<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1316 to 1330.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/learning-forum-transparency-and-human-rights-in-the-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/learn-yourself"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/launching-cis-flagship-report-on-private-crypto-assets"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/launching-flagship-cis-report-on-private-crypto-assets"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-december-1-2016-neha-alawadhi-lack-of-clarity-about-cashless-and-online-transactions-makes-digital-payments-more-worrisome"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/talk-by-vasant-gangavane"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-telegraph-november-27-2014-know-thy-selfie"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/killing-the-internet-oped"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/keeping-it-private"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-may-4-2017-aijaz-hussain-kashmir-telecom-firms-struggle-to-block-22-banned-social-media-sites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-august-29-2019-aayush-rathi-and-akriti-bopanna-kashmirs-information-vacuum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/r-karthikeyan-v-union-of-india"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/learning-forum-transparency-and-human-rights-in-the-digital-age">
    <title>Learning Forum: Transparency and Human Rights in the Digital Age</title>
    <link>https://cis-india.org/internet-governance/news/learning-forum-transparency-and-human-rights-in-the-digital-age</link>
    <description>
        &lt;b&gt;Pranesh Prakash spoke at this event organized by Global Network Initiative on November 6, 2014 in California. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Pranesh Prakash spoke on transparency reports and their use and abuse in India; the Intermediary Liability Rules in India (and its non-provision of any transparency mechanism); and the need for transparency in private speech regulation, not just governmental speech regulation.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;img alt="GNI logo" src="https://cdn.evbuc.com/eventlogos/21069154/gnilogo.jpg" title="GNI logo" width="600" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img alt="Telecom Industry Dialogue" src="https://cdn.evbuc.com/eventlogos/21069154/screenshot20141002at11.11.24am.png" title="ID logos" width="600" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Global Network Initiative and the Telecommunications Industry Dialogue on Freedom of Expression and Privacy present:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2014 Learning Forum - Silicon Valley &lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;span&gt;Transparency and Human Rights in the Digital Age&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Hosted by LinkedIn &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Agenda&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;1:30PM - Registration&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;2:00PM - Opening Remarks&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Mark Stephens, Independent Chair, Global Network Initiative&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: center; "&gt;Jeffrey Dygert, Executive Director of Public Policy, AT&amp;amp;T&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: center; "&gt;Pablo Chavez, Vice President, Global Public Policy and Government Affairs, LinkedIn&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;2:15PM - Why does transparency matter for protecting and respecting rights online?&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Arvind Ganesan, Director of Business and Human Rights, Human Rights Watch&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deirdre Mulligan, Associate Professor, UC Berkeley School of Information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Michael Samway, School of Foreign Service, Georgetown University&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;3:00PM - What is the state of transparency reporting by companies and governments, and what's missing?&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Steve Crown, Vice President and Deputy General Counsel, Microsoft&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Jeffrey Dygert, Executive Director of Public Policy, AT&amp;amp;T&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Jason Pielemeier, Bureau of Democracy, Human Rights, and Labor, U.S. Department of State&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Pranesh Prakash, Policy Director, Centre for Internet &amp;amp; Society, Bangalore &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Moderated by Bennett Freeman, Senior Vice President, Sustainability Research and Policy, Calvert Investments&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;4:00PM - Break&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;4:30PM - How do companies communicate with users in response to live events? &lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Ben Blink, Senior Policy Analyst, Free Expression and International Relations, Google&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Patrik Hiselius, Senior Advisor, Digital Rights, TeliaSonera&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Rebecca MacKinnon, Director, Ranking Digital Rights Project, New America Foundation&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Hemanshu Nigam, CEO, SSP Blue&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Sana Saleem, Director, Bolo Bhi&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Moderated by Cynthia Wong, Senior Internet Researcher, Human Rights Watch&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;The program will be followed by a reception from 5:30 to 6:30pm.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By invitation only, non-transferrable.&lt;/p&gt;

&lt;p class="mceContentBody documentContent"&gt;Have questions about Learning Forum: Transparency and Human Rights in the Digital Age?                  &lt;a class="contact_organizer_link js-d-modal" href="#lightbox_contact"&gt; Contact Global Network Initiative &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="mceContentBody documentContent"&gt;The original was &lt;a class="external-link" href="https://www.eventbrite.com/e/learning-forum-transparency-and-human-rights-in-the-digital-age-tickets-13387240597"&gt;published here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/learning-forum-transparency-and-human-rights-in-the-digital-age'&gt;https://cis-india.org/internet-governance/news/learning-forum-transparency-and-human-rights-in-the-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2014-12-04T16:14:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/learn-yourself">
    <title>Learn It Yourself</title>
    <link>https://cis-india.org/news/learn-yourself</link>
    <description>
        &lt;b&gt;The peer-to-peer world of online learning encourages conversations and reciprocal learning, writes Nishant Shah in an article published in the Indian Express on 30 October 2011. &lt;/b&gt;
        
&lt;p&gt;Technologies and learning have always had a close link. In the past, distance learning programmes of higher education through the postal service, remote education programmes using satellite TV and interactive learning projects using information and communication infrastructure, have all been deployed with varied results in promoting literacy and higher education. In the last two decades, the internet has also joined this technology ecology in trying to provide quality and affordable education to remotely located areas through “citizen service centres” envisioned to reach 6,40,000 Indian villages in the future.&lt;/p&gt;
&lt;p&gt;These technology-based information outreach programmes expand the ability of traditional formal learning centres like universities, to cater to the needs of those who might not have access to learning resources. This vision of networked education relies on existing systems of centralised syllabus making, teacher-to-student information transfer, grade-based evaluation and accreditation systems, and a degree-centred approach to learning.&lt;/p&gt;
&lt;p&gt;I was in New York last week, at an international summit on the future of learning, Mobility Shifts, organised by the New School, where more than 260 speakers from 21 countries discussed the possibility of learning beyond the bounds of the school and university system. Many discussions were around the declining public education system (with huge disinvestment moves from the government), privatisation of education, increasing tuition and fees, and the non-relevance of current education. However, along with this digital expansion of the traditional education system is an emerging trend that challenges the ways in which we understand education and learning – DIY Learning or Do It Yourself Learning.&lt;/p&gt;
&lt;p&gt;DIY Learning is a product of the networked condition. It recognises that as more people get onto digital information networks, there is a possibility of producing peer-to-peer learning conditions, which do not have to follow our accepted models of learning and education.&lt;/p&gt;
&lt;p&gt;We have seen the rise of various decentralised and democratised knowledge repositories like Wikipedia. The search based algorithms of search engines also take into consideration the idea that knowledge is personal. User generated content sites like eHow.com show that the individual learner is not merely a recipient of information and knowledge. Information seeking spaces like Quora have shown that knowledge-sharing communities can incite new conditions of learning. Our contexts, experiences, everyday practices, aspirations etc. equip us with valuable information, which not only shape how we learn but also what we find relevant to learn for ourselves. DIY Learning picks up on the idea that the infrastructure of education is not necessarily designed towards learning. Learning often happens outside the classrooms, in informal conversations.&lt;/p&gt;
&lt;p&gt;Thus DIY Learning offers a new model of learning. It destabilises the established hierarchy of knowledge production and pedagogy and creates an each-one-teach-one model with a twist. Instead of a centralised board of curriculum designer who shape syllabi for the “average” student, you have the possibility of customised, highly individual, interest-based learning curricula where the student is a part of deciding what s/he wants to learn. DIY Learning doesn’t recognise the distinctions between teachers and students, but recognises them as “peers” within a network, encouraging conversations and reciprocal learning rather than information transfer based classroom models. Instead of mass-produced education that caters only to an imagined average, the DIY Learning model recognises that within the same student group, there are different rates and scales of learning, thus offering environments suited to the aptitude of the students.&lt;/p&gt;
&lt;p&gt;Within the DIY Learning model, aspects of education, from the design of curriculum and learning methods, to grading and evaluation are geared towards individual preferences and aspirations.&lt;/p&gt;
&lt;p&gt;Many people think of DIY Learning as an alternative to mainstream learning processes and structures. However, it is perhaps more fruitful to think of DIY Learning as a way of figuring out the problems that beset our traditional educational system. It allows us to rethink the relationships between learning, education, teaching and technologies. It recalibrates the space of the classroom and reconfigures the role of the teacher and the student.&lt;/p&gt;
&lt;p&gt;DIY Learning emphasises that merely building schools and universities is not enough to assure that learning happens. Learning happens through experiences, practice, conversations, internalisations and through making mistakes. DIY Learning offers these possibilities in an education universe that is constantly refusing to take risks, innovate and adapt to the needs of the present. By itself it might not be able to take on the roles and functions of the existing education systems. But it does warn us that we are preparing our students for our pasts rather than their futures. And the time to change is now.&lt;/p&gt;
&lt;p&gt;The original story was published in the Indian Express, it can be read &lt;a class="external-link" href="http://www.indianexpress.com/news/learn-it-yourself/867069/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/learn-yourself'&gt;https://cis-india.org/news/learn-yourself&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-23T05:01:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011">
    <title>Leaked Privacy Bill: 2014 vs. 2011</title>
    <link>https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has recently received a leaked version of the draft Privacy Bill 2014 that the Department of Personnel and Training, Government of India has drafted.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;After obtaining a copy of the leaked Privacy Bill 2014, we have  replaced the blog "An Analysis of the New Draft Privacy Bill" which was  based off of a report from the Economic Times, with this blog post&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This represents the third leak of potential privacy legislation for India that we know of, with publicly available versions having leaked in &lt;a href="http://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf"&gt;April 2011&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;September 2011&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When compared to the September 2011 Privacy Bill, the text of the 2014 Bill includes a number of changes, additions, and deletions.  Below is an outline of significant changes from the &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;September 2011 Privacy Bill&lt;/a&gt; to the 2014 Privacy Bill:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Scope:&lt;/b&gt; The 2014 Bill extends the right to Privacy to all residents of India. This is in contrast to the 2011 Bill, which extended the Right to Privacy to citizens of India.  The 2014 Bill furthermore recognizes the Right to Privacy as a part of Article 21 of the Indian Constitution and extends to the whole of India, whereas the 2011 Bill did not explicitly recognize the Right to Privacy as being a part of Article 21, and excluded Jammu and Kashmir from its purview.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Definitions:&lt;/span&gt;&lt;/b&gt;&lt;span&gt; The 2014 Bill includes a number of new definitions, redefines existing terms, and deletes others.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Terms that have been added in the 2014 Bill and the definitions&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Personal identifier&lt;/i&gt;:&lt;/b&gt; Any unique alphanumeric sequence of members, letters, and symbols that specifically identifies an individual with a database or a data set.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Legitimate purpose&lt;/i&gt;:&lt;/b&gt; A purpose covered under this Act or any other law for the time being in force, which is certain, unambiguous, and limited in scope for collection of any personal data from a data subject.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Competent authority&lt;/i&gt;&lt;/b&gt; : The authority which is authorized to sanction interception or surveillance, as the case may be, under this Act or rules made there under or any other law for the time being in force.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Notification&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: &lt;/i&gt;Notification issued under this Act and published in the Official Gazette&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Control&lt;/i&gt; :&lt;/b&gt; And all other cognate forms of expressions thereof, means, in relation to personal data, the collection or processing of personal data and shall include the ability to determine the purposes for and the manner in which any personal data is to be collected or processed.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;i&gt;Telecommunications system&lt;/i&gt;:&lt;/b&gt; Any system used for transmission or reception of any communication by wire, radio, visual or other electromagnetic means but shall not include broadcasting services.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Privacy standards&lt;/i&gt;:&lt;/b&gt; The privacy standards or protocols or codes of practice.  