<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1206 to 1220.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/debate-on-uid"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/economic-times-december-30-2013-lison-joseph-mongo-db-startup-hired-by-aadhar-got-funds-from-cia-vc-arm"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/moldova-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/united-news-of-india-march-26-2018-modi-govt-compromising-privacy-of-individuals-congress"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/mobilising-support-for-freedom-on-web"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/mobile-trust-and-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/mobile-tech-4-social-change"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/mobile-net-ban-during-peaceful-protest-leaves-farmers-confused"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/mobile-india-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/mobile-education-villages"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/mobile-india-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/debate-on-uid">
    <title>More Debate on UID Project Needed</title>
    <link>https://cis-india.org/news/debate-on-uid</link>
    <description>
        &lt;b&gt;A press conference on UID was held at the Press Club in Bangalore on 26 July, 2010. It was co-organised by Citizen's Action Forum, Alternate Law Forum and the Centre for Internet and Society. Mathew Thomas and Vinay Baindur spoke about the UID. Proceedings from the conference was covered in the Hindu on 27 July, 2010.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/publications/uid-coverage-hindu" class="internal-link" title="More Debate on UID"&gt;More Debate on UID&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/debate-on-uid'&gt;https://cis-india.org/news/debate-on-uid&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T11:13:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/economic-times-december-30-2013-lison-joseph-mongo-db-startup-hired-by-aadhar-got-funds-from-cia-vc-arm">
    <title>MongoDB startup hired by Aadhaar got funds from CIA VC arm</title>
    <link>https://cis-india.org/news/economic-times-december-30-2013-lison-joseph-mongo-db-startup-hired-by-aadhar-got-funds-from-cia-vc-arm</link>
    <description>
        &lt;b&gt;Two weeks ago, Max Schireson, chief executive of MongoDB, a New York-based technology startup, was in New Delhi to sew up a very important contract for his company — with the Unique Identification Authority of India (UIDAI).&lt;/b&gt;
        &lt;p&gt;The article by Lison Joseph was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2013-12-03/news/44710564_1_uidai-chairman-nandan-nilekani-uid-data-in-q-tel"&gt;published in the Economic Times&lt;/a&gt; on December 3, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The contract is yet to be announced but what could raise eyebrows is the fact that &lt;a href="http://economictimes.indiatimes.com/topic/MongoDB"&gt;MongoDB&lt;/a&gt; is part-funded by the US' &lt;a href="http://economictimes.indiatimes.com/topic/Central%20Intelligence%20Agency"&gt;Central Intelligence Agency&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The company is expected to help in capturing and analysing data related to the ambitious plan to issue a unique identity number — Aadhaar — to over a billion citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;MongoDB, which makes software that helps manage large databases, especially unstructured data, has raised $231 million (Rs1,400 crore) since being founded in 2007. Some of its funding is from In-Q-Tel, the not-for-profit venture capital arm of CIA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While MongoDB lists In-Q-Tel as one of its investors on its website, the company has not disclosed the quantum of funding received from it. The fund's stated mission is to identify, adapt and deliver innovative technology solutions to support the missions of CIA and the broader US intelligence community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides CIA, In-Q-Tel works with National Geospatial-Intelligence Agency, Defense Intelligence Agency and Department of Homeland Security Science and Technology Directorate.&lt;/p&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_crunchingdata.png" alt="crunching data" class="image-inline" title="crunching data" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;"Once an investment is made, IQT (the fund) works with the company and the intelligence community partner agency to complete a work program and facilitate solution delivery," the fund's website said. The quote describes IQT's relationship with any company in which it invests in and is not specific to MongoDB.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Neither &lt;a href="http://economictimes.indiatimes.com/topic/UIDAI"&gt;UIDAI&lt;/a&gt; nor MongoDB responded to queries from ET on whether the CIA link was considered before entering into a partnership. UIDAI Chairman &lt;a href="http://economictimes.indiatimes.com/topic/Nandan%20Nilekani"&gt;Nandan Nilekani&lt;/a&gt; did not respond to emails, messages and phone calls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A senior UIDAI official confirmed the agency has entered into an agreement with MongoDB and that the company's database software is already being used for analysing the pace at which registration of new beneficiaries is taking place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is not clear if MongoDB's vendor relationship would be with UID directly or with one of the system integrators that UID works with. Schireson, the CEO, was also one of the national co-chairs for Technology for Obama, an interest group that campaigned for the reelection of President &lt;a href="http://economictimes.indiatimes.com/topic/Barack%20Obama"&gt;Barack Obama&lt;/a&gt; after his first term.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no evidence in the public domain that the firm is controlled or significantly influenced by the CIA in any manner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the revelations of &lt;a href="http://economictimes.indiatimes.com/topic/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt;, a former NSA contractor-turned-whistleblower that US intelligence agencies routinely intercepted communication in Europe and Asia, including in India has raised concerns. Experts said the UID's centralised design could pose a risk, where even a single mistake can make the whole system disproportionately vulnerable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The risk exposure because of CIA involvement (could be that) if MongoDB is a data controller, then secret courts and secret court orders could be used to get access to the UID data," said Sunil Abraham, executive director at the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added that even if UIDAI is only using the source code without getting into a commercial relationship with MongoDB, they should audit the source code to check if CIA has introduced any back doors. "This is because Snowden has told us that the army of mathematicians working for the US government has compromised some standards even though they were developed in an open, participatory and transparent fashion." MongoDB, whose name is a play on the word humongous, competes with Oracle, IBM and Microsoft. It has around 320 employees and some 600 customers. At its latest round of $150 million in fund-raising in October, the company was valued at about $1.2 billion, according to Bloomberg. Other investors include Intel Capital, Salesforce-.com, Red Hat and Sequoia.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/economic-times-december-30-2013-lison-joseph-mongo-db-startup-hired-by-aadhar-got-funds-from-cia-vc-arm'&gt;https://cis-india.org/news/economic-times-december-30-2013-lison-joseph-mongo-db-startup-hired-by-aadhar-got-funds-from-cia-vc-arm&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-13T11:53:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/moldova-online">
    <title>Moldova Online: An Interview with Victor Diaconu</title>
    <link>https://cis-india.org/internet-governance/blog/moldova-online</link>
    <description>
        &lt;b&gt;In this interview for Russian Cyberspace, set up with the help of Sunil Abraham (Executive Director at the Centre for Internet and Society in Bangalore, India), computer software professional Victor Diaconu explains the nature of Internet use, state control and the development of blogging and social media platforms in Moldova. Victor works at Computaris in Chisinau. He is Moldova educated, and has travelled to several western countries (including lengthy stays to US, UK) to learn about and understand what there is to be done in Moldova. Sudha Rajagopalan interviewed Victor Diaconu.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt;: After the 2009 elections, there was some talk of reform in Moldova and greater transparency, but now one also hears contradictory reports of increasing authoritarian tendencies. &amp;nbsp;Is this ambivalence evident in the way the internet is regulated and used here?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VD&lt;/strong&gt;: I would not say the tendencies are authoritarian. The constitution says that the President should be voted in by a majority of 61 out of 101 members of the Parliament. If not, Parliament should be dissolved and re-elected. Well, this should happen twice a year at the most, and as such, after a second failed attempt to vote the President the authority of the Parliament and Government is somewhat questionable. The current Parliament has tried to change the rules of voting in the President - to make it by popular vote, for instance, but this is met with resistance from the Communist Party.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As to transparency - I would say it has improved. Though, one should not expect too many changes from a Government with questionable authority and with so many systemic flaws inherited from the previous government. At the moment we've got a coalition government. As such, there are frictions and these are indeed visible. This gives a sense of comfort and truthfulness since it is normal to have frictions in any human endeavour. While the communist party was ruling - everything was "nice and dandy" both in media and in political affairs and one could not get anything but "fake" - fake news, fake results, fake improvements.&lt;/p&gt;
&lt;p&gt;Internet control and filtering do not happen. In fact, we did have a "small revolt" on April 7, 2009, when it seemed the communist party had tried to steal the vote for the parliament. At that moment a few .md sites were blocked by the national Telecom operator, but most other sites were still available. In fact, news about the event was best available on twitter (might still be available under "pman" tags). There also were a few attempts to stifle free speech when authorities requested names/IP addresses of commenters on some forums. However, this is no longer conceivable ...&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt;: Given that the press and television are largely in the hands of the state and criticism of the state is considered defamation (and leads to the arrest of press people), does the internet play a special role as a space for alternative media and political blogs? Are these prevalent and influential?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VD&lt;/strong&gt;: Yes, national TV is largely state owned and it was worse before the change in power. Now it seems to have improved. There are a series of smaller TV stations but these have reduced coverage - mostly in bigger cities. I understand that they've started rolling out IP TV with packages of 50+ TV channels - local and international. The national Telecoms operator provides very good Internet coverage. Dial-up Internet at reasonable prices is available everywhere in the country. Broadband availability even in rural areas is very good. And it's not too expensive. As to the role of Internet - indeed its influence is increasing. A series of media portals are frequented by many, including me. http://unimedia.md/; http://m.protv.md/; http://jurnaltv.md/; http://forum.md/to mention a few. The news here is conveyed tersely &amp;nbsp;but I do my own editorializing if need be. Also, I can read the comments if I want to get a feeling about how others feel about some specific event.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt;: Can you tell us about some of the popular bloggers and blogging platforms in Moldova? Live Journal is popular in Russia; can the same be said of Moldova?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VD&lt;/strong&gt;: I'm not aware of any significant blogger, more so, political blogger. I'd say we still need to wait for someone whose commentary is mature enough for people to care about him or her... As to the platform - those blogging attempts that I've seen were indeed on major blogging portals like Live Journal.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt;: What can you tell us about the presence of social media in Moldova? Does Moldova prefer its own versions of global digital platforms, or are FB, My Space, Twitter popular here? &amp;nbsp;What is the role of the diaspora in this space?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VD&lt;/strong&gt;: Global platforms are widely used. There are a few Russian popular platforms in wide use too, such as odnoklassniki.ru. We have up to 1 million Moldovans working in European countries, Russia and other places, since the pay is significantly higher over there. These people left a few years back and most of them intend to return. And they, indeed, rely on the available platforms to relate back to relatives and friends.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt;: Lastly, can you tell us about the linguistic landscape of Moldovan new media; I imagine the most widely used language on the internet is Moldovan/Romanian. Is Russian prevalent or is new media here a platform to assert their exclusive Moldovan identity?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VD&lt;/strong&gt;: The rules for language are that media should have at least 60-70% of content in "state" language and the law was often changed so that sometimes 'state language’ included Russian too. &amp;nbsp;In fact, in Moldova we are very comfortable with the Russian language, at least those a bit older (30+ years) since we were supposed to speak it well in the Soviet era. &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SR&lt;/strong&gt; (with many thanks to Victor Diaconu and Sunil Abraham)&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;About Sudha Rajagopalan&lt;/h3&gt;
