big Impact: New Possibilities for International Development&lt;/em&gt;, it makes the following recommendations &lt;strong&gt;[52]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Data production and development actors include individuals, public sector and the private sector. Each produce different kinds of data that have unique requirements. The private sector maintains vast troves of transactional data, much of which is "data exhaust," or data created as a by-product of other transactions. The public sector maintains enormous datasets in the form of census data, health indicators, and tax and expenditure information. The following figure highlights the different kinds of data that each sector collects and what incentives they have to share the data along with requirements to maintain such data.&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_wef_01.png" alt="" /&gt;
&lt;h6&gt;World Economic Forum - Diagram on Data Commons.&lt;br /&gt;
Source: World Economic Forum, &lt;em&gt;&lt;a href="http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf"&gt;Big Data, Big Impact: New Possibilities for International Development&lt;/a&gt;&lt;/em&gt;, 2012, p.4.&lt;br /&gt;&lt;/h6&gt;
&lt;p&gt;Business models must be created to provide the appropriate incentives for private-sector actors to share data. Such models already exist in the Internet environment. For instance companies in search and social networking profit from products they offer at no charge to end users because the usage data these products generate is valuable to other ecosystem actors. Similar models could be created in garnering Big Data for SDGs. The following flowchart illustrates how different sectors must work together to incentivise data collection and sharing.&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_wef_02.png" alt="" /&gt;
&lt;h6&gt;World Economic Forum - Diagram on Global Coordination.&lt;br /&gt;
Source: World Economic Forum, &lt;em&gt;&lt;a href="http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf"&gt;Big Data, Big Impact: New Possibilities for International Development&lt;/a&gt;&lt;/em&gt;, 2012, p.7.&lt;br /&gt;&lt;/h6&gt;
&lt;h3 id="5-6"&gt;5.6. Dr. Julia Lane - A Quadruple Data Helix&lt;/h3&gt;
&lt;p&gt;Dr. Julia Lane is a Professor in the Wagner School of Public Policy at New York University; and also a Provostial Fellow in Innovation Analytics and a Professor in the Center for Urban Science and Policy &lt;strong&gt;[53]&lt;/strong&gt;. She has done extensive research on the uses of big data. In her paper titled "Big Data for Public Policy: A Quadruple Data Helix," she makes the following suggestions &lt;strong&gt;[54]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the future there will exist a model of a quadruple data helix for data collection which will have four strands — state and city agencies, universities, private data providers, and federal agencies.i&lt;/p&gt;
&lt;p&gt;A new set of institution, city/university data facilities, must be established. These institutions should form the backbone of the quadruple helix, with direct connections to the private sector and to the federal statistical agencies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is a need for graduate training for non-traditional students, who need to understand how to use data science tools as part of their regular employment. They must identify and capture the appropriate data, understand how data science models and tools can be applied, and determine how associated errors and limitations can be identified from a social science perspective.i&lt;/p&gt;
&lt;p&gt;Universities can act as a trusted independent third party to process, store, analyze, and disseminate data. ii&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Management&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The new infrastructure must ensure that data from disparate sources are collected managed and used in a manner that is informed by end users. There are many technical challenges: disparate data sets must be ingested, their provenance determined, and metadata documented. Researchers must be able to query data sets to know what data are available and how they can be used. And if data sets are to be joined, they must be joined in a scientific manner, which means that workflows need to be traced and managed in such a way that the research can be replicated.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coordination&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The role of State and City agencies is to address immediate policy issues, rather than to build long-term data infrastructures as their mandate is to work with city data than the full spectrum of available data.&lt;/p&gt;
&lt;h3 id="5-7"&gt;5.7. Data-Pop Alliance&lt;/h3&gt;
&lt;p&gt;Data-Pop Alliance is a global coalition on Big Data and development created by the Harvard Humanitarian Initiative, MIT Media Lab, and Overseas Development Institute that brings together researchers, experts, practitioners, and activists to promote a people-centred big data revolution through collaborative research, capacity building, and community engagement &lt;strong&gt;[55]&lt;/strong&gt;. It makes the following suggestions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The idea of &lt;em&gt;shared responsibility&lt;/em&gt; between the public and private sector is a proposed operational principles to create a deliberative space. Mechanisms and legal frameworks must be devised for private companies to share their big data under formalized and stable arrangements instead of being compelled by ad hoc requests from researchers and policymakers.&lt;/p&gt;
&lt;p&gt;The media too, could avoid publishing statistical data collected by unexplained methodologies by employing "statistical editors" and disseminate verified information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For official statistics, engaging with Big Data is not a technical consideration but a political obligation. In a two tier system of official and non-official statistics, the public and investors tend to distrust official figures. For instance, the results of the 2010 census in the UK are being disputed on the basis of sewage data.&lt;/p&gt;
&lt;p&gt;It is imperative for NSOs to retain, or regain, their primary role as the legitimate custodian of knowledge and creator of a deliberative public space to democratically drive human development &lt;strong&gt;[56]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="6"&gt;6. Conclusion&lt;/h2&gt;
&lt;p&gt;The Big data frameworks provide some useful insights on monitoring mechanisms though some questions remain unanswered in each model. Key actors that have been proposed include city and state agencies like NSOs, private companies, social scientists, private individuals and international research agencies. Data analysis can be through public-private collaborations, data philanthropy, and using indicators by thematic communities.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There appears consensus across models that collection must be effected through public private partnerships while providing incentives.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;While several methods of analysis have been proposed by the Global Partnership it is unclear on who will be conducting the analysis. The UNSDSN has suggested that it be conducted by academics and scientists with Julia Lane stating it must be through public private partnerships which appear more feasible and transparent.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;All frameworks agree on the pivotal role of NSOs and acknowledge them as the key players and coordinators at the national level. They must be strengthened financially, technologically and politically. Most frameworks seek to empower national agencies which will coordinate collaborations with the private sector through incentives while protecting personal data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coordination&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Several international fora have been proposed to enable coordination while there is consensus that the NSOs. A Global Partnership for Sustainable Development Data, a Global Consensus on Data and a World Forum on Sustainable Development Data have been suggested. UN organizations appear to be suggesting more responsibility for those in the UN framework with UNSDSN giving an extensive list of lead agencies (UNDP, UN Women, Who etc) while the WEF emphasises on the private sector, Data Pop Alliance on NSOs, and Prof. Lane on State and City agencies.&lt;/p&gt;
