<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1401 to 1415.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/enabling-multi-stakeholder-cooperation-towards-a-transnational-framework-for-due-process"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-amulya-gopalakrishnan-october-9-2015-dadri-reopens-debate-on-online-hate-speech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-october-8-2015-suhrith-parthasarathy-access-at-the-cost-of-net-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-register-september-29-2015-kieren-mccurthy-do-you-agree-with-our-fee-hike"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/understanding-and-mitigating-online-hate-speech-and-youth-radicalisation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyber-360"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2015-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/wsj-september-24-2015-newley-purnell-resty-woro-uniar-facebook-free-internet-access-program-in-developing-countries-provokes-backlash"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ndtv-maya-sharma-september-29-2015-what-bengaluru-thinks-of-big-tech-announcements-in-silicon-valley"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india">
    <title>Contestations of Data, ECJ Safe Harbor Ruling and Lessons for India	</title>
    <link>https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india</link>
    <description>
        &lt;b&gt;The European Court of Justice has invalidated a European Commission decision, which had previously concluded that the 'Safe Harbour Privacy Principles' provide adequate protections for European citizens’ privacy rights for the transfer of personal data between European Union and United States. The inadequacies of the framework is not news for the European Commission and action by ECJ has been a long time coming. The ruling raises important questions about how the claims of citizenship are being negotiated in the context of the internet, and how increasingly the contestations of personal data are being employed in the discourse. &lt;/b&gt;
        
&lt;p align="justify"&gt;The European Court of Justice
(ECJ) has invalidated a European Commission (EC) decision&lt;a class="sdfootnoteanc" name="sdfootnote1anc" href="#sdfootnote1sym"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;
which had previously concluded that the 'Safe Harbor Privacy
Principles'&lt;a class="sdfootnoteanc" name="sdfootnote2anc" href="#sdfootnote2sym"&gt;&lt;sup&gt;2&lt;/sup&gt;&lt;/a&gt;
provide adequate protections for European citizens’ privacy rights&lt;a class="sdfootnoteanc" name="sdfootnote3anc" href="#sdfootnote3sym"&gt;&lt;sup&gt;3&lt;/sup&gt;&lt;/a&gt;
for the transfer of personal data between European Union and United
States. This challenge stems from the claim that public law
enforcement authorities in America obtain personal data from
organisations in safe harbour for incompatible and disproportionate
purposes in violation of the Safe Harbour Privacy Principles. The
court's judgment follows the advice of the Advocate General of the
Court of Justice of the European Union (CJEU) who recently opined&lt;a class="sdfootnoteanc" name="sdfootnote4anc" href="#sdfootnote4sym"&gt;&lt;sup&gt;4&lt;/sup&gt;&lt;/a&gt;
that US practices allow for large-scale collection and transfer of
personal data belonging to EU citizens without them benefiting from
or having access to judicial protection under US privacy laws. The
inadequacies of the framework is not news for the Commission and
action by ECJ has been a long time coming. The ruling raises
important questions about how increasingly the contestations of
personal data are being employed in asserting claims of citizenship
in context of the internet.&lt;/p&gt;
&lt;p align="justify"&gt;
As the highest court in Europe,
the ECJ's decisions are binding on all member states. With this
ruling the ECJ has effectively restrained US firms from
indiscriminate collection and sharing of European citizens’ data on
American soil. The implications of the decision are significant,
because it shifts the onus of evaluating protections of personal data
for EU citizens from the 4,400 companies&lt;a class="sdfootnoteanc" name="sdfootnote5anc" href="#sdfootnote5sym"&gt;&lt;sup&gt;5&lt;/sup&gt;&lt;/a&gt;
subscribing to the system onto EU privacy watchdogs. Most
significantly, in addressing the rights of a citizen against an
established global brand, the judgement goes beyond political and
legal opinion to challenge the power imbalance that exists with
reference to US based firms.&lt;/p&gt;
&lt;p align="justify"&gt;
Today, the free movement of data
across borders is a critical factor in facilitating trade, financial
services, governance, manufacturing, health and development. However,
to consider the ruling as merely a clarification of transatlantic
mechanisms for data flows misstates the real issue. At the heart of
the judgment is the assessment whether US firms apply the tests of
‘necessity and proportionality’ in the collection and
surveillance of data for national security purposes. Application of
necessity and proportionality test to national security exceptions
under safe harbor has been a sticking point that has stalled the
renegotiation of the agreement that has been underway between the
Commission and the American data protection authorities.&lt;a class="sdfootnoteanc" name="sdfootnote6anc" href="#sdfootnote6sym"&gt;&lt;sup&gt;6&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
For EU citizens the stake in the
case are even higher, as while their right to privacy is enshrined
under EU law, they have no administrative or judicial means of
redress, if their data is used for reasons they did not intend. In
the EU, citizens accessing and agreeing to use of US based firms are
presented with a false choice between accessing benefits and giving
up on their fundamental right to privacy. In other words, by seeking
that governments and private companies provide better data protection
for the EU citizens and in restricting collection of personal data on
a generalised basis without objective criteria, the ruling is
effectively an assertion of ‘data sovereignty’. The term ‘data
sovereignty’, while lacking a firm definition, refers to a spectrum
of approaches adopted by different states to control data generated
in or passing through national internet infrastructure.&lt;a class="sdfootnoteanc" name="sdfootnote7anc" href="#sdfootnote7sym"&gt;&lt;sup&gt;7&lt;/sup&gt;&lt;/a&gt;
Underlying the ruling is the growing policy divide between the US and
EU privacy and data protection standards, which may lead to what is
referred to as the balkanization&lt;a class="sdfootnoteanc" name="sdfootnote8anc" href="#sdfootnote8sym"&gt;&lt;sup&gt;8&lt;/sup&gt;&lt;/a&gt;
of the internet in the future.&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;US-EU Data Protection Regime &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The safe harbor pact between the
EU and US was negotiated in the late 1990s as an attempt to bridge
the different approaches to online privacy. Privacy is addressed in
the EU as a fundamental human right while in the US it is defined
under terms of consumer protection, which&lt;em&gt;&lt;strong&gt;
&lt;/strong&gt;&lt;/em&gt;allow trade-offs
and exceptions when national security seems to be under threat. In
order to address the lower standards of data protection prevalent in
the US, the pact facilitates data transfers from EU to US by
establishing certain safeguards equivalent to the requirements of the
EU data protection directive. The safe harbor provisions include
firms undertaking not to pass personal information to third parties
if the EU data protection standards are not met and giving users
right to opt out of data collection.&lt;a class="sdfootnoteanc" name="sdfootnote9anc" href="#sdfootnote9sym"&gt;&lt;sup&gt;9&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The agreement was due to be
renewed by May 2015&lt;a class="sdfootnoteanc" name="sdfootnote10anc" href="#sdfootnote10sym"&gt;&lt;sup&gt;10&lt;/sup&gt;&lt;/a&gt;
and while negotiations have been ongoing for two years, EU discontent
on safe harbour came to the fore following the Edward Snowden
revelations of collection and monitoring facilitated by large private
companies for the PRISM program and after the announcement of the
TransAtlantic Trade and Investment Partnership (TTIP).&lt;a class="sdfootnoteanc" name="sdfootnote11anc" href="#sdfootnote11sym"&gt;&lt;sup&gt;11&lt;/sup&gt;&lt;/a&gt;
EU member states have mostly stayed silent as they run their own
surveillance programs often times, in cooperation with the NSA. EU
institutions cannot intervene in matters of national security
however, they do have authority on data protection matters. European
Union officials and Members of Parliament have expressed shock and
outrage at the surveillance programs unveiled by Snowden's 2013
revelations. Most recently, following the CJEU Advocate General’s
opinion, 50 Members of European Parliament (MEP) sent a strongly
worded letter the US Congress hitting back on claims of ‘digital
protectionism’ emanating from the US&lt;a class="sdfootnoteanc" name="sdfootnote12anc" href="#sdfootnote12sym"&gt;&lt;sup&gt;12&lt;/sup&gt;&lt;/a&gt;.
In no uncertain terms the letter clarified that the EU has different
ideas on privacy, platforms, net neutrality, encryption, Bitcoin,
zero-days, or copyright and will seek to improve and change any
proposal from the EC in the interest of our citizens and of all
people.&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;Towards Harmonization &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
In November 2013, as an attempt
to minimize the loss of trust following the Snowden revelations, the
European Commission (EC) published recommendations in its report on
'Rebuilding Trust is EU-US Data Flows'.&lt;a class="sdfootnoteanc" name="sdfootnote13anc" href="#sdfootnote13sym"&gt;&lt;sup&gt;13&lt;/sup&gt;&lt;/a&gt;
The recommendations revealed two critical initiatives at the EU
level—first was the revision of the EU-US safe harbor agreement&lt;a class="sdfootnoteanc" name="sdfootnote14anc" href="#sdfootnote14sym"&gt;&lt;sup&gt;14&lt;/sup&gt;&lt;/a&gt;
and second the adoption of the 'EU-US Umbrella Agreement&lt;a class="sdfootnoteanc" name="sdfootnote15anc" href="#sdfootnote15sym"&gt;&lt;sup&gt;15&lt;/sup&gt;&lt;/a&gt;'—a
framework for data transfer for the purpose of investigating,
detecting, or prosecuting a crime, including terrorism. The Umbrella
Agreement was recently initialed by EU and US negotiators and it only
addresses the exchange of personal data between law enforcement
agencies.&lt;a class="sdfootnoteanc" name="sdfootnote16anc" href="#sdfootnote16sym"&gt;&lt;sup&gt;16&lt;/sup&gt;&lt;/a&gt;
The Agreement has gained momentum in the wake of recent cases around
issues of territorial duties of providers, enforcement jurisdictions
and data localisation.&lt;a class="sdfootnoteanc" name="sdfootnote17anc" href="#sdfootnote17sym"&gt;&lt;sup&gt;17&lt;/sup&gt;&lt;/a&gt;
However, the adoption of the Umbrella Act depends on US Congress
adoption of the&lt;em&gt;&lt;strong&gt;
&lt;/strong&gt;&lt;/em&gt;Judicial Redress
Act (JRA) as law.&lt;a class="sdfootnoteanc" name="sdfootnote18anc" href="#sdfootnote18sym"&gt;&lt;sup&gt;18&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;Judicial Redress Act &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The JRA is a key reform that the
EC is pushing for in an attempt to address the gap between privacy
rights and remedies available to US citizens and those extended to EU
citizens, including allowing EU citizens to sue in American courts.
The JRA seeks to extend certain protections under the Privacy Act to
records shared by EU and other designated countries with US law
enforcement agencies for the purpose of investigating, detecting, or
prosecuting criminal offenses. The JRA protections would extend to
records shared under the Umbrella Agreement and while it does include
civil remedies for violation of data protection, as noted by the
Center for Democracy and Technology, the present framework  does not
provide citizens of EU countries with redress that is at par with
that which US persons enjoy under the Privacy Act.&lt;a class="sdfootnoteanc" name="sdfootnote19anc" href="#sdfootnote19sym"&gt;&lt;sup&gt;19&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
For example, the measures
outlined under the JRA would only be applicable to countries that
have outlined appropriate privacy protections agreements for data
sharing for investigations and ‘efficiently share’ such
information with the US. Countries that do not have agreements with
US cannot seek these protections leaving the personal data of their
citizens open for collection and misuse by US agencies. Further, the
arrangement leaves determination of 'efficiently sharing' in the
hands of US authorities and countries could lose protection if they
do not comply with information sharing requests promptly. Finally,
JRA protections do not apply to non-US persons nor to records shared
for purposes other than law enforcement such as intelligence
gathering. JRA is also weakened by allowing heads of agencies to
exercise their discretion to seek exemption from the Act and opt out
of compliance.&lt;/p&gt;
&lt;p align="justify"&gt;
Taken together the JRA, the
Umbrella Act and the renegotiation of the Safe Harbor Agreement need
considerable improvements. It is worth noting that EU’s acceptance
of the redundancy of existing agreements and in establishing the
independence of national data protection authorities in investigating
and enforcing national laws as demonstrated in the Schrems and in the
Weltimmo&lt;a class="sdfootnoteanc" name="sdfootnote20anc" href="#sdfootnote20sym"&gt;&lt;sup&gt;20&lt;/sup&gt;&lt;/a&gt;
case point to accelerated developments in the broader EU privacy
landscape.&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;em&gt;Consequences  &lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The ECJ Safe Harbor ruling will
have far-reaching consequences for the online industry. Often, costly
government rulings solidify the market dominance of big companies. As
high regulatory costs restrict the entrance of small and medium
businesses the market, competition is gradually wiped out. Further,
complying with high standards of data protection means that US firms
handling European data will need to consider alternative legal means
of transfer of personal data. This could include evolving 'model
contracts' binding them to EU data protection standards. As Schrems
points out, “Big companies don’t only rely on safe harbour: they
also rely on binding corporate rules and standard contractual
clauses.”&lt;a class="sdfootnoteanc" name="sdfootnote21anc" href="#sdfootnote21sym"&gt;&lt;sup&gt;21&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
The ruling is good news for
European consumers, who can now approach a national regulator to
investigate suspicions of data mishandling. EU data protection
regulators may be be inundated with requests from companies seeking
authorization of new contracts and with consumer complaints. Some are
concerned that the ruling puts a dent in the globalized flow of
data&lt;a class="sdfootnoteanc" name="sdfootnote22anc" href="#sdfootnote22sym"&gt;&lt;sup&gt;22&lt;/sup&gt;&lt;/a&gt;,
effectively requiring data localization in Europe.&lt;a class="sdfootnoteanc" name="sdfootnote23anc" href="#sdfootnote23sym"&gt;&lt;sup&gt;23&lt;/sup&gt;&lt;/a&gt;
Others have pointed out that it is unclear how this decision sits
with other trade treaties such as the TPP that ban data
localisation.&lt;a class="sdfootnoteanc" name="sdfootnote24anc" href="#sdfootnote24sym"&gt;&lt;sup&gt;24&lt;/sup&gt;&lt;/a&gt;
While the implications of the decision will take some time in playing
out, what is certain is that US companies will be have  to
restructure management, storage and use of data. The ruling has
created the impetus for India to push for reforms to protect its
citizens from harms by US firms and improve trade relations with EU.&lt;/p&gt;
&lt;p align="justify"&gt;&lt;em&gt;The Opportunity for India&lt;/em&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Multiple data flows taking place
over the internet simultaneously and that has led to ubiquity of data
transfers o ver the Internet, exposing individuals to privacy risks.
There has also been an enhanced economic importance of data
processing as businesses collect and correlate data using analytic
tools to create new demands, establish relationships and generate
revenue for their services. The primary concern of the Schrems case
may be the protection of the rights of EU citizens but by seeking to
extend these rights and ensure compliance in other jurisdictions, the
case touches upon many underlying contestations around  data and
sovereignty.&lt;/p&gt;
&lt;p align="justify"&gt;
Last year, Mr Ram Narain, India
Head of Delegation to the Working Group Plenary at ITU had stressed, “respecting the principle of sovereignty of information through
network functionality and global norms will go a long way in
increasing the trust and confidence in use of ICT.”&lt;a class="sdfootnoteanc" name="sdfootnote25anc" href="#sdfootnote25sym"&gt;&lt;sup&gt;25&lt;/sup&gt;&lt;/a&gt;
In the absence of the recognition of privacy as a right and
empowering citizens through measures or avenues to seek redressal
against misuse of data, the demand of data sovereignty rings empty.
