<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1396 to 1410.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/foss-a-free-open-internet-synergies-for-development"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/sustainable-development-goals-sdgs-and-internet-economy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-zero-draft-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icanns-didp-ii"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/enabling-multi-stakeholder-cooperation-towards-a-transnational-framework-for-due-process"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-amulya-gopalakrishnan-october-9-2015-dadri-reopens-debate-on-online-hate-speech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-october-8-2015-suhrith-parthasarathy-access-at-the-cost-of-net-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-register-september-29-2015-kieren-mccurthy-do-you-agree-with-our-fee-hike"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/understanding-and-mitigating-online-hate-speech-and-youth-radicalisation"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/foss-a-free-open-internet-synergies-for-development">
    <title>FOSS &amp; a Free, Open Internet: Synergies for Development</title>
    <link>https://cis-india.org/internet-governance/news/foss-a-free-open-internet-synergies-for-development</link>
    <description>
        &lt;b&gt;Internet Governance Forum (IGF) 2015 will be held at Jao Pessoa in Brazil from November 10 to 13, 2015. The theme of IGF 2015 is Evolution of Internet Governance: Empowering Sustainable Development. Civil Society is organizing a workshop on FOSS and a Free, Open Internet. The workshop will be held on November 13, 2015 from 2.00 p.m. to 3.30 p.m. Sunil Abraham and Pranesh Prakash will be speaking at this event.&lt;/b&gt;
        
&lt;p&gt;This was published on the &lt;a class="external-link" href="https://www.intgovforum.org/cms/wks2015/index.php/proposal/view_public/10"&gt;IGF website. &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;table style="text-align: justify;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;The workshop will explore links between the Free and Open nature of the Internet and the Free and Open Source Software through a series of experience sharing among the speakers as well as audiences. The speakers have been selected on the basis of their wide exposure and geographical and occupational diversity.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;As ICTs permeate lives of people around the  world, code is fast emerging as an instrument that can change lives. In  many parts of the world, the 4Rs of primary education are Reading,  wRiting, aRithmetic and pRogramming, indicative of the role that ICTs  will play in the future.&lt;br /&gt; &lt;br /&gt; Free and Open Source Software (FOSS) is, inter alia, a mechanism whereby  code, and consequently the ability to code, is being democratized. In  contrast with centralized proprietary models, FOSS allows decentralized  creation, distribution and maintenance of code. Such democratization  enables grassroots level application of code to solve local problems,  leading to more empowered communities. Free flow of code is therefore  important to ensure that communities to stay 'plugged in' and current.  Code also enables communities to side-step practices such as  surveillance, censorship.&lt;br /&gt; &lt;br /&gt; A Free, Open, Unfragmented Internet is of critical importance to  FOSS--without a free Internet, the FOSS-based peer-production  methodologies for code would be infeasible. Interestingly,  the Internet  also needs the innovations of FOSS to remain free &amp;amp; open, thus  forming a positive mutual dependency.&lt;br /&gt; &lt;br /&gt; Both FOSS and the Internet are at risk from forces that are seeking  increasing control over content and fragmentation, challenging its  openness. This would be inimical to the rights of present &amp;amp; future  generations to use technology to improve their lives.&lt;br /&gt; &lt;br /&gt; The Round-table seeks to highlight perspectives from the participants  about the future co-developemnt of FOSS and a free, open Internet; the  threats that are emerging; and ways for communities to surmount these.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;Name, stakeholder group, and organizational affiliation of workshop proposal co-organizer(s)&lt;/p&gt;
&lt;p&gt;Civil Society&lt;br /&gt; Technical Community&lt;br /&gt; Private Sector&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;Has the proposer, or any of the co-organizers, organized an IGF workshop before?&lt;/p&gt;
&lt;p&gt;yes&lt;/p&gt;
&lt;p class="title"&gt;The link to the workshop report&lt;/p&gt;
&lt;p&gt;http://wsms1.intgovforum.org/content/no80-steady-stepsfoss-and-mdgs&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;Subject matter #tags that describe the workshop&lt;/p&gt;
&lt;p&gt;#openInternet #foss #codefordev&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;Description of the plan to facilitate discussion amongst speakers, audience members and remote participants&lt;/p&gt;
&lt;p&gt;Besides specially identified resource persons, the Roundtable will  invite IGF participants who are part of FOSS communities around the  world (particularly Brazil, which has a vibrant FOSS community).  Participation will include real-time remote participation from FOSS  communities around the world, as well as Twitter and email-based  submission of ideas and thoughts.&lt;br /&gt; &lt;br /&gt; The Round-table format has been chosen for many-to-many interactions so  as to generate a wealth of ideas. No speaker shall speak for more than 5  minutes. Two moderators will guide discussions, and a rapporteur will  ensure that ideas are captured. The report of the Roundtable would be  posted to all participating communities so as to stimulate  grassroots-level action.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;Names and affiliations (stakeholder group, organization) of the participants in the proposed workshop&lt;/p&gt;
&lt;p&gt;Mr.Satish Babu, Technical Community, Director, International Centre  for FOSS, Trivandrum, India, who shall provide technical inputs of FOSS  and its relevance, particularly to emerging economies, Confirmed&lt;br /&gt; &lt;br /&gt; Ms. Judy Okite, Civil Society, FOSS Foundation for Africa, is an  experienced activist who has been promoting the use of FOSS in Africa.  Seeking funding at present.&lt;br /&gt; &lt;br /&gt; Ms. Mishi Choudhary, Private Sector, Software Freedom Law Centre, New  York, is a lawyer working with FOSS and its legal implications for over  two decades. Confirmed&lt;br /&gt; &lt;br /&gt; Mr. Fernando Botelho, Private Sector, heads F123 Systems, Brazil, a  FOSS-centric company that provides accessibility solutions to visually  impaired people. Confirmed&lt;br /&gt; &lt;br /&gt; Mr. Sunil Abraham, Centre for Internet and Society (CIS), Bangalore, a  civil society organization working on Internet and public policy.  Confirmed&lt;br /&gt; &lt;br /&gt; Mr. Pranesh Prakash, Centre for Internet and Society (CIS), Bangalore, a  civil society organization working on Internet and public policy.  Confirmed&lt;br /&gt; &lt;br /&gt; Ms. Nnenna Nwakanma- WWW.Foundation, a Civil Society organization  working in Africa on a broad range of areas including FOSS. Confirmed&lt;br /&gt; &lt;br /&gt; Mr. Yves MIEZAN EZO, Open Source strategy consultant, Private Sector. Seeking funding for participation. &lt;br /&gt; &lt;br /&gt; Mr. Harish Pillay, Private Sector,  RedHat Asia-Pacific. Seeking funding for participation. &lt;br /&gt; &lt;br /&gt; Corinto Meffe, Advisor to the President and Directors, SERPRO, Brazil. Confirmed&lt;br /&gt; &lt;br /&gt; Frank Coelho de Alcantara, Professor, Universidade Positivo, Brazil, Confirmed&lt;br /&gt; &lt;br /&gt; Ms. Caroline Burle, Institutional and International Relations, W3C  Brazil Office and Center of Studies on Web Technologies - CeWeb.br (a  CGI.br/NIC.br initiative). Confirmed&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;Name of in-person Moderator(s)&lt;/p&gt;
&lt;p&gt;Satish Babu, Mishi Choudhary&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;Name of Remote Moderator(s)&lt;/p&gt;
&lt;p&gt;Judy Okite&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;Name of Rapporteur(s)&lt;/p&gt;
&lt;p&gt;Pranesh Prakash&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;Description of the proposer's plans for remote participation&lt;/p&gt;
&lt;p&gt;Besides around 30 persons at the IGF, we will be providing wide  publicity for the workshop through FOSS communities and networks.  Besides live audio/video participation, Twitter shall be a key resource  for real-time participation. There shall be a Twitter co-ordinator  identified whose role will be to tweet the salient points at the  Roundtable periodically for the benefit of documenting and informing  interested communities.&lt;br /&gt; &lt;br /&gt; For those that have either technical difficulties or time-zone problems,  ideas and comments can be submitted by email before the workshop to the  moderators.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/foss-a-free-open-internet-synergies-for-development'&gt;https://cis-india.org/internet-governance/news/foss-a-free-open-internet-synergies-for-development&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>FOSS</dc:subject>
    
    
        <dc:subject>Open Source</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    

   <dc:date>2016-06-18T17:57:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/sustainable-development-goals-sdgs-and-internet-economy">
    <title>Sustainable Development Goals (SDGs) and Internet Economy</title>
    <link>https://cis-india.org/internet-governance/news/sustainable-development-goals-sdgs-and-internet-economy</link>
    <description>
        &lt;b&gt;Internet Governance Forum (IGF) 2015 will be held at Jao Pessoa in Brazil from November 10 to 13, 2015. The theme of IGF 2015 is Evolution of Internet Governance: Empowering Sustainable Development. Multistakeholder Advisory Group (MAG) is organizing a session on “Sustainable Development Goals (SDGs) and Internet Economy” on November 11, 2015 from 9.30 a.m. to 12.30 p.m. Sunil Abraham is participating in this session as a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The discussions at the IGF session aim to reflect the importance of Internet Economy and Internet Enablement for the fulfillment of different SDGs and also identify some best practices to inform policy makers on the ways in which Internet can serve broader and more strategic developmental objectives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The session will include discussions on the following :&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Vision toward 2030: Sustainable Development long term opportunities and challenges&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Internet Economy &amp;amp; Internet Role in Delivering the SDGs (Key opportunities &amp;amp; key Success Factors): Human Capital (a) Internet Entrepreneurship (b) Equality (c) ICT Capacity building: Applications (d) Right to Health, Education, timely Justice, environment protection, society engagement (e) Access to Information (f) Availability of Local Content Online (g) Intellectual Property Right: Access and Infrastructure - Internet Availability and Affordability: Policy and Regulatory Support and Business eco-system: To enable Access, Applications and Content development and usage, Entrepreneurship and Capacity building.&lt;/li&gt;
&lt;li&gt;Aligning the next phase of IGF with the SDGs /Post 2015 UN Develpment Agenda: Optimizing Eco System and Multistakeholder approach&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;About IGF 2015&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Internet Governance Forum (IGF) is a multistakeholder, democratic and transparent forum which facilitates discussions on public policy issues related to key elements of Internet governance. IGF provides enabling platform for discussions among all stakeholders in the Internet governance ecosystem, including all entities accredited by the World Summit on the Information Society (WSIS), as well as other institutions and individuals with proven expertise and experience in all matters related to Internet governance.&lt;br /&gt;&lt;br /&gt;After consulting the wider Internet community and discussing the overarching theme of the 2015 IGF meeting, the Multistakeholder Advisory Group decided to retain the title “Evolution of Internet Governance: Empowering Sustainable Development”. This theme will be supported by eight sub-themes that will frame the discussions at the João Pessoa meeting&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/sustainable-development-goals-sdgs-and-internet-economy'&gt;https://cis-india.org/internet-governance/news/sustainable-development-goals-sdgs-and-internet-economy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-16T15:40:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance">
    <title> Cyfy 2015: The India Conference on Cyber Security and Internet Governance</title>
    <link>https://cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance</link>
    <description>
        &lt;b&gt;In its third year, Cyfy; South Asia’s biggest internet policy conference is being held in New Delhi, from 14-16 October, 2015. The event is organized by Observer Research Foundation at Hotel Taj Mansingh. Sunil Abraham is a panelist in the session "Protection of Intellectual Property and Business Secrets in the Knowledge Economy".&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Building on its scope and scale of the previous year — over 55 speakers, from 12 countries, with 350 attendees — the conference discusses issues that affect the emerging world and developed world alike. The conversations will further and widen the debate around internet governance, security, surveillance, freedom of expression, norms of state behaviour, technology and specific societal challenges that emerging and developing countries seek to address by the effective design and deployment on these technologies. In 2015, Cyfy will bring together more experts from South Asia, in order to present new thought on the specific challenges of internet access, policy and regulation, e-governance, financial inclusion, and bottom of the pyramid solutions.&lt;/p&gt;
&lt;p&gt;Along with its growing network of both Indian and international partners, ORF looking forward to hosting another thought-provoking and productive few days, and bridging some digital divides in contemporary internet cyber policy debates.&lt;/p&gt;
&lt;h3&gt;Protection of Intellectual Property and Business Secrets in the Knowledge Economy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Over the past decade, there has been an exponential rise in cyber-enabled theft of intellectual property, and it has been recognized as an unfair predatory practice. With the rise of the globalized knowledge economy, the stability of open trading systems increasingly depends on cross-border IP protection. What is the relevance of the protection of intellectual property and business secrets for economic development and stability of the international trading system?&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cyfy-agenda" class="internal-link"&gt;&lt;b&gt;Download the agenda&lt;/b&gt; &lt;/a&gt;For more info visit &lt;a class="external-link" href="http://cyfy.org/"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance'&gt;https://cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-17T14:44:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-zero-draft-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10">
    <title>Comments on the Zero Draft of the UN General Assembly’s Overall Review of the Implementation of WSIS Outcomes (WSIS+10)</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-zero-draft-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10</link>
    <description>
        &lt;b&gt;On 9 October 2015, the Zero Draft of the UN General Assembly's Overall Review of implementation of WSIS Outcomes was released. Comments were sought on the Zero Draft from diverse stakeholders. The Centre for Internet &amp; Society's response to the call for comments is below.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;These comments were prepared by Geetha Hariharan with inputs from Sumandro Chattapadhyay, Pranesh Prakash, Sunil Abraham, Japreet Grewal and Nehaa Chaudhari. &lt;b&gt;Download the &lt;a href="https://cis-india.org/internet-governance/blog/comments-on-zero-draft-of-un-general-assembly.pdf" class="internal-link"&gt;comments here&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The Zero Draft of the UN General Assembly’s Overall Review of the Implementation of WSIS Outcomes (“Zero Draft”) is divided into three sections: (A) ICT for Development; (B) Internet Governance; (C) Implementation and Follow-up. CIS’ comments follow the same structure.&lt;/li&gt;
&lt;li&gt;The Zero Draft is a commendable document, covering crucial areas of growth and challenges surrounding the WSIS. The Zero Draft makes detailed references to development-related challenges, noting the persistent digital divide, the importance of universal access, innovation and investment, and of enabling legal and regulatory environments conducive to the same. It also takes note of financial mechanisms, without which principles would remain toothless. Issues surrounding Internet governance, particularly net neutrality, privacy and the continuation of the IGF are included in the Zero Draft.&lt;/li&gt;
&lt;li&gt;However, we believe that references to these issues are inadequate to make progress on existing challenges. Issues surrounding ICT for Development and Internet Governance have scarcely changed in the past ten years. Though we may laud the progress so far achieved, universal access and connectivity, the digital divide, insufficient funding, diverse and conflicting legal systems surrounding the Internet, the gender divide and online harassment persist. Moreover, the working of the IGF and the process of Enhanced Cooperation, both laid down with great anticipation in the Tunis Agenda, have been found wanting.&lt;/li&gt;
&lt;li&gt;These need to be addressed more clearly and strongly in the Zero Draft. In light of these shortcomings, we suggest the following changes to the Zero Draft, in the hope that they are accepted. &lt;br /&gt;A. ICT for Development&lt;/li&gt;
&lt;li&gt;Paragraphs 16-21 elaborate upon the digital divide – both the progresses made and challenges. While the Zero Draft recognizes the disparities in access to the Internet among countries, between men and women, and of the languages of Internet content, it fails to attend to two issues.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;First&lt;/i&gt;, accessibility for persons with disabilities continues to be an immense challenge&lt;/b&gt;. Since the mandate of the WSIS involves universal access and the bridging of the digital divide, it is necessary that the Zero Draft take note of this continuing challenge.&lt;/li&gt;