developed by industry associations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Terms that have been re-defined in the 2014 Bill from the 2011 Bill and the 2014 Bill definitions&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Communication data:&lt;/i&gt;&lt;/b&gt;The data held or obtained by a telecommunications service provider in relation to a data subject including the data usage of the telecommunications &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Data subject&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;: Any living individual, whose personal data is controlled by any person&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Interception&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: &lt;/i&gt;In relation to any communication in the course of its transmission through a telecommunication system, any action that results in some or all of the contents of that communication being made available, while being transmitted, to a person other than the sender or the intended recipient of the communication. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Person&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: A&lt;/i&gt;ny natural or legal person and shall include a body corporate, partnership, society, trust, association of persons, Government company, government department, urban  local body, or any other officer, agency or instrumentality of the state. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Sensitive personal data&lt;/i&gt;:&lt;/b&gt; Personal data relating to: (a) physical and mental health including medical history, (b) biometric, bodily or genetic information, (c) criminal convictions (d) password, (e) banking credit and financial data (f) narco analysis or polygraph test data, (g) sexual orientation.  Provided that any information that is freely available or accessible in public domain or to be furnished under the Right to Information Act 2005 or any other law for time being in force shall not be regarded as sensitive personal data for the purposes of this Act.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Individual:&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;a resident of Indian &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Covert surveillance&lt;/i&gt;:&lt;/b&gt; covert Surveillance" means obtaining private information about an individual and his private affairs without his knowledge and includes: (i) directed surveillance which is undertaken for the purposes of specific investigation or specific operation in such a manner as is likely to result in the obtaining of private information about a person whether or not that person was specifically identified in relation to the investigation or operation; (ii) intrusive surveillance which is carried out by an individual or a surveillance device  in relation to anything taking place on a residential premise or in any private vehicle. It also covers use of any device outside the premises or a vehicle wherein it can give information of the same quality and detail as if the device were in the premises or vehicle; (iii) covert human intelligence service which is information obtained by a person who establishes or maintains a personal or other relationship with an individual for the covert purpose of using such a relationship to obtain or to provide access to any personal information about that individual&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Re-identify&lt;/i&gt;&lt;/b&gt;: means the recovery of data from an anonymised data, capable of identifying a data subject whose personal data has been anonymised;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Process&lt;/i&gt;:&lt;/b&gt; “process" and all other cognate forms of expressions thereof, means any operation or set of operations, whether carried out through automatic means or not by any person or organization, that relates to:(a) collation, storage, disclosure, transfer, updating, modification, alteration or use of personal data; or (b) the merging, linking, blocking, degradation or anonymisation of personal data;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Direct marketing&lt;/i&gt;&lt;/b&gt;: Direct Marketing means sending of a commercial communication to any individual &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Data controller&lt;/i&gt;&lt;/b&gt;:  any person who controls, at any point in time, the personal data of a data subject but shall not include any person who merely provides infrastructure for the transfer or storage of personal data to it data controller;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt; Government&lt;/i&gt;&lt;/b&gt;: the Central Government or as the case may be, the State Government and includes the Union territory Administration, local authority or any agency and instrumentality of the Government;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Terms that have been removed from the 2014 Bill that were in the 2011 Bill and the 2011 definition:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Consent: Includes implied consent&lt;/li&gt;
&lt;li&gt;Maintain: Includes maintain, collect, use, or disseminate.&lt;/li&gt;
&lt;li&gt;Data processor: In relation to personal data means any person (other than the employee of the data controller), who processes the data on behalf of the data controller. &lt;/li&gt;
&lt;li&gt;Local authority: A municipal committee, district board, body of port commissioners, council, board or other authority legally entitled to, or entrusted by the Government with, the control or management of a municipal or local fund. &lt;/li&gt;
&lt;li&gt;Prescribed: Prescribed by rules made under this Act.&lt;/li&gt;
&lt;li&gt;Surveillance: Surveillance undertaken through installation and use of CCTVs and other system which capture images to identify or monitor individuals (this was removed from the larger definition of surveillance.)&lt;/li&gt;
&lt;li&gt;DNA: Cell in the body of an individual, whether collected from a cheek, cell, blood cell, skin cell or other tissue, which allows for identification of such individual when compared with other individual. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Terms that have remained broadly (with some modification) the same between the 2014 Bill and 2011 Bill (as per the 2014 Bill definition):&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Authority: The Data Protection Authority of India &lt;/li&gt;
&lt;li&gt;Appellate tribunal: the Cyber Appellate Tribunal established under Sub-Section (1) of section n48 of the Information Technology Act, 2000.&lt;/li&gt;
&lt;li&gt;Personal data: Any data which relates to a data subject, if that data subject can be identified from that data, either directly or indirectly, in conjunction with other data that the data controller has or is likely to have and includes any expression of opinion about such data subject. &lt;/li&gt;
&lt;li&gt;Member: Member of the Authority &lt;/li&gt;
&lt;li&gt;Disclose: and all other cognate forms of expression thereof, means disclosure, dissemination, broadcast, communication, distribution, transmission, or make available in any manner whatsoever, of personal data. &lt;/li&gt;
&lt;li&gt;Anonymised: The deletion of all data that identifies the data subject or can be used to identify the data subject by linking such data to any other data of the data subject, by the data controller. &lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Exceptions to the Right to Privacy&lt;/b&gt;: According to the 2011 Bill, the exceptions to the Right to Privacy included: &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Sovereignty, integrity and security of India, strategic, scientific or economic interest of the state &lt;/li&gt;
&lt;li&gt;Preventing incitement to the commission of any offence &lt;/li&gt;
&lt;li&gt;Prevention of public disorder or the detection of crime&lt;/li&gt;
&lt;li&gt;Protection of rights and freedoms of others &lt;/li&gt;
&lt;li&gt;In the interest of friendly relations with foreign state&lt;/li&gt;
&lt;li&gt;Any other purpose specifically mentioned in the Act. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill reflects almost all of the exceptions defined in the 2011 Bill, but removes ‘detection of crime’ from the list of exceptions. The 2014 Bill also qualifies that the application of each exception must be adequate, relevant, and not excessive to the objective it aims to achieve and must be imposed on the manner prescribed – whereas the 2011 Bill stated only that the application of exceptions to the Right to Privacy cannot be disproportionate to the purpose sought to be achieved.&lt;/p&gt;
&lt;p id="content" style="text-align: justify; "&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Acts not to be considered deprivations of privacy:  The 2011 Bill lists five instances that  will not be considered a deprivation of privacy  - namely&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;For journalistic purposes unless it is proven that there is a reasonable expectation of privacy, &lt;/li&gt;
&lt;li&gt;Processing data for personal or household purposes,&lt;/li&gt;
&lt;li&gt;Installation of surveillance equipment for the security of private premises, &lt;/li&gt;
&lt;li&gt;Disclosure of information via the Right to Information Act 2005,&lt;/li&gt;
&lt;li&gt;And any other activity exempted under the Act.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 limits these instances to:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The processing of data purely for personal or household purposes, &lt;/li&gt;
&lt;li&gt;Disclosure of information under the Right to Information Act 2005,&lt;/li&gt;
&lt;li&gt;And any other action specifically exempted under the Act.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Privacy Principles:  Unlike the 2011 Bill, the 2014 Bill defines nine specific privacy principles: notice, choice and consent, collection limitation, purposes limitation, access and correction, disclosure of information, security, openness, and accountability. The Privacy Principles will apply to all existing and evolving practices. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Provisions for Personal Data: Both the 2011 Bill and the 2014 Bill have provisions that apply to the processing of personal and sensitive personal data. The 2011 Bill includes provisions addressing the:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Collection of personal data, &lt;/li&gt;
&lt;li&gt;Processing of personal data, &lt;/li&gt;
&lt;li&gt;Data quality, &lt;/li&gt;
&lt;li&gt;Provisions relating to sensitive personal data, &lt;/li&gt;
&lt;li&gt;Retention of personal data,&lt;/li&gt;
&lt;li&gt;Sharing (disclosure) of personal data, &lt;/li&gt;
&lt;li&gt;Security of personal data, &lt;/li&gt;
&lt;li&gt;Notification of breach of security, &lt;/li&gt;
&lt;li&gt;Access to personal data by data subject,&lt;/li&gt;
&lt;li&gt;Updation of personal data by data subject&lt;/li&gt;
&lt;li&gt;Mandatory processing of data,&lt;/li&gt;
&lt;li&gt;Trans border flows of personal data.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Of these, the 2014 Bill broadly (though not verbatim) reflects the 2011 Bill provisions relating to the:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Collection of personal data,&lt;/li&gt;
&lt;li&gt;Processing of personal data, &lt;/li&gt;
&lt;li&gt;Access to personal data,&lt;/li&gt;
&lt;li&gt;Updating personal data&lt;/li&gt;
&lt;li&gt;Retention of personal data&lt;/li&gt;
&lt;li&gt;Data quality, &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill has further includes provisions addressing:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Openness and accountability, &lt;/li&gt;
&lt;li&gt;Choice, &lt;/li&gt;
&lt;li&gt;Consent,&lt;/li&gt;
&lt;li&gt;Exceptions for personal identifiers. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill has made changes to the provisions addressing:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Provisions relating to sensitive personal data, &lt;/li&gt;
&lt;li&gt;Sharing (disclosure of personal data), &lt;/li&gt;
&lt;li&gt;Notification of breach of security, &lt;/li&gt;
&lt;li&gt;Mandatory processing of data &lt;/li&gt;
&lt;li&gt;Security of personal data&lt;/li&gt;
&lt;li&gt;Trans border flows of personal data. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The changes that have been made have been mapped out below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Provisions Relating to Sensitive Personal Data:&lt;/b&gt; The 2011Bill and 2014 Bill both require authorization by the Authority for the collection and processing of sensitive personal data. At the same time, both Bills include a list of circumstances under which authorization for the collection and processing of sensitive personal data is not required. On the whole, this list is the same between the 2011 Bill and 2014 Bill, but the 2014 Bill adds the following circumstances on which authorization is not needed for the collection and processing of sensitive personal data:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;For purposes related to the insurance policy of the individual if the data relates to the physical or mental health or medical history of the individual and is collected and processed by an insurance company.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Collected or processed by the Government Intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill also allows the Authority to specify additional regulations for sensitive personal data, and requires that any additional transaction sought to be performed with the sensitive personal information requires fresh consent to first be obtained. The 2014 Bill carves out another exception for Government agencies, allowing disclosure of sensitive personal data without consent to Government agencies mandated under law for the purposes of verification of identity, or for prevention, detection, investigation including cyber incidents, prosecution, and punishment of offences.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notification of Breach of Security&lt;/b&gt;: The provisions relating to the notification of breach of security in the 2014 Bill differ from the 2011 Bill. Specifically, the 2014 Bill removes the requirement that data controllers must publish information about a data breach in two national news papers. Thus, in the 2014 Bill, data controllers must only inform the data protection authority and affected individuals of the breach. &lt;br /&gt;&lt;b&gt;&lt;br /&gt;Notice&lt;/b&gt;: The 2014 Bill changes the structure of the notice mechanism – where in the 2011 Bill, prior to the processing of data, data controllers had to take all reasonable steps to ensure that the data subject was aware of the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; &lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The documented purposes for which such personal data is being collected&lt;/li&gt;
&lt;li&gt;Whether providing of personal data by the data subject is voluntary or mandatory under law or in order to avail of any product or service&lt;/li&gt;
&lt;li&gt;The consequences of the failure to provide the personal data &lt;/li&gt;
&lt;li&gt;The recipient or category of recipients of the personal data &lt;/li&gt;
&lt;li&gt;The name and address of the data controller and all persons who are or will be processing information on behalf of the data controller &lt;/li&gt;
&lt;li&gt;If such personal data is intended to be transferred out of the country, details of such transfer. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;In contrast the 2014 Bill provides that before personal data is collected, the data controller must give notice of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;What data is being collected and&lt;/li&gt;
&lt;li&gt;The legitimate purpose for the collection.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;If the purpose for which the data was collected has changed the data controller will then be obligated to provide the data subject with notice of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The use to which the personal data will be put&lt;/li&gt;
&lt;li&gt;Whether or not the personal data will be disclosed to a third party and if so the identity of such person &lt;/li&gt;
&lt;li&gt;If the personal data being collected is intended to be transferred outside India  and the reasons for doing so, how the transfer helps in achieving the legitimate purpose and whether the country to which such data is transferred has suitable legislation to provide for adequate protection and privacy of the data. &lt;/li&gt;
&lt;li&gt;The security and safeguards established by the data controller in relation to the personal data &lt;/li&gt;