&lt;p&gt;Sudha Rajagopalan is the deputy editor of &lt;a class="external-link" href="http://www.digitalicons.org/"&gt;Digital Icons: Studies in&amp;nbsp;Russian, Eurasian and Central European New Media&lt;/a&gt;&amp;nbsp;and co-blogger at &lt;a class="external-link" href="http://russ-cyberspace.livejournal.com/"&gt;Russian Cyberspace&lt;/a&gt;.&amp;nbsp;Sudha is also a &amp;nbsp;Research Affiliate&amp;nbsp;with the Media Studies Group at the University of Utrecht in the&amp;nbsp;Netherlands. Her current research is on audience and fan communities&amp;nbsp;on Runet (the Russian-language internet), with a special interest in&amp;nbsp;identity, performativity and affect in online practices. Sudha&amp;nbsp;obtained her PhD in Russian History from Indiana University,&amp;nbsp;Bloomington (2005). She is the author of 'Leave Disco Dancer Alone:&amp;nbsp;Indian Cinema and Soviet Movie-going after Stalin,' Yoda Press, 2008&amp;nbsp;('Indian Films in Soviet Cinemas: The Culture of Movie-going after&amp;nbsp;Stalin,' Indiana University Press, 2009).&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/moldova-online'&gt;https://cis-india.org/internet-governance/blog/moldova-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sudha Rajagopalan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:10:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk">
    <title>Modi's Valley hug sparks swadeshi talk</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk</link>
    <description>
        &lt;b&gt;His warm hug of Facebook's Mark Zuckerberg will perhaps be the most abiding image of Narendra Modi's visit to the Silicon Valley.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;But that embrace, and what  it conveyed, is now becoming the subject for an intense debate among  techies here. Is Modi giving in too much to the Googles and Facebooks of  the world, when there is so much technology talent within India? Is he  taking the easy way out by handing out critical pieces of his Digital  India vision to global incumbents rather than build domestic  capabilities?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;"When the government  wanted to build a citizen engagement platform earlier this year, they  depended on Google. Now when they want Wi-Fi in railway stations, it's  again Google. These are things that can be done by our companies,  otherwise we will not be able to create our own digital industry.  Remember, we are the people who built Aadhaar," said an industry veteran  who did not want to be named.&lt;br /&gt; &lt;br /&gt; Nitin Pai, co-founder of  Takshashila, an independent policy research and advocacy body that  provides services for government agencies, NGOs and corporations, said  Modi's team should make a careful distinction between national interest  and MNCs' commercial interest. "Many MNCs have come forward to  participate in Digital India initiatives. The government will have to  look at offering sufficient incentives for innovation to domestic tech  companies, many of whom are coming with innovative business models," he  said.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Speaking to a  cross-section of tech companies here, two sets of concerns emerge. One  relates to the concessions that will work in favour of global incumbents  and against newcomers - the latter is likely to add more value in the  long term. This includes the issue of net neutrality , on which the  government is seen to be waffling, and the guidelines issued by the  Indian Patent Office declaring that software is patentable in India.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;img src="https://cis-india.org/home-images/Concerns.png/@@images/3d04c7c6-2ac6-444b-8fbb-4e7d79823c8c.png" alt="Concerns" class="image-inline" title="Concerns" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The new guidelines will  make it easier for companies to file for software patents in India. But  software patenting has become hugely controversial globally , because  innova tions in the area are often just incremental, and come on top of  other software programs.Besides, patenting is expensive and is often the  subject of litigation, both of which work against small ventures with  little resources. Companies like Google have spent billions of dollars  to buy patents.&lt;br /&gt; &lt;br /&gt; Venkatesh Hariharan, member of software product  think-tank iSpirt, said the new guidelines would make it easier for  bigger companies to file software patents, but for smaller firms and  startups, the move could be detrimental."They could end up fighting  patent litigations. In the US, 37% of patent litigation is around  software and business patents," he said.&lt;br /&gt; &lt;br /&gt; Sunil Abraham,  executive director in research organization Centre for Internet and  Society , fears litigation could kill local innovation. He cited a  recent example where a Delhi high court order asked Indian handset  manufacturer Micromax to pay 1.25%-2% of the selling price of its  devices to Ericsson that had claimed infringement of patents.&lt;br /&gt; &lt;br /&gt; The other set of issues relates to certain rules and regulations in  India that place significant obstacles before small technology ventures.  This is resulting in many ventures shifting their registered offices to  Singapore or the US.&lt;br /&gt; &lt;br /&gt; Albinder Dindsa's on-demand delivery  service Gro fers is among the latest to create a holding company in  Singapore. "It is challenging to do business in India. Even opening a  bank account took time. We thought it would be easier to do an IPO if we  are in Singapore," he said.&lt;br /&gt; &lt;br /&gt; A senior industry analyst who did  not want to be named said that till last year, two out of four ventures  were moving out of India, but now that figure is three out of four. "I  would expect the government to do something about it. In fact, the  finance minister did say in June that the issues would be addressed  within 30 days. But nothing has happened."&lt;br /&gt; &lt;br /&gt; Also, it is expensive for angel investors overseas to invest in Indian startups.&lt;br /&gt; &lt;br /&gt; India disallows startups from offering stock options to foreign  nationals, which makes it difficult for them to access seasoned mentors.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-11T05:33:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/united-news-of-india-march-26-2018-modi-govt-compromising-privacy-of-individuals-congress">
    <title>Modi Govt compromising privacy of individuals: Cong</title>
    <link>https://cis-india.org/internet-governance/news/united-news-of-india-march-26-2018-modi-govt-compromising-privacy-of-individuals-congress</link>
    <description>
        &lt;b&gt;Charging the Narendra Modi Governemt with compromising the privacy of individuals by leaking user information on the Narendra Modi app, the Congress on Monday said the counter allegations by the BJP that the Opposition party was indulging in 'data theft' were an attempt to divert attention from the issue.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="http://www.uniindia.com/news/india/modi-govt-compromising-privacy-of-individuals-cong/1180219.html"&gt;United News of India&lt;/a&gt; on March 26, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Talking to reporters here, AICC spokesperson Abhishek Manu Singhvi said, 'we have said repeatedly that the biggest assault on individual privacy has occurred under the watch of the Narendra Modi Government. Not only people’s money, but people’s privacy is also in question.&lt;br /&gt;&lt;br /&gt;Even as startling revelations that the Narendra Modi app, run by the BJP is sharing data of millions of users with American companies emerge, the Modi Government mocks and flouts the ‘Right to Privacy’ with brazen impunity. While the Prime Minister’s Office, PMO India app, asks users to voluntarily part with their identity on 14 data points, the NaMo app asks for a sweeping access to 22 data points. The NaMo app records audio, video, contacts of your friends and family and even tracks your location via GPS. No wonder, Modi ji is like the ‘Bigg Boss’ who with brazenness likes to spy on Indians. The BJP whose IT (Identity Theft?) Minister does daily press conferences on the issue of data security and democracy, has much to answer to the people of India on the unscrupulous means by which Shri Narendra Modi’s personal app is accessing data and passing on data of more than 50 lakh Indians,' he alleged.&lt;br /&gt;&lt;br /&gt;Describing the BJP allegations that the Congress was indulging in 'data theft' through its mobile app, Mr Singhvi said. 'the Modi Government is resorting to deflectionary and diversionary tactics. The Congress application had just 15,000 downloads against the 50 lakh Indians who downloaded the NaMo app. Also, the Congress application was discontinued as most of the users wanted to register offline.'&lt;br /&gt;&lt;br /&gt;Accusing Mr Modi of misusing the Prime Minister’s position to build personal database with data on millions of Indians via the NaMo app promoted by the government, Mr Singhvi said, 'Why does Mr Modi, in his own book ‘Exam Warriors’ urge you to download the NaMo app. Is he now planning to snoop in on minors? Mr Modi is misusing the Prime Minister’s position to build personal database with data on millions of Indians via the NaMo app promoted by Government. If as PM he wants to use tech to communicate with India, there is no problem in that. But use the official PMO app for it, not the NaMo app. This data belongs to India, not to Mr Modi.&lt;br /&gt;&lt;br /&gt;Shockingly, data of atleast 13 lakh NCC cadets which include personal mobile phone numbers and email ID’s are being given to the Prime Minister’s Office for an interaction.'&lt;br /&gt;&lt;br /&gt;Citing in this regard the report of a committee of experts appointed by the government on the issue of data protection, Mr Singhvi said, 'importantly, a Government appointed Committee of Experts (CoE) to look into a framework for data protection, headed by Justice (retd) BN Srikrishna has made scathing observations in a paper released in November 2017, against the Government and has shockingly implied (according to the media reports) that the Modi Government is collecting personal data illegally. The committee, which is currently in the process of conducting consultations, has also considered the SC judgment on privacy, says in its paper “The public and private sector are collecting and using personal data on an unprecedented scale. While data can be put to beneficial use, unregulated and arbitrary use of data, especially personal data, raise concerns relating to centralisation of databases, profiling of individuals, increased surveillance and a consequent erosion of individual autonomy.” &lt;br /&gt;&lt;br /&gt;Alleging that under the Modi Government, not only the personal data of citizens was under serious threat, but there were multiple reports of data breaches in banks, Mr Singhvi said, 'astonishingly, under the Modi Government, not only the personal data of citizens is under serious threat, but multiple breaches in the banks. In an atmosphere where every single day there has been a bank fraud worth thousands of crores of rupees being reported, have resulted in one single question - how safe is our money in banks?&lt;br /&gt;&lt;br /&gt;Banks and PSU’s have reported multiple breaches in recent past. A newspaper report on Monday said two online security experts have claimed that the Aadhaar database of two public-sector enterprises leaked select data and the vulnerability was fixed only a month after attention was drawn to it. This exposes their names, the 12-digit Aadhaar number and information of the services they have linked their Aadhaar card to. These services include bank details, policy details and other private information. This was corroborated by the UIDAI statement released on Sunday. &lt;br /&gt;&lt;br /&gt;“It was left up there for more than a month — even though it had been reported to them directly,” claim the security experts. On February 23, 2018 a report had claimed that there was a data breach which had hit the the Punjab National Bank, whereby sensitive credit, debit card details of 10,000 customers were leaked. Quick Heal, a reputed software company in October 2017 had also claimed that there was a massive data breach in 6,000 government offices including banks. Earlier in 2016, as per media reports -- 32 lakh debit/credit cards of various Indian banks were compromised. The worst-hit was the State Bank of India along with certain private banks.' &lt;br /&gt;&lt;br /&gt;He also charged the present Government of breach of Aadhaar data of individuals.&lt;br /&gt;&lt;br /&gt;'In April 2014, the then Gujarat Chief Minister Narendra Modi had attacked Aadhaar and the UPA Government on its possible ‘security threat’. Life has now come full circle for the BJP. Just like numerous other issues, their blatant hypocrisy on Aadhaar is exposed. In January, this year, when a reputed newspaper in a sting exposed how 1 crore Aadhaar details can be accessed in just 10 minutes, by paying just Rs 500 in Chandigarh, the UIDAI had then filed an FIR against the reporter. Now the editor of the reputed media house has also been replaced. &lt;br /&gt;&lt;br /&gt;We have seen it in May 4, 2017, when the Modi Government is on record in Supreme Court, accepting data breach in the Aadhaar scheme. Now the Attorney General in Supreme Court, while arguing that Aadhaar data remains safe and secure, says that the Aadhaar data remains secure behind a complex that has 13-ft high and five-feet thick walls, which is laughable and ludicrous, to say the least. On November 20, 2017, the UIDAI had accepted on record that –“More than 210 central and state government websites publicly displayed details such as names and addresses of Aadhaar beneficiaries”. Earlier too, ‘Centre for Internet and Society’, a Bengaluru-based organisation (CIS) in a study published on May 1, 2017, had found that data of more than 130 million Aadhaar card holders has been leaked from just four government websites. Therefore this is a serious issue. Clearly, neither our money, nor our Aadhaar details or our personal details are secure under the Modi Government.'&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/united-news-of-india-march-26-2018-modi-govt-compromising-privacy-of-individuals-congress'&gt;https://cis-india.org/internet-governance/news/united-news-of-india-march-26-2018-modi-govt-compromising-privacy-of-individuals-congress&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-04-18T01:10:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide">