&lt;li&gt;We suggest the insertion of &lt;b&gt;Para 20A&lt;/b&gt; after Para 20:&lt;br /&gt;“20A. We draw attention also to the digital divide adversely affecting the accessibility of persons with disabilities. We call on all stakeholders to take immediate measures to ensure accessibility for persons with disabilities by 2020, and to enhance their capacity and access to ICTs.”&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Second&lt;/i&gt;, while the digital divide among the consumers of ICTs has decreased since 2003-2005, the digital production divide goes unmentioned&lt;/b&gt;. The developing world continues to have fewer producers of technology compared to their sheer concentration in the developed world – so much so that countries like India are currently pushing for foreign investment through missions like ‘Digital India’. Of course, the Zero Draft refers to the importance of private sector investment (Para 31). But it fails to point out that currently, such investment originates from corporations in the developed world. For this digital production divide to disappear, restrictions on innovation – restrictive patent or copyright regimes, for instance – should be removed, among other measures. &lt;b&gt;Equitable development is the key&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Ongoing negotiations of plurilateral agreements such as the Trans-Pacific Partnership (TPP) go unmentioned in the Zero Draft&lt;/i&gt;. This is shocking. The TPP has been criticized for its excessive leeway and support for IP rightsholders, while incorporating non-binding commitments involving the rights of users (see Clause QQ.G.17 on copyright exceptions and limitations, QQ.H.4 on damages and QQ.C. 12 on ccTLD WHOIS, https://wikileaks.org/tpp-ip3/WikiLeaks-TPP-IP-Chapter/WikiLeaks-TPP-IP-Chapter-051015.pdf). Plaudits for progress make on the digital divide would be lip service if such agreements were not denounced.&lt;/li&gt;
&lt;li&gt;Therefore, we propose the addition of &lt;b&gt;Para 20B&lt;/b&gt; after Para 20:&lt;br /&gt;“20B. We draw attention also to the digital production divide among countries, recognizing that domestic innovation and production are instrumental in achieving universal connectivity. Taking note of recent negotiations surrounding restrictive and unbalanced plurilateral trade agreements, we call on stakeholders to adopt policies to ensure globally equitable development, removing restrictions on innovation and conducive to fostering domestic and local production.”&lt;/li&gt;
&lt;li&gt;Paragraph 22 of the Zero Draft acknowledges that “school curriculum requirements for ICT, open access to data and free flow of information, fostering of competition, access to finance”, etc. have “in many countries, facilitated significant gains in connectivity and sustainable development”.&lt;/li&gt;
&lt;li&gt;This is, of course, true. However, as Para 23 also recognises, access to knowledge, data and innovation have come with large costs, particularly for developing countries like India. These costs are heightened by a lack of promotion and adoption of open standards, open access, open educational resources, open data (including open government data), and other free and open source practices. These can help alleviate costs, reduce duplication of efforts, and provide an impetus to innovation and connectivity globally.&lt;/li&gt;
&lt;li&gt;Not only this, but &lt;b&gt;the implications of open access to data and knowledge (including open government data), and responsible collection and dissemination of data are much larger in light of the importance of ICTs in today’s world&lt;/b&gt;. As Para 7 of the Zero Draft indicates, ICTs are now becoming an indicator of development itself, as well as being a key facilitator for achieving other developmental goals. As Para 56 of the Zero Draft recognizes, in order to measure the impact of ICTs on the ground – undoubtedly within the mandate of WSIS – it is necessary that there be an enabling environment to collect and analyse reliable data. Efforts towards the same have already been undertaken by the United Nations in the form of “Data Revolution for Sustainable Development”. In this light, the Zero Draft rightly calls for enhancement of regional, national and local capacity to collect and conduct analyses of development and ICT statistics (Para 56). Achieving the central goals of the WSIS process requires that such data is collected and disseminated under open standards and open licenses, leading to creation of global open data on the ICT indicators concerned.&lt;/li&gt;
&lt;li&gt;As such, we suggest that following clause be inserted as &lt;b&gt;Para 23A&lt;/b&gt; to the Zero Draft: &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;“23A. We recognize the importance of access to open, affordable, and reliable technologies and services, open access to knowledge, and open data, including open government data, and encourage all stakeholders to explore concrete options to facilitate the same.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;15. Paragraph 30 of the Zero Draft laments “the lack of progress on the Digital Solidarity Fund”, and calls “for a review of options for its future”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;16. The Digital Solidarity Fund was established with the objective of “transforming the digital divide into digital opportunities for the developing world” through voluntary contributions [Para 28, Tunis Agenda]. It was an innovative financial mechanism to help bridge the digital divide between developed and developing countries. This divide continues to exist, as the Zero Draft itself recognizes in Paragraphs 16-21.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;17. &lt;b&gt;Given the persistent digital divide, a “call for review of options” as to the future of the Digital Solidarity Fund is inadequate to enable developing countries to achieve parity with developed countries&lt;/b&gt;. A stronger and more definite commitment is required.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;18. As such, we suggest the following language in place of the current &lt;b&gt;Para 30&lt;/b&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“30. We express concern at the lack of progress on the Digital Solidarity Fund, welcomed in Tunis as an innovative financial mechanism of a voluntary nature, and we &lt;i&gt;call for voluntary commitments from States to revive and sustain the Digital Solidarity Fund&lt;/i&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;19. Paragraph 31 of the Zero Draft recognizes the importance of “legal and regulatory frameworks conducive to investment and innovation”. This is eminently laudable. However, a &lt;b&gt;broader vision is more compatible with paving the way for affordable and widespread access &lt;/b&gt;to devices and technology necessary for universal connectivity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20. We suggest the following additions to &lt;b&gt;Para 31&lt;/b&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“31. We recognise the critical importance of private sector investment in ICT access, content and services, &lt;i&gt;and of legal and regulatory frameworks conducive to local investment and expansive, permissionless innovation&lt;/i&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;B. Internet Governance&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;21. Paragraph 32 of the Zero Draft recognizes the “general agreement that the governance of the Internet should be open, inclusive, and transparent”. Para 37 takes into account “the report of the CSTD Working Group on improvements to the IGF”. Para 37 also affirms the intention of the General Assembly to extend the life of the IGF by (at least) another 5 years, and acknowledges the “unique role of the IGF”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;22. The IGF is, of course, unique and crucial to global Internet governance. In the last 10 years, major strides have been made among diverse stakeholders in beginning and sustaining conversations on issues critical to Internet governance. These include issues such as human rights, inclusiveness and diversity, universal access to connectivity, emerging issues such as net neutrality, the right to be forgotten, and several others. Through its many arms like the Dynamic Coalitions, the Best Practices Forums, Birds-of-a-Feather meetings and Workshops, the IGF has made it possible for stakeholders to connect. &lt;br /&gt; &lt;br /&gt; 23. However, the constitution and functioning of the IGF have not been without lament and controversy. Foremost among the laments was the IGF’s evident lack of outcome-orientation; this continues to be debatable. Second, the composition and functioning of the MAG, particularly its transparency, have come under the microscope several times. One of the suggestions of the CSTD Working Group on Improvements to the IGF concerned the structure and working methods of the Multistakeholder Advisory Group (MAG). The Working Group recommended that the “process of selection of MAG members should be inclusive, predictable, transparent and fully documented” (Section II.2, Clause 21(a), Page 5 of the Report).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;24. &lt;b&gt;Transparency in the structure and working methods of the MAG are critical to the credibility and impact of the IGF&lt;/b&gt;. The functioning of the IGF depends, in a large part, on the MAG. The UN Secretary General established the MAG, and it advises the Secretary General on the programme and schedule of the IGF meetings each year (see &amp;lt;http://www.intgovforum.org/cms/mag/44-about-the-mag&amp;gt;). Under its Terms of Reference, the MAG decides the main themes and sub-themes for each IGF, sets or modifies the rules of engagement, organizes the main plenary sessions, coordinates workshop panels and speakers, and crucially, evaluates the many submissions it receives to choose from amongst them the workshops for each IGF meeting. The content of each IGF, then, is in the hands of the MAG.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;25. &lt;i&gt;But the MAG is not inclusive or transparent&lt;/i&gt;. The MAG itself has lamented its opaque ‘black box approach’ to nomination and selection. Also, CIS’ research has shown that the process of nomination and selection of the MAG continues to be opaque. When CIS sought information on the nominators of the MAG, the IGF Secretariat responded that this information would not be made public (see &amp;lt;http://cis-india.org/internet-governance/blog/mag-analysis&amp;gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;26. Further, our analysis of MAG membership shows that since 2006, 26 persons have served for 6 years or more on the MAG. This is astounding, since under the MAG Terms of Reference, MAG members are nominated for a term of 1 year. This 1-year-term is “automatically renewable for 2 more consecutive years”, but such renewal is contingent on an evaluation of the engagement of MAG members in their activities (see &amp;lt;http://www.intgovforum.org/cms/175-igf-2015/2041-mag-terms-of-reference&amp;gt;). MAG members ought not serve for over 3 consecutive years, in accordance with their Terms of Reference. But out of 182 MAG members, around 62 members have served more than the 3-year terms designated by their Terms of Reference (see &amp;lt;http://cis-india.org/internet-governance/blog/mag-analysis&amp;gt;). &lt;br /&gt; &lt;br /&gt; 27. Not only this, but our research showed 36% of all MAG members since 2006 have hailed from the Western European and Others Group (see &amp;lt;http://cis-india.org/internet-governance/blog/mag-analysis&amp;gt;). This indicates a lack of inclusiveness, though the MAG is certainly more inclusive than the composition and functioning of other I-Star organisations such as ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;28. Tackling these infirmities within the MAG would go a long way in ensuring that the IGF lives up to its purpose. Therefore, we suggest the following additions to &lt;b&gt;Para 37&lt;/b&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“37. We acknowledge the unique role of the Internet Governance Forum (IGF) as a multistakeholder platform for discussion of Internet governance issues, &lt;i&gt;and take note of &lt;/i&gt;the report and recommendations of the CSTD Working Group on improvements to the IGF, which was approved by the General Assembly in its resolution, and ongoing work to implement the findings of that report. &lt;i&gt;We reaffirm the principles of openness, inclusiveness and transparency in the constitution, organisation and functioning of the IGF, and in particular, in the nomination and selection of the Multistakeholder Advisory Group (MAG)&lt;/i&gt;. We extend the IGF mandate for another five years with its current mandate as set out in paragraph 72 of the Tunis Agenda for the Information Society. We recognize that, at the end of this period, progress must be made on Forum outcomes and participation of relevant stakeholders from developing countries.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;29. Paragraphs 32-37 of the Zero Draft make mention of “open, inclusive, and transparent” governance of the Internet. &lt;b&gt;It fails to take note of the lack of inclusiveness and diversity in Internet governance organisations – extending across representation, participation and operations of these organisations&lt;/b&gt;. In many cases, mention of inclusiveness and diversity becomes tokenism or formal (but not operational) principle. In substantive terms, the developing world is pitifully represented in standards organisations and in ICANN, and policy discussions in organisations like ISOC occur largely in cities like Geneva and New York. For example, the ‘diversity’ mailing list of IETF has very low traffic. Within ICANN, 307 out of 672 registries listed in ICANN’s registry directory are based in the United States, while 624 of the 1010 ICANN-accredited registrars are US-based. Not only this, but 80% of the responses received by ICANN during the ICG’s call for proposals were male. A truly global and open, inclusive and transparent governance of the Internet must not be so skewed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30. We propose, therefore, the addition of a &lt;b&gt;Para 37A&lt;/b&gt; after Para 37:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“37A. We draw attention to the challenges surrounding diversity and inclusiveness in organisations involved in Internet governance, and call upon these organisations to take immediate measures to ensure diversity and inclusiveness in a substantive manner.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;31. Paragraphs 36 of the Zero Draft notes that “a number of member states have called for an international legal framework for Internet governance.” &lt;b&gt;But it makes no reference to ICANN or the importance of the ongoing IANA transition to global Internet governance&lt;/b&gt;. ICANN and its monopoly over several critical Internet resources was one of the key drivers of the WSIS in 2003-2005. Unfortunately, this focus seems to have shifted entirely. Open, inclusive, transparent and &lt;i&gt;global&lt;/i&gt; Internet are misnomer-principles when ICANN – and in effect, the United States – continues to have monopoly over critical Internet resources. The allocation and administration of these resources should be decentralized and distributed, and should not be within the disproportionate control of any one jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;32. Therefore, we suggest the following &lt;b&gt;Para 37A&lt;/b&gt; after Para 37:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“37A. We affirm that the allocation, administration and policy involving critical Internet resources must be inclusive and decentralized, and call upon all stakeholders and in particular, states and organizations responsible for essential tasks associated with the Internet, to take immediate measures to create an environment that facilitates this development.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;33. Paragraph 43 of the Zero Draft encourages “all stakeholders to ensure respect for privacy and the protection of personal information and data”. &lt;b&gt;But the Zero Draft inadvertently leaves out the report of the Office of the UN High Commissioner for Human Rights on digital privacy, ‘The right to privacy in the digital age’ (A/HRC/27/37)&lt;/b&gt;. This report, adopted by the Human Rights Council in June 2014, affirms the importance of the right to privacy in our increasingly digital age, and offers crucial insight into recent erosions of privacy. It is both fitting and necessary that the General Assembly take note of and affirm the said report in the context of digital privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;34. We offer the following suggestion as an addition to &lt;b&gt;Para 43&lt;/b&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“43. We emphasise that no person shall be subjected to arbitrary or unlawful interference with his or her privacy, family, home, or correspondence, consistent with countries’ applicable obligations under international human rights law. &lt;i&gt;In this regard, we acknowledge the report of the Office of the UN High Commissioner for Human Rights, ‘The right to privacy in the digital age’ (A/HRC/27/37, 30 June 2014), and take note of its findings&lt;/i&gt;. We encourage all stakeholders to ensure respect for privacy and the protection of personal information and data.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;35. Paragraphs 40-44 of the Zero Draft state that communication is a fundamental human need, reaffirming Article 19 of the Covenant on Civil and Political Rights, with its attendant narrow limitations. The Zero Draft also underscores the need to respect the independence of the press. Particularly, it reaffirms the principle that the same rights that people enjoy offline must also be protected online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;36. Further, in Para 31, the Zero Draft recognizes the “critical importance of private sector investment in ICT access, content, and services”. This is true, of course, but corporations also play a crucial role in facilitating the freedom of speech and expression (and all other related rights) on the Internet. As the Internet is led largely by the private sector in the development and distribution of devices, protocols and content-platforms, corporations play a major role in facilitating – and sometimes, in restricting – human rights online. They are, in sum, intermediaries without whom the Internet cannot function.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;37. &lt;b&gt;Given this, it is essential that the outcome document of the WSIS+10 Overall Review recognize and affirm the role of the private sector, and crucially, its responsibilities to respect and protect human rights online&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;38. We suggest, therefore, the insertion of the following paragraph &lt;b&gt;Para 42A&lt;/b&gt;, after Para 42:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“42A. We recognize the critical role played by corporations and the private sector in facilitating human rights online. We affirm, in this regard, the responsibilities of the private sector set out in the Report of the Special Representative of the Secretary General on the issue of human rights and transnational corporations and other business enterprises, A/HRC/17/31 (21 March 2011), and encourage policies and commitments towards respect and remedies for human rights.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;C. Implementation and Follow-up&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;39. Para 57 of the Zero Draft calls for a review of the WSIS Outcomes, and leaves a black space inviting suggestions for the year of the review. How often, then, should the review of implementation of WSIS+10 Outcomes take place?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;40. It is true, of course, that reviews of the implementation of WSIS Outcomes are necessary to take stock of progress and challenges. However, we caution against annual, biennal or other such closely-spaced reviews due to concerns surrounding budgetary allocations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;41. Reviews of implementation of outcomes (typically followed by an Outcome Document) come at considerable cost, which are budgeted and achieved through contributions (sometimes voluntary) from states. Were Reviews to be too closely spaced, budgets that ideally ought to be utilized to bridge digital divides and ensure universal connectivity, particularly for developing states, would be misspent in reviews. Moreover, closely-spaced reviews would only provide superficial quantitative assessments of progress, but would not throw light on longer term or qualitative impacts.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-zero-draft-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-zero-draft-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WSIS+10</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-16T02:44:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icanns-didp-ii">