&lt;li&gt;The processes available to a data subject to access and correct  his personal data&lt;/li&gt;
&lt;li&gt;The recourse open to a data subject, if he has any complaints in respect of collection or processing of the personal data and the procedure relating thereto&lt;/li&gt;
&lt;li&gt;The name, address, and contact particulars of the data controller and all persons who will be processing the personal data on behalf of the data controller. &lt;/li&gt;
&lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Disclosure of personal data&lt;/b&gt;: Though titled as ‘sharing of personal data’ both the 2011 Bill and 2014 Bill require consent for the disclosure of personal information, but list exceptional circumstances on which consent is not needed. In the 2011 bill, the relevant provision permits disclosure of personal data without consent only if (i) the sharing was a part of the documented purpose, (ii) the sharing is for any purpose relating to the exceptions to the right to privacy or (iii) the Data Protection Authority has authorized the sharing.  In contrast, the 2014 Bill permits disclosure of personal data without consent if (i) such disclosure is part of the legitimate purpose (ii) such disclosure is for achieving any of the objectives of section 5 (iii) the Authority has by order authorized such disclosure (iv) the disclosure is required under any law for the time being in force (v) the disclosure is made to the Government Intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.  As a safeguard, the 2014 Bill requires that any person to whom  personal information is disclosed, whether a resident or not, must adhere to all provisions of the Act. Furthermore, the disclosure of personal data must be limited to the extent which is necessary to achieve the purpose for which the disclosure is sought and no person can make public any personal data that is in its control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transborder flow of information&lt;/b&gt;: Though both the 2011 Bill and the 2014 Bill require any country that data is transferred to must have equivalent or stronger data protection standards in place, the 2014 Bill carves out an exception for law enforcement and intelligence agencies and the transfer of any personal data outside the territory of India, in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mandatory Processing of Data&lt;/b&gt;: Both the 2011 Bill and 2014 Bill have provisions that address the mandatory processing of data. These provisions are similar, but the 2014 Bill includes a requirement that data controllers must anonymize personal data that is collected without prior consent from the data subject within a reasonable time frame after collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security of Personal Data:&lt;/b&gt; The provision relating to the security of personal information in the 2014 Bill has been changed from the 2011 Bill by expanding the list and type of breaches that must be prevented, but removing requirements that data controllers must ensure all contractual arrangements with data processors specifically ensure that the data is maintained with the same level of  security.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Conditions on which provisions do not apply:&lt;/b&gt; Both the 2011Bill and 2014 Bill define conditions on which the provisions of updating personal data, access, notification of breach of security, retention of personal data, data quality, consent, choice, notice, and right to privacy  will not apply to personal data.  Though the 2011 Bill and 2014 Bill reflect the same conditions, the 2014 Bill  carves out an exception for Government Intelligence Agencies  - stating that the provisions of  updating personal data, access to data by the data subject, notification about breach of security, retention of personal data, data quality, processing of personal data, consent, choice, notice, collection from an individual will not apply to data collected or processed in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy Officers&lt;/b&gt;: Unlike the 2011 Bill, the 2014 Bill defines the role of the privacy officer that must be established by every data controller for the purpose of overseeing the security of personal data and implementation of the provisions of the Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Power of Authority to Exempt: &lt;/b&gt; Both the 2011 Bill and 2014 Bill contain provisions that enable the Authority to waive the applicability of specific provisions of the Act. The circumstances on which this can be done are based on the exceptions to the Right to Privacy in both the 2011 and 2014 Bill. To this extent, the 2014 Bill differs slightly from the 2011 Bill, by removing the power of the Authority to exempt for the ‘detection of crime’ and ‘any other legitimate purpose mentioned in this Act’ .&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Data Protection Authority:&lt;/b&gt; The 2011 Bill and 2014 Bill both establish Data Protection Authorities, but the 2014 Bill further clarifies certain aspects of the functioning of the Authority and expands the functions and the powers of the Authority.  For example, new functions of the Authority include:&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Auditing any or all personal data controlled by the data controller to assess whether it is being maintained in accordance with the Act, &lt;/li&gt;
&lt;li&gt; Suggesting international instruments relevant to the administration of the Act,&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Encouraging industry associations to evolve privacy standards for self regulations, adjudicating on disputes arising between data controllers or between individuals and data controllers.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill also expands the powers of the Data Protection Authority – importantly giving him the power to receive, investigate complaints about alleged violations of privacy and issue appropriate orders or directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, the 2014 Bill carves out an exception for Government Intelligence Agencies and Law Enforcement agencies – preventing the Authority from conducting investigations, issuing appropriate orders or directions, and adjudicating complaints in respect to actions taken by the Government Intelligences Agencies and Law Enforcement,  if for the objectives of  (a) sovereignty, integrity or security of India; or(b) strategic, scientific or economic interest of India; or(c) preventing incitement to the commission of any offence, or (d) prevention of public disorder, or(e) the investigation of any crime; or (f) protection of rights and freedoms of others; or (g) friendly relations with foreign states; or (h) any other legitimate purpose mentioned in this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This power is instead vested with a court of competent jurisdiction.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The National Data Controller Registry&lt;/b&gt;: The 2014 Bill removes the National Data Controller Registry and requirements for data controllers to register themselves and oversight of the Registry by the Data Protection Authority.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Direct Marketing: &lt;/b&gt;Both the 2011 and 2014 Bills contain provisions regulating the use of personal information for direct marketing purposes. Though the provisions are broadly the same, the 2011 Bill envisions that no person will undertake direct marketing unless he/she is registered in the ‘National Data Registry’  and one of the stated purposes is direct marketing. As the 2014 Bill removes the National Data Registry, the 2014 Bill now requires that any person undertaking direct marketing must have on record where he/she has obtained personal data from.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Interception of Communications&lt;/b&gt;: Though maintaining some of the safeguards defined in the 2011 Bill for interception,  2014 Bill changes  the interception regime envisioned in the 2011 Bill by carving out a wide exception for organizations monitoring the electronic mail of employees,  removing provisions requiring the interception take place only for the minimum period of time required for achieving the purposes, and removing provisions excluding the use of intercepted communications as evidence in a court of law. Similar to the 2011 Bill, the 2014 Bill specifies that the principles of notice, choice and consent, access and correction, and openness will not apply to the interception of communications.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Video Recording Equipment in public places&lt;/b&gt;: Unlike the 2011 Bill, which addressed only the use of CCTV’s, the 2014 Bill addresses the installation and use of video recording equipment in public places. Though both the 2011 Bill and 2014 Bill both prevent the use of recording equipment and CCTVs for the purpose of identifying an individual, monitoring his personal particulars, or revealing personal, or otherwise adversely affecting his right to privacy - the 2014 Bill requires that the use of recording equipment must be in accordance with procedures, for a legitimate purpose, and proportionate to the objective for which the equipment was installed. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The 2014 Bill makes a broad exception to these safeguards for law enforcement agencies and government intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific, or economic interest of India.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy Standards and Self Regulation&lt;/b&gt;: The 2014 Bill establishes a specific mechanism of self regulation where industry associations will develop privacy standards and adhere to them.  For this purpose, an industry ombudsman should be appointed. The standards must be in conformity with the National Privacy Principles and the provisions of the Privacy Bill. The developed standards will be submitted to the Authority and the Authority may frame regulations based on the standards. If an industry association has not developed privacy standards, the Authority may frame regulations for a specific sector.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Settlement of Disputes and Appellate Tribunal:&lt;/b&gt; The 2014 Bill makes significant change to the process for settling disputes from the 2011 Bill. In the 2014 Bill an Alternative Dispute Mechanism is established where disputes between individuals and data controllers are first addressed by the Privacy Officer of each Data Controller or the industry level Ombudsman. If individuals are not satisfied with the decision of the Ombudsman they may take the complaint to the Authority. Individuals can also take the complaint directly to the Authority if they wish.  If an individual is aggrieved with the decision of the Authority, by a privacy officer or ombudsman through the Alternative Dispute Resolution mechanism, or by the adjudicating officer of the Authority, they may approach the Appellate Tribunal. Any order from the Appellate Tribunal can be appealed at a high court. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In the 2011 Bill disputes between the data controller and an individual can be taken directly to the Appellate Tribunal and orders from the Authority can be appealed at the Tribunal. There is not further path for appeal to an order of the tribunal.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Offences and Penalties:&lt;/b&gt; The 2014 Bill changes the structure of the offences and penalties section by breaking the two into separate sections - one addressing offences and one addressing penalties while the 2011 Bill addressed offences and penalties in the same section. &lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Offences&lt;/b&gt;: The 2014 Bill penalizes every offence with imprisonment and a fine and empowers a police officer not below the rank of Deputy Superintendent of Police to investigate any offence, limits the courts ability to take cognizance of an offence to only those brought by the Authority, requires that the Court be no lower than a Chief Metropolitan Magistrate or a Chief Judicial Magistrate, and permits courts to compound offences. The 2014 Bill further specifies that any offence that is punishable with three years in prison and above is cognizable, and offences punishable with three years in prison are bailable. . Under the 2014 Bill offences are defined as:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Unauthorized interception of communications &lt;/li&gt;
&lt;li&gt;Disclosure of intercepted communications &lt;/li&gt;
&lt;li&gt;Undertaking unauthorized Covert Surveillance &lt;/li&gt;
&lt;li&gt;Unauthorized use of disclosure of communication data &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The offences defined under the Act are reflected in the 2011 Bill, but the time in prison and fine is higher in the 2014 Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Penalties&lt;/b&gt;: The 2014 Bill provides a list of penalties including:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Penalty for obtaining personal data on false pretext&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Penalty for violation of conditions of license pertaining to maintenance of secrecy and confidentiality by telecommunications service providers &lt;/li&gt;
&lt;li&gt;Penalty for disclosure of other personal information &lt;/li&gt;
&lt;li&gt;Penalties for contravention of directions of the Authority &lt;/li&gt;
&lt;li&gt;Penalties for data theft &lt;/li&gt;
&lt;li&gt;Penalties for unauthorised collection, processing, and disclosure of personal data&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Penalties for unauthorized use of personal data for direction marketing. These penalties reflect the penalties in the 2011 bill, but prescribe higher fines&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adjudicating Officer&lt;/b&gt;: Unlike the 2011 Bill that did not have in place an adjudicating officer, the 2014 Bill specifies that the Chairperson of the Authority will appoint a Member of the Authority not  below the Rank of Director of the Government of India to be an adjudicating officer. The adjudicating officer will have the power to impose a penalty and will have the same powers as vested in a civil court under the Code of Civil Procedure. Every proceeding before the adjudicating officer will be considered a judicial processing. When adjudicating the officer must take into consideration the amount of disproportionate gain or unfair advantage, the amount of loss caused, the respective nature of the default&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil Remedies and compensation&lt;/b&gt;: Both the 2011 and 2014 Bill contain provisions that permit an individual to pursue a civil remedy, but the 2014 Bill limits these instances to - if loss or damage has been suffered or an adverse determination is made about an individual due to negligence on complying with the Act, and provides for the possibility that the contravening parties will have to provide a public notice of the offense. &lt;br /&gt;&lt;br /&gt;The 2014 Bill removes provisions specifying that individuals that have suffered loss due to a contravention by the data controller of the Act are entitled to compensation.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Exceptions for intelligence agencies&lt;/b&gt;:  Unlike the 2011 Bill, the 2014 Bill includes an exception for Government Intelligence Agencies and Law Enforcement Agencies – stating that the Authority will not have the power to conduct investigations, issue appropriate orders and directions or otherwise adjudicate complaints in respect of action taken by the Government intelligence agencies and Law  Enforcement agencies for achieving any of the objectives that reflect the defined exceptions to privacy.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society welcomes many of the changes that are reflected in the Privacy Bill 2014, but are cautious about the wide exceptions that have been carved out for law enforcement and intelligence agencies in the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, the Report of Group of Expert s on Privacy was developed for the purpose of informing a privacy framework for India. As such the Centre for Internet and Society will be analyzing in upcoming posts the draft Privacy Bill 2014 and the recommendations in the Report of the Group of Experts on Privacy.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011'&gt;https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-01T10:52:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms">
