<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1186 to 1200.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/muzzling-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/mumbai-no-longer-2018meri-jaan2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/multi-stakeholders-consultation-on-intl-public-policy-issues-january-21-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/multistakeholder-consultation-on-encryption"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dna-april-16-2015-sunil-abraham-multiple-aspects-need-to-be-addressed-as-the-clamour-grows-for-network-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/multi-stakeholder-internet-governance-the-way-ahead"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/internet-rights-accessibility-regulation-ethics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/mag-analysis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/much-at-stake-for-tech-sector"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/draconian-it-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/mps-oppose-curbs-on-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/here-comes-gowda"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/muzzling-internet">
    <title>Muzzling the Internet</title>
    <link>https://cis-india.org/news/muzzling-internet</link>
    <description>
        &lt;b&gt;It is strange suddenly to be confronted with the provisions of a law passed way back in 2008. But why should the Information Technology Amendment Act, 2008, pushed through in the weeks following the 26/11 attacks in Mumbai be making news now? This news item by Sundeep Dougal was posted in Outlook on March 17, 2011.&lt;/b&gt;
        
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/FreedomofSpeech_20110316.jpg/image_preview" alt="Freedom of Expression" class="image-inline image-inline" title="Freedom of Expression" /&gt;&lt;/p&gt;
&lt;p&gt;The Economic Times, with a report headlined &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2011-03-16/news/28698054_1_internet-users-sovereignty-and-integrity-switch"&gt;Government can switch off your internet if necessary&lt;/a&gt; breathlessly reported yesterday:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;The Indian government has armed itself with powers to 'switch off' or kill the internet during times of national emergencies, becoming one of the first few countries to assume such far reaching authority. Even as the US and other western nations debate the judiciousness of giving the government's complete control to shut down cyber traffic, India has moved a step ahead and incorporated a provision under the IT Act of 2008, giving the Central government, or any of its officers specially authorised by it, to block the internet if necessary. The shutdown can happen in the interest of sovereignty and integrity of India, its defense, security of its states, friendly relations with foreign states or for public order. Failure to comply will result in imprisonment of up to seven&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;But perhaps the report can be excused for the simple reason that because the act was pretty much hustled through Parliament at a time when the national mindspace was preoccupied with other concerns, there was not much analysis or criticism in the mainstream media, though specialised blogs did raise an alarm even then. [See one critique dating back to December 2008 here April 2010 here -- and for the record, the bill was endorsed by the President in Feb 2009, and then only notified in October 2009.]&lt;/p&gt;
&lt;p&gt;Read the ET report further and you realise that the reference was perhaps occasioned by the following development that the news report went on to provide:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Not satisfied with this provision, India is now moving ahead to develop alternate plans in case the 'switch' does not work. The draft plan by the Cabinet Committee on Security and Ministry of Home Affairs along with Ministry of IT &amp;amp; Communications to 'choke' the internet at will, which ET reported last year, is also learnt to be in its final stages.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Choking refers to handicapping the servers by subjecting it to multiple requests and attacks and preventing it from functioning effectively&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;But more dangerous to the issue of freedom of the internet were the recent reports, earlier in the month, of the &amp;nbsp;blocking of Typepad, Mobango, Clickatell by some ISPs, though only one of them provided a message saying, "This site has been blocked as per request from the Department of Telecom". It was 2006 all over again.&lt;/p&gt;
&lt;p&gt;As usual, the real problem was the total arbitrariness of the process and the confusion was confounded further when an unnamed Airtel spokesperson told the Hindu that there was no directive from the government, and this was “just a temporary network problem”.&lt;/p&gt;
&lt;p&gt;The crux of the matter can be summed up in this one quote from Nikhil Pahwa of Medianama in the &lt;a class="external-link" href="http://www.thehoot.org/web/home/story.php?sectionId=6&amp;amp;mod=1&amp;amp;pg=1&amp;amp;valid=true&amp;amp;storyid=5163"&gt;Hoot&lt;/a&gt;: "what gets me angry is that we wouldn't even have got to know of the blocking. There are never any indications of which websites are blocked and why. We have got to have more transparency on these issues."&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.medianama.com/2011/03/223-indian-government-blocks-typepad-mobango-clickatell/"&gt;Medianama&lt;/a&gt; also compiled and reported the following:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://tech2.in.com/news/websites-internet/are-our-isps-blocking-blogspot/192672/0"&gt;Tech2&lt;/a&gt; wrote about a blogspot blackout on Feb 12th.&lt;/li&gt;&lt;li&gt;CuttingtheChai &lt;a class="external-link" href="http://www.cuttingthechai.com/2011/02/4828/savita-bhabhi-blocked-again-in-india-also-typepad-and-mobango/"&gt;wrote about&lt;/a&gt; Kirtu.com, where the not-safe-for-work comic Savita Bhabhi was hosted, Mobango, Typepad and Clickatell being blocked on Feb 22nd.&lt;/li&gt;&lt;li&gt;Kafila &lt;a class="external-link" href="http://kafila.org/2011/03/04/crazy-internet-censorship-time-in-india-again/"&gt;reports&lt;/a&gt;, and this is something that we’ve also been told about as well, that &lt;a class="external-link" href="http://www.zone-h.org/"&gt;Zone-H.org&lt;/a&gt; has been blocked as well. This is strange, but there is a suggestion that &lt;a class="external-link" href="http://www.bloggernews.net/124029"&gt;a company called E2 Labs got Zone-H blocked&lt;/a&gt;, because they did a post criticizing E2′s proposal to start a cyber security educational institution, alleging that there was falsification of information. A &lt;a class="external-link" href="http://www.naavi.org/cl_editorial_10/e2labs_zoneh_org.pdf"&gt;pdf of the post here&lt;/a&gt;, via Naavi.org. Again, we need clarity on why these blocks have been ordered. Also read Apar Gupta’s post&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.iltb.net/2010/04/the-utilitarian-critique-of-e-2-labs-v-zone-h/"&gt;the utilitarian critique of E2 Labs v. Zone-H&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.medianama.com/2011/03/223-it-minister-kapil-sibal-on-internet-block-social-media-worries/"&gt;Medianama further reported&lt;/a&gt; that on the sidelines of the Gov 2.0 conference last Friday, Communications &amp;amp; IT Minister Kapil Sibal passed the buck on the issue of lack of transparency in the way the Indian government blocks access to websites. Sibal told MediaNama that we should “Ask the Home Ministry, because this is a security issue.”&lt;/p&gt;
&lt;p&gt;As &lt;a class="external-link" href="http://kafila.org/2011/03/16/how-is-savita-bhabhi-a-threat-to-indias-national-security/"&gt;Shivam Vij of Kafila&lt;/a&gt; asked:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;All I want to ask Kapil Sibal is: How is Savita Bhabhi a threat to India’s national security? Wait, I have another question: why should I ask the Home Ministry when the orders for blocking come from your own Ministry, Mr Sibal, and the committee that decides on blocking has only one Home Ministry representative and two from your Ministry, sir?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;In theory a lot of people will say that the internet can not be free of regulation, that the government must block some sites. But this is the problem in practice: the government will block a soft porn comic &amp;nbsp;- only because it was talked about openly, discussed in the papers, and so on. Only because it came in the way of some bureaucrat’s antiquated sense of morality. Why, there are countless hard core Indian porn sites that are not blocked! (Oops, I shouldn’t be giving ideas.)&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;And when you wonder why the Government of India thinks Savita Bhabhi is too obscene for you, they will say national security!&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;If you don’t know about the Savita Bhabhi blocking issue, see this Huffington Post&amp;nbsp;&lt;a class="external-link" href="http://www.huffingtonpost.com/2009/07/23/savita-bhabhi-india-mourn_n_243427.html"&gt;article&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;All of this of course assumes ominous overtones when one considers the government's attitude on Wikileaks and offers an inkling of the shape of things to come when we look at the recent &amp;nbsp;release of the long awaited &lt;a class="external-link" href="http://www.mit.gov.in/content/cyber-laws"&gt;draft rules for important sections of the Information Technology Act 2000&lt;/a&gt;, objections to which were sought from the public by February 28, 2011.&lt;/p&gt;
&lt;p&gt;So far, the following draft rules have been formalised:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The Draft rule under &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/senstivepersonainfo07_02_11.pdf"&gt;section 43A- Reasonable security practices and procedures and sensitive personal information&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Privacy India and Centre for Internet and Society, Bangalore have offered a detailed para-wise commentary&lt;a class="external-link" href="http://www.cis-india.org/advocacy/igov/blog/security-practices-rules"&gt; here&lt;/a&gt;.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The Draft rule under &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/due_dilligance4intermediary07_02_11.pdf"&gt;section 79-Due diligence observed by intermediaries guidelines&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;A detailed, para-wise, criticism is available by the Centre for Internet and Society which pointed out, inter-alia:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;they vest an extraordinary power of censorship in the hands of the intermediary, which could easily lead to the stifling of the constitutionally guaranteed freedom of speech online. &amp;nbsp;Analogous restrictions do not exist in other fields, e.g., against the press in India or against courier companies, and there is no justification to impose them on content posted online. Taken together, these provisions make it impossible to publish critical views about anything without the risk of being summarily censored.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The rules are so loosely worded as to cover almost anything. For example, consider Section 3 of the proposed rules, particularly point (g):&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"causes annoyance or inconvenience or deceives or misleads the addressee about the origin of such messages or communicates any information which is grossly offensive or menacing in nature;"&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Imagine the number of sensitive souls out there who could be claiming "inconvenience" because of "annoyance" having been caused.&lt;/p&gt;
&lt;p&gt;The Draft rule under &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/guidelines4cybercafe0702_11.pdf"&gt;section 79-Guidelines for Cyber Cafe&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A critique by &lt;a class="external-link" href="http://prsindia.org/theprsblog/2011/02/25/no-more-wireless-internet-at-cafes-and-airports/"&gt;PRS blog&lt;/a&gt; | &lt;a class="external-link" href="http://www.medianama.com/2011/02/223-cybercafe-rules-it-act-india/"&gt;Medianama&lt;/a&gt; | &lt;a class="external-link" href="http://www.cis-india.org/advocacy/igov/blog/cyber-cafe-rules"&gt;Centre for Internet and Society&lt;/a&gt; points out, inter alia, that&lt;/p&gt;
&lt;p&gt;if enforced it will end up choking public access Internet in the country, whether through Cybercafes or at Wifi hotspots, which would cover all regular cafes that offer Internet access, the airport, where some telcos allow access, or even on-campus connectivity.&lt;/p&gt;