    <title>Peering behind the veil of ICANN's DIDP (II)</title>
    <link>https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icanns-didp-ii</link>
    <description>
        &lt;b&gt;In a previous blog post, I had introduced the concept of ICANN’s Documentary Information Disclosure Policy (“DIDP”) and their extremely vast grounds for non-disclosure. In this short post, I have made an analysis of every DIDP request that ICANN has ever responded to, to point out the flaws in their policy that need to be urgently remedied.&lt;/b&gt;
        &lt;p&gt;Read the previous blog post &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp"&gt;here&lt;/a&gt;. Every DIDP request that ICANN has ever responded to can be &lt;a class="external-link" href="https://www.icann.org/resources/pages/governance/transparency-en"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The table &lt;a href="https://docs.google.com/spreadsheets/d/1M1gWBpa7tlxGPMWyB6xJryddahyZzjVIarSz0RJswDM/edit?usp=sharing"&gt;here&lt;/a&gt; is a comprehensive breakdown of all the different DIDP requests that ICANN has responded to. This table is to be read with &lt;a href="https://docs.google.com/document/d/1x1vG23FdIAzo4ro80eEieaokBpAeNVtYXjds6mHt2DE/edit?usp=sharing"&gt;this document&lt;/a&gt;, which has a numbered list of the different non-disclosure exceptions &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;outlined in ICANN’s policy&lt;/a&gt;. What I sought to scrutinize was the number of times ICANN has provided satisfactory information, the number of times it has denied information, and the grounds for the same. What we found was alarming:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Of a total of 91 requests (as of 13/10/2015), &lt;b&gt;ICANN has fully and positively responded to only 11.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;It has responded &lt;b&gt;partially&lt;/b&gt; &lt;b&gt;to 47 of 91 requests, &lt;/b&gt;with some amount of information (usually that which is available as public records).&lt;/li&gt;
&lt;li&gt;It has &lt;b&gt;not responded at all to 33 of 91 requests&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (1)&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;17 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (2)&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;39 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (3)&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;31 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (4)&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;5 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;T&lt;/b&gt;he Non-Disclosure Clause (5)&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;34 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (6)&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;35 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (7)&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;once.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (8)&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;22 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (9)&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;30 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (10)&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;10 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (11)&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;12 times.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The Non-Disclosure Clause (12)&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; has been invoked &lt;b&gt;18 times.&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This data is disturbing because it reveals that ICANN has in practice been able to deflect most requests for information. It regularly utilised its internal processes and discussions with stakeholders clauses, as well as clauses on protecting financial interests of third parties (over 50% of the total non-disclosure clauses ever invoked - see chart below) to do away with having to provide information on pertinent matters such as its compliance audits and reports of abuse to registrars. We believe that even if ICANN is a private entity legally, and not at the same level as a state, it nonetheless plays the role of regulating an enormous public good, namely the Internet. Therefore, there is a great onus on ICANN to be far more open about the information that they provide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, it is extremely disturbing that they have extended full disclosure to only 12% of the requests that they receive. An astonishing 88% of the requests have been denied, partly or otherwise. Therefore, it is clear that there is a failure on part of ICANN to uphold the transparency it claims to stand for, and this needs to be remedied at the earliest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Pie1.png" title="Pie Chart 1" height="342" width="327" alt="Pie Chart 1" class="image-inline" /&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Pie1.png" alt="Pie Chart 2" class="image-inline" title="Pie Chart 2" /&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Information provided by or to a government or international organization, or any form of recitation of such information, in the expectation that the information will be kept confidential and/or would or likely would materially prejudice ICANN's relationship with that party&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Internal information that, if disclosed, would or would be likely to compromise the integrity of ICANN's deliberative and decision-making process by inhibiting the candid exchange of ideas and communications, including internal documents, memoranda, and other similar communications to or from ICANN Directors, ICANN Directors' Advisors, ICANN staff, ICANN consultants, ICANN contractors, and ICANN agents&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Information exchanged, prepared for, or derived from the deliberative and decision-making process between ICANN, its constituents, and/or other entities with which ICANN cooperates that, if disclosed, would or would be likely to compromise the integrity of the deliberative and decision-making process between and among ICANN, its constituents, and/or other entities with which ICANN cooperates by inhibiting the candid exchange of ideas and communications&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Personnel, medical, contractual, remuneration, and similar records relating to an individual's personal information, when the disclosure of such information would or likely would constitute an invasion of personal privacy, as well as proceedings of internal appeal mechanisms and investigations&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Information provided to ICANN by a party that, if disclosed, would or would be likely to materially prejudice the commercial interests, financial interests, and/or competitive position of such party or was provided to ICANN pursuant to a nondisclosure agreement or nondisclosure provision within an agreement&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Confidential business information and/or internal policies and procedures&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Information that, if disclosed, would or would be likely to endanger the life, health, or safety of any individual or materially prejudice the administration of justice&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Information subject to the attorney– client, attorney work product privilege, or any other applicable privilege, or disclosure of which might prejudice any internal, governmental, or legal investigation&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Drafts of all correspondence, reports, documents, agreements, contracts, emails, or any other forms of communication&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Information that relates in any way to the security and stability of the Internet, including the operation of the L Root or any changes, modifications, or additions to the root zone&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Trade secrets and commercial and financial information not publicly disclosed by ICANN&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “&lt;i&gt;Information requests: (i) which are not reasonable; (ii) which are excessive or overly burdensome; (iii) complying with which is not feasible; or (iv) are made with an abusive or vexatious purpose or by a vexatious or querulous individual&lt;/i&gt;”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icanns-didp-ii'&gt;https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icanns-didp-ii&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padmini Baruah</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-15T03:14:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india">
    <title>Contestations of Data, ECJ Safe Harbor Ruling and Lessons for India	</title>
    <link>https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india</link>
    <description>
        &lt;b&gt;The European Court of Justice has invalidated a European Commission decision, which had previously concluded that the 'Safe Harbour Privacy Principles' provide adequate protections for European citizens’ privacy rights for the transfer of personal data between European Union and United States. The inadequacies of the framework is not news for the European Commission and action by ECJ has been a long time coming. The ruling raises important questions about how the claims of citizenship are being negotiated in the context of the internet, and how increasingly the contestations of personal data are being employed in the discourse. &lt;/b&gt;
        
&lt;p align="justify"&gt;The European Court of Justice
(ECJ) has invalidated a European Commission (EC) decision&lt;a class="sdfootnoteanc" name="sdfootnote1anc" href="#sdfootnote1sym"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;
which had previously concluded that the 'Safe Harbor Privacy
Principles'&lt;a class="sdfootnoteanc" name="sdfootnote2anc" href="#sdfootnote2sym"&gt;&lt;sup&gt;2&lt;/sup&gt;&lt;/a&gt;
provide adequate protections for European citizens’ privacy rights&lt;a class="sdfootnoteanc" name="sdfootnote3anc" href="#sdfootnote3sym"&gt;&lt;sup&gt;3&lt;/sup&gt;&lt;/a&gt;
for the transfer of personal data between European Union and United
States. This challenge stems from the claim that public law
enforcement authorities in America obtain personal data from
organisations in safe harbour for incompatible and disproportionate
purposes in violation of the Safe Harbour Privacy Principles. The
court's judgment follows the advice of the Advocate General of the
Court of Justice of the European Union (CJEU) who recently opined&lt;a class="sdfootnoteanc" name="sdfootnote4anc" href="#sdfootnote4sym"&gt;&lt;sup&gt;4&lt;/sup&gt;&lt;/a&gt;
that US practices allow for large-scale collection and transfer of
personal data belonging to EU citizens without them benefiting from
or having access to judicial protection under US privacy laws. The
inadequacies of the framework is not news for the Commission and
action by ECJ has been a long time coming. The ruling raises
important questions about how increasingly the contestations of
personal data are being employed in asserting claims of citizenship
in context of the internet.&lt;/p&gt;
&lt;p align="justify"&gt;
As the highest court in Europe,
the ECJ's decisions are binding on all member states. With this
ruling the ECJ has effectively restrained US firms from
indiscriminate collection and sharing of European citizens’ data on
American soil. The implications of the decision are significant,
because it shifts the onus of evaluating protections of personal data
for EU citizens from the 4,400 companies&lt;a class="sdfootnoteanc" name="sdfootnote5anc" href="#sdfootnote5sym"&gt;&lt;sup&gt;5&lt;/sup&gt;&lt;/a&gt;
subscribing to the system onto EU privacy watchdogs. Most
significantly, in addressing the rights of a citizen against an
established global brand, the judgement goes beyond political and
legal opinion to challenge the power imbalance that exists with
reference to US based firms.&lt;/p&gt;
&lt;p align="justify"&gt;
Today, the free movement of data
across borders is a critical factor in facilitating trade, financial
services, governance, manufacturing, health and development. However,
to consider the ruling as merely a clarification of transatlantic
mechanisms for data flows misstates the real issue. At the heart of
the judgment is the assessment whether US firms apply the tests of
‘necessity and proportionality’ in the collection and
surveillance of data for national security purposes. Application of
necessity and proportionality test to national security exceptions
under safe harbor has been a sticking point that has stalled the
renegotiation of the agreement that has been underway between the
Commission and the American data protection authorities.&lt;a class="sdfootnoteanc" name="sdfootnote6anc" href="#sdfootnote6sym"&gt;&lt;sup&gt;6&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
For EU citizens the stake in the
case are even higher, as while their right to privacy is enshrined
under EU law, they have no administrative or judicial means of
redress, if their data is used for reasons they did not intend. In
the EU, citizens accessing and agreeing to use of US based firms are
presented with a false choice between accessing benefits and giving
up on their fundamental right to privacy. In other words, by seeking
that governments and private companies provide better data protection
for the EU citizens and in restricting collection of personal data on
a generalised basis without objective criteria, the ruling is
effectively an assertion of ‘data sovereignty’. The term ‘data
sovereignty’, while lacking a firm definition, refers to a spectrum
of approaches adopted by different states to control data generated
in or passing through national internet infrastructure.&lt;a class="sdfootnoteanc" name="sdfootnote7anc" href="#sdfootnote7sym"&gt;&lt;sup&gt;7&lt;/sup&gt;&lt;/a&gt;
Underlying the ruling is the growing policy divide between the US and
EU privacy and data protection standards, which may lead to what is
referred to as the balkanization&lt;a class="sdfootnoteanc" name="sdfootnote8anc" href="#sdfootnote8sym"&gt;&lt;sup&gt;8&lt;/sup&gt;&lt;/a&gt;
of the internet in the future.&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;US-EU Data Protection Regime &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The safe harbor pact between the
EU and US was negotiated in the late 1990s as an attempt to bridge
the different approaches to online privacy. Privacy is addressed in
the EU as a fundamental human right while in the US it is defined
under terms of consumer protection, which&lt;em&gt;&lt;strong&gt;
&lt;/strong&gt;&lt;/em&gt;allow trade-offs
and exceptions when national security seems to be under threat. In
order to address the lower standards of data protection prevalent in
the US, the pact facilitates data transfers from EU to US by
establishing certain safeguards equivalent to the requirements of the
EU data protection directive. The safe harbor provisions include
firms undertaking not to pass personal information to third parties
if the EU data protection standards are not met and giving users
right to opt out of data collection.&lt;a class="sdfootnoteanc" name="sdfootnote9anc" href="#sdfootnote9sym"&gt;&lt;sup&gt;9&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The agreement was due to be
renewed by May 2015&lt;a class="sdfootnoteanc" name="sdfootnote10anc" href="#sdfootnote10sym"&gt;&lt;sup&gt;10&lt;/sup&gt;&lt;/a&gt;
and while negotiations have been ongoing for two years, EU discontent
on safe harbour came to the fore following the Edward Snowden
revelations of collection and monitoring facilitated by large private
companies for the PRISM program and after the announcement of the
TransAtlantic Trade and Investment Partnership (TTIP).&lt;a class="sdfootnoteanc" name="sdfootnote11anc" href="#sdfootnote11sym"&gt;&lt;sup&gt;11&lt;/sup&gt;&lt;/a&gt;
EU member states have mostly stayed silent as they run their own
surveillance programs often times, in cooperation with the NSA. EU
institutions cannot intervene in matters of national security
however, they do have authority on data protection matters. European
Union officials and Members of Parliament have expressed shock and
outrage at the surveillance programs unveiled by Snowden's 2013
revelations. Most recently, following the CJEU Advocate General’s
opinion, 50 Members of European Parliament (MEP) sent a strongly
worded letter the US Congress hitting back on claims of ‘digital
protectionism’ emanating from the US&lt;a class="sdfootnoteanc" name="sdfootnote12anc" href="#sdfootnote12sym"&gt;&lt;sup&gt;12&lt;/sup&gt;&lt;/a&gt;.