The kind of framework which empowered an ordinary citizen in the EU
to approach the highest court seeking redressal based on presumed
overreach of a foreign government and from harms abetted by private
corporations simply does not exist in India. Securing citizen’s
data in other jurisdictions and from other governments begins with
establishing protection regimes within the country.&lt;/p&gt;
&lt;p align="justify"&gt;
The Indian government has also
stepped up efforts to restrict transfer of data from India including
pushing for private companies to open data centers in India.&lt;a class="sdfootnoteanc" name="sdfootnote26anc" href="#sdfootnote26sym"&gt;&lt;sup&gt;26&lt;/sup&gt;&lt;/a&gt;
Negotiating data localisation does not restrict the power of private
corporations from using data in a broad ways including tailoring ads
and promoting products. Also, data transfers impact any organisation
with international operations for example, global multinationals who
need to coordinate employee data and information. Companies like
Facebook, Google and Microsoft transfer and store data belonging to
Indian citizens and it is worth remembering that the National
Security Agency (NSA) would have access to this data through servers
of such private companies. With no existing measures to restrict such
indiscriminate access, the ruling purports to the need for India to
evolve strong protection mechanisms. Finally, the lack of such
measures also have an economic impact, as reported in a recent
Nasscom-Data Security Council of India (DSCI) survey&lt;a class="sdfootnoteanc" name="sdfootnote27anc" href="#sdfootnote27sym"&gt;&lt;sup&gt;27&lt;/sup&gt;&lt;/a&gt;
that pegs revenue losses incurred by the Indian IT-BPO industry at
$2-2.5 billion for a sample size of 15 companies. DSCI has further
estimated that outsourcing business can further grow by $50 billion
per annum once India is granted a “data secure” status by the
EU.&lt;a class="sdfootnoteanc" name="sdfootnote28anc" href="#sdfootnote28sym"&gt;&lt;sup&gt;28&lt;/sup&gt;&lt;/a&gt;
EU’s refusal to grant such a status is understandable given the
high standard of privacy as incorporated under the European Union
Data Protection Directive a standard to which India does not match
up, yet. The lack of this status prevents the flow of data which is
vital for Digital India vision and also affects the service industry
by restricting the flow of sensitive information to India such as
information about patient records.&lt;/p&gt;
&lt;p align="justify"&gt;
Data and information structures
are controlled and owned by private corporations and networks
transcend national borders, therefore the foremost emphasis needs to
be on improving national frameworks. While, enforcement mechanisms
such as the Mutual Legal Assistance Treaty (MLAT) process or other
methods of international cooperation may seem respectful of
international borders and principles of sovereignty,&lt;a class="sdfootnoteanc" name="sdfootnote29anc" href="#sdfootnote29sym"&gt;&lt;sup&gt;29&lt;/sup&gt;&lt;/a&gt;
 for users that live in undemocratic or oppressive regimes such
agreements are a considerable risk. Data is also increasingly being
stored across multiple jurisdictions and therefore merely applying
data location lens to protection measures may be too narrow. Further
it should be noted that when companies begin taking data storage
decisions based on legal considerations it will impact the speed and
reliability of services.&lt;a class="sdfootnoteanc" name="sdfootnote30anc" href="#sdfootnote30sym"&gt;&lt;sup&gt;30&lt;/sup&gt;&lt;/a&gt;
Any future regime must reflect the challenges of data transfers
taking place in legal and economic spaces that are not identical and
may be in opposition. Fundamentally, the protection of privacy will
always act as a barrier to the free flow of information even so, as
the Schrems case ruling points out not having adequate privacy
protections could also restrict flow of data, as has been the case
for India.&lt;/p&gt;
&lt;p align="justify"&gt;
The time is right for India to
appoint a data controller and put in place national frameworks, based
on nuanced understanding of issues of applying jurisdiction to govern
users and their data. Establishing better protection measures will
not only establish trust and enhance the ability of users to control
data about themselves it is also essential for sustaining economic
and social value generated from data generation and collection.
Suggestions for such frameworks have been considered previously by
the Group of Experts on Privacy constituted by the Planning
Commission.&lt;a class="sdfootnoteanc" name="sdfootnote31anc" href="#sdfootnote31sym"&gt;&lt;sup&gt;31&lt;/sup&gt;&lt;/a&gt;
By incorporating transparency in mechanisms for data and access
requests and premising requests on established necessity and
proportionality Indian government can lead the way in data protection
standards. This will give the Indian government more teeth to
challenge and address both the dangers of theft of data stored on
servers located outside of India and restrain indiscriminate access
arising from terms and conditions of businesses that grant such
rights to third parties.&amp;nbsp;&lt;/p&gt;
&lt;div id="sdfootnote1"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote1sym" href="#sdfootnote1anc"&gt;1&lt;/a&gt;
	Commission Decision of 26 July 2000 pursuant to Directive 95/46/EC
	of the European Parliament and of the Council on the adequacy of the
	protection provided by the safe harbour privacy principles and
	related frequently asked questions issued by the US Department of
	Commerce (notified under document number C(2000) 2441) (Text with
	EEA relevance.) &lt;em&gt;Official
	Journal L 215 , 25/08/2000 P. 0007 -0047 &lt;/em&gt;
	2000/520/EC:
	&lt;u&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;http&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;://&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;eur&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;-&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;lex&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;.&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;europa&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;.&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;eu&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;/&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;LexUriServ&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;/&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;LexUriServ&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;.&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;do&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;?&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;uri&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;=&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;CELEX&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;:32000&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;D&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;0520:&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;EN&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;:&lt;/a&gt;&lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML"&gt;HTML&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote2"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote2sym" href="#sdfootnote2anc"&gt;2&lt;/a&gt;
	Safe Harbour Privacy Principles Issued by the U.S. Department of
	Commerce on July 21, 2000
	&lt;u&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;http&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;://&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;www&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;export&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;gov&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;safeharbor&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eu&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eg&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;main&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_018475.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;asp&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote3"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote3sym" href="#sdfootnote3anc"&gt;3&lt;/a&gt;
	Megan Graham, &lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Adding&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Some&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Nuance&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;on&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;the&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;European&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Court&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;’&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;s&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Safe&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Harbor&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Decision&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;,
	&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;Just&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;security&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
	
	&lt;u&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;https&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;://&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;www&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;.&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;justsecurity&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;.&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;org&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;/26651/&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;adding&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;nuance&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;ecj&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;safe&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;harbor&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;-&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;decision&lt;/a&gt;&lt;a href="https://www.justsecurity.org/26651/adding-nuance-ecj-safe-harbor-decision/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote4"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote4sym" href="#sdfootnote4anc"&gt;4&lt;/a&gt;
	Advocate
	General’s Opinion in Case C-362/14 Maximillian Schrems v Data
	Protection Commissioner Court of Justice of the European Union,
	Press Release, No 106/15 Luxembourg, 23 September 2015
	&lt;u&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;http&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;://&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;curia&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;europa&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;eu&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;jcms&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;upload&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;docs&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;application&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;pdf&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;/2015-09/&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;cp&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;150106&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;en&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-09/cp150106en.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote5"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote5sym" href="#sdfootnote5anc"&gt;5&lt;/a&gt;
	Jennifer Baker, ‘EU desperately pushes just-as-dodgy safe harbour
	alternatives’, The Register, October 7, 2015
	&lt;u&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;http&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;://&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;www&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;theregister&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;co&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;uk&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;/2015/10/07/&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;eu&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;pushes&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;safe&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;harbour&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;alternatives&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/10/07/eu_pushes_safe_harbour_alternatives/"&gt;/&lt;/a&gt;&lt;/u&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote6"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote6sym" href="#sdfootnote6anc"&gt;6&lt;/a&gt;
	Draft Report, General Data Protection Regulation, Committee on Civil
	Liberties, Justice and Home Affairs, European Parliament, 2009-2014
	&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;http&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;://&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;www&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;europarl&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;europa&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;eu&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;meetdocs&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/2009_2014/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;documents&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;libe&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;pr&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;/922/922387/922387&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;en&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/922/922387/922387en.pdf"&gt;pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote7"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote7sym" href="#sdfootnote7anc"&gt;7&lt;/a&gt;
	Dana Polatin-Reuben, Joss Wright, ‘An Internet with BRICS
	Characteristics: Data Sovereignty and the Balkanisation of the
	Internet’, University of Oxford, July 7, 2014
	&lt;u&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;https&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;://&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;www&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;.&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;usenix&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;.&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;org&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;system&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;files&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;conference&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;foci&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;14/&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;foci&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;14-&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;polatin&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;-&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;reuben&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;.&lt;/a&gt;&lt;a href="https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote8"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote8sym" href="#sdfootnote8anc"&gt;8&lt;/a&gt;
	Sasha
	Meinrath, The Future of the Internet: Balkanization and Borders,
	Time, October 2013
	&lt;u&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;http&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;://&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;ideas&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;.&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;time&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;.&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;com&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;/2013/10/11/&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;the&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;future&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;of&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;the&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;internet&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;balkanization&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;and&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;-&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;borders&lt;/a&gt;&lt;a href="http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote9"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote9sym" href="#sdfootnote9anc"&gt;9&lt;/a&gt;
	Safe Harbour Privacy Principles, Issued by the U.S. Department of
	Commerce, July 2001
	&lt;u&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;http&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;://&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;www&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;export&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;gov&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;safeharbor&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eu&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;/&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;eg&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;main&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;_018475.&lt;/a&gt;&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018475.asp"&gt;asp&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote10"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote10sym" href="#sdfootnote10anc"&gt;10&lt;/a&gt;
	Facebook
	case may force European firms to change data storage practices, The
	Guardian, September 23, 2015
	&lt;u&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;http&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;://&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;www&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;theguardian&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;com&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;/&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;us&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;news&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;/2015/&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;sep&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;/23/&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;us&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;intelligence&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;services&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;surveillance&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/us-news/2015/sep/23/us-intelligence-services-surveillance-privacy"&gt;privacy&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote11"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote11sym" href="#sdfootnote11anc"&gt;11&lt;/a&gt;
	Privacy Tracker,  US-EU Safe Harbor Under Pressure, August 2, 2013
	&lt;u&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;https&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;://&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;iapp&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;.&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;org&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;/&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;news&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;/&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;a&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;/&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;us&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;eu&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;safe&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;harbor&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;under&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;-&lt;/a&gt;&lt;a href="https://iapp.org/news/a/us-eu-safe-harbor-under-pressure"&gt;pressure&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote12"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote12sym" href="#sdfootnote12anc"&gt;12&lt;/a&gt;
	Kieren
	McCarthy, Privacy, net neutrality, security, encryption ... Europe
	tells Obama, US Congress to back off, The Register, 23 September,
	2015
	&lt;u&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;http&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;://&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;www&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;theregister&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;co&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;.&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;uk&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;/2015/09/23/&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;european&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;politicians&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;to&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;congress&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;back&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;_&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;off&lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/09/23/european_politicians_to_congress_back_off/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote13"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote13sym" href="#sdfootnote13anc"&gt;13&lt;/a&gt;
	Communication from the Commission to the European Parliament and the
	Council, Rebuilding Trust in EU-US Data Flows, European Commission,
	November 2013
	&lt;u&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;http&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;://&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;ec&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;europa&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;eu&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;justice&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;data&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;-&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;protection&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;files&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;/&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;com&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;_2013_846_&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;en&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;.&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/files/com_2013_846_en.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote14"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote14sym" href="#sdfootnote14anc"&gt;14&lt;/a&gt;
	Safe
	Harbor on trial in the European Union, Access Blog, September 2014
	&lt;u&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;https&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;://&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;www&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;.&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;accessnow&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;.&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;org&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;/&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;blog&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;/2014/11/13/&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;safe&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;harbor&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;on&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;trial&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;in&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;the&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;european&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;-&lt;/a&gt;&lt;a href="https://www.accessnow.org/blog/2014/11/13/safe-harbor-on-trial-in-the-european-union"&gt;union&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote15"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote15sym" href="#sdfootnote15anc"&gt;15&lt;/a&gt;
	European
	Commission - Fact Sheet Questions and Answers on the EU-US data
	protection "Umbrella agreement", September 8, 2015
	&lt;u&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;http&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;://&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;europa&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;.&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;eu&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;/&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;rapid&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;/&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;press&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;-&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;release&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;_&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;MEMO&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;-15-5612_&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;en&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;.&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_MEMO-15-5612_en.htm"&gt;htm&lt;/a&gt;&lt;/u&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote16"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote16sym" href="#sdfootnote16anc"&gt;16&lt;/a&gt;
	McGuire Woods, ‘EU and U.S. reach “Umbrella Agreement” on data
	transfers’, Lexology, September 14, 2015
	&lt;u&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;http&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;://&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;www&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;.&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;lexology&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;.&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;com&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;/&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;library&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;/&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;detail&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;.&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;aspx&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;?&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;g&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;=422&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;bca&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;41-2&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;d&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;54-4648-&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;ae&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;57-00&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;d&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;678515&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;e&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;1&lt;/a&gt;&lt;a href="http://www.lexology.com/library/detail.aspx?g=422bca41-2d54-4648-ae57-00d678515e1f"&gt;f&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote17"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote17sym" href="#sdfootnote17anc"&gt;17&lt;/a&gt;
	Andrew
	Woods, Lowering the Temperature on the Microsoft-Ireland Case,
	Lawfare September, 2015
	&lt;u&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;https&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;://&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;www&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;.&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;lawfareblog&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;.&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;com&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;/&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;lowering&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;temperature&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;microsoft&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;ireland&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;-&lt;/a&gt;&lt;a href="https://www.lawfareblog.com/lowering-temperature-microsoft-ireland-case"&gt;case&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote18"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote18sym" href="#sdfootnote18anc"&gt;18&lt;/a&gt;
	Jens-Henrik Jeppesen, Greg Nojeim, ‘The EU-US Umbrella Agreement
	and the Judicial Redress Act: Small Steps Forward for EU Citizens’
	Privacy Rights’, October 5, 2015
	&lt;u&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;https&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;://&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;cdt&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;.&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;org&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;/&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;blog&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;/&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;the&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;eu&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;us&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;umbrella&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;agreement&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;and&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;the&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;judicial&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;redress&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;act&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;small&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;steps&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;forward&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;for&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;eu&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;citizens&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;privacy&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;-&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;rights&lt;/a&gt;&lt;a href="https://cdt.org/blog/the-eu-us-umbrella-agreement-and-the-judicial-redress-act-small-steps-forward-for-eu-citizens-privacy-rights/"&gt;/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote19"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote19sym" href="#sdfootnote19anc"&gt;19&lt;/a&gt;
	Ibid 18.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote20"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote20sym" href="#sdfootnote20anc"&gt;20&lt;/a&gt;
	Landmark ECJ data protection ruling could impact Facebook and
	Google, The Guardian, 2 October, 2015
	&lt;u&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;http&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;://&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;www&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;theguardian&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;com&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;technology&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;/2015/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;oct&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;/02/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;landmark&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;ecj&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;data&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;protection&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;ruling&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;facebook&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;google&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo"&gt;weltimmo&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote21"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote21sym" href="#sdfootnote21anc"&gt;21&lt;/a&gt;
	Julia Powles, Tech companies like Facebook not above the law, says
	Max Schrems, The Guardian, Octover 9, 2015
	&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;http&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;://&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;www&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;theguardian&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;.&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;com&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;technology&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;/2015/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;oct&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;/09/&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;facebook&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;data&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;privacy&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;max&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;schrems&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;european&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;court&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;of&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;-&lt;/a&gt;&lt;a href="http://www.theguardian.com/technology/2015/oct/09/facebook-data-privacy-max-schrems-european-court-of-justice"&gt;justice&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote22"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote22sym" href="#sdfootnote22anc"&gt;22&lt;/a&gt;
	Adam
	Thierer,
	Unintended
	Consequences of the EU Safe Harbor Ruling, The Technology Liberation
	Front, October 6, 2015
	&lt;u&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;http&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;://&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;techliberation&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;.&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;com&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;/2015/10/06/&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;unintended&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;consequenses&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;of&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;the&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;eu&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;safe&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;harbor&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;ruling&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;/#&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;more&lt;/a&gt;&lt;a href="http://techliberation.com/2015/10/06/unintended-consequenses-of-the-eu-safe-harbor-ruling/#more-75831"&gt;-75831&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote23"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote23sym" href="#sdfootnote23anc"&gt;23&lt;/a&gt;
	Anupam
	Chander, Tweeted ECJ&lt;a href="https://twitter.com/hashtag/schrems?src=hash"&gt;
	#&lt;/a&gt;&lt;a href="https://twitter.com/hashtag/schrems?src=hash"&gt;schrems&lt;/a&gt;
	ruling may effectively require data localization within Europe,
	&lt;u&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;https&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;://&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;twitter&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;.&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;com&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;AnupamChander&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;status&lt;/a&gt;&lt;a href="https://twitter.com/AnupamChander/status/651369730754801665"&gt;/651369730754801665&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote24"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote24sym" href="#sdfootnote24anc"&gt;24&lt;/a&gt;
	Lokman Tsui, Tweeted, “If the TPP bans data localization, but the
	ECJ ruling effectively mandates it, what does that mean for the
	internet?”