    <title>Models for Surveillance and Interception of Communications Worldwide</title>
    <link>https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide</link>
    <description>
        &lt;b&gt;This is an evaluation of laws and practices governing surveillance and interception of communications in 9 countries. The countries evaluated represent a diverse spectrum not only in terms of their global economic standing but also their intrusive surveillance capabilities. The analysis is limited to the procedural standards followed by these countries for authorising surveillance and provisions for resolving interception related disputes.&lt;/b&gt;
        &lt;table class="grid" style="text-align: justify; "&gt;
&lt;thead&gt;&lt;/thead&gt;
&lt;/table&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;th&gt;Sl. No.&lt;/th&gt; &lt;th&gt;Country&lt;/th&gt; &lt;th&gt;Legislation&lt;/th&gt; &lt;th&gt;Model&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;Australia&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Telecommunications (Interceptions and Access) Act, 1979&lt;/b&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Governs interception of communications&lt;/li&gt;
&lt;li&gt;Relevant provisions: S. 3, 7, 6A, 34, 46&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt; Surveillance Devices Act, 2004 &lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Establishes procedure for obtaining warrants and for use of surveillance devices&lt;/li&gt;
&lt;li&gt;Relevant Provisions: S.13, 14&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;span style="text-align: justify; "&gt;Authorisation for surveillance is granted in the form of a warrant from a &lt;b&gt;Judge or a nominated member of the Administrative Appeals Tribunal&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;The warrant issuing authority must be satisfied that information obtained through interception shall assist in the investigation of a serious crime&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;The Acts provide a list of prescribed offences for which interception of communication may be authorized&lt;/li&gt;
&lt;li&gt;T&lt;span style="text-align: justify; "&gt;he Acts also specify certain federal and state law enforcement agencies that may undertake surveillance&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;td&gt;Brazil&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;Federal Law No. 9,296, 1996&lt;/b&gt;&lt;span style="text-align: justify; "&gt;:&lt;/span&gt; 
&lt;ul&gt;
&lt;li&gt;Regulates wiretapping&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;span style="text-align: justify; "&gt;Authorisation for interception is granted on a &lt;b&gt;Judge’s order&lt;/b&gt; for a period of 15 days at a time&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Interception is only allowed for investigations into serious offences like drug smuggling, corruption murder and kidnapping&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;Canada&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Criminal Code, 1985&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Governs general rules of criminal procedure including search and seizure protocols&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Relevant Provision: §§ 184.2, 184.4&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Grants power to intercept communication by obtaining authorisation from a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;provincial court judge or a judge of the superior court&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Before granting his authorisation, the judge must be satisfied that either the originator of the communication or the recipient thereof  has given his/her consent to the interception&lt;/li&gt;
&lt;li&gt;Under exceptional circumstances, however, a police officer owing to the exigency of the situation may intercept communication without prior authorisation&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.&lt;/td&gt;
&lt;td&gt;France&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;&lt;i&gt;Loi d'orientation et de programmation pour la performance de la sécurité intérieure&lt;/i&gt;&lt;/b&gt;&lt;b style="text-align: justify; "&gt; (LOPPSI 2), 2011&lt;/b&gt;&lt;span style="text-align: justify; "&gt;:&lt;/span&gt; 
&lt;ul&gt;
&lt;li&gt;Authorises use of video surveillance and interception of communications&lt;/li&gt;
&lt;li&gt;Relevant Provisions: Article 36&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;i&gt;Loi de Programmation Militaire&lt;/i&gt;&lt;/b&gt;&lt;b&gt; (LPM), 2013&lt;/b&gt;: 
&lt;ul&gt;
&lt;li&gt;Authorises&lt;b&gt; &lt;/b&gt;surveillance for protection of national security and prevention of terrorism&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;span style="text-align: justify; "&gt;Interception of comm&lt;b&gt;unication under LOPPSI 2 requires previous authorization from an investigating Judge after consultation with the Public Prosecutor&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;
&lt;div style="text-align: left; "&gt;Such authorization is granted for a period of 4 months which is further extendable by another 4 months&lt;/div&gt;
&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;
&lt;div style="text-align: left; "&gt;&lt;span style="text-align: justify; "&gt;
&lt;div style="text-align: left; "&gt;&lt;span style="text-align: justify; "&gt;Interception of communication &lt;b&gt;under LPM does not require prior sanction from an investigating judge and is instead provided by the &lt;/b&gt;&lt;/span&gt;&lt;span style="text-align: justify; "&gt;&lt;b&gt;Prime Minister’s office&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Information that can be intercepted under LPM includes not only metadata but also content and geolocation services&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.&lt;/td&gt;
&lt;td&gt;Germany&lt;/td&gt;
&lt;td&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;&lt;b style="text-align: justify; "&gt;&lt;i&gt;Gesetz zur Beschränkung des Brief-, Post und Fernmeldegeheimnisses &lt;/i&gt;(G10 Act)&lt;i&gt;, &lt;/i&gt;2001&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Imposes restrictions on the right to privacy and authorizes surveillance for protecting freedom and democratic order, preventing terrorism and illegal drug trade&lt;/li&gt;
&lt;li&gt;Relevant Provisions: §3&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;The German Code of Criminal Procedure (StPO), 2002&lt;/b&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Lays down search and seizure protocol and authorizes interception of telecommunications for criminal prosecutions&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Relevant Provisions: §§ 97, 100a&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorises &lt;/span&gt;&lt;b style="text-align: justify; "&gt;warrantless&lt;/b&gt;&lt;span style="text-align: justify; "&gt; surveillance by specific German agencies like the &lt;/span&gt;&lt;i style="text-align: justify; "&gt;Bundesnachrichtendienst &lt;/i&gt;&lt;span style="text-align: justify; "&gt;(Federal Intelligence Service)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Lays down procedure that must be followed while undertaking surveillance and intercepting communications&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorises sharing of intercepted intelligence for criminal prosecutions&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Mandates &lt;/span&gt;&lt;i style="text-align: justify; "&gt;ex post&lt;/i&gt;&lt;span style="text-align: justify; "&gt; notification to persons whose privacy has been violated but no judicial remedies are available to such persons&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;The Code of Criminal Procedure authorises interception of communication of a person suspected of being involved in a serious offence only on the &lt;b&gt;order of a court&lt;/b&gt; upon &lt;b&gt;application by the public prosecution office&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.&lt;/td&gt;
&lt;td&gt;Pakistan&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Pakistan Telecommunications Reorganisation Act, 1996:&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Controls the flow of false and fabricated information and protects national security&lt;/li&gt;
&lt;li&gt;Relevant Provisions: § 54&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;Investigation for Fair Trial Act, 2013:&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Regulates the powers of law enforcement and intelligence agencies regarding covert surveillance and interception of communications&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions:  §§ 6,7, 8, 9&lt;/span&gt;&lt;span style="text-align: left; "&gt; &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorisation for interception is provided by the &lt;/span&gt;&lt;b style="text-align: justify; "&gt;federal government&lt;/b&gt;&lt;span style="text-align: justify; "&gt;. No formal legal structure to monitor surveillance exists&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Interception can be authorized in the interest of national security and on the apprehension of any offence&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Requests for filtering and blocking of content are routed through the Inter-Ministerial Committee for the Evaluation of Websites, a confidential regulatory body&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Under the Fair Trial Act, interception can only be authorised on application to the &lt;/span&gt;&lt;b style="text-align: justify; "&gt;Fedral Minister for Interior&lt;/b&gt;&lt;span style="text-align: justify; "&gt; who shall then permit the application to be placed before a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;High Court Judge&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The warrant shall be issued by a judge only on his satisfaction that interception will aid in the collection of evidence and that a reasonable threat of the commission of a scheduled offence exists&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7.&lt;/td&gt;
&lt;td&gt;South Africa&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;The Regulation of Interception of Communications and Provision of Communication-related Information Act, 2002&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Regulates and authorizes monitoring and interception of telecommunications services&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions: §§ 16, 22&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Warrant for intercepting communications and installing surveillance devices is granted by a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;designated judge&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The warrant is issued on satisfaction of the judge that the investigation relates to a serious offence or that the information gathering is vital to public health or safety, national security or compelling national economic interests&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8.&lt;/td&gt;
&lt;td&gt;United Kingdom&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;Regulation of Investigatory Powers Act, 2000&lt;/b&gt;&lt;span style="text-align: justify; "&gt;:&lt;/span&gt; 
&lt;ul&gt;
&lt;li&gt;Authorises interception of communications and surveillance&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions: §§ 5, 6, 65&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorisation for interception is granted in the form of a warrant by the &lt;/span&gt;&lt;b style="text-align: justify; "&gt;Secretary of State &lt;/b&gt;&lt;span style="text-align: justify; "&gt;or in certain special cases by a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;‘senior officer’&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Communications can be intercepted only it is necessary to do so in the interest of national security or for the purpose of preventing and detecting serious crimes&lt;/li&gt;
&lt;li&gt;Complaints of alleged illegal surveillance are heard by the Investigatory Powers Tribunal&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9.&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;Electronic Communications Privacy Act, 1986 (Title III, Omnibus Crime Control and Safe Streets Act)&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Governs authorisation for wiretapping and interception&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions: §18&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorisation for interception can be granted by &lt;/span&gt;&lt;b style="text-align: justify; "&gt;a  district court or federal appeals court&lt;/b&gt;&lt;span style="text-align: justify; "&gt; on application by a law enforcement officer duly signed by the attorney general&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Application mandates obtaining the information through a service provider before invading upon individual’s privacy&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide'&gt;https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bedaavyasa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>surveillance technologies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2014-07-10T07:50:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/mobilising-support-for-freedom-on-web">