&lt;p&gt;On an international level countries can opt to join international organization that are being setup for the purpose. It remains to be seen whether all countries globally can achieve such a feat in a coordinated manner without infringing on data rights when unanswerable to any set international organization. The burden appears to fall on civil society and market forces within the private sector to regulate this process. For instance when a private sector company starts providing large un-anonymized data sets for government use, the privacy concerns of civil society that result in them opting for the company’s competitor’s more privacy friendly products will result in a regulation through market forces. However these forces may have disparate strengths in different contexts and countries depending on market practices and information asymmetry resulting in the lack of a uniform accountability mechanism.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="7"&gt;7. Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; Dan Ariely, Facebook, January 06, 2013, &lt;a href="https://www.facebook.com/dan.ariely/posts/904383595868"&gt;https://www.facebook.com/dan.ariely/posts/904383595868&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; United Nations Organizations,&amp;nbsp;'Sustainable Development Goals'&amp;nbsp;(United Nations Sustainable Development,&amp;nbsp;26 September 2015), &lt;a href="http://www.un.org/sustainabledevelopment/sustainable-development-goals/"&gt;http://www.un.org/sustainabledevelopment/sustainable-development-goals/&lt;/a&gt;,&amp;nbsp;accessed 6 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; Data Revolution Group,&amp;nbsp;'A World that Counts: Mobilising the Data Revolution for Sustainable Development'&amp;nbsp;(November 2014), &lt;a href="http://www.undatarevolution.org/wp-content/uploads/2014/12/A-World-That-Counts2.pdf"&gt;http://www.undatarevolution.org/wp-content/uploads/2014/12/A-World-That-Counts2.pdf&lt;/a&gt;,&amp;nbsp;accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; High level panel on the post-2015 development agenda ,&amp;nbsp;'A New Global Partnership: Eradicate Poverty and Transform Economies through Sustainable Development'(Post2015hlp,0rg,&amp;nbsp;July 2012),&amp;nbsp;&lt;a href="http://www.post2015hlp.org/"&gt;http://www.post2015hlp.org/&lt;/a&gt;,&amp;nbsp;accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; Gary King,&amp;nbsp;'Ensuring the Data-Rich Future of the Social Sciences' [2011] 3(2) Science,&amp;nbsp;&lt;a href="http://gking.harvard.edu/files/datarich.pdf"&gt;http://gking.harvard.edu/files/datarich.pdf&lt;/a&gt;,&amp;nbsp;accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; Michael Horrigan,&amp;nbsp;'Big Data: A Perspective from the BLS'&amp;nbsp;(Amstatorg,&amp;nbsp;1 January 2013) &lt;a href="http://magazine.amstat.org/blog/2013/01/01/sci-policy-jan2013/"&gt;http://magazine.amstat.org/blog/2013/01/01/sci-policy-jan2013/&lt;/a&gt;,&amp;nbsp;accessed 4 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; UN Global Pulse,&amp;nbsp;'Big Data for Development: Challenges &amp;amp; Opportunities'&amp;nbsp;(6 May 2012) &lt;a href="http://www.unglobalpulse.org/sites/default/files/BigDataforDevelopment-UNGlobalPulseJune2012.pdf"&gt;http://www.unglobalpulse.org/sites/default/files/BigDataforDevelopment-UNGlobalPulseJune2012.pdf&lt;/a&gt;,&amp;nbsp;accessed 5 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; Emmanuel Letouzé and Johannes Jütting, 'Official Statistics, Big Data and Human Development: Towards a New Conceptual and Operational Approach' (2014) 12(3), Data-Pop Alliance White papers Series, &lt;a href="https://www.odi.org/sites/odi.org.uk/files/odi-assets/events-documents/5161.pdf"&gt;https://www.odi.org/sites/odi.org.uk/files/odi-assets/events-documents/5161.pdf&lt;/a&gt;, accessed 4 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; See &lt;strong&gt;[9]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[12]&lt;/strong&gt; See &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[13]&lt;/strong&gt; See &lt;strong&gt;[9]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[14]&lt;/strong&gt; UN Global Pulse, 'About: United Nations Global Pulse' (2016) &lt;a href="http://www.unglobalpulse.org/about-new"&gt;http://www.unglobalpulse.org/about-new&lt;/a&gt;, accessed 7 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[15]&lt;/strong&gt; UN Stats, 'Global Working Group' (2014) &lt;a href="http://unstats.un.org/unsd/bigdata/"&gt;http://unstats.un.org/unsd/bigdata/&lt;/a&gt;, accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[16]&lt;/strong&gt; New York City Press Release, ‘Mayor Bloomberg, Police Commissioner Kelly and Microsoft Unveil New, State-of-the-Art Law Enforcement Technology that Aggregates and Analyzes Existing Public Safety Data in Real Time to Provide a Comprehensive View of Potential Threats and Criminal Activity’ (New York City, 8 August 2012), &lt;a href="http://www1.nyc.gov/office-of-the-mayor/news/291-12/mayor-bloomberg-police-commissioner-kelly-microsoft-new-state-of-the-art-law"&gt;http://www1.nyc.gov/office-of-the-mayor/news/291-12/mayor-bloomberg-police-commissioner-kelly-microsoft-new-state-of-the-art-law&lt;/a&gt;, accessed 2 July 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[17]&lt;/strong&gt; Francesco Mancini,&amp;nbsp;'New Technology and the Prevention of Violence and Conflict'&amp;nbsp;(Reliefwebint,&amp;nbsp;April 2013),&amp;nbsp;&lt;a href="http://reliefweb.int/sites/reliefweb.int/files/resources/ipi-e-pub-nw-technology-conflict-prevention-advance.pdf"&gt;http://reliefweb.int/sites/reliefweb.int/files/resources/ipi-e-pub-nw-technology-conflict-prevention-advance.pdf&lt;/a&gt;,&amp;nbsp;accessed 2 July 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[18]&lt;/strong&gt; Arjuna Costa, Anamitra Deb, and Michael Kubzansky, 'Big Data, Small Credit: The Digital Revolution and Its Impact on Emerging Market Consumers,'&amp;nbsp;(Omidyar,&amp;nbsp;3 March 2013) &lt;a href="https://www.omidyar.com/sites/default/files/file_archive/insights/Big%20Data,%20Small%20Credit%20Report%202015/BDSC_Digital%20Final_RV.pdf"&gt;https://www.omidyar.com/sites/default/files/file_archive/insights/Big%20Data,%20Small%20Credit%20Report%202015/BDSC_Digital%20Final_RV.pdf&lt;/a&gt;,&amp;nbsp;accessed 2 July 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[19]&lt;/strong&gt; United Nations Economic and Social Council, 'Report of the Global Working Group on Big Data for Official Statistics' (UN Stats, 3 March 2015), &lt;a href="http://unstats.un.org/unsd/statcom/doc15/2015-4-BigData-E.pdf"&gt;http://unstats.un.org/unsd/statcom/doc15/2015-4-BigData-E.pdf&lt;/a&gt;, accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[20]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[21]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[22]&lt;/strong&gt; See &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[23]&lt;/strong&gt; OECD, 'OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data' (23 September 1980), &lt;a