    <title>Law yet to catch up with tech-enabled peeping toms</title>
    <link>https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms</link>
    <description>
        &lt;b&gt;Devices that give sharp images are the order of the day. But this clarity is lacking when it comes to regulating use of cameras and camera phones in public places, say policy makers.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Sandhya Soman &amp;amp; Pratiksha Ramkumar was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2012-11-07/chennai/34972633_1_privacy-law-phones-in-public-places-camera-phones"&gt;published&lt;/a&gt; in the Times of India on November 7, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If there is one thing that sends more clients harried by blackmailers to detectives like A M Malathy of Malathy Detective Agency, it is the pervasive presence of the camera, most often inside modest cell phones. "One girl had to leave a town as her ex-boyfriend uploaded her photo on the internet and referred to her as a call girl. We got the web page removed," says Malathy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But tracing culprits is difficult if they are strangers on the road. Absence of a privacy law makes it difficult for police to book culprits. "If someone photographs a woman on a bus, we can ask the person to delete it. But we can't book the person s there is no law," says Jegabar Sali, assistant commissioner, cyber crime cell.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology (IT) Act, 2000 talks of punishment only in cases where a person's private areas have been photographed. However, things are looking up with the government trying to draw up the Right to Privacy Bill.&lt;br /&gt;&lt;br /&gt;"The problems posed by digital technology are complex and we need to define what these new crimes are," says Rajeev Chandrasekhar, independent Member of Parliament, who introduced the Right to Privacy Bill,2010 in Parliament. "I did it because I got representations from parents and women about how MMS clips were being used to blackmail them," says Chandrasekhar.&lt;br /&gt;&lt;br /&gt;There have been attempts at legislation earlier. The Mobile Camera Phone Users (Code of Conduct) Bill, 2006 attempted to regulate the use of camera phones in public places. It proposed that manufactures build camera phones that flash a light or emit a 'click' sound, and that users should get consent of the person being photographed.&lt;br /&gt;&lt;br /&gt;"The sound and light are for informing people that they are being filmed," says Sunil Abraham, executive director, Centre for Internet and Society, a Bangalore-based organisation that was part of the committee. These provisions are part of South Korea's privacy law, which sought to bring down cases of technology-enabled 'upskirt' photography, where photos of women were taken without their permission, he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms'&gt;https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-08T08:06:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/launching-cis-flagship-report-on-private-crypto-assets">
    <title>Launching CIS’s Flagship Report on Private Crypto-Assets</title>
    <link>https://cis-india.org/internet-governance/events/launching-cis-flagship-report-on-private-crypto-assets</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society is launching its flagship report on regulating private crypto-assets in India, as part of its newly formed Financial Technology (or Fintech) research agenda. This event will serve as a venue to bring together the various stakeholders involved in the crypto-asset space to discuss the state of crypto-asset regulation in India from a multitude of perspectives.&lt;/b&gt;
        &lt;h3&gt;About the private crypto-assets report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first output under this agenda is our report on regulating private cryptocurrencies in India. This report aims to act as an introductory resource for policymakers who are looking to implement a regulatory framework for private crypto-assets. The report covers the technical elements of crypto-assets, their history, proposed use cases as well as its benefits and limitations. It also examines how crypto-assets fit within India’s current regulatory and legislative frameworks and makes clear recommendations for the same.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;About the Event&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The launch event will feature an initial presentation by researchers at CIS on the various findings and recommendations of its flagship report. This will be followed by a moderated discussion with 5 panelists who represent the space in policy, academia and industry. The discussion will be centered around the current status of crypto-assets in India, the government’s new proposed regulations and what the future holds for the Indian crypto market.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The confirmed panelists are as follows:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Tanvi Ratna - Founder, Policy 4.0 and expert on blockchain and cryptocurrencies &lt;/li&gt;
&lt;li&gt;Shehnaz Ahmed - Senior Resident Fellow and Fintech Lead at Vidhi Centre for Legal Policy &lt;/li&gt;
&lt;li&gt;Nithya R. - Chief Executive Officer, Unos.Finace &lt;/li&gt;
&lt;li&gt;Prashanth Irudayaraj - Head of R&amp;amp;D, Zebpay &lt;/li&gt;
&lt;li&gt;Vipul Kharbanda - Non resident Fellow specialising in Fintech at CIS &lt;/li&gt;
&lt;li&gt;Aman Nair - Policy Offer, CIS (Moderator) &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Registration link: &lt;a class="external-link" href="https://us06web.zoom.us/webinar/register/WN_TdY-EPLoRvGY2rfsq4CENw"&gt;https://us06web.zoom.us/webinar/register/WN_TdY-EPLoRvGY2rfsq4CENw&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Agenda&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;17.30 - 17.35&lt;/td&gt;
&lt;td&gt;Welcome Note&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.35 - 18.35&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The status of private crypto-assets in India&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Presentation on CIS’ flagship Report on regulating private crypto-assets in India&lt;/li&gt;
&lt;li&gt;Moderated discussion with panelists across industry, government, journalism and academia providing their insight as to the current and future state of private crypto-assets, and their regulation, in India.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.35 - 19.00&lt;/td&gt;
&lt;td&gt;Audience questions and discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/launching-cis-flagship-report-on-private-crypto-assets'&gt;https://cis-india.org/internet-governance/events/launching-cis-flagship-report-on-private-crypto-assets&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Cryptocurrencies</dc:subject>
    
    
        <dc:subject>Webinar</dc:subject>
    

   <dc:date>2021-12-03T15:16:27Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/launching-flagship-cis-report-on-private-crypto-assets">
    <title>Launching CIS’s Flagship Report on Private Crypto-Assets</title>
    <link>https://cis-india.org/internet-governance/blog/launching-flagship-cis-report-on-private-crypto-assets</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society is launching its flagship report on regulating private crypto-assets in India, as part of its newly formed Financial Technology (or Fintech) research agenda. The event will be held on Zoom, at 17:30 IST on Wednesday, 15th December, 2021
&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This event will serve as a venue to bring together the various stakeholders involved in the crypto-asset space to discuss the state of crypto-asset regulation in India from a multitude of perspectives.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This event will serve as a venue to bring together the various stakeholders involved in the crypto-asset space to discuss the state of crypto-asset regulation in India from a multitude of perspectives.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;About the private crypto-assets report&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The first output under this agenda is our report on regulating private cryptocurrencies in India. This report aims to act as an introductory resource for policymakers who are looking to implement a regulatory framework for private crypto-assets. The report covers the technical elements of crypto-assets, their history, proposed use cases as well as its benefits and limitations. It also examines how crypto-assets fit within India’s current regulatory and legislative frameworks and makes clear recommendations for the same.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;About the Event&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The launch event will feature an initial presentation by researchers at CIS on the various findings and recommendations of its flagship report. This will be followed by a moderated discussion with 5 panelists who represent the space in policy, academia and industry. The discussion will be centered around the current status of crypto-assets in India, the government’s new proposed regulations and what the future holds for the Indian crypto market.&lt;/p&gt;
&lt;p dir="ltr"&gt;The confirmed panelists are as follows:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Tanvi Ratna - Founder, Policy 4.0 and expert on blockchain and cryptocurrencies&lt;/li&gt;
&lt;li&gt;Shehnaz Ahmed - Senior Resident Fellow and Fintech Lead at Vidhi Centre for Legal Policy&lt;/li&gt;
&lt;li&gt;Nithya R. - Chief Executive Officer, Unos.Finace&lt;/li&gt;
&lt;li&gt;Prashanth Irudayaraj - Head of R&amp;amp;D, Zebpay&lt;/li&gt;
&lt;li&gt;Vipul Kharbanda - Non resident Fellow specialising in Fintech at CIS&lt;/li&gt;
&lt;li&gt;Aman Nair - Policy Offer, CIS (Moderator)&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Registration link: &lt;a class="external-link" href="https://us06web.zoom.us/webinar/register/WN_TdY-EPLoRvGY2rfsq4CENw"&gt;https://us06web.zoom.us/webinar/register/WN_TdY-EPLoRvGY2rfsq4CENw&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Agenda&lt;/h3&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;17.30 - 17.35&lt;/td&gt;
&lt;td&gt;Welcome Note&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.35 - 18.35&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The status of private crypto assets in India&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Presentation on CIS’ flagship Report on regulating private crypto-assets in India&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Moderated discussion with panelists across industry, government, journalism and academia providing their insight as to the current and future state of private crypto-assets, and their regulation, in India.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.35 - 19.00&lt;/td&gt;
&lt;td&gt;Audience questions and discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/launching-flagship-cis-report-on-private-crypto-assets'&gt;https://cis-india.org/internet-governance/blog/launching-flagship-cis-report-on-private-crypto-assets&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aman Nair</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cryptocurrencies</dc:subject>
    

   <dc:date>2021-12-13T09:11:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-december-1-2016-neha-alawadhi-lack-of-clarity-about-cashless-and-online-transactions-makes-digital-payments-more-worrisome">
    <title>Lack of clarity about cashless and online transactions makes digital payments more worrisome</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-december-1-2016-neha-alawadhi-lack-of-clarity-about-cashless-and-online-transactions-makes-digital-payments-more-worrisome</link>
    <description>
        &lt;b&gt;Even as demonetisation pushes for more and more cashless and online transactions through, e-wallets, banks and other such apps, there is a serious lack of clarity on how these companies handle customer data, and how it is shared with other entities.  "Data is the new oil," is an oft repeated phrase in nearly every technology related conversation that comes up anywhere in India today.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Neha Alawadhi was &lt;a class="external-link" href="http://economictimes.indiatimes.com/industry/banking/finance/banking/lack-of-clarity-about-cashless-and-online-transactions-makes-digital-payments-more-worrisome/articleshow/55714435.cms"&gt;published in the Economic Times&lt;/a&gt; on December 1, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;However, the handling of this data, most of which carries some of our most personal information, has little protection if it is misused by a private or government entity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sample this: at an industry event, a Bengaluru-based startup claimed to solve the problem of credit worthiness of individuals for small loans by using some unusual means. To determine credit worthiness, the company maps everything in your phone — right from how many SMSes you receive for non-payment of dues, to how you fill out your loan application form. The company also claims that it can map, using your phone data, the area of your residence and office.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several other companies, especially those in the financial technology (fintech) space, doing similar mapping. The Wall Street Journal on Monday reported that more than three dozen local governments across China are compiling digital records of social and financial behaviour to rate credit worthiness. A person gets a score deduction for violations such as fare cheating, jaywalking and violating family-planning rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Lack of clarity about cashless and online transactions makes digital payments more worrisome" class="gwt-Image" src="http://img.etimg.com/photo/55714471/untitled-27.jpg" title="Lack of clarity about cashless and online transactions makes digital payments more worrisome" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India may be some distance away from such a credit scoring system, but the increased use of online transactions — financial or otherwise — is sure to lead to similar business models.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"You have no clue what data you are sharing with fintech companies. They are collecting data from other sources and combining it to assess your credit score," said Sunil Abraham, executive director of the Centre for Internet Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, there is no clarity on what an e-wallet company does with your details and transaction history even after you delete the app. "If there is large level of customer migration of users from an app company, they will just become a data analytics company. The bigger danger in future is the growth of large data intermediaries which are similar to Visa and Mastercard networks, which purchase big databases and further sell this data and build their services or product on top of that. There are large privacy concerns there," said Apar Gupta, advocate and Internet policy expert. While lack of a privacy law or controller has been a long standing concern, the existing law for data protection — Section 43(A) of the Information Technology Act— also offers only very basic protection and is "grossly inadequate", according to Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To make matters worse, they also lack a strict enforcement mechanism. "We don’t know what are the data practices (adopted by apps). There is no privacy controller or some other body, so it is very difficult for a user to know what are the actual ways their data is being implemented," said Gupta.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have also been cases of government entities making sensitive and personal information public. Earlier this year, DataMeet, a community of data science enthusiasts, found that Bengaluru Police released 13,000 call data records (CDR) of potential on-going investigations during a hackathon with focus on solving problems of cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There has been very little talk about data ethics and data practices in India. But cases of misuse of data are frequent," noted DataMeet member Srinivas Kodali in a blogpost.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-december-1-2016-neha-alawadhi-lack-of-clarity-about-cashless-and-online-transactions-makes-digital-payments-more-worrisome'&gt;https://cis-india.org/internet-governance/news/economic-times-december-1-2016-neha-alawadhi-lack-of-clarity-about-cashless-and-online-transactions-makes-digital-payments-more-worrisome&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-02T16:20:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/talk-by-vasant-gangavane">