	&lt;u&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;https&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;://&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;twitter&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;.&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;com&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;lokmantsui&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;/&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;status&lt;/a&gt;&lt;a href="https://twitter.com/lokmantsui/status/651393867376275456"&gt;/651393867376275456&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote25"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote25sym" href="#sdfootnote25anc"&gt;25&lt;/a&gt;
	Statement from Indian Head of Delegation, Mr Ram Narain for WGPL,
	&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Indian&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;statement&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;on&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;ITU&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;and&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Internet&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;at&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;the&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Working&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Group&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;Plenary&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;November&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/2014/11/04/indian-statement-on-itu-and-internet-at-the-working-group-plenary/"&gt;
	4, 2014 &lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;https&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;://&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;ccgnludelhi&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;.&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;wordpress&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;.&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;com&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;/&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;author&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;/&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;asukum&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;87/&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;page&lt;/a&gt;&lt;a href="https://ccgnludelhi.wordpress.com/author/asukum87/page/2/"&gt;/2/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote26"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote26sym" href="#sdfootnote26anc"&gt;26&lt;/a&gt;
	Sounak
	Mitra, Xiaomi bets big on India despite problems, Business Standard,
	December 2014
	&lt;u&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;http&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;://&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;www&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;.&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;business&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;standard&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;.&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;com&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;/&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;article&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;/&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;companies&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;/&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;xiaomi&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;bets&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;big&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;on&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;india&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;despite&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;problems&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;-114122201023_1.&lt;/a&gt;&lt;a href="http://www.business-standard.com/article/companies/xiaomi-bets-big-on-india-despite-problems-114122201023_1.html"&gt;html&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote27"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote27sym" href="#sdfootnote27anc"&gt;27&lt;/a&gt;
	Neha
	Alawadi, Ruling on data flow between EU &amp;amp; US may impact India’s
	IT sector, Economic Times,October 7, 2015
	&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;http&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;://&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;economictimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;indiatimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;com&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;articleshow&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/49250738.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cms&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;?&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;source&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;contentofinterest&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;medium&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;text&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;campaign&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49250738.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cppst&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote28"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote28sym" href="#sdfootnote28anc"&gt;28&lt;/a&gt;
	Pranav Menon, Data Protection Laws in India and Data Security-
	Impact on India and Data Security-Impact on India - EU Free Trade
	Agreement, CIS Access to Knowledge, 2011
	&lt;u&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;http&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;://&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;cis&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;india&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;.&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;org&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;/&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;a&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;2&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;k&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;/&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;blogs&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;/&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;data&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;security&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;laws&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;-&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;india&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;.&lt;/a&gt;&lt;a href="http://cis-india.org/a2k/blogs/data-security-laws-india.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote29"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote29sym" href="#sdfootnote29anc"&gt;29&lt;/a&gt;
	Surendra
	Kumar Sinha, India wants Mutual Legal Assistance treaty with
	Bangladesh, Economic Times, October 7, 2015
	h&lt;u&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;ttp&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;://&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;economictimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;indiatimes&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;com&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;articleshow&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;/49262294.&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cms&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;?&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;source&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;contentofinterest&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;medium&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;text&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;&amp;amp;&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;utm&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;_&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;campaign&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;=&lt;/a&gt;&lt;a href="http://economictimes.indiatimes.com/articleshow/49262294.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt;cppst&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote30"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote30sym" href="#sdfootnote30anc"&gt;30&lt;/a&gt;
	Pablo
	Chavez, Director, Public Policy and Government Affairs, 	Testifying
	before the U.S. Senate on 	transparency 	legislation, November 3,
	2013
	&lt;u&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;http&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;://&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;googlepublicpolicy&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;.&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;blogspot&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;.&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;in&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;/2013/11/&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;testifying&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;before&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;us&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;senate&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;-&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;on&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;.&lt;/a&gt;&lt;a href="http://googlepublicpolicy.blogspot.in/2013/11/testifying-before-us-senate-on.html"&gt;htm&lt;/a&gt;&lt;/u&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote31"&gt;
&lt;p&gt;
	&lt;a class="sdfootnotesym" name="sdfootnote31sym" href="#sdfootnote31anc"&gt;31&lt;/a&gt;
	Report
	of the Group of Experts on Privacy (Chaired by Justice A P Shah,
	Former Chief Justice, Delhi High Court), Planning Commission,
	October 2012
		&lt;u&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;http&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;://&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;planningcommission&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;.&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;nic&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;.&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;in&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;/&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;reports&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;/&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;genrep&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;/&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;rep&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;_&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;privacy&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;.&lt;/a&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote31"&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote30"&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india'&gt;https://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Platform Responsibility</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Digital Security</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-14T14:40:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/enabling-multi-stakeholder-cooperation-towards-a-transnational-framework-for-due-process">
    <title>Enabling Multi-stakeholder Cooperation - Towards a Transnational Framework for Due Process</title>
    <link>https://cis-india.org/internet-governance/news/enabling-multi-stakeholder-cooperation-towards-a-transnational-framework-for-due-process</link>
    <description>
        &lt;b&gt;Internet &amp; Jurisdiction Project organized a multi-stakeholder meeting of the global multi-stakeholder dialogue process in 2015 on October 8-9 in Berlin, Germany. Sunil Abraham participated in this meeting.
 &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Since 2012, the Internet &amp;amp;  Jurisdiction Project has facilitated a global multi-stakeholder dialogue  process to address the tension between the cross-border nature of the  Internet and geographically defined national jurisdictions. It provides a  neutral platform for states, business, civil society and international  organizations to discuss the elaboration of a transnational due process  framework to handle the digital coexistence of diverse national laws in  shared cross-border online spaces. This pioneering multi-stakeholder  cooperation effort seeks to develop a “policy standard” for  transnational requests for domain seizures, content takedowns and access  to subscriber information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2015 is an important moment that  determines the future of the multi-stakeholder model in global Internet  Governance. The Internet &amp;amp; Jurisdiction Project hopes it can provide  an opportunity to demonstrate that multi-stakeholder cooperation can  produce operational solutions to concrete policy challenges that no  stakeholder group can solve on its own.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting will gather key actors from  states, Internet companies, technical operators, civil society, academia  and international organizations.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.internetjurisdiction.net/ij-project-multi-stakeholder-meeting-2015/"&gt;This was published on the website of Internet &amp;amp; Jurisdiction Project&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/agenda-of-i-j-meeting-in-berlin" class="external-link"&gt;Agenda of the I&amp;amp;J Meeting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/participants-of-i-j-meeting-in-berlin" class="external-link"&gt;List of Participants&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/enabling-multi-stakeholder-cooperation-towards-a-transnational-framework-for-due-process'&gt;https://cis-india.org/internet-governance/news/enabling-multi-stakeholder-cooperation-towards-a-transnational-framework-for-due-process&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-14T02:53:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india">
    <title>CIS in Top 50 Tech Blogs of India</title>
    <link>https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is on the 30th position among the top technology blogs in India. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;This was published by &lt;a class="external-link" href="http://www.rebateszone.com/top-50-technology-blogs-in-india"&gt;rebateszone&lt;/a&gt; on October 7, 2015.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Infographic courtesy: Renuka Thakur&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The world of tech blogs is getting bigger and bigger, by time people are getting more and more interested in tech related items, it’s the only reason why we have seen such significant surge in tech blogs during the past few years. So the query that becomes difficult with every minute passing is that which of the tech blogs are worth your time? To help you on this we have created a list of top 50 tech bloggers in India, These weblogs are written by pros in the field, you might find numerous lists on the internet on this particular topic but you won’t be able to find more thorough and handy list that this as we have handpicked each and every blog in this list, we have organized these blogs according to the quality of posts. The other lists that you can find on the internet are sorted according to Alexa rank or number of incoming links, they have just produced those listed for the purpose of forming a new post but this list is produced according to the quality. If you want to stay updated with technology related news, developments etc., then we would recommend you to follow the following 50 tech blogs regularly:&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th class="tg-fvov"&gt;Sr No.&lt;/th&gt;
&lt;th class="tg-fvov"&gt;Website/Blog&lt;/th&gt;
&lt;th class="tg-fvov"&gt;Facebook&lt;/th&gt;
&lt;th class="tg-fvov"&gt;Twitter&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;1&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.fonearena.com/"&gt;fonearena.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;165,050&lt;/td&gt;
&lt;td class="tg-14nr"&gt;34,583&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;2&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.alltechbuzz.net/"&gt;alltechbuzz.net&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;262,568&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,706&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;3&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.bgr.in/"&gt;bgr.in&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;143,145&lt;/td&gt;
&lt;td class="tg-14nr"&gt;190,922&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;4&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://telecomtalk.info/"&gt;telecomtalk.info&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;41,205&lt;/td&gt;
&lt;td class="tg-baqh"&gt;21,080&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;5&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.medianama.com/"&gt;medianama.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;11,238&lt;/td&gt;
&lt;td class="tg-14nr"&gt;241,121&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;6&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.techulator.com/"&gt;techulator.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;9,703&lt;/td&gt;
&lt;td class="tg-baqh"&gt;238&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;7&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.infosys.com/"&gt;infosys.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;696,536&lt;/td&gt;
&lt;td class="tg-14nr"&gt;164,452&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;8&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.9lessons.info/"&gt;9lessons.info&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;23,945&lt;/td&gt;
&lt;td class="tg-baqh"&gt;7,499&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;9&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://phoneradar.com/"&gt;phoneradar.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;14,898&lt;/td&gt;
&lt;td class="tg-14nr"&gt;8,381&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;10&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.indianweb2.com/"&gt;indianweb2.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;7,738&lt;/td&gt;
&lt;td class="tg-baqh"&gt;2,427&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;11&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://techpp.com/"&gt;techpp.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;10,221&lt;/td&gt;
&lt;td class="tg-14nr"&gt;17,661&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;12&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://techlomedia.in/"&gt;techlomedia.in&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;16,578&lt;/td&gt;
&lt;td class="tg-baqh"&gt;6,452&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;13&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.techlila.com/"&gt;techlila.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;20,252&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,904&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;14&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.techtricksworld.com/"&gt;techtricksworld.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;5,331&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,726&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;15&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.makingdifferent.com/"&gt;makingdifferent.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;7,424&lt;/td&gt;
&lt;td class="tg-14nr"&gt;—–&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;16&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.tipsclear.com/"&gt;tipsclear.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;687&lt;/td&gt;
&lt;td class="tg-baqh"&gt;15,007&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;17&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.hackpundit.com/"&gt;hackpundit.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;40&lt;/td&gt;
&lt;td class="tg-14nr"&gt;315&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;18&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.ampercent.com/"&gt;ampercent.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;2,056&lt;/td&gt;
&lt;td class="tg-baqh"&gt;413&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;19&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.nirmaltv.com/"&gt;nirmaltv.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;26,261&lt;/td&gt;
