<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1426 to 1440.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-september-22-2015-bowing-to-public-pressure-govt-withdraws-draft-encryption-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-request-12-revenues"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-request-11-netmundial-principles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-submission-on-ccwg-accountability-2nd-draft-proposal-on-work-stream-1-recommendations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-multi-stakeholder-cooperation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar">
    <title>Open Governance and Privacy in a Post-Snowden World : Webinar</title>
    <link>https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar</link>
    <description>
        &lt;b&gt;On 10th September 2015, the OGP Support Unit, the Open Government Guide, and the World Bank held a webinar on “Open Governance and Privacy in a Post-Snowden World” presented by Carly Nyst, Independent consultant and former Legal Director of Privacy International and Javier Ruiz, Policy Director of Open Rights Group. This is a summary of the key issues that were discussed by the speakers and the participants.&lt;/b&gt;
        &lt;p&gt;See &lt;a href="https://events-na4.adobeconnect.com/content/connect/c1/833642795/en/events/event/private/877773861/1209689848/event_landing.html?sco-id=1253823513"&gt;Open Governance and Privacy in a Post-Snowden World&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Summary&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The webinar discussed how Government surveillance has become an important and key issue in the 21&lt;sup&gt;st&lt;/sup&gt; century, thanks to Edward Snowden. The main concern raised was with respect to what a democracy should look like in the present day. Should the states’ use of technology enable state surveillance or an open government? Typically, there is a balance that must be achieved between the privacy of an individual and the security of the state – particularly as the former is primarily about social rights and collective interest of citizens.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;At the international level, the right to privacy has been recognized as a basic human right and an enabler of other individual freedoms. This right encapsulates protection of personal data where citizens have the authority to choose whether to share or reveal their personal data or not. Due to technological advancement that has enabled collection, storage and sharing of personal data, the right to privacy and data protection frameworks have become of utmost importance and relevance with regard to open government efforts. Therefore, it is important for Governments to be transparent in handling sensitive data that they collect and use.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Many countries have also introduced laws to balance the right to privacy and right to information.  The role of the private sector and NGOs involved in enabling an open and transparent government must also be duly addressed at a national level.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Key Questions:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Why should the government release information?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;There are multiple reasons for doing so including:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the purposes of research and public policy (which relates to healthcare, social issues, economics, national statistics, census, etc.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Transparency and accountability (politicians, registers, public expenses, subsidies, fraud, court records, education)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Public participation and public services (budgets, anti-corruption, engagement, and e-governance).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, all these have certain risks and privacy implications:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Risk of identification of individual: Any individual whose information is released has the risk of identification, followed by issues like identity theft, discrimination, stigmatization or repression. Normally, the solution for this would be anonymization of the data; however, this is not an absolute solution. Privacy laws can generally cope with such risks, but with pseudonymous data it becomes difficult in preventing identification.&lt;/li&gt;
&lt;li&gt;Profiling of social categories which can lead to discrimination: In such a situation, policies and other legislations regulating the use of data and providing remedy for violations can help.&lt;/li&gt;
&lt;li&gt;Exploitation and unfair/unethical use of information: When understanding the potential exploitation of information it is useful to consider who is going to benefit from the release of information.  For example, in UK, with respect to release of Health Data, the main concern is that people and companies will benefit commercially from the information released, despite of the result potentially being improved drugs and treatment. &lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;What are the Solutions?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The webinar also discussed potential solutions to the questions and challenges posed. For example, when &lt;a href="http://www.opengovguide.com/"&gt;commitments of Open Government Data Partnership&lt;/a&gt; are considered, privacy legislations must also be proposed. Further, key stakeholders must make commitments to take pro-active measures to reduce informational asymmetries between the state and citizens.  To reduce the risks, measures must be taken to publish what information the State has or what the Government knows about the citizens. For example, in UK, within the civil society network, it is being duly considered in the national plan that the government will publicize how it will share data and have a centralized view on the process of information handling and usage of the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Open Government Guide provides for Illustrative Commitments like enactment of data protection legislation, establishing programmes for awareness and assessment of their impact, giving citizens control of their personal information and the right to redress when that information is misused, etc. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue of surveillance and the role of privacy in an open government context was also discussed.  The need for creating a balance between the legitimate interest of national security and the privacy of individuals was emphasized. With the rise of digital technologies, many governmental measures pertaining to surveillance intervene in individual privacy. There are many forms of surveillance and this has serious privacy implications, especially in developing countries. For example:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Communications surveillance &lt;/li&gt;