In no uncertain terms the letter clarified that the EU has different
ideas on privacy, platforms, net neutrality, encryption, Bitcoin,
zero-days, or copyright and will seek to improve and change any
proposal from the EC in the interest of our citizens and of all
people.&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;Towards Harmonization &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
In November 2013, as an attempt
to minimize the loss of trust following the Snowden revelations, the
European Commission (EC) published recommendations in its report on
'Rebuilding Trust is EU-US Data Flows'.&lt;a class="sdfootnoteanc" name="sdfootnote13anc" href="#sdfootnote13sym"&gt;&lt;sup&gt;13&lt;/sup&gt;&lt;/a&gt;
The recommendations revealed two critical initiatives at the EU
level—first was the revision of the EU-US safe harbor agreement&lt;a class="sdfootnoteanc" name="sdfootnote14anc" href="#sdfootnote14sym"&gt;&lt;sup&gt;14&lt;/sup&gt;&lt;/a&gt;
and second the adoption of the 'EU-US Umbrella Agreement&lt;a class="sdfootnoteanc" name="sdfootnote15anc" href="#sdfootnote15sym"&gt;&lt;sup&gt;15&lt;/sup&gt;&lt;/a&gt;'—a
framework for data transfer for the purpose of investigating,
detecting, or prosecuting a crime, including terrorism. The Umbrella
Agreement was recently initialed by EU and US negotiators and it only
addresses the exchange of personal data between law enforcement
agencies.&lt;a class="sdfootnoteanc" name="sdfootnote16anc" href="#sdfootnote16sym"&gt;&lt;sup&gt;16&lt;/sup&gt;&lt;/a&gt;
The Agreement has gained momentum in the wake of recent cases around
issues of territorial duties of providers, enforcement jurisdictions
and data localisation.&lt;a class="sdfootnoteanc" name="sdfootnote17anc" href="#sdfootnote17sym"&gt;&lt;sup&gt;17&lt;/sup&gt;&lt;/a&gt;
However, the adoption of the Umbrella Act depends on US Congress
adoption of the&lt;em&gt;&lt;strong&gt;
&lt;/strong&gt;&lt;/em&gt;Judicial Redress
Act (JRA) as law.&lt;a class="sdfootnoteanc" name="sdfootnote18anc" href="#sdfootnote18sym"&gt;&lt;sup&gt;18&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;Judicial Redress Act &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The JRA is a key reform that the
EC is pushing for in an attempt to address the gap between privacy
rights and remedies available to US citizens and those extended to EU
citizens, including allowing EU citizens to sue in American courts.
The JRA seeks to extend certain protections under the Privacy Act to
records shared by EU and other designated countries with US law
enforcement agencies for the purpose of investigating, detecting, or
prosecuting criminal offenses. The JRA protections would extend to
records shared under the Umbrella Agreement and while it does include
civil remedies for violation of data protection, as noted by the
Center for Democracy and Technology, the present framework  does not
provide citizens of EU countries with redress that is at par with
that which US persons enjoy under the Privacy Act.&lt;a class="sdfootnoteanc" name="sdfootnote19anc" href="#sdfootnote19sym"&gt;&lt;sup&gt;19&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
For example, the measures
outlined under the JRA would only be applicable to countries that
have outlined appropriate privacy protections agreements for data
sharing for investigations and ‘efficiently share’ such
information with the US. Countries that do not have agreements with
US cannot seek these protections leaving the personal data of their
citizens open for collection and misuse by US agencies. Further, the
arrangement leaves determination of 'efficiently sharing' in the
hands of US authorities and countries could lose protection if they
do not comply with information sharing requests promptly. Finally,
JRA protections do not apply to non-US persons nor to records shared
for purposes other than law enforcement such as intelligence
gathering. JRA is also weakened by allowing heads of agencies to
exercise their discretion to seek exemption from the Act and opt out
of compliance.&lt;/p&gt;
&lt;p align="justify"&gt;
Taken together the JRA, the
Umbrella Act and the renegotiation of the Safe Harbor Agreement need
considerable improvements. It is worth noting that EU’s acceptance
of the redundancy of existing agreements and in establishing the
independence of national data protection authorities in investigating
and enforcing national laws as demonstrated in the Schrems and in the
Weltimmo&lt;a class="sdfootnoteanc" name="sdfootnote20anc" href="#sdfootnote20sym"&gt;&lt;sup&gt;20&lt;/sup&gt;&lt;/a&gt;
case point to accelerated developments in the broader EU privacy
landscape.&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;Consequences  &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The ECJ Safe Harbor ruling will
have far-reaching consequences for the online industry. Often, costly
government rulings solidify the market dominance of big companies. As
high regulatory costs restrict the entrance of small and medium
businesses the market, competition is gradually wiped out. Further,
complying with high standards of data protection means that US firms
handling European data will need to consider alternative legal means
of transfer of personal data. This could include evolving 'model
contracts' binding them to EU data protection standards. As Schrems
points out, “Big companies don’t only rely on safe harbour: they
also rely on binding corporate rules and standard contractual
clauses.”&lt;a class="sdfootnoteanc" name="sdfootnote21anc" href="#sdfootnote21sym"&gt;&lt;sup&gt;21&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The ruling is good news for
European consumers, who can now approach a national regulator to
investigate suspicions of data mishandling. EU data protection
regulators may be be inundated with requests from companies seeking
authorization of new contracts and with consumer complaints. Some are
concerned that the ruling puts a dent in the globalized flow of
data&lt;a class="sdfootnoteanc" name="sdfootnote22anc" href="#sdfootnote22sym"&gt;&lt;sup&gt;22&lt;/sup&gt;&lt;/a&gt;,
effectively requiring data localization in Europe.&lt;a class="sdfootnoteanc" name="sdfootnote23anc" href="#sdfootnote23sym"&gt;&lt;sup&gt;23&lt;/sup&gt;&lt;/a&gt;
Others have pointed out that it is unclear how this decision sits
with other trade treaties such as the TPP that ban data
localisation.&lt;a class="sdfootnoteanc" name="sdfootnote24anc" href="#sdfootnote24sym"&gt;&lt;sup&gt;24&lt;/sup&gt;&lt;/a&gt;
While the implications of the decision will take some time in playing
out, what is certain is that US companies will be have  to
restructure management, storage and use of data. The ruling has
created the impetus for India to push for reforms to protect its
citizens from harms by US firms and improve trade relations with EU.&lt;/p&gt;
&lt;p align="justify"&gt;&lt;em&gt;The Opportunity for India&lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Multiple data flows taking place
over the internet simultaneously and that has led to ubiquity of data
transfers o ver the Internet, exposing individuals to privacy risks.
There has also been an enhanced economic importance of data
processing as businesses collect and correlate data using analytic
tools to create new demands, establish relationships and generate
revenue for their services. The primary concern of the Schrems case
may be the protection of the rights of EU citizens but by seeking to
extend these rights and ensure compliance in other jurisdictions, the
case touches upon many underlying contestations around  data and
sovereignty.&lt;/p&gt;
&lt;p align="justify"&gt;
Last year, Mr Ram Narain, India
Head of Delegation to the Working Group Plenary at ITU had stressed, “respecting the principle of sovereignty of information through
network functionality and global norms will go a long way in
increasing the trust and confidence in use of ICT.”&lt;a class="sdfootnoteanc" name="sdfootnote25anc" href="#sdfootnote25sym"&gt;&lt;sup&gt;25&lt;/sup&gt;&lt;/a&gt;
In the absence of the recognition of privacy as a right and
empowering citizens through measures or avenues to seek redressal
against misuse of data, the demand of data sovereignty rings empty.
The kind of framework which empowered an ordinary citizen in the EU
to approach the highest court seeking redressal based on presumed
overreach of a foreign government and from harms abetted by private
corporations simply does not exist in India. Securing citizen’s
data in other jurisdictions and from other governments begins with
establishing protection regimes within the country.&lt;/p&gt;
&lt;p align="justify"&gt;
The Indian government has also
stepped up efforts to restrict transfer of data from India including
pushing for private companies to open data centers in India.&lt;a class="sdfootnoteanc" name="sdfootnote26anc" href="#sdfootnote26sym"&gt;&lt;sup&gt;26&lt;/sup&gt;&lt;/a&gt;
Negotiating data localisation does not restrict the power of private
corporations from using data in a broad ways including tailoring ads
and promoting products. Also, data transfers impact any organisation
with international operations for example, global multinationals who
need to coordinate employee data and information. Companies like
Facebook, Google and Microsoft transfer and store data belonging to
Indian citizens and it is worth remembering that the National
Security Agency (NSA) would have access to this data through servers
of such private companies. With no existing measures to restrict such
indiscriminate access, the ruling purports to the need for India to
evolve strong protection mechanisms. Finally, the lack of such
measures also have an economic impact, as reported in a recent
Nasscom-Data Security Council of India (DSCI) survey&lt;a class="sdfootnoteanc" name="sdfootnote27anc" href="#sdfootnote27sym"&gt;&lt;sup&gt;27&lt;/sup&gt;&lt;/a&gt;
that pegs revenue losses incurred by the Indian IT-BPO industry at
$2-2.5 billion for a sample size of 15 companies. DSCI has further
estimated that outsourcing business can further grow by $50 billion
per annum once India is granted a “data secure” status by the
EU.&lt;a class="sdfootnoteanc" name="sdfootnote28anc" href="#sdfootnote28sym"&gt;&lt;sup&gt;28&lt;/sup&gt;&lt;/a&gt;
EU’s refusal to grant such a status is understandable given the
high standard of privacy as incorporated under the European Union
Data Protection Directive a standard to which India does not match
up, yet. The lack of this status prevents the flow of data which is
vital for Digital India vision and also affects the service industry
by restricting the flow of sensitive information to India such as
information about patient records.&lt;/p&gt;
&lt;p align="justify"&gt;
Data and information structures
are controlled and owned by private corporations and networks
transcend national borders, therefore the foremost emphasis needs to
be on improving national frameworks. While, enforcement mechanisms
such as the Mutual Legal Assistance Treaty (MLAT) process or other
methods of international cooperation may seem respectful of
international borders and principles of sovereignty,&lt;a class="sdfootnoteanc" name="sdfootnote29anc" href="#sdfootnote29sym"&gt;&lt;sup&gt;29&lt;/sup&gt;&lt;/a&gt;
 for users that live in undemocratic or oppressive regimes such
agreements are a considerable risk. Data is also increasingly being
stored across multiple jurisdictions and therefore merely applying
data location lens to protection measures may be too narrow. Further
it should be noted that when companies begin taking data storage
decisions based on legal considerations it will impact the speed and
reliability of services.&lt;a class="sdfootnoteanc" name="sdfootnote30anc" href="#sdfootnote30sym"&gt;&lt;sup&gt;30&lt;/sup&gt;&lt;/a&gt;
Any future regime must reflect the challenges of data transfers
taking place in legal and economic spaces that are not identical and
may be in opposition. Fundamentally, the protection of privacy will
always act as a barrier to the free flow of information even so, as
the Schrems case ruling points out not having adequate privacy
protections could also restrict flow of data, as has been the case
for India.&lt;/p&gt;
&lt;p align="justify"&gt;
The time is right for India to
appoint a data controller and put in place national frameworks, based
on nuanced understanding of issues of applying jurisdiction to govern
users and their data. Establishing better protection measures will
not only establish trust and enhance the ability of users to control
data about themselves it is also essential for sustaining economic
and social value generated from data generation and collection.
Suggestions for such frameworks have been considered previously by
the Group of Experts on Privacy constituted by the Planning
Commission.&lt;a class="sdfootnoteanc" name="sdfootnote31anc" href="#sdfootnote31sym"&gt;&lt;sup&gt;31&lt;/sup&gt;&lt;/a&gt;
By incorporating transparency in mechanisms for data and access
requests and premising requests on established necessity and
proportionality Indian government can lead the way in data protection
standards. This will give the Indian government more teeth to
challenge and address both the dangers of theft of data stored on
servers located outside of India and restrain indiscriminate access
arising from terms and conditions of businesses that grant such
rights to third parties.&amp;nbsp;&lt;/p&gt;
&lt;div id="sdfootnote1"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote1sym" href="#sdfootnote1anc"&gt;1&lt;/a&gt;
	Commission Decision of 26 July 2000 pursuant to Directive 95/46/EC
	of the European Parliament and of the Council on the adequacy of the
	protection provided by the safe harbour privacy principles and
	related frequently asked questions issued by the US Department of
	Commerce (notified under document number C(2000) 2441) (Text with
	EEA relevance.) &lt;em&gt;Official
	Journal L 215 , 25/08/2000 P. 0007 -0047 &lt;/em&gt;
	2000/520/EC:
	&lt;u&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;http&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;://&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;eur&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;-&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;lex&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;.&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;europa&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;.&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;eu&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;/&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;LexUriServ&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;/&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;LexUriServ&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;.&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;do&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;?&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;uri&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;=&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;CELEX&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;:32000&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;D&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;0520:&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;EN&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;:&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;HTML&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote2"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote2sym" href="#sdfootnote2anc"&gt;2&lt;/a&gt;
	Safe Harbour Privacy Principles Issued by the U.S. Department of
	Commerce on July 21, 2000
	&lt;u&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;http&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;://&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;www&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;export&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;gov&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;safeharbor&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eu&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eg&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;main&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_018475.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;asp&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote3"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote3sym" href="#sdfootnote3anc"&gt;3&lt;/a&gt;
	Megan Graham, &lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Adding&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Some&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Nuance&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;on&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;the&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;European&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Court&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;’&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;s&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Safe&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Harbor&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Decision&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;,
	&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Just&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;security&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
	
	&lt;u&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;https&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;://&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;www&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;.&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;justsecurity&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;.&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;org&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;/26651/&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;adding&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;nuance&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;ecj&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;safe&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;harbor&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;decision&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote4"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote4sym" href="#sdfootnote4anc"&gt;4&lt;/a&gt;
	Advocate
	General’s Opinion in Case C-362/14 Maximillian Schrems v Data
	Protection Commissioner Court of Justice of the European Union,
	Press Release, No 106/15 Luxembourg, 23 September 2015
	&lt;u&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;http&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;://&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;curia&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;europa&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;eu&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;jcms&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;upload&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;docs&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;application&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;pdf&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/2015-09/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;cp&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;150106&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;en&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote5"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote5sym" href="#sdfootnote5anc"&gt;5&lt;/a&gt;
	Jennifer Baker, ‘EU desperately pushes just-as-dodgy safe harbour
	alternatives’, The Register, October 7, 2015
	&lt;u&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;http&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;://&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;www&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;theregister&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;co&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;uk&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;/2015/10/07/&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;eu&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;pushes&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;safe&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;harbour&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;alternatives&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;/&lt;/a&gt;&lt;/u&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote6"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote6sym" href="#sdfootnote6anc"&gt;6&lt;/a&gt;
	Draft Report, General Data Protection Regulation, Committee on Civil
	Liberties, Justice and Home Affairs, European Parliament, 2009-2014
	&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;http&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;://&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;www&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;europarl&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;europa&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;eu&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;meetdocs&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/2009_2014/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;documents&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;libe&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;pr&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/922/922387/922387&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;en&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote7"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote7sym" href="#sdfootnote7anc"&gt;7&lt;/a&gt;
	Dana Polatin-Reuben, Joss Wright, ‘An Internet with BRICS
	Characteristics: Data Sovereignty and the Balkanisation of the
	Internet’, University of Oxford, July 7, 2014
	&lt;u&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;https&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;://&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;www&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;.&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;usenix&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;.&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;org&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;system&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;files&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;conference&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;foci&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;14/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;foci&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;14-&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;polatin&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;-&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;reuben&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;.&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote8"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote8sym" href="#sdfootnote8anc"&gt;8&lt;/a&gt;
	Sasha
	Meinrath, The Future of the Internet: Balkanization and Borders,
	Time, October 2013
	&lt;u&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;http&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;://&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;ideas&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;.&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;time&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;.&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;com&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;/2013/10/11/&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;the&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;future&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;of&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;the&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;internet&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;balkanization&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;and&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;borders&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote9"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote9sym" href="#sdfootnote9anc"&gt;9&lt;/a&gt;
	Safe Harbour Privacy Principles, Issued by the U.S. Department of
	Commerce, July 2001
	&lt;u&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;http&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;://&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;www&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;export&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;gov&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;safeharbor&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eu&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eg&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;main&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_018475.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;asp&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote10"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote10sym" href="#sdfootnote10anc"&gt;10&lt;/a&gt;
	Facebook
	case may force European firms to change data storage practices, The
	Guardian, September 23, 2015
	&lt;u&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;http&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;://&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;www&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;theguardian&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;com&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;/&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;us&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;news&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;/2015/&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;sep&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;/23/&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;us&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;intelligence&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;services&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;surveillance&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;privacy&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote11"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote11sym" href="#sdfootnote11anc"&gt;11&lt;/a&gt;
	Privacy Tracker,  US-EU Safe Harbor Under Pressure, August 2, 2013
