<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1191 to 1205.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/multi-stakeholder-internet-governance-the-way-ahead"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/internet-rights-accessibility-regulation-ethics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/mag-analysis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/much-at-stake-for-tech-sector"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/draconian-it-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/mps-oppose-curbs-on-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/here-comes-gowda"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/kids-music-fashion-on-net"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/more-urban-indian-women-are-acting-against-offensive-calls-and-text-messages"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-india-may-18-2018-u-sudhakar-reddy-more-errors-in-aadhaar-data-in-andhra-pradesh-than-in-voter-database"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa">
    <title>Multinational Cyber Security Forum at University of Haifa</title>
    <link>https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa</link>
    <description>
        &lt;b&gt;Sunil Abraham participated in a meeting in Israel on Multinational Cyber Security Forum hosted by Center for Cyber, Law and Policy and University of Haifa in collaboration with the Hewlett Foundation Cyber Initiative.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The workshop was held from November 5 to 7, 2017. The objective of the workshop was to facilitate a free and open exchange among participants under the Chatham House Rules. The workshop sought to identify areas of agreement and dissent pertaining to cyber security regulation and to explore issues that require further research, clarification and development.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa'&gt;https://cis-india.org/internet-governance/news/multinational-cyber-security-forum-at-university-of-haifa&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-27T14:34:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how">
    <title>Multi-stakeholder Models of Internet Governance within States: Why, Who &amp; How?</title>
    <link>https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how</link>
    <description>
        &lt;b&gt;Internet governance, for long a global exercise, has found new awareness within national frameworks in recent times. Especially relevant for developing countries, effective national IG mechanisms are important to raise awareness and ensure multi-stakeholder participation at technical, infrastructural and public policy levels.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This post is a surface-level overview of national IG bodies, and is intended to inform introductory thoughts on national IG mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;A Short Introduction&lt;/strong&gt;&lt;i&gt; &lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The previous decade has seen a &lt;a href="http://www.intgovforum.org/cms/igf-initiatives"&gt;proliferation&lt;/a&gt; of regional, sub-regional and national initiatives for Internet governance (IG). Built primarily on the multi-stakeholder model, these initiatives aim at creating dialogue on issues of regional, local or municipal importance. In Asia, Bangladesh has instituted a national IGF, the Bangladesh IGF, with the &lt;a href="http://www.intgovforum.org/cms/2011/NationalregionalIGFreports/BANGLADESHIGF.2011.pdf"&gt;stated objective&lt;/a&gt; of creating a national multi-stakeholder forum that is specialized in Internet governance issues, and to facilitate informed dialogue on IG policy issues among stakeholders. India, too, is currently in the process of instituting such a forum. At this juncture, it is useful to consider the rationale and modalities of national IG bodies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet has long been considered a sphere of non-governmental, multi-stakeholder, decentralized, bottom-up governance space. The Declaration of Independence of Cyberspace, John Perry Barlow’s defiant articulation of the &lt;a href="https://projects.eff.org/~barlow/Declaration-Final.html"&gt;Internet’s freedom from governmental control&lt;/a&gt;, is a classic instance of this. The Internet is a “&lt;i&gt;vast ocean&lt;/i&gt;”, we claimed; “&lt;i&gt;no one owns it&lt;/i&gt;”.&lt;a href="#_ftn1"&gt;[1]&lt;/a&gt; Even today, members of the technical community insist that everyone ought to “&lt;i&gt;let techies do their job&lt;/i&gt;”: a plea, if you will, of the complexity of cyber-walls and –borders (or of their lack).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But as Prof. Milton Mueller argues in &lt;i&gt;Ruling the Root&lt;/i&gt;, the Internet has always been a contentious resource: battles over its governance (or specifically, the governance of the DNS root, both the &lt;a href="http://www.iana.org/domains/root/files"&gt;root-zone file&lt;/a&gt; and the &lt;a href="http://root-servers.org/"&gt;root servers&lt;/a&gt;) have leapt from the naïveté of the Declaration of Independence to a private-sector-led, contract-based exploitation of Internet resources. The creation of ICANN was a crucial step in this direction, following arbitrary policy choices by Verizon and entities managing the naming and numbering resources of the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The mushrooming of parallel tracks of Internet governance is further evidence of the malleability of the space. As of today, various institutions – inter-governmental and multi-stakeholder – extend their claims of governance. ICANN, the World Summit of Information Society, the World Conference on International Telecommunications, the Internet Governance Forum and the Working Group on Enhanced Cooperation under the ECOSOC Committee for Science, Technology and Development are a few prominent tracks. As of today, the WSIS process has absorbed various UN special bodies (the ITU, UNESCO, UNCTAD, UNDP are but a few), with the UNESCO instituting a &lt;a href="http://www.unesco.org/new/internetstudy"&gt;separate study&lt;/a&gt; on Internet-related issues. A proposal for a multilateral Committee on Internet-Related Policies remains &lt;a href="http://www.internetgovernance.org/2011/10/29/a-united-nations-committee-for-internet-related-policies-a-fair-assessment/"&gt;stillborn&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amongst these, the Internet Governance Forum (IGF) remains a strong contender for a truly multi-stakeholder process facilitating dialogue on IG. The IGF was set up following the recommendation of the Working Group of Internet Governance (WGIG), constituted after the Geneva phase of the WSIS.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;Rationale: Why Have National IG bodies?&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The issue of national multi-stakeholder cooperation/collaboration in IG is not new; it has been alive since the early 2000s. The &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt;, in paragraph 80, encourages the “&lt;i&gt;development of multi-stakeholder processes at the &lt;span&gt;national, regional and international levels&lt;/span&gt; to discuss and collaborate on the expansion and diffusion of the Internet as a means to support development efforts to achieve internationally agreed development goals and objectives, including the Millennium Development Goals&lt;/i&gt;” (emphasis supplied).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In its &lt;/span&gt;&lt;a href="http://www.wgig.org/docs/WGIGREPORT.pdf"&gt;June 2005 Report&lt;/a&gt;&lt;span&gt;, the Working Group on Internet Governance (WGIG) emphasizes that “&lt;/span&gt;&lt;i&gt;global Internet governance can only be effective if there is &lt;span&gt;coherence&lt;/span&gt; with &lt;span&gt;regional, subregional and national-level&lt;/span&gt; policies&lt;/i&gt;&lt;span&gt;”. Towards this end it recommends that “&lt;/span&gt;&lt;i&gt;coordination be established &lt;span&gt;among all stakeholders at the national level&lt;/span&gt; and &lt;span&gt;a multi-stakeholder national Internet governance steering committee or similar body&lt;/span&gt; be set up&lt;/i&gt;&lt;span&gt;” (emphasis supplied). The IGF, whose creation the WGIG recommended, has since been commended for its impact on the proliferation of national IGFs.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The rationale, then, was that multi-stakeholder steering committees at the national level would help to create a cohesive body to coordinate positions on Internet governance. In &lt;/span&gt;&lt;i&gt;Reforming Internet Governance&lt;/i&gt;&lt;span&gt;, WGIG member Waudo Siganga writes of the Internet Steering Committee of Brazil as a model, highlighting lessons that states (especially developing countries) may learn from CGI.br.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Brazilian Internet Steering Committee (CGI.br) was set up in 1995 and is responsible, &lt;/span&gt;&lt;i&gt;inter alia&lt;/i&gt;&lt;span&gt;, for the management of the .br domain, distribution of Internet addresses and administration of metropolitan Internet exchange points. CERT.br ensures network security and extends support to network administrators. Siganga &lt;/span&gt;&lt;a href="http://www.wgig.org/docs/book/Waudo-Siganga.html"&gt;writes&lt;/a&gt;&lt;span&gt; that CGI.br is a “&lt;/span&gt;&lt;i&gt;well-structured multistakeholder entity, having representation from government and democratically chosen representatives of the business sector, scientific and technological community and an Internet expert&lt;/i&gt;&lt;span&gt;”.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Why is CGI.br a model for other states? &lt;/span&gt;&lt;i&gt;First&lt;/i&gt;&lt;span&gt;, CGI.br exemplifies how countries can structure in an effective manner, a body that is involved in creating awareness about IG issues at the national level. Moreover, the multi-stakeholder nature of CGI.br shows how participation can be harnessed effectively to build capacity across domestic players. This also reflects the multi-stakeholder aspects of Internet governance at the global level, clarifying and implementing the WSIS standards (for instance). Especially in developing countries, where awareness and coordination for Internet governance is lacking at the national level, national IG committees can bridge the gap between awareness and participation. Such awareness can translate into local solutions for local issues, as well as contributing to an informed, cohesive stance at the global level.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Stakeholders: Populating a national IG body&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A national IG body – be in steering committee, IGF or other forum – should ideally involve all relevant stakeholders. As noted before, since inception, the Internet has not been subject to exclusive governmental regulation. The World Summit on Information Society recognized this, but negotiations amongst stakeholders resulted in the delegation of roles and responsibilities: the controversial and much-debated paragraph 35 of the &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt; reads:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;The private sector has had, and should continue to have, an important role in the development of the Internet, both in the technical and economic fields.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Civil society has also played an important role on Internet matters, especially at community level, and should continue to play such a role.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Intergovernmental organizations have had, and should continue to have, a facilitating role in the coordination of Internet-related public policy issues.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;International organizations have also had and should continue to have an important role in the development of Internet-related technical standards and relevant policies.