    <title>Mobilising support for freedom on the Web</title>
    <link>https://cis-india.org/news/mobilising-support-for-freedom-on-web</link>
    <description>
        &lt;b&gt;A motion in the Rajya Sabha has sought annulment of the IT intermediary guidelines, writes Deepa Kurup in this article published in the Hindu on April 22, 2012.&lt;/b&gt;
        
&lt;p&gt;A research, or a sting operation, conducted by researchers at the Centre for Internet and Society in October 2011 — a few months after the Information Technology (Intermediary Guidelines) Rules were notified — revealed some inherent flaws in the guidelines laid down by the Indian government. The results of the study made news, particularly after Union Minister for IT, Kapil Sibal, asked Internet companies and Web service providers to screen content.&lt;br /&gt;&lt;br /&gt;The study revealed that companies were only too eager to comply with take-down notices or requests, in order to avoid further hassles, particularly legal ones.&lt;br /&gt;&lt;br /&gt;Rishab Dara, a researcher who was part of this ‘sting', pointed out that unless the content was commercial, or had potential commercial interest, companies preferred to err on the side of caution.&lt;br /&gt;&lt;br /&gt;Addressing an audience at a panel discussion, titled ‘Resisting Internet censorship: strategies for furthering freedom of expression in India', held at the Bangalore International Centre, Mr. Dara pointed out that search engines did not invest enough resources to check how valid the claims were, before taking down over 2,000 URLs related to a random complaint or take-down notice sent by them. His study underlined the need for debate and discussion on the intermediary guidelines, locating this in the larger context of freedom on the Web.&lt;br /&gt;&lt;br /&gt;The discussion, organised by the Centre for Internet and Society, was moderated by the former journalist and academic, Paranjoy Guha Thakurta. The audience and the panel comprised a diverse lot: from students, netizens and academics to those who were directly involved in the business of publishing content or hosting Web content. While a substantial part of the discussion dealt with the legal aspects of the notified rules, and how it may contradict the constitutional rights of citizens, a section of the debate also delved into whether the Web as a medium needed to be policed at all.&lt;br /&gt;&lt;br /&gt;If panellist Mahesh Murthy, Chief Executive Officer of Pinstorm, argued vociferously for unfettered freedom on the Web and accused the government of being threatened by movements such as the anti-corruption campaign led by Anna Hazare (which he said was largely mobilised on the Web), another panellist Na. Vijayshankar, Cyber Law College, who claimed he was among those instrumental in bringing down the pornographic cartoon portal Savitabhabhi.com, argued that though these rules need to be withdrawn, there are “boundaries” to what can be posted and said on the Web.&lt;br /&gt;&lt;br /&gt;Another section of the audience brought up the issues of hate speech on the Web, and pointed out that in some cases there was a need to pin liability on those who generate content that incites hatred.&lt;br /&gt;&lt;br /&gt;Sudhir Krishnaswamy, Centre for Law and Policy Research, pointed out that currently the way the issue was being played out in court, the discourse was more about companies.&lt;br /&gt;&lt;br /&gt;“The debate is not about users today. Companies are trying to duck liabilities, rather than deal with substantive issues of free speech,” he said, pointing to the complexities in locating liability for content.&lt;br /&gt;&lt;br /&gt;Speaking from the publisher's perspective, B.G. Mahesh, OneIndia.in, an online news and entertainment portal, spoke of specific cases where his portal had been targeted by the Chennai Cybercrime cell for hosting a news story (syndicated from a news agency) that was declared defamatory. “We took it down, but there was no answer from them when we asked for an explanation,” he said, adding that in such cases there is tremendous pressure and harassment from authorities, leaving publishers with no choice but to comply.&lt;br /&gt;&lt;br /&gt;Though the IT intermediary rules were notified in April 2011, the issue made headlines when Union Minister for Information and Communication Technology Kapil Sibal asked private companies or Web service providers to pre-screen content, a statement which he later withdrew.&lt;br /&gt;&lt;br /&gt;Also discussed in detail were the complexities posed by a medium like the World Wide Web, and what were the reasonable restrictions to free speech on the Web. Does one need a separate legal dispensation to deal with this medium, Mr. Thakurta asked. While emphasising that the solution does not lie in “knee-jerk reactions”, such as the rules that have been proposed, he pointed out that the bid to control flow of information was a simple manifestation of the utter helplessness and inability of the government — and governments worldwide — to control the Web. Be it in West Bengal, where a professor is held for sharing a cartoon, or with the Union government that beckons corporates to pre-screen the Web, these acts are a manifestation of a “combination of arrogance and stupidity”, he said.&lt;br /&gt;&lt;br /&gt;Subsequently, in February, Rajya Sabha member from Kerala, P. Rajeeve, moved a statutory motion in the Rajya Sabha seeking that these guidelines be annulled on the grounds that it allowed intermediaries protection from legal liability in return for trading away freedom of expression of users.&lt;br /&gt;&lt;br /&gt;In the Parliamentary session that will start next week, this is likely to come up for discussion, and across the country, rights activists are mobilising support and lobbying with legislators to garner support for this annulment.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.thehindu.com/news/states/karnataka/article3340032.ece"&gt;Read the original here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/mobilising-support-for-freedom-on-web'&gt;https://cis-india.org/news/mobilising-support-for-freedom-on-web&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-04-25T11:02:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/mobile-trust-and-privacy">
    <title>Mobile, Trust and Privacy</title>
    <link>https://cis-india.org/internet-governance/news/mobile-trust-and-privacy</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker at the event organized by GSM Association on September 4, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;More consumers now use their mobiles to go online to access information  and services. Mobile plays a central role in driving economic growth and  social opportunities. However, it is important that people can interact  and access services in a trusted and secure environment that protects  their online privacy.&lt;br /&gt; Increasingly, mobile ecosystems acquire  consumers’ data by default, while smartphones broadcast data by default.  These ‘default’ positions challenge current data protection and privacy  legal frameworks, and consumers’ ability to manage their privacy and  online identities.&lt;br /&gt; A key ingredient for strengthening trust in a  mobile connected world is a user-centred privacy framework that applies  to all digital and identity services whether in retail, healthcare,  government, banking or any other sector.&lt;br /&gt; The GSMA recently published  global research showing trust matters and that mobile users want better  transparency and choice over how their personal data are used. They  also expect all companies accessing their data to treat their privacy  consistently.&lt;br /&gt; This workshop aims to bring together leading  representatives from a broad spectrum of stakeholder groups to discuss  privacy-related issues and ways to enhance mobile users’ trust. &lt;br /&gt; Questions to address include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; How can citizens – in both developed and developing countries – benefit from the responsible use of mobile-derived data?&lt;/li&gt;
&lt;li&gt;What are the key emerging issues and challenges of a mobile hyper-connected world?&lt;/li&gt;
&lt;li&gt;How can we ensure secure and trusted identities online?&lt;/li&gt;
&lt;li&gt;eds to be done to ensure consumers are able to access services in private, trusted and secure ways?&lt;/li&gt;
&lt;li&gt;What are the respective roles of law and industry self-regulation in enhancing trust?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;For full details &lt;a class="external-link" href="http://igf2014.sched.org/event/170880f1a2eb995fd2f61f7d9e37d28d#.VDERIVdIOo8"&gt;see the IGF website&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/mobile-trust-and-privacy'&gt;https://cis-india.org/internet-governance/news/mobile-trust-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-10-05T09:21:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/mobile-tech-4-social-change">
    <title>Mobile Tech 4 Social Change</title>
    <link>https://cis-india.org/events/mobile-tech-4-social-change</link>
    <description>
        &lt;b&gt;Mobile Tech 4 Social Change, Bangalore camp is a one-day event and is an exploration of mobile technology to advance social development and social change goals.&lt;/b&gt;
        
&lt;p&gt;Mobile Tech 4 Social Change Camps are local events for people passionate about using mobile technology for social impact and to make the world a better place.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mobile Tech 4 Social Change Camp in Bangalore includes: &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;interactive discussions about mobile tech for social good,&lt;br /&gt;&lt;/li&gt;&lt;li&gt;hands-on-demos of mobile apps and tools,&lt;br /&gt;&lt;/li&gt;&lt;li&gt;collaborations about ways to use, deploy, develop and promote mobile technology in health, advocacy, economic development, environment, human rights, and citizen media&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Participants for Mobile Tech 4 Social Change barcamps include nonprofits, mobile application developers, researchers, donors, intermediary organizations, and mobile operators.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;In short, Mobile Tech 4 Social Change Bangalore Camp is: &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;A one-day event in Bangalore on September 4, 2009&lt;/li&gt;&lt;li&gt;An exploration of mobile technology to advance social development and social change goals&lt;/li&gt;&lt;li&gt;Participatory and interactive&lt;/li&gt;&lt;li&gt;Open to anyone with passion and interest in the topic&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Participants&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;YOU - register today! &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Cost&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Mobile Tech 4 Social Change camps are grassroots events. We are charging a small fee for this event that is used to offset costs for breakfast and lunch as well as supplies for the camp. If this cost constitutes a huge barrier for you attending, please be in touch so that we can work something out! &lt;/li&gt;&lt;/ul&gt;
&lt;h1&gt;&lt;strong&gt;Planners and Sponsors&lt;/strong&gt;&lt;/h1&gt;
&lt;p&gt;Mobile Tech 4 Social Change Bangalore is organized by the following organizations.&amp;nbsp; We are very grateful for this collaboration and support. &lt;/p&gt;
&lt;p&gt;&lt;img src="http://www.cis-india.org/logo.png" alt="" height="130" width="295" /&gt;&lt;img src="http://mobileactive.org/files/images/wlpfulllogo.jpg" alt="" height="123" width="251" /&gt;&lt;img src="http://momoamsterdam.files.wordpress.com/2007/04/logo_mobilemonday_hi_res_color.jpg" alt="" height="51" width="130" /&gt; India&lt;img src="http://mobileactive.org/files/images/mobileactivefile73.jpg" alt="" height="168" width="357" /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;If you want to be an angel and sponsor this community-supported event, we would love to hear from you!&lt;/p&gt;
videos



&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbCAGQA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbCAXgA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbCERgA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbDHZQA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbGZZAA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbGaIgA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbGbcQA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbG%2BfwA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbG_XQA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbHAHQA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbHAYwA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbHAeQA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbHBLQA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbHCegA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgbHDYgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" src="http://blip.tv/play/g_dIgbHETgA" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/mobile-tech-4-social-change'&gt;https://cis-india.org/events/mobile-tech-4-social-change&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>radha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-05T04:32:26Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/mobile-net-ban-during-peaceful-protest-leaves-farmers-confused">
    <title>Mobile net ban during peaceful protest leaves farmers confused</title>
    <link>https://cis-india.org/internet-governance/blog/mobile-net-ban-during-peaceful-protest-leaves-farmers-confused</link>
    <description>