&lt;td class="tg-14nr"&gt;6,293&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;20&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://pitechnologies.org/"&gt;pitechnologies.org&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;7,965&lt;/td&gt;
&lt;td class="tg-baqh"&gt;49&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;21&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.seotechyworld.com/"&gt;seotechyworld.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;9,335&lt;/td&gt;
&lt;td class="tg-14nr"&gt;4,977&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;22&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.igt.in/"&gt;igt.in&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;12,997&lt;/td&gt;
&lt;td class="tg-baqh"&gt;666&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;23&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.hacktrix.com/"&gt;hacktrix.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;9,374&lt;/td&gt;
&lt;td class="tg-14nr"&gt;196&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;24&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://thebleg.com/"&gt;technodify.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;26,318&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,958&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;25&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://webtrickz.com/"&gt;webtrickz.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;3,906&lt;/td&gt;
&lt;td class="tg-14nr"&gt;907&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;26&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.wpxbox.com/"&gt;wpxbox.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;16,938&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,242&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;27&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.itechcode.com/"&gt;itechcode.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,666&lt;/td&gt;
&lt;td class="tg-14nr"&gt;4,749&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;28&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.techfishy.com/"&gt;techfishy.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;4,791&lt;/td&gt;
&lt;td class="tg-baqh"&gt;114&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;29&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.zensar.com/"&gt;zensar.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;7,269&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,778&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;30&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://cis-india.org/"&gt;cis-india.org&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;—–&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,795&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;31&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://robosoftin.com/"&gt;robosoftin.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;664&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,892&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;32&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://digitaldimensions4u.com/"&gt;digitaldimensions4u.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,079&lt;/td&gt;
&lt;td class="tg-baqh"&gt;583&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;33&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.campustimespune.com/"&gt;campustimespune.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;3,121&lt;/td&gt;
&lt;td class="tg-14nr"&gt;278&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;34&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://msystechnologies.com/"&gt;msystechnologies.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;325&lt;/td&gt;
&lt;td class="tg-baqh"&gt;455&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;35&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://techsplurge.com/"&gt;techsplurge.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;3,797&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,140&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;36&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.zensoftservices.com/"&gt;zensoftservices.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;203&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,499&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;37&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.iltb.net/"&gt;iltb.net&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;4,994&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,675&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;38&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://savedelete.com/"&gt;savedelete.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;19,978&lt;/td&gt;
&lt;td class="tg-baqh"&gt;10,728&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;39&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.minterest.org/"&gt;minterest.org&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,033&lt;/td&gt;
&lt;td class="tg-14nr"&gt;12,867&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;40&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://thepockettech.com/"&gt;thepockettech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;22,346&lt;/td&gt;
&lt;td class="tg-baqh"&gt;12,375&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;41&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.thetechbulletin.com/"&gt;thetechbulletin.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,522&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,292&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;42&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.mobientech.com/"&gt;mobientech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;525&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,359&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;43&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.directingit.com/"&gt;directingit.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;98&lt;/td&gt;
&lt;td class="tg-14nr"&gt;27&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;44&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://itpreneurpune.com/"&gt;itpreneurpune.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,356&lt;/td&gt;
&lt;td class="tg-baqh"&gt;76&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;45&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://freaksense.com/"&gt;codemink.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;5,021&lt;/td&gt;
&lt;td class="tg-14nr"&gt;196&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;46&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://udayarumilli.blogspot.com/"&gt;udayarumilli.blogspot.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;103&lt;/td&gt;
&lt;td class="tg-baqh"&gt;63&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;47&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://saadhvi.com/"&gt;saadhvi.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;56&lt;/td&gt;
&lt;td class="tg-14nr"&gt;44&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;48&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.taraspan.com/global/"&gt;taraspan.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;8&lt;/td&gt;
&lt;td class="tg-baqh"&gt;310&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;49&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://cloudnowtech.com/"&gt;cloudnowtech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;145&lt;/td&gt;
&lt;td class="tg-14nr"&gt;55&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;50&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://keshavatech.com/"&gt;keshavatech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;2,953&lt;/td&gt;
&lt;td class="tg-baqh"&gt;18,139&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Here is the Infographic for top 50 tech blogs in India:&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Techblog50.png" alt="null" class="image-inline" title="Techblog 50" /&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india'&gt;https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-14T06:24:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology">
    <title>Communication Rights in the Age of Digital Technology </title>
    <link>https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) invites you to a conference to discuss the evolution of privacy and surveillance in India on Friday, October 30, 2015 at Deck Suite Hall, 5th Floor, Habitat Centre, Lodhi Road, Near Air Force Bal Bharti School, New Delhi - 110003, from 11 a.m. to 5 p.m.&lt;/b&gt;
        &lt;p&gt;The conference will be conducted in a round-table format. Topics to be discussed shall include, among others, the Human DNA Profiling Bill, 2012, the PIL questioning the data collection under the UID scheme, the draft National Encryption Policy and the Supreme Court judgement in Shreya Singhal v. Union of India, in the context of privacy and surveillance in India. The conference will be a forum for discussion, knowledge exchange and agenda building.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Background Note&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, the Right to Privacy has been interpreted to mean an individuals’ right to be left alone. In the age of massive use of Information and Communications Technology, it has become imperative to have this right protected. The Supreme Court has held in a number of its decisions that the right to privacy is implicit in the fundamental right to life and personal liberty under Article 21 of the Indian Constitution, though Part III does not explicitly mention this right. Since the 1960s, the Apex Court has been dealing with this issue, primarily with respect to privacy being recognised as a fundamental or common law right and the standards that need to be satisfied in order to impose any restrictions on it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the year 2012, the Planning Commission constituted a Group of Experts under the chairmanship of Justice AP Shah, Former Chief Justice of the Delhi High Court to recommend a &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;potential privacy framework&lt;/a&gt; for  privacy in India. Previously in 2011 the Department of Personnel and Training had prepared a &lt;a href="https://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf"&gt;draft Bill on Right to Privacy &lt;/a&gt;which has yet to materialize into a comprehensive legislation on privacy. In 2014, a version of the revised Right to Privacy Bill was &lt;a href="http://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011"&gt;leaked&lt;/a&gt;. Amendments to the Bill  aim to protect individuals against misuse of their data by the government or private agencies, and is in the process of being &lt;a href="http://www.newindianexpress.com/nation/Centre-Giving-Final-Touches-to-Right-to-Privacy-Bill/2015/03/17/article2717271.ece"&gt;finalized by the Indian Government&lt;/a&gt;&lt;a href="http://www.newindianexpress.com/nation/Centre-Giving-Final-Touches-to-Right-to-Privacy-Bill/2015/03/17/article2717271.ece"&gt;. &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of late, privacy concerns have gained importance in India due to the initiation of national programmes like the UID Scheme, DNA Profiling, the National Encryption Policy, etc. attracting criticism for their impact on the right to privacy. For example, DeitY introduced a draft National Encryption Policy in September this year to prescribe methods for encryption. However, the policy would have posed significant restriction on the ability of citizens to encrypt online communication. Backlash from the citizens, industry, social media and privacy experts led the Government to withdraw  the policy as the measures included made the information system vulnerable in every sense.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, the Apex Court gave a &lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt;historical&lt;/a&gt;&lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt; judgement&lt;/a&gt; by striking down section 66A of the IT (Amendment) Act 2008. The Court upheld section 69A and the Information Technology  (Procedure &amp;amp; Safeguards for Blocking for Access of Information by Public) Rules 2009 to be constitutionally valid, which accords the government with the authority to block transmission of information and websites when it deems it as necessary for reasons like sovereignty and integrity of India, public order, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another government initiative which has generated considerable controversy for its threat to privacy is the UID project which aims to issue a unique identification number to all citizens by the Unique Identification Authority of India, which can be authenticated and verified online. In August this year, the Supreme Court, &lt;a href="http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841"&gt;vide an interim order&lt;/a&gt;, restricted the use of Aadhaar by declaring it to be optional for availing government benefits and services. Though the Government contended the right to privacy as a fundamental right in India, the Court deferred this issue to a larger Constitutional Bench, and the Supreme Court upheld its decision yet again in the month of October.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the &lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;d&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;raft&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt; Human DNA &lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;P&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;rofiling &lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;B&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;ill 2015&lt;/a&gt; is being questioned on grounds of privacy invasion on  a massive scale as it aims to collect and store the DNA samples of criminals, suspects, volunteers, and victims and regulate DNA laboratories and DNA sampling for use by law enforcement agencies. The Bill also fails to include comprehensive privacy safeguards and provisions regarding collection of DNA samples with or without the consent of an individual, making individual privacy an important concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Going by these ongoing debates, one can say that Privacy as a right has primarily evolved by way of judicial interpretation and continues to evolve in light of several controversial Government policies, projects and schemes. However its development is often undermined by tension between several competing national interests which calls for clear guidelines to protect this inviolable right of the citizens.&lt;/p&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/internet-governance/blog/gsma-conference-invite.pdf" class="internal-link"&gt; 
&lt;hr /&gt;
&lt;b&gt;Download the Invite&lt;/b&gt;&lt;/a&gt;&lt;/h3&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology'&gt;https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rakesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-10-24T07:45:26Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-amulya-gopalakrishnan-october-9-2015-dadri-reopens-debate-on-online-hate-speech">
    <title>Dadri reopens debate on online hate speech</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-amulya-gopalakrishnan-october-9-2015-dadri-reopens-debate-on-online-hate-speech</link>
    <description>
        &lt;b&gt;The friction between free speech and hate speech has become newly intense because of social media. Twitter reflected the turmoil after the lynching of Mohammed Akhlaq in Dadri, Uttar Pradesh, when some tweets justified the murder as a legitimate reaction against cow-slaughter, trending the hashtag #cowmurderers.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Amulya Gopalakrishnan was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/Dadri-reopens-debate-on-online-hate-speech/articleshow/49281467.cms"&gt;published in the Times of India&lt;/a&gt; on October 9, 2015. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"Jo bhi gau ka mans khaye, use aur uske parivar ko turant maar do (those  who eat beef should be killed along with their families)" is just one  example of the kind of tweets that got an FIR filed against the handle.  The UP police also booked a person for spreading inflammatory rumours  about cow-smugglers killing a police officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Their comrades immediately alleged censorship, and various profiles with  pictures of weapon-brandishing deities rallied under hashtags of  support. Taslima Nasreen summed up their grievance, claiming that "free  speech allows hate tweets".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are, of course reasonable restrictions to free speech when it  looks likely to spiral into violence, what a 1989 Supreme Court judgment  called a "spark in a powder keg" situation. The IPC has Section 153A,  153B, 295 and 505 and more, which curb speech that promotes enmity  between groups on the basis of religion, race, place, birth or language,  defiles places of worship, insults religious sentiments, creates public  mischief and so on. But social media presents an almost daily dilemma,  and makes it clear that it is time for more discriminating decisions on  what kinds of extreme speech can be gagged. As the SC judgment knocking  down the over-broad Section 66A of the IT Act noted, discussion and  advocacy , however, hateful or prejudiced, are not incitement. &lt;br /&gt;&lt;br /&gt; All hate speech seeks to sharpen tensions, but not all such speech is  equally damaging. As Pranesh Prakash, policy director of the Centre for  Internet and Society , Bangalore, puts it, "freedom of speech operates  within fields of power".Hate speech either aims to taunt and diminish a  minority, or tell others in an in-group that their feelings are  shared.Different countries make their own judgment calls as they balance  these two values, both fundamental to a democracy: free expression and  the defence of human dignity and inclusion. &lt;br /&gt;&lt;br /&gt; Internet  intermediaries, ISPs or powerful private corporations like Twitter and  Facebook, have to comply with court orders and official government  requests, but they are not always on the same page about unacceptable  content. For a company like Twitter, for instance, the need to preserve  individual voices, however discordant, is more valuable than the need to  create a more perfect public sphere. It advised offended users to  simply block controversial content, though recently , it has begun to  consider "direct, repeated attacks on an individual" a potential  violation too. &lt;br /&gt;&lt;br /&gt; Susan Benesch, of Harvard University's Berkman  Center, has suggested a framework to identify a dangerous speech act,  which factors in the profile of the speaker, the emotional state of the  audience, the content of the speech itself as a call to action, the  social context in which it occurs, and the means used to spread it. &lt;br /&gt;&lt;br /&gt; The UP police has a social media lab to track and scotch rumours.  "That's how we recently busted a false story about a khap panchayat  ordering gangrapes," says a UP police official who did not wish to be  named. Rather than appealing to the social media company for takedowns  -an onerous process, and one where provocations are often difficult to  explain -it is easier to find and deal with the source of the content,  he says. One can identify problematic material either by location or  keywords, says Ponnurangam K, assistant professor at IIIT, Delhi, who  has developed the social network analytics tool used by UP police. Given  the speed and scale of the internet and the volume of user-generated  content, legal curbs cannot be invoked for every instance of hate  speech. "It is far more feasible to monitor these rumours and take  preventive action on the ground, where the harm is likely to be felt,  and to use the same medium to counter the rumours with truth," says  Prakash. Social media was assumed to have responsible for spreading the  2011 riots in the UK, but it turned out to be even more effective in  stemming the contagion, righting rumours and helping law enforcers. &lt;br /&gt;&lt;br /&gt; During the 2013 general election in Kenya, the Umati project trawled  social media for trending hate content and tried to counter its effects  by exposing and shunning those advocating violence. A repository called  Hatebase tries to identify local words and phrases that indicate brewing  trouble, to make it easier to find the active signals of threat from  the low-level hum -repeated references to cow meat in India, or  "sakkiliya", a Sinhala word to disparage Tamils in Sri Lanka. &lt;br /&gt;&lt;br /&gt; "The government should work with platforms to find the nodes of  dangerous speech, to counter them, and support campaigns for those  victimised," says Chinmayi Arun, research director of the Centre for  Communication Governance at the National Law University, Delhi, who is  leading a three-year project on  online hate speech, in collaboration  with the Berkman Center. &lt;br /&gt;&lt;br /&gt; It is far more effective to boost  media literacy, help people sniff out bias and propaganda, understand  how photos can be morphed and fake videos passed off as real. "Law  enforcers need the imagination and patience to develop these strategies,  rather than try to censor controversial speech wherever possible," she  says. &lt;br /&gt;&lt;br /&gt; Of course, when IT cells of political parties are the  fount of the most of these excitable handles, that's easier said than  done.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-amulya-gopalakrishnan-october-9-2015-dadri-reopens-debate-on-online-hate-speech'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-amulya-gopalakrishnan-october-9-2015-dadri-reopens-debate-on-online-hate-speech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Hate Speech</dc:subject>
    