&lt;li&gt;Visual surveillance &lt;/li&gt;
&lt;li&gt;Travel surveillance &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This raises the question: When is surveillance legitimate and when must it be allowed?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://en.necessaryandproportionate.org/"&gt;The International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt; acts as a soft law and tries to set out what a good surveillance system looks like by ensuring that governments are in compliance with international human rights law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In essence surveillance does not violate privacy, however, there must be a clear and foreseeable legal framework laying circumstances when the government has the power to collect data and when individuals might be able to foresee when they might be under surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, a competent judicial authority must be established to oversee surveillance and keep a check on executive power by placing restrictions on privacy invasions. The actions of the government must be proportionate and the benefits must not outweigh harm caused by surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Role of openness in a “mass surveillance” state &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance measures that are being undertaken by governments are increasingly secretive. The European court of Human Rights has held that Secret surveillance may undermine democracy under the cloak of protecting it. Hence, open government and openness will work towards protecting privacy and not undermining it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To balance the measure of government surveillance with privacy, there is a need to publish laws regulating such powers; publish transparency reports about surveillance, interception and access to communications data; reform legislations relating to surveillance by state agencies to ensure it complies with human rights and establish safeguards to ensure that new technologies used for surveillance and interception respect the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The conclusion one can draw is that Privacy concerns have gained importance in today’s data driven world. The main question that needs to be answered is whether Government’s should adopt surveillance measures or adopt an Open Government?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering equal importance of national security and privacy of individuals, it is required that a balance must be crafted between the two. This could be possibly done by enacting foreseeable and clear laws outlining scope of surveillance by the Government on one hand, and informing citizens about such measures on the other. Establishment of a competent judicial authority to keep a check on Government actions is also suggested to work out the delicate balance between surveillance and privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar'&gt;https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-10-04T11:09:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy">
    <title>Govt presses 'undo' button on draft encryption policy</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy</link>
    <description>
        &lt;b&gt;The decision came a day before PM embarked on a visit to the US, where he is expected to meet leaders of firms such as Apple, Facebook, Google and Tesla.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/govt-presses-undo-button-on-draft-encryption-policy-115092201014_1.html"&gt;Business Standard&lt;/a&gt; on September 23, 2015. Sunil Abraham gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government on Tuesday scrapped a draft &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=National+Encryption+Policy" target="_blank"&gt;national encryption policy &lt;/a&gt;that mandated firms and individuals to allow authorities access to all encrypted information on email, apps, websites and business servers.&lt;br /&gt;&lt;br /&gt;The decision came a day before Prime Minister&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Narendra+Modi" target="_blank"&gt;Narendra Modi &lt;/a&gt;embarked on a visit to the US, where he is expected to meet leaders of firms such as Apple, Facebook, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Google" target="_blank"&gt;Google &lt;/a&gt;and Tesla. Activists and executives from technology firms had expressed outrage on the draft policy, saying the move would have taken India a step back in technology adoption.&lt;br /&gt;&lt;br /&gt;At a meeting of the Union Cabinet on Tuesday, Modi was livid at the controversy generated by the draft policy and directed officials to withdraw it ahead of his US trip, sources said.&lt;br /&gt;&lt;br /&gt;The draft had global ramifications, as Facebook,&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Twitter" target="_blank"&gt;Twitter &lt;/a&gt;and messaging apps such as &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;were named in it.&lt;br /&gt;&lt;br /&gt;Ravi Shankar Prasad, Union minister for communications and information technology, distanced the government from the draft hosted on the IT department site, but admitted it gave “uncalled-for misgivings”. He directed officials to rework the draft but did not set a timeframe for seeking feedback from the public.&lt;br /&gt;&lt;br /&gt;“Yesterday (Monday), it was brought to our notice that the draft had been put in the public domain for, seeking comment. I read the draft. I understand that the manner in which it was written could lead to misconceptions. I have asked for the draft policy to be withdrawn and reworded. I personally feel some of the expressions used in the draft are giving rise to uncalled-for misgivings,” Prasad said. “Experts had framed the draft policy. It is not the government’s final view.”&lt;br /&gt;&lt;br /&gt;According to the original draft, the encryption policy sought every message sent by a user, be it through services such as WhatsApp, an SMS or an email, be mandatorily stored in plain text format for 90 days and made available on demand to security agencies. Failure to do so, it added, would draw legal action.&lt;br /&gt;&lt;br /&gt;This was because typically, all messaging apps and services such as WhatsApp, Viber, Line, Google Chat and Yahoo! Messenger have high levels of encryption, which security agencies find hard to crack and intercept.&lt;br /&gt;&lt;br /&gt;Early on Tuesday, before Prasad announced the withdrawal of the draft policy, the government had issued an addendum to