        &lt;b&gt;Strap: Administration says it was done to prevent rumours from spreading, protesters insist they needed internet to fight it.&lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;In Sikar district, about 15,000 farmers had staged a protest at Krishi Upaj Mandi on 1 September 2017 under the banner of All India Kisan Sabha. Their major demands were farm loan waiver, pension for farmers and implementation of the recommendations of the Swaminathan Commission. The protest had the support of students, traders' associations, anganwadi workers, transport unions and a few other organisations. About 100,000 people joined farmers in a solidarity march during the next 13 days.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;The demonstrations continued and when talks with the government failed, thousands of farmers set out to lay siege to the district collector's office and block highways on September 11. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;Accordingly, the district administration clamped prohibitory orders under Section 144 of Criminal Procedure Code, restricting assembly of five or more people, and blocked mobile internet in the district.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/RajasthanFarmerProtest2.JPG/@@images/a9e6d382-e304-4f4c-a983-47b064e621eb.jpeg" alt="Rajasthan Farmers Protest " class="image-inline" title="Rajasthan Farmers Protest " /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/RajasthanFarmerProtest1.JPG/@@images/a7bca141-ad0d-452a-a64d-4ac73fd20801.jpeg" alt="Rajasthan Farmers Protest " class="image-inline" title="Rajasthan Farmers Protest " /&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Kishan Pareek, district secretary of Communist Party of India (Marxist) which took part in the protest, contended that though the government says the ban was enforced to check the spread of violence, the actual motive was something else. He says the administration was vying to stifle their movement but couldn’t use force as the protesters were peaceful.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;"So, they resorted to spreading rumours to provoke us to commit any violent activity. If internet was working that time, we could have easily denied those [rumours],” he says.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;According to Pareek, the rumours that circulated that day included: the protest has turned violent at some location, police have fired bullets/charged baton at the protesters, additional force has been called in from Jaipur etc. As broadband was operational, the organisers managed to counter falsehood with facts and the misinformation didn't spread outside Sikar. Pareek says whichever protest-spot the rumours portrayed as violence-ridden, their social media team shared videos from there on Facebook to counter them.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt;Pictures above: &lt;/i&gt;&lt;span&gt;&lt;i&gt;Thousands of farmers held a protest at Krishi Upaj Mandi, Sikar in September 2017&lt;/i&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;span&gt;Nevertheless, in the absence of mobile internet, farmers’ teams that had gathered at various highways to block roads had difficulty processing the false information that was trickling in. Though it created much confusion among them, it failed to instigate them.&lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Rajpal Singh, a Sikar-based member of CPI(M)'s social media wing, informed that the mainstream media didn't give much attention to the protest. He says it were local websites and newspapers that covered the event, which is why the administration banned internet, hoping restriction on the flow of information would throw a spanner in the works. Apart from local news websites, local Facebook pages -- Sikar Aapno, Sikar Sandesh, We love CPIM- Dhod and CPIM Sikar, etc. -- were giving minute-by-minute updates of the farmers' protest.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The internet services were resumed in Sikar a day later as the protest did not get violent and the protesters were not found circulating any provocative content.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;A former CPI(M) MLA, president of All India Kisan Sabha and leader of the farmers' agitation, Amara Ram, told 101Reporters that one of the very reasons their movement enjoyed humongous public support was its peaceful nature. He says as their movement unfolded, people from Sikar and outside realised this protest would not turn violent and it’s a cause that needed support.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;As cautious as the government might have been about the September 11 protest, police presence indicated that the law-enforcement agency did not perceive it as a threat. One of the protesters, Nemichand, says only 50-odd policemen had been deputed for the protest march of 15,000+ farmers to the district collectorate. He claimed that the number of men in khaki dwindled to 20 by the afternoon.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;He alleged that the real reason for internet shutdown was stopping the dissemination of news about their protest as it exposes the Modi government's inconsiderate approach towards farmers.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;“Everybody in Sikar was talking about the internet ban. Since there was no legitimate reason for the ban, the government couldn’t continue with it, fearing how they will justify,” he says.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/RajasthanFarmerProtest3.png/@@images/3258a626-8fce-4784-9977-098c720496af.png" style="text-align: justify; " title="Rajasthan Farmers Protest " class="image-inline" alt="Rajasthan Farmers Protest " /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;td&gt;
&lt;div id="_mcePaste"&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The administration confirmed that the ban was imposed fearing threat to law and order in the district due to the gathering of thousands. “Though they were protesting peacefully the initial ten days at the &lt;i&gt;mahapadav,&lt;/i&gt; they had planned to block the district collectorate on September 11 in thousands. To restrict their movement, internet was suspended in Sikar. During such situations, no one writes positive about the administration. We didn’t want to provide them a platform for spreading rumours that could have made the protestors violent. If there had been no internet ban that day, something big would have happened,” Jai Prakash Narayan, additional district collector and additional district magistrate, told 101reporters.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;“Broadband was made working during the internet ban so that the private and government offices were not affected. While giving order for internet ban, it is made sure that normal call and broadband facilities are not debarred. General masses are affected but internet shutdown is the only option we have,” he added. “While their blockade continued for three days, we restricted internet services only for first 24 hours as the protest had gained stability till then.”&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Even three months after the high-powered ministerial committee was formed to look into the farmers’ demand, nothing has been done. Now, they plan to stage a protest in February 2018 when the state assembly will be in function.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Former CPI(M) MLA Pema Ram says, “Preparation for February protest has already begun. Kisan Sansads are being organised in Sikar, where active farmers from each village participate to raise demands regarding implementation of the recommendations of the Swaminathan Commission report, a solution to the menace of stray cattle, complete farm loan waiver and pension for farmers. They then discuss it with other farmers in their villages.”&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt;Pictures above:  Apart from local news websites, local Facebook pages - Sikar Aapno, Sikar Sandesh, We love CPIM- Dhod and CPIM Sikar, etc. - were giving minute-by-minute updates of the farmers' protest. &lt;/i&gt;Pictures courtesy: Shruti Jain&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;strong&gt;&lt;i&gt;(Shruti Jain is a Jaipur-based journalist and a member of &lt;/i&gt;&lt;/strong&gt;&lt;a href="https://101reporters.com/"&gt;&lt;strong&gt;&lt;i&gt;101Reporters.com&lt;/i&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;&lt;i&gt;, a pan-India network of grassroots reporters.)&lt;/i&gt;&lt;/strong&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/mobile-net-ban-during-peaceful-protest-leaves-farmers-confused'&gt;https://cis-india.org/internet-governance/blog/mobile-net-ban-during-peaceful-protest-leaves-farmers-confused&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Jain</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Shutdown</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-01-19T15:20:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/mobile-india-2016">
    <title>Mobile India 2016</title>
    <link>https://cis-india.org/internet-governance/news/mobile-india-2016</link>
    <description>
        &lt;b&gt;COMSNETS in association with Department of Electronics and Information Technology, Digital India, et.al. organized the event in Bangalore from January 5 to 9, 2016. Sunil Abraham participated as a speaker in Session 4: Law, regulation and policy of App Economy. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Mobile India 2016 is one of the first premier events and will be the curtain raiser for the App Economy revolution in the country. It is associated with The Eighth International Conference on COMmunication Systems NETworkS (COMSNETS), the world's premier international conference on networking and communications technology innovation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Theme: App Economy: Interplay between Telcos and OTTs&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The&lt;b&gt; App Economy&lt;/b&gt; in India has been jumpstarted by the new age start-ups, commonly referred to as “&lt;b&gt;Over The Top (OTT)&lt;/b&gt;”  players. Compass (2015) upgraded Bengaluru from #19 to #15 in its  Global Start-up Ecosystem Ranking, much to the delight of all of us. The  app economy and the traditional economy are overlapping to a greater  extent. Apps are being integrated into many traditional activities  ranging from grocery shopping to calling a cab, a trend that is rapidly  spilling revenue from almost every industry in the higher revenue  traditional economy into the app economy. It is expected that the  spill-overs are greater in emerging countries such as India where there  are substantial inefficiencies in the traditional industries. This has  also caught the attention of funding agencies. While more than $4  billion was invested in start-ups in India in 2014, the meter is up to  $1.5 billion in Q1 of 2015, indicative of the promise of this sector of  the economy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Simultaneously, the telecom, mobile and Internet infrastructure  backbone that is required for the app economy is also gearing up.  Nationwide 3G mobile service is available and year 2016 is expected to  be the “&lt;b&gt;Year of 4G mobile&lt;/b&gt;”. Mobile broadband subscriber base is touching 100 Million and continues to grow at a quarterly growth rate of more than 15%.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence the interplay between telcos and OTTs are very important to bolster the app economy. Meanwhile, the “&lt;b&gt;Net Neutrality&lt;/b&gt;” debate is also peaking with the world watching our policy steps on this issue closely.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mobile India 2016&lt;/b&gt; will explore opportunities and  challenges of the App Economy and the interplay between Telcos and OTTs  in four sessions with all stakeholders in the ecosystem. For more info, &lt;a class="external-link" href="http://www.comsnets.org/mobile_india.html"&gt;click here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/mobile-india-2016'&gt;https://cis-india.org/internet-governance/news/mobile-india-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-13T14:26:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/mobile-education-villages">
    <title>Mobile education comes to villages</title>
    <link>https://cis-india.org/news/mobile-education-villages</link>
    <description>
        &lt;b&gt;PEOPLE living in remote villages, trekking many miles to schools and colleges before dropping out, can now look forward to a tech option — mobile education. Education over mobile phones is vital in India, where the literacy rate according to 2011 census is 74.04 per cent, observers note. This article by Shayan Ghosh was published in Mail Today on May 27, 2011.&lt;/b&gt;
        
&lt;p&gt;India has 791 million mobile subscribers according to regulatory body TRAI with a significant share in villages. That is the target group several start- ups and educational institutions are looking at.&lt;/p&gt;
&lt;p&gt;Indira Gandhi National Open University ( IGNOU) based in New Delhi, is taking a lead in the matter. “ The technology is pretty new in India and we are planning to implement things like SMS alerts to students and coursespecific databases,” K. R. Srivathsan, pro vice- chancellor, IGNOU, said.&lt;/p&gt;
&lt;p&gt;"It will definitely change the scenario of education in rural India," noted Srivathsan.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"All possible components required in a learning cycle including auditory, visual, reading, writing, collaboration, interaction, recording and computing," Amit Zaveri, CEO, EnableM, a company that delivers education through mobile devices, said.&lt;/p&gt;
&lt;p&gt;"In rural areas the challenges for delivery of learning content &amp;amp; services are many including physical distances ( to institutes etc.), lack of teachers, no or limited access to standardised &amp;amp; branded content, time &amp;amp; cost constraints, limited capability for peer assessments, lack of skills development facilities for employability," Zaveri added.&lt;/p&gt;
&lt;p&gt;Mig33, a Singapore- based mobile social network is hopeful that the mobile revolution could actually mean impart education to all.&lt;/p&gt;
&lt;p&gt;"Mobile phones have moved from being phone devices to communication devices. With the advent of 3G, this is going to become bigger and better.&lt;/p&gt;
&lt;p&gt;Also tablets are expected to play very effective role in this," Mohit Gundecha, India operations head, Mig33, said.&lt;/p&gt;