   <dc:date>2015-10-11T05:42:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk">
    <title>Modi's Valley hug sparks swadeshi talk</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk</link>
    <description>
        &lt;b&gt;His warm hug of Facebook's Mark Zuckerberg will perhaps be the most abiding image of Narendra Modi's visit to the Silicon Valley.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;But that embrace, and what  it conveyed, is now becoming the subject for an intense debate among  techies here. Is Modi giving in too much to the Googles and Facebooks of  the world, when there is so much technology talent within India? Is he  taking the easy way out by handing out critical pieces of his Digital  India vision to global incumbents rather than build domestic  capabilities?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;"When the government  wanted to build a citizen engagement platform earlier this year, they  depended on Google. Now when they want Wi-Fi in railway stations, it's  again Google. These are things that can be done by our companies,  otherwise we will not be able to create our own digital industry.  Remember, we are the people who built Aadhaar," said an industry veteran  who did not want to be named.&lt;br /&gt; &lt;br /&gt; Nitin Pai, co-founder of  Takshashila, an independent policy research and advocacy body that  provides services for government agencies, NGOs and corporations, said  Modi's team should make a careful distinction between national interest  and MNCs' commercial interest. "Many MNCs have come forward to  participate in Digital India initiatives. The government will have to  look at offering sufficient incentives for innovation to domestic tech  companies, many of whom are coming with innovative business models," he  said.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Speaking to a  cross-section of tech companies here, two sets of concerns emerge. One  relates to the concessions that will work in favour of global incumbents  and against newcomers - the latter is likely to add more value in the  long term. This includes the issue of net neutrality , on which the  government is seen to be waffling, and the guidelines issued by the  Indian Patent Office declaring that software is patentable in India.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;img src="https://cis-india.org/home-images/Concerns.png/@@images/3d04c7c6-2ac6-444b-8fbb-4e7d79823c8c.png" alt="Concerns" class="image-inline" title="Concerns" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The new guidelines will  make it easier for companies to file for software patents in India. But  software patenting has become hugely controversial globally , because  innova tions in the area are often just incremental, and come on top of  other software programs.Besides, patenting is expensive and is often the  subject of litigation, both of which work against small ventures with  little resources. Companies like Google have spent billions of dollars  to buy patents.&lt;br /&gt; &lt;br /&gt; Venkatesh Hariharan, member of software product  think-tank iSpirt, said the new guidelines would make it easier for  bigger companies to file software patents, but for smaller firms and  startups, the move could be detrimental."They could end up fighting  patent litigations. In the US, 37% of patent litigation is around  software and business patents," he said.&lt;br /&gt; &lt;br /&gt; Sunil Abraham,  executive director in research organization Centre for Internet and  Society , fears litigation could kill local innovation. He cited a  recent example where a Delhi high court order asked Indian handset  manufacturer Micromax to pay 1.25%-2% of the selling price of its  devices to Ericsson that had claimed infringement of patents.&lt;br /&gt; &lt;br /&gt; The other set of issues relates to certain rules and regulations in  India that place significant obstacles before small technology ventures.  This is resulting in many ventures shifting their registered offices to  Singapore or the US.&lt;br /&gt; &lt;br /&gt; Albinder Dindsa's on-demand delivery  service Gro fers is among the latest to create a holding company in  Singapore. "It is challenging to do business in India. Even opening a  bank account took time. We thought it would be easier to do an IPO if we  are in Singapore," he said.&lt;br /&gt; &lt;br /&gt; A senior industry analyst who did  not want to be named said that till last year, two out of four ventures  were moving out of India, but now that figure is three out of four. "I  would expect the government to do something about it. In fact, the  finance minister did say in June that the issues would be addressed  within 30 days. But nothing has happened."&lt;br /&gt; &lt;br /&gt; Also, it is expensive for angel investors overseas to invest in Indian startups.&lt;br /&gt; &lt;br /&gt; India disallows startups from offering stock options to foreign  nationals, which makes it difficult for them to access seasoned mentors.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-sujit-john-and-shilpa-phadnis-october-6-2015-modi-valley-hug-sparks-swadeshi-talk&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-11T05:33:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-october-8-2015-suhrith-parthasarathy-access-at-the-cost-of-net-neutrality">
    <title>Access at the cost of Net neutrality?</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-october-8-2015-suhrith-parthasarathy-access-at-the-cost-of-net-neutrality</link>
    <description>
        &lt;b&gt;In the Net neutrality debate, there is a conflict between two core values: ease of access and neutrality. The ease of access promised by applications like Free Basics compromises neutrality and may later morph into a method of predatory pricingIf programs that bring access to a part of the Internet in the immediate future were to entrench themselves, it could eventually lead to telecom companies abusing their dominant positionsIn the absence of a specific law mandating a neutral Internet, telecom companies enjoy a virtual carte blanche to discriminate between different applications. Though they have not yet exploited this autonomy fully, they are certainly moving towards that.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Suhrith Parthasarathy was &lt;a class="external-link" href="http://www.thehindu.com/opinion/lead/access-at-the-cost-of-net-neutrality/article7735242.ece"&gt;published in the Hindu&lt;/a&gt; on October 8, 2015. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, the social media giant, Facebook, &lt;a href="http://www.thehindu.com/business/Industry/facebook-rings-reliance-communications-for-free-data-access/article6878396.ece"&gt;formalised a partnership&lt;/a&gt; with Reliance Communications that enabled the Indian company to provide  access to over 30 different websites, without any charge on mobile data  accruing to the ultimate user. The platform, originally known as  “Internet.org,” has now been &lt;a href="http://www.thehindu.com/sci-tech/technology/internet/facebook-rebrands-internetorg-platform-as-free-basics-by-facebook/article7686680.ece"&gt;rebranded&lt;/a&gt; as “Free Basics,” Facebook announced last month. Its fundamental ethos,  though, remains unchanged. It allows Reliance’s subscribers to surf  completely free of cost a bouquet of websites covered within the scheme,  which includes, quite naturally, &lt;a href="http://facebook.com" target="_blank"&gt;facebook.com&lt;/a&gt;.  Mark Zuckerberg, Facebook’s founder, views this supposed initiative as a  philanthropic gesture, as part of a purported, larger aim to bring  access to the Internet to those people who find the costs of using  generally available mobile data prohibitive.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Neutrality, an interpretive concept&lt;/b&gt;&lt;br /&gt; On the face of it, this supposed act of altruism appears to be  commendable. But, there are many critics — some of whom have come  together to launch a website “&lt;a href="http://savetheinternet.in" target="_blank"&gt;savetheinternet.in&lt;/a&gt;”  with a view to defending Internet freedom — who argue that Free Basics  violates what has come to be known as the principle of network (or Net)  neutrality.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While it is clear to all of us that a notion of Net neutrality involves  some regulation of the Internet, it is less clear what the term actually  means. Like any phrase that involves either a moral or a legal  obligation, Net neutrality is also an interpretive concept. People who  employ the term to denote some sort of binding commitment, or at the  least an aspirational norm, often tend to disagree over precisely how  the idea ought to be accomplished. Tim Wu — an American lawyer and  presently a professor at the Columbia University — who coined the term,  views the notion of Net neutrality as signifying an Internet that does  not favour any one application over another. In other words, the idea is  to ensure that Internet service providers do not discriminate content  by either charging a fee for acting as its carrier or by incorporating  any technical qualifications.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In India, there is no law that expressly mandates the maintenance of a  neutral Internet. This March, the Telecom Regulatory Authority of India  (TRAI) &lt;a href="http://www.thehindu.com/business/Industry/trai-seeks-views-to-regulate-netbased-calling-messaging-apps/article7039815.ece"&gt;released a draft consultation paper &lt;/a&gt;seeking the public’s views on whether the Internet needed regulation. Unfortunately, much of its attention was focussed on the &lt;a href="http://www.thehindu.com/sci-tech/technology/internet/policy-proposes-storage-of-all-messages-mandatory-for-90-days/article7674762.ece"&gt;supposedly pernicious impact &lt;/a&gt;of  applications such as WhatsApp and Viber. “In a multi-ethnic society  there is a vital need,” wrote TRAI, “to ensure that the social  equilibrium is not impacted adversely by communications that inflame  passions, disturb law and order and lead to sectarian disputes.” The  questions, therefore, in its view were these: should at least some  Internet applications be amenable to a greater regulation, and should  they compensate the telecom service providers in addition to the data  charges that the consumers pay directly for the use of mobile Internet?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;If the government eventually answers these questions in the affirmative,  the consequences could be drastic. It could lead to a classification of  Internet applications based on arbitrary grounds, by bringing some of  them, whom the government views as harmful to society in some manner or  another, within its regulatory net. Through such a move, the state,  contrary to helping establish principles of Net neutrality as a rule of  law, would be actively promoting an unequal Internet.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In any event, as things stand, in the absence of a specific law mandating a neutral Internet, telecom companies enjoy a virtual &lt;i&gt;carte blanche&lt;/i&gt; to discriminate between different applications. Though these companies  have not yet completely exploited this autonomy, they are certainly  proceeding towards such an exercise. In April this year, &lt;a href="http://www.thehindu.com/business/airtel-launches-platform-offering-free-access-to-certain-apps/article7077204.ece"&gt;Airtel announced Airtel Zero&lt;/a&gt;,  an initiative that would allow applications to purchase data from  Airtel in exchange for the telecom company offering them to consumers  free of cost.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;On the face of it, this programme appears opposed to Net neutrality. But  what is even more alarming is that mobile Internet service providers  could, in the future, plausibly also control the speeds at which  different applications are delivered to consumers. For example, if  WhatsApp were to subscribe to Airtel Zero by paying the fee demanded by  the company, Airtel might accede to offering WhatsApp to consumers at a  pace superior to that at which other applications are run. This kind of  discrimination, as Nikhil Pahwa, one of the pioneers of the Save The  Internet campaign, has argued, is prototypically opposed to Net  neutrality. It tends to breed an unequal playing field, and, if allowed  to subsist, it could create a deep division in the online world.  Ultimately, we must view Net neutrality as a concept that stands for the  values that we want to build as a society; it pertains to concerns  about ensuring freedom of expression and about creating an open space  for ideas where democracy can thrive. There is a tendency, though, to  view those who support Net neutrality as representing a supercilious  position. Such criticism is unquestionably blinkered, but it also  highlights certain telling concerns.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Telecom companies that wish to discriminate between applications argue  that in the absence of an Internet that has completely permeated all  strata of society, an obligation to maintain neutrality is not only  unreasonable on the companies, but also unfair on the consumer. After  all, if nothing else, Airtel Zero and Free Basics bring, at the least,  some portions of the Internet to people who otherwise have no means to  access the web. What we have, therefore, at some level, is a clash of  values: between access to the Internet (in a limited form) and the  maintenance of neutrality in an atmosphere that is inherently unequal.  This makes tailoring a solution to the problem a particularly arduous  process.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Internet, in its purest form, is a veritable fountain of  information. At its core lies a commitment to both openness and a level  playing field, where an ability to innovate is perennially maintained.  It is difficult to argue against Facebook when it says that some access  is better than no access at all. But one of the problems with Free  Basics, and indeed with Airtel Zero too, is that the consumer has no  choice in which websites he or she might want to access free of cost. If  this decision is made only by Facebook, which might argue that it gives  every developer an equal chance to be a part of its project as long as  it meets a certain criteria, what we have is almost a paternalistic web.  In such a situation, information, far from being free, is shackled by  constraints imposed by the service provider.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Laudable end, unethical means&lt;/b&gt;&lt;br /&gt; This is precisely one of the concerns raised by those arguing in favour  of Net neutrality, who, it is worth bearing in mind, aren’t resistant to  the idea of a greater penetration of the Internet. Their apprehensions  lie in companies resorting to what they believe is an unethical means to  achieving, at least in theory, a laudable end. According to them,  negating Net neutrality, in a bid to purportedly achieve greater access  to the Internet in the immediate future, could prove profoundly  injurious in the long run. Yes, Airtel Zero and Free Basics would bring  to the less-privileged amongst us some access to the Internet, but the  question is this: at what cost?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The worry is that if the programs that bring access to a part of the  Internet in the immediate future were to entrench themselves, it could  eventually lead to these telecom companies abusing their dominant  positions. No doubt, as Pranesh Prakash, policy director at the Centre  for Internet and Society, has argued, it might require a deeper analysis  to argue convincingly that packages such as Free Basics and Airtel Zero  require immediate invalidation in their present forms; significantly,  the former does not demand payments from the applications while the  latter is premised on such consideration. But, viewed holistically, the  companies’ actions could potentially be characterised as a form of  predatory pricing, where consumers might benefit in the short run, only  for serious damage to ensue to competition in the long run.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It is, therefore, necessary that any debate on the issue must address  the tension between the two apparently conflicting goals — the  importance of maintaining a neutral Internet and the need to ensure a  greater access to the web across the country. Mr. Zuckerberg argues that  these two values are not fundamentally opposed to each other, but can —  and must — coexist. He is possibly correct at a theoretical level.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;But the history of markets tells us that we have to be very careful in  allowing predatory practices, devised to achieve short-term goals, to go  unbridled. As citizens, each of us has a fundamental right to freedom  of speech and expression. If we were to get the balance between these  two values wrong, if we were to allow the domination, by a few parties,  of appliances that facilitate a free exchange of ideas, in a manner that  impinges on the Internet’s neutrality, our most cherished civil  liberties could well be put to grave danger.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;(&lt;i&gt;Suhrith Parthasarathy is an advocate in the Madras High Court.&lt;/i&gt;)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-october-8-2015-suhrith-parthasarathy-access-at-the-cost-of-net-neutrality'&gt;https://cis-india.org/internet-governance/news/the-hindu-october-8-2015-suhrith-parthasarathy-access-at-the-cost-of-net-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-09T01:18:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-register-september-29-2015-kieren-mccurthy-do-you-agree-with-our-fee-hike">
    <title>Do you agree with our fee hike? Press 1 to answer Yes; or 2 for Yes</title>
    <link>https://cis-india.org/internet-governance/news/the-register-september-29-2015-kieren-mccurthy-do-you-agree-with-our-fee-hike</link>
    <description>