&lt;/i&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This position remains endorsed by the WSIS process; the recent WSIS+10 High Level Event &lt;a href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;endorsed by acclamation&lt;/a&gt; the &lt;i&gt;WSIS+10 Vision for WSIS Beyond 2015&lt;/i&gt;, which “&lt;i&gt;respect mandates given by Tunis Agenda and respect for the multi-stakeholder principles&lt;/i&gt;”. In addition to government, the private sector and civil society, the technical community is identified as a distinct stakeholder group. Academia has also found a voice, as demonstrated by stakeholder-representation at NETmundial 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20framework%20for%20IG%20assessments%20-%20D%20Souter%20-%20final_0.pdf"&gt;study of the Internet Society&lt;/a&gt; (ISOC) on &lt;i&gt;Assessing National Internet Governance Arrangements&lt;/i&gt;, authored by David Souter, maps IG stakeholders at the global, regional and national levels. At the global level, primary stakeholders include ICANN (not-for-profit, private sector corporation involved in governance and technical coordination of the DNS), the IETF, IAB and W3C (technical standards), governments and civil society organizations, all of which participate with different levels of involvements at the IGF, ICANN, ITU, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the national/municipal level, the list of stakeholders is as comprehensive. &lt;strong&gt;Governmental stakeholders&lt;/strong&gt; include: (1) relevant Ministries (in India, these are the Ministry of Information and Broadcasting, and the Ministry of Communications and Information Technology – the Department of Electronics and Information Technology under the MCIT is particularly relevant), and (2) regulators, statutory and independent (the Telecom Regulatory Authority of India, for example). At the national level, these typically seek inputs from other stakeholders while making recommendations to governments, which then enact laws or make policy. In India, for instance, the &lt;a href="http://www.trai.gov.in/content/CONSULTATION/0_CONSULTATIONS.aspx"&gt;TRAI conducts consultations&lt;/a&gt; prior to making recommendations to the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within the &lt;strong&gt;private sector&lt;/strong&gt;, there may be companies (1) on the supply-side, such as infrastructure networks, telecommunications service companies, Internet Service Providers, search engines, social networks, cybercafés, etc., and (2) on the demand-side, online businesses, advertising/media, financial service providers, etc. who &lt;i&gt;use&lt;/i&gt; the Internet. There may also be &lt;strong&gt;national registries&lt;/strong&gt; managing ccTLDs, such as the Registro.br or the National Internet Exchange of India (NIXI). There may also the &lt;strong&gt;press and news corporations&lt;/strong&gt; representing both corporate and public interest under specific circumstances (media ownership and freedom of expression, for distinct examples).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Civil society organisations&lt;/strong&gt;, including consumer organisations, think-tanks and grassroots organisations, participate at various levels of policy-making in the formal institutional structure, and are crucial in representing users and public interest. The complexity of stakeholders may be seen from &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20framework%20for%20IG%20assessments%20-%20D%20Souter%20-%20final_0.pdf"&gt;Souter’s report&lt;/a&gt;, and this enumeration is but a superficial view of the national stakeholder-population.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Processes: Creating effective national IG bodies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;National IG bodies – be they steering committees, IGFs, consultative/working groups or other forums – may be limited by formal institutional governmental settings. While limited by the responsibility-gradient in paragraph 35 of the Tunis Agenda, an effective national IG body requires robust multi-stakeholder participation, as Souter notes, in technical governance, infrastructure and public policy issues. Its effectiveness also lies in governmental acquiescence of its expertise and recommendations; in short, in the translation of the IG body’s decisions into policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How do these stakeholders interact at the national level? In addition to the Brazilian example (CGI.br), an &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20study%20of%20IG%20in%20Kenya%20-%20D%20Souter%20%26%20M%20Kerretts-Makau%20-%20final.pdf"&gt;ISOC study&lt;/a&gt; by Souter and Monica Kerretts-Makau, &lt;i&gt;Internet Governance in Kenya: An Assessment&lt;/i&gt;, provides a detailed answer. At the &lt;strong&gt;technical level&lt;/strong&gt;, the registry KENIC manages the .ke domain, while the Kenya Computer Incident Response Team Coordination Centre coordinates national responses to incidents and collaborates internationally on cyber-security issues. A specific IPv6 Force to promote Kenya’s transition to IPv6 was also created.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the &lt;strong&gt;infrastructural level&lt;/strong&gt;, both the government and the private sector play important roles. Directly, ministries and government departments consult with infrastructure providers in creating policy. In India, for instance, the TRAI conducts multi-stakeholder consultations on issues such as telecom tariffs, colocation tariffs for submarine cable stations and mobile towers, etc. The government may also take a lead in creating infrastructure, such as the national optic fibre networks in &lt;a href="http://www.bbnl.nic.in/content/page/national-optical-fibre-networknofn.php"&gt;India&lt;/a&gt; and &lt;a href="https://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=11&amp;amp;ved=0CBsQFjAAOAo&amp;amp;url=http%3A%2F%2Fwww.kictanet.or.ke%2F%3Fp%3D1822&amp;amp;ei=avmeU_SaII6SuATi2ICoDA&amp;amp;usg=AFQjCNEgUIpb_kf2Fx-s7TJ2H-xl1rm9WA&amp;amp;sig2=HlpJp1UlVXRHTAOPh9W7Bg&amp;amp;bvm=bv.68911936,d.c2E&amp;amp;cad=rja"&gt;Kenya&lt;/a&gt;, as also creating investment opportunities such as liberalizing FDI. At the &lt;strong&gt;public policy level&lt;/strong&gt;, there may exist consultations initiated by government bodies (such as the TRAI or the Law Commission), in which other stakeholders participate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As one can see, government-initiated consultations by ministries, regulators, law commissions or specially constituted committees. Several countries have also set up national IGFs, which typically involve all major stakeholders in voluntary participation, and form a discussion forum for existing and emerging IG issues. National IGFs &lt;a href="http://www.internetgovernance.org/2009/08/28/another-mini-internet-governance-forum-in-the-u-s-a/"&gt;have been considered&lt;/a&gt; particularly useful to create awareness within the country, and may best address IG issues at the domestic policy level. However, Prof. Mueller &lt;a href="http://www.internetgovernance.org/2008/01/18/the-igf-and-networked-internet-governance/"&gt;writes&lt;/a&gt; that what is necessary is a “&lt;i&gt;reliable mechanism reliable mechanisms for consistently feeding the preferences expressed in these forums to actual global policy-making institutions like ICANN, RIRs, WIPO, and WTO which impact distributional outcomes&lt;/i&gt;”.&lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1"&gt;[1]&lt;/a&gt; M. Mueller, Ruling the Root: Internet Governance and the Taming of Cyberspace 57 (2002).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how'&gt;https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>National IGFs</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    

   <dc:date>2014-06-16T14:27:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/multi-stakeholder-internet-governance-the-way-ahead">
    <title>Multi-stakeholder Internet Governance: The Way Ahead</title>
    <link>https://cis-india.org/internet-governance/events/multi-stakeholder-internet-governance-the-way-ahead</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) in partnership with Software Freedom Law Centre (SFLC.in) is organizing a workshop "Multi-stakeholder Internet Governance: The Way Ahead" on August 6, 2014, 10.30 a.m. to 12.00 p.m., at during the APrIGF event to be held at Crown Plaza, Greater Noida.&lt;/b&gt;
        &lt;h3&gt;Thematic Area of Interest&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Enhanced Cooperation &amp;amp; the Multi-stakeholder model&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;:&lt;br /&gt;Today, multi-stakeholderism is the catchphrase in Internet governance. With the display of a multi-stakeholder model at NETmundial, controversies and opinions regarding the meaning, substance and benefits of multi-stakeholderism have deepened. As the recent meeting of the Working Group on Enhanced Cooperation of the United Nations Commission on Science, Technology and Development demonstrates, questions and concerns regarding meaning of multi-stakeholderism, the&lt;br /&gt;&lt;br /&gt;legitimacy and desirability of its processes, and the successes and disappointments of its outcomes now dominate the discussion. At this juncture, clarity and consensus are imperative to determine the future of multi-stakeholderism in Internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Roles and responsibilities of stakeholders&lt;/b&gt;:&lt;br /&gt;The debates surrounding stakeholder-roles in Internet governance began with ¶ 49 of the Geneva Declaration of Principles and ¶ 35 of the Tunis Agenda, which delineated clear roles and responsibilities. It created a ‘contributory’ multi-stakeholder model, where states held sovereign authority over public policy issues, while business and civil society were contributed to ‘important roles’ at the ‘technical and economic fields’ and the ‘community level’, respectively. At the same time, it set forth an agenda for enhanced cooperation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the WGEC meeting (April 30-May 2, 2014) demonstrated, there is as yet no consensus on stakeholder-roles. Certain governments remain strongly opposed to equal roles of other stakeholders, emphasizing their lack of accountability and responsibility. Civil society is similarly splintered, with a majority opposing the Tunis Agenda delineation of stakeholder-roles, while others remain dubious of permitting the private sector an equal footing in public policy-making. Still others question the wisdom of seeking a ‘fix’ when ‘nothing is broken’. In this session, we aim to interrogate the benefits and disadvantages of an ‘equal footing’ model, as opposed to a ‘contributory’ model.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Specific Issues of Discussions &amp;amp; Description&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Who are the stakeholders? Should a multi-stakeholder model of Internet governance grant all stakeholders ‘equal footing’? Should such ‘equal footing’ be relegated to issues other than substantive public policy-making? On the other hand, is a ‘contributory’ model safer? Are states better equipped to represent interests inclusively? How can governments and businesses best perform their role as trustees of the public interest of interest users?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In view of the formidable consolidation by the private sector at NETmundial, while civil society splintered on issues of intellectual property and intermediary liability, can a ‘participative model’ better prevent detrimental outcomes?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Multi-stakeholderism beyond NETmundial&lt;/b&gt;:&lt;br /&gt;As important as the meaning of multi-stakeholderism is the process of its execution. The need to fashion safe and sustainable processes for multi-stakeholder participation was highlighted by the successes and failures of private sector and civil society at NETmundial. From the ICANN and IGF models to stakeholder coalitions, premeeting coordination and governmental policy participation, this session shall expand on the quest for effective and beneficial stakeholder participation and representation in both the ‘equal footing’ and ‘contributory’ models, with a focus on enhancing developing country participation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Particularly, lessons that Internet governance may draw from multi-stakeholder governance processes across areas shall be discussed. For instance, deliberative democracy, enterprise associations or unions (such as in the International Labour Organisation) may all be of value. Similarly, multi-stakeholder processes in environmental and corporate governance and the development sector may benefit Internet governance. In determining the value of these processes to Internet governance, public interest of users is an important consideration. The capability and initiative of governments to implement an effective bottom-up model of Internet governance is equally important and will be considered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We aim to conduct a 90-minute workshop (2 panels of 45 minutes each), inclusive of 15-30 minutes in all for Q&amp;amp;A from audience, panellists and moderators.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/multi-stakeholder-internet-governance-the-way-ahead'&gt;https://cis-india.org/internet-governance/events/multi-stakeholder-internet-governance-the-way-ahead&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-29T07:08:04Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/internet-rights-accessibility-regulation-ethics">