	&lt;u&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;https&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;://&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;iapp&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;.&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;org&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;/&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;news&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;/&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;a&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;/&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;us&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;eu&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;safe&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;harbor&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;under&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;pressure&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote12"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote12sym" href="#sdfootnote12anc"&gt;12&lt;/a&gt;
	Kieren
	McCarthy, Privacy, net neutrality, security, encryption ... Europe
	tells Obama, US Congress to back off, The Register, 23 September,
	2015
	&lt;u&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;http&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;://&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;www&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;theregister&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;co&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;uk&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;/2015/09/23/&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;european&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;politicians&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;to&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;congress&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;back&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;off&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote13"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote13sym" href="#sdfootnote13anc"&gt;13&lt;/a&gt;
	Communication from the Commission to the European Parliament and the
	Council, Rebuilding Trust in EU-US Data Flows, European Commission,
	November 2013
	&lt;u&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;http&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;://&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;ec&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;europa&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;eu&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;justice&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;data&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;-&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;protection&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;files&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;com&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;_2013_846_&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;en&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote14"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote14sym" href="#sdfootnote14anc"&gt;14&lt;/a&gt;
	Safe
	Harbor on trial in the European Union, Access Blog, September 2014
	&lt;u&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;https&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;://&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;www&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;.&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;accessnow&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;.&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;org&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;/&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;blog&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;/2014/11/13/&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;safe&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;harbor&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;on&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;trial&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;in&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;the&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;european&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;union&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote15"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote15sym" href="#sdfootnote15anc"&gt;15&lt;/a&gt;
	European
	Commission - Fact Sheet Questions and Answers on the EU-US data
	protection "Umbrella agreement", September 8, 2015
	&lt;u&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;http&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;://&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;europa&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;.&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;eu&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;/&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;rapid&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;/&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;press&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;-&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;release&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;_&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;MEMO&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;-15-5612_&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;en&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;.&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;htm&lt;/a&gt;&lt;/u&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote16"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote16sym" href="#sdfootnote16anc"&gt;16&lt;/a&gt;
	McGuire Woods, ‘EU and U.S. reach “Umbrella Agreement” on data
	transfers’, Lexology, September 14, 2015
	&lt;u&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;http&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;://&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;www&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;.&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;lexology&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;.&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;com&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;/&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;library&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;/&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;detail&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;.&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;aspx&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;?&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;g&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;=422&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;bca&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;41-2&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;d&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;54-4648-&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;ae&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;57-00&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;d&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;678515&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;e&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;1&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;f&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote17"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote17sym" href="#sdfootnote17anc"&gt;17&lt;/a&gt;
	Andrew
	Woods, Lowering the Temperature on the Microsoft-Ireland Case,
	Lawfare September, 2015
	&lt;u&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;https&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;://&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;www&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;.&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;lawfareblog&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;.&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;com&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;/&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;lowering&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;temperature&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;microsoft&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;ireland&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;case&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote18"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote18sym" href="#sdfootnote18anc"&gt;18&lt;/a&gt;
	Jens-Henrik Jeppesen, Greg Nojeim, ‘The EU-US Umbrella Agreement
	and the Judicial Redress Act: Small Steps Forward for EU Citizens’
	Privacy Rights’, October 5, 2015
	&lt;u&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;https&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;://&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;cdt&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;.&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;org&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;/&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;blog&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;/&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;the&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;eu&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;us&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;umbrella&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;agreement&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;and&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;the&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;judicial&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;redress&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;act&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;small&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;steps&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;forward&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;for&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;eu&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;citizens&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;privacy&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;rights&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote19"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote19sym" href="#sdfootnote19anc"&gt;19&lt;/a&gt;
	Ibid 18.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote20"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote20sym" href="#sdfootnote20anc"&gt;20&lt;/a&gt;
	Landmark ECJ data protection ruling could impact Facebook and
	Google, The Guardian, 2 October, 2015
	&lt;u&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;http&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;://&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;www&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;theguardian&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;com&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;technology&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;/2015/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;oct&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;/02/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;landmark&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;ecj&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;data&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;protection&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;ruling&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;facebook&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;google&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;weltimmo&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote21"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote21sym" href="#sdfootnote21anc"&gt;21&lt;/a&gt;
	Julia Powles, Tech companies like Facebook not above the law, says
	Max Schrems, The Guardian, Octover 9, 2015
	&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;http&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;://&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;www&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;theguardian&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;com&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;technology&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;/2015/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;oct&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;/09/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;facebook&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;data&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;privacy&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;max&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;schrems&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;european&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;court&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;of&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;justice&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote22"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote22sym" href="#sdfootnote22anc"&gt;22&lt;/a&gt;
	Adam
	Thierer,
	Unintended
	Consequences of the EU Safe Harbor Ruling, The Technology Liberation
	Front, October 6, 2015
	&lt;u&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;http&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;://&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;techliberation&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;.&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;com&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;/2015/10/06/&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;unintended&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;consequenses&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;of&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;the&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;eu&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;safe&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;harbor&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;ruling&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;/#&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;more&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-75831&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote23"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote23sym" href="#sdfootnote23anc"&gt;23&lt;/a&gt;
	Anupam
	Chander, Tweeted ECJ&lt;a href="https://twitter.com/hashtag/schrems?src=hash"&gt;
	#&lt;/a&gt;&lt;a href="https://twitter.com/hashtag/schrems?src=hash"&gt;schrems&lt;/a&gt;
	ruling may effectively require data localization within Europe,
	&lt;u&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;https&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;://&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;twitter&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;.&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;com&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;AnupamChander&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;status&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;/651369730754801665&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote24"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote24sym" href="#sdfootnote24anc"&gt;24&lt;/a&gt;
	Lokman Tsui, Tweeted, “If the TPP bans data localization, but the
	ECJ ruling effectively mandates it, what does that mean for the
	internet?”
	&lt;u&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;https&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;://&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;twitter&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;.&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;com&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;lokmantsui&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;status&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;/651393867376275456&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote25"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote25sym" href="#sdfootnote25anc"&gt;25&lt;/a&gt;
	Statement from Indian Head of Delegation, Mr Ram Narain for WGPL,
	&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Indian&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;statement&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;on&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;ITU&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;and&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Internet&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;at&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;the&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Working&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Group&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Plenary&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;November&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;
	4, 2014 &lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;https&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;://&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;ccgnludelhi&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;.&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;wordpress&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;.&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;com&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;/&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;author&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;/&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;asukum&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;87/&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;page&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;/2/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote26"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote26sym" href="#sdfootnote26anc"&gt;26&lt;/a&gt;
	Sounak
	Mitra, Xiaomi bets big on India despite problems, Business Standard,
	December 2014
	&lt;u&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;http&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;://&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;www&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;.&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;business&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;standard&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;.&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;com&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;/&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;article&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;/&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;companies&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;/&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;xiaomi&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;bets&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;big&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;on&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;india&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;despite&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;problems&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-114122201023_1.&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;html&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote27"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote27sym" href="#sdfootnote27anc"&gt;27&lt;/a&gt;
	Neha
	Alawadi, Ruling on data flow between EU &amp;amp; US may impact India’s
	IT sector, Economic Times,October 7, 2015
	&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;http&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;://&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;economictimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;indiatimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;com&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;articleshow&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/49250738.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cms&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;?&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;source&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;contentofinterest&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;medium&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;text&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;campaign&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cppst&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote28"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote28sym" href="#sdfootnote28anc"&gt;28&lt;/a&gt;
	Pranav Menon, Data Protection Laws in India and Data Security-
	Impact on India and Data Security-Impact on India - EU Free Trade
	Agreement, CIS Access to Knowledge, 2011
	&lt;u&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;http&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;://&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;cis&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;india&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;.&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;org&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;/&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;a&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;2&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;k&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;/&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;blogs&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;/&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;data&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;security&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;laws&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;india&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;.&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote29"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote29sym" href="#sdfootnote29anc"&gt;29&lt;/a&gt;
	Surendra
	Kumar Sinha, India wants Mutual Legal Assistance treaty with
	Bangladesh, Economic Times, October 7, 2015
	h&lt;u&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;ttp&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;://&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;economictimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;indiatimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;com&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;articleshow&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/49262294.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cms&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;?&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;source&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;contentofinterest&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;medium&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;text&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;campaign&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cppst&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote30"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote30sym" href="#sdfootnote30anc"&gt;30&lt;/a&gt;
	Pablo
	Chavez, Director, Public Policy and Government Affairs, 	Testifying
	before the U.S. Senate on 	transparency 	legislation, November 3,
	2013
	&lt;u&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;http&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;://&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;googlepublicpolicy&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;.&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;blogspot&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;.&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;in&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;/2013/11/&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;testifying&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;before&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;us&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;senate&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;on&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;.&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;htm&lt;/a&gt;&lt;/u&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote31"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote31sym" href="#sdfootnote31anc"&gt;31&lt;/a&gt;
	Report
	of the Group of Experts on Privacy (Chaired by Justice A P Shah,
	Former Chief Justice, Delhi High Court), Planning Commission,
	October 2012
		&lt;u&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;http&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;://&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;planningcommission&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;.&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;nic&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;.&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;in&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;/&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;reports&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;/&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;genrep&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;/&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;rep&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;_&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;privacy&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;.&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote31"&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote30"&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india'&gt;https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Platform Responsibility</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Digital Security</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-14T14:40:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/enabling-multi-stakeholder-cooperation-towards-a-transnational-framework-for-due-process">
    <title>Enabling Multi-stakeholder Cooperation - Towards a Transnational Framework for Due Process</title>
    <link>https://cis-india.org/internet-governance/news/enabling-multi-stakeholder-cooperation-towards-a-transnational-framework-for-due-process</link>
    <description>
        &lt;b&gt;Internet &amp; Jurisdiction Project organized a multi-stakeholder meeting of the global multi-stakeholder dialogue process in 2015 on October 8-9 in Berlin, Germany. Sunil Abraham participated in this meeting.