&lt;p&gt;While the comments for the above rules were invited only till 28.02.2011, perhaps it would still be useful to let the authorities know what one thinks about these rules by sending an email to: grai AT mit.gov.in&lt;/p&gt;
&lt;p&gt;Read the original post in the Outlook &lt;a class="external-link" href="http://blogs.outlookindia.com/default.aspx?ddm=10&amp;amp;pid=2454&amp;amp;eid=5"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/muzzling-internet'&gt;https://cis-india.org/news/muzzling-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:14:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/mumbai-no-longer-2018meri-jaan2019">
    <title>Mumbai no longer ‘meri jaan’</title>
    <link>https://cis-india.org/news/mumbai-no-longer-2018meri-jaan2019</link>
    <description>
        &lt;b&gt;Why online (and offline) activism after 26/11 never took off; what should have been done to mobilize people - an article in the Livemint by Seema Chowdhry and Samanth Subramanian - 20th November, 2009&lt;/b&gt;
        
&lt;p&gt;On “One Million Strong for Bombay” (23,601 members), a 9 October post concerned the activist Hansel D’Souza, chairman of the Juhu Citizens’ Welfare Group, the Citizens’ Consensus candidate for the Andheri (West) assembly constituency; an earlier post involved the schedule of the Jazz Yatra. On “The Black Badge for Bombay” (853 members), the last post, from 31 August, wonders if Pakistan is a pawn being used by China against India.&lt;/p&gt;
&lt;p&gt;“The idea behind ‘Black Badge for Bombay’ initially was to keep the pressure on so that the reaction to the attacks in terms of government preparedness results in concrete action,” says Somasekhar Sundaresan, the group’s creator. “The government has now set up a combat force in Mumbai, which was the stated immediate objective of this movement and &lt;br /&gt;pressure group. After that, we needed to move on.”&lt;/p&gt;
&lt;p&gt;Sundaresan admits that the posts have not been updated more frequently because he hasn’t worked hard enough to get people interested in newer issues. “Most of my discussions about civil rights movements are restricted to five or six friends who are members of this Facebook group too,” he says. “It is easier to talk to them because I meet them &lt;br /&gt;professionally and personally often.” “The Black Badge for Mumbai” has also been unable to organize offline meetings.&lt;/p&gt;
&lt;p&gt;What these groups lacked, according to Sunil Abraham, executive director of the Centre for Internet and Society in Bangalore, was a dedicated team to keep the momentum going. “They don’t have intelligently incremental action points that keep their audiences increasingly engaged,” he says in an email interview. “The creators often underestimate the importance of offline activities that will keep their audiences motivated. Finally, many of them take their membership for &lt;br /&gt;granted and don’t bother sending regular updates or even an occasional thank you.”&lt;/p&gt;
&lt;p&gt;It was perhaps the need to sustain momentum that drove some of the offline citizens’ groups into the political sphere. Anil Bahl allied his Let’s Rebuild India with the Professionals Party of India. A group called Jago Mumbai turned into the Jago Party, which fielded a candidate in the Lok Sabha election from north-west Mumbai. (He lost.) “We decided that we couldn’t do anything alone,” says Bhuresh Barot, a working member of the Jago Party. “You need to be in power to do anything.”&lt;/p&gt;
&lt;p&gt;As his party’s south Mumbai coordinator, Barot witnessed a rapid dissolution of voter outrage back into voter apathy; in the Lok Sabha election, the turnout stood at 43.3%. “The main reason seemed to be that voters thought they already knew the ideology of every party,” Barot theorizes. “And they decided they simply didn’t have faith in the candidates.”&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.livemint.com/2009/11/19213112/Mumbai-no-longer-8216meri-j.html?pg=1"&gt;Link to original article&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/mumbai-no-longer-2018meri-jaan2019'&gt;https://cis-india.org/news/mumbai-no-longer-2018meri-jaan2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>radha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T06:52:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/multi-stakeholders-consultation-on-intl-public-policy-issues-january-21-2014">
    <title>Multistakeholders Consultation on International Public Policy Issues</title>
    <link>https://cis-india.org/news/multi-stakeholders-consultation-on-intl-public-policy-issues-january-21-2014</link>
    <description>
        &lt;b&gt;The Department of Electronics &amp; Information Technology has called for a meeting on January 21 in New Delhi to discuss international public policy issues. Snehashish Ghosh will participate in the meeting.&lt;/b&gt;
        &lt;p&gt;MAG Meeting Notice issued by the Department of Electronics &amp;amp; Information Technology on January 13 can be &lt;a href="https://cis-india.org/internet-governance/blog/mag-notice.pdf" class="internal-link"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/multi-stakeholders-consultation-on-intl-public-policy-issues-january-21-2014'&gt;https://cis-india.org/news/multi-stakeholders-consultation-on-intl-public-policy-issues-january-21-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-03T10:07:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/multistakeholder-consultation-on-encryption">
    <title>Multistakeholder Consultation on Encryption</title>
    <link>https://cis-india.org/internet-governance/events/multistakeholder-consultation-on-encryption</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) in collaboration with ORF and Takshashila Institution is organizing a Multi-Stakeholder Consultation on Encryption on December 17, 2016 at TERI in Bengaluru. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The consultation is intended to help shape the discussions around the new draft encryption policy slated to be released sometime early next year. The consultation will be divided into two segments: an open house and a panel discussion with high-level government representatives, including Dr. Gulshan Rai, the National Cyber Security Coordinator. The sessions start at 10.30 a.m. on December 17, 2016 and will go on for until approximately 4.30 p.m.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions themselves will highlight inputs from the three main constituents affected by an encryption policy: civil society and end users, the private sector and government. The range of civil liberties and constitutional rights implicated by encryption, as well as the needs of businesses to secure data flows will be discussed. Government officials too are expected to join the consultation and will provide perspectives on encryption and legitimate access to data for law enforcement purpose.&lt;/p&gt;
&lt;p&gt;For more info reach out to Udbhav Tiwari (&lt;a class="moz-txt-link-abbreviated" href="mailto:udbhav@cisindia.org"&gt;udbhav@cisindia.org&lt;/a&gt;) or Bedavyasa Mohanty (&lt;a class="moz-txt-link-abbreviated" href="mailto:bedavyasam@orfonline.org"&gt;bedavyasam@orfonline.org&lt;/a&gt;)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/multistakeholder-consultation-on-encryption'&gt;https://cis-india.org/internet-governance/events/multistakeholder-consultation-on-encryption&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-17T01:22:35Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dna-april-16-2015-sunil-abraham-multiple-aspects-need-to-be-addressed-as-the-clamour-grows-for-network-neutrality">
    <title>Multiple Aspects Need to be Addressed as the Clamour Grows for Network Neutrality</title>
    <link>https://cis-india.org/internet-governance/blog/dna-april-16-2015-sunil-abraham-multiple-aspects-need-to-be-addressed-as-the-clamour-grows-for-network-neutrality</link>
    <description>
        &lt;b&gt;In the global debate there are four violations of Network Neutrality that are considered particularly egregious.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.dnaindia.com/analysis/column-everyone-equally-unhappy-2077796"&gt;published in DNA &lt;/a&gt;on April 16, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;One — blocking of destinations or services in order to force the  consumer to pay extra charges for access, two — not charging or  zero-rating of certain destinations and services with or without  extraction of payment from the sender or destination, and three —  throttling or prioritisation of traffic between competing destinations  or services and four — specialised services wherein the very same &lt;a href="http://www.dnaindia.com/topic/internet"&gt;Internet&lt;/a&gt; infrastructure is used to provide non-Internet but IP based services such as IP-TV.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main harms of network neutrality violations are as follows: one, censorship by private parties without legal basis; two, innovation harms because the economic threshold for new entrants is raised significantly; three, competition harms as monopolies become more entrenched and then are able to abuse their dominant position; four, harms to diversity because of the nudge effect that free access to certain services and destinations has on consumers reducing the infinite plurality of the Internet to a set of menu options. The first and fourth harm could result in the Internet being reduced to a walled garden.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is insufficient to try and address this with networking rules for engineers such as “all packets should be treated equally.” But a set of principles could be developed that can help us grow access without violating network neutrality. Wikimedia Foundation has already developed their principles which they call “Wikipedia Zero Operating Principles”. In India our principles could include the following. One, no blocking without legal basis. Two, transparency — all technical and commercial arrangements are to be disclosed to the public. Three, non-exclusivity — all arrangements should be available to all parties, no special deals for those you favour. Four, non-discrimination between equals — technologies and entities that are alike should be treated alike. Five, necessity — whilst some measure may be required occasionally when there is network congestion they should be rolled back in a time-bound fashion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once these principles are enforced through a network neutrality regulation, ISPs and telecom operators will be allowed to innovate with business and payment models. Steve Song, inventor of Village Telco says “My preferred take on zero-rating would be to zero-rate gprs/edge data in general so that there is a minimum basic access for all.” My colleague Pranesh Prakash says “One possibility, of many, is to create a single marketplace or exchange for zero-rating, through which one can zero-rate on all telecom networks for standard tiered rates that they publish, and terms that are known to the regulator. Banning is akin to a brahmastra in a regulator's arsenal: it should not be used lightly” Jochai Ben-Avie of Mozilla told me yesterday of experiments in Bangladesh where consumers watch an advertisement everyday in exchange for 5Mb of data. My own suggestion to address the harms caused by walled gardens would be to make them leak – mandate that unfettered access to the Internet be provided every other hour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is many other ways in which the Internet has been transformed in India and other countries but these are not commonly considered network neutrality violations. Here are some examples.  One, blocking of port 25 — a port that is commonly used to relay email spam. Two, blocking of port 80 – so that domestic connections cannot be used to host web servers. Three, the use of private IP addresses, ISPs who are delaying migration to IPv6 infrastructure because of cost implications leverage their IPv4  address inventory by using Carrier Grade — Network Address Translators [CG-NATs].  