&lt;p&gt;"With 3G the video clips can help educate, smart apps can help people learn, good sms apps can engage audiences about education concepts. We already see a host of companies coming in to take care of the hardware aspects and digital content to match the need," Gundecha explained.&lt;/p&gt;
&lt;p&gt;According to Vikram Nagaich, director and founder, InnovateEdu, on one side, with mobile phones the content the reach of the content could be very wide. However, the efficacy would have to be delivered through extremely innovative and sophisticated content.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"Mobiles can penetrate better as they have things in favour like better battery life and people do not need any training to operate it. This gives it an upper hand over computers," Sunil Abraham, ED, Center for Internet and Society, said.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;The Tech Option&lt;/h3&gt;
&lt;p&gt;Education over mobile phones is vital in India, where the literacy rate according to the 2011 census is 74.04 per cent, observers note.&lt;/p&gt;
&lt;p&gt;With a significant share in villages, this is the target group several start- ups and educational institutions are looking at&amp;nbsp;Indira Gandhi National Open University ( IGNOU) based in New Delhi, is taking a lead in the matter.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In rural areas, challenges regarding delivery of learning content &amp;amp; services are many and include physical distances, lack of teachers, limited access to standardised content.&lt;/p&gt;
&lt;p&gt;Mobile phones have moved from being phone devices to communication devices. With 3G, this is going to become better.&lt;/p&gt;
&lt;p&gt;Read the original story &lt;a class="external-link" href="http://epaper.mailtoday.in/showstory.aspx?queryed=16&amp;amp;querypage=2&amp;amp;boxid=2747500&amp;amp;parentid=53892&amp;amp;eddate=May%2027%202011%2012:00AM&amp;amp;issuedate=NaNundefinedundefined"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/mobile-education-villages'&gt;https://cis-india.org/news/mobile-education-villages&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-05-30T05:49:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/mobile-india-2013">
    <title>Mobile Broadband: Leveraging for Business Transformation </title>
    <link>https://cis-india.org/news/mobile-india-2013</link>
    <description>
        &lt;b&gt; Mobile India 2013 is being held at the Chancery Pavillion, Bangalore on 9 January 2013. Sunil Abraham is speaking at this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Mobile India 2013  is the one of the first premier conferences and will be the curtain raiser for Mobile Broadband revolution in the country. It is associated with The Fifth International Conference on COMmunication Systems NETworkS (COMSNETS), the world’s premier international conference on networking and communications technology innovation.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Keynote Speeches&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Keynote - 1: Prof. Bhaskar Ramamurthi &lt;/b&gt;, Director, IIT     Madras will deliver the joint keynote speech for COMSNETS 2013 and     Mobile India 2013.     &lt;br /&gt; &lt;b&gt; Keynote - 2 : &lt;a href="http://comsnets.org/mobile_session1.html#1"&gt;Sanjay Nayak &lt;/a&gt; &lt;/b&gt;, Chief Executive Officer &amp;amp; Managing Director, Tejas     Networks.&lt;a href="http://www.tejasnetworks.com/"&gt; Tejas Networks&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile India 2013 will try to unravel the mysteries in the       following sessions.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Session 1: Enterprises on the move&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;"For a preview, read &lt;a href="http://yourstory.in/2012/12/enterprises-on-the-move/"&gt; http://yourstory.in/2012/12/enterprises-on-the-move/ &lt;/a&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Enterprises are exploring ways to leverage the power of smart       devices, the cloud, and broadband to be agile, flexible, and       productive. The IT managers in organizations are challenged to       support variety of devices (viz. BYOD) within the organization, at       the same time providing the required organizational security and       performance support to the employees. This session will deliberate       on the challenges and opportunities of today's networked world for       enterprises on the move.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Panelists: &lt;a href="http://comsnets.org/mobile_session1_2.html#1"&gt; Ashvin           Vellody &lt;/a&gt;, Director - Management Consulting, KPMG India; &lt;a href="http://comsnets.org/mobile_session1_2.html#2"&gt; Dr. K.K.           Ramakrishnan &lt;/a&gt;, Distinguished Member of the Technical         Staff, AT&amp;amp;T Labs Research, USA; &lt;a href="http://comsnets.org/mobile_session1.html#5"&gt; Puneet           Gupta &lt;/a&gt;, AVP and Head of Mobility Research, Infosys SET         Labs; Sai Pratyush, Head-Enterprise Products, Tata Teleservices;         &lt;a href="http://comsnets.org/mobile_session1.html#4"&gt; E.           Manikandan &lt;/a&gt;, Head-Channels and Alliances, Ramco Systems;         &lt;a href="http://comsnets.org/mobile_session1.html#3"&gt; Umesh           Sachdev &lt;/a&gt;, Co-founder and CEO, Uniphore ; &lt;a href="http://comsnets.org/mobile_session1_3.html#4"&gt; Yathish,           L, N. &lt;/a&gt;, CTO, Huawei Technologies &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Moderator: &lt;a href="http://comsnets.org/mobile_session1.html#2"&gt; Swami           Krishnan &lt;/a&gt;, VP and Head-Marketing, Sasken Communication         Technologies &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Session 2: Massively Open Online Education&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;"For a preview, read &lt;a href="http://yourstory.in/2012/12/massively-open-online-education/"&gt; http://yourstory.in/2012/12/massively-open-online-education/ &lt;/a&gt;".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Online and Internet based education has permeated in to schools       and colleges today. Massively Open On-line Course (MOOC)       initiatives such as National Programme on Technology Enhanced       Learning (NPTEL) in India and those by leading institutions such       as MIT and Stanford in the US are democratizing education and       making it available globally over the Internet. In India, the       Government has been an early adopter and both academia and       industry have begun taking this initiative further. However,       limited access to wired broadband and computers have restricted       reach for providing online education. Can the ubiquitous mobile       solve this problem? &lt;br /&gt; In this session, experts will deliberate in detail on the       opportunities and challenges in providing education through mobile       networks and wireless devices. Are these scalable and monetizable?       What are the implications for traditional educational       methodologies? What are the transformations this will bring to the       publishing industry?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Panelists: &lt;a href="http://comsnets.org/mobile_session2.html#3"&gt; Dr. Gautam           Shroff &lt;/a&gt;, VP and Chief Scientist, TCS; &lt;a href="http://comsnets.org/mobile_session2.html#2"&gt;Srikanth B.           Iyer &lt;/a&gt;, COO, Pearson Education Services; &lt;a href="http://comsnets.org/mobile_session2.html#4"&gt; Rohit Kumar &lt;/a&gt;, MD, Elsevier India; Sunil Abraham, Executive Director,         Centre for Internet and Civil Society; &lt;a href="http://comsnets.org/mobile_session1_2.html#3"&gt; Arun           Prabhudesai &lt;/a&gt;, CTO, myopencourses.com &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Moderator: &lt;a href="http://comsnets.org/mobile_session2.html#1"&gt; Prof. D.           Manjunath &lt;/a&gt;, Professor, IIT Bombay &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Session 3: Innovation Workshop&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In the concluding session of the day, a workshop on mobile       innovations will be conducted wherein several start-up firms will       show case their unique innovations in the mobile space and share       their experiences on ideation, fund mobilization, monetization       models, and scale-up for sustainability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Panelists: &lt;a href="http://www.mintm.com/"&gt; MintM &lt;/a&gt; (&lt;a href="http://comsnets.org/mobile_session3.html#2"&gt; Sachin Garg &lt;/a&gt;, Founder); &lt;a href="http://www.robots-alive.com/"&gt; Robots           Alive &lt;/a&gt;(&lt;a href="http://comsnets.org/mobile_session3.html#3"&gt; Abheek Bose &lt;/a&gt;, Founder); &lt;a href="http://www.twaang.com/"&gt;Twaang &lt;/a&gt; &lt;br /&gt;(&lt;a href="http://comsnets.org/mobile_session3.html#4"&gt; Vishnu           Raned &lt;/a&gt;, Founder);&lt;a href="http://www.janacare.com/"&gt; JanaCare &lt;/a&gt;, (&lt;a href="http://comsnets.org/mobile_session3.html#5"&gt; Sidhant           Jena &lt;/a&gt;, Co-founder), &lt;a href="http://www.astralpad.com/"&gt;AstralPad &lt;/a&gt;(Rahul Singh) &lt;br /&gt; Moderator: &lt;a href="http://comsnets.org/mobile_session3.html#1"&gt; Madanmohan Rao &lt;/a&gt;, Director-Research, &lt;a href="http://comsnets.org/Yourstory.in"&gt; Yourstory.in &lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Event Chairs&lt;/h2&gt;
&lt;p&gt;Dr. V. Sridhar (&lt;a class="mail-link" href="mailto:sridhar.varadharajan@sasken.com"&gt;sridhar.varadharajan@sasken.com&lt;/a&gt;), Sasken Communication Technologies, India &lt;br /&gt;S.R. Raja (&lt;a class="mail-link" href="mailto:rajaraghavan.setlur@sasken.com"&gt;rajaraghavan.setlur@sasken.com&lt;/a&gt;)&lt;/p&gt;
&lt;h3&gt;&lt;a href="http://in.eregnow.com/ticketing/register/mobileindia2013"&gt;Register here for Mobile India 2013 &lt;/a&gt;&lt;/h3&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/mobile-india-2013'&gt;https://cis-india.org/news/mobile-india-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-15T08:40:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act">
    <title>MLATs and the proposed Amendments to the US Electronic Communications Privacy Act</title>
    <link>https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act</link>
    <description>
        &lt;b&gt;In continuance of our blog post on mutual legal assistance treaties (MLATs), we examine a new approach to international bilateral cooperation being suggested in the United States, by creating a mechanism for certain foreign governments to directly approach the data controllers.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Published under Creative Commons License CC BY-SA. Anyone can distribute, remix, tweak, and build upon this document, even for commercial purposes, as long as they credit the creator of this document and license their new creations under the terms identical to the license governing this document&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the &lt;a href="http://cis-india.org/internet-governance/blog/cross-border-cooperation-on-criminal-matters"&gt;previous article&lt;/a&gt; on MLATs we discussed, in some detail, what MLATs are and why they are needed.  One area which was briefly focused upon in that article was the limitations and criticisms of the MLAT mechanism, of which one of the main criticisms being the problems caused due to different legal standards in various jurisdictions as well as the time taken to process a request for information sent from one country to another. Talking specifically about the United States, where most internet companies are headquartered and hold large amounts of data, it typically takes months to process requests under MLATs and foreign governments often struggle to comprehend and comply with the legal standards in the United States for obtaining data for use in their investigations.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; The requirement that a foreign government should take permission from, and comply with the requirements of a foreign government simply because the data needed happens to be controlled by a service provider based in a foreign country strikes many foreign law enforcement officials as damaging to security and law enforcement efforts, especially when they are requesting data pertaining to a crime between two of their own citizens that primarily took place on their soil.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These inefficiencies of the MLAT process lead to further problems of foreign governments attempting to apply their search and surveillance laws in an extraterritorial manner for example in 2014 the UK passed the Data Retention and Investigatory Powers Act, 2014 with gives the government the power to directly access data from foreign service providers if sought for specific purposes and the request is approved by the Secretary of State or other specified executive branch official.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; Another response that may occur is if, frustrated by such inefficiencies of the existing systems, courts in foreign states start assuming extra territorial jurisdiction, as happened when a District Court in Vishakhapatnam restrained Google from complying with a subpoena issued by the Superior Court of California, ordering Google to share the password of the Gmail account belonging to an Indian citizen residing in Vishakhapatnam.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Solution proposed in the United States &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to overcome these inefficiencies, at least in the American context, the Department of Justice has proposed a legislation which seeks to make the process of foreign governments getting information from US based entities more streamlined by amending the provisions of the Electronic Communications Privacy Act (ECPA) of the United States (the “&lt;b&gt;Amendment&lt;/b&gt;”). These amendments have been proposed primarily for the US and UK to effectuate a proposed bilateral agreement whereby the UK government will be able to approach US companies directly with requests for information without going through the MLAT process or getting an order from a US court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Amendment seeks to ensure that requests from foreign governments for information from US entities get answered in a smooth manner by including those requests in the process for seeking information under the ECPA itself. This move would no doubt, make it easier for foreign governments to access data in the US, but such a move can be criticized on the ground that it would then allow all states, irrespective of their legal standards of privacy, etc. to get access to such information. This problem has been overcome in the amendment by adding a new section to Title 18 which would allow the Attorney General, with the concurrence of the Secretary of State to certify to the Congress that the legal standards in the contracting state which is being given access to the mechanism under the ECPA satisfies certain requirements specified in the chapter (and discussed below). Only after such a certification has been received by the Congress, a contracting state would be able to receive the benefits sought to be granted under the Amendment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is important to note that the US administration is looking to use the US-UK Agreement as a standard to be followed for similar potential agreements with a number of other countries wherein the agencies in those countries could request information from US based entities through court orders through a properly specified legal framework. Though to our knowledge India has not been formally approached by the US government to enter into such an agreement, it is important to ask the question &lt;i&gt;viz&lt;/i&gt;. if approached:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Does India's present legal system meet the standards laid down in the amendment to the ECPA?&lt;/li&gt;