href="http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm"&gt;http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm&lt;/a&gt;, accessed 29 May 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[24]&lt;/strong&gt; Amir Efrati, ''Like' Button Follows Web Users' (WSJ, 18 May 2011) &lt;a href="http://www.wsj.com/articles/SB10001424052748704281504576329441432995616"&gt;http://www.wsj.com/articles/SB10001424052748704281504576329441432995616&lt;/a&gt;, accessed 23 May 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[25]&lt;/strong&gt; See &lt;strong&gt;[15]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[26]&lt;/strong&gt; Robert Kirkpatrick,&amp;nbsp;'Data Philanthropy: Public and Private Sector Data Sharing for Global Resilience' (UN Global Pulse, 16 September 2011), &lt;a href="http://www.unglobalpulse.org/blog/data-philanthropy-public-private-sector-data-sharing-global-resilience"&gt;http://www.unglobalpulse.org/blog/data-philanthropy-public-private-sector-data-sharing-global-resilience&lt;/a&gt;,&amp;nbsp;accessed 4 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[27]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[28]&lt;/strong&gt; Arvind Narayanan,&amp;nbsp;'No silver bullet: De-identification still doesn't work' (1 April 2016),&amp;nbsp;&lt;a href="http://randomwalker.info/publications/no-silver-bullet-de-identification.pdf"&gt;http://randomwalker.info/publications/no-silver-bullet-de-identification.pdf&lt;/a&gt;,&amp;nbsp;accessed 3 July 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[29]&lt;/strong&gt; OECD Global Science Forum,&amp;nbsp;'New Data for Understanding the Human Condition: International Perspectives,'&amp;nbsp;(February 2013)&amp;nbsp;&lt;a href="http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf"&gt;http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf&lt;/a&gt;,&amp;nbsp;accessed 2 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[30]&lt;/strong&gt; S. Barocas,&amp;nbsp;'The Limits of Anonymity and Consent in the Big Data Age,'&amp;nbsp;in&amp;nbsp;&lt;em&gt;Privacy, Big Data, and the public good: Frameworks for Engagement&lt;/em&gt;&amp;nbsp;(Cambridge University Press, 2014).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[31]&lt;/strong&gt; A. Pentland,&amp;nbsp;'Institutional Controls: The New Deal on Data,'&amp;nbsp; in &lt;em&gt;Privacy, Big Data, and the public good: Frameworks for Engagement&lt;/em&gt; (Cambridge University Press, 2014).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[32]&lt;/strong&gt; See &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[33]&lt;/strong&gt; UN Sustainable Development Solutions Network,&amp;nbsp;'About Us: Vision and Organization'&amp;nbsp;(2012)&amp;nbsp;&lt;a href="http://unsdsn.org/about-us/vision-and-organization/"&gt;http://unsdsn.org/about-us/vision-and-organization/&lt;/a&gt;,&amp;nbsp;accessed 2 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[34]&lt;/strong&gt; UN Sustainable Development Solutions Network,&amp;nbsp;'Indicators and a Monitoring Framework for the Sustainable Development Goals: Launching a data revolution for the SDGs' (12 June 2015) &lt;a href="http://unsdsn.org/wp-content/uploads/2015/05/150612-FINAL-SDSN-Indicator-Report1.pdf"&gt;http://unsdsn.org/wp-content/uploads/2015/05/150612-FINAL-SDSN-Indicator-Report1.pdf&lt;/a&gt;, accessed 4 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[35]&lt;/strong&gt; UNICEF,&amp;nbsp;'CME Info - Child Mortality Estimates' (2014) &lt;a href="http://www.childmortality.org/"&gt;http://www.childmortality.org/&lt;/a&gt;, accessed 1 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[36]&lt;/strong&gt; See &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[37]&lt;/strong&gt; UNESCO,&amp;nbsp;'Technical report by the Bureau of the United Nations Statistical Commission (UNSC) on the process of the development of an indicator framework for the goals and targets of the post-2015 development agenda' (6 March 2015)&amp;nbsp;&lt;a href="http://www.uis.unesco.org/ScienceTechnology/Documents/unsc-post-2015-draft-indicators.pdf"&gt;http://www.uis.unesco.org/ScienceTechnology/Documents/unsc-post-2015-draft-indicators.pdf&lt;/a&gt;, accessed 3 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[38]&lt;/strong&gt; UN, 'The Road to Dignity by 2030: Ending Poverty, Transforming All Lives and Protecting the Planet '&amp;nbsp;(4 December 2014) &lt;a href="http://www.un.org/disabilities/documents/reports/SG_Synthesis_Report_Road_to_Dignity_by_2030.pdf"&gt;http://www.un.org/disabilities/documents/reports/SG_Synthesis_Report_Road_to_Dignity_by_2030.pdf&lt;/a&gt;,&amp;nbsp;accessed 7 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[39]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[40]&lt;/strong&gt; UN Sustainable Development Solutions Network,&amp;nbsp;'Data for Development: An Action Plan to Finance the Data Revolution for Sustainable Development'&amp;nbsp;(10 July 2015)&amp;nbsp;&lt;a href="http://unsdsn.org/wp-content/uploads/2015/04/Data-For-Development-An-Action-Plan-July-2015.pdf"&gt;http://unsdsn.org/wp-content/uploads/2015/04/Data-For-Development-An-Action-Plan-July-2015.pdf&lt;/a&gt;,&amp;nbsp;accessed 3 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[41]&lt;/strong&gt; See &lt;strong&gt;[34]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[42]&lt;/strong&gt; UN Data Revolution Group,&amp;nbsp;'About the Independent Expert Advisory Group'&amp;nbsp;(6 November 2014) &lt;a href="http://www.undatarevolution.org/about-ieag/"&gt;http://www.undatarevolution.org/about-ieag/&lt;/a&gt;, accessed 4 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[43]&lt;/strong&gt; See &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[44]&lt;/strong&gt; The Partnership has already been established, and it is developing a further framework.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[45]&lt;/strong&gt; Organisation for Economic Co-Operation and Development),&amp;nbsp;'The Organisation for Economic Co-operation and Development (OECD): About' (2016) &lt;a href="http://www.oecd.org/about/"&gt;http://www.oecd.org/about/&lt;/a&gt;, accessed 2 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[46]&lt;/strong&gt; Organisation for Economic Co-Operation and Development,&amp;nbsp;'Strengthening National Statistical Systems to Monitor Global Goals' (2015) &lt;a href="http://www.oecd.org/dac/POST-2015%20P21.pdf"&gt;http://www.oecd.org/dac/POST-2015%20P21.pdf&lt;/a&gt;, accessed 1 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[47]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[48]&lt;/strong&gt; OECD Global Science Forum,&amp;nbsp;'New Data for Understanding the Human Condition: International Perspectives'&amp;nbsp;(February 2013)&amp;nbsp;&lt;a href="http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf"&gt;http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf&lt;/a&gt;,&amp;nbsp;accessed 2 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[49]&lt;/strong&gt; The Global Partnership On Sustainable Development Data,&amp;nbsp;'Who We Are: The Data Ecosystem and the Global Partnership'&amp;nbsp;(2016) &lt;a href="http://www.data4sdgs.org/who-we-are/"&gt;http://www.data4sdgs.org/who-we-are/&lt;/a&gt;,&amp;nbsp;accessed 5 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[50]&lt;/strong&gt; World Economic Forum,&amp;nbsp;'Big Data, Big Impact: New Possibilities for International Development'&amp;nbsp;(22 January 2012) &lt;a href="http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf"&gt;http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf&lt;/a&gt;,&amp;nbsp;accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[51]&lt;/strong&gt; World Economic Forum,&amp;nbsp;'Our Mission: The World Economic Forum'&amp;nbsp;(12 January 2016) &lt;a href="https://www.weforum.org/about/world-economic-forum/"&gt;https://www.weforum.org/about/world-economic-forum/&lt;/a&gt;,&amp;nbsp;accessed 7 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[52]&lt;/strong&gt; See &lt;strong&gt;[50]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[53]&lt;/strong&gt; Julia Lane, Homepage, &lt;a href="http://www.julialane.org/"&gt;http://www.julialane.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[54]&lt;/strong&gt; Julia Lane,&amp;nbsp;'Big Data for Public Policy: The Quadruple Helix'&amp;nbsp;(2016)&amp;nbsp;8(1)&amp;nbsp;&lt;em&gt;Journal of Policy Analysis and Management&lt;/em&gt;,&amp;nbsp;&lt;a href="http://onlinelibrary.wiley.com/doi/10.1002/pam.21921/abstract"&gt;DOI:10.1002/pam.21921&lt;/a&gt;,&amp;nbsp;accessed 1 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[55]&lt;/strong&gt; Data-Pop Alliance,&amp;nbsp;'Data-Pop Alliance: Our Mission'&amp;nbsp;(May 2014) &lt;a href="http://datapopalliance.org/"&gt;http://datapopalliance.org/&lt;/a&gt;,&amp;nbsp;accessed 1 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[56]&lt;/strong&gt; See &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="8"&gt;8. Author Profile&lt;/h2&gt;