        &lt;b&gt;It has long been a concern that domain-name overseer ICANN is largely funded by companies reliant on the organization to make money.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kieren McCarthy was &lt;a class="external-link" href="http://www.theregister.co.uk/2015/09/29/icann_fee_agreement_survey_only_yes_option/"&gt;published in the Register&lt;/a&gt; on September 29, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Every biz that wishes to sell domain names – called a registrar – has  to pay the organization $4,000 a year, plus 18 cents on every domain  they sell.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, they have to pay a variable fee that  comprises the money ICANN says it spends on registrar-related activities  divided by the number of companies that are accredited. This year that  cost was $3.8m and with roughly 1,150 companies, that's $3,300 a head.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The pricing structure provides California-based ICANN  with just under $40m a year, more than a third of its total budget. But  in order to make sure the non-profit organization doesn't abuse its  market control to hike up its fees, each year the registrars have to  formally approve the fee structure that the ICANN Board has adopted. And  they do that through an online vote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This year, some registrars are wondering whether the $3.8m spent by ICANN is a good deal for them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"What do your ICANN fees get you?" ICANN asks itself  in an email sent to all registrars. "In addition to helping cover the  expenses associated with ICANN meetings and ICANN's day-to-day  operations, your fees have allowed us to conduct regular outreach with  registrars through 'roadshow' type training seminars, webinars,  in-person events, and site visits."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Don't ask, don't tell&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It's not clear how that money is spent nor on what,  since ICANN continues to provide only the vaguest details over its  budget, providing annual sums for "travel" and for "meetings" across the  entire organization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN is also actively refusing to hand that  information over, telling one outfit that formally asked for additional  financial data that for it to do so would be "extremely time consuming  and overly burdensome." That organization – the Centre for Internet and  Society – is &lt;a href="https://www.icann.org/en/system/files/files/reconsideration-15-15-cis-redacted-08sep15-en.pdf" target="_blank"&gt;appealing that decision&lt;/a&gt; [PDF] to ICANN's Board with a decision made two days ago but still unpublished.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN expenditure is &lt;a href="http://www.theregister.co.uk/2015/09/24/icann_on_dangerous_path/?page=3"&gt;increasing&lt;/a&gt;:  in 2014 alone, its "travel" costs jumped by 85 per cent to $17m; its  meetings budget nearly doubled from an average of $3.2m per public  meeting in 2013 to $6m in 2014. But there is almost no information on  where this money has been spent, and so far no explanation for why it  spent $113m in 2014 with an income of just $84m.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What else is ICANN spending registrars' fees on?  "We've recruited Registrar Services staff dedicated to serving Europe,  the Middle East/Africa, and Asia and have already begun a series of  (low-cost) micro-regional events in China, Japan, Singapore, and South  Korea, with plans taking shape for events in Europe, Africa, the Middle  East, and the Americas in the near future," we're told.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But existing registrars are wondering whether all  these new staff and events are needed. Are there hundreds of new  registrars entering the market? Are they in Asia?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, ICANN has stopped providing that kind  of information. In 2009, under pressure to be more open about what was  going on, the organization made big play of the fact it was going to  produce statistics showing how many registrars there were, how big they  were, and where they were based in a new "dashboard."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But those stats stopped being produced two years ago and the &lt;a href="https://charts.icann.org/public/index-registrar-registration.html" target="_blank"&gt;most recent data provided&lt;/a&gt; is from 2012.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Software and security&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Where else do the millions of dollars from the  companies that support ICANN go? "We're building up the 'GDD Portal',"  says a note from ICANN's staff, "which will become a one-stop  destination for all registrar resources at ICANN, and transitioning our  customer relationship management software from RADAR to salesforce.com."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is the same GDD Portal that ICANN had to shut  down earlier this year because of a security breach. It had  misconfigured out-the-box software and &lt;a href="http://www.theregister.co.uk/2015/03/02/icann_suffers_another_security_breach/"&gt;exposed every user's information&lt;/a&gt;,  including financial projections, launch plans, and confidential  exchanges, to every other user. Having at first claimed there was "no  indication" that confidential information was exposed, it later admitted  that it &lt;a href="http://www.theregister.co.uk/2015/04/30/confidential_information_exposed_over_300_times_in_icann_security_snafu/"&gt;had in fact happened 330 times&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for RADAR, it was &lt;a href="http://www.theregister.co.uk/2014/12/24/icanns_technical_competence_questioned_by_verisign/"&gt;specifically named&lt;/a&gt; in a report by Verisign as a security risk; this is one of the things  on a "growing list of examples where ICANN's operational track record  leaves much to be desired."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;We're listening...&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Finally, in explaining why the registrar fees are a  good deal for the companies, ICANN's staff note: "Most importantly,  we're doing our best to listen to you to ensure that our work is of real  value to you."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately that listening does not extend to hearing any complaints about the fees, or what they are spent on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All registrars receive an email during the annual  approval of the fees levied against them with a link to an online  survey. Incredibly enough, however, they are only allowed to agree to  the fees – there is no option to disagree. Or in fact do anything other  than sign up for another year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And what is ICANN's explanation for why the companies  that provide it with over a third of its budget are not allowed to  express anything but approval of the fees ICANN sets? Problems with the  voting software:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;The system is only able to accept  affirmative expressions of approval. (A technical limitation in the  voting software prevents us from knowing when we've reached the level of  approval required if we offer both a 'yes, I approve,' and a 'no, I  don't approve' option.) But if you have reservations about approving the  budget or concerns you'd like addressed first, please let me know and  I'll be happy to try to address those directly with you.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;So despite charging the companies $3,500 each a year  to run the systems that they use, ICANN has been unable to find voting  software that is capable of accepting more than one answer. Money well  spent.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-register-september-29-2015-kieren-mccurthy-do-you-agree-with-our-fee-hike'&gt;https://cis-india.org/internet-governance/news/the-register-september-29-2015-kieren-mccurthy-do-you-agree-with-our-fee-hike&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-01T15:28:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy">
    <title>Online outcry forces government to withdraw draft encryption policy</title>
    <link>https://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy</link>
    <description>
        &lt;b&gt;The article by Naina Khedekar discussing encryption policy was published in First Post on September 23, 2015. Pranesh Prakash has been quoted.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read the original published by First Post &lt;a class="external-link" href="http://tech.firstpost.com/news-analysis/online-backlash-forces-government-to-withdraw-draft-encryption-policy-282106.html"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Yesterday, the government &lt;a href="http://tech.firstpost.com/news-analysis/after-backlash-govt-exempts-whatsapp-facebook-payment-gateways-from-encryption-policy-282095.html" target="_blank"&gt;&lt;b&gt;released a draft encryption policy&lt;/b&gt;&lt;/a&gt; aimed  at keeping a tab on the use of technology by specifying algorithms and  length of encryption keys used by ‘all’. It wanted businesses, telcos  and Internet companies to store all encrypted data for 90 days in plain  text which should be presented before the law enforcement agencies  whenever asked to. Moreover, failing to do so would mean legal action as  per the laws of the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a huge outcry, most of us woke up to the new proposed addendum  this morning wherein the government has clarified to exempt products  such as social media sites including WhatsApp, Facebook and Twitter;  payment gateways; e-commerce and password based transactions and more  from the draft policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, the government has decided to &lt;a href="http://tech.firstpost.com/news-analysis/government-withdraws-controversial-draft-encryption-policy-reports-282170.html"&gt;&lt;b&gt;withdraw the draft encryption policy&lt;/b&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;I have written for that draft to be withdrawn, made changes to and then re-released: RS Prasad : ANI &lt;a href="http://t.co/W2IP4meEGb" rel="nofollow"&gt;pic.twitter.com/W2IP4meEGb&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Firstpost (@firstpost) &lt;a href="https://twitter.com/firstpost/status/646221371932962816" rel="nofollow"&gt;September 22, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;Some sort of encryption policy is there all over the world: Ravishankar Prasad &lt;a href="http://t.co/cDvsOWtjcM" rel="nofollow"&gt;pic.twitter.com/cDvsOWtjcM&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Firstpost (@firstpost) &lt;a href="https://twitter.com/firstpost/status/646222621495812096" rel="nofollow"&gt;September 22, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;What’s fascinating is how the whole process felt like déjà vu.  Haven’t we seen the drama unfold before. While the dust on the net  neutrality sage has barely settled, we’re already facing newer issues  related to encryption and privacy. We never learn from our mistakes, do  we? A new draft policy, public outcry, and then comes the much-needed  changes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="social_media" class="size-full wp-image-235071" height="360" src="http://tech.firstpost.com/wp-content/uploads/2014/09/social_media.jpg" width="640" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government hasn’t just caused anxiety and chaos among the  netizens, but the initial draft completely misguided people. According  to &lt;a href="http://thenextweb.com/in/2015/09/21/india-still-doesnt-understand-how-online-security-works/" rel="nofollow" target="_blank"&gt;&lt;b&gt;TheNextWeb&lt;/b&gt;&lt;/a&gt;,  “The Indian government has made a fool of itself and caused anxiety  among citizens with a woefully misguided proposal for a national  encryption policy that it’s just released to the public for feedback.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While we sit back and talk about Digital India, smarter cities and so  on, the makers of the law seem to be clueless about some major  by-products concerning these initiatives such as security, privacy and  likewise. Each time the government talks about a new initiative meant to  bring in some law and order pertaining to digital rights, it somehow  manages to come up with implications that could affect us far worse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this case, the Indian government is trying to ensure that its law  enforcement agencies have easy access to encrypted information whenever  required, but this could easily compromise security and privacy in the  process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, each time the government releases a proposal for our  digital lives, it’s people who remind the government about the adverse  implications it could have. Does the expert panel writing these reports  know nothing about privacy and how it possibly works? Or is the  government simply looking at a trial balloon policy to gauge reactions  by people. So, next time we don’t react, a draconian rule might just be  governing our digital lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The whole net neutrality saga continued for months with assurance  from the government on how it supports free and equal Internet, and  eventually made ‘certain changes’. This seems headed on a similar path.  Though the new addendum comes with changes, it still leaves us as  muddled as before.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash of the CIS has tweeted out how the new clarification clarifies nothing.&lt;/p&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;This clarification by the govt does not clarify anything, but further muddles the encryption policy. &lt;a href="http://t.co/1KK8AFRp6Q" rel="nofollow"&gt;pic.twitter.com/1KK8AFRp6Q&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Pranesh Prakash (@pranesh_prakash) &lt;a href="https://twitter.com/pranesh_prakash/status/646164649436549120" rel="nofollow"&gt;September 22, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;All  OSes will be illegal in India (IV.6 + V.3 of draft encryption policy)  unless Microsoft, Apple, Red Hat, etc, sign agreement w/ govt.&lt;/p&gt;
&lt;p&gt;— Pranesh Prakash (@pranesh_prakash) &lt;a href="https://twitter.com/pranesh_prakash/status/645871490408255489" rel="nofollow"&gt;September 21, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;If  India enacts that National Encryption Policy, their global back-end and  support business will be drastically reduced. If it survives.&lt;/p&gt;
&lt;p&gt;— Lin S (@Just_this_time) &lt;a href="https://twitter.com/Just_this_time/status/645781278244012033" rel="nofollow"&gt;September 21, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;A new &lt;a href="http://www.medianama.com/2015/09/223-india-draft-encryption-policy/" rel="nofollow" target="_blank"&gt;&lt;b&gt;Medianama&lt;/b&gt;&lt;/a&gt; report also points out loopholes in the changes announced. The report  adds how any encrypted service would have to sign an agreement with the  government. With the heavy mobile penetration and increasing number of  encrypted mobile services that people use, it is really feasible for the  government to ink an agreement with all the services that are based  outside the country.&lt;/p&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;Problems with the update to India's draft anti-privacy policy  &lt;a href="http://t.co/gKus1o3uaC" rel="nofollow"&gt;http://t.co/gKus1o3uaC&lt;/a&gt; &lt;a href="http://t.co/adqVJTedFI" rel="nofollow"&gt;pic.twitter.com/adqVJTedFI&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Nikhil Pahwa (@nixxin) &lt;a href="https://twitter.com/nixxin/status/646153774231228416" rel="nofollow"&gt;September 22, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In the past, we’ve seen the blame game around the laws, usually the  ‘hurriedly’ changed laws passed (after the inability to monitor  encrypted messages during the Mumbai terrorist attacks) in the winter  session of 2008 without any debate or discussion by bears the brunt.  Earlier this year, we saw the government crack down the Section 66A of  the 2008 Information Technology Act describing it “unconstitutional” and  “hit at the root of liberty and freedom of expression, the two cardinal  pillars of democracy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Why can’t all the thinking be done before drafts are penned down for  public review. A well thought out report would help avoid  retractions later.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://tech.firstpost.com/wp-content/uploads/2014/09/social_media.jpg"&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy'&gt;https://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>Encryption Policy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-01T02:05:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/understanding-and-mitigating-online-hate-speech-and-youth-radicalisation">
    <title>Understanding and Mitigating Online Hate Speech and Youth Radicalisation </title>
    <link>https://cis-india.org/internet-governance/news/understanding-and-mitigating-online-hate-speech-and-youth-radicalisation</link>
    <description>
        &lt;b&gt;The tenth annual IGF meeting will be held in João Pessoa, Brazil, on November 10 - 13, 2015. IGF's MAG has decided to retain the title “Evolution of Internet Governance: Empowering Sustainable Development” as the overarching theme. UNESCO as part of the IGF event is organizing a workshop on hate speech and youth radicalisation. Sunil Abraham will be a panelist for this workshop.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Co-organizers: Council of Europe, Oxford University; OHCHR, Google, ISOC&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;From socializing and entertainment to homework, the Internet is an essential part of life for young people today, opening vast new opportunities for connecting and learning. At the same time, the Internet provides violent extremists with powerful tools to propagate hatred and violence and to identify and groom potential recruits, creating global online communities that promote radicalization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The emergence and diffusion of hate speech online is a new and fast evolving phenomenon and collective efforts are needed to understand its significance and consequences, as well as to develop effective responses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UNESCO takes this session to share the initial outcome from its commissioned research on online hate speech including practical recommendations on combating against online hate speech through understanding the challenges, mobilizing civil society, lobbying private sectors and intermediaries and educating individuals with Media and Information Literacy. In related to this, the workshop would also discuss how to help empower youth to address online radicalization and extremism, and realize their aspirations to contribute to a more peaceful and sustainable world.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Chaired by Ms Lidia Brito, Director for UNESCO Office in Montevideo&lt;/li&gt;
&lt;li&gt;Frank La Rue, Former Special Rapporteur on Freedom of Expression&lt;/li&gt;
&lt;li&gt;Lillian Nalwoga, President ISOC Uganda and rep CIPESA, Technical community&lt;/li&gt;
&lt;li&gt;Bridget O’Loughlin, CoE, IGO&lt;/li&gt;
&lt;li&gt;Gabrielle Guillemin, Article 19&lt;/li&gt;
&lt;li&gt;Iyad Kallas, Radio Souriali &lt;/li&gt;
&lt;li&gt;Sunil Abraham executive director of Center for Internet and Society, Bangalore, India&lt;/li&gt;
&lt;li&gt;Eve Salomon, global Chairman of the Regulatory Board of RICS (the self-regulatory body for surveyors)&lt;/li&gt;
&lt;li&gt;Javier Lesaca Esquiroz, University of Navarra&lt;/li&gt;
&lt;li&gt;Representative GNI&lt;/li&gt;
&lt;li&gt;Remote Moderator: Xianhong Hu, UNESCO&lt;/li&gt;
&lt;li&gt;Rapporteur: Guilherme Canela De Souza Godoi, UNESCO &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/understanding-and-mitigating-online-hate-speech-and-youth-radicalisation'&gt;https://cis-india.org/internet-governance/news/understanding-and-mitigating-online-hate-speech-and-youth-radicalisation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-01T01:59:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyber-360">
    <title>Cyber 360</title>
    <link>https://cis-india.org/internet-governance/news/cyber-360</link>
    <description>
        &lt;b&gt;Synergy Foundation organized the Cyber 360 conference in Bangalore on September 29 and 30, 2015. Sunil Abraham participated in the event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;As part of Cyber 360 Degree, a two-day conference on cyber security continuing Wednesday in Bangalore, experts from around the world gathered to discuss global threats to information security, particularly focusing on open wifi, which poses a huge threat to information security. The conference aimed to bring together strategic security practitioners, policymakers, media and business enterprises on a single platform to obtain a 360o perspective on cybersecurity. It was an endeavour to create a holistic security strategy that will help to achieve resilience against modern cyber-threats. A range of keynote presentations and panel discussions will give participants a rare chance to interact and learn from leading cyber security experts and solution providers from around the world.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Participants&lt;/h3&gt;
&lt;p&gt; CEOs, Members of Board and CIOs of more than 60 companies&lt;br /&gt; Security practitioners&lt;br /&gt; Policy-makers&lt;br /&gt; Leading Academia&lt;br /&gt; International think tanks &amp;amp; media&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cyber-360-agenda" class="internal-link"&gt;Download the agenda&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyber-360'&gt;https://cis-india.org/internet-governance/news/cyber-360&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-14T02:22:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2015-bulletin">