&lt;li&gt;And if they do, should India also seek to enter into such an Agreement with the United States?&lt;/li&gt;
&lt;li&gt;And if India does, what could be the implications for citizens and for countries in a similar position as India?&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;We hope to be able to answer the above three questions, or at least throw some light on them, in the conclusion of this paper by relying upon the discussions contained herein.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Criticisms of the Amendment&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While such a mechanism may be very effective in addressing the needs of security agencies in investigation and prevention of criminal activities, one cannot accept such an overarching change in cross border enforcement without analyzing the consequences that such a proposal will have on the right to privacy. Some of these consequences have been highlighted by experts responding to the amendment:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Lack of Judicial Authorisation&lt;/i&gt;: The Amendment requires that the foreign governments have a process whereby a person could seek post-disclosure review by an independent entity instead of a warrant by a court.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; Although a court order is not the norm for interception even in Indian law, however under American law such protection is given to data held by American companies even though the data may belong to Indian citizens and this protection will no longer be available if the Amendment is passed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Vague Standard for requests&lt;/i&gt;: Under the domestic law of any state there is usually a large amount of jurisprudence regarding when search orders can be issued, such as the “probable cause” standard that is followed in the United States or similar standards that may be followed in other jurisdictions. This ensures that even when the wording of the law is not precise, which it cannot be for such a subjective issue, there is still some amount of clarity around when and under what circumstances such warrants may be issued. In contrast, the Amendment requires that the orders be based on “requirements for a reasonable justification based on articulable and credible facts, particularity, legality, and severity regarding the conduct under investigation.” Although the language here may seem reasonable but in the absence of any jurisprudence backing it, it becomes very vague and susceptible to misuse. &lt;i&gt;Disclosure without a Warrant&lt;/i&gt;: Under the current MLAT process as followed in the United States, a judge in the U.S. must issue a warrant based on probable cause in order for a U.S. company to turn over content to a foreign government. This requirement protects individuals abroad by requiring their governments to meet certain standards when seeking information held by U.S. companies. The Amendment seeks to remove this essential safeguard for a judicial warrant. The Amendment does not require requests from foreign governments to be based on a prior judicial authorization, since a large number of countries (including India) do not always require judicial orders for such orders.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Allows Real Time Surveillance by Foreign Governments&lt;/i&gt;: American privacy rights activists have raised the concern that the Amendment would allow foreign governments to conduct ongoing surveillance by asking American companies to turn over data in real time. The requirements that the foreign governments would have to fulfill to execute such an order are less stringent than those which have to be fulfilled by the American security agencies if they want to indulge in similar activities. When the U.S. government wants to conduct real-time surveillance, it must comply with the Wiretap Act, which imposes heightened privacy protections.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; The court orders for this purpose also require minimization of irrelevant information, are strictly time-limited, only available for certain serious crimes, etc.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; In Indian law any such request, apart from being time limited and being available only for certain specified purposes, also has to satisfy that interception is the only reasonable option to acquire such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Process to determine which countries can make demands is not credible&lt;/i&gt;: Under the Amendment, the Attorney General and the Secretary of State, would decide whether the laws and practices of the foreign government adequately meet the standards set forth in the legislation for entering into a bilateral agreement. Their decisions would not be liable to be reviewed by a court or in any administrative procedure. They could make their determinations based on information which is not available to the public and the criteria for making the decision are vague and flexible. Further these criteria have been described as “factors” and not “requirements”&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; so that even if some of them are not satisfied, the certification process can still be completed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Companies do not have the resources to determine if a request complies with the terms of the agreement&lt;/i&gt;: The Amendment does not provide any oversight to ensure that technology companies are only turning over information permitted in a specific bilateral agreement. For example, a bilateral agreement may permit disclosure of information only in response to orders that do not discriminate on the basis of religion, however, it may not be possible for the companies receiving the request to determine whether a particular request complies with that condition or not. The Amendment does not require that individual companies put in place requisite processes to weed out requests that may be non compliant with the provisions of the agreement; nor are there periodic audits to ensure that companies are properly responding to foreign government information requests.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Non compliance with Human Rights Standards&lt;/i&gt;: Under international human rights law, governments are allowed to conduct surveillance only based on individualized and sufficient suspicion; authorized by an independent and impartial decision-maker; necessary and proportionate to achieve a legitimate aim, including by being the least intrusive means possible.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; However the mechanism proposed by the Amendment falls woefully short of these standards.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One must not lose sight of the fact that most of the criticisms of the proposal that have been discussed above have been made in the context of, and based on the standards of privacy protection that are available to American citizens. If we look at it from an Indian perspective most of those protections are not available to Indian citizens in any case since independent judicial oversight is not a &lt;i&gt;sine qua non&lt;/i&gt; for access to information by the security agencies in India. Although the Amendment leaves open the question of how a request would be made by the foreign government to the individual Agreements, it may be safe to assume that were India to enter into such an Agreement with the United States, it would require the orders for access to comply with the standards laid down under Indian law before the relevant authorities send the request to the US based data controllers. At the least, this would ensure that the rights of Indian citizens currently guaranteed under Indian law, howsoever flawed they might be, would in all likelihood be safeguarded as per Indian law.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Certification from the Attorney General to the US Congress&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the above background if India were to enter into the agreement with the U.S Government   apart from actually negotiating and signing that Agreement, the Indian government will also have to ensure (if the Amendment is passed) that the Attorney General of the United States, with the concurrence of the Secretary of State gives a certificate to the Congress that Indian law satisfies the requirements set forth in the proposed section XXXX of Title 18.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It must be kept in mind that if the negotiations between India and the United States in this regard reach such a mature stage that the certification from the Attorney General is required, then that would mean that there is enough political will on both sides to ensure that such an arrangement actually comes to fruition. In this context it would not be unfair to assume that the Attorney General may have a slight bias towards opining that Indian laws do conform to the requirements of the Amendment, as the Attorney General would want to support the decision taken by the administration, and our analysis shall have a similar bias in order to be more contextual.&lt;/p&gt;
&lt;p&gt;The certification would, &lt;i&gt;inter alia&lt;/i&gt;, contain the determination of the Attorney General:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;That the domestic law of India affords robust substantive and procedural protections for privacy and civil liberties in light of the data collection and activities of the Indian government that will be subject to the agreement.It should be noted that the Amendment specifies various factors that should be taken into account to reach such a determination, which include whether the Indian government:&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;(i) has adequate substantive and procedural laws on cybercrime and electronic evidence, as demonstrated through accession to the Budapest Convention on Cybercrime, or through domestic laws that are consistent with definitions and the requirements set forth in Chapters I and II of that Convention; &lt;i&gt;Although India is not a signatory to the Budapest Convention the Information Technology Act, 2000 (which is the main legislation dealing with cybercrime) has penal provisions which have borrowed heavily from the provisions of the Budapest Convention.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;demonstrates respect for the rule of law and principles of nondiscrimination;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;The provisions of Article 14 as well as Article 21 of the Constitution of India demonstrates that the legal regime in India is committed to the rule of law and principles of non discrimination.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;adheres to applicable international human rights obligations and commitments or demonstrates respect for international universal human rights (including but not limited to protection from arbitrary and unlawful interference with privacy; fair trial rights; freedoms of expression, association and peaceful assembly; prohibitions on arbitrary arrest and detention; and prohibitions against torture and cruel, inhuman, or degrading treatment or punishment);&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;India is a signatory to a number of international human rights conventions and treaties, it has acceded to the International Covenant on Civil and Political Rights (ICCPR), 1966, International Covenant on Economic, Social and Cultural Rights (ICESCR), 1966, ratified the International Convention on the Elimination of All Forms of Racial Discrimination (ICERD), 1965, with certain reservations, signed the Convention on the Elimination of All Forms of Discrimination against Women (CEDAW), 1979 with certain reservations, Convention on the Rights of the Child (CRC), 1989 and signed the Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment (CAT), 1984. Further the right to life guaranteed under Article 21 of the Constitution takes within its fold a number of human rights such as the right to privacy. Freedom of expression, right to fair trial, freedom of assembly, right against arbitrary arrest and detention are all fundamental rights guaranteed under the Constitution of India. &lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;has clear legal mandates and procedures governing those entities of the foreign government that are authorized to seek data under the executive agreement, including procedures through which those authorities collect, retain, use, and share data, and effective of oversight of these activities;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;India has a number of legislations which govern the interception and request for information such as the Information Technology Act, 2000, the Indian Telegraph Act, 1885, Code of Criminal Procedure, 1973, etc. which put in place mechanisms governing the authorities and entities which can ask for information.