Four, asymmetric connections where download speeds for consumers are faster than upload speeds. With the exception of the first example — all of them affect end users negatively but do not usually impact corporations and therefore have been  unfortunately sidelined in the global debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The TRAI consultation paper reveals many of the concerns of the telecom operators that go beyond the scope of network neutrality. Many of these concerns are very legitimate. There is a scarcity of spectrum  — this could partially be addressed by auctioning more spectrum, scientific management of spectrum, promotion of shared spectrum and unlicensed spectrum. Their profit margins are thinning – this could be addressed by dismantling the Universal Service Obligation Fund, it is after all as Rohan Samarajiva puts it “a tax on the poor.” Internet companies don't pay taxes – this could be addressed by the Indian government, by adopting the best practices from the OECD around preventing tax avoidance. But some of their concerns cannot be addressed because of the technological differences between telecom and Internet networks. While it is relatively easy to require telecom companies to provide personal information and allow for interception of communications, those Internet companies that use end-to-end encryption cannot divulge personal information or facilitate interception because it is technologically impossible. While the first two concerns could be addressed by TRAI, the last two should be addressed by other ministries and departments in the Indian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are other concerns that are much more difficult to address without the deep understanding of latest advancements in radio communication, signal processing and congestion control techniques in packet switched networks. A telecom expert who did not wish to be identified told me that “even 2G TDM voice is 10 to 15 times more efficient when compared to VOIP. IP was developed to carry data, and is therefore not an efficient mode to carry voice as overhead requirement for packets destroys the efficiency on voice. Voice is best carried close to the physical layer where the overheads are lowest.” He claims that since “VOIP calls are spectrally inefficient they should be discouraged” through differential pricing. We need accessible scientific literature and monitoring infrastructure so that an evidence base around concerns like this can be created so as to address them effectively through regulatory interventions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You know you have reached a policy solution when all concerned stakeholders are equally unhappy. Unfortunately, the TRAI consultation paper assumes that Internet companies operate in a regulatory vacuum and therefore places much unnecessary focus on the licensing of these companies. This is a disastrous proposal since the Internet today is the result of “permission-less innovation”. The real issue is network neutrality and one hopes that after rigorous debate informed by scientific evidence TRAI finds a way to spread unhappiness around equally.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The author works for the Centre for Internet and Society which  receives funds from Wikimedia Foundation which has zero-rating alliances  with telecom operators in many countries across the world.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dna-april-16-2015-sunil-abraham-multiple-aspects-need-to-be-addressed-as-the-clamour-grows-for-network-neutrality'&gt;https://cis-india.org/internet-governance/blog/dna-april-16-2015-sunil-abraham-multiple-aspects-need-to-be-addressed-as-the-clamour-grows-for-network-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-04-16T13:33:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa">
    <title>Multinational Cyber Security Forum at University of Haifa</title>
    <link>https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa</link>
    <description>
        &lt;b&gt;Sunil Abraham participated in a meeting in Israel on Multinational Cyber Security Forum hosted by Center for Cyber, Law and Policy and University of Haifa in collaboration with the Hewlett Foundation Cyber Initiative.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The workshop was held from November 5 to 7, 2017. The objective of the workshop was to facilitate a free and open exchange among participants under the Chatham House Rules. The workshop sought to identify areas of agreement and dissent pertaining to cyber security regulation and to explore issues that require further research, clarification and development.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa'&gt;https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-27T14:34:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how">
    <title>Multi-stakeholder Models of Internet Governance within States: Why, Who &amp; How?</title>
    <link>https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how</link>
    <description>
        &lt;b&gt;Internet governance, for long a global exercise, has found new awareness within national frameworks in recent times. Especially relevant for developing countries, effective national IG mechanisms are important to raise awareness and ensure multi-stakeholder participation at technical, infrastructural and public policy levels.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This post is a surface-level overview of national IG bodies, and is intended to inform introductory thoughts on national IG mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;A Short Introduction&lt;/strong&gt;&lt;i&gt; &lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The previous decade has seen a &lt;a href="http://www.intgovforum.org/cms/igf-initiatives"&gt;proliferation&lt;/a&gt; of regional, sub-regional and national initiatives for Internet governance (IG). Built primarily on the multi-stakeholder model, these initiatives aim at creating dialogue on issues of regional, local or municipal importance. In Asia, Bangladesh has instituted a national IGF, the Bangladesh IGF, with the &lt;a href="http://www.intgovforum.org/cms/2011/NationalregionalIGFreports/BANGLADESHIGF.2011.pdf"&gt;stated objective&lt;/a&gt; of creating a national multi-stakeholder forum that is specialized in Internet governance issues, and to facilitate informed dialogue on IG policy issues among stakeholders. India, too, is currently in the process of instituting such a forum. At this juncture, it is useful to consider the rationale and modalities of national IG bodies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet has long been considered a sphere of non-governmental, multi-stakeholder, decentralized, bottom-up governance space. The Declaration of Independence of Cyberspace, John Perry Barlow’s defiant articulation of the &lt;a href="https://projects.eff.org/~barlow/Declaration-Final.html"&gt;Internet’s freedom from governmental control&lt;/a&gt;, is a classic instance of this. The Internet is a “&lt;i&gt;vast ocean&lt;/i&gt;”, we claimed; “&lt;i&gt;no one owns it&lt;/i&gt;”.&lt;a href="#_ftn1"&gt;[1]&lt;/a&gt; Even today, members of the technical community insist that everyone ought to “&lt;i&gt;let techies do their job&lt;/i&gt;”: a plea, if you will, of the complexity of cyber-walls and –borders (or of their lack).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But as Prof. Milton Mueller argues in &lt;i&gt;Ruling the Root&lt;/i&gt;, the Internet has always been a contentious resource: battles over its governance (or specifically, the governance of the DNS root, both the &lt;a href="http://www.iana.org/domains/root/files"&gt;root-zone file&lt;/a&gt; and the &lt;a href="http://root-servers.org/"&gt;root servers&lt;/a&gt;) have leapt from the naïveté of the Declaration of Independence to a private-sector-led, contract-based exploitation of Internet resources. The creation of ICANN was a crucial step in this direction, following arbitrary policy choices by Verizon and entities managing the naming and numbering resources of the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The mushrooming of parallel tracks of Internet governance is further evidence of the malleability of the space. As of today, various institutions – inter-governmental and multi-stakeholder – extend their claims of governance. ICANN, the World Summit of Information Society, the World Conference on International Telecommunications, the Internet Governance Forum and the Working Group on Enhanced Cooperation under the ECOSOC Committee for Science, Technology and Development are a few prominent tracks. As of today, the WSIS process has absorbed various UN special bodies (the ITU, UNESCO, UNCTAD, UNDP are but a few), with the UNESCO instituting a &lt;a href="http://www.unesco.org/new/internetstudy"&gt;separate study&lt;/a&gt; on Internet-related issues. A proposal for a multilateral Committee on Internet-Related Policies remains &lt;a href="http://www.internetgovernance.org/2011/10/29/a-united-nations-committee-for-internet-related-policies-a-fair-assessment/"&gt;stillborn&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amongst these, the Internet Governance Forum (IGF) remains a strong contender for a truly multi-stakeholder process facilitating dialogue on IG. The IGF was set up following the recommendation of the Working Group of Internet Governance (WGIG), constituted after the Geneva phase of the WSIS.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;Rationale: Why Have National IG bodies?&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The issue of national multi-stakeholder cooperation/collaboration in IG is not new; it has been alive since the early 2000s. The &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt;, in paragraph 80, encourages the “&lt;i&gt;development of multi-stakeholder processes at the &lt;span&gt;national, regional and international levels&lt;/span&gt; to discuss and collaborate on the expansion and diffusion of the Internet as a means to support development efforts to achieve internationally agreed development goals and objectives, including the Millennium Development Goals&lt;/i&gt;” (emphasis supplied).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In its &lt;/span&gt;&lt;a href="http://www.wgig.org/docs/WGIGREPORT.pdf"&gt;June 2005 Report&lt;/a&gt;&lt;span&gt;, the Working Group on Internet Governance (WGIG) emphasizes that “&lt;/span&gt;&lt;i&gt;global Internet governance can only be effective if there is &lt;span&gt;coherence&lt;/span&gt; with &lt;span&gt;regional, subregional and national-level&lt;/span&gt; policies&lt;/i&gt;&lt;span&gt;”. Towards this end it recommends that “&lt;/span&gt;&lt;i&gt;coordination be established &lt;span&gt;among all stakeholders at the national level&lt;/span&gt; and &lt;span&gt;a multi-stakeholder national Internet governance steering committee or similar body&lt;/span&gt; be set up&lt;/i&gt;&lt;span&gt;” (emphasis supplied). The IGF, whose creation the WGIG recommended, has since been commended for its impact on the proliferation of national IGFs.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The rationale, then, was that multi-stakeholder steering committees at the national level would help to create a cohesive body to coordinate positions on Internet governance. In &lt;/span&gt;&lt;i&gt;Reforming Internet Governance&lt;/i&gt;&lt;span&gt;, WGIG member Waudo Siganga writes of the Internet Steering Committee of Brazil as a model, highlighting lessons that states (especially developing countries) may learn from CGI.br.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Brazilian Internet Steering Committee (CGI.br) was set up in 1995 and is responsible, &lt;/span&gt;&lt;i&gt;inter alia&lt;/i&gt;&lt;span&gt;, for the management of the .br domain, distribution of Internet addresses and administration of metropolitan Internet exchange points. CERT.br ensures network security and extends support to network administrators. Siganga &lt;/span&gt;&lt;a href="http://www.wgig.org/docs/book/Waudo-Siganga.html"&gt;writes&lt;/a&gt;&lt;span&gt; that CGI.br is a “&lt;/span&gt;&lt;i&gt;well-structured multistakeholder entity, having representation from government and democratically chosen representatives of the business sector, scientific and technological community and an Internet expert&lt;/i&gt;&lt;span&gt;”.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Why is CGI.br a model for other states? &lt;/span&gt;&lt;i&gt;First&lt;/i&gt;&lt;span&gt;, CGI.br exemplifies how countries can structure in an effective manner, a body that is involved in creating awareness about IG issues at the national level. Moreover, the multi-stakeholder nature of CGI.br shows how participation can be harnessed effectively to build capacity across domestic players. This also reflects the multi-stakeholder aspects of Internet governance at the global level, clarifying and implementing the WSIS standards (for instance). Especially in developing countries, where awareness and coordination for Internet governance is lacking at the national level, national IG committees can bridge the gap between awareness and participation. Such awareness can translate into local solutions for local issues, as well as contributing to an informed, cohesive stance at the global level.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Stakeholders: Populating a national IG body&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A national IG body – be in steering committee, IGF or other forum – should ideally involve all relevant stakeholders. As noted before, since inception, the Internet has not been subject to exclusive governmental regulation. The World Summit on Information Society recognized this, but negotiations amongst stakeholders resulted in the delegation of roles and responsibilities: the controversial and much-debated paragraph 35 of the &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt; reads:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;The private sector has had, and should continue to have, an important role in the development of the Internet, both in the technical and economic fields.