 &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Since 2012, the Internet &amp;amp;  Jurisdiction Project has facilitated a global multi-stakeholder dialogue  process to address the tension between the cross-border nature of the  Internet and geographically defined national jurisdictions. It provides a  neutral platform for states, business, civil society and international  organizations to discuss the elaboration of a transnational due process  framework to handle the digital coexistence of diverse national laws in  shared cross-border online spaces. This pioneering multi-stakeholder  cooperation effort seeks to develop a “policy standard” for  transnational requests for domain seizures, content takedowns and access  to subscriber information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 is an important moment that  determines the future of the multi-stakeholder model in global Internet  Governance. The Internet &amp;amp; Jurisdiction Project hopes it can provide  an opportunity to demonstrate that multi-stakeholder cooperation can  produce operational solutions to concrete policy challenges that no  stakeholder group can solve on its own.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting will gather key actors from  states, Internet companies, technical operators, civil society, academia  and international organizations.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.internetjurisdiction.net/ij-project-multi-stakeholder-meeting-2015/"&gt;This was published on the website of Internet &amp;amp; Jurisdiction Project&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/agenda-of-i-j-meeting-in-berlin" class="external-link"&gt;Agenda of the I&amp;amp;J Meeting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/participants-of-i-j-meeting-in-berlin" class="external-link"&gt;List of Participants&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/enabling-multi-stakeholder-cooperation-towards-a-transnational-framework-for-due-process'&gt;https://cis-india.org/internet-governance/news/enabling-multi-stakeholder-cooperation-towards-a-transnational-framework-for-due-process&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-14T02:53:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india">
    <title>CIS in Top 50 Tech Blogs of India</title>
    <link>https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is on the 30th position among the top technology blogs in India. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;This was published by &lt;a class="external-link" href="http://www.rebateszone.com/top-50-technology-blogs-in-india"&gt;rebateszone&lt;/a&gt; on October 7, 2015.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Infographic courtesy: Renuka Thakur&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The world of tech blogs is getting bigger and bigger, by time people are getting more and more interested in tech related items, it’s the only reason why we have seen such significant surge in tech blogs during the past few years. So the query that becomes difficult with every minute passing is that which of the tech blogs are worth your time? To help you on this we have created a list of top 50 tech bloggers in India, These weblogs are written by pros in the field, you might find numerous lists on the internet on this particular topic but you won’t be able to find more thorough and handy list that this as we have handpicked each and every blog in this list, we have organized these blogs according to the quality of posts. The other lists that you can find on the internet are sorted according to Alexa rank or number of incoming links, they have just produced those listed for the purpose of forming a new post but this list is produced according to the quality. If you want to stay updated with technology related news, developments etc., then we would recommend you to follow the following 50 tech blogs regularly:&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th class="tg-fvov"&gt;Sr No.&lt;/th&gt;
&lt;th class="tg-fvov"&gt;Website/Blog&lt;/th&gt;
&lt;th class="tg-fvov"&gt;Facebook&lt;/th&gt;
&lt;th class="tg-fvov"&gt;Twitter&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;1&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.fonearena.com/"&gt;fonearena.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;165,050&lt;/td&gt;
&lt;td class="tg-14nr"&gt;34,583&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;2&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.alltechbuzz.net/"&gt;alltechbuzz.net&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;262,568&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,706&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;3&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.bgr.in/"&gt;bgr.in&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;143,145&lt;/td&gt;
&lt;td class="tg-14nr"&gt;190,922&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;4&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://telecomtalk.info/"&gt;telecomtalk.info&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;41,205&lt;/td&gt;
&lt;td class="tg-baqh"&gt;21,080&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;5&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.medianama.com/"&gt;medianama.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;11,238&lt;/td&gt;
&lt;td class="tg-14nr"&gt;241,121&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;6&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.techulator.com/"&gt;techulator.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;9,703&lt;/td&gt;
&lt;td class="tg-baqh"&gt;238&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;7&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.infosys.com/"&gt;infosys.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;696,536&lt;/td&gt;
&lt;td class="tg-14nr"&gt;164,452&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;8&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.9lessons.info/"&gt;9lessons.info&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;23,945&lt;/td&gt;
&lt;td class="tg-baqh"&gt;7,499&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;9&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://phoneradar.com/"&gt;phoneradar.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;14,898&lt;/td&gt;
&lt;td class="tg-14nr"&gt;8,381&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;10&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.indianweb2.com/"&gt;indianweb2.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;7,738&lt;/td&gt;
&lt;td class="tg-baqh"&gt;2,427&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;11&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://techpp.com/"&gt;techpp.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;10,221&lt;/td&gt;
&lt;td class="tg-14nr"&gt;17,661&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;12&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://techlomedia.in/"&gt;techlomedia.in&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;16,578&lt;/td&gt;
&lt;td class="tg-baqh"&gt;6,452&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;13&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.techlila.com/"&gt;techlila.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;20,252&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,904&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;14&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.techtricksworld.com/"&gt;techtricksworld.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;5,331&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,726&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;15&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.makingdifferent.com/"&gt;makingdifferent.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;7,424&lt;/td&gt;
&lt;td class="tg-14nr"&gt;—–&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;16&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.tipsclear.com/"&gt;tipsclear.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;687&lt;/td&gt;
&lt;td class="tg-baqh"&gt;15,007&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;17&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.hackpundit.com/"&gt;hackpundit.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;40&lt;/td&gt;
&lt;td class="tg-14nr"&gt;315&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;18&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.ampercent.com/"&gt;ampercent.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;2,056&lt;/td&gt;
&lt;td class="tg-baqh"&gt;413&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;19&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.nirmaltv.com/"&gt;nirmaltv.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;26,261&lt;/td&gt;
&lt;td class="tg-14nr"&gt;6,293&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;20&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://pitechnologies.org/"&gt;pitechnologies.org&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;7,965&lt;/td&gt;
&lt;td class="tg-baqh"&gt;49&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;21&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.seotechyworld.com/"&gt;seotechyworld.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;9,335&lt;/td&gt;
&lt;td class="tg-14nr"&gt;4,977&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;22&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.igt.in/"&gt;igt.in&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;12,997&lt;/td&gt;
&lt;td class="tg-baqh"&gt;666&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;23&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.hacktrix.com/"&gt;hacktrix.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;9,374&lt;/td&gt;
&lt;td class="tg-14nr"&gt;196&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;24&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://thebleg.com/"&gt;technodify.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;26,318&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,958&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;25&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://webtrickz.com/"&gt;webtrickz.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;3,906&lt;/td&gt;
&lt;td class="tg-14nr"&gt;907&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;26&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.wpxbox.com/"&gt;wpxbox.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;16,938&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,242&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;27&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.itechcode.com/"&gt;itechcode.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,666&lt;/td&gt;
&lt;td class="tg-14nr"&gt;4,749&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;28&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.techfishy.com/"&gt;techfishy.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;4,791&lt;/td&gt;
&lt;td class="tg-baqh"&gt;114&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;29&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.zensar.com/"&gt;zensar.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;7,269&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,778&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;30&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://cis-india.org/"&gt;cis-india.org&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;—–&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,795&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;31&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://robosoftin.com/"&gt;robosoftin.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;664&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,892&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;32&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://digitaldimensions4u.com/"&gt;digitaldimensions4u.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,079&lt;/td&gt;
&lt;td class="tg-baqh"&gt;583&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;33&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.campustimespune.com/"&gt;campustimespune.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;3,121&lt;/td&gt;
&lt;td class="tg-14nr"&gt;278&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;34&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://msystechnologies.com/"&gt;msystechnologies.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;325&lt;/td&gt;
&lt;td class="tg-baqh"&gt;455&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;35&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://techsplurge.com/"&gt;techsplurge.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;3,797&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,140&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;36&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.zensoftservices.com/"&gt;zensoftservices.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;203&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,499&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;37&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.iltb.net/"&gt;iltb.net&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;4,994&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,675&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;38&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://savedelete.com/"&gt;savedelete.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;19,978&lt;/td&gt;
&lt;td class="tg-baqh"&gt;10,728&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;39&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.minterest.org/"&gt;minterest.org&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,033&lt;/td&gt;
&lt;td class="tg-14nr"&gt;12,867&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;40&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://thepockettech.com/"&gt;thepockettech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;22,346&lt;/td&gt;
&lt;td class="tg-baqh"&gt;12,375&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;41&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.thetechbulletin.com/"&gt;thetechbulletin.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,522&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,292&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;42&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.mobientech.com/"&gt;mobientech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;525&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,359&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;43&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.directingit.com/"&gt;directingit.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;98&lt;/td&gt;
&lt;td class="tg-14nr"&gt;27&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;44&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://itpreneurpune.com/"&gt;itpreneurpune.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,356&lt;/td&gt;
&lt;td class="tg-baqh"&gt;76&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;45&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://freaksense.com/"&gt;codemink.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;5,021&lt;/td&gt;
&lt;td class="tg-14nr"&gt;196&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;46&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://udayarumilli.blogspot.com/"&gt;udayarumilli.blogspot.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;103&lt;/td&gt;
&lt;td class="tg-baqh"&gt;63&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;47&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://saadhvi.com/"&gt;saadhvi.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;56&lt;/td&gt;
&lt;td class="tg-14nr"&gt;44&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;48&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.taraspan.com/global/"&gt;taraspan.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;8&lt;/td&gt;
&lt;td class="tg-baqh"&gt;310&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;49&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://cloudnowtech.com/"&gt;cloudnowtech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;145&lt;/td&gt;
&lt;td class="tg-14nr"&gt;55&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;50&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://keshavatech.com/"&gt;keshavatech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;2,953&lt;/td&gt;
&lt;td class="tg-baqh"&gt;18,139&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Here is the Infographic for top 50 tech blogs in India:&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Techblog50.png" alt="null" class="image-inline" title="Techblog 50" /&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india'&gt;https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-14T06:24:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology">
    <title>Communication Rights in the Age of Digital Technology </title>
    <link>https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) invites you to a conference to discuss the evolution of privacy and surveillance in India on Friday, October 30, 2015 at Deck Suite Hall, 5th Floor, Habitat Centre, Lodhi Road, Near Air Force Bal Bharti School, New Delhi - 110003, from 11 a.m. to 5 p.m.&lt;/b&gt;
        &lt;p&gt;The conference will be conducted in a round-table format. Topics to be discussed shall include, among others, the Human DNA Profiling Bill, 2012, the PIL questioning the data collection under the UID scheme, the draft National Encryption Policy and the Supreme Court judgement in Shreya Singhal v. Union of India, in the context of privacy and surveillance in India. The conference will be a forum for discussion, knowledge exchange and agenda building.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Background Note&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, the Right to Privacy has been interpreted to mean an individuals’ right to be left alone. In the age of massive use of Information and Communications Technology, it has become imperative to have this right protected. The Supreme Court has held in a number of its decisions that the right to privacy is implicit in the fundamental right to life and personal liberty under Article 21 of the Indian Constitution, though Part III does not explicitly mention this right. Since the 1960s, the Apex Court has been dealing with this issue, primarily with respect to privacy being recognised as a fundamental or common law right and the standards that need to be satisfied in order to impose any restrictions on it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the year 2012, the Planning Commission constituted a Group of Experts under the chairmanship of Justice AP Shah, Former Chief Justice of the Delhi High Court to recommend a &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;potential privacy framework&lt;/a&gt; for  privacy in India. Previously in 2011 the Department of Personnel and Training had prepared a &lt;a href="https://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf"&gt;draft Bill on Right to Privacy &lt;/a&gt;which has yet to materialize into a comprehensive legislation on privacy. In 2014, a version of the revised Right to Privacy Bill was &lt;a href="http://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011"&gt;leaked&lt;/a&gt;. Amendments to the Bill  aim to protect individuals against misuse of their data by the government or private agencies, and is in the process of being &lt;a href="http://www.newindianexpress.com/nation/Centre-Giving-Final-Touches-to-Right-to-Privacy-Bill/2015/03/17/article2717271.ece"&gt;finalized by the Indian Government&lt;/a&gt;&lt;a href="http://www.newindianexpress.com/nation/Centre-Giving-Final-Touches-to-Right-to-Privacy-Bill/2015/03/17/article2717271.ece"&gt;. &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of late, privacy concerns have gained importance in India due to the initiation of national programmes like the UID Scheme, DNA Profiling, the National Encryption Policy, etc. attracting criticism for their impact on the right to privacy. For example, DeitY introduced a draft National Encryption Policy in September this year to prescribe methods for encryption. However, the policy would have posed significant restriction on the ability of citizens to encrypt online communication. Backlash from the citizens, industry, social media and privacy experts led the Government to withdraw  the policy as the measures included made the information system vulnerable in every sense.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, the Apex Court gave a &lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt;historical&lt;/a&gt;&lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt; judgement&lt;/a&gt; by striking down section 66A of the IT (Amendment) Act 2008. The Court upheld section 69A and the Information Technology  (Procedure &amp;amp; Safeguards for Blocking for Access of Information by Public) Rules 2009 to be constitutionally valid, which accords the government with the authority to block transmission of information and websites when it deems it as necessary for reasons like sovereignty and integrity of India, public order, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another government initiative which has generated considerable controversy for its threat to privacy is the UID project which aims to issue a unique identification number to all citizens by the Unique Identification Authority of India, which can be authenticated and verified online. In August this year, the Supreme Court, &lt;a href="http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841"&gt;vide an interim order&lt;/a&gt;, restricted the use of Aadhaar by declaring it to be optional for availing government benefits and services. Though the Government contended the right to privacy as a fundamental right in India, the Court deferred this issue to a larger Constitutional Bench, and the Supreme Court upheld its decision yet again in the month of October.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the &lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;d&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;raft&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt; Human DNA &lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;P&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;rofiling &lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;B&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;ill 2015&lt;/a&gt; is being questioned on grounds of privacy invasion on  a massive scale as it aims to collect and store the DNA samples of criminals, suspects, volunteers, and victims and regulate DNA laboratories and DNA sampling for use by law enforcement agencies. The Bill also fails to include comprehensive privacy safeguards and provisions regarding collection of DNA samples with or without the consent of an individual, making individual privacy an important concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Going by these ongoing debates, one can say that Privacy as a right has primarily evolved by way of judicial interpretation and continues to evolve in light of several controversial Government policies, projects and schemes. However its development is often undermined by tension between several competing national interests which calls for clear guidelines to protect this inviolable right of the citizens.&lt;/p&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/internet-governance/blog/gsma-conference-invite.pdf" class="internal-link"&gt; 