    <title>Multi-Stakeholder Consultation on ‘Internet Rights, Accessibility, Regulation &amp; Ethics’</title>
    <link>https://cis-india.org/internet-governance/internet-rights-accessibility-regulation-ethics</link>
    <description>
        &lt;b&gt;Digital Empowerment Foundation, Association for Progressive Communications, Department of Information Technology and National Internet Exchange of India came together to organize an event on "Internet Rights, Accessibility, Regulation &amp; Ethics". This was held at Mirza Ghalib Hall, SCOPE Complex, New Delhi from 9.00 a.m. to 2.30 p.m. on May 3, 2012. Pranesh Prakash was a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The core aim of the dedicated half-day consultation programme was to discuss, deliberate and debate over the internet related concerns, covering the larger theme of internet and outlining India’s progress towards ‘Internet Access for All’, and specific areas of concern – right to information, internet &amp;amp; information access, internet governance, Internet regulation, content specifications, cyber law, and appropriate policy framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The consultation was an effort to encourage stakeholders to adopt relevant, appropriate and time bound measures to accelerate the availability, affordability and accessibility of the internet and address issues around it.&lt;b&gt;*&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;a class="anchor-link" href="#fn1"&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/hB4PI2ueVb0" width="320"&gt;&lt;/iframe&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;b&gt;External Links&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;*&lt;/b&gt;See the original info published at Digital Empowerment Foundation, Multi-Stakeholder Consultation on ‘Internet Rights, Accessibility, Regulation &amp;amp; Ethics’ : Digital Empowerment Foundation, &lt;a class="external-link" href="http://bit.ly/OGyYeg"&gt;&lt;span class="visualHighlight"&gt;http://bit.ly/OGyYeg&lt;/span&gt;&lt;/a&gt;, last accessed on June 29, 2012.&lt;/li&gt;
&lt;li&gt;&lt;span class="visualHighlight"&gt;&lt;a href="https://cis-india.org/news/towards-a-multi-stakeholder-consultation" class="internal-link"&gt;Click here&lt;/a&gt;&lt;/span&gt; for the Event Agenda&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.youtube.com/watch?v=hB4PI2ueVb0"&gt;See the video on YouTube&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/internet-rights-accessibility-regulation-ethics'&gt;https://cis-india.org/internet-governance/internet-rights-accessibility-regulation-ethics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-25T10:22:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/mag-analysis">
    <title>Multi-stakeholder Advisory Group Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/mag-analysis</link>
    <description>
        &lt;b&gt;This analysis has been done to see the trend in the selection and rotation of the members of the Multistakeholder advisory group (MAG) in the Internet Governance Forum (IGF). The MAG has been functional for nine years from 2006-2015. The analysis is based on data procured, collated and organised by Pranesh Prakash and Jyoti Panday. Shambhavi Singh, Law Student, NLU Delhi who was interning with CIS at the time also assisted with the organisation and analysis of the data. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The researcher has collected the data from the lists of members available in the public domain from 2010-2015. The lists prior to 2010 have been procured 	by the Centre for Internet and society from the UN Secretariat of the Internet Governance Forum (IGF).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This research is based solely upon the members and the nature of their stake holding has been analysed in the light of MAG terms of reference. No data has 	been made available regarding the nomination process and the criteria on which a particular member has been re-elected to the MAG (The IGF Secretariat does 	not share this data).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;According to the analysis, in these six years, the MAG has had around 182 members from various stakeholder groups.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We have divided it into five stakeholder groups, Government, Civil Society, Industry, Technical Community and Academia. Any overlap between two or more of 	these groups has also been taken into account, for example- A member of the Internet Society (ISOC) being both in the Civil Society and Technical 	Community.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;According to the MAG Terms of Reference&lt;a name="_ftnref1" href="#_ftn1"&gt;[1]&lt;/a&gt;, it is the prerogative of the UN Secretary General to select MAG 	Members. The general policy is that the MAG members are appointed for a period of one year, which is automatically renewed for 2 more years consecutively 	depending on their engagement in MAG activities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There is also a policy of rotating off 1/3&lt;sup&gt;rd&lt;/sup&gt; members of MAG every year for diversity and taking new viewpoints in consideration. There is also 	an exceptional circumstance where a person might continue beyond three years in case there is a lack of candidates fitting the desired area.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, it seems like the exception has become the norm as a whopping number of members have continued beyond 3 years, ranging from 4 years up to as long 	as 8 years, this figure rounds up to around 49. No doubt some of them are exceptional talents and difficult to replace. However, the lack of transparency 	in the nomination system makes it difficult to determine the basis on which these people continued beyond the usual term.&lt;/p&gt;
&lt;table style="text-align: justify;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;S. No.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Stakeholder&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Number of years&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Total Members continuing beyond 3 years&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Civil Society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8, 6, 6, 4, 4,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Government/Industry&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;4, 5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Technical community/ Civil society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8, 8, 8, 6, 6, 4, 4, 4, 4,4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Industry/ Civil society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8, 6,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Industry&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8, 7, 7, 6, 6, 4,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Industry/Tech Community/ Civil Society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Government&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;7, 7, 7, 6, 6, 6, 6, 5, 5, 5, 5, 5, 5, 4, 4, 4, 4, 4, 4,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;19&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Academia&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6, 6, 5,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Industry/ Tech community&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The stakeholders that have continued beyond 8 years have around 39% members from Government and related agencies. The next being Technical Community/Civil 	Society with around 20% representation, followed by Industry at 12%, 10% from the Civil Society, 6% from Academia, 4% from Government/Industry, 4% from 	Industry/Civil Society and 2% each from Industry/Technical Community and Industry/Technical Community/Civil Society respectively.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_CivilSociety.png" alt="null" class="image-inline" title="Civil Society" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Table with overlapping interests merged&lt;/strong&gt; &lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table style="text-align: justify;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;S. No.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Stakeholder&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Total Members continuing beyond 3 years&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Civil Society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;7 + 9 + 1+1 = &lt;strong&gt;18&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Government&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;19 &lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tech Community&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;9 + 1 + 1+1 = &lt;strong&gt;12&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Industry&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6 + 2 + 1 + 1+2 = &lt;strong&gt;13&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Academia&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;3&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;When the overlap is grouped separately, as in if a Technical Community/Civil Society person is placed both in Technical Community and Civil Society groups 	individually, then the representation of stakeholder representation is as follows(approximate values)-&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Government- 29%&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Civil Society- 28%&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Industry- 20%&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Technical Community-17%&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Academia-5%&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This clearly shows us that stakeholders from academia generally did not stay on MAG beyond 3 years. Even when all members that have ever been on MAG are 	taken into consideration, only around 8% representation has been from the academic community. This needs to be taken into account when new MAG members are 	selected in 2016.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The researcher has also looked at the MAG Representation based on gender and UN Regional Groups. The results of the analysis were as follows-&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The ratio of male members is to female members is approximately 16:9 in the MAG and the approximate value in percentage being 64% and 36% respectively.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/MAGRepresentation.png" alt="null" class="image-inline" title="MAG Representation" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Now coming to the UN Regional Groups, the results that the analysis yielded were as follows-&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Western European and Others Group (WEOG) has the highest representation in MAG, a large number of members being from Switzerland, USA and UK. This is 	followed by the Asia Pacific Group which has 20% representation. The third largest is the African group with 19% representation followed by Latin American 	and Caribbean Group (GRULAC) and Eastern European Group with 13% and 12% representation respectively.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/UNRegional.png" alt="null" class="image-inline" title="UN Regional Representation" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The representation of developed, developing and Least Developed Countries is as follows-&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Developed countries have approximately 42% representation, developing countries having 53% and LDCs having a mere 5% representation. There should be some effort to strive for better LDC representation as they are the most backward when it comes to Global ICT Penetration.	&lt;a name="_ftnref2" href="#_ftn2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/Developed.png" alt="null" class="image-inline" title="Developed" /&gt;&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt; Intgovforum.org, 'MAG Terms Of Reference' (2015) &amp;lt;http://www.intgovforum.org/cms/175-igf-2015/2041-mag-terms-of-reference&amp;gt; accessed 13 July 			2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt; &lt;em&gt;ICT Facts And Figures&lt;/em&gt; (1st edn, International Telecommunication Union 2015) &amp;lt;http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2015.pdf&amp;gt; 			accessed 11 July 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/mag-analysis'&gt;https://cis-india.org/internet-governance/blog/mag-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Multi-stakeholder</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-04-12T10:02:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/much-at-stake-for-tech-sector">