&lt;p&gt;Meera Manoj is a law student at the Gujarat National Law University, Gandhinagar and has completed her first year. She is passionate about civil rights, feminism, economics in law and anything involving paneer. She aspires to travel the world and build up a vast library, with unparalleled sections on International Law and Archie comics.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development'&gt;https://cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Meera Manoj</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>Sustainable Development Goals</dc:subject>
    

   <dc:date>2016-07-05T13:13:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-s-poorvaja-july-4-2016-cyberstalkers-the-new-bullies-in-town">
    <title>Cyberstalkers, the new bullies in town</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-s-poorvaja-july-4-2016-cyberstalkers-the-new-bullies-in-town</link>
    <description>
        &lt;b&gt;The advent of social media and an increase in accessibility has led to increasing concerns with regard to cyber safety.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article by S. Poorvaja was &lt;a class="external-link" href="http://www.thehindu.com/news/cities/chennai/cyberstalkers-the-new-bullies-in-town/article8806401.ece"&gt;published in the Hindu&lt;/a&gt; on July 4, 2016. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;Bombarded with messages, poems and photographs from a cyber &lt;a href="http://www.thehindu.com/news/national/verma-committee-moots-severe-punishment-for-voyeurs-stalkers/article4369797.ece" target="_parent"&gt;&lt;b&gt;stalker&lt;/b&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;across  multiple social networking platforms, Shradha Muralidharan, a  consultant in the city, said that being curt and asking the stalker to  stop bothering was of no use.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“I initially did not want to engage with him as I was afraid that it  would only provoke him more. But then ignoring him did not help as well  and I was forced to speak to him. He, however, went ahead and contacted a  host of my friends on these sites and asked them if they could  introduce me to him,” she recalled.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;a href="http://www.thehindu.com/news/cities/Kochi/beware-threeyear-term-in-jail-awaits-cyber-stalkers/article3417314.ece" target="_parent"&gt;&lt;b&gt;Cyberstalking&lt;/b&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;is  now on the increase with people being flooded with messages and having  their information online manipulated and used to threaten them with.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Vandhana,* an engineer from the city, says she thinks twice before  posting content online — be it on her Instagram or her Facebook profile.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Despite having adequate privacy tools, I later found that my photos and  other information were being shared by a colleague who was on my  friends’ list to his friend, who then proceeded to cyberstalk me,” she  said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;What to share? &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While multiple tools that social media sites offer do allow people to  mute, block or even report people, Pranesh Prakash, Policy Director for  the Centre for Internet and Society, said technical restrictions didn’t  play much of a part in a situation where information one posts to a  private audience is shared further, without their consent.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Trust plays a large role in what you share online since someone can  find a way to get around technological restrictions. While there are  some violations that can be addressed by the law, a few cannot be, and  it is important for people to be aware of the legal provisions that  exist,” he added.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Be it social media meet-ups, Facebook friends catching up outside of the  virtual world or web writers meeting to brainstorm ideas, the last five  years have seen a gradual increase in such socialising and new safety  concerns have cropped up.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Karthika, a chartered accountant from the city who went through an  unpleasant experience of being stalked on social media sites and  cyber-bullied, said that while the police were helpful when she sought  them out, she was also constantly questioned as to why she was  befriending people online in the first place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“I tried not to keep mum about what was happening to me but was also  simultaneously told by people that it would seem like I was drawing  unnecessary attention to myself if I made public what was happening to  me. More people should come forward and support the person who is  getting stalked, rather than be intimidated,” she said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The use of internet, email or any form of electronic communication to  contact and harrass a person who has expressed disinterest, and to cause  them trauma is what qualifies as &lt;a href="http://www.thehindu.com/todays-paper/tp-national/tp-newdelhi/cyberstalkers-at-large-law-order/article1889616.ece" target="_parent"&gt;&lt;b&gt;Cyberstalking&lt;/b&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;To prevent misuse of information, social media users can use privacy  tools and settings that enable them have a control on who vies their  information&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;With smartphone apps for social media sites that have access to the  user's location, caution must be exercised by the user in knowing who is  privy to such information&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;With children being active online as well, the use of parental control  softwares that helps monitor the content they share is necessary as they  are vulnerable victims to stalking and cyber bullying&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Knowledge about the cyber crime laws and where/whom to report incidences of the same to.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-s-poorvaja-july-4-2016-cyberstalkers-the-new-bullies-in-town'&gt;https://cis-india.org/internet-governance/news/the-hindu-s-poorvaja-july-4-2016-cyberstalkers-the-new-bullies-in-town&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-04T02:44:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-prabhu-mallikarjunan-june-13-2016-why-geospatial-bill-is-draconian-and-how-it-will-hurt-startups">
    <title>Why Geospatial Bill is draconian and how it will hurt startups</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-prabhu-mallikarjunan-june-13-2016-why-geospatial-bill-is-draconian-and-how-it-will-hurt-startups</link>