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Civil society has also played an important role on Internet matters, especially at community level, and should continue to play such a role.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Intergovernmental organizations have had, and should continue to have, a facilitating role in the coordination of Internet-related public policy issues.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;International organizations have also had and should continue to have an important role in the development of Internet-related technical standards and relevant policies.&lt;/i&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This position remains endorsed by the WSIS process; the recent WSIS+10 High Level Event &lt;a href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;endorsed by acclamation&lt;/a&gt; the &lt;i&gt;WSIS+10 Vision for WSIS Beyond 2015&lt;/i&gt;, which “&lt;i&gt;respect mandates given by Tunis Agenda and respect for the multi-stakeholder principles&lt;/i&gt;”. In addition to government, the private sector and civil society, the technical community is identified as a distinct stakeholder group. Academia has also found a voice, as demonstrated by stakeholder-representation at NETmundial 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20framework%20for%20IG%20assessments%20-%20D%20Souter%20-%20final_0.pdf"&gt;study of the Internet Society&lt;/a&gt; (ISOC) on &lt;i&gt;Assessing National Internet Governance Arrangements&lt;/i&gt;, authored by David Souter, maps IG stakeholders at the global, regional and national levels. At the global level, primary stakeholders include ICANN (not-for-profit, private sector corporation involved in governance and technical coordination of the DNS), the IETF, IAB and W3C (technical standards), governments and civil society organizations, all of which participate with different levels of involvements at the IGF, ICANN, ITU, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the national/municipal level, the list of stakeholders is as comprehensive. &lt;strong&gt;Governmental stakeholders&lt;/strong&gt; include: (1) relevant Ministries (in India, these are the Ministry of Information and Broadcasting, and the Ministry of Communications and Information Technology – the Department of Electronics and Information Technology under the MCIT is particularly relevant), and (2) regulators, statutory and independent (the Telecom Regulatory Authority of India, for example). At the national level, these typically seek inputs from other stakeholders while making recommendations to governments, which then enact laws or make policy. In India, for instance, the &lt;a href="http://www.trai.gov.in/content/CONSULTATION/0_CONSULTATIONS.aspx"&gt;TRAI conducts consultations&lt;/a&gt; prior to making recommendations to the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within the &lt;strong&gt;private sector&lt;/strong&gt;, there may be companies (1) on the supply-side, such as infrastructure networks, telecommunications service companies, Internet Service Providers, search engines, social networks, cybercafés, etc., and (2) on the demand-side, online businesses, advertising/media, financial service providers, etc. who &lt;i&gt;use&lt;/i&gt; the Internet. There may also be &lt;strong&gt;national registries&lt;/strong&gt; managing ccTLDs, such as the Registro.br or the National Internet Exchange of India (NIXI). There may also the &lt;strong&gt;press and news corporations&lt;/strong&gt; representing both corporate and public interest under specific circumstances (media ownership and freedom of expression, for distinct examples).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Civil society organisations&lt;/strong&gt;, including consumer organisations, think-tanks and grassroots organisations, participate at various levels of policy-making in the formal institutional structure, and are crucial in representing users and public interest. The complexity of stakeholders may be seen from &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20framework%20for%20IG%20assessments%20-%20D%20Souter%20-%20final_0.pdf"&gt;Souter’s report&lt;/a&gt;, and this enumeration is but a superficial view of the national stakeholder-population.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Processes: Creating effective national IG bodies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;National IG bodies – be they steering committees, IGFs, consultative/working groups or other forums – may be limited by formal institutional governmental settings. While limited by the responsibility-gradient in paragraph 35 of the Tunis Agenda, an effective national IG body requires robust multi-stakeholder participation, as Souter notes, in technical governance, infrastructure and public policy issues. Its effectiveness also lies in governmental acquiescence of its expertise and recommendations; in short, in the translation of the IG body’s decisions into policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How do these stakeholders interact at the national level? In addition to the Brazilian example (CGI.br), an &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20study%20of%20IG%20in%20Kenya%20-%20D%20Souter%20%26%20M%20Kerretts-Makau%20-%20final.pdf"&gt;ISOC study&lt;/a&gt; by Souter and Monica Kerretts-Makau, &lt;i&gt;Internet Governance in Kenya: An Assessment&lt;/i&gt;, provides a detailed answer. At the &lt;strong&gt;technical level&lt;/strong&gt;, the registry KENIC manages the .ke domain, while the Kenya Computer Incident Response Team Coordination Centre coordinates national responses to incidents and collaborates internationally on cyber-security issues. A specific IPv6 Force to promote Kenya’s transition to IPv6 was also created.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the &lt;strong&gt;infrastructural level&lt;/strong&gt;, both the government and the private sector play important roles. Directly, ministries and government departments consult with infrastructure providers in creating policy. In India, for instance, the TRAI conducts multi-stakeholder consultations on issues such as telecom tariffs, colocation tariffs for submarine cable stations and mobile towers, etc. The government may also take a lead in creating infrastructure, such as the national optic fibre networks in &lt;a href="http://www.bbnl.nic.in/content/page/national-optical-fibre-networknofn.php"&gt;India&lt;/a&gt; and &lt;a href="https://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=11&amp;amp;ved=0CBsQFjAAOAo&amp;amp;url=http%3A%2F%2Fwww.kictanet.or.ke%2F%3Fp%3D1822&amp;amp;ei=avmeU_SaII6SuATi2ICoDA&amp;amp;usg=AFQjCNEgUIpb_kf2Fx-s7TJ2H-xl1rm9WA&amp;amp;sig2=HlpJp1UlVXRHTAOPh9W7Bg&amp;amp;bvm=bv.68911936,d.c2E&amp;amp;cad=rja"&gt;Kenya&lt;/a&gt;, as also creating investment opportunities such as liberalizing FDI. At the &lt;strong&gt;public policy level&lt;/strong&gt;, there may exist consultations initiated by government bodies (such as the TRAI or the Law Commission), in which other stakeholders participate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As one can see, government-initiated consultations by ministries, regulators, law commissions or specially constituted committees. Several countries have also set up national IGFs, which typically involve all major stakeholders in voluntary participation, and form a discussion forum for existing and emerging IG issues. National IGFs &lt;a href="http://www.internetgovernance.org/2009/08/28/another-mini-internet-governance-forum-in-the-u-s-a/"&gt;have been considered&lt;/a&gt; particularly useful to create awareness within the country, and may best address IG issues at the domestic policy level. However, Prof. Mueller &lt;a href="http://www.internetgovernance.org/2008/01/18/the-igf-and-networked-internet-governance/"&gt;writes&lt;/a&gt; that what is necessary is a “&lt;i&gt;reliable mechanism reliable mechanisms for consistently feeding the preferences expressed in these forums to actual global policy-making institutions like ICANN, RIRs, WIPO, and WTO which impact distributional outcomes&lt;/i&gt;”.&lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1"&gt;[1]&lt;/a&gt; M. Mueller, Ruling the Root: Internet Governance and the Taming of Cyberspace 57 (2002).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how'&gt;https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>National IGFs</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    

   <dc:date>2014-06-16T14:27:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/multi-stakeholder-internet-governance-the-way-ahead">
    <title>Multi-stakeholder Internet Governance: The Way Ahead</title>
    <link>https://cis-india.org/internet-governance/events/multi-stakeholder-internet-governance-the-way-ahead</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) in partnership with Software Freedom Law Centre (SFLC.in) is organizing a workshop "Multi-stakeholder Internet Governance: The Way Ahead" on August 6, 2014, 10.30 a.m. to 12.00 p.m., at during the APrIGF event to be held at Crown Plaza, Greater Noida.&lt;/b&gt;
        &lt;h3&gt;Thematic Area of Interest&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Enhanced Cooperation &amp;amp; the Multi-stakeholder model&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;:&lt;br /&gt;Today, multi-stakeholderism is the catchphrase in Internet governance. With the display of a multi-stakeholder model at NETmundial, controversies and opinions regarding the meaning, substance and benefits of multi-stakeholderism have deepened. As the recent meeting of the Working Group on Enhanced Cooperation of the United Nations Commission on Science, Technology and Development demonstrates, questions and concerns regarding meaning of multi-stakeholderism, the&lt;br /&gt;&lt;br /&gt;legitimacy and desirability of its processes, and the successes and disappointments of its outcomes now dominate the discussion. At this juncture, clarity and consensus are imperative to determine the future of multi-stakeholderism in Internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Roles and responsibilities of stakeholders&lt;/b&gt;:&lt;br /&gt;The debates surrounding stakeholder-roles in Internet governance began with ¶ 49 of the Geneva Declaration of Principles and ¶ 35 of the Tunis Agenda, which delineated clear roles and responsibilities. It created a ‘contributory’ multi-stakeholder model, where states held sovereign authority over public policy issues, while business and civil society were contributed to ‘important roles’ at the ‘technical and economic fields’ and the ‘community level’, respectively. At the same time, it set forth an agenda for enhanced cooperation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the WGEC meeting (April 30-May 2, 2014) demonstrated, there is as yet no consensus on stakeholder-roles. Certain governments remain strongly opposed to equal roles of other stakeholders, emphasizing their lack of accountability and responsibility. Civil society is similarly splintered, with a majority opposing the Tunis Agenda delineation of stakeholder-roles, while others remain dubious of permitting the private sector an equal footing in public policy-making. Still others question the wisdom of seeking a ‘fix’ when ‘nothing is broken’. In this session, we aim to interrogate the benefits and disadvantages of an ‘equal footing’ model, as opposed to a ‘contributory’ model.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Specific Issues of Discussions &amp;amp; Description&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Who are the stakeholders? Should a multi-stakeholder model of Internet governance grant all stakeholders ‘equal footing’? Should such ‘equal footing’ be relegated to issues other than substantive public policy-making? On the other hand, is a ‘contributory’ model safer? Are states better equipped to represent interests inclusively? How can governments and businesses best perform their role as trustees of the public interest of interest users?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In view of the formidable consolidation by the private sector at NETmundial, while civil society splintered on issues of intellectual property and intermediary liability, can a ‘participative model’ better prevent detrimental outcomes?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Multi-stakeholderism beyond NETmundial&lt;/b&gt;:&lt;br /&gt;As important as the meaning of multi-stakeholderism is the process of its execution. The need to fashion safe and sustainable processes for multi-stakeholder participation was highlighted by the successes and failures of private sector and civil society at NETmundial. From the ICANN and IGF models to stakeholder coalitions, premeeting coordination and governmental policy participation, this session shall expand on the quest for effective and beneficial stakeholder participation and representation in both the ‘equal footing’ and ‘contributory’ models, with a focus on enhancing developing country participation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Particularly, lessons that Internet governance may draw from multi-stakeholder governance processes across areas shall be discussed. For instance, deliberative democracy, enterprise associations or unions (such as in the International Labour Organisation) may all be of value. Similarly, multi-stakeholder processes in environmental and corporate governance and the development sector may benefit Internet governance. In determining the value of these processes to Internet governance, public interest of users is an important consideration. The capability and initiative of governments to implement an effective bottom-up model of Internet governance is equally important and will be considered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We aim to conduct a 90-minute workshop (2 panels of 45 minutes each), inclusive of 15-30 minutes in all for Q&amp;amp;A from audience, panellists and moderators.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/multi-stakeholder-internet-governance-the-way-ahead'&gt;https://cis-india.org/internet-governance/events/multi-stakeholder-internet-governance-the-way-ahead&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-29T07:08:04Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/internet-rights-accessibility-regulation-ethics">