    <title>Konkan Corridor Project — A Lecture by Vasant Gangavane</title>
    <link>https://cis-india.org/internet-governance/talk-by-vasant-gangavane</link>
    <description>
        &lt;b&gt;Well known social worker Vasant Gangavane will be giving a public lecture on the Konkan Corridor Project at Ashoka Innovators for the Public in Bangalore on April 16, 2012. The lecture will focus on the role of Information &amp; Communication Technology for total rural transformation by inclusive integrated development with no change of land ownerships. The event is co-organized by Ashoka Innovators for the Public and the Centre for Internet and Society.&lt;/b&gt;
        
&lt;p&gt;Citing examples from the 117 village clusters in the regions of Ratnagiri and Sindhudurga districts of Maharashtra the lecture hopes to throw light on questions like what is a village cluster, what does it mean to urbanize one village cluster and what do we need to do to urbanize one village cluster, how will we organize and coordinate the project. This apart the vision, status and action plans of the Konkan Corridor Project, the skills development in each cluster, intensive agriculture in each cluster, farm produce processing, water conservation in the project area, rivers in the project area, energy, transportation, industry, science communication, and self administration in each clusters will also be discussed.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Vasant Gangavane&lt;/h2&gt;
&lt;p&gt;In the 1970s Vasant Gangavane, a management graduate from Indian Institute of Management and Wharton, returned to his village in Konkan, Maharashtra, to give his people what he felt they needed most — the knowledge to manage their natural resources. In the process, he set up several models of rural development. Gangavane found that the rate at which people migrated out of the Konkan was very high, despite the fact that the area was rich in natural resources. He studied the area and realised that land improvement and watershed development were key issues. He conducted a series of experiments in agriculture, dairy and poultry farming before setting up the Gokul Prakalp Pratishthan (GPP) in 1978. With the Maharashtra government's comprehensive watershed management programme (COWDEP), Gangavane's &lt;em&gt;Pratishthan&lt;/em&gt; afforested 400 hectares of land in Vilye village with mango and cashew trees. Gangavane then acquired 40 acres of wasteland in the village and built water conservation structures called Gokul bandharas. This resulted in the wells in the area being recharged and ensured enough drinking water for 25 families.This model was later adopted by the Indo-German Watershed Programme.&lt;/p&gt;
&lt;p&gt;When Gangavane's project began, the village of Vilye was bereft of young people. Its young had migrated. Now there is reverse migration and 3,000 people have benefited from the programme. The village has been transformed — water runoff has been arrested and afforestation has changed the look of the village.&lt;/p&gt;
&lt;p&gt;After the watershed programme, Gangavane formulated a theoretical plan for model villages called the Gokul project. The aim was communication and knowledgesharing. A participatory rural appraisal is also done to explore natural resource availability, potential and use. The awareness is meant to empower people and convince them that watershed programmes can address problems of poverty and inequity. Gangavane believes that with this knowledge, and with the resources available, a small family in the area can live sustainably.&lt;/p&gt;
&lt;p&gt;Gangavane's Pratishthan has set up an Ashramshaala at Laanja, Ratnagiri district, which is a tribal residential school, where 300 children are provided free boarding and lodging up to the secondary level. GPP has also introduced computer education in schools. For his work Gangavane was awarded the Vanashree award, Vasantrao Naik Pratisthan award and the Indira Priyadarshini Vrikshamitra award.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/konkan-corridor-project" class="internal-link" title="Konkan Corridor Project"&gt;Download the presentation here&lt;/a&gt; [PDF, 228 KB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/talk-by-vasant-gangavane'&gt;https://cis-india.org/internet-governance/talk-by-vasant-gangavane&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2012-04-13T13:49:32Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-telegraph-november-27-2014-know-thy-selfie">
    <title>Know thy selfie</title>
    <link>https://cis-india.org/internet-governance/news/the-telegraph-november-27-2014-know-thy-selfie</link>
    <description>
        &lt;b&gt;The trend of clicking selfies is not a mere self-indulgent fad. It's a modern form of peer validation that helps in building a social bond, say Prasun Chaudhuri and Sharmistha Ghosal&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.telegraphindia.com/1141127/jsp/you/19090394.jsp"&gt;published in the Telegraph&lt;/a&gt; on November 27, 2014. Nishant Shah and Rohini Lakshane were quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Ever since her father  gifted her an expensive smartphone, Anwesha   Ray, a third year student at a Calcutta college, can't stop clicking  selfies. First, she started uploading selfies on her Facebook page once a  week. But the growing number of 'likes' inspired her to capture more  images. Now she clicks at least five pictures a day and changes her  profile picture at least twice a week. She deletes a picture within  hours if it fails to garner at least 200 'likes' from over 4,000  friends.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rohit Chattopadhyay, a third year student at an engineering college  in south Calcutta, mastered the art of taking selfies and editing them  courtesy Instagram. He uploads at least a couple of self-portraits a  day. Sometimes he works well past midnight chasing that "perfect" shot.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aliah Shamim, a second year student at a top Calcutta college, loves  to click selfies with friends and family. However, she shares them only  with her close contacts on Facebook and WhatsApp.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Welcome to the world of selfie-engrossed teenagers ready to do  anything to get that perfect self-portrait. In every college you'll find  students who are mad about selfies. Anwesha knows her obsession leads  to her "wasting a lot of time", but she can't kick her habit of clicking  selfies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I simply love those 'likes' on Facebook. It gives me a feeling of  deja vu. I feel as if I'm a celebrity," she says a tad sheepishly. "Just  imagine how many admirers I have," says Rohit proudly showing a  particular top shot of his face which has garnered 602 'likes'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Are these students really being too self indulgent? Or is it just  their way of getting endorsement of their self worth? Dr Shefali Batra,  founder, Mind Frames, a psychiatric clinic in Mumbai, feels the act of  taking selfies is a way of feeling "empowered" as students attempt to  compensate for their lack of self worth in the real world. According to  her, the selfie obsession borders on narcissism — an excessive interest  in or admiration of oneself and one's physical appearance — and clouds  their judgement; they fail to see the real world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She is worried because she's been getting quite a few teen patients  who are obsessed with selfies. Although not as extreme as a 15-year-old  girl from Philippines who died after falling down the stairs while  taking a selfie or a Russian teen who plunged to his death after trying  to take a selfie atop a railway bridge, she is scared the trend might  catch on in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Calcutta-based psychiatrist J.R. Ram too is concerned about the  increasing number of selfie-obsessed teens in his clinic. He says, "Last  week, I met a 13-year-old girl who stole money to get a haircut like  pop singer Rihanna. Her parents were worried but she was nonchalant as  her portrait got 167 'likes' on a social networking site."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Ram, selfies are the modern day equivalent of a  reflection in a pool which led mythological Greek hunter Narcissus to  drown in a stream as he was enamoured of his own image.  "The virtual  image is more important to these teenagers than the real one," he avers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Agrees Rima Mukherjee, a psychiatrist based in Calcutta. "Virtual  appreciation means a lot to these kids and it doesn't matter if most of  the 'likes' they get on social networking sites are fake," she says.  According to her, the trend is pushing some youths to compete with their  friends to garner more 'likes'. "If a friend's picture gets more  'likes' students feel compelled to go on an overdrive to shoot and  upload more selfies," she notes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Take the case of Ashmita Dasgupta. "I make it a point to score  quality 'likes,' unlike Anwesha [her classmate]. I don't go on adding  random friends to maximise the 'likes'," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As an associate dean at Praxis B-school, Calcutta, Charanpreet Singh  has a ringside view of student behaviour and activities. He says, "These  kids do have a large network of friends but the relationships are very  superficial. The so-called 'likes' don't come from the heart and mean  nothing." He's also observes that those students who don't have many  real world friends are more active on social networking sites. "They vie  for appreciation out of emotional insecurity."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some argue that this trend of clicking and uploading selfies has been  fuelled by the celebrity culture. Says Aroona Broota, a former  professor of psychology in Delhi University, "Some teenagers are  inspired by celebs who frequently click selfies to promote themselves.  The kids fail to understand that for the celebrities it's a shrewd way  of marketing themselves or advertising a product." Also, for some,  clicking selfies has become an escape route from the daily drudgery and  frustrations that one face in real life such as scoring low marks in  exams, having no job or other personal problems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But not all psychiatrists or psychologists feel that the trend is  scary. Zena Deb, a Calcutta-based clinical psychologist, finds nothing  wrong with students clicking selfies unless their obsession leads them  to taking risks such as shooting from the top of a building or a cliff.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deb, a mother of an 18-year-old girl says, "Most do this to seek  attention and get some validation from peers. It doesn't matter if one  is ugly or pretty — you can seek a certificate for your self-worth and  you get it so easily on a social network." For a teenager such 'peer  review' is of utmost importance and it must not be confused with  narcissism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ali Khwaja, founder of counselling centre Banjara Academy, Bangalore,  too feels narcissism is too strong a word to describe the trend. "With a  strong medium at their disposal they want to spread the message that  they want to be different, creative and adventurous. They hope to expand  their contacts and create an identity," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah, co-founder of the Centre for Internet and Society,  Bangalore, feels the act of taking selfies is a networking phenomena. He  says, "These are meant for creating interesting routes of connectivity  with a photographic object that goes beyond individualistic  relationships. It forms social and cultural capital for youths."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rohini Lakshané, a researcher at the CIS, believes we are living in  times where users of social media, especially "digital natives" find it  rewarding to constantly promote themselves in their chosen ways and  forms through these channels. She says, "The selfie often circumvents  the artistic pursuit of making a self portrait. Instead it tries to make  a spectacle or testimony that the selfie-taker was indeed present at a  certain place, at a certain time, in a certain attire or mood, and  (perhaps) in the company of certain people." According to her,  selfie-takers enjoy control over how the photos turn out to be, how they  look in the photo, and the time and social network in which such a  photo is published —  all of which are 'advantages' over having someone  else take their photos or being shot candidly. She adds, "While I would  consider the act of taking several selfies self-indulgent, I am not sure  if it qualifies as narcissistic."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They have the tools of self-expression which their parents didn't  have, says Kaustuv Sengupta, a youth trend analyst and an associate  professor at NIFT, Bangalore. "This is a more expressive generation  which wants to become more visible," he says. As a panel member of a  youth survey — called Millennial Paradox — conducted by Titan Industries  last year, he found that despite the unprecedented levels of  self-obsession and independence, India's millennnials (21-35 year old)  do not operate in isolation — they have a strong desire to share and  belong to a community. "Sharing has become the principle form of  validation....everything requires endorsement — whether that takes the  form of a 'friend' a 'like' or even a 'retweet", concludes the survey,  describing the new trend as "collective individualism".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the current generation of digital natives, endorsements in the  virtual world matter more than the feedback they get from the real  world, says Dr Subhrangshu Aditya, a student counsellor at Jadavpur  University. "The real world — parents, guardians and other authorities —  doesn't approve of the 'Kiss of Protest' movement against moral  policing, but it is appreciated by their virtual friends," he observes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah of CIS points out that social media are a potent tool  for today's youngsters. These can be used as a political weapon when  they identify crises in their immediate environment. And all the recent  movements across the world — anti-corruption or the post-gangrape  protests in India, occupy Wall Street in the US or Shahbag protests —  have originated in the digital world. More power to the social media, we  say.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-telegraph-november-27-2014-know-thy-selfie'&gt;https://cis-india.org/internet-governance/news/the-telegraph-november-27-2014-know-thy-selfie&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-08-05T01:23:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/killing-the-internet-oped">
    <title>Killing the Internet Softly with Its Rules</title>
    <link>https://cis-india.org/internet-governance/blog/killing-the-internet-oped</link>
    <description>
        &lt;b&gt;While regulation of the Internet is a necessity, the Department of IT, through recent Rules under the IT Act, is guilty of over-regulation. This over-regulation is not only a bad idea, but is unconstitutional, and gravely endangers freedom of speech and privacy online.&lt;/b&gt;
        
&lt;div class="visualClear"&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;A slightly modified version of this blog entry was published as &lt;/span&gt;&lt;a class="external-link" href="http://www.indianexpress.com/story-print/787789/"&gt;an op-ed in the Indian Express on May 9, 2011&lt;/a&gt;&lt;span class="Apple-style-span"&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;h2&gt;Over-regulation of the Internet&lt;br /&gt;&lt;/h2&gt;
&lt;div class="visualClear"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;Regulation of the Internet, as with
regulation of any medium of speech and commerce, is a balancing act.