    <description>
        &lt;b&gt;Last week, the Indian government rejected Google’s plans to map Indian cities, tourist spots and mountain ranges, using the 360-degree panoramic Google Street View feature.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.financialexpress.com/article/economy/why-geospatial-bill-is-draconian-and-how-it-will-hurt-startups/282623/"&gt;published in Indian Express&lt;/a&gt; on June 13, 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last week, the Indian government rejected &lt;a href="http://www.financialexpress.com/tag/google/"&gt;Google&lt;/a&gt;’s  plans to map Indian cities, tourist spots and mountain ranges, using  the 360-degree panoramic Google Street View feature. The government  officials cited “national security” as a reason for not granting  permission to Google. It is expected that the Google’s Street View  permission would be relooked at, once the draft Geospatial Information  Regulation Bill, 2016, is enforced as law. Many however feel that this  draft bill is draconian and will have serious repercussions on the  startup ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Geospatial Bill seeks to make creating, accessing and  distribution or sharing of map related information, illegal and that  every company will have to take prior permission and license from the  government for the same. Wayback in 2011, Google had announced the  introduction of Street View for Bangalore, on Google Maps. But the  project ran into trouble with Bangalore Police stopping Street View cars  from plying in the city, citing security reasons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google Street View, launched in 2007, is popular in San Francisco,  Las Vegas, Denver, New York and Miami, which allows users to navigate  virtual streets from photographs gathered from directional cameras on  special vehicles. While the service has been hugely successful it has  caused problems of privacy in some countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2010 almost 250,000 Germans told Google to blur pictures of their  homes on the Street View service, while Czech government also banned  Google from taking any new photos for the service. In Switzerland, the  matter went to the court and it was accepted that Google would be  obliged to pixelate 99% of images to blur faces, vehicle registrations  and that it would not be filming certain sensitive places such as  schools, prisons and shelter homes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This adds to the list of recent controversies on Google Earth, and  the draft Geospatial Information Regulation Bill, on adoption of mapping  technology in India. Commenting on the development, Sumandro  Chattapadhyay, research director at the Centre for Internet and Society  said, the key country where the Google Street View faced legal  challenge, and was fined too, is Germany. This legal challenge, however,  was not based on the concern for national security but on that for the  privacy of the citizens. However, it was eventually allowed to roll out  Street View in Germany provided that it asks for consent from the house  owners before images of any house.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“One of the crucial concerns with the draft Geospatial Information  Regulation Bill remains its vast scope of application. Not only  initiatives like Google Street View may be regulated under it (for  capturing geo-referenced imagery from the street level) but absolutely  any mobile application that requires the user’s geo-location (either  automatically detected, or manually entered by the user) would be within  the purview of this Bill. This evidently creates a great pressure upon  the entire ICT-enable product and service sector in India,”  Chattapadhyay added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This would mean that, any company, particularly the new age startups,  those in the food tech, fintech and e-commerce space, which uses  geo-location to identify the customer location to either deliver goods,  food products, or the likes of Ola and Uber which uses maps to pickup  and drop customers, will have to obtain license from the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Raman Shukla, director—strategy and product, Medikoe, said, “At  Medikoe we are helping users to locate the nearest healthcare service  provider with the available technologies. Google Maps is one of key  feature our company banks on. Though we understand the country’s  security concerns, the draft bill, if implemented, would be a violation  of independent internet. We believe that a much better solution can be  identified to solve security concerns.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Venu Kondur, founder of LOBB, the online truck booking platform said,  “Geostatial data is a very important data for our business. Customers  booking truck through LOBB platform get real-time track &amp;amp; trace  facility. Our customers rely heavily on this data for their day-day  activity. Startups like us depend largely on maps data for real-time  tracking of consignment. Lot of our business intelligence data is drawn  out of it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case, if the draft gets implemented, many startups will be forced  to change the business model and while it will also increase the product  delivery time. A group of 15 volunteers created a SaveTheMap.in portal  to educate the readers about the draft bill and also give complete  information on how the bill have an impact on the citizen and users of  certain application. Sajjad Anwar one of the volunteer, said, through  the portal about 1700 mails have been sent to the ministry of home  affairs airing their view on why they do not support the draft Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Comparing with other countries, Chattapadhyay further said, “At  first, other countries deal with the question of display of security  establishments in publicly available maps through direct interactions  with large mapping companies, and does not turn this into a financial  and political burden for the entire economy. Secondly, it is the concern  about privacy of the citizens that should frame the Indian government’s  response to products and services like Google Street View, and not  concerns regarding national security.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What the draft bill says&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No person shall, in any manner, make use of, disseminate, publish or  distribute any geospatial information of India, outside India, without  prior permission from the security vetting authority under the Central  government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Penalty&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whoever acquires any geospatial information of India in contravention  to the rules, shall be punished with a fine ranging from Rs 1 crore to  Rs 100 crore and /or imprisonment for a period upto seven years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Application for license&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every person who has already acquired any geospatial imagery or data  of any part of India either through space or aerial platforms such as  satellite, aircrafts, airships, balloons, unmanned aerial vehicles or  terrestrial vehicles shall within one year from the commencement of this  Act, make an application along with requisite fees to the security  vetting authority.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-prabhu-mallikarjunan-june-13-2016-why-geospatial-bill-is-draconian-and-how-it-will-hurt-startups'&gt;https://cis-india.org/internet-governance/news/financial-express-prabhu-mallikarjunan-june-13-2016-why-geospatial-bill-is-draconian-and-how-it-will-hurt-startups&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2016-07-02T04:57:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-today-june-16-2016-here-is-the-entire-list-of-escorts-service-websites-that-govt-has-banned">