    <title>September 2015 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2015-bulletin</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We are happy to share with you the ninth issue of the Centre for Internet and Society (CIS) newsletter (September 2015). It has been a significant month for public debates on the digital future of governance, citizenship, and economy in India, led by conversations around the draft National Encryption Policy, the Aadhaar number as a basis for provision of welfare services, the investigation of Google for potential abuse of market dominance by the Competition Commission of India, and the Guidelines for Examination of Computer Related Inventions released by the Indian Patents Office. We were busy engaging with these issues, and more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The past editions of the newsletter can be accessed at &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sumandro Chattapadhyay, Research Director&lt;/p&gt;
&lt;blockquote&gt;&lt;b&gt;&lt;a href="http://cis-india.org/raw/irc16-call"&gt;Internet Researchers' Conference (IRC) 2016 - Studying Internet in India&lt;/a&gt;&lt;/b&gt;&lt;br /&gt; With great excitement, we are announcing the beginning of an annual conference series titled Internet Researchers' Conference (IRC), the first edition of which is to take place in Delhi during February 25-27, 2016 (yet to be confirmed). We invite you to propose sessions for the conference by Sunday, November 15, 2015.&lt;/blockquote&gt;
&lt;p&gt; &lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS sent an &lt;a href="http://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015"&gt;Open Letter&lt;/a&gt; to Prime Minister Narendra Modi during his US visit, requesting him to urge USA to ratify the Marrakesh Treaty.&lt;/li&gt;
&lt;li&gt;During the month, NVDA team organized training programmes for the visually impaired at &lt;a href="http://cis-india.org/accessibility/blog/espeak-training-in-hindi-language-1"&gt;Kullu&lt;/a&gt;, &lt;a href="http://cis-india.org/accessibility/blog/report-on-5-day-tot-for-training-in-use-of-espeak-kannada-with-nvda"&gt;Bangalore&lt;/a&gt; and &lt;a href="http://cis-india.org/accessibility/blog/report-on-the-training-in-the-use-of-espeak-hindi-with-nvda"&gt;Ranchi&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Nehaa Chaudhari in a &lt;a href="http://cis-india.org/a2k/blogs/pervasive-technologies-working-document-series-research-questions-and-a-literature-review-on-actor-network-theory"&gt;blog post&lt;/a&gt; laid out a series of research questions, potentially seeking to apply actor-network theory as a research methodology.&lt;/li&gt;
&lt;li&gt;Recently, the Indian Patents Office released the Guidelines for  Examination of Computer Related Inventions (“2015 Guidelines/  Guidelines”) in an attempt to clarify examination of software related  patents in India. Anubha Sinha &lt;a href="http://cis-india.org/a2k/blogs/comments-on-the-guidelines-for-examination-of-computer-related-inventions-cris"&gt;analysed the 2015 Guidelines&lt;/a&gt;.  Read on to understand how the new guidelines will potentially lead to  an increase in software patenting activity by expanding the scope of  patentable subject matter – in negation of the legislative intent of  section 3(k) of the Indian Patents Act, 1970.&lt;/li&gt;
&lt;li&gt;As a part of its content donation initiative, &lt;a href="http://cis-india.org/a2k/blogs/cis-brings-nadustunna-charithra-magazine-under-by-cc-by-sa-licence"&gt;CIS has brought Nadustunna Charithra magazine under CC BY SA licence&lt;/a&gt;. CIS-A2K has received 74 issues as of now from the Telugu Jaati foundation.&lt;/li&gt;
&lt;li&gt;Sunil Abraham’s article titled Hits and Misses with the Draft Encryption Policy was published in &lt;a href="http://cis-india.org/internet-governance/blog/the-wire-26-09-2015-sunil-abraham-hits-and-misses-with-draft-encryption-policy"&gt;The Wire&lt;/a&gt; on September 26, 2015.&lt;/li&gt;
&lt;li&gt;Vidushi Marda in a blog post titled &lt;a href="http://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india"&gt;Data Flow in the Unique Identification Scheme of India&lt;/a&gt; analysed the data flow within the UID scheme and highlighted the vulnerabilities at each stage.&lt;/li&gt;
&lt;li&gt;Vanya Rakesh in a blog post titled &lt;a href="http://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015"&gt;Human DNA Profiling Bill 2012 v/s 2015 Bill&lt;/a&gt; has analysed the Human DNA Profiling Bill introduced in 2012 with the provisions of the 2015 Bill.&lt;/li&gt;
&lt;li&gt;CIS sought information from ICANN on their revenue streams by  sending them a second request under their Documentary Information  Disclosure Policy. This request and their response have been &lt;a href="http://cis-india.org/internet-governance/blog/didp-request-12-revenues"&gt;described in a blog post&lt;/a&gt; by Aditya Garg.&lt;/li&gt;
&lt;li&gt;CIS has &lt;a href="http://cis-india.org/raw/wheres-my-data-submission-for-knight-news-challenge-2015"&gt;submitted a joint proposal&lt;/a&gt; with DataMeet and Oorvani for the Knight News Challenge 2015. We are  proposing the development of "an application for users to search for  locally-relevant data, discuss missing data, demand data, explore and  respond to data demands by others, and start data crowd-sourcing  exercises."&lt;/li&gt;
&lt;li&gt;CIS made its submission on CCWG-Accountability 2nd Draft Proposal on Work Stream 1 Recommendations to ICANN's CCWG-Accountability.&lt;/li&gt;
&lt;li&gt;Pranesh Prakash, on behalf of CIS, &lt;a href="http://cis-india.org/telecom/blog/comments-on-dot-panel-report-via-mygov"&gt;submitted comments&lt;/a&gt; to the Department of Telecom Panel’s report on net neutrality via  MyGov. Prakash states that the report displays a far better  understanding of the underlying issues than the TRAI consultation paper  did, and is overall a good effort at balancing the different sides.&lt;/li&gt;
&lt;li&gt;Shyam Ponappa’s monthly column titled More on Those Dropped Calls was &lt;a href="http://cis-india.org/telecom/blog/business-standard-september-3-2015-shyam-ponappa-more-on-those-dropped-calls"&gt;published by Business Standard&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing a project on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed &lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NVDA and eSpeak&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Updates&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;September 2015 Report (Suman Dogra; September 30, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Reports&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-the-training-in-the-use-of-espeak-hindi-with-nvda"&gt;Training in the use of eSpeak Hindi with NVDA&lt;/a&gt; (Organized by CIS and Lakshay for the Differently Abled; September 29 – 30, 2015; Ranchi). The event was conducted online by Dr. Homiyar over skype, with local support from Mritunjay Kumar and Zainab.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-5-day-tot-for-training-in-use-of-espeak-kannada-with-nvda"&gt;5 day TOT for Training in Use of eSpeak Kannada with NVDA&lt;/a&gt; (Organized by CIS, Mithra Jyoti, Enable India and NFB, Bangalore; September 21 – 25, 2015; Bangalore).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/espeak-training-in-hindi-language-1"&gt;eSpeak Training in Hindi Language&lt;/a&gt; (Organized by CIS and National Association for the Blind; Kullu; September 3 – 4, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/training-in-espeak-marathi"&gt;Training in eSpeak Marathi&lt;/a&gt; (Organized by CIS; Atmadepam Society; August 22 – 23, 2015). &lt;i&gt;The report was published in the month of September.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Pervasive Technologies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/pervasive-technologies-working-document-series-research-questions-and-a-literature-review-on-actor-network-theory"&gt;Pervasive Technologies: Working Document Series - Research Questions and a Literature Review on the Actor-Network Theory&lt;/a&gt; (Nehaa Chaudhari; September 5, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/faq-cis-proposal-for-compulsory-licensing-of-critical-mobile-technologies"&gt;FAQ: CIS Proposal for Compulsory Licensing of Critical Mobile Technologies&lt;/a&gt; (Rohini Lakshané; September 25, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Other (Copyright and Patent)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/comments-on-the-guidelines-for-examination-of-computer-related-inventions-cris"&gt;Comments on the Guidelines for Examination of Computer Related Inventions&lt;/a&gt; (CRIs) (Anubha Sinha; September 21, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015"&gt;Open Letter to PM Modi on Intellectual Property Rights issues on His Visit to the United States of America in September 2015&lt;/a&gt; (Pranesh Prakash and Nehaa Chaudhari; September 23, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;National Conference: WTO, FTAs and Investment Treaties: Implications for development policy space (Organized by Focus on the Global South, Institute for Studies in Industrial Development (ISID), Madhyam, MSF Access Campaign, National Working Group on Patent Laws and WTO (NWGPL), Public Services International (PSI) – South Asia, South Solidarity Initiative – ActionAid, Third Word Network (TWN), and Forum against FTAs; September 22 – 23, 2015; Institute for Studies in Industrial Development, New Delhi). Nehaa Chaudhari made a presentation on &lt;a href="http://cis-india.org/a2k/blogs/copyright-access-to-knowledge-in-fta.pdf"&gt;Copyright: Access to Knowledge in Free Trade Agreements?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/ipex-2015"&gt;IPEX 2015&lt;/a&gt; (Organized by Confederation of Indian Industry, APTDC and TDPC; September 25 - 26, 2015; Chennai). Rohini Lakshané attended the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/live-law-apoorva-mandhani-september-23-2015-open-letter-from-cis-to-pm-modi-on-intellectual-property-rights-issues-on-his-visit-to-us"&gt;Open letter from CIS to PM Modi on Intellectual Property Rights issues on his Visit to US&lt;/a&gt; (Apoorva Mandhani; LiveLaw; September 23, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/cis-brings-nadustunna-charithra-magazine-under-by-cc-by-sa-licence"&gt;CIS brings Nadustunna Charithra magazine under CC BY SA licence&lt;/a&gt; (Tanveer Hasan; September 2, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/education-okfn-subhashish-panigrahi-september-25-2015-ocr-and-oer-update"&gt;OCR and OER – update&lt;/a&gt; (Subhashish Panigrahi; Open Education Working Group; September 25, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/wikimedia-foundation-blog-as-odia-wikipedia-turns-13-what-happens-next"&gt;As Odia Wikipedia turns 13, what happens next?&lt;/a&gt; (Subhashish Panigrahi; September 26, 2015). This was originally &lt;a href="https://blog.wikimedia.org/2015/08/21/odia-wikipedia-celebrates-13/"&gt;published on the Wikimedia Blog&lt;/a&gt; on August 21. The post was shared on Wikipedia's official &lt;a href="https://www.facebook.com/wikipedia/posts/10153481749053346"&gt;Facebook page&lt;/a&gt;, and on Twitter handles [&lt;a href="https://twitter.com/Wikipedia/status/635838494187913216"&gt;1&lt;/a&gt; and &lt;a href="https://twitter.com/Wikimedia/status/635838494200438784"&gt;2&lt;/a&gt;].&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/googles-optical-character-recognition-software-now-works-with-all-south-asian-languages"&gt;Google's Optical Character Recognition Software Now Works with All South Asian Languages&lt;/a&gt; (Subhashish Panigrahi; September 26, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/open-source-september-3-2015-subhashish-panigrahi-wikimedia-contributor-shares-his-linux-story"&gt;Wikimedia contributor shares his Linux story&lt;/a&gt; (Subhashish Panigrahi; September 27, 2015). &lt;i&gt;This article is part of a series called &lt;/i&gt;&lt;a href="https://opensource.com/tags/my-linux-story"&gt;&lt;i&gt;My Linux Story&lt;/i&gt;&lt;/a&gt;&lt;i&gt;. To participate and share your Linux story, contact us at: &lt;/i&gt;&lt;a href="mailto:open@opensource.com"&gt;&lt;i&gt;open@opensource.com&lt;/i&gt;&lt;/a&gt;&lt;i&gt;. Read the original published by &lt;/i&gt;&lt;a href="https://opensource.com/life/15/9/my-linux-story-subhashish-panigrahi"&gt;&lt;i&gt;Opensource.com&lt;/i&gt;&lt;/a&gt;&lt;i&gt; on September 3, 2015.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/events/rare-telugu-religious-and-historical-work-preserved-at-annamacharya-library-to-come-on-wikisource"&gt;Annamaya Library edit-a-thon&lt;/a&gt; (Organized by CIS-A2K and Telugu Wikipedia Community; August 6, 2015; Andhra Loyola College; Vijaywada).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/International_workshop_on_digitization_and_archiving,_Jadavpur_University"&gt;International Workshop on Digitization and Archiving&lt;/a&gt; (Organized by CIS-A2K and Wikipedia Community; August 19 – 21, 2015). Rahmanuddin Shaik was one of the trainers.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/odisha-sun-times-september-28-2015-ruby-nanda-unable-to-read-odia-on-your-android-device"&gt;Unable to read Odia on your android device? Don’t fret!&lt;/a&gt; (Ruby Nanda; Odisha Sun Times; September 28, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/openness"&gt;Openness&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The advent of the Internet has radically redefined what it means to be open and collaborative. The Internet itself is built upon open standards and free/libre/open source software. Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Open Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;As one of the general stewards of the process, CIS was invited to take part in the final drafting meeting of the International Open Data Charter held before Con Datos 2015 in Santiago, Chile, but we could not take part in it. Apart from organising two public consultations on the draft Charter in Bengaluru and Delhi, we also submitted our &lt;a href="http://cis-india.org/openness/international-open-data-charter-comments-by-cis"&gt;detailed comments&lt;/a&gt; on the document. The final version of the &lt;a href="http://opendatacharter.net/" target="_blank"&gt;Charter document has been launched&lt;/a&gt; at the United Nation General Assembly meeting, on September 27.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Free Software&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/software-freedom-pledge-2015"&gt;Software Freedom Pledge&lt;/a&gt; (Pranesh Prakash; September 25, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and International Development Research Centre (IDRC)) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on studying the restrictions placed on freedom of expression online by the Indian government.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Article&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/the-wire-26-09-2015-sunil-abraham-hits-and-misses-with-draft-encryption-policy"&gt;Hits and Misses With the Draft Encryption Policy&lt;/a&gt; (Sunil Abraham; The Wire; September 26, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india"&gt;Data Flow in the Unique Identification Scheme of India&lt;/a&gt; (Vidushi Marda; September 3, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015"&gt;Human DNA Profiling Bill 2012 v/s 2015 Bill&lt;/a&gt; (Vanya Rakesh; September 6, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar"&gt;Open Governance and Privacy in a Post-Snowden World: Webinar&lt;/a&gt; (Vanya Rakesh; September 26, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-changing-landscape-of-ict-governance-and-practice-convergence-and-big-data"&gt;The Changing Landscape of ICT Governance and Practice - Convergence and Big Data&lt;/a&gt; (Co-organized by Innovation Center for Big Data and Digital Convergence, Yuan Ze University, Taiwan; August 24 – 25, 2015). Sharat Chandra Ram was granted the &lt;a href="http://www.cprsouth.org/2015/02/call-for-applications-2015-young-scholar-awards/"&gt;Young Scholar Award 2015&lt;/a&gt; to attend the &lt;i&gt;Young Scholar Workshop&lt;/i&gt; followed by main &lt;a href="http://www.cprsouth.org/"&gt;&lt;i&gt;CPRSouth2015 conference&lt;/i&gt; (Communication Policy Research South) conference&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Free Speech and Expression&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/cis-submission-on-ccwg-accountability-2nd-draft-proposal-on-work-stream-1-recommendations"&gt;CIS Submission on CCWG-Accountability 2nd Draft Proposal on Work Stream 1 Recommendations&lt;/a&gt; (Pranesh Prakash; September 13, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/blog/didp-request-11-netmundial-principles"&gt;DIDP Request #11: NETmundial Principles&lt;/a&gt; (Aditya Garg; September 14, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/didp-request-12-revenues"&gt;DIDP Request #12: Revenues&lt;/a&gt; (Aditya Garg; September 14, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp"&gt;Peering behind the veil of ICANN’s DIDP&lt;/a&gt; (Padmini Baruah; September 21, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/asian-regional-consultation-on-the-wsis-10-review"&gt;Asian Regional Consultation on the WSIS+10 Review&lt;/a&gt; (Organized by The Internet Democracy Project, Bytes for All, APNIC, the Association for Progressive Communications, ISOC, Global Partners Digital and ICT Watch; September 3 – 5, 2015). Jyoti Panday attended the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;IGF&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The tenth annual IGF meeting will be held in João Pessoa, Brazil, on November 10 - 13, 2015. IGF's MAG has decided to retain the title “Evolution of Internet Governance: Empowering Sustainable Development” as the overarching theme. Sunil Abraham will be a panelist for the following workshops:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/understanding-and-mitigating-online-hate-speech-and-youth-radicalisation"&gt;Understanding and Mitigating Online Hate Speech and Youth Radicalisation&lt;/a&gt; (Organized by Council of Europe, Oxford University, OHCHR, Google and ISOC; November 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-multi-stakeholder-cooperation"&gt;Transnational Due Process: A Case Study in Multi-stakeholder Cooperation&lt;/a&gt; (Organized by the United Nations; November 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Cyber Security&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015"&gt;Bangalore Chapter Meet of DSCI&lt;/a&gt; (Co-organized by DSCI and CIS; September 26, 2015). Melissa Hathaway, Commissioner, Global Commission for Internet Governance and Sunil Abraham gave a talk at this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Miscellaneous&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore"&gt;Sustainable Smart Cities India Conference 2015, Bangalore&lt;/a&gt; (Vanya Rakesh; September 21, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/telecom/blog/comments-on-dot-panel-report-via-mygov"&gt;Comments on the DoT Panel Report via MyGov&lt;/a&gt; (Pranesh Prakash; September 26, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Op-ed&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/telecom/blog/business-standard-september-3-2015-shyam-ponappa-more-on-those-dropped-calls"&gt;More on those Dropped Calls&lt;/a&gt; (Shyam Ponappa; Business Standard; September 2, 2015 and Organizing India Blogspot; September 3, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by contemporary concerns to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It is interested in producing local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/wheres-my-data-submission-for-knight-news-challenge-2015"&gt;Where's My Data? Submission for Knight News Challenge 2015&lt;/a&gt; (Sumandro Chattapadhyay; September 30, 2015). &lt;i&gt;The text of the proposal was prepared by Nisha Thompson of DataMeet, Meera K of Oorvani, and Sumandro Chattapadhyay.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/blog_the-internet-in-the-indian-judicial-imagination"&gt;The Internet in the Indian Judicial Imagination&lt;/a&gt; (Divij Joshi; September 9, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/blog_the-many-lives-and-sites-of-internet-in-bhubaneswar"&gt;The Many Lives and Sites of Internet in Bhubaneswar&lt;/a&gt; (Sailen Routray; September 21, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-hindu-september-1-2015-parshathy-nath-does-this-click-with-you"&gt;Does this click with you?