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;has sufficient mechanisms to provide accountability and appropriate transparency regarding the government’s collection and use of electronic data; and&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Right to Information Act, 2005 provides the citizens the right to access any public document unless access to the same is prohibited due to the specific exemptions provided in the Act. It may be noted here that the provisions of the Right to Information Act are often frustrated by the bureaucracy by using exceptions such as “national security”, but for the purposes of this write up we are already assuming a bias towards fulfillment of these factors/conditions and therefore as long as there is even some evidence of compliance, the conditions will be considered as fulfilled by the Attorney General for the purposes of his certificate. &lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;demonstrates a commitment to promote and protect the global free flow of information and the open, distributed, and interconnected nature of the Internet.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Telecom Regulatory Authority of India, which regulates telecom services in India has also issued the Prohibition of Discriminatory Tariffs for Data Services Regulations, 2016 which prohibits service providers from charging discriminatory tariffs for data services on the basis of content.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Other than Indian law, the certificate from the Attorney General will also have to certify certain issues which would have to be addressed in the bilateral agreement itself, &lt;i&gt;viz&lt;/i&gt;.:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;That the Indian government has adopted appropriate procedures to minimize the acquisition, retention, and dissemination of information concerning United States persons subject to the agreement.&lt;/li&gt;
&lt;li&gt;That the agreement requires the following with respect to orders subject to the agreement:&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;(i) The Indian government may not intentionally target a United States person or a person located in the United States, and must adopt targeting procedures designed to meet this requirement;&lt;/p&gt;
&lt;p&gt;(ii) The Indian government may not target a non–United States person located outside the United States if the purpose is to obtain information concerning a United States person or a person located in the United States;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) The Indian government may not issue an order at the request of or to obtain information to provide to the United States government or a third-party government, nor shall the Indian government be required to share any information produced with the United States government or a third-party government;&lt;/p&gt;
&lt;p&gt;(iv) Orders issued by the Indian government must be for the purpose of obtaining information relating to the prevention, detection, investigation, or prosecution of serious crime, including terrorism;&lt;/p&gt;
&lt;p&gt;(v) Orders issued by the Indian government must identify a specific person, account, address, or personal device, or any other specific identifier as the object of the Order;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Orders issued by the Indian government must be in compliance with the domestic laws of India, and any obligation for a provider of an electronic communications service or a remote computing service to produce data shall derive solely from Indian law;&lt;/p&gt;
&lt;p&gt;(vii) Orders issued by the Indian government must be based on requirements for a reasonable justification based on articulable and credible facts, particularity, legality, and severity regarding the conduct under investigation;&lt;/p&gt;
&lt;p&gt;(viii) Orders issued by the Indian government must be subject to review or oversight by a court, judge, magistrate, or other independent authority;&lt;/p&gt;
&lt;p&gt;(ix) Orders issued by the Indian government for the interception of wire or electronic communications, and any extensions thereof, must be for a fixed, limited duration; interception may last no longer than is reasonably necessary to accomplish the approved purposes of the order; and orders may only be issued where that same information could not reasonably be obtained by another less intrusive method;&lt;/p&gt;
&lt;p&gt;(x) Orders issued by the Indian government may not be used to infringe freedom of speech;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(xi) The Indian government must promptly review all material collected pursuant to the agreement and store any unreviewed communications on a secure system accessible only to those trained in applicable procedures;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(xii) The Indian government must segregate, seal, or delete, and not disseminate material found not to be information that is, or is necessary to understand or assess the importance of information that is, relevant to the prevention, detection, investigation, or prosecution of serious crime, including terrorism, or necessary to protect against a threat of death or seriously bodily harm to any person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(xiii) The Indian government may not disseminate the content of a communication of a U.S. person to U.S. authorities unless the communication (a) may be disseminated pursuant to Section 4(a)(3)(xii) and (b) relates to significant harm, or the threat thereof, to the United States or U.S. persons, including but not limited to crimes involving national security such as terrorism, significant violent crime, child exploitation, transnational organized crime, or significant financial fraud;&lt;/p&gt;
&lt;p&gt;(xiv) The Indian government must afford reciprocal rights of data access to the United States government;&lt;/p&gt;
&lt;p&gt;(xv) The Indian government must agree to periodic review of its compliance with the terms of the agreement by the United States government; and&lt;/p&gt;
&lt;p&gt;(xvi) The United States government must reserve the right to render the agreement inapplicable as to any order for which it concludes the agreement may not properly be invoked.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear from the discussion above that the proposed Amendment is a controversial piece of legislation which will affect the way law enforcement is carried out in the internet. While there is no doubt that proposing an alternate mechanism to the existing inefficient MLAT structure is definitely the need of the hour, whether the mechanism proposed in the proposed Amendment, with all the negative implications on privacy, is the right way forward is far from certain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for the three questions that we had sought out to answer in the beginning of this paper, we would not like to say that Indian law definitely conforms to all the requirements listed in the Amendments, but it can safely be said that it appears that if the governments of India and the United States so wish, it would not be difficult for the Attorney General of the United States to be able to give a certification to the Congress as required in the proposed Amendment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other two questions as to whether India should try to opt for such an arrangement if given a chance and what would be the consequence for its people are somewhat related, in the sense that it is only by examining the consequences on its citizens that we will arrive at an answer as to whether India should opt for such an arrangement or not. The level of protections offered to Indian citizens under India law in terms of protection of their private data from government surveillance is lower than that which is offered to American citizens under American law. The growing influence of the internet is changing the citizen-state dynamic giving rise to increasing incidents where the government has to approach private actors for permission in order to carry out their governmental functions of providing security. This is because more and more private data of individual citizens is being uploaded on to the internet and controlled by private actors such as telecom companies, social media sites, etc. and the governments have to approach these private actors in case they want access to this information. The fact that the government has to approach private actors to get access to data gives private citizens some leverage to ask for better privacy protections in the context of state surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although this proposed Amendment may not affect the local surveillance laws in India, however it would definitely have an effect on the way that citizens’ data is protected and accessed by the government.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Explanation by the Assistant Attorney General attached to the proposed Amendment.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;a href="https://www.justsecurity.org/24145/u-s-u-k-data-sharing-treaty/"&gt;https://www.justsecurity.org/24145/u-s-u-k-data-sharing-treaty/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; &lt;a href="https://www.justsecurity.org/24145/u-s-u-k-data-sharing-treaty/"&gt;https://www.justsecurity.org/24145/u-s-u-k-data-sharing-treaty/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;a href="http://spicyip.com/2012/04/clash-of-courts-indian-district-court.html"&gt;http://spicyip.com/2012/04/clash-of-courts-indian-district-court.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;a href="https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/"&gt;https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; &lt;a href="https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing"&gt;https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;a href="https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing"&gt;https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; &lt;a href="https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/"&gt;https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; &lt;a href="https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/"&gt;https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; &lt;a href="https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing"&gt;https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; International Covenant on Civil and Political Rights, art. 17, Dec. 19, 1966, U.N.T.S 999, &lt;i&gt;cf. &lt;/i&gt;&lt;a href="https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing"&gt;https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;a href="https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing"&gt;https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act'&gt;https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vipul Kharbanda and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>MLATs</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-28T01:09:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests">
    <title>Mixed signals? Supreme Court notices to states on Facebook arrests </title>
    <link>https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests</link>
    <description>
        &lt;b&gt;In wake of the recent arrests of UP-based scholar Kanwal Bharti and Andhra-based PUCL activist Jaya Vindhyala over their Facebook posts, NDTV aired a discussion on the grey areas of the IT Act. Pranesh Prakash, Shreya Singhal and Faizal Farooqui&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The video was&lt;a class="external-link" href="http://www.ndtv.com/video/player/the-social-network/mixed-signals-supreme-court-notices-to-states-on-facebook-arrests/287157?vod-related"&gt; published by NDTV on August 16, 2013&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The NDTV anchor asked Pranesh that this notice — the indicator coming from the government is that nobody seems to really know what section 66A is all about...and at the end of the day we are going to make a case by case decision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh said that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This not just about 66A. This is actually about rule of law. We see that the arrest of Kanwal Bharti is actually a legal arrest. It goes against a judgment of the Allahabad High Court saying that routine arrests shouldn't be made in cases where the imprisonment term is less than 7 years. He actually hasn't been charged under 66A, he was charged under the IPC. It is not just about Internet censorship. It also very much about the rule of law and that completely breaking down in India and ... people's persectives and government's perspectives many times  are withering away when it comes offensive content or what they deem offensive or communal content being posted online...and if  something like what  Kanwal Bharti posted is actually deemed to be illegal under those provisions then lots of statements that the Prime Minister  of India has said should also be deemed to be equally illegal."&lt;/p&gt;
&lt;p&gt;Watch the full video below:&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/oeN5HCvTCF8" width="420"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests'&gt;https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-08-28T08:42:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