    <title>Multi-Stakeholder Consultation on ‘Internet Rights, Accessibility, Regulation &amp; Ethics’</title>
    <link>https://cis-india.org/internet-governance/internet-rights-accessibility-regulation-ethics</link>
    <description>
        &lt;b&gt;Digital Empowerment Foundation, Association for Progressive Communications, Department of Information Technology and National Internet Exchange of India came together to organize an event on "Internet Rights, Accessibility, Regulation &amp; Ethics". This was held at Mirza Ghalib Hall, SCOPE Complex, New Delhi from 9.00 a.m. to 2.30 p.m. on May 3, 2012. Pranesh Prakash was a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The core aim of the dedicated half-day consultation programme was to discuss, deliberate and debate over the internet related concerns, covering the larger theme of internet and outlining India’s progress towards ‘Internet Access for All’, and specific areas of concern – right to information, internet &amp;amp; information access, internet governance, Internet regulation, content specifications, cyber law, and appropriate policy framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The consultation was an effort to encourage stakeholders to adopt relevant, appropriate and time bound measures to accelerate the availability, affordability and accessibility of the internet and address issues around it.&lt;b&gt;*&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;a class="anchor-link" href="#fn1"&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/hB4PI2ueVb0" width="320"&gt;&lt;/iframe&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;b&gt;External Links&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;*&lt;/b&gt;See the original info published at Digital Empowerment Foundation, Multi-Stakeholder Consultation on ‘Internet Rights, Accessibility, Regulation &amp;amp; Ethics’ : Digital Empowerment Foundation, &lt;a class="external-link" href="http://bit.ly/OGyYeg"&gt;&lt;span class="visualHighlight"&gt;http://bit.ly/OGyYeg&lt;/span&gt;&lt;/a&gt;, last accessed on June 29, 2012.&lt;/li&gt;
&lt;li&gt;&lt;span class="visualHighlight"&gt;&lt;a href="https://cis-india.org/news/towards-a-multi-stakeholder-consultation" class="internal-link"&gt;Click here&lt;/a&gt;&lt;/span&gt; for the Event Agenda&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.youtube.com/watch?v=hB4PI2ueVb0"&gt;See the video on YouTube&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/internet-rights-accessibility-regulation-ethics'&gt;https://cis-india.org/internet-governance/internet-rights-accessibility-regulation-ethics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-25T10:22:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/mag-analysis">
    <title>Multi-stakeholder Advisory Group Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/mag-analysis</link>
    <description>
        &lt;b&gt;This analysis has been done to see the trend in the selection and rotation of the members of the Multistakeholder advisory group (MAG) in the Internet Governance Forum (IGF). The MAG has been functional for nine years from 2006-2015. The analysis is based on data procured, collated and organised by Pranesh Prakash and Jyoti Panday. Shambhavi Singh, Law Student, NLU Delhi who was interning with CIS at the time also assisted with the organisation and analysis of the data. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The researcher has collected the data from the lists of members available in the public domain from 2010-2015. The lists prior to 2010 have been procured 	by the Centre for Internet and society from the UN Secretariat of the Internet Governance Forum (IGF).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This research is based solely upon the members and the nature of their stake holding has been analysed in the light of MAG terms of reference. No data has 	been made available regarding the nomination process and the criteria on which a particular member has been re-elected to the MAG (The IGF Secretariat does 	not share this data).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;According to the analysis, in these six years, the MAG has had around 182 members from various stakeholder groups.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We have divided it into five stakeholder groups, Government, Civil Society, Industry, Technical Community and Academia. Any overlap between two or more of 	these groups has also been taken into account, for example- A member of the Internet Society (ISOC) being both in the Civil Society and Technical 	Community.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;According to the MAG Terms of Reference&lt;a name="_ftnref1" href="#_ftn1"&gt;[1]&lt;/a&gt;, it is the prerogative of the UN Secretary General to select MAG 	Members. The general policy is that the MAG members are appointed for a period of one year, which is automatically renewed for 2 more years consecutively 	depending on their engagement in MAG activities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There is also a policy of rotating off 1/3&lt;sup&gt;rd&lt;/sup&gt; members of MAG every year for diversity and taking new viewpoints in consideration. There is also 	an exceptional circumstance where a person might continue beyond three years in case there is a lack of candidates fitting the desired area.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, it seems like the exception has become the norm as a whopping number of members have continued beyond 3 years, ranging from 4 years up to as long 	as 8 years, this figure rounds up to around 49. No doubt some of them are exceptional talents and difficult to replace. However, the lack of transparency 	in the nomination system makes it difficult to determine the basis on which these people continued beyond the usual term.&lt;/p&gt;
&lt;table style="text-align: justify;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;S. No.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Stakeholder&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Number of years&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Total Members continuing beyond 3 years&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Civil Society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8, 6, 6, 4, 4,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Government/Industry&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;4, 5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Technical community/ Civil society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8, 8, 8, 6, 6, 4, 4, 4, 4,4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Industry/ Civil society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8, 6,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Industry&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8, 7, 7, 6, 6, 4,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Industry/Tech Community/ Civil Society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Government&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;7, 7, 7, 6, 6, 6, 6, 5, 5, 5, 5, 5, 5, 4, 4, 4, 4, 4, 4,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;19&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Academia&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6, 6, 5,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Industry/ Tech community&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The stakeholders that have continued beyond 8 years have around 39% members from Government and related agencies. The next being Technical Community/Civil 	Society with around 20% representation, followed by Industry at 12%, 10% from the Civil Society, 6% from Academia, 4% from Government/Industry, 4% from 	Industry/Civil Society and 2% each from Industry/Technical Community and Industry/Technical Community/Civil Society respectively.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_CivilSociety.png" alt="null" class="image-inline" title="Civil Society" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Table with overlapping interests merged&lt;/strong&gt; &lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table style="text-align: justify;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;S. No.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Stakeholder&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Total Members continuing beyond 3 years&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Civil Society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;7 + 9 + 1+1 = &lt;strong&gt;18&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Government&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;19 &lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tech Community&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;9 + 1 + 1+1 = &lt;strong&gt;12&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Industry&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6 + 2 + 1 + 1+2 = &lt;strong&gt;13&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Academia&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;3&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;When the overlap is grouped separately, as in if a Technical Community/Civil Society person is placed both in Technical Community and Civil Society groups 	individually, then the representation of stakeholder representation is as follows(approximate values)-&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Government- 29%&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Civil Society- 28%&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Industry- 20%&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Technical Community-17%&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Academia-5%&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This clearly shows us that stakeholders from academia generally did not stay on MAG beyond 3 years. Even when all members that have ever been on MAG are 	taken into consideration, only around 8% representation has been from the academic community. This needs to be taken into account when new MAG members are 	selected in 2016.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The researcher has also looked at the MAG Representation based on gender and UN Regional Groups. The results of the analysis were as follows-&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The ratio of male members is to female members is approximately 16:9 in the MAG and the approximate value in percentage being 64% and 36% respectively.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/MAGRepresentation.png" alt="null" class="image-inline" title="MAG Representation" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Now coming to the UN Regional Groups, the results that the analysis yielded were as follows-&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Western European and Others Group (WEOG) has the highest representation in MAG, a large number of members being from Switzerland, USA and UK. This is 	followed by the Asia Pacific Group which has 20% representation. The third largest is the African group with 19% representation followed by Latin American 	and Caribbean Group (GRULAC) and Eastern European Group with 13% and 12% representation respectively.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/UNRegional.png" alt="null" class="image-inline" title="UN Regional Representation" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The representation of developed, developing and Least Developed Countries is as follows-&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Developed countries have approximately 42% representation, developing countries having 53% and LDCs having a mere 5% representation. There should be some effort to strive for better LDC representation as they are the most backward when it comes to Global ICT Penetration.	&lt;a name="_ftnref2" href="#_ftn2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/Developed.png" alt="null" class="image-inline" title="Developed" /&gt;&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt; Intgovforum.org, 'MAG Terms Of Reference' (2015) &amp;lt;http://www.intgovforum.org/cms/175-igf-2015/2041-mag-terms-of-reference&amp;gt; accessed 13 July 			2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt; &lt;em&gt;ICT Facts And Figures&lt;/em&gt; (1st edn, International Telecommunication Union 2015) &amp;lt;http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2015.pdf&amp;gt; 			accessed 11 July 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/mag-analysis'&gt;https://cis-india.org/internet-governance/blog/mag-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Multi-stakeholder</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-04-12T10:02:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/much-at-stake-for-tech-sector">