    <title>Here is the entire list of 'escorts service' websites that the government has banned</title>
    <link>https://cis-india.org/internet-governance/news/india-today-june-16-2016-here-is-the-entire-list-of-escorts-service-websites-that-govt-has-banned</link>
    <description>
        &lt;b&gt;Another day and another opaque order asking Indian service providers to block websites that allegedly offer or advertise escort services in India. In total, the government has ordered ban on 237 websites. But as it happens whenever the Indian government bans website, there has been no public communication about the same. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indiatoday.intoday.in/technology/story/govt-blocks-239-indian-escorts-service-websites/1/692381.html"&gt;published in India Today&lt;/a&gt; on June 16, 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Also, it has not been explained what, if any, process was followed before these websites were banned and what norms were applied for the order that the internet service providers have received.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However, now Centre for Internet and Society has caught hold of the list of the websites that have been banned. Here is what &lt;a href="http://cis-india.org/internet-governance/blog/list-of-blocked-escort-service-websites" target="_blank"&gt;the organisation says,&lt;/a&gt; "Unfortunately, the government does not make available publicly the  list of websites they have ordered ISPs to block. Given that knowledge  of what is censored by the government is crucial in a democracy, we are  publishing the entire list of blocked websites." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;As for the websites and URLs here they are:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;www.sterlingbioscience.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;rawpoint.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.onemillionbabes.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaihotcollection.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;simranoberoi.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;rubinakapoor.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;talita.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescortsagency.net&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaifunclubs.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.alishajain.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.ankitatalwar.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;https://www.jennyarora.ind.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.riya-kapoor.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;shneha.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;missinimi.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiglamour.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;kalyn.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.saumyagiri.co.in/city/mumbai/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;bookerotic.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.divyamalik.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.suhanisharma.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.ruhi.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;umbaiqueens.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.aliyaghosh.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;priyasen.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.highprofilemumbaiescorts.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;charmingmumbai.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.poojamehata.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;kiiran.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mansikher.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.newmumbaiescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaifunclubs.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.punarbas.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.discreetbabes.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.alisharoy.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.arpitarai.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.nidhipatel.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;navimumbailescort.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.zoyaescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.juhioberoi.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;shoniya.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;panchibora.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;rehu.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.nehaanand.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.aditiray.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.rakhibajaj.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.alianoidaescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sobiya.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.alishaparul.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mumbai-escorts.leathercurrency.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;ankita-ahuja.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.yamika.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mumbailescort.co&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.ranjika.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.aditiray.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.alinamumbailescort.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sonikaa.com/services/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;riyamodel.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;soonam.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sejalthakkar.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.yomika-tandon.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.asika.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.siyasharma.org/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.rubikamathur.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescortslady.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sexyshe.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.indepandentescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.saanvichopra.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.goswamipatel.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;ojaloberoi.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.naincy.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sonyamehra.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.pinkgrapes.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;anjalitomar.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.nishakohli.com/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;sagentia.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mumbai.vivastreet.co.in/escort+mumbai&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.deseescortgirls.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;guides.wonobo.com/mumbai/mumbai-escorts-service/.4299&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;jasmineescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.shalinisethi.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.highclassmumbailescort.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.vipescortsinmumbai.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescorts69.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;monikabas.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.riyasehgal.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;onlycelebrity.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.greatmumbaiescorts.com/escort-service-mumbai.