    <title>Much at stake for tech sector in UID project</title>
    <link>https://cis-india.org/news/much-at-stake-for-tech-sector</link>
    <description>
        &lt;b&gt;With the Parliamentary Standing Committee on Finance raising a red flag against the National Identification Authority of India ( NIAI) Bill to grant the UID (or Aadhar) project legal status, the project looks set for a slowdown. That could have broad implications for the tech sector that had laid substantial hope on it, especially when global markets are slowing down. &lt;/b&gt;
        
&lt;p&gt;The UID project is estimated to offer IT companies a Rs 15,000-Rs 20,000-crore opportunity. This includes building an ecosystem around the project, comprising biometrics, databases, smartcards, storage and system integration.&lt;/p&gt;
&lt;p&gt;Since the UIDAI implements an open-system, plugand-play approach, entrepreneurs and startups can develop applications in numerous areas. Some of the applications of &lt;a class="external-link" href="http://economictimes.indiatimes.com/topic/Aadhar"&gt;Aadhar&lt;/a&gt; is seen in areas such as food distribution, financial inclusion, and know-your-customer services.&lt;/p&gt;
&lt;p&gt;The parliamentary committee has said that the project might be too expensive and duplicates the National Population Register's (NPR) efforts to collect biometric and other data for the national census. Some have also called for a change of collection of data from biometric data, which they consider insecure for smart cards (as fraudsters can take your fingerprints from objects that you touch). The Cabinet need not accept the committee's recommendations.&lt;/p&gt;
&lt;p&gt;Thus it is unclear if the &lt;a class="external-link" href="http://economictimes.indiatimes.com/topic/UID-project"&gt;UID project &lt;/a&gt;will be scrapped, watered down or persisted with in its current form. Some contracts have been granted to tech majors. According to the said current contracts are not significantly large in size and their cancellation will not make a big dent in the companies' books. He added that scrapping of project from a longer term perspective could be a negative.&lt;/p&gt;
&lt;p&gt;Government public services initiatives like public distribution system UIDAI website, Wipro in March 2011 won a contract to supply, install, and commission hardware and software for data centres at Bangalore and NCR. MindTree in April 2010 won a contract for application software development, maintenance and support. TCS, Accenture, HP, Satyam, Intelenet Global, HCL Infosystems, Geodesic are some others that have won contracts.&lt;/p&gt;
&lt;p&gt;Ankur Rudra, IT sector analyst at Ambit Capital, (PDS) and e-governance schemes are expected to spark off more projects requiring technology enablement.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, ED of the Centre for Internet and Society, said if changes are incorporated to the Bill, it would not necessarily be anti-technology. The organization had raised concerns about security issues around biometric data. "There might be a change in the design of the UID project, but technology will remain a critical element," he added. Siddharth Pai, MD of global sourcing advisory firm Technology Partners International (TPI) India, said that the UID project is a very critical infrastructure from a national perspective and chances of the project being scrapped are little.&lt;/p&gt;
&lt;p&gt;He added that tech companies might experience delay in government spends and see a delay in project execution. This may lead to delays in revenue yields. IT company officials also acknowledge that there could be delays in projects which could increase costs for them. None wanted to be quoted on this issue.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This article by Pranav Nambiar was published in the Economic Times on 12 December 2011. Sunil Abraham has been quoted in this. Read the original &lt;a class="external-link" href="http://economictimes.indiatimes.com/tech/ites/much-at-stake-for-tech-sector-in-uid-project/articleshow/11077583.cms"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/much-at-stake-for-tech-sector'&gt;https://cis-india.org/news/much-at-stake-for-tech-sector&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-12T13:10:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/draconian-it-rules">
    <title>MPs to be taught ‘draconian’ IT Act Rules as India.net support galvanises for annul motion</title>
    <link>https://cis-india.org/news/draconian-it-rules</link>
    <description>
        &lt;b&gt;The blog post by Prachi Shrivastava was published in Legally India on April 23, 2012.&lt;/b&gt;
        
&lt;p&gt;Rajya Sabha’s member of parliament (MP) from Kerala, P Rajeeve, whose &lt;a class="external-link" href="http://164.100.47.5/newsite/bulletin2/Bull_No.aspx?number=49472"&gt;statutory motion&lt;/a&gt; to annul the IT (Intermediaries Guidelines) Rules 2011 is slated for discussion in Parliament tomorrow, aims to convene a meeting of MPs, internet societies, and bloggers in the first week of May to create awareness against the &lt;a class="external-link" href="http://www.legallyindia.com/201201182502/Legal-opinions/sopa-blackout-day-bah-wheres-the-kolaveri-about-indias-it-act-intermediaries-rules"&gt;draconian effect&lt;/a&gt; of the rules.&lt;/p&gt;
&lt;p&gt;“Most of the MPs need to know about this,” Rajeeve told Legally India, explaining that statutory motions are generally not easy to pass. “Actually we are trying to create awareness by organizing a session. The issue will be the IT Rules 2011 and how it is against the constitution, how it is against natural justice, how it is against due process of law.”&lt;br /&gt;&lt;br /&gt;“The motion has been accepted. The committee has allotted time for discussion on the twenty fourth. Thereafter it will come to the house. In this part of the session I am trying to coordinate other MPs to get support”, he said.&lt;/p&gt;
&lt;p&gt;Rajeeve’s motion of 23 March 2012, as first reported by &lt;a href="https://cis-india.org/internet-governance/blog/statutory-motion-against-intermediary-guidelines-rules/" class="external-link"&gt;CIS-India&lt;/a&gt;, was not his first attempt at bringing the IT rules into the spotlight. When the rules were in draft stage, he had made a &lt;a class="external-link" href="http://rajeev.in/pages/..%5CNews%5Ccensorship_Blogs%5CBloggers_Internet.html"&gt;zero hour mention&lt;/a&gt; against them for being in violation of freedom of speech and expression, by over-scrutinising bloggers, over-authorising intermediaries, and letting the government, individuals and institutions by-pass the due process of law.&lt;/p&gt;
&lt;p&gt;Rajeeve was one of the nine panelists in the open discussion on “Resisting Internet Censorship”, organised by the Centre for Internet and Society (CIS) and Foundation for Media Professionals, in Bangalore on Saturday, 21 April. The discussion, addressing an audience of 40, was moderated by veteran journalist Paranjoy Guha Thakurta.&lt;/p&gt;
&lt;p&gt;Other panelists included Mahesh Murthy, founder of digital marketing website Pinstorm, Sudhir Krishnaswamy, founding member of Centre for Law and Policy Research, Na Vijayashankar, director of Cyber Law College, and Siddharth Narain from the Alternative Law Forum.&lt;/p&gt;
&lt;p&gt;Also on the panel were Rishabh Dara,&lt;a class="external-link" href="http://www.google.com/policyfellowship/"&gt; Google policy fellow&lt;/a&gt; who conducted &lt;a href="https://cis-india.org/internet-governance/intermediary-liability-in-india" class="external-link"&gt;a study last year on intermediary liability in India and its chilling effects on free expression&lt;/a&gt;, BG Mahesh, founder of Oneindia.com, Ram Bhat, co-founder of community media collective Maraa, and Pranesh Prakash, programme manager at CIS.&lt;/p&gt;
&lt;p&gt;Prakash said that the discussion brought together different perspectives, even those of the entrepreneur, like BG Mahesh and Mahesh Murthy. “Transparency in the terms of censorship is good. We are not saying all censorship is bad, but that it should be transparent.”&lt;/p&gt;
&lt;p&gt;Prakash told Legally India about the various experiences shared by panelists, of the lack of transparency in the present system of censorship. While one faced harassment by the police over trivial procedural compliances, there was complaint for defamation against an article syndicated by another from a different publication’s press release. “And we read the article over and over and over again but couldn’t find anything which was remotely defamatory.”&lt;br /&gt;&lt;br /&gt;Legal experts on the panel, Kirshnaswamy and Vijayashankar, spoke about the constitutionalism behind free speech provisions. Narain shed light on the fact that while excessive energy has been expended on highlighting which content should not be banned, little has been spent on examining the operative procedures behind censorship.&lt;br /&gt;&lt;br /&gt;Dara spoke about his research and how it not only revealed that content was being frivolously removed on complaints to intermediaries, but also that the people whose content was being removed were not being informed of the same. There was no public notice of the removal.&lt;br /&gt;&lt;br /&gt;Bhat’s discourse drew attention to the history of censorship in India and elicited the fact that the Indian press has in fact been censored in an upsetting manner even since the revolt of 1857.&lt;/p&gt;
&lt;p&gt;Murthy made the observation that statistically speaking, in India the number of internet users exceeds television watchers, which has made social media unfathomably important while the internet is no longer elitist.&lt;br /&gt;&lt;br /&gt;A number of related Indian initiatives have been gathering momentum in recent months, such as&amp;nbsp;&lt;a class="external-link" href="http://softwarefreedom.in/index.php?option=com_content&amp;amp;view=article&amp;amp;id=97:campaign-for-freedom-on-the-internet&amp;amp;Itemid=83"&gt; signature campaigns&lt;/a&gt; for &lt;a class="external-link" href="https://www.change.org/petitions/mps-of-india-support-the-annulment-motion-to-protect-internet-freedom-stopitrules"&gt;internet freedom&lt;/a&gt;, and offline protests such as the &lt;a class="external-link" href="http://friendsofinternet.wikispaces.com/"&gt;Free Software Movement in Karnataka&lt;/a&gt; and the &lt;a class="external-link" href="http://kafila.org/2012/04/21/freedom-in-the-cage-22-april-2012/"&gt;Save your Voice in Delhi&lt;/a&gt;, are the order of the day. Other actions include &lt;a class="external-link" href="http://www.legallyindia.com/201201182502/Legal-opinions/sopa-blackout-day-bah-wheres-the-kolaveri-about-indias-it-act-intermediaries-rules"&gt;writing to MPs&lt;/a&gt;, asking them to vote in favor of Rajeeve’s statutory motion for annulment of the IT rules.&lt;/p&gt;
&lt;p&gt;Kerala-based advocate Shojan Jacob filed the f&lt;a class="external-link" href="http://www.legallyindia.com/201203062622/Bar-Bench-Litigation/read-first-writ-challenging-censorious-it-act-intermediaries-rules-in-kerala"&gt;irst ever writ challenging the rules&lt;/a&gt; in the Kerala High Court last month.&lt;/p&gt;
&lt;p&gt;The rules enable any individual or public or private institution to get content removed from websites, in most cases simply by notifying the website owners or intermediaries such as Google, Yahoo and others.&lt;/p&gt;
&lt;p&gt;Takedown requests can be based on any of &lt;a class="external-link" href="http://www.legallyindia.com/201201182502/Legal-opinions/sopa-blackout-day-bah-wheres-the-kolaveri-about-indias-it-act-intermediaries-rules"&gt;15 vaguely drafted parameters&lt;/a&gt;, without stating any reasons or requiring any judicial or quasi-judicial order in support.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.legallyindia.com/Social-lawyers/mps-to-be-taught-draconian-it-act-rules-as-indianet-support-galvanises-for-annul-motion"&gt;Click&lt;/a&gt; to read the original.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/draconian-it-rules'&gt;https://cis-india.org/news/draconian-it-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    

   <dc:date>2012-04-25T10:39:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/mps-oppose-curbs-on-internet">
    <title>MPs oppose curbs on internet; Sibal promises discussions</title>
    <link>https://cis-india.org/news/mps-oppose-curbs-on-internet</link>
    <description>
        &lt;b&gt;With MPs raising concerns over open-ended interpretations of restrictive terms in the rules seeking to regulate social media and internet, the government promised to evolve a consensus on points of contention.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://goo.gl/MCXLB"&gt;Pranesh Prakash is quoted in this article published by the Times of India on May 18, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Telecom minister Kapil Sibal's assurance came at the end of an engrossing debate in Rajya Sabha on a motion moved by CPM MP P Rajeeve who said the rules violated freedom of expression and free speech.&lt;/p&gt;