    <title>Much at stake for tech sector in UID project</title>
    <link>https://cis-india.org/news/much-at-stake-for-tech-sector</link>
    <description>
        &lt;b&gt;With the Parliamentary Standing Committee on Finance raising a red flag against the National Identification Authority of India ( NIAI) Bill to grant the UID (or Aadhar) project legal status, the project looks set for a slowdown. That could have broad implications for the tech sector that had laid substantial hope on it, especially when global markets are slowing down. &lt;/b&gt;
        
&lt;p&gt;The UID project is estimated to offer IT companies a Rs 15,000-Rs 20,000-crore opportunity. This includes building an ecosystem around the project, comprising biometrics, databases, smartcards, storage and system integration.&lt;/p&gt;
&lt;p&gt;Since the UIDAI implements an open-system, plugand-play approach, entrepreneurs and startups can develop applications in numerous areas. Some of the applications of &lt;a class="external-link" href="http://economictimes.indiatimes.com/topic/Aadhar"&gt;Aadhar&lt;/a&gt; is seen in areas such as food distribution, financial inclusion, and know-your-customer services.&lt;/p&gt;
&lt;p&gt;The parliamentary committee has said that the project might be too expensive and duplicates the National Population Register's (NPR) efforts to collect biometric and other data for the national census. Some have also called for a change of collection of data from biometric data, which they consider insecure for smart cards (as fraudsters can take your fingerprints from objects that you touch). The Cabinet need not accept the committee's recommendations.&lt;/p&gt;
&lt;p&gt;Thus it is unclear if the &lt;a class="external-link" href="http://economictimes.indiatimes.com/topic/UID-project"&gt;UID project &lt;/a&gt;will be scrapped, watered down or persisted with in its current form. Some contracts have been granted to tech majors. According to the said current contracts are not significantly large in size and their cancellation will not make a big dent in the companies' books. He added that scrapping of project from a longer term perspective could be a negative.&lt;/p&gt;
&lt;p&gt;Government public services initiatives like public distribution system UIDAI website, Wipro in March 2011 won a contract to supply, install, and commission hardware and software for data centres at Bangalore and NCR. MindTree in April 2010 won a contract for application software development, maintenance and support. TCS, Accenture, HP, Satyam, Intelenet Global, HCL Infosystems, Geodesic are some others that have won contracts.&lt;/p&gt;
&lt;p&gt;Ankur Rudra, IT sector analyst at Ambit Capital, (PDS) and e-governance schemes are expected to spark off more projects requiring technology enablement.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, ED of the Centre for Internet and Society, said if changes are incorporated to the Bill, it would not necessarily be anti-technology. The organization had raised concerns about security issues around biometric data. "There might be a change in the design of the UID project, but technology will remain a critical element," he added. Siddharth Pai, MD of global sourcing advisory firm Technology Partners International (TPI) India, said that the UID project is a very critical infrastructure from a national perspective and chances of the project being scrapped are little.&lt;/p&gt;
&lt;p&gt;He added that tech companies might experience delay in government spends and see a delay in project execution. This may lead to delays in revenue yields. IT company officials also acknowledge that there could be delays in projects which could increase costs for them. None wanted to be quoted on this issue.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This article by Pranav Nambiar was published in the Economic Times on 12 December 2011. Sunil Abraham has been quoted in this. Read the original &lt;a class="external-link" href="http://economictimes.indiatimes.com/tech/ites/much-at-stake-for-tech-sector-in-uid-project/articleshow/11077583.cms"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/much-at-stake-for-tech-sector'&gt;https://cis-india.org/news/much-at-stake-for-tech-sector&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-12T13:10:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/draconian-it-rules">
    <title>MPs to be taught ‘draconian’ IT Act Rules as India.net support galvanises for annul motion</title>
    <link>https://cis-india.org/news/draconian-it-rules</link>
    <description>
        &lt;b&gt;The blog post by Prachi Shrivastava was published in Legally India on April 23, 2012.&lt;/b&gt;
        
&lt;p&gt;Rajya Sabha’s member of parliament (MP) from Kerala, P Rajeeve, whose &lt;a class="external-link" href="http://164.100.47.5/newsite/bulletin2/Bull_No.aspx?number=49472"&gt;statutory motion&lt;/a&gt; to annul the IT (Intermediaries Guidelines) Rules 2011 is slated for discussion in Parliament tomorrow, aims to convene a meeting of MPs, internet societies, and bloggers in the first week of May to create awareness against the &lt;a class="external-link" href="http://www.legallyindia.com/201201182502/Legal-opinions/sopa-blackout-day-bah-wheres-the-kolaveri-about-indias-it-act-intermediaries-rules"&gt;draconian effect&lt;/a&gt; of the rules.&lt;/p&gt;
&lt;p&gt;“Most of the MPs need to know about this,” Rajeeve told Legally India, explaining that statutory motions are generally not easy to pass. “Actually we are trying to create awareness by organizing a session. The issue will be the IT Rules 2011 and how it is against the constitution, how it is against natural justice, how it is against due process of law.”&lt;br /&gt;&lt;br /&gt;“The motion has been accepted. The committee has allotted time for discussion on the twenty fourth. Thereafter it will come to the house. In this part of the session I am trying to coordinate other MPs to get support”, he said.&lt;/p&gt;
&lt;p&gt;Rajeeve’s motion of 23 March 2012, as first reported by &lt;a href="https://cis-india.org/internet-governance/blog/statutory-motion-against-intermediary-guidelines-rules/" class="external-link"&gt;CIS-India&lt;/a&gt;, was not his first attempt at bringing the IT rules into the spotlight. When the rules were in draft stage, he had made a &lt;a class="external-link" href="http://rajeev.in/pages/..%5CNews%5Ccensorship_Blogs%5CBloggers_Internet.html"&gt;zero hour mention&lt;/a&gt; against them for being in violation of freedom of speech and expression, by over-scrutinising bloggers, over-authorising intermediaries, and letting the government, individuals and institutions by-pass the due process of law.&lt;/p&gt;
&lt;p&gt;Rajeeve was one of the nine panelists in the open discussion on “Resisting Internet Censorship”, organised by the Centre for Internet and Society (CIS) and Foundation for Media Professionals, in Bangalore on Saturday, 21 April. The discussion, addressing an audience of 40, was moderated by veteran journalist Paranjoy Guha Thakurta.&lt;/p&gt;
&lt;p&gt;Other panelists included Mahesh Murthy, founder of digital marketing website Pinstorm, Sudhir Krishnaswamy, founding member of Centre for Law and Policy Research, Na Vijayashankar, director of Cyber Law College, and Siddharth Narain from the Alternative Law Forum.&lt;/p&gt;
&lt;p&gt;Also on the panel were Rishabh Dara,&lt;a class="external-link" href="http://www.google.com/policyfellowship/"&gt; Google policy fellow&lt;/a&gt; who conducted &lt;a href="https://cis-india.org/internet-governance/intermediary-liability-in-india" class="external-link"&gt;a study last year on intermediary liability in India and its chilling effects on free expression&lt;/a&gt;, BG Mahesh, founder of Oneindia.com, Ram Bhat, co-founder of community media collective Maraa, and Pranesh Prakash, programme manager at CIS.&lt;/p&gt;
&lt;p&gt;Prakash said that the discussion brought together different perspectives, even those of the entrepreneur, like BG Mahesh and Mahesh Murthy. “Transparency in the terms of censorship is good. We are not saying all censorship is bad, but that it should be transparent.”&lt;/p&gt;
&lt;p&gt;Prakash told Legally India about the various experiences shared by panelists, of the lack of transparency in the present system of censorship. While one faced harassment by the police over trivial procedural compliances, there was complaint for defamation against an article syndicated by another from a different publication’s press release. “And we read the article over and over and over again but couldn’t find anything which was remotely defamatory.”&lt;br /&gt;&lt;br /&gt;Legal experts on the panel, Kirshnaswamy and Vijayashankar, spoke about the constitutionalism behind free speech provisions. Narain shed light on the fact that while excessive energy has been expended on highlighting which content should not be banned, little has been spent on examining the operative procedures behind censorship.&lt;br /&gt;&lt;br /&gt;Dara spoke about his research and how it not only revealed that content was being frivolously removed on complaints to intermediaries, but also that the people whose content was being removed were not being informed of the same. There was no public notice of the removal.&lt;br /&gt;&lt;br /&gt;Bhat’s discourse drew attention to the history of censorship in India and elicited the fact that the Indian press has in fact been censored in an upsetting manner even since the revolt of 1857.&lt;/p&gt;
&lt;p&gt;Murthy made the observation that statistically speaking, in India the number of internet users exceeds television watchers, which has made social media unfathomably important while the internet is no longer elitist.&lt;br /&gt;&lt;br /&gt;A number of related Indian initiatives have been gathering momentum in recent months, such as&amp;nbsp;&lt;a class="external-link" href="http://softwarefreedom.in/index.php?option=com_content&amp;amp;view=article&amp;amp;id=97:campaign-for-freedom-on-the-internet&amp;amp;Itemid=83"&gt; signature campaigns&lt;/a&gt; for &lt;a class="external-link" href="https://www.change.org/petitions/mps-of-india-support-the-annulment-motion-to-protect-internet-freedom-stopitrules"&gt;internet freedom&lt;/a&gt;, and offline protests such as the &lt;a class="external-link" href="http://friendsofinternet.wikispaces.com/"&gt;Free Software Movement in Karnataka&lt;/a&gt; and the &lt;a class="external-link" href="http://kafila.org/2012/04/21/freedom-in-the-cage-22-april-2012/"&gt;Save your Voice in Delhi&lt;/a&gt;, are the order of the day. Other actions include &lt;a class="external-link" href="http://www.legallyindia.com/201201182502/Legal-opinions/sopa-blackout-day-bah-wheres-the-kolaveri-about-indias-it-act-intermediaries-rules"&gt;writing to MPs&lt;/a&gt;, asking them to vote in favor of Rajeeve’s statutory motion for annulment of the IT rules.&lt;/p&gt;
&lt;p&gt;Kerala-based advocate Shojan Jacob filed the f&lt;a class="external-link" href="http://www.legallyindia.com/201203062622/Bar-Bench-Litigation/read-first-writ-challenging-censorious-it-act-intermediaries-rules-in-kerala"&gt;irst ever writ challenging the rules&lt;/a&gt; in the Kerala High Court last month.&lt;/p&gt;
&lt;p&gt;The rules enable any individual or public or private institution to get content removed from websites, in most cases simply by notifying the website owners or intermediaries such as Google, Yahoo and others.&lt;/p&gt;
&lt;p&gt;Takedown requests can be based on any of &lt;a class="external-link" href="http://www.legallyindia.com/201201182502/Legal-opinions/sopa-blackout-day-bah-wheres-the-kolaveri-about-indias-it-act-intermediaries-rules"&gt;15 vaguely drafted parameters&lt;/a&gt;, without stating any reasons or requiring any judicial or quasi-judicial order in support.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.legallyindia.com/Social-lawyers/mps-to-be-taught-draconian-it-act-rules-as-indianet-support-galvanises-for-annul-motion"&gt;Click&lt;/a&gt; to read the original.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/draconian-it-rules'&gt;https://cis-india.org/news/draconian-it-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    