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.aishamumbailescort.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.jennydsouzaescort.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.desifun.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.siyaescort.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;masti-escort.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sofya.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiwali.in/navi-mumbai-escort-service.php&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiwali.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.calldaina.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescortsservice.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.escortsgirlsinmumbai.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.passionmumbai.escorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.nehakapoor.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;meerakapoor.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.dianamumbaiescorts.net .in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.allmumbailescort.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.rakhiarora.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.ritikasingh.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.rekhapatil.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaidolls.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.piapandey.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaicuteescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescortssevice.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.onlycelebrity.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.meetescortservice.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;onlyoneescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;simirai.org&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.riyamumbaiescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.neharana.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaihiprofilegirls.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sexyescortsmumbai.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sexymumbai.escorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.four-seasons-escort.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescortsgirl.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.vdreamescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.passionatemumbaiescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.payalmalhotra.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.shrutisinha.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.juliemumbaiescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.indiasexservices.com/mumbai.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbai-escorts.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.aliyamumbaiescorts.net.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;shivaniarora.co.in/escort-service-mumbai.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.pinkisingh.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;soyam.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.arpitaray.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.localescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.jennifermumbaiescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.yanaroy.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;escorts18.in/mumbai-escorts.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.tinamumbaiescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaijannatescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.deepikaroy.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.nancy.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.pearlpatel.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;30minsmumbaiescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.datinghopes.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;https://www.riyaroy.com/services.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.sonalikajain.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.zainakapoor.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;kavyajain.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.kinnu.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;exmumbai.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mansimathur.in/pinkyagarwal&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;exmumbai.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mansimathur.in/pinkyagarwal&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.devikabatra.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;katlin.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;riyaverma.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;escortsinindia.co/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.snehamumbaiescorts.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;shimi.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescortsforu.com/about&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.chetnagaur.co.in/chetna-gaur.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.escortspoint.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.rupalikakkar.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.hemangisinha.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;1escorts.in/location/mumbai.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.salini.in/navi-mumbai-independent-escort-service.php&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.salini.in/navi-mumbai-independent-escort-service.php&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaibella.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mohitescortservicesmumbai.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.anchu.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.aliyaroy.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;jaanu.co.in/mumbai-escorts-service-call-girls.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.andyverma.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;dreams-come-true.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;feel-better.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;jellyroll.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;dreamgirlmumbai.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;role-play.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mansi-mathur.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.zarinmumbaiescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mymumbai.escortss.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.goldentouchescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaipassion.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;ishitamalhotra.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;happy-ending.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;juicylips.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.escortsmumbai.name&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.kirstygbasai.net&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.hiremumbaiescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.meeraescorts.com/mumbai-escorts.php&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;3-5-7star.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.pranjaltiwari.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.richagupta.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;way2heaven.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;piya.co/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;pinkflowers.info&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.beautifulmumbaiescorts.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.bestescortsinmumbai.com/charges-html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescorts.me&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.tanikatondon.