Too little regulation and you ensure that criminal activities are
carried on with impunity; too much regulation and you curb the
utility of the medium.  This is especially so with the Internet, as
it has managed to be the impressively vibrant space it is due to a
careful choice in most countries of eschewing over-regulation. 
India, however, seems to be taking a different turn with a three sets
of new rules under the Information Technology Act.&lt;/p&gt;
&lt;p&gt;These rules deal with the liability of
intermediaries (i.e., a large, inclusive, group of entities and
individuals, that transmit and allow access to third-party content),
the safeguards that cybercafes need to follow if they are not to be
held liable for their users' activities, and the practices that
intermediaries need to follow to ensure security and privacy of
customer data.&lt;/p&gt;
&lt;h3&gt;Effect of not following the rules&lt;/h3&gt;
&lt;p&gt;By not observing any of the provisions
of these Rules, the intermediary opens itself up for liability for
actions of its users.  Thus, if a third-party defames someone, then
the intermediary can be held liable if he/she/it does not follow the
stringent requirements of the Rules.&lt;/p&gt;
&lt;p&gt;The problem, however is that, many of
the provisions of the Rules have no rational nexus with the due
diligence to be observed by the intermediary to absolve itself from
liability.&lt;/p&gt;
&lt;h3&gt;What does the Act require?&lt;/h3&gt;
&lt;p&gt;Section 79 of the IT Act states that
intermediaries are generally not liable for third party information,
data, or communication link made available or hosted.  It qualifies
that by stating that they are not liable if they follow certain
precautions (basically, to show that they are &lt;em&gt;real&lt;/em&gt;
intermediaries).  They observe 'due diligence' and don't exercise an
editorial role; they don't help or induce  commission of the unlawful
act; and upon receiving 'actual knowledge', or on being duly notified
by the appropriate authority, the intermediary takes steps towards
some kind of action.&lt;/p&gt;
&lt;p&gt;So, rules were needed to clarify what
'due diligence' involves (i.e., to state that no active monitoring is
required of ISPs), what 'actual knowledge' means, and to clarify what
happens in happens in case of conflicts between this provision and
other parts of IT Act and other Acts.&lt;/p&gt;
&lt;h3&gt;Impact on freedom of speech and privacy&lt;/h3&gt;
&lt;p&gt;However, that is not what the rules do.
 The rules instead propose standard terms of service to be notified
by all intermediaries.  This means everyone from Airtel to Hotmail to
Facebook to Rediff Blogs to Youtube to organizations and people that
allow others to post comments on their website.  What kinds of terms
of service?  It will require intermediaries to bar users from
engaging in speech that is disparaging', It doesn't cover only
intermediaries that are public-facing.  So this means that your
forwarding a joke via e-mail, which "belongs to another person
and to which the user does not have any right" will be deemed to
be in violation of the new rules.&amp;nbsp; While gambling (such as betting on
horses) isn’t banned in India and casino gambling is legal in Goa,
for example, under these Rules, all speech ‘promoting gambling’
is prohibited.&lt;/p&gt;
&lt;p&gt;The rules are very onerous on
intermediaries, since they require them to act within 36 hours to
disable access to any information that they receive a complaint
about.  Any 'affected person' can complain.  Intermediaries will now
play the role that judges have traditionally played. Any affected
person can bring forth a complaint about issues as diverse as
defamation, blasphemy, trademark infringement, threatening of
integrity of India, 'disparaging speech', or the blanket 'in
violation of any law'.  It is not made mandatory to give the actual
violator an opportunity to be heard, thus violating the cardinal
principle of natural justice of 'hearing the other party' before
denying them a fundamental right.  Many parts of the Internet are in
fact public spaces and constitute an online public sphere.  A law
requiring private parties to curb speech in such a public sphere is
unconstitutional insofar as it doesn't fall within Art.19(2) of the
Constitution.&lt;/p&gt;
&lt;p&gt;Since intermediaries would lose
protection from the law if they don't take down content, they have no
incentives to uphold freedom of speech of their users.  They instead
have been provided incentives to take down all content about which
they receive complaints without bothering to apply their minds and
coming to an actual conclusion that the content violates the rules.&lt;/p&gt;
&lt;h3&gt;Cybercafe rules&lt;/h3&gt;
&lt;p&gt;The cybercafe rules require all
cybercafe customers be identified with supporting documents, their
photographs taken, all their website visit history logged, and these
logs maintained for a year.  Compare this to the usage of public
pay-phones.  Anyone can use a pay-phone without their details being
logged.  Indeed, such logging allows for cybercafe owners to
blackmail their users if they find some embarrassing websites in the
history logs—which could be anything from medical diseases to
sexual orientation to the fact that you're a whistleblower.&lt;/p&gt;
&lt;p&gt;The cybercafe rules also require that
all of them install "commercially available safety or filtering
software" to prevent access to pornography.  In two cases along
these lines in the Madras High Court (&lt;em&gt;Karthikeyan R.&lt;/em&gt; v. &lt;em&gt;Union
of India&lt;/em&gt;) and the Bombay High Court (&lt;em&gt;Janhit Manch &lt;/em&gt;v.
&lt;em&gt;Union of India&lt;/em&gt;), the High Courts refused to direct the
government to take proactive steps to curb access to Internet
pornography stating that such matters require case-by-case analysis
to be constitutionally valid under Art.19(1)(a) [Right to freedom of
speech and expression].&lt;/p&gt;
&lt;p&gt;Such software tends to be very
ineffective—non-pornographic websites also get wrongly filtered,
and not all pornographic websites get filtered—and the High Courts
were right in being wary of any blanket ban. They preferred for
individual cases to be registered.  If the worry is that our children
are getting corrupted, it is up to parents to provide supervision,
and not for the government to insist that software do the parenting
instead.&lt;/p&gt;
&lt;p&gt;Given that all of these were pointed
out by both civil society organizations, news media, and industry
bodies, when the draft rules were released, it smacks of governmental
high-handedness that almost none of the changes suggested by the
public have been incorporated in the final rules.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/killing-the-internet-oped'&gt;https://cis-india.org/internet-governance/blog/killing-the-internet-oped&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2011-08-20T12:51:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project">
    <title>Kick Off Meeting for the Politics of Data Project</title>
    <link>https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project</link>
    <description>
        &lt;b&gt;Tactical Technology Collective (TTC) on December 7 and 8, 2015 organized this event in Phnom Penh. Amber Sinha participated in it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The areas TTC is planning to focus on in the Politics of Data project include:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Politics of Data: exploring questions about what it means to live in a data society and how it impacts our autonomy and privacy. Me and My Shadow is one of the projects under Politics of Data that looks at the digital traces that we leave behind and how these pieces of information are created, stored and collected. It provides people with resources to learn about how these digital traces can create stories or profiles about you, and how to minimise your digital traces online.&lt;/li&gt;
&lt;li&gt;Digital Security and Privacy: through this programme, they intend to work with rights advocates, journalists, activists and others to build their digital security skills.&lt;/li&gt;
&lt;li&gt;Exposing and Shaping Issues: this part of the programme will explore new forms of finding, creating and representing evidence by advocacy and activist groups and individuals.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The meetings saw participation from a host of organisations in Asia including Bytes for All, Cambodian Center for Human Rights, OpenNet, Community Legal Education Center, Engage Media, iPlural and Mido.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project'&gt;https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-12T16:42:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/keeping-it-private">
    <title>Keeping it Private</title>
    <link>https://cis-india.org/internet-governance/keeping-it-private</link>
    <description>
        &lt;b&gt;As we disclose more information online, we must ask who might access it and why. This article by Nishant Shah was published in the Indian Express on Sunday, 15 January 2012. &lt;/b&gt;
        
&lt;p&gt;As a researcher of the blink-and-change cyberspaces, I am often asked 
about the future of all things digital. I generally refuse to answer 
such questions because researchers are happier talking about things past
 than things present. Also, when people ask questions of the future, 
they are more interested in gadgets and platforms. Will Facebook survive
 the next year? Will more people use Twitter? Is the mobile the new 
weapon of protest? Shall we all soon talk only on FaceTime? I shrug my 
shoulders at these questions. However private information and privacy 
ties all these questions.&lt;/p&gt;
&lt;p&gt;I pronounce that 2012 is going to be the year of Personal Information Management and the need for increased privacy, where more than anything else, people will realise that what they do online is not only significant to their present, but that it might bite them in their digital futures. We have heard stories that have hinted at management of information and reputations online. Young people put compromising pictures and videos online, severely damaging their social and professional relationships; people express opinions on public forums, which might not necessarily reflect them well; users reveal personal information, which can be abused by those with malice. These instances should remind us that unlike in the physical worlds, where our foot-in-the-mouth moments, youthful indiscretions or embarrassing behaviour quickly runs through the grapevine and is forgotten, in the digital worlds, the things that we say and do, stay long after we have forgotten them.&lt;/p&gt;
&lt;p&gt;And this is where privacy kicks in. Many people in India, when they encounter the idea of “privacy”, raise their eyebrows. Culturally, we are not very private people. We celebrate our triumphs and sorrows in public, freely part with information to strangers on train rides, and don’t have qualms asking about age, marital status or salary. In the age of ubiquitous computing, we must remember that once something has been committed to the online world, it will be etched somewhere and will be available for somebody else to look at. The internet, specially with increasing bandwidth, expanded spectrum and cloud-based distributed data storage, is an unforgiving space that never lets go.&lt;/p&gt;
&lt;p&gt;Privacy, in this brave new world, is not about disclosure. It is becoming increasingly clear that we will need to disclose more and more of our private information if we want services — from government public delivery systems to private credit and education — online. However, once we have disclosed our private information, then what? Who uses it? Who reads it? Who stores it for what purpose? What are the implications of having that private information out there?&lt;/p&gt;
&lt;p&gt;In the digital world, privacy is about having more control over the personal information that we have disclosed, the right to know who, where, when, how and for what purposes information that we have willingly disclosed is used. And as the country finalises privacy bills, this right of the individual, whose private information is going to feed government and business ecologies, is at stake.&lt;/p&gt;
&lt;p&gt;There is a need to institute better regulation around data protection, data mining, data retention and data retrieval that is still in the limbo in our country, at the mercy of privately crafted terms of service that we blindly accept while signing into the digital world.&lt;/p&gt;