   <dc:date>2012-04-25T10:39:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/mps-oppose-curbs-on-internet">
    <title>MPs oppose curbs on internet; Sibal promises discussions</title>
    <link>https://cis-india.org/news/mps-oppose-curbs-on-internet</link>
    <description>
        &lt;b&gt;With MPs raising concerns over open-ended interpretations of restrictive terms in the rules seeking to regulate social media and internet, the government promised to evolve a consensus on points of contention.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://goo.gl/MCXLB"&gt;Pranesh Prakash is quoted in this article published by the Times of India on May 18, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Telecom minister Kapil Sibal's assurance came at the end of an engrossing debate in Rajya Sabha on a motion moved by CPM MP P Rajeeve who said the rules violated freedom of expression and free speech.&lt;/p&gt;
&lt;p&gt;He found support from leader of opposition &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/Arun-Jaitley"&gt;Arun Jaitley&lt;/a&gt; who picked several examples to point out that terms or descriptions like "harmful", "blasphemous" and "defamatory" did not lend themselves to precise legal definitions.&lt;/p&gt;
&lt;p&gt;Jaitley said what the government may find defamatory may not be seen in similar light by its critics. He also pointed to the difficulties of controlling technology and asked if it was desirable to do so.&lt;/p&gt;
&lt;p&gt;Assuring MPs who sought the annulment of 'rules' which are aimed at regulating internet content, &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/United-Company-RUSAL"&gt;Sibal&lt;/a&gt; said, "My assurance to the House is that I will request the MPs to write letters to me objecting to any specific words. I will then call a meeting of the members as well as the industry and all stakeholders. We will have a discussion and whatever consensus emerges, we will implement it."&lt;/p&gt;
&lt;p&gt;The move to put rules in place flows from the government's annoyance with what it sees as scurrilous and disrespectful comments about senior Congress leaders. It had suggested pre-screening of content which service providers were reluctant to consider.&lt;/p&gt;
&lt;p&gt;The motion for annulling the Information Technology (Intermediaries Guidelines) Rules notified in April 2011 was, however, defeated by a voice vote. Justifying the rules, the minister said "these are sensitive issues" as most internet companies were registered abroad and not subjected to Indian laws.&lt;/p&gt;
&lt;p&gt;TOI was first to report about the new rules that put a lot of the onus on intermediaries like internet service providers, Facebook and Twitter, to manage and monitor content produced by their users. Web activists believe the IT rules are open to arbitrary interpretation and can be misused to silence freedom of speech.&lt;/p&gt;
&lt;p&gt;Google, which participated in the public consultative process before the rules were framed, had told TOI, "If Internet platforms are held liable for third party content, it would lead to self-censorship and reduce the free flow of information."&lt;/p&gt;
&lt;p&gt;Moving the motion, Rajeeve said, "I am not against any regulation on internet but I am against any control on internet... In control, there is no freedom... These rules attempt to control internet and curtail the freedom of expression."&lt;/p&gt;
&lt;p&gt;Complimenting the CPM member, Jaitley said, "I think he (Rajeeve) deserves a compliment for educating us on this rule that Parliament has a supervisory control as far as subordinate legislations are concerned, and, if need be, we can express our vote of disapproval to the subordinate legislations."&lt;/p&gt;
&lt;p&gt;MPs felt the government should consider a regime where offensive content can be removed immediately after being posted rather than trying to sieve it out.&lt;/p&gt;
&lt;p&gt;Noting that it is extremely difficult, if not impossible, to defy technology and that the days of withholding information have gone, Jaitley urged the minister to "reconsider the language of restraints" to prevent its misuse. He pointed to certain words - harmful, harassing, blasphemous, defamatory - used in the rules, explaining how these could be interpreted/misinterpreted at any stage.&lt;/p&gt;
&lt;p&gt;The MPs did note that the internet had a risk of inciting hate speech and frenzy in society and therefore it needed to be restrained but the device could be swift identification of objectionable content.&lt;/p&gt;
&lt;p&gt;Pranesh Prakash of Centre for Internet and Society, an organization that has been advocating withdrawal of the rules, said he was sad with the outcome in Rajya Sabha. "The IT minister has promised to hold consultations but the ideal way to do so would have been to scrap the rules and start from scratch," he said.&lt;/p&gt;
&lt;p&gt;"It's not only about language in these rules. There is a problem with provisions like the one that empowers intermediaries to remove content without notifying the user who had uploaded the content or giving users a chance to explain themselves."&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/mps-oppose-curbs-on-internet'&gt;https://cis-india.org/news/mps-oppose-curbs-on-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-05-24T10:25:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state">
    <title>Moving Towards a Surveillance State</title>
    <link>https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state</link>
    <description>
        &lt;b&gt;The cyberspace is a modern construct of communication and today, a large part of human activity takes place in cyberspace. It has become the universal platform where business is executed, discourse is conducted and personal information is exchanged.  However, the underbelly of the internet is also seen to host activities and persons who are motivated by nefarious intent. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Note: The original tender document of the Assam Police dated 28.02.2013  along with other several other tender documents for procurement of  Internet and Voice Monitoring Systems &lt;a href="https://cis-india.org/internet-governance/blog/tenders-eoi-press-release.zip" class="internal-link"&gt;is attached as a zip folder&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As highlighted in the &lt;a href="http://necessaryandproportionate.net/#_edn2"&gt;&lt;i&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/i&gt;&lt;/a&gt;&lt;i&gt;, &lt;/i&gt;logistical barriers to surveillance have decreased in recent decades and the application of legal principles in new technological contexts has become unclear. It is often feared that in light of the explosion of digital communications content and information about communications, or "communications metadata," coupled with the decreasing costs of storing and mining large sets of data and the provision of personal content through third party service providers make State surveillance possible at an unprecedented scale. Communications surveillance in the modern environment encompasses the monitoring, interception, collection, preservation and retention of, interference with, or access to information that includes, reflects, arises from or is about a person's communications in the past, present or future.&lt;a href="#fn*" name="fr*"&gt;[*]&lt;/a&gt; These fears are now turning into a reality with the introduction of mass surveillance systems which penetrate into the lives of every person who uses any form of communications. There is ample evidence in the form of tenders for Internet Monitoring Systems (IMS) and Telecom Interception Systems (TCIS) put out by the Central government and various state governments that the Indian state is steadily turning into an extensive surveillance state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While surveillance and intelligence gathering is essential for the maintenance of national security, the creation and working of a mass surveillance system as it is envisioned today may not necessarily be in absolute conformity with the existing law. A mass surveillance system like the &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central Monitoring System&lt;/a&gt; (CMS) not only threatens to completely eradicate any vestige of the right to privacy but in the absence of a concrete set of procedural guidelines creates a tremendous risk of abuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although information regarding the Central Monitoring System is quite limited on the public forum at the moment it can be gathered that a centralized system for monitoring of all communication was first proposed by the Government of India in 2009 as indicated by the &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=54679"&gt;press release&lt;/a&gt; of the Ministry of Communications &amp;amp; Information. Implementation of the system started subsequently as indicated by another government &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=70747"&gt;press release&lt;/a&gt; and the Center for Development of Telematics (C-DOT) was entrusted with the responsibility of implementing the system. As per the C-DOT &lt;a href="http://www.cdot.in/media/publications.htm"&gt;annual report&lt;/a&gt; 2011-12, research, development, trials and progressive scaling up of a Central Monitoring System were conducted by the organization in the past 4 years and the requisite hardware and CMS solutions which support voice and data interception have been installed and commissioned at various Telecom Service Providers (TSP) in Delhi and Haryana as part of the pilot project. &lt;a href="http://articles.economictimes.indiatimes.com/2013-05-07/news/39091148_1_single-window-pranesh-prakash-internet"&gt;Media reports&lt;/a&gt; indicate that the project will be fully functional by 2014. While an extensive surveillance system is being stealthily introduced by the state, several concerns with regard to its extent of use, functioning, and real world impact have been raised owing to ambiguities and &lt;a href="https://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy"&gt;wide gaps in procedure and law&lt;/a&gt;. Moreover, the lack of a concrete privacy legislation coupled with the absence of public discourse indicates the lack of interest of the state over the rights of an ordinary citizen. It is under these circumstances that awareness must first be brought regarding &lt;a href="https://www.eff.org/deeplinks/state-surveillance-%26-human-rights"&gt;the risks of the mass surveillance&lt;/a&gt; on civil liberties which in the absence of established procedures protecting the rights of the citizens of the state can result in the abuse of powers by the state or its agencies and lead to the demise of civil freedoms even in democratic states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The architecture and working of a &lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;proposed Internet Monitoring System&lt;/a&gt; must be examined in an attempt to better understand the functioning, capabilities and possible impact of a Central Monitoring System on our society and lives. This can perhaps allow more open discourse and a committed effort to preserve the rights of the citizens especially the right to privacy can be made while allowing for the creation of strong procedural guidelines which will help maintain legitimate intelligence gathering and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Monitoring System: Setup and Working&lt;/b&gt;&lt;br /&gt;Very broadly, The Internet Monitoring System enables an agency of the state to intercept and monitor all content which passes through the Internet Service Provider’s (ISP) server which includes all electronic correspondence (emails, chats or IM’s, transcribed call logs), web forms, video and audio files, and other forms of internet content. The electronic data is stored and also subject to various types of analysis. While Internet Monitoring Systems are installed locally and their function is limited to specific geographic region, the Central Monitoring System will consolidate the data acquired from the different voice and data interception systems located across the country and create a centralized architecture for interception, monitoring and analysis of communications. Although the exact specifications and functions of the central monitoring system still remain unclear and ambiguous, some parallels regarding the functioning of the CMS can be drawn from the the specifications revealed in the Assam Police &lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;tender document&lt;/a&gt; for the procurement of an Internet Monitoring System.