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.escortsinmumbai.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.escortgirlmumbai.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaicallgrils.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.quickescort4u.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mayamalhotra.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.legal-escort.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;escortsbaba.com/mumbai-escorts.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;rupa.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescorts.agency/erotic-service-mumbai.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.escortscelebrity.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.independentescortservicemumbai.com/mumbai%20escort%20servi..&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;garimachopra.com&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;kajalgupta.biz&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;lipkiss.site&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;aanu.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;bombayescort.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;hotkiran.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;khushikapoor.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;joyapatel.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;rici.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;aaditi.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;andheriescorts.org.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.jiyapatel.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;spicymumbai.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;rimpyarora.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;lovemaking.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;riyadubey.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;escortservicesmumbai.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;mumbaiescorts.co.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;midnightprincess.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;vashiescorts.co.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;angee.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.rozakhan.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;www.mumbaiescortsvilla.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;kylie.co.in/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;escortservicemumbai.co.in&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-today-june-16-2016-here-is-the-entire-list-of-escorts-service-websites-that-govt-has-banned'&gt;https://cis-india.org/internet-governance/news/india-today-june-16-2016-here-is-the-entire-list-of-escorts-service-websites-that-govt-has-banned&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2016-07-02T04:51:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-moulishree-srivastava-june-14-2016-isps-start-blocking-escort-websites-following-govt-order">
    <title>ISPs start blocking escort websites following govt order</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-moulishree-srivastava-june-14-2016-isps-start-blocking-escort-websites-following-govt-order</link>
    <description>
        &lt;b&gt;DoT on Monday ordered blocking of 240 URLs; blocking of websites takes place under Section 69A of the IT Act, and Information Technology Rules.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The article by Moulishree Srivastava &lt;a class="external-link" href="http://www.business-standard.com/article/current-affairs/isps-start-blocking-escort-websites-following-govt-order-116061400376_1.html"&gt;was published in the Business Standard&lt;/a&gt; on June 14, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Internet Service Providers (ISPs) have started blocking websites  allegedly offering escort services after an order from the Department of  Telecommunication (DoT).&lt;br /&gt; &lt;br /&gt; The DoT on Monday asked ISPs to immediately block around 240 such URLs  (Uniform Resource Locator) offering escort services, to filter out  obscene content on the internet. Speaking to Business Standard, Internet  Service Providers Association of India’s (ISPAI) President Rajesh  Chharia said the ISPs were in process of shutting down these websites.  ISPAI represents 60 ISPs including Bharti Airtel, Tata Teleservices,  Reliance Communication, Vodafone and Idea Cellular.  &lt;br /&gt; &lt;br /&gt; “We received the order yesterday, and it entails a list of about 240  websites that the government wants us to block,” said Chharia.   “CERT-In, which works under the Department of Electronics and  Information Technology (Deity), advised the department on certain  websites that it feels could be a national or social threat. Deity then  reached out to DoT, which is our licensor. We are the licensee, and as  per the licensing agreement, we have to comply with the order.”&lt;br /&gt; &lt;br /&gt; While declining to comment on whether this is the first such order the  association had received this year, Chharia said, “Since last few years,  we have been receiving orders to block websites which hosts content  that may be a threat to social order or national security.” Blocking of  websites takes place under Section 69A of the IT Act, and a 2009  secondary legislation called the Information Technology (Procedure and  Safeguards for Blocking for Access of Information by Public) Rules  (“Blocking Rules”).&lt;br /&gt; &lt;br /&gt; The rules empower the central government to direct any agency or  intermediary to block access to information when satisfied that it is  “necessary or expedient so to do” in the interest of the “sovereignty  and integrity of India, defense of India, security of the state,  friendly relations with foreign states or public order or for preventing  incitement to the commission of any cognisable offence relating to  above. Intermediaries failing to comply are punishable with fines and  prison terms up to seven years.”&lt;br /&gt; &lt;br /&gt; In December 2014, around six months after the Modi-led BJP government  came into power, the DoT ordered ISPs to block 32 websites, including  Vimeo, Dailymotion, GitHub and Pastebin.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to an RTI filed by no-for-profit organisation Software  Freedom Law Centre in March last year, Deity said 2341 URLs were blocked  in 2014, adding that “barring few numbers, all URLs were blocked on the  orders of the Court”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another RTI filed by Bangalore based think tank Centre for Internet and  Society (CIS) found that 143 URLs were blocked in first three months of  2015 in order to comply with the directions of the competent courts.  Later that year, the government attempted to block about 857 porn  websites, but it had to revoke the order following the backlash online  and offline.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The recent notice named a number of websites that need to be banned,  including pinkysingh.com, jasmineescorts.com, onlyoneescorts.com,  payalmalhotra.in, localescorts.in, pearlpatel.in, kavyajain.in,  xmumbai.in, shimi.in and anchu.in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Freedom on the Net 2015 report by Freedom House, which  termed India as a “partly free” country on the internet, there were 129  operational ISPs in India as of May 2015.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-moulishree-srivastava-june-14-2016-isps-start-blocking-escort-websites-following-govt-order'&gt;https://cis-india.org/internet-governance/news/business-standard-moulishree-srivastava-june-14-2016-isps-start-blocking-escort-websites-following-govt-order&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2016-07-02T04:17:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