&lt;p&gt;He found support from leader of opposition &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/Arun-Jaitley"&gt;Arun Jaitley&lt;/a&gt; who picked several examples to point out that terms or descriptions like "harmful", "blasphemous" and "defamatory" did not lend themselves to precise legal definitions.&lt;/p&gt;
&lt;p&gt;Jaitley said what the government may find defamatory may not be seen in similar light by its critics. He also pointed to the difficulties of controlling technology and asked if it was desirable to do so.&lt;/p&gt;
&lt;p&gt;Assuring MPs who sought the annulment of 'rules' which are aimed at regulating internet content, &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/United-Company-RUSAL"&gt;Sibal&lt;/a&gt; said, "My assurance to the House is that I will request the MPs to write letters to me objecting to any specific words. I will then call a meeting of the members as well as the industry and all stakeholders. We will have a discussion and whatever consensus emerges, we will implement it."&lt;/p&gt;
&lt;p&gt;The move to put rules in place flows from the government's annoyance with what it sees as scurrilous and disrespectful comments about senior Congress leaders. It had suggested pre-screening of content which service providers were reluctant to consider.&lt;/p&gt;
&lt;p&gt;The motion for annulling the Information Technology (Intermediaries Guidelines) Rules notified in April 2011 was, however, defeated by a voice vote. Justifying the rules, the minister said "these are sensitive issues" as most internet companies were registered abroad and not subjected to Indian laws.&lt;/p&gt;
&lt;p&gt;TOI was first to report about the new rules that put a lot of the onus on intermediaries like internet service providers, Facebook and Twitter, to manage and monitor content produced by their users. Web activists believe the IT rules are open to arbitrary interpretation and can be misused to silence freedom of speech.&lt;/p&gt;
&lt;p&gt;Google, which participated in the public consultative process before the rules were framed, had told TOI, "If Internet platforms are held liable for third party content, it would lead to self-censorship and reduce the free flow of information."&lt;/p&gt;
&lt;p&gt;Moving the motion, Rajeeve said, "I am not against any regulation on internet but I am against any control on internet... In control, there is no freedom... These rules attempt to control internet and curtail the freedom of expression."&lt;/p&gt;
&lt;p&gt;Complimenting the CPM member, Jaitley said, "I think he (Rajeeve) deserves a compliment for educating us on this rule that Parliament has a supervisory control as far as subordinate legislations are concerned, and, if need be, we can express our vote of disapproval to the subordinate legislations."&lt;/p&gt;
&lt;p&gt;MPs felt the government should consider a regime where offensive content can be removed immediately after being posted rather than trying to sieve it out.&lt;/p&gt;
&lt;p&gt;Noting that it is extremely difficult, if not impossible, to defy technology and that the days of withholding information have gone, Jaitley urged the minister to "reconsider the language of restraints" to prevent its misuse. He pointed to certain words - harmful, harassing, blasphemous, defamatory - used in the rules, explaining how these could be interpreted/misinterpreted at any stage.&lt;/p&gt;
&lt;p&gt;The MPs did note that the internet had a risk of inciting hate speech and frenzy in society and therefore it needed to be restrained but the device could be swift identification of objectionable content.&lt;/p&gt;
&lt;p&gt;Pranesh Prakash of Centre for Internet and Society, an organization that has been advocating withdrawal of the rules, said he was sad with the outcome in Rajya Sabha. "The IT minister has promised to hold consultations but the ideal way to do so would have been to scrap the rules and start from scratch," he said.&lt;/p&gt;
&lt;p&gt;"It's not only about language in these rules. There is a problem with provisions like the one that empowers intermediaries to remove content without notifying the user who had uploaded the content or giving users a chance to explain themselves."&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/mps-oppose-curbs-on-internet'&gt;https://cis-india.org/news/mps-oppose-curbs-on-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-05-24T10:25:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state">
    <title>Moving Towards a Surveillance State</title>
    <link>https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state</link>
    <description>
        &lt;b&gt;The cyberspace is a modern construct of communication and today, a large part of human activity takes place in cyberspace. It has become the universal platform where business is executed, discourse is conducted and personal information is exchanged.  However, the underbelly of the internet is also seen to host activities and persons who are motivated by nefarious intent. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Note: The original tender document of the Assam Police dated 28.02.2013  along with other several other tender documents for procurement of  Internet and Voice Monitoring Systems &lt;a href="https://cis-india.org/internet-governance/blog/tenders-eoi-press-release.zip" class="internal-link"&gt;is attached as a zip folder&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As highlighted in the &lt;a href="http://necessaryandproportionate.net/#_edn2"&gt;&lt;i&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/i&gt;&lt;/a&gt;&lt;i&gt;, &lt;/i&gt;logistical barriers to surveillance have decreased in recent decades and the application of legal principles in new technological contexts has become unclear. It is often feared that in light of the explosion of digital communications content and information about communications, or "communications metadata," coupled with the decreasing costs of storing and mining large sets of data and the provision of personal content through third party service providers make State surveillance possible at an unprecedented scale. Communications surveillance in the modern environment encompasses the monitoring, interception, collection, preservation and retention of, interference with, or access to information that includes, reflects, arises from or is about a person's communications in the past, present or future.&lt;a href="#fn*" name="fr*"&gt;[*]&lt;/a&gt; These fears are now turning into a reality with the introduction of mass surveillance systems which penetrate into the lives of every person who uses any form of communications. There is ample evidence in the form of tenders for Internet Monitoring Systems (IMS) and Telecom Interception Systems (TCIS) put out by the Central government and various state governments that the Indian state is steadily turning into an extensive surveillance state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While surveillance and intelligence gathering is essential for the maintenance of national security, the creation and working of a mass surveillance system as it is envisioned today may not necessarily be in absolute conformity with the existing law. A mass surveillance system like the &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central Monitoring System&lt;/a&gt; (CMS) not only threatens to completely eradicate any vestige of the right to privacy but in the absence of a concrete set of procedural guidelines creates a tremendous risk of abuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although information regarding the Central Monitoring System is quite limited on the public forum at the moment it can be gathered that a centralized system for monitoring of all communication was first proposed by the Government of India in 2009 as indicated by the &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=54679"&gt;press release&lt;/a&gt; of the Ministry of Communications &amp;amp; Information. Implementation of the system started subsequently as indicated by another government &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=70747"&gt;press release&lt;/a&gt; and the Center for Development of Telematics (C-DOT) was entrusted with the responsibility of implementing the system. As per the C-DOT &lt;a href="http://www.cdot.in/media/publications.htm"&gt;annual report&lt;/a&gt; 2011-12, research, development, trials and progressive scaling up of a Central Monitoring System were conducted by the organization in the past 4 years and the requisite hardware and CMS solutions which support voice and data interception have been installed and commissioned at various Telecom Service Providers (TSP) in Delhi and Haryana as part of the pilot project. &lt;a href="http://articles.economictimes.indiatimes.com/2013-05-07/news/39091148_1_single-window-pranesh-prakash-internet"&gt;Media reports&lt;/a&gt; indicate that the project will be fully functional by 2014. While an extensive surveillance system is being stealthily introduced by the state, several concerns with regard to its extent of use, functioning, and real world impact have been raised owing to ambiguities and &lt;a href="https://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy"&gt;wide gaps in procedure and law&lt;/a&gt;. Moreover, the lack of a concrete privacy legislation coupled with the absence of public discourse indicates the lack of interest of the state over the rights of an ordinary citizen. It is under these circumstances that awareness must first be brought regarding &lt;a href="https://www.eff.org/deeplinks/state-surveillance-%26-human-rights"&gt;the risks of the mass surveillance&lt;/a&gt; on civil liberties which in the absence of established procedures protecting the rights of the citizens of the state can result in the abuse of powers by the state or its agencies and lead to the demise of civil freedoms even in democratic states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The architecture and working of a &lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;proposed Internet Monitoring System&lt;/a&gt; must be examined in an attempt to better understand the functioning, capabilities and possible impact of a Central Monitoring System on our society and lives. This can perhaps allow more open discourse and a committed effort to preserve the rights of the citizens especially the right to privacy can be made while allowing for the creation of strong procedural guidelines which will help maintain legitimate intelligence gathering and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Monitoring System: Setup and Working&lt;/b&gt;&lt;br /&gt;Very broadly, The Internet Monitoring System enables an agency of the state to intercept and monitor all content which passes through the Internet Service Provider’s (ISP) server which includes all electronic correspondence (emails, chats or IM’s, transcribed call logs), web forms, video and audio files, and other forms of internet content. The electronic data is stored and also subject to various types of analysis. While Internet Monitoring Systems are installed locally and their function is limited to specific geographic region, the Central Monitoring System will consolidate the data acquired from the different voice and data interception systems located across the country and create a centralized architecture for interception, monitoring and analysis of communications. Although the exact specifications and functions of the central monitoring system still remain unclear and ambiguous, some parallels regarding the functioning of the CMS can be drawn from the the specifications revealed in the Assam Police &lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;tender document&lt;/a&gt; for the procurement of an Internet Monitoring System.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Setup&lt;/b&gt;&lt;br /&gt;The deployment architecture of an Internet Monitoring System (IMS) contains probe servers which are installed at the Internet Service Provider’s (ISP) premises and the probes are installed at various tapping points within the entire ISP network.  A collection server is also installed and hosted at the site of the ISP. The collection server is used to either collect, analyze, filter or simple aggregate the data from the ISP servers and the data is transferred to a master aggregation server located a central data center. The central data center may also contain more servers specifically for analysis and storage. This type of architecture is being referred to as a ‘high availability clustered setup’ which is supposed to provide security in case of a failure or outage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Assam Police Internet Monitoring System tender document specifically indicates that the deployment in the state of Assam shall require 8 taps or probes to be installed at different ISPs, out of which 6 taps/probes shall be of 10 GBPS and 2 taps are of 1 GBPS. The document however mentions that the specifications are preliminary and subject to change.