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Setup&lt;/b&gt;&lt;br /&gt;The deployment architecture of an Internet Monitoring System (IMS) contains probe servers which are installed at the Internet Service Provider’s (ISP) premises and the probes are installed at various tapping points within the entire ISP network.  A collection server is also installed and hosted at the site of the ISP. The collection server is used to either collect, analyze, filter or simple aggregate the data from the ISP servers and the data is transferred to a master aggregation server located a central data center. The central data center may also contain more servers specifically for analysis and storage. This type of architecture is being referred to as a ‘high availability clustered setup’ which is supposed to provide security in case of a failure or outage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Assam Police Internet Monitoring System tender document specifically indicates that the deployment in the state of Assam shall require 8 taps or probes to be installed at different ISPs, out of which 6 taps/probes shall be of 10 GBPS and 2 taps are of 1 GBPS. The document however mentions that the specifications are preliminary and subject to change.&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Types of data&lt;/b&gt;&lt;br /&gt;The proposed internet monitoring system of the Assam state can provide network traffic interception and a variety of internet protocols including Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Internet Message Access Protocol (IMAP) and Session Initiation Protocol (SIP), Voice over Internet Protocol (VoIP) can be intercepted and monitored. The system can also support monitoring of Internet Relay Chat and various other messaging applications (such as Google Talk, Yahoo Chat, MSN Messenger, ICQ, etc.).  The system can be equipped to capture and display multiple file types like text (.doc, .pdf), zipped (.zip) and executable applications (.exe). Further, information regarding login details, login pattern, login location, DNS address, routing address can be acquired along with the IP address and other details of the user.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Web crawling capabilities can be installed on the system which can provide data from various data sources like social networking sites, web based communities, wikis, blogs and other forms of web content. Social media websites (such as Twitter, Facebook, Orkut, MySpace etc.), web pages and data on hosted applications can also be intercepted, monitored and analyzed.  The system also allows capture of additional pages if updated; log periodical updates and other changes. This allows the monitoring agencies the capability of gathering internet traffic based on several parameters like Protocols, Keywords, Filters and Watch lists. Keyword matching is achieved by including phonetically similar words in various languages including local languages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More specific functions of the IMS can include complete email extraction which will disclose the address book, inbox, sent mail folder, drafts folder, personal folders, delete folders, custom folders etc. and can also provide identification of dead drop mails. The system can also be equipped to allow country wise tracking of instant messages, chats and mails.&lt;/p&gt;
&lt;p&gt;Regarding retention and storage of data, the tender document specifies that the system shall be technically capable of retaining the metadata of Internet traffic for at least one year and the defined traffic/payload/content is to be retained in the storage server at least for a week.  However, the data may be retained for a longer period if required. The metadata and qualified data after analysis are integrated to a designated main intelligence repository for storage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Types of Analysis&lt;/b&gt;&lt;br /&gt;The Internet Monitoring System apart from intercepting all the data generated through the Internet Service Providers is essentially equipped for various types of data analysis. The solutions that are installed in the internet monitoring system provide the capability for real time as well as historical analysis of network traffic, network perimeter devices and internal sniffers.  The kinds of analysis based on ‘slicing and dicing of data’ range from text mining, sentiment analysis, link analysis, geo-spatial analysis, statistical analysis, social network analysis, transaction analysis, locational analysis and fusion based analysis, CDR analysis, timeline analysis and histogram based analysis from various sources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The solutions installed in the IMS can enable monitoring of specific words or phrases (in various languages) in blogs, websites, forums, media reports, social media websites, media reports, chat rooms and messaging applications, collaboration applications and deep web applications. Phone numbers, addresses, names, locations, age, gender and other such information from content including comments and such can also be monitored. Specifically with regard to social media, the user’s profile and information related to it can be extracted and a detailed ontology of all the social media profiles of the user can be created.&lt;br /&gt;&lt;br /&gt;Based on the information, the analysis supposed to provide the capability to identify suspicious behavior based on existing and new patterns as they emerge and are continuously applied to combine incoming and existing information on people, profiles, transactions, social network, type of websites visited, time spent on websites, type of content download or view and any other type of gatherable information. The solutions on the system are also supposed to create single or multiple or parallel scenario build-ups that may occur in blogs, social media forums, chat rooms, specific web hosting server locations or URL, packet route that may be defined from time to time and such scenario build-ups can be based on parameters like sentiments, language or expressions purporting hatred or anti-national expressions, and even emotions like expression of joy, compassion and anger, which as may be defined by the agency depending on operational and intelligence requirement. Based on these parameters, automated alerts can be generated relating to structured or unstructured data (including metadata of contents), events, pattern discovery, phonetically similar words or phrases or actions from users. &lt;br /&gt;&lt;br /&gt;Based on the data analysis, reports or dossiers can be generated and visual analysis allowing a wide variety of views can be created.  Further, real time visualization showing results from real-time data can be generated which allows alerts, alert categories or discoveries to be ranked (high, medium, and low priority, high value asset, low value asset, moderate value asset, verified information, unverified information, primary evidence, secondary evidence, circumstantial evidence, etc.) based on criteria developed by the agency. The IMS solutions can also be capable of offering web-intelligence and open source intelligence and allow capabilities like simultaneous search capabilities which can be automated providing a powerful tool for exploration of the intercepted data.&lt;br /&gt;&lt;br /&gt;Another important requirement mentioned in the tender document is the systems capability to integrate with other interception and monitoring systems for 2G, 3G/UMTS and other evolving mobile carrier technologies including fixed line and Blackberry services and encrypted IP services like Skype services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;It is clear that a system like IMS with its extensive interception and analysis capabilities gives complete access to an agency or authority of all information that is accessed or transmitted by a person on the internet including information which is private and confidential such as email and instant messages. Although the state has the power to issue directions for interception or monitoring of information under the Information Technology Act, 2000 and certain rules are prescribed under section 69B, they are wholly inadequate compared to the scope and extent of the Internet Monitoring System and its scale of operations. The interception and monitoring systems that are either proposed or already in place effectively bypass the existing procedures prescribed under the Information Technology Act. &lt;br /&gt;&lt;br /&gt;The issues, concerns and risks are only compounded when it comes to the Central Monitoring System. The solutions installed in present day interception and monitoring systems give the state unprecedented powers to intercept, monitor and analyze all the data of any person who access the internet. Tools like deep packet inspection and extensive data mining solutions in the absence of concrete safeguards and when deployed through a centralized system can be misused to censor any content including legitimate discourse. Also, the perception that access to a larger amount of data or all data can help improve intelligence can also be sometimes misleading and it must be asked whether the fundamental rights of the citizens of the state can be traded away under the pretext of national security. Furthermore, it is essential for the state to weigh the costs of such a project both economically and morally and balance it with sufficient internal measures as well as adequate laws so that the democratic values are persevered and not endangered by any act of reckless force.&lt;br /&gt;&lt;br /&gt;Reiterating what has been said earlier, while it is important for the state to improve its intelligence gathering tools and mechanisms, it must not be done at the cost of a citizen’s fundamental right. It is the duty of the democratic state to endure and maintain a fine balance between national interest and fundamental rights through timely creation of equitable laws.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;]. &lt;a class="external-link" href="http://necessaryandproportionate.net/#_edn2"&gt;http://necessaryandproportionate.net/#_edn2&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state'&gt;https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>atreya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T05:57:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/here-comes-gowda">
    <title>Move over Kolaveri di, here comes Gowda</title>
    <link>https://cis-india.org/news/here-comes-gowda</link>
    <description>
        &lt;b&gt;Transparency is the buzzword in governance and chief minister DV Sadananda Gowda is eager to set a new benchmark. You could soon watch what the chief minister is doing at office, live on YouTube. This article was published in dailybhaskar.com on November 28, 2011.&lt;/b&gt;
        
&lt;p&gt;Cameras are being installed at the chief minister's office in Vidhana Soudha and his home office, Krishna. The live footage will be uploaded to YouTube. "I always wanted to maintain transparency in my functioning. Very soon, I will put it to work, when people can watch me live at what I am doing when inoffice. Let the people see who come to meet me, what I do and how I work. This will set a new example, but there will be no compulsion for my colleagues to emulate me. It is entirely up to them whether to follow me or not," said Gowda on Sunday.&lt;/p&gt;
&lt;p&gt;Kerala chief minister Oommen Chandy has already set a precedent by installing cameras in his office. On July 1 this year, the day Chandy's experiment went 'live', one lakh visitors logged in. Talking to The New York Times earlier this year, Sunil Abraham, executive director of the Centre for Internet and Society, Bangalore, said "He applauded Chandy's webcams, even if the effort amounted to no more than tokenism."This type of tokenism is also quite useful," The NYT reported Abraham as saying.&lt;/p&gt;
&lt;p&gt;In Karnataka, the much-hyped Citizens' Charter would be implemented after the state legislature, which begins on December 6, ends. The cabinet had already cleared the proposal and the bill on time-bound delivery of public services would be introduced in the session, added Gowda.&lt;br /&gt;&lt;br /&gt;The proposed bill will make it mandatory for officials in government offices to deliver public services within stipulated period of time and failure to do so would make them liable for penal action and fine to be computed for every day of delay.&lt;br /&gt;&lt;br /&gt;Already, Bescom chief P Manivannan has installed a webcam in his office. The NYT earlier reported Manivannan as saying that "he was installing a 'hemispheric' camera that would capture the goings-on in his entire office rather than just show his visitors."&lt;/p&gt;
&lt;p&gt;Read the original published in dailybhaskar.com &lt;a class="external-link" href="http://daily.bhaskar.com/article/BAN-move-over-kolaveri-di-here-comes-gowda-2598214.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/here-comes-gowda'&gt;https://cis-india.org/news/here-comes-gowda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-28T06:58:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