&lt;/a&gt; (Parshathy J. Nath; The Hindu; September 1, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/economic-times-september-3-2015-surabhi-agarwal-govt-tie-up-with-global-police-interpol-to-fight-child-pornography"&gt;Government may tieup with global police, Interpol to fight child pornography&lt;/a&gt; (Surabhi Agarwal; September 3, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/hindustan-times-september-3-2015-harjeet-inder-singh-sahi-hiding-behind-rules-on-naming-sites-it-banned-govt-reveals-fears"&gt;Hiding behind rules on naming sites it banned, govt reveals fears&lt;/a&gt; (Harjeet Inder Singh Sahi; September 3, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing"&gt;Outrage before sharing&lt;/a&gt; (Nikhil Verma; The Hindu; September 9, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-week-september-20-2015-shweta-t-nanda-faking-a-stand"&gt;Faking a stand&lt;/a&gt; (Shweta T. Nanda; The Week; September 20, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/outlook-september-21-2015-arindam-mukherjee-some-key-words-are-missing"&gt;Some Key Words Are Missing&lt;/a&gt; (Arindam Mukherjee; Outlook; September 21, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame"&gt;Open sesame&lt;/a&gt; (The Hindu; September 22, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash"&gt;India encryption policy draft faces backlash&lt;/a&gt; (Moulishree Srivastava; September 22, 2015)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy"&gt;Online outcry forces government to withdraw draft encryption policy&lt;/a&gt; (Naina Khedekar; First Post; September 23, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi"&gt;Encryption policy would have affected emails, operating systems, WiFi&lt;/a&gt; (Amrita Madhukalya; DNA; September 23, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy"&gt;Govt presses 'undo' button on draft encryption policy&lt;/a&gt; (Business Standard; September 23; 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal"&gt;Huge outcry forces India to backtrack on social media data proposal&lt;/a&gt; (Today; September 24, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/wsj-september-24-2015-newley-purnell-resty-woro-uniar-facebook-free-internet-access-program-in-developing-countries-provokes-backlash"&gt;Facebook’s Free Internet Access Program in Developing Countries Provokes Backlash&lt;/a&gt; (Newley Purnell and Resty Woro Uniar; The Wall Street Journal; September 24, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-september-26-2015-ahead-of-hosting-modi-facebook-rebrands-internet-dot-org-as-free-basics"&gt;Ahead of hosting Modi, Facebook rebrands internet.org as Free Basics&lt;/a&gt; (Business Standard; September 26, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/asian-age-september-27-2015-s-raghotham-and-mayukh-mukherjee-by-weakening-our-security-govt-is-putting-us-at-risk-of-espionage"&gt;‘By weakening our security, govt is putting us at risk of espionage’&lt;/a&gt; (S. Raghotham and Mayukh Mukherjee; Asian Age; September 27, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/9ad9be9b09a49c7-9aa9be98199a9b69b0993-9ac9c79b69bf-9b89cd99f9c79b69a89c7-9ab9cd9b09bf-9939af9bc9be987-9ab9be987-99a9be9b29c1-9b99ac9c7"&gt;ভারতে পাঁচশোরও বেশি স্টেশনে ফ্রি ওয়াই-ফাই চালু হবে&lt;/a&gt; (BBC; September 28, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-register-september-29-2015-kieren-mccurthy-do-you-agree-with-our-fee-hike"&gt;Do you agree with our fee hike? Press 1 to answer Yes; or 2 for Yes&lt;/a&gt; (Kieren McCarthy; The Register; September 29, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception"&gt;Indian PM Narendra Modi’s digital dream gets bad reception&lt;/a&gt; (Amanda Hodge; September 29, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/ndtv-maya-sharma-september-29-2015-what-bengaluru-thinks-of-big-tech-announcements-in-silicon-valley"&gt;What Bengaluru Thinks of the Big Tech Announcements in Silicon Valley&lt;/a&gt; (Maya Sharma; NDTV; September 29, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the mediation and reconfiguration of social and cultural processes and structures by the internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS - Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Access to Knowledge - Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Access to Knowledge - Facebook:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Access to Knowledge - E-Mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Researchers at Work - E-Mail: &lt;a href="mailto:raw@cis-india.org"&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Researchers at Work - Mailing List: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, Access to Knowledge, at &lt;a href="mailto:tanveer@cis-india.org"&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2015-bulletin'&gt;https://cis-india.org/about/newsletters/september-2015-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-11-25T01:55:25Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/wsj-september-24-2015-newley-purnell-resty-woro-uniar-facebook-free-internet-access-program-in-developing-countries-provokes-backlash">
    <title>Facebook’s Free Internet Access Program in Developing Countries Provokes Backlash </title>
    <link>https://cis-india.org/internet-governance/news/wsj-september-24-2015-newley-purnell-resty-woro-uniar-facebook-free-internet-access-program-in-developing-countries-provokes-backlash</link>
    <description>
        &lt;b&gt;In India and Indonesia, users criticize Internet.org initiative, saying it violates the principles of net neutrality.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Newley Purnell and Resty Woro Uniar was &lt;a class="external-link" href="http://www.wsj.com/articles/facebooks-free-internet-access-program-in-developing-countries-provokes-backlash-1443119580"&gt;published in the Wall Street Journal&lt;/a&gt; on September 24, 2015. Sunil Abraham gave inputs.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;When  Muhammad Maiyagy Gery heard about a new mobile app from  &lt;a href="http://quotes.wsj.com/FB"&gt;Facebook&lt;/a&gt;&lt;span class="company-name-type"&gt; Inc.&lt;/span&gt;&lt;a class="chiclet-wrapper" href="http://quotes.wsj.com/FB"&gt; &lt;/a&gt; that provides free Internet access in his native Indonesia, he was excited.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But after testing it, the 24-year-old student from a mining town on  the eastern edge of Borneo soon deleted the app, called Internet.org,  frustrated that he was unable to access  &lt;a href="http://quotes.wsj.com/GOOG"&gt;Google&lt;/a&gt;.&lt;a class="chiclet-wrapper" href="http://quotes.wsj.com/GOOG"&gt; &lt;/a&gt;com and some local Indonesian sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Gery said Facebook Chief Executive  &lt;a href="http://topics.wsj.com/person/Z/Mark-Zuckerberg/408"&gt;Mark Zuckerberg&lt;/a&gt; is an “inspiration in the tech world,” but added that the company’s free Internet effort is “inadequate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr.  Gery’s reaction illustrates the unexpected criticism Facebook has  encountered to its bold initiative to bring free Internet access to the  world’s four billion people who don’t have it, and to increase  connectivity among those with limited access. He is one of many users  who say a Facebook-led partnership is providing truncated access to  websites, thwarting the principles of what is known in the U.S. as net  neutrality—the view that Internet providers shouldn’t be able to dictate  consumer access to websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since &lt;a class="none icon" href="http://www.wsj.com/articles/SB10001424127887323608504579025773163440460" target="_self"&gt;Mr. Zuckerberg’s announcement of the $1 billion project&lt;/a&gt; two years ago, Facebook has launched Internet.org in 19 countries  across Asia, Latin America and Africa by teaming up with mobile carriers  and technology giants including  &lt;a href="http://quotes.wsj.com/SSNHZ"&gt;Samsung Electronics&lt;/a&gt; Co.&lt;a class="chiclet-wrapper" href="http://quotes.wsj.com/SSNHZ"&gt; &lt;/a&gt;, chip maker  &lt;a href="http://quotes.wsj.com/QCOM"&gt;Qualcomm&lt;/a&gt; Inc.&lt;a class="chiclet-wrapper" href="http://quotes.wsj.com/QCOM"&gt; &lt;/a&gt; and telecom-equipment firm  &lt;a class="company-name" href="http://quotes.wsj.com/ERIC"&gt;Ericsson&lt;/a&gt;&lt;a class="chiclet-wrapper" href="http://quotes.wsj.com/ERIC"&gt; &lt;/a&gt; AB. Facebook says that through the initiative, in which it is also  experimenting with drones and satellites to deliver Web access, some  nine million people have come online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Facebook.png/@@images/3da859db-3161-493a-b3e2-8e6065109867.png" alt="Facebook" class="image-inline" title="Facebook" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Users with data-enabled feature phones can access a special website through a mobile browser, while those with smartphones can download the app from Google’s Play Store. Though arrangements vary by country, the Internet.org app typically provides a simplified, low-data version of Facebook, its Messenger service and selected local websites offering services like jobs, health information and sports updates. Facebook says it works with mobile operators, which provide free data, and governments to pick sites for the platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While some applaud the Internet initiative, the U.S. company is  dealing with a backlash from users in some of its fastest-growing  markets like Indonesia and India, which are key to its future expansion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  response to the criticism, Mr. Zuckerberg earlier this year wrote an  opinion article that appeared in two Indian newspapers defending the  project. He argued that the initiative is compatible with the principles  of net neutrality, and that if people “can’t afford to pay for  connectivity, it is always better to have some access and voice than  none at all.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But criticism about the initiative has placed  Facebook in an awkward position. The social network along with other  tech companies like  &lt;a href="http://quotes.wsj.com/AMZN"&gt;Amazon.com&lt;/a&gt; Inc.&lt;a class="chiclet-wrapper" href="http://quotes.wsj.com/AMZN"&gt; &lt;/a&gt; and  &lt;a href="http://quotes.wsj.com/TWTR"&gt;Twitter&lt;/a&gt; Inc.&lt;a class="chiclet-wrapper" href="http://quotes.wsj.com/TWTR"&gt; &lt;/a&gt; are members of the U.S. industry group Internet Association, which  advocates for net neutrality, among other issues. In markets like  Indonesia and India, critics say Facebook is more interested in  controlling which websites users can tap into than in ensuring free  Internet access. “It’s not Internet.org. It’s walled garden.org,” said  Sunil Abraham, head of the Bangalore, India-based Center for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook  wants to be seen as a pioneer “of the open and free Internet and not  the opposite,” said Neha Dharia, an analyst at telecommunications  research firm Ovum.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Thursday, Facebook said it was changing the name of the Internet.org app and mobile website to Free Basics by Facebook in order to better distinguish it from the company’s wider Internet.org initiative. Asked whether the change was related to criticism of the project, a Facebook spokeswoman said that the name will “more intuitively describe the product to consumers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chris Daniels, Facebook’s vice president in charge of the project,  said in a recent interview that he has been surprised by the criticism  of the project, noting that many people have gained access to the Web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="none icon" href="http://blogs.wsj.com/indiarealtime/2015/04/16/how-india-is-breaking-the-internet-while-trying-to-savetheinternet/" target="_self"&gt;This spring in India&lt;/a&gt;,  travel website Cleartrip, news channel NDTV and a mobile news app  pulled their content from the platform amid concerns over net  neutrality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cleartrip referred inquiries about its reasons for  leaving the initiative to an April statement it posted on its website.  In that statement, the company said the backlash in India “gave us pause  to rethink our approach to Internet.org and the idea of large  corporations getting involved with picking and choosing who gets access  to what and how fast.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vishal Anand, chief product officer at  mobile news app Dailyhunt, said that “While we appreciate the effort to  give people Internet access, we fully support the principles of net  neutrality.” He declined to elaborate on the company’s specific  objections to Internet.org.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/wsj-september-24-2015-newley-purnell-resty-woro-uniar-facebook-free-internet-access-program-in-developing-countries-provokes-backlash'&gt;https://cis-india.org/internet-governance/news/wsj-september-24-2015-newley-purnell-resty-woro-uniar-facebook-free-internet-access-program-in-developing-countries-provokes-backlash&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-29T16:35:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception">
    <title>Indian PM Narendra Modi’s digital dream gets bad reception</title>
    <link>https://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception</link>
    <description>
        &lt;b&gt;As Indian Prime Minister Narendra Modi told Silicon Valley’s most powerful chief executives this week how his government “attacked poverty by using the power of networks and mobile phones’’, the entire population of the state of Kashmir remained offline — by order of the state.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Amanda Hodge was published in &lt;a class="external-link" href="http://www.theaustralian.com.au/news/world/indian-pm-narendra-modis-digital-dream-gets-bad-reception/story-e6frg6so-1227547929688"&gt;the Australian&lt;/a&gt; on September 29, 2015. Sunil Abraham gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“I see technology as a means to empower and as a tool that bridges the distance between hope and opportunity,” Mr Modi said yesterday on a trip in which he will also discuss development at the UN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier, in a “town hall” meeting with Facebook chief Mark Zuckerberg Mr Modi hailed the power of social media networks that gave governments the opportunity to correct themselves “every five minutes”, rather than every five years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His remarks during his Digital India tour of the US west coast sparked a storm of Twitter protest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The northern state’s former chief minister Omar Abdullah, who noted the “irony of listening to Prime Minister Modi lecturing about connected digital India, while we are totally disconnected”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ban on mobile and broadband internet in Jammu and Kashmir was imposed last Friday, the beginning of the Muslim holiday of Eid-ul-Zuha during which animals are slaughtered and the meat fed to the poor, for fear social media could inflame tensions over the state government’s decision to enforce a beef ban.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was to have lasted 24 hours but — notwithstanding Twitter feedback — was extended twice as a “precautionary” measure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Mr Modi outlined his dreams of a broadband network connecting the country’s most remote communities, millions of New Delhi mobile phone users continued their daily wrestle with line dropouts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are bringing technology, transparency, efficiency, ease and effectiveness in governance,” he said, as in New Delhi the government talked of pulling down more mobile towers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centre for Internet and Society director Sunil Abraham said yesterday: “Schizophrenia between rhetoric and reality (on digital policy) is the global standard for all world leaders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Politicians in opposition are invariably opposed to surveillance and in favour of free speech but the very day that politician assumes office even if it is someone as splendid as Barack Obama, they change their opinions on these topics and become pro-surveillance and pro-censorship.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Certainly successive Indian governments have had a patchy record on such issues. Last March India’s activist Supreme Court struck down a controversial section of the Information Technology Act which made posting information of a “grossly offensive or menacing character” punishable by up to three years’ jail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That month police in northern Uttar Pradesh arrested a teenager for a Facebook post, which they said “carried derogatory language against a community”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous cases under the former Congress-led government include that of a university professor detained for posting a cartoon about the chief minister of West Bengal and the arrest of two young women over a Facebook post criticising the shutdown of Mumbai following the death of a Hindu right politician.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Mr Modi’s government welcomed the Supreme Court ruling as a “landmark day for freedom of speech and expression”, last month it attempted to block 857 random porn sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notwithstanding the gulf between Mr Modi’s digital dream rhetoric and the reality at home, his second US visit in 17 months has reaped dividends. Google has committed to a joint initiative to roll out free Wi-Fi to 500 railway stations across the country, and Qualcomm has pledged a $US150 million ($213m) tech startup fund.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Mr Abraham warned of the potential for such investments to compromise net neutrality — the principle of allowing internet users access to all content and applications.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception'&gt;https://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2015-09-29T15:23:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ndtv-maya-sharma-september-29-2015-what-bengaluru-thinks-of-big-tech-announcements-in-silicon-valley">
    <title>What Bengaluru Thinks of the Big Tech Announcements in Silicon Valley</title>
    <link>https://cis-india.org/internet-governance/news/ndtv-maya-sharma-september-29-2015-what-bengaluru-thinks-of-big-tech-announcements-in-silicon-valley</link>
    <description>
        &lt;b&gt;There is a split verdict on the big tech announcements made out of California during the Prime Minister's visit, in the desi version of Silicon Valley - Bengaluru.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="http://www.ndtv.com/bangalore-news/what-bengaluru-thinks-of-silicon-valleys-promises-to-pm-modi-1224320"&gt;NDTV&lt;/a&gt; on September 29, 2015. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Companies here are still assessing how they will be impacted by the big  connectivity projects that Google, Microsoft and others announced when  Prime Minister Narendra Modi dropped in at Silicon Valley, the global  hub for innovation and technology, over the weekend.&lt;br /&gt;&lt;br /&gt; CEO Sunder Pichai said Google would tie up with the government to  provide free Wi-Fi at 500 railway stations across the country.  Microsoft's Satya Nadela said his company would take broadband  connectivity to five lakh villages across the country.&lt;br /&gt;&lt;br /&gt;And that its cloud services would operate out of India's data centres.&lt;br /&gt;&lt;br /&gt; Some smaller companies in Bengaluru hope they will get some business  when these giant projects are implemented. "Smaller companies like ours  would be hoping we get a share of the pie when it comes to  implementation. The government should ensure that," said Soujanya  Prakash, a General Manager at Vee Technologies, to NDTV. Vee one of the  companies assigned to implement part of the massive Aadhar identity card  project.&lt;br /&gt;&lt;br /&gt; Ms Prakash said companies like Microsoft and Google bring great technological expertise with them.&lt;br /&gt;&lt;br /&gt; Pranesh Prakash, Policy Director for the Centre for Internet and  Technology, had a word of caution as he voiced concern about the privacy  policies of some big global companies. "The government should push for a  strong data protection regime in India and force these companies to  abide by that," he said.&lt;br /&gt;&lt;br /&gt; Mr Prakash also said, "These companies need India more than we need them  since there are more than one billion customers here. The Indian  government must be wise in using this bargaining power."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ndtv-maya-sharma-september-29-2015-what-bengaluru-thinks-of-big-tech-announcements-in-silicon-valley'&gt;https://cis-india.org/internet-governance/news/ndtv-maya-sharma-september-29-2015-what-bengaluru-thinks-of-big-tech-announcements-in-silicon-valley&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-18T13:26:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