&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Types of data&lt;/b&gt;&lt;br /&gt;The proposed internet monitoring system of the Assam state can provide network traffic interception and a variety of internet protocols including Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Internet Message Access Protocol (IMAP) and Session Initiation Protocol (SIP), Voice over Internet Protocol (VoIP) can be intercepted and monitored. The system can also support monitoring of Internet Relay Chat and various other messaging applications (such as Google Talk, Yahoo Chat, MSN Messenger, ICQ, etc.).  The system can be equipped to capture and display multiple file types like text (.doc, .pdf), zipped (.zip) and executable applications (.exe). Further, information regarding login details, login pattern, login location, DNS address, routing address can be acquired along with the IP address and other details of the user.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Web crawling capabilities can be installed on the system which can provide data from various data sources like social networking sites, web based communities, wikis, blogs and other forms of web content. Social media websites (such as Twitter, Facebook, Orkut, MySpace etc.), web pages and data on hosted applications can also be intercepted, monitored and analyzed.  The system also allows capture of additional pages if updated; log periodical updates and other changes. This allows the monitoring agencies the capability of gathering internet traffic based on several parameters like Protocols, Keywords, Filters and Watch lists. Keyword matching is achieved by including phonetically similar words in various languages including local languages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More specific functions of the IMS can include complete email extraction which will disclose the address book, inbox, sent mail folder, drafts folder, personal folders, delete folders, custom folders etc. and can also provide identification of dead drop mails. The system can also be equipped to allow country wise tracking of instant messages, chats and mails.&lt;/p&gt;
&lt;p&gt;Regarding retention and storage of data, the tender document specifies that the system shall be technically capable of retaining the metadata of Internet traffic for at least one year and the defined traffic/payload/content is to be retained in the storage server at least for a week.  However, the data may be retained for a longer period if required. The metadata and qualified data after analysis are integrated to a designated main intelligence repository for storage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Types of Analysis&lt;/b&gt;&lt;br /&gt;The Internet Monitoring System apart from intercepting all the data generated through the Internet Service Providers is essentially equipped for various types of data analysis. The solutions that are installed in the internet monitoring system provide the capability for real time as well as historical analysis of network traffic, network perimeter devices and internal sniffers.  The kinds of analysis based on ‘slicing and dicing of data’ range from text mining, sentiment analysis, link analysis, geo-spatial analysis, statistical analysis, social network analysis, transaction analysis, locational analysis and fusion based analysis, CDR analysis, timeline analysis and histogram based analysis from various sources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The solutions installed in the IMS can enable monitoring of specific words or phrases (in various languages) in blogs, websites, forums, media reports, social media websites, media reports, chat rooms and messaging applications, collaboration applications and deep web applications. Phone numbers, addresses, names, locations, age, gender and other such information from content including comments and such can also be monitored. Specifically with regard to social media, the user’s profile and information related to it can be extracted and a detailed ontology of all the social media profiles of the user can be created.&lt;br /&gt;&lt;br /&gt;Based on the information, the analysis supposed to provide the capability to identify suspicious behavior based on existing and new patterns as they emerge and are continuously applied to combine incoming and existing information on people, profiles, transactions, social network, type of websites visited, time spent on websites, type of content download or view and any other type of gatherable information. The solutions on the system are also supposed to create single or multiple or parallel scenario build-ups that may occur in blogs, social media forums, chat rooms, specific web hosting server locations or URL, packet route that may be defined from time to time and such scenario build-ups can be based on parameters like sentiments, language or expressions purporting hatred or anti-national expressions, and even emotions like expression of joy, compassion and anger, which as may be defined by the agency depending on operational and intelligence requirement. Based on these parameters, automated alerts can be generated relating to structured or unstructured data (including metadata of contents), events, pattern discovery, phonetically similar words or phrases or actions from users. &lt;br /&gt;&lt;br /&gt;Based on the data analysis, reports or dossiers can be generated and visual analysis allowing a wide variety of views can be created.  Further, real time visualization showing results from real-time data can be generated which allows alerts, alert categories or discoveries to be ranked (high, medium, and low priority, high value asset, low value asset, moderate value asset, verified information, unverified information, primary evidence, secondary evidence, circumstantial evidence, etc.) based on criteria developed by the agency. The IMS solutions can also be capable of offering web-intelligence and open source intelligence and allow capabilities like simultaneous search capabilities which can be automated providing a powerful tool for exploration of the intercepted data.&lt;br /&gt;&lt;br /&gt;Another important requirement mentioned in the tender document is the systems capability to integrate with other interception and monitoring systems for 2G, 3G/UMTS and other evolving mobile carrier technologies including fixed line and Blackberry services and encrypted IP services like Skype services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;It is clear that a system like IMS with its extensive interception and analysis capabilities gives complete access to an agency or authority of all information that is accessed or transmitted by a person on the internet including information which is private and confidential such as email and instant messages. Although the state has the power to issue directions for interception or monitoring of information under the Information Technology Act, 2000 and certain rules are prescribed under section 69B, they are wholly inadequate compared to the scope and extent of the Internet Monitoring System and its scale of operations. The interception and monitoring systems that are either proposed or already in place effectively bypass the existing procedures prescribed under the Information Technology Act. &lt;br /&gt;&lt;br /&gt;The issues, concerns and risks are only compounded when it comes to the Central Monitoring System. The solutions installed in present day interception and monitoring systems give the state unprecedented powers to intercept, monitor and analyze all the data of any person who access the internet. Tools like deep packet inspection and extensive data mining solutions in the absence of concrete safeguards and when deployed through a centralized system can be misused to censor any content including legitimate discourse. Also, the perception that access to a larger amount of data or all data can help improve intelligence can also be sometimes misleading and it must be asked whether the fundamental rights of the citizens of the state can be traded away under the pretext of national security. Furthermore, it is essential for the state to weigh the costs of such a project both economically and morally and balance it with sufficient internal measures as well as adequate laws so that the democratic values are persevered and not endangered by any act of reckless force.&lt;br /&gt;&lt;br /&gt;Reiterating what has been said earlier, while it is important for the state to improve its intelligence gathering tools and mechanisms, it must not be done at the cost of a citizen’s fundamental right. It is the duty of the democratic state to endure and maintain a fine balance between national interest and fundamental rights through timely creation of equitable laws.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;]. &lt;a class="external-link" href="http://necessaryandproportionate.net/#_edn2"&gt;http://necessaryandproportionate.net/#_edn2&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state'&gt;https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>atreya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T05:57:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/here-comes-gowda">
    <title>Move over Kolaveri di, here comes Gowda</title>
    <link>https://cis-india.org/news/here-comes-gowda</link>
    <description>
        &lt;b&gt;Transparency is the buzzword in governance and chief minister DV Sadananda Gowda is eager to set a new benchmark. You could soon watch what the chief minister is doing at office, live on YouTube. This article was published in dailybhaskar.com on November 28, 2011.&lt;/b&gt;
        
&lt;p&gt;Cameras are being installed at the chief minister's office in Vidhana Soudha and his home office, Krishna. The live footage will be uploaded to YouTube. "I always wanted to maintain transparency in my functioning. Very soon, I will put it to work, when people can watch me live at what I am doing when inoffice. Let the people see who come to meet me, what I do and how I work. This will set a new example, but there will be no compulsion for my colleagues to emulate me. It is entirely up to them whether to follow me or not," said Gowda on Sunday.&lt;/p&gt;
&lt;p&gt;Kerala chief minister Oommen Chandy has already set a precedent by installing cameras in his office. On July 1 this year, the day Chandy's experiment went 'live', one lakh visitors logged in. Talking to The New York Times earlier this year, Sunil Abraham, executive director of the Centre for Internet and Society, Bangalore, said "He applauded Chandy's webcams, even if the effort amounted to no more than tokenism."This type of tokenism is also quite useful," The NYT reported Abraham as saying.&lt;/p&gt;
&lt;p&gt;In Karnataka, the much-hyped Citizens' Charter would be implemented after the state legislature, which begins on December 6, ends. The cabinet had already cleared the proposal and the bill on time-bound delivery of public services would be introduced in the session, added Gowda.&lt;br /&gt;&lt;br /&gt;The proposed bill will make it mandatory for officials in government offices to deliver public services within stipulated period of time and failure to do so would make them liable for penal action and fine to be computed for every day of delay.&lt;br /&gt;&lt;br /&gt;Already, Bescom chief P Manivannan has installed a webcam in his office. The NYT earlier reported Manivannan as saying that "he was installing a 'hemispheric' camera that would capture the goings-on in his entire office rather than just show his visitors."&lt;/p&gt;
&lt;p&gt;Read the original published in dailybhaskar.com &lt;a class="external-link" href="http://daily.bhaskar.com/article/BAN-move-over-kolaveri-di-here-comes-gowda-2598214.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/here-comes-gowda'&gt;https://cis-india.org/news/here-comes-gowda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-28T06:58:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/kids-music-fashion-on-net">
    <title>Mothers discuss kids, music, fashions, on Net</title>
    <link>https://cis-india.org/news/kids-music-fashion-on-net</link>
    <description>
        &lt;b&gt;Among the many conversations about behavioural problems seen among teenage children and the benefits of organic foods, there is one that raves about a baby-sitter who takes care of pets too, and one that reviews newly opened art classes in the city. These are not the usual face-to-face discussions among women at a gathering, but threads that run on parenting websites and ‘mommy' blogs that have captured the imagination of many mothers in Chennai.