&lt;p&gt;It is time to move away from understanding privacy as disclosure to privacy as control of information — to know who is doing what with your private information and how you should have a say in it. And it is time to realise that just because you don’t have anything to hide, does not mean that you need to be in a state of disclosure. There is a reason why you have curtains in your house, or do not allow strangers to look into your bags.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/keeping-it-private/899804/1"&gt;The article was originally published in the Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/keeping-it-private'&gt;https://cis-india.org/internet-governance/keeping-it-private&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-01-27T03:50:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-may-4-2017-aijaz-hussain-kashmir-telecom-firms-struggle-to-block-22-banned-social-media-sites">
    <title>Kashmir: Telecom firms struggle to block 22 banned social media sites</title>
    <link>https://cis-india.org/internet-governance/news/livemint-may-4-2017-aijaz-hussain-kashmir-telecom-firms-struggle-to-block-22-banned-social-media-sites</link>
    <description>
        &lt;b&gt;A BSNL official says engineers are still working on shutting down the 22 social media sites but so far had been unable to do so without freezing the Internet across Kashmir.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aijaz Hussain was &lt;a class="external-link" href="http://www.livemint.com/Politics/c7DaWt2HvT6AVJLo5XJV2I/Kashmir-Telecom-firms-struggle-to-block-22-banned-social-me.html"&gt;published in Livemint&lt;/a&gt; on May 4, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The government has banned 22 social media sites in an effort to calm  tensions in parts of the disputed region of Kashmir, after several viral  videos depicting the alleged abuse of Kashmiris by Indian law  enforcement fuelled protests. But the sites remained online Thursday  morning as the local telecom company struggled to block them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government said on Wednesday that the restrictions, to be in  effect for one month, were necessary for public safety. “It’s being felt  that continued misuse of social networking sites and instant messaging  services is likely to be detrimental to the interests of peace and  tranquillity in the state,” the public order reads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh  Prakash, policy director for the Indian advocacy group the Centre for  Internet and Society, called the ban a “blow to freedom of speech” and  “legally unprecedented in India.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An official with Kashmir’s  state-owned telecom company, Bharat Sanchar Nigam Ltd (BSNL), said  engineers were still working on shutting down the 22 sites, including  Facebook and Twitter, but so far had been unable to do so without  freezing the internet across the Himalayan region. The official spoke on  condition of anonymity, because he was not authorized to give technical  details of the effort to the media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, 3G and 4G cellphone service has been suspended for more than a week, but the slower 2G service was still running.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Residents  in Srinagar, the region’s main city, were busily downloading documents,  software and applications onto their smartphones, which would likely be  able to circumvent the social media block once it goes into effect.  Many expressed relief to still have internet access Thursday morning.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It  was a welcome surprise,” said Tariq Ahmed, a 24-year-old university  student. “It appears they’ve hit a technical glitch to block social  media en mass.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the government has halted internet service  in Kashmir in previous attempts to prevent anti-India demonstrations,  this is the first time they have done so in response to the circulation  of videos and photos showing alleged military abuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others mocked  the government. One Facebook post by Kashmiri writer Arif Ayaz Parrey  said that the ban showed “the Indian government has decided to take on  the collective subversive wisdom of cyberspace humanity.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kashmiris  have been uploading videos and photos of alleged abuse for some years,  but several recently posted clips, captured in the days surrounding a  violence-plagued local election 9 April, have proven to be especially  powerful and have helped to intensify anti-India protests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One  video shows a stone-throwing teenage boy being shot by a soldier from a  few metres (yards) away. Another shows soldiers making a group of young  men, held inside an armoured vehicle, shout profanities against Pakistan  while a soldier kicks and slaps them with a stick. The video pans to a  young boy’s bleeding face as he cries. Yet another clip shows three  soldiers holding a teenage boy down with their boots and beating him on  his back.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The video that drew the most outrage was of young shawl  weaver Farooq Ahmed Dar tied to the hood of an army jeep as it patrolled  villages on voting day. A soldier can be heard saying in Hindi over a  loudspeaker, “Stone throwers will meet a similar fate,” as residents  look on aghast.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-may-4-2017-aijaz-hussain-kashmir-telecom-firms-struggle-to-block-22-banned-social-media-sites'&gt;https://cis-india.org/internet-governance/news/livemint-may-4-2017-aijaz-hussain-kashmir-telecom-firms-struggle-to-block-22-banned-social-media-sites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2017-05-04T02:29:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-august-29-2019-aayush-rathi-and-akriti-bopanna-kashmirs-information-vacuum">
    <title>Kashmir’s information vacuum</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-august-29-2019-aayush-rathi-and-akriti-bopanna-kashmirs-information-vacuum</link>
    <description>
        &lt;b&gt;Legislative backing is being appropriated to normalise communication shutdowns.&lt;/b&gt;
        &lt;p class="drop-caps" style="text-align: justify; "&gt;The article by Aayush Rathi and Akriti Bopanna was &lt;a class="external-link" href="https://www.thehindu.com/opinion/op-ed/kashmirs-information-vacuum/article29282096.ece"&gt;published in the Hindu&lt;/a&gt; on August 29, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="drop-caps" style="text-align: justify; "&gt;On August 4, around midnight, &lt;a href="https://www.thehindu.com/tag/134-81/jammu-and-kashmir/?utm=bodytag" target="_blank"&gt;Jammu and Kashmir &lt;/a&gt;was thrust into a near total communication shutdown. In the continuing aftermath of the dilution of Article 370, cable television, cellular services, landline and Internet and even the postal services have been rendered inoperational. Even hospitals and fire stations have not been spared. While law enforcement personnel have been provided satellite phones, locals are having to queue up outside designated government offices and register the numbers they want to call. The blackout is all encompassing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The erstwhile State of Jammu and Kashmir is accustomed to the flicking on of the “Internet killswitch”, but this indiscriminate embargo is unprecedented. The blocking of multi-point/two-way communication is quite frequent in Kashmir, with close to 55 instances of partial or complete Internet shutdowns being recorded just this year. Of the 347 cases of shutdown that have been imposed in India since 2012, 51% have been in Kashmir. The blocking of one-way communication media, such as cable television, however, is new. Even the measures adopted during the Kargil war in 1999 stopped short of blocking telephone lines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Appearing for the incumbent government on a petition challenging the communications shutdown in Kashmir, the Attorney General of India, K.K. Venugopal, made the necessary-for-law-and-order argument.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, recent research by Jan Rydzak looking exclusively at network shutdowns in India has shown no evidence backing this claim. On the contrary, network shutdowns have been shown to compel actors wanting to engage in collective action to substitute non-violent mobilisation for more violent means as the latter requires less coordination.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;In dubious company&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Network shutdowns have a limited and inconsistent effect on even structured, non-violent protests. Cross-country comparative research indicates that the shutdown of communication for achieving objectives of social control is usually the riposte of authoritarian regimes. The shroud of secrecy it creates allows for further controversial measures to be effected away from public scrutiny. Authoritarian regimes masquerading as liberal democracies are following suit. In 2016, the Turkish government had ordered the shutdown of over 100 media companies in the aftermath of a failed military coup. Earlier this year, Joseph Kabila’s government in the Democratic Republic of Congo had shut down Internet and SMS services for three weeks under the pretext of preventing the circulation of fake election results.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Venugopal further reassured the Supreme Court that the residents of Kashmir would experience the least amount of inconvenience. This line assumes that the primary use of telecommunication networks is for supposedly banal interpersonal interaction. What is forgotten is that these networks function both as an “infrastructure” and as medium of communication. Impacting either function has dire and simultaneous consequences on its use as the other. As an infrastructure, they are akin to a public utility and are foundational to the operation of critical systems such as water supply and finance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the Kashmir Valley, over half the business transactions are said to happen online. The payment of wages for the government-run employment guarantee scheme for unskilled manual labour is almost entirely made electronically — 99.56% in Jammu and Kashmir. The reliance on the Internet for bank-related transactions has meant that automated teller machines and banks are inoperative. What is telling is that the increasing recourse to network shutdowns as a law and order tool in India is also happening simultaneously with the government’s digitisation drive. Information flows are being simultaneously facilitated and throttled.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Ambiguous backing&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Moreover, communication shutdowns have ambiguous legal backing. One approach imposes them as an order passed under Section 144 of the Code of Criminal Procedure. A colonial relic, Section 144 is frequently used for the imposition of curfew in ‘sensitive’ areas as a preventive measure against public demonstrations. This approach lacks procedural accountability and transparency. Orders are not mandated to be publicly notified; they do not identify the duration of the lockdown or envision an appeal mechanism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps realising these challenges, the Temporary Suspension of Telecom Services (Public Emergency or Public Safety) Rules, 2017, notified under the Telegraph Act, do incorporate a review mechanism. However, reviewing officials do not have the authority to revoke a shutdown order even if it is deemed illegal. The grounds for effectuating any shutdown also have not been elaborated other than for ‘public emergency’ or ‘public safety’ — both these terms are undefined. Legislative backing, then, is being appropriated to normalise, not curb, communication shutdowns. Tellingly, the owner of an Internet service provider in Kashmir pointed out that with Internet shutdowns becoming so common, often the shape that an order takes is of a call from a government official, while the procedural documentation follows much later.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Treated as collateral damage in imposing communication blackouts are the fundamental freedoms of speech and expression, trade, and also of association. The imposition of Section 144 along with the virtual curfew is designed to restrict the freedom to assemble peacefully. Such preemptive measures assume that any assembly will be violent along with negating the potential utility of technological means in maintaining social order (such as responsible digital journalism checking the spread of rumours).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most critically, this enables a complete information vacuum, the only salve from which is information supplied by the suppressor. Of the days leading up to August 5 and the days since, sparse information is publicly available. Local newspaper outlets in Kashmir are inoperational. This lack of information necessarily precludes effective democratic participation. Beneath the national security sentiments, a key motivation for network shutdown presents itself: that of political &lt;a href="https://www.thehindu.com/tag/1351-1349/censorship/?utm=bodytag" target="_blank"&gt;censorship &lt;/a&gt;through the criminalisation of dissent.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-august-29-2019-aayush-rathi-and-akriti-bopanna-kashmirs-information-vacuum'&gt;https://cis-india.org/internet-governance/blog/the-hindu-august-29-2019-aayush-rathi-and-akriti-bopanna-kashmirs-information-vacuum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Akriti Bopanna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-09-02T04:34:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/r-karthikeyan-v-union-of-india">