&lt;hr /&gt;
&lt;b&gt;Download the Invite&lt;/b&gt;&lt;/a&gt;&lt;/h3&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology'&gt;https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rakesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-10-24T07:45:26Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-amulya-gopalakrishnan-october-9-2015-dadri-reopens-debate-on-online-hate-speech">
    <title>Dadri reopens debate on online hate speech</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-amulya-gopalakrishnan-october-9-2015-dadri-reopens-debate-on-online-hate-speech</link>
    <description>
        &lt;b&gt;The friction between free speech and hate speech has become newly intense because of social media. Twitter reflected the turmoil after the lynching of Mohammed Akhlaq in Dadri, Uttar Pradesh, when some tweets justified the murder as a legitimate reaction against cow-slaughter, trending the hashtag #cowmurderers.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Amulya Gopalakrishnan was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/Dadri-reopens-debate-on-online-hate-speech/articleshow/49281467.cms"&gt;published in the Times of India&lt;/a&gt; on October 9, 2015. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"Jo bhi gau ka mans khaye, use aur uske parivar ko turant maar do (those  who eat beef should be killed along with their families)" is just one  example of the kind of tweets that got an FIR filed against the handle.  The UP police also booked a person for spreading inflammatory rumours  about cow-smugglers killing a police officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Their comrades immediately alleged censorship, and various profiles with  pictures of weapon-brandishing deities rallied under hashtags of  support. Taslima Nasreen summed up their grievance, claiming that "free  speech allows hate tweets".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are, of course reasonable restrictions to free speech when it  looks likely to spiral into violence, what a 1989 Supreme Court judgment  called a "spark in a powder keg" situation. The IPC has Section 153A,  153B, 295 and 505 and more, which curb speech that promotes enmity  between groups on the basis of religion, race, place, birth or language,  defiles places of worship, insults religious sentiments, creates public  mischief and so on. But social media presents an almost daily dilemma,  and makes it clear that it is time for more discriminating decisions on  what kinds of extreme speech can be gagged. As the SC judgment knocking  down the over-broad Section 66A of the IT Act noted, discussion and  advocacy , however, hateful or prejudiced, are not incitement. &lt;br /&gt;&lt;br /&gt; All hate speech seeks to sharpen tensions, but not all such speech is  equally damaging. As Pranesh Prakash, policy director of the Centre for  Internet and Society , Bangalore, puts it, "freedom of speech operates  within fields of power".Hate speech either aims to taunt and diminish a  minority, or tell others in an in-group that their feelings are  shared.Different countries make their own judgment calls as they balance  these two values, both fundamental to a democracy: free expression and  the defence of human dignity and inclusion. &lt;br /&gt;&lt;br /&gt; Internet  intermediaries, ISPs or powerful private corporations like Twitter and  Facebook, have to comply with court orders and official government  requests, but they are not always on the same page about unacceptable  content. For a company like Twitter, for instance, the need to preserve  individual voices, however discordant, is more valuable than the need to  create a more perfect public sphere. It advised offended users to  simply block controversial content, though recently , it has begun to  consider "direct, repeated attacks on an individual" a potential  violation too. &lt;br /&gt;&lt;br /&gt; Susan Benesch, of Harvard University's Berkman  Center, has suggested a framework to identify a dangerous speech act,  which factors in the profile of the speaker, the emotional state of the  audience, the content of the speech itself as a call to action, the  social context in which it occurs, and the means used to spread it. &lt;br /&gt;&lt;br /&gt; The UP police has a social media lab to track and scotch rumours.  "That's how we recently busted a false story about a khap panchayat  ordering gangrapes," says a UP police official who did not wish to be  named. Rather than appealing to the social media company for takedowns  -an onerous process, and one where provocations are often difficult to  explain -it is easier to find and deal with the source of the content,  he says. One can identify problematic material either by location or  keywords, says Ponnurangam K, assistant professor at IIIT, Delhi, who  has developed the social network analytics tool used by UP police. Given  the speed and scale of the internet and the volume of user-generated  content, legal curbs cannot be invoked for every instance of hate  speech. "It is far more feasible to monitor these rumours and take  preventive action on the ground, where the harm is likely to be felt,  and to use the same medium to counter the rumours with truth," says  Prakash. Social media was assumed to have responsible for spreading the  2011 riots in the UK, but it turned out to be even more effective in  stemming the contagion, righting rumours and helping law enforcers. &lt;br /&gt;&lt;br /&gt; During the 2013 general election in Kenya, the Umati project trawled  social media for trending hate content and tried to counter its effects  by exposing and shunning those advocating violence. A repository called  Hatebase tries to identify local words and phrases that indicate brewing  trouble, to make it easier to find the active signals of threat from  the low-level hum -repeated references to cow meat in India, or  "sakkiliya", a Sinhala word to disparage Tamils in Sri Lanka. &lt;br /&gt;&lt;br /&gt; "The government should work with platforms to find the nodes of  dangerous speech, to counter them, and support campaigns for those  victimised," says Chinmayi Arun, research director of the Centre for  Communication Governance at the National Law University, Delhi, who is  leading a three-year project on  online hate speech, in collaboration  with the Berkman Center. &lt;br /&gt;&lt;br /&gt; It is far more effective to boost  media literacy, help people sniff out bias and propaganda, understand  how photos can be morphed and fake videos passed off as real. "Law  enforcers need the imagination and patience to develop these strategies,  rather than try to censor controversial speech wherever possible," she  says. &lt;br /&gt;&lt;br /&gt; Of course, when IT cells of political parties are the  fount of the most of these excitable handles, that's easier said than  done.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-amulya-gopalakrishnan-october-9-2015-dadri-reopens-debate-on-online-hate-speech'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-amulya-gopalakrishnan-october-9-2015-dadri-reopens-debate-on-online-hate-speech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Hate Speech</dc:subject>
    

   <dc:date>2015-10-11T05:42:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk">
    <title>Modi's Valley hug sparks swadeshi talk</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk</link>
    <description>
        &lt;b&gt;His warm hug of Facebook's Mark Zuckerberg will perhaps be the most abiding image of Narendra Modi's visit to the Silicon Valley.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;But that embrace, and what  it conveyed, is now becoming the subject for an intense debate among  techies here. Is Modi giving in too much to the Googles and Facebooks of  the world, when there is so much technology talent within India? Is he  taking the easy way out by handing out critical pieces of his Digital  India vision to global incumbents rather than build domestic  capabilities?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;"When the government  wanted to build a citizen engagement platform earlier this year, they  depended on Google. Now when they want Wi-Fi in railway stations, it's  again Google. These are things that can be done by our companies,  otherwise we will not be able to create our own digital industry.  Remember, we are the people who built Aadhaar," said an industry veteran  who did not want to be named.&lt;br /&gt; &lt;br /&gt; Nitin Pai, co-founder of  Takshashila, an independent policy research and advocacy body that  provides services for government agencies, NGOs and corporations, said  Modi's team should make a careful distinction between national interest  and MNCs' commercial interest. "Many MNCs have come forward to  participate in Digital India initiatives. The government will have to  look at offering sufficient incentives for innovation to domestic tech  companies, many of whom are coming with innovative business models," he  said.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Speaking to a  cross-section of tech companies here, two sets of concerns emerge. One  relates to the concessions that will work in favour of global incumbents  and against newcomers - the latter is likely to add more value in the  long term. This includes the issue of net neutrality , on which the  government is seen to be waffling, and the guidelines issued by the  Indian Patent Office declaring that software is patentable in India.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;img src="https://cis-india.org/home-images/Concerns.png/@@images/3d04c7c6-2ac6-444b-8fbb-4e7d79823c8c.png" alt="Concerns" class="image-inline" title="Concerns" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The new guidelines will  make it easier for companies to file for software patents in India. But  software patenting has become hugely controversial globally , because  innova tions in the area are often just incremental, and come on top of  other software programs.Besides, patenting is expensive and is often the  subject of litigation, both of which work against small ventures with  little resources. Companies like Google have spent billions of dollars  to buy patents.&lt;br /&gt; &lt;br /&gt; Venkatesh Hariharan, member of software product  think-tank iSpirt, said the new guidelines would make it easier for  bigger companies to file software patents, but for smaller firms and  startups, the move could be detrimental."They could end up fighting  patent litigations. In the US, 37% of patent litigation is around  software and business patents," he said.&lt;br /&gt; &lt;br /&gt; Sunil Abraham,  executive director in research organization Centre for Internet and  Society , fears litigation could kill local innovation. He cited a  recent example where a Delhi high court order asked Indian handset  manufacturer Micromax to pay 1.25%-2% of the selling price of its  devices to Ericsson that had claimed infringement of patents.&lt;br /&gt; &lt;br /&gt; The other set of issues relates to certain rules and regulations in  India that place significant obstacles before small technology ventures.  This is resulting in many ventures shifting their registered offices to  Singapore or the US.&lt;br /&gt; &lt;br /&gt; Albinder Dindsa's on-demand delivery  service Gro fers is among the latest to create a holding company in  Singapore. "It is challenging to do business in India. Even opening a  bank account took time. We thought it would be easier to do an IPO if we  are in Singapore," he said.&lt;br /&gt; &lt;br /&gt; A senior industry analyst who did  not want to be named said that till last year, two out of four ventures  were moving out of India, but now that figure is three out of four. "I  would expect the government to do something about it. In fact, the  finance minister did say in June that the issues would be addressed  within 30 days. But nothing has happened."&lt;br /&gt; &lt;br /&gt; Also, it is expensive for angel investors overseas to invest in Indian startups.&lt;br /&gt; &lt;br /&gt; India disallows startups from offering stock options to foreign  nationals, which makes it difficult for them to access seasoned mentors.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-11T05:33:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-october-8-2015-suhrith-parthasarathy-access-at-the-cost-of-net-neutrality">
    <title>Access at the cost of Net neutrality?</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-october-8-2015-suhrith-parthasarathy-access-at-the-cost-of-net-neutrality</link>
    <description>
        &lt;b&gt;In the Net neutrality debate, there is a conflict between two core values: ease of access and neutrality. The ease of access promised by applications like Free Basics compromises neutrality and may later morph into a method of predatory pricingIf programs that bring access to a part of the Internet in the immediate future were to entrench themselves, it could eventually lead to telecom companies abusing their dominant positionsIn the absence of a specific law mandating a neutral Internet, telecom companies enjoy a virtual carte blanche to discriminate between different applications. Though they have not yet exploited this autonomy fully, they are certainly moving towards that.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Suhrith Parthasarathy was &lt;a class="external-link" href="http://www.thehindu.com/opinion/lead/access-at-the-cost-of-net-neutrality/article7735242.ece"&gt;published in the Hindu&lt;/a&gt; on October 8, 2015. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, the social media giant, Facebook, &lt;a href="http://www.thehindu.com/business/Industry/facebook-rings-reliance-communications-for-free-data-access/article6878396.ece"&gt;formalised a partnership&lt;/a&gt; with Reliance Communications that enabled the Indian company to provide  access to over 30 different websites, without any charge on mobile data  accruing to the ultimate user. The platform, originally known as  “Internet.org,” has now been &lt;a href="http://www.thehindu.com/sci-tech/technology/internet/facebook-rebrands-internetorg-platform-as-free-basics-by-facebook/article7686680.ece"&gt;rebranded&lt;/a&gt; as “Free Basics,” Facebook announced last month. Its fundamental ethos,  though, remains unchanged. It allows Reliance’s subscribers to surf  completely free of cost a bouquet of websites covered within the scheme,  which includes, quite naturally, &lt;a href="http://facebook.com" target="_blank"&gt;facebook.com&lt;/a&gt;.  Mark Zuckerberg, Facebook’s founder, views this supposed initiative as a  philanthropic gesture, as part of a purported, larger aim to bring  access to the Internet to those people who find the costs of using  generally available mobile data prohibitive.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Neutrality, an interpretive concept&lt;/b&gt;&lt;br /&gt; On the face of it, this supposed act of altruism appears to be  commendable. But, there are many critics — some of whom have come  together to launch a website “&lt;a href="http://savetheinternet.in" target="_blank"&gt;savetheinternet.in&lt;/a&gt;”  with a view to defending Internet freedom — who argue that Free Basics  violates what has come to be known as the principle of network (or Net)  neutrality.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While it is clear to all of us that a notion of Net neutrality involves  some regulation of the Internet, it is less clear what the term actually  means. Like any phrase that involves either a moral or a legal  obligation, Net neutrality is also an interpretive concept. People who  employ the term to denote some sort of binding commitment, or at the  least an aspirational norm, often tend to disagree over precisely how  the idea ought to be accomplished. Tim Wu — an American lawyer and  presently a professor at the Columbia University — who coined the term,  views the notion of Net neutrality as signifying an Internet that does  not favour any one application over another. In other words, the idea is  to ensure that Internet service providers do not discriminate content  by either charging a fee for acting as its carrier or by incorporating  any technical qualifications.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In India, there is no law that expressly mandates the maintenance of a  neutral Internet. This March, the Telecom Regulatory Authority of India  (TRAI) &lt;a href="http://www.thehindu.com/business/Industry/trai-seeks-views-to-regulate-netbased-calling-messaging-apps/article7039815.ece"&gt;released a draft consultation paper &lt;/a&gt;seeking the public’s views on whether the Internet needed regulation. Unfortunately, much of its attention was focussed on the &lt;a href="http://www.thehindu.com/sci-tech/technology/internet/policy-proposes-storage-of-all-messages-mandatory-for-90-days/article7674762.ece"&gt;supposedly pernicious impact &lt;/a&gt;of  applications such as WhatsApp and Viber. “In a multi-ethnic society  there is a vital need,” wrote TRAI, “to ensure that the social  equilibrium is not impacted adversely by communications that inflame  passions, disturb law and order and lead to sectarian disputes.” The  questions, therefore, in its view were these: should at least some  Internet applications be amenable to a greater regulation, and should  they compensate the telecom service providers in addition to the data  charges that the consumers pay directly for the use of mobile Internet?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;If the government eventually answers these questions in the affirmative,  the consequences could be drastic. It could lead to a classification of  Internet applications based on arbitrary grounds, by bringing some of  them, whom the government views as harmful to society in some manner or  another, within its regulatory net. Through such a move, the state,  contrary to helping establish principles of Net neutrality as a rule of  law, would be actively promoting an unequal Internet.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In any event, as things stand, in the absence of a specific law mandating a neutral Internet, telecom companies enjoy a virtual &lt;i&gt;carte blanche&lt;/i&gt; to discriminate between different applications. Though these companies  have not yet completely exploited this autonomy, they are certainly  proceeding towards such an exercise. In April this year, &lt;a href="http://www.thehindu.com/business/airtel-launches-platform-offering-free-access-to-certain-apps/article7077204.ece"&gt;Airtel announced Airtel Zero&lt;/a&gt;,  an initiative that would allow applications to purchase data from  Airtel in exchange for the telecom company offering them to consumers  free of cost.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;On the face of it, this programme appears opposed to Net neutrality. But  what is even more alarming is that mobile Internet service providers  could, in the future, plausibly also control the speeds at which  different applications are delivered to consumers. For example, if  WhatsApp were to subscribe to Airtel Zero by paying the fee demanded by  the company, Airtel might accede to offering WhatsApp to consumers at a  pace superior to that at which other applications are run. This kind of  discrimination, as Nikhil Pahwa, one of the pioneers of the Save The  Internet campaign, has argued, is prototypically opposed to Net  neutrality. It tends to breed an unequal playing field, and, if allowed  to subsist, it could create a deep division in the online world.  Ultimately, we must view Net neutrality as a concept that stands for the  values that we want to build as a society; it pertains to concerns  about ensuring freedom of expression and about creating an open space  for ideas where democracy can thrive. There is a tendency, though, to  view those who support Net neutrality as representing a supercilious  position. Such criticism is unquestionably blinkered, but it also  highlights certain telling concerns.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Telecom companies that wish to discriminate between applications argue  that in the absence of an Internet that has completely permeated all  strata of society, an obligation to maintain neutrality is not only  unreasonable on the companies, but also unfair on the consumer. After  all, if nothing else, Airtel Zero and Free Basics bring, at the least,  some portions of the Internet to people who otherwise have no means to  access the web. What we have, therefore, at some level, is a clash of  values: between access to the Internet (in a limited form) and the  maintenance of neutrality in an atmosphere that is inherently unequal.  This makes tailoring a solution to the problem a particularly arduous  process.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Internet, in its purest form, is a veritable fountain of  information. At its core lies a commitment to both openness and a level  playing field, where an ability to innovate is perennially maintained.  It is difficult to argue against Facebook when it says that some access  is better than no access at all. But one of the problems with Free  Basics, and indeed with Airtel Zero too, is that the consumer has no  choice in which websites he or she might want to access free of cost. If  this decision is made only by Facebook, which might argue that it gives  every developer an equal chance to be a part of its project as long as  it meets a certain criteria, what we have is almost a paternalistic web.  In such a situation, information, far from being free, is shackled by  constraints imposed by the service provider.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Laudable end, unethical means&lt;/b&gt;&lt;br /&gt; This is precisely one of the concerns raised by those arguing in favour  of Net neutrality, who, it is worth bearing in mind, aren’t resistant to  the idea of a greater penetration of the Internet. Their apprehensions  lie in companies resorting to what they believe is an unethical means to  achieving, at least in theory, a laudable end. According to them,  negating Net neutrality, in a bid to purportedly achieve greater access  to the Internet in the immediate future, could prove profoundly  injurious in the long run. Yes, Airtel Zero and Free Basics would bring  to the less-privileged amongst us some access to the Internet, but the  question is this: at what cost?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The worry is that if the programs that bring access to a part of the  Internet in the immediate future were to entrench themselves, it could  eventually lead to these telecom companies abusing their dominant  positions. No doubt, as Pranesh Prakash, policy director at the Centre  for Internet and Society, has argued, it might require a deeper analysis  to argue convincingly that packages such as Free Basics and Airtel Zero  require immediate invalidation in their present forms; significantly,  the former does not demand payments from the applications while the  latter is premised on such consideration. But, viewed holistically, the  companies’ actions could potentially be characterised as a form of  predatory pricing, where consumers might benefit in the short run, only  for serious damage to ensue to competition in the long run.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It is, therefore, necessary that any debate on the issue must address  the tension between the two apparently conflicting goals — the  importance of maintaining a neutral Internet and the need to ensure a  greater access to the web across the country. Mr. Zuckerberg argues that  these two values are not fundamentally opposed to each other, but can —  and must — coexist. He is possibly correct at a theoretical level.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;But the history of markets tells us that we have to be very careful in  allowing predatory practices, devised to achieve short-term goals, to go  unbridled. As citizens, each of us has a fundamental right to freedom  of speech and expression. If we were to get the balance between these  two values wrong, if we were to allow the domination, by a few parties,  of appliances that facilitate a free exchange of ideas, in a manner that  impinges on the Internet’s neutrality, our most cherished civil  liberties could well be put to grave danger.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;(&lt;i&gt;Suhrith Parthasarathy is an advocate in the Madras High Court.&lt;/i&gt;)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-october-8-2015-suhrith-parthasarathy-access-at-the-cost-of-net-neutrality'&gt;https://cis-india.org/internet-governance/news/the-hindu-october-8-2015-suhrith-parthasarathy-access-at-the-cost-of-net-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-09T01:18:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-register-september-29-2015-kieren-mccurthy-do-you-agree-with-our-fee-hike">