&lt;/b&gt;
        
&lt;p&gt;Many parenting forums register more than a thousand threads of interaction each every day from the city alone, with a variety of localised pages on Yahoo, Facebook, and netlog dedicated to facilitate communication between mothers.&lt;/p&gt;
&lt;p&gt;Baby growth charts, immunisation schedules, home-made remedies, reviews of schools, summer camps, information on doctors and a collection of articles from the mothers themselves — these forums have it all.&lt;/p&gt;
&lt;p&gt;Many mothers feel that going through related threads on various parenting sites before attending the PTA meetings helps to know what rest of the parents feel about issues.&lt;/p&gt;
&lt;p&gt;“My daughter does not like me talking to her classmates' parents at meetings; discussing online helps to talk to parents without the interference of children,” says Shobana Mahadevan, a blogger and a mother.&lt;/p&gt;
&lt;p&gt;Discussing concerns, especially those regarding increase in fees, change in examination patterns, homework, and school announcements with hundreds of other mothers on the internet helps them understand matters at hand and form opinions, she says.&lt;/p&gt;
&lt;p&gt;Many of these forums have threads on car-pooling in selected areas where parents decide on turns to drop children at schools.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Subbiah Arunachalam, a distinguished fellow at the Centre for Internet and Society, says that with the computer finding its way into many urban households, an increasing number of mothers are focussing more on their children's performance in school.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;The social network they form on the net provides the mothers a platform to be “collectively enlightened” about everything from culinary innovations to popular music and fashion trends, he says.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;On “Babycentre”, a forum that monitors child's growth and gives regular inputs on expected child behaviour, Sangeetha Vijay (38), mother of a two-year-old says,&lt;/p&gt;
&lt;p&gt;“It is like an elderly person helping you get prepared for everything from teething problems to allergies in children.”&lt;br /&gt;&lt;br /&gt;Many mothers say that though communication on parenting forums starts out as a medium to interact with those who share similar concerns, it soon goes beyond the confines of the internet. “We have groups of ‘internet mothers' who often meet, hold competitions and spend time together,” says Penithia Selvi (32), mother of a five year old girl.&lt;/p&gt;
&lt;p&gt;“These sites and blogs give mothers a platform to write, discuss their interests and talk openly, which is a priceless experience,” she adds.&lt;/p&gt;
&lt;p&gt;“It is very much an urban phenomenon,” says Savithri. J., child counsellor with schools, “Since many working mothers have access to the internet for more hours, they try tracking their children's activities, and also explore the net in their own way,” she says. Many concerns such as addiction to gaming seen among children, are better discussed with mothers who experience similar problems, says Ranjitha Kumaran (32).&lt;/p&gt;
&lt;p&gt;“Since mothers as young as 23 to those in their sixties share their experiences on these sites, the issues are approached with a lot of sensitivity and understanding,” she says.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original in the &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/internet/article979462.ece"&gt;Hindu&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/kids-music-fashion-on-net'&gt;https://cis-india.org/news/kids-music-fashion-on-net&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T01:25:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts">
    <title>Most emerging firms low on cyber security: Experts</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts</link>
    <description>
        &lt;b&gt;When Pavitra Badrinath saw that the upgrade to a shopping application on her smartphone asked access to her contacts and messages, she decided against it. "Laws on privacy are not clear in India. So I am doing what I can to protect my information," the 26-year-old technology firm employee said.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Malavika Murali and Payal Ganguly was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2015-06-24/news/63783278_1_cyber-security-data-security-council-google-india"&gt;published in the Economic Times&lt;/a&gt; on June 24, 2015. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Are users taking a risk by allowing applications to gain access to personal data shadowed by an upgrade? "Most definitely ," said Bikash Barai, cofounder and chief executive of security firm iViz Security .&lt;br /&gt;&lt;br /&gt;With at least 10 alleged breaches and hacks into the databases of startups such as Ola and Gaana this year, the alarm bells are going off.&lt;br /&gt;&lt;br /&gt;Experts warn that emerging businesses are lax with security frameworks, which is especially worrying as millions more Indians are shopping online, including on their phones, exposing crucial personal and financial data to fraud.&lt;br /&gt;&lt;br /&gt;More than 70 per cent of Indian companies are under-prepared when it comes to cyber security, according to a report by CISO Platform, a social platform for security experts where Barai is chief adviser.&lt;br /&gt;&lt;br /&gt;India's largest cab-hailing company, Ola denied hackers' claims in an email response to ET, stating that its data were not compromised.&lt;br /&gt;&lt;br /&gt;Music service Gaana.com, in response to being hacked by a person in Pakistan calling himself MakMan, said it had strengthened its security team and offerings in recent weeks. "In addition, we are working on a `bug bounty' program, which will allow individuals to point out any potential vulnerability in a safe way," said Pawan Agarwal, business head at Gaana.com.&lt;br /&gt;&lt;br /&gt;According to Google India, the number of online shoppers is expected to cross 100 million by the end of next year, from 35 million ear, from 35 million n 2014. But lack of roust regulations and ata privacy laws as ell as the fragmentd nature of the starup ecosystem, do not llow much scope for esearch on cyber seurity , said experts."Under the Indian "Under the Indian regime, there are no self-regulatory mechanisms for putting out breach notifications," said Sunil Abraham, executive director of the Centre for Internet and Society. "The numbers available with a central body like Data Security Council of India will be a gross underestimation of the cases of breach."&lt;br /&gt;&lt;br /&gt;"Most of the startups in India want to do everything in-house. This can lead to a potential compromise or lack of expertise on the security front, even if it is made priority," said Harshit Agarwal, founder and chief executive of Singapore-based Appknox, which provides security services to Paytm, Freecharge and Myntra among other clients.&lt;br /&gt;&lt;br /&gt;Jabong founder and managing director Praveen Sinha said the online fashion retailer spends 15-20 per cent of its revenue on cyber security. But other startups contended that budgets and teams sizes are not accurate indicators of security preparedness.&lt;br /&gt;&lt;br /&gt;"We do not work with any external security firms as we have realised that the average report is as good as our internal team can make," said Mukesh Singh, chief executive officer of online grocer ZopNow.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts'&gt;https://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-06-29T16:02:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/more-urban-indian-women-are-acting-against-offensive-calls-and-text-messages">
    <title>More urban Indian women are acting against offensive calls and text messages</title>
    <link>https://cis-india.org/internet-governance/news/more-urban-indian-women-are-acting-against-offensive-calls-and-text-messages</link>
    <description>
        &lt;b&gt;More Indian women are fighting back against sexual harassment they face over phone calls and text messages, a survey shows.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Aria Thaker was published in &lt;a class="external-link" href="https://qz.com/india/1567185/womens-day-metoo-led-more-indian-women-to-report-harassment/"&gt;&lt;span class="external-link"&gt;Quartz India&lt;/span&gt; &lt;/a&gt;on March 8, 2019. Ambika Tandon was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;In an India-based survey by the Swedish  phone-identification app Truecaller, nearly 40% of respondents who had  faced sexual harassment via calls and SMSes said they’d filed police  complaints against it in 2019—a sharp increase from 10% when the company  conducted the &lt;a href="https://qz.com/india/1221626/78-of-indian-women-say-theyre-sexually-harassed-by-phone-every-week/"&gt;same survey&lt;/a&gt; just one year ago.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Truecaller’s  survey, conducted with global market research firm Ipsos, asked  detailed questions to over 2,100 women from metro areas across India.  All respondents had to be users of the Truecaller app.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;The survey, published yesterday (March 07),  showed the staggering scale of phone-based harassment of women in India.  One in three respondents reported receiving “sexual and inappropriate”  calls or SMSes. This is the same figure as when Truecaller conducted the  survey last year.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Women’s responses to phone  harassment took various forms. While 62% of women reported having “taken  measures against” harassment in 2018, 74% did this year. Some of the  steps women took this year included blocking numbers, calling mobile  operators to request “do not disturb” activation, ignoring calls, and  changing one’s number.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Blocking numbers, the  most popular step women took, also saw a substantial increase in  popularity from last year. While 65% of women who experienced harassment  reported blocking offending numbers in 2018, 92% did so in 2019.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;&lt;img src="https://cms.qz.com/wp-content/uploads/2019/03/colorcorrected-2.jpeg?quality=75&amp;amp;strip=all&amp;amp;w=620" /&gt;&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Women who faced harassment also reported being more willing to “name and  shame” perpetrators on social media—with 7% reporting having done so  last year, and 16% this year. In a recent, high-profile instance of  this, when television journalist &lt;a href="https://qz.com/india/1555678/twitter-treated-nyts-maggie-haberman-different-than-barkha-dutt/"&gt;Barkha Dutt experienced a torrent&lt;/a&gt; of phone-based harassment, she published screenshots from her perpetrators’ messages on Twitter.&lt;/p&gt;
&lt;h3 class="india a1dbe" style="text-align: justify; "&gt;Why this increase?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some say that this increase in willingness among women to take action  may be in part due to the influence of the MeToo movement, which &lt;a href="https://qz.com/india/1425057/metoos-spread-across-india-according-to-a-google-trends-map/"&gt;took India by storm&lt;/a&gt; last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“MeToo had a huge impact across India,” said Gayatri Sethi, the business  head of WhiteBalance, a Delhi-based creative studio that Truecaller  partnered with on &lt;a href="https://www.truecaller.com/against-harassment"&gt;an anti-harassment media campaign&lt;/a&gt; called #ItsNotOK. Now, Sethi said, “women can step up and can tell the  world about these issues, and understand that they should not just  ignore (harassment).”&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Truecaller believes that the Indian government’s  initiatives to tackle harassment may also be partly responsible for the  increased reports to police. “There’s been a major shift in the  approachability of the police, and there are several helplines for women  to call and report,” Lindsey LaMont, Truecaller’s global brand manager,  told Quartz. “I think this has made a big difference.” In October, as  #MeToo gripped India, the country’s National Commission for Women &lt;a href="https://www.newsx.com/national/metoo-movement-ncw-launches-special-email-id-to-report-cases-of-sexual-harassment-urges-women-to-send-their-metoo-stories"&gt;launched helplines&lt;/a&gt; and a dedicated email address to field harassment complaints.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;It is important to note, however, that Truecaller’s survey—of which around 97% of respondents come from the highest &lt;a href="https://en.wikipedia.org/wiki/SEC_Classification"&gt;socioeconomic classification group&lt;/a&gt; in India—cannot at all be considered nationally representative. “One of  their criteria for targeting respondents is that they need to be using  Truecaller, which is in itself a very limited sample set,” said Ambika  Tandon, a policy officer who researches gender and tech issues for the  think tank Centre for Internet and Society.&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Indian women of lower socioeconomic strata, Tandon suggested, would be  more likely to respond to harassment “by going offline or not accessing  mobile phones at all, because they don’t have the kinds of support  structures that would exist for communities where there is a larger  level of access or skill.”&lt;/p&gt;