    <title>Karthikeyan R v Union of India</title>
    <link>https://cis-india.org/internet-governance/resources/r-karthikeyan-v-union-of-india</link>
    <description>
        &lt;b&gt;The court refused to direct the government to take proactive steps to curb access to Internet pornography stating that such matters require case-by-case analysis to be constitutionally valid under Article 19(1)(a) (Right to Freedom of Speech and Expression).&lt;/b&gt;
        
&lt;h2&gt;IN THE HIGH COURT OF JUDICATURE AT MADRAS&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;DATED :01-04-2010&lt;br /&gt;CORAM&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;THE HONOURABLE MR. JUSTICE ELIPE DHARMA RAO&lt;/strong&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AND&lt;br /&gt;&lt;strong&gt;THE HONOURABLE MR. JUSTICE K.K. SASIDHARAN&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;WRIT PETITION NO.20344 OF 2009 and M.P.No.l of 2009&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Karthikeyan. R.&lt;br /&gt;Advocate&amp;nbsp;&amp;nbsp;&amp;nbsp; .. Petitioner&lt;br /&gt;Vs.&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Union of India,&lt;br /&gt;Rep. by its Secretary, &lt;br /&gt;Department of Telecommunications, &lt;br /&gt;Sanchar Bhavan, &lt;br /&gt;20, Ashoka Road, &lt;br /&gt;New Delhi 110 001.&lt;/li&gt;&lt;li&gt;The Secretary,&lt;br /&gt;Department of Information Technology, &lt;br /&gt;Electronics Niketan,No.6, CGO Complex, &lt;br /&gt;Lodhi Road, New Delhi 110 003.&lt;/li&gt;&lt;li&gt;The Secretary, &lt;br /&gt;Department of Legal Affairs,&lt;br /&gt;4th Floor, A-Wing, Shastri Bhavan, &lt;br /&gt;New Delhi 110 001.&lt;/li&gt;&lt;li&gt;The Telecom Regulatory Authority of India, &lt;br /&gt;Rep. by its Secretary,&lt;br /&gt;Mahanagar Doorsanchar Bhawan, &lt;br /&gt;Jawaharlal Nehru Marg, New Delhi 110 002.&lt;/li&gt;&lt;li&gt;The Secretary,&lt;br /&gt;Department of Women and Child Development, &lt;br /&gt;New Delhi.&lt;/li&gt;&lt;li&gt;State of Tamil Nadu, &lt;br /&gt;Rep. by its Secretary,&lt;br /&gt;Ministry of Information Technology, &lt;br /&gt;Secretariat, Chennai 9. &lt;br /&gt;&lt;/li&gt;&lt;li&gt;The Asst. Commissioner of Police, &lt;br /&gt;Cyber Crime Wing, Central Crime Branch, &lt;br /&gt;Egmore, Chennai 8.&lt;/li&gt;&lt;li&gt;The Central Bureau of Investigation, &lt;br /&gt;Rep. by its Director,&lt;br /&gt;Block No.3, CGO Complex, Lodhi Road, &lt;br /&gt;New Delhi 110 003.&lt;/li&gt;&lt;li&gt;Internet Service Provider's Association of India,&lt;br /&gt;612-A, Chiranjiv Tower, &lt;br /&gt;43, Nehru Place, &lt;br /&gt;New Delhi 110 019.&lt;/li&gt;&lt;li&gt;Google India Private Limited, &lt;br /&gt;No.3, RM2 Infinity Tower-E, &lt;br /&gt;Old Madras Road,&lt;br /&gt;Bangalore 560 016.&lt;/li&gt;&lt;li&gt;Yahoo Web Services India Private Limited,&lt;br /&gt;801, Nicholas Piramal Towers,&lt;br /&gt; Peninsula Corporate Park, &lt;br /&gt;Lower Prel, Mumbai 400 013.&lt;/li&gt;&lt;li&gt;Microsoft Corporation India Private Ltd., &lt;br /&gt;Tower-A, DLF Cyber Greens,&lt;br /&gt;DLF Cyber Citi, Sector 25A, &lt;br /&gt;Gurgaon 122 002.&lt;/li&gt;&lt;li&gt;Rediff.com India Limited, &lt;br /&gt;Mahalaxmi Engineering Estate, &lt;br /&gt;L.J. Road No.1, Mahim (West),&lt;br /&gt;Mumbai 400 016.&amp;nbsp;&amp;nbsp;&amp;nbsp; .. Respondents&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Petition filed under Article 226 of the Constitution of India for the 
issuance of Writ of Mandamus directing the respondents 1 to 4 to 
forthwith formulate censor rules and regulations and appoint a 
regulatory body to strictly enforce those rules monitoring online 
publications in internet, prohibiting obscene and pornographic 
publications and penalising the Internet Service Providers (ISPs) and 
search engine companies for offences and violations of licence 
conditions committed by them.&lt;/p&gt;
&lt;p&gt;
For Petitioner: Mr.P.T. Perumal&lt;/p&gt;
&lt;p&gt;For Respondents 1 to 5: Mr.J. Ravindran, Asst.Solicitor General of India&lt;/p&gt;
&lt;p&gt;For Respondents 6 &amp;amp; 7 : Mr. G. Desingu, Special Govt. Pleader&lt;/p&gt;
&lt;p&gt;For Respondent 8: Mr. N. Chandrasekaran, Special Govt. Pleader&lt;/p&gt;
&lt;p&gt;
For Respondent 10: Mr. G. Balasubramanian for M/s. Poovayya &amp;amp; Co.&lt;/p&gt;
&lt;p&gt;Respondents 9,11 to l3: No Appearance&lt;/p&gt;
&lt;h3&gt;ORDER&lt;/h3&gt;
&lt;div align="left"&gt;(Order of the Court was made by ELIPE DHARMA RAO, J)&lt;/div&gt;
&lt;ol&gt;&lt;li&gt;Heard the learned counsel appearing for the parties.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;The present writ petition has been filed in public interest for 
the issuance of Writ of Mandamus directing the respondents 1 to 4 to 
forthwith formulate censor rules and regulations and appoint a 
regulatory body to strictly enforce those rules monitoring online 
publications in internet, prohibiting obscene and pornographic 
publications and penalising the Internet Service Providers (ISPs) and 
search engine companies for offences and violations of licence 
conditions committed by them.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Though no counter affidavit has been filed on behalf of 
Respondents 1 to 5, the learned Assistant Solicitor General by placing 
reliance upon a recent unreported decision of the Mumbai High Court in 
Janhit Manch and Others v. Union of India IPI1 No. 155 of 2009), 
disposed of on 3.3.2010, submitted that the prayer in the writ petition 
before the Mumbai High Court is very much similar to the present writ 
petition and, as has been observed in the said decision, the present 
writ petition may also be disposed of.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;We have carefully gone through the aforesaid decision relied on by
 the learned Assistant Solicitor General of India. In the said decision,
 the prayer made by the petitioners therein was to direct the 
respondents therein to make co-ordinated and sustained efforts, to have a
 blanket ban on websites which according to them are displaying material
 pertaining to sex and harmful to the youth of the country. The Division
 Bench, after hearing the contentions made on either side, observed as 
follows :&lt;br /&gt;&lt;br /&gt;"By the present petition what the petitioner seeks is that this court 
which is a protector of free speech to the citizens of this country, 
should interfere and direct the respondents to make a coordinated and 
sustained efforts to close down the websites as aforestated. Once 
Parliament, in its wisdom has enacted a law and has provided for the 
punishment for breach of that law any citizen of this country including 
the Petitioner who is aggrieved against any action on the part of any 
other person which may amount to an offence has a right to approach the 
appropriate forum and lodge a complaint upon which the action can be 
taken if an offence is disclosed. Courts in such matters, the guardian 
of the freedom of free speech, and more so a constitutional court should
 not embark on an exercise to direct State Authorities to monitor 
websites. If such an exercise is done, then a party aggrieved depending 
on the sensibilities of persons whose views may differ on what is 
morally degrading or prurient will be sitting in judgment, even before 
the aggrieved person can lead his evidence and a competent court decides
 the issue. The Legislature having enacted the law a person aggrieved 
may file a complaint.&lt;br /&gt;&lt;br /&gt;In the light of that we are not inclined to interfere in the exercise of
 our extra-ordinary jurisdiction. If the petitioner comes across any 
website/s which according to him publishes or transmits any act which 
amounts to offence under section 67 or 67A of the Information Technology Act, 2000, it is upto him to file a complaint.&lt;br /&gt;&lt;br /&gt;With the above observations, Petition disposed of."&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;From the facts of the Janhit Manch case and the observations made 
therein, we are of the considered opinion that the ratio of the said 
decision squarely applicable to the facts of the present case inasmuch 
as in the present writ petition the relief sought for by the petitioner 
is to strictly enforce the rules monitoring online publications in 
internet and punish the persons violating such rules, which is 
indirectly made in the Janhit Manch case. Therefore, applying the ratio 
of the aforesaid decision, the present writ petition is disposed of. 
Moreover, we make it clear that if any complaint is made against the 
publishing or transmitting any obscene or pornographic publications, 
necessary steps should be taken by the respondents in accordance with 
law.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;The writ petition is disposed of with the above observations. No 
costs. Consequently, the connected miscellaneous petition is closed.&lt;br /&gt;&lt;br /&gt;With the above observations, Petition disposed of."&lt;br /&gt;Sd/&lt;br /&gt;Asst.Registrar&lt;br /&gt;/true copy/&lt;br /&gt;Sub Asst.Registrar&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;
To&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;The Secretary, &lt;br /&gt;
Union of India,&lt;br /&gt;
Department of Telecommunications, &lt;br /&gt;
Sanchar Bhavan, 20, Ashoka Road, &lt;br /&gt;
New Delhi 110 001.&lt;/li&gt;&lt;li&gt;The Secretary, &lt;br /&gt;
Department of Information Technology, &lt;br /&gt;
Electronics Niketan,&lt;br /&gt;
No.6, CGO Complex, Lodhi Road, &lt;br /&gt;
New Delhi 110 003&lt;/li&gt;&lt;li&gt;The Secretary, &lt;br /&gt;
Department of Legal Affairs,&lt;br /&gt;
4th Floor, A-Wing, Shastri Bhavan, &lt;br /&gt;
New Delhi 110 001.&lt;/li&gt;&lt;li&gt;The Secretary,&lt;br /&gt;
The Telecom Regulatory Authority of Indie, &lt;br /&gt;
Mahanagar Doorsanchar Bhawan, &lt;br /&gt;
Jawaharlal Nehru Marg,New Delhi 110 002.&lt;/li&gt;&lt;li&gt;The Secretary,&lt;br /&gt;
Department of Women and Child Development, &lt;br /&gt;
New Delhi.&lt;/li&gt;&lt;li&gt;The Secretary, &lt;br /&gt;
State of Tamil Nadu,&lt;br /&gt;
Ministry of Information Technology, &lt;br /&gt;
Secretariat, Chennai 9.&lt;/li&gt;&lt;li&gt;The Asst. Commissioner of Police,&lt;br /&gt;
Cyber Crime Wing, Central Crime Branch, Egmore, Chennai 8.&lt;/li&gt;&lt;li&gt;The Director&lt;br /&gt;
Central Bureau of Investigation,&lt;br /&gt;
Block No.3, CGO Complex, Lodhi Road, New Delhi 110 003.&lt;br /&gt;
    &lt;br /&gt;
  &lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;
1 cc To M/s.P.T.Perumal i E.Bdwing, Advocates, SR.22010&lt;/p&gt;
&lt;p&gt;
1 cc To Mr.J.Ravindran, Asst.Solicitor, SR.22034&lt;/p&gt;
&lt;p&gt;
1 cc To M/s.Poovayya &amp;amp; Co., Advocates, SR.22221&lt;/p&gt;
&lt;p&gt;
1 cc To The Government Pleader, SR.21929&lt;/p&gt;
&lt;p&gt;
W.P.No.20344/2009&lt;br /&gt;GR(CO)&lt;/p&gt;
&lt;p&gt;srs 15/04/2010&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/r-karthikeyan-v-union-of-india'&gt;https://cis-india.org/internet-governance/resources/r-karthikeyan-v-union-of-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-01-18T11:51:59Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