    <title>Do you agree with our fee hike? Press 1 to answer Yes; or 2 for Yes</title>
    <link>https://cis-india.org/internet-governance/news/the-register-september-29-2015-kieren-mccurthy-do-you-agree-with-our-fee-hike</link>
    <description>
        &lt;b&gt;It has long been a concern that domain-name overseer ICANN is largely funded by companies reliant on the organization to make money.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kieren McCarthy was &lt;a class="external-link" href="http://www.theregister.co.uk/2015/09/29/icann_fee_agreement_survey_only_yes_option/"&gt;published in the Register&lt;/a&gt; on September 29, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Every biz that wishes to sell domain names – called a registrar – has  to pay the organization $4,000 a year, plus 18 cents on every domain  they sell.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, they have to pay a variable fee that  comprises the money ICANN says it spends on registrar-related activities  divided by the number of companies that are accredited. This year that  cost was $3.8m and with roughly 1,150 companies, that's $3,300 a head.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The pricing structure provides California-based ICANN  with just under $40m a year, more than a third of its total budget. But  in order to make sure the non-profit organization doesn't abuse its  market control to hike up its fees, each year the registrars have to  formally approve the fee structure that the ICANN Board has adopted. And  they do that through an online vote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This year, some registrars are wondering whether the $3.8m spent by ICANN is a good deal for them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"What do your ICANN fees get you?" ICANN asks itself  in an email sent to all registrars. "In addition to helping cover the  expenses associated with ICANN meetings and ICANN's day-to-day  operations, your fees have allowed us to conduct regular outreach with  registrars through 'roadshow' type training seminars, webinars,  in-person events, and site visits."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Don't ask, don't tell&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It's not clear how that money is spent nor on what,  since ICANN continues to provide only the vaguest details over its  budget, providing annual sums for "travel" and for "meetings" across the  entire organization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN is also actively refusing to hand that  information over, telling one outfit that formally asked for additional  financial data that for it to do so would be "extremely time consuming  and overly burdensome." That organization – the Centre for Internet and  Society – is &lt;a href="https://www.icann.org/en/system/files/files/reconsideration-15-15-cis-redacted-08sep15-en.pdf" target="_blank"&gt;appealing that decision&lt;/a&gt; [PDF] to ICANN's Board with a decision made two days ago but still unpublished.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN expenditure is &lt;a href="http://www.theregister.co.uk/2015/09/24/icann_on_dangerous_path/?page=3"&gt;increasing&lt;/a&gt;:  in 2014 alone, its "travel" costs jumped by 85 per cent to $17m; its  meetings budget nearly doubled from an average of $3.2m per public  meeting in 2013 to $6m in 2014. But there is almost no information on  where this money has been spent, and so far no explanation for why it  spent $113m in 2014 with an income of just $84m.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What else is ICANN spending registrars' fees on?  "We've recruited Registrar Services staff dedicated to serving Europe,  the Middle East/Africa, and Asia and have already begun a series of  (low-cost) micro-regional events in China, Japan, Singapore, and South  Korea, with plans taking shape for events in Europe, Africa, the Middle  East, and the Americas in the near future," we're told.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But existing registrars are wondering whether all  these new staff and events are needed. Are there hundreds of new  registrars entering the market? Are they in Asia?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, ICANN has stopped providing that kind  of information. In 2009, under pressure to be more open about what was  going on, the organization made big play of the fact it was going to  produce statistics showing how many registrars there were, how big they  were, and where they were based in a new "dashboard."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But those stats stopped being produced two years ago and the &lt;a href="https://charts.icann.org/public/index-registrar-registration.html" target="_blank"&gt;most recent data provided&lt;/a&gt; is from 2012.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Software and security&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Where else do the millions of dollars from the  companies that support ICANN go? "We're building up the 'GDD Portal',"  says a note from ICANN's staff, "which will become a one-stop  destination for all registrar resources at ICANN, and transitioning our  customer relationship management software from RADAR to salesforce.com."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is the same GDD Portal that ICANN had to shut  down earlier this year because of a security breach. It had  misconfigured out-the-box software and &lt;a href="http://www.theregister.co.uk/2015/03/02/icann_suffers_another_security_breach/"&gt;exposed every user's information&lt;/a&gt;,  including financial projections, launch plans, and confidential  exchanges, to every other user. Having at first claimed there was "no  indication" that confidential information was exposed, it later admitted  that it &lt;a href="http://www.theregister.co.uk/2015/04/30/confidential_information_exposed_over_300_times_in_icann_security_snafu/"&gt;had in fact happened 330 times&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for RADAR, it was &lt;a href="http://www.theregister.co.uk/2014/12/24/icanns_technical_competence_questioned_by_verisign/"&gt;specifically named&lt;/a&gt; in a report by Verisign as a security risk; this is one of the things  on a "growing list of examples where ICANN's operational track record  leaves much to be desired."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;We're listening...&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Finally, in explaining why the registrar fees are a  good deal for the companies, ICANN's staff note: "Most importantly,  we're doing our best to listen to you to ensure that our work is of real  value to you."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately that listening does not extend to hearing any complaints about the fees, or what they are spent on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All registrars receive an email during the annual  approval of the fees levied against them with a link to an online  survey. Incredibly enough, however, they are only allowed to agree to  the fees – there is no option to disagree. Or in fact do anything other  than sign up for another year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And what is ICANN's explanation for why the companies  that provide it with over a third of its budget are not allowed to  express anything but approval of the fees ICANN sets? Problems with the  voting software:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;The system is only able to accept  affirmative expressions of approval. (A technical limitation in the  voting software prevents us from knowing when we've reached the level of  approval required if we offer both a 'yes, I approve,' and a 'no, I  don't approve' option.) But if you have reservations about approving the  budget or concerns you'd like addressed first, please let me know and  I'll be happy to try to address those directly with you.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;So despite charging the companies $3,500 each a year  to run the systems that they use, ICANN has been unable to find voting  software that is capable of accepting more than one answer. Money well  spent.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-register-september-29-2015-kieren-mccurthy-do-you-agree-with-our-fee-hike'&gt;https://cis-india.org/internet-governance/news/the-register-september-29-2015-kieren-mccurthy-do-you-agree-with-our-fee-hike&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-01T15:28:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy">
    <title>Online outcry forces government to withdraw draft encryption policy</title>
    <link>https://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy</link>
    <description>
        &lt;b&gt;The article by Naina Khedekar discussing encryption policy was published in First Post on September 23, 2015. Pranesh Prakash has been quoted.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read the original published by First Post &lt;a class="external-link" href="http://tech.firstpost.com/news-analysis/online-backlash-forces-government-to-withdraw-draft-encryption-policy-282106.html"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Yesterday, the government &lt;a href="http://tech.firstpost.com/news-analysis/after-backlash-govt-exempts-whatsapp-facebook-payment-gateways-from-encryption-policy-282095.html" target="_blank"&gt;&lt;b&gt;released a draft encryption policy&lt;/b&gt;&lt;/a&gt; aimed  at keeping a tab on the use of technology by specifying algorithms and  length of encryption keys used by ‘all’. It wanted businesses, telcos  and Internet companies to store all encrypted data for 90 days in plain  text which should be presented before the law enforcement agencies  whenever asked to. Moreover, failing to do so would mean legal action as  per the laws of the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a huge outcry, most of us woke up to the new proposed addendum  this morning wherein the government has clarified to exempt products  such as social media sites including WhatsApp, Facebook and Twitter;  payment gateways; e-commerce and password based transactions and more  from the draft policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, the government has decided to &lt;a href="http://tech.firstpost.com/news-analysis/government-withdraws-controversial-draft-encryption-policy-reports-282170.html"&gt;&lt;b&gt;withdraw the draft encryption policy&lt;/b&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;I have written for that draft to be withdrawn, made changes to and then re-released: RS Prasad : ANI &lt;a href="http://t.co/W2IP4meEGb" rel="nofollow"&gt;pic.twitter.com/W2IP4meEGb&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Firstpost (@firstpost) &lt;a href="https://twitter.com/firstpost/status/646221371932962816" rel="nofollow"&gt;September 22, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;Some sort of encryption policy is there all over the world: Ravishankar Prasad &lt;a href="http://t.co/cDvsOWtjcM" rel="nofollow"&gt;pic.twitter.com/cDvsOWtjcM&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Firstpost (@firstpost) &lt;a href="https://twitter.com/firstpost/status/646222621495812096" rel="nofollow"&gt;September 22, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;What’s fascinating is how the whole process felt like déjà vu.  Haven’t we seen the drama unfold before. While the dust on the net  neutrality sage has barely settled, we’re already facing newer issues  related to encryption and privacy. We never learn from our mistakes, do  we? A new draft policy, public outcry, and then comes the much-needed  changes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="social_media" class="size-full wp-image-235071" height="360" src="http://tech.firstpost.com/wp-content/uploads/2014/09/social_media.jpg" width="640" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government hasn’t just caused anxiety and chaos among the  netizens, but the initial draft completely misguided people. According  to &lt;a href="http://thenextweb.com/in/2015/09/21/india-still-doesnt-understand-how-online-security-works/" rel="nofollow" target="_blank"&gt;&lt;b&gt;TheNextWeb&lt;/b&gt;&lt;/a&gt;,  “The Indian government has made a fool of itself and caused anxiety  among citizens with a woefully misguided proposal for a national  encryption policy that it’s just released to the public for feedback.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While we sit back and talk about Digital India, smarter cities and so  on, the makers of the law seem to be clueless about some major  by-products concerning these initiatives such as security, privacy and  likewise. Each time the government talks about a new initiative meant to  bring in some law and order pertaining to digital rights, it somehow  manages to come up with implications that could affect us far worse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this case, the Indian government is trying to ensure that its law  enforcement agencies have easy access to encrypted information whenever  required, but this could easily compromise security and privacy in the  process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, each time the government releases a proposal for our  digital lives, it’s people who remind the government about the adverse  implications it could have. Does the expert panel writing these reports  know nothing about privacy and how it possibly works? Or is the  government simply looking at a trial balloon policy to gauge reactions  by people. So, next time we don’t react, a draconian rule might just be  governing our digital lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The whole net neutrality saga continued for months with assurance  from the government on how it supports free and equal Internet, and  eventually made ‘certain changes’. This seems headed on a similar path.  Though the new addendum comes with changes, it still leaves us as  muddled as before.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash of the CIS has tweeted out how the new clarification clarifies nothing.&lt;/p&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;This clarification by the govt does not clarify anything, but further muddles the encryption policy. &lt;a href="http://t.co/1KK8AFRp6Q" rel="nofollow"&gt;pic.twitter.com/1KK8AFRp6Q&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Pranesh Prakash (@pranesh_prakash) &lt;a href="https://twitter.com/pranesh_prakash/status/646164649436549120" rel="nofollow"&gt;September 22, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;All  OSes will be illegal in India (IV.6 + V.3 of draft encryption policy)  unless Microsoft, Apple, Red Hat, etc, sign agreement w/ govt.&lt;/p&gt;
&lt;p&gt;— Pranesh Prakash (@pranesh_prakash) &lt;a href="https://twitter.com/pranesh_prakash/status/645871490408255489" rel="nofollow"&gt;September 21, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;If  India enacts that National Encryption Policy, their global back-end and  support business will be drastically reduced. If it survives.&lt;/p&gt;
&lt;p&gt;— Lin S (@Just_this_time) &lt;a href="https://twitter.com/Just_this_time/status/645781278244012033" rel="nofollow"&gt;September 21, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;A new &lt;a href="http://www.medianama.com/2015/09/223-india-draft-encryption-policy/" rel="nofollow" target="_blank"&gt;&lt;b&gt;Medianama&lt;/b&gt;&lt;/a&gt; report also points out loopholes in the changes announced. The report  adds how any encrypted service would have to sign an agreement with the  government. With the heavy mobile penetration and increasing number of  encrypted mobile services that people use, it is really feasible for the  government to ink an agreement with all the services that are based  outside the country.&lt;/p&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;Problems with the update to India's draft anti-privacy policy  &lt;a href="http://t.co/gKus1o3uaC" rel="nofollow"&gt;http://t.co/gKus1o3uaC&lt;/a&gt; &lt;a href="http://t.co/adqVJTedFI" rel="nofollow"&gt;pic.twitter.com/adqVJTedFI&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Nikhil Pahwa (@nixxin) &lt;a href="https://twitter.com/nixxin/status/646153774231228416" rel="nofollow"&gt;September 22, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In the past, we’ve seen the blame game around the laws, usually the  ‘hurriedly’ changed laws passed (after the inability to monitor  encrypted messages during the Mumbai terrorist attacks) in the winter  session of 2008 without any debate or discussion by bears the brunt.  Earlier this year, we saw the government crack down the Section 66A of  the 2008 Information Technology Act describing it “unconstitutional” and  “hit at the root of liberty and freedom of expression, the two cardinal  pillars of democracy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Why can’t all the thinking be done before drafts are penned down for  public review. A well thought out report would help avoid  retractions later.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://tech.firstpost.com/wp-content/uploads/2014/09/social_media.jpg"&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy'&gt;https://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>Encryption Policy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-01T02:05:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/understanding-and-mitigating-online-hate-speech-and-youth-radicalisation">
    <title>Understanding and Mitigating Online Hate Speech and Youth Radicalisation </title>
    <link>https://cis-india.org/internet-governance/news/understanding-and-mitigating-online-hate-speech-and-youth-radicalisation</link>
    <description>
        &lt;b&gt;The tenth annual IGF meeting will be held in João Pessoa, Brazil, on November 10 - 13, 2015. IGF's MAG has decided to retain the title “Evolution of Internet Governance: Empowering Sustainable Development” as the overarching theme. UNESCO as part of the IGF event is organizing a workshop on hate speech and youth radicalisation. Sunil Abraham will be a panelist for this workshop.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Co-organizers: Council of Europe, Oxford University; OHCHR, Google, ISOC&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;From socializing and entertainment to homework, the Internet is an essential part of life for young people today, opening vast new opportunities for connecting and learning. At the same time, the Internet provides violent extremists with powerful tools to propagate hatred and violence and to identify and groom potential recruits, creating global online communities that promote radicalization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The emergence and diffusion of hate speech online is a new and fast evolving phenomenon and collective efforts are needed to understand its significance and consequences, as well as to develop effective responses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UNESCO takes this session to share the initial outcome from its commissioned research on online hate speech including practical recommendations on combating against online hate speech through understanding the challenges, mobilizing civil society, lobbying private sectors and intermediaries and educating individuals with Media and Information Literacy. In related to this, the workshop would also discuss how to help empower youth to address online radicalization and extremism, and realize their aspirations to contribute to a more peaceful and sustainable world.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Chaired by Ms Lidia Brito, Director for UNESCO Office in Montevideo&lt;/li&gt;
&lt;li&gt;Frank La Rue, Former Special Rapporteur on Freedom of Expression&lt;/li&gt;
&lt;li&gt;Lillian Nalwoga, President ISOC Uganda and rep CIPESA, Technical community&lt;/li&gt;
&lt;li&gt;Bridget O’Loughlin, CoE, IGO&lt;/li&gt;
&lt;li&gt;Gabrielle Guillemin, Article 19&lt;/li&gt;
&lt;li&gt;Iyad Kallas, Radio Souriali &lt;/li&gt;
&lt;li&gt;Sunil Abraham executive director of Center for Internet and Society, Bangalore, India&lt;/li&gt;
&lt;li&gt;Eve Salomon, global Chairman of the Regulatory Board of RICS (the self-regulatory body for surveyors)&lt;/li&gt;
&lt;li&gt;Javier Lesaca Esquiroz, University of Navarra&lt;/li&gt;
&lt;li&gt;Representative GNI&lt;/li&gt;
&lt;li&gt;Remote Moderator: Xianhong Hu, UNESCO&lt;/li&gt;
&lt;li&gt;Rapporteur: Guilherme Canela De Souza Godoi, UNESCO &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/understanding-and-mitigating-online-hate-speech-and-youth-radicalisation'&gt;https://cis-india.org/internet-governance/news/understanding-and-mitigating-online-hate-speech-and-youth-radicalisation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-01T01:59:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