&lt;p class="india a1dbe" style="text-align: justify; "&gt;Tandon also cautioned against the survey’s clubbing together of  different ways that women are taking action against harassment, for  example, by including steps like ignoring calls or blocking numbers next  to filing police complaints. This conflation, she said, could risk  being seen as similar to instances of law enforcement bias, in which  police sometimes tell women to simply block harassers’ numbers—while  “not dealing with (the complaint) as rigorously as they would with a  physical harassment complaint.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/more-urban-indian-women-are-acting-against-offensive-calls-and-text-messages'&gt;https://cis-india.org/internet-governance/news/more-urban-indian-women-are-acting-against-offensive-calls-and-text-messages&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aria Thaker</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-03-10T02:24:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance">
    <title>More than a Hundred Global Groups Make a Principled Stand against Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance</link>
    <description>
        &lt;b&gt;For some time now there has been a need to update understandings of existing human rights law to reflect modern surveillance technologies and techniques.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Nothing could demonstrate the urgency of this situation more than the &lt;a href="https://www.privacyinternational.org/blog/looking-at-prism-nsas-mass-surveillance-program"&gt;recent&lt;/a&gt; &lt;a href="https://www.eff.org/deeplinks/2013/06/spy-without-borders"&gt;revelations&lt;/a&gt; confirming the mass surveillance of innocent individuals around the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To move toward that goal, today we’re pleased to announce the formal launch of the &lt;a href="https://cis-india.org/internet-governance/blog/necessary-and-proportionate.pdf" class="internal-link"&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt;. The principles articulate what international human rights law – which binds every country across the globe – require of governments in the digital age. They speak to a growing global consensus that modern surveillance has gone too far and needs to be restrained. They also give benchmarks that people around the world can use to evaluate and push for changes in their own legal systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The product of over a year of consultation among civil society, privacy and technology experts, including the Centre for Internet and Society (read &lt;a href="https://www.privacyinternational.org/blog/towards-international-principles-on-communications-surveillance"&gt;here&lt;/a&gt;, &lt;a href="https://www.eff.org/deeplinks/2012/12/tackling-state-surveillance-and-human-rights-protecting-universal-freedoms"&gt;here&lt;/a&gt;, &lt;a href="https://www.eff.org/issues/surveillance-human-rights"&gt;here&lt;/a&gt; and &lt;a href="https://www.privacyinternational.org/blog/pi-is-pleased-to-announce-a-public-consultation-on-the-international-principles-on"&gt;here&lt;/a&gt;), the principles have already been co-signed by over hundred organisations from around the world. The process was led by &lt;a href="https://www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt;, &lt;a href="https://accessnow.org/"&gt;Access&lt;/a&gt;, and the &lt;a href="https://eff.org/"&gt;Electronic Frontier Foundation&lt;/a&gt;. The process was led by &lt;a href="https://www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt;, &lt;a href="https://accessnow.org/"&gt;Access&lt;/a&gt;, and the &lt;a href="https://eff.org/"&gt;Electronic Frontier Foundation&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The release of the principles comes on the heels of a &lt;a href="https://www.privacyinternational.org/blog/un-report-the-link-between-state-surveillance-and-freedom-of-expression"&gt;landmark&lt;/a&gt; &lt;a href="https://www.eff.org/deeplinks/2013/06/internet-and-surveillance-UN-makes-the-connection"&gt;report&lt;/a&gt; from the United Nations Special Rapporteur on the right to Freedom of Opinion and Expression, which details the widespread use of state surveillance of communications, stating that such surveillance severely undermines citizens’ ability to enjoy a private life, freely express themselves and enjoy their other fundamental human rights. And recently, the UN High Commissioner for Human Rights, Nivay Pillay, &lt;a href="http://www.ohchr.org/EN/NewsEvents/Pages/Media.aspx?IsMediaPage=true&amp;amp;LangID=E"&gt;emphasised the importance&lt;/a&gt; of applying human right standards and democratic safeguards to surveillance and law enforcement activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"While concerns about national security and criminal activity may justify the exceptional and narrowly-tailored use of surveillance programmes, surveillance without adequate safeguards to protect the right to privacy actually risk impacting negatively on the enjoyment of human rights and fundamental freedoms," Pillay said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principles, summarised below, can be found in full at &lt;a class="external-link" href="http://necessaryandproportionate.org"&gt;necessaryandproportionate.org&lt;/a&gt;. Over the next year and beyond, groups around the world will be using them to advocate for changes in how present laws are interpreted and how new laws are crafted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We encourage privacy advocates, rights organisations, scholars from legal and academic communities, and other members of civil society to support the principles by adding their signature.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To sign, please send an email to &lt;a class="mail-link" href="mailto:rights@eff.org"&gt;rights@eff.org&lt;/a&gt;, or visit &lt;a class="external-link" href="https://www.necessaryandproportionate.org/about"&gt;https://www.necessaryandproportionate.org/about&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Summary of the 13 principles&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Legality: Any limitation on the right to privacy must be prescribed by law.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Legitimate Aim: Laws should only permit communications surveillance by specified State authorities to achieve a legitimate aim that corresponds to a predominantly important legal interest that is necessary in a democratic society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Necessity: Laws permitting communications surveillance by the State must limit surveillance to that which is strictly and demonstrably necessary to achieve a legitimate aim.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Adequacy: Any instance of communications surveillance authorised by law must be appropriate to fulfill the specific legitimate aim identified.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Proportionality: Decisions about communications surveillance must be made by weighing the benefit sought to be achieved against the harm that would be caused to users’ rights and to other competing interests.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Competent judicial authority: Determinations related to communications surveillance must be made by a competent judicial authority that is impartial and independent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Due process: States must respect and guarantee individuals' human rights by ensuring that lawful procedures that govern any interference with human rights are properly enumerated in law, consistently practiced, and available to the general public.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;User notification: Individuals should be notified of a decision authorising communications surveillance with enough time and information to enable them to appeal the decision, and should have access to the materials presented in support of the application for authorisation.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Transparency: States should be transparent about the use and scope of communications surveillance techniques and powers.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Public oversight: States should establish independent oversight mechanisms to ensure transparency and accountability of communications surveillance.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Integrity of communications and systems: States should not compel service providers, or hardware or software vendors to build surveillance or monitoring capabilities into their systems, or to collect or retain information.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Safeguards for international cooperation: Mutual Legal Assistance Treaties (MLATs) entered into by States should ensure that, where the laws of more than one State could apply to communications surveillance, the available standard with the higher level of protection for users should apply.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Safeguards against illegitimate access: States should enact legislation criminalising illegal communications surveillance by public and private actors.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance'&gt;https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-31T14:26:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-india-may-18-2018-u-sudhakar-reddy-more-errors-in-aadhaar-data-in-andhra-pradesh-than-in-voter-database">
    <title>More errors in Aadhaar data in Andhra Pradesh than in voter database</title>
    <link>https://cis-india.org/internet-governance/news/times-of-india-may-18-2018-u-sudhakar-reddy-more-errors-in-aadhaar-data-in-andhra-pradesh-than-in-voter-database</link>
    <description>
        &lt;b&gt;As much as eight per cent of Aadhaar data collected in Andhra Pradesh has errors, mostly related to name, address and date of birth, which is more than the errors in the voter ID database. But still, 87% of rural residents approve mandatory linking of the unique ID with various schemes and services.&lt;/b&gt;
        &lt;p&gt;The article by U Sudhakar Reddy was published in the &lt;a class="external-link" href="https://timesofindia.indiatimes.com/city/hyderabad/more-errors-in-aadhaar-data-in-andhra-pradesh-than-in-voter-database/articleshow/64214534.cms"&gt;Times of India&lt;/a&gt; on May 18, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was revealed in the &lt;a class="key_underline" href="https://timesofindia.indiatimes.com/topic/State-of-Aadhaar"&gt;State of Aadhaar&lt;/a&gt; report 2017-18 based on a survey carried out in three states — Andhra Pradesh, &lt;a class="key_underline" href="https://timesofindia.indiatimes.com/india/rajasthan"&gt;Rajasthan&lt;/a&gt; and West Bengal. The survey revealed that a majority of people in &lt;a class="key_underline" href="https://timesofindia.indiatimes.com/topic/Andhra-Pradesh"&gt;AP&lt;/a&gt; and Rajasthan preferred Aadhaar-based PDS delivery as they believed biometric authentication prevents identity fraud. On the flip side, at least 3 lakh people, which is 0.8% of PDS beneficiaries, were denied ration benefits due to Aadhaar issues, it found.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The survey found that among the three states, it was easiest to enrol for Aadhaar in AP. As many was 67% of people used Aadhaar as proof for opening bank accounts and 17% used it for Know Your Customer (KYC) verification. The survey also found that 96% of respondents valued privacy and wanted to know what the government will do with their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The survey covered 2,947 rural households in 21 districts across the three states from Nov 2017 and Feb 2018,” the report by IDinsight, a development analytics firm, said. “Compared to voter IDs, the error-rate in Aadhaar was 1.5 times higher. While exclusion from PDS due to Aadhaar-related factors is significant, it is lower than exclusion explained by factors unrelated to Aadhaar,” said Ronald Abraham of IDinsight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reacting to the findings, Dr Ajay Bhushan Pandey, CEO of &lt;a class="key_underline" href="https://timesofindia.indiatimes.com/topic/UIDAI"&gt;UIDAI&lt;/a&gt;, said: “The report highlights that Aadhaar has wide-scale support from people. Exclusion from PDS is due to failure of the local administration and should be taken very seriously.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But critics found fault with the survey methodology. “If IDinsight asked respondents whether they preferred the UK system where you can get a SIM card without KYC or the Indian system with mandatory biometric authentication, then 100% of respondents would have opted for the UK approach. They have got an endorsement for use of biometrics due to their disingenuous survey design,” said &lt;a class="key_underline" href="https://timesofindia.indiatimes.com/topic/Sunil-Abraham"&gt;Sunil Abraham&lt;/a&gt;, executive director, Centre for Internet and Society.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-india-may-18-2018-u-sudhakar-reddy-more-errors-in-aadhaar-data-in-andhra-pradesh-than-in-voter-database'&gt;https://cis-india.org/internet-governance/news/times-of-india-may-18-2018-u-sudhakar-reddy-more-errors-in-aadhaar-data-in-andhra-pradesh-than-in-voter-database&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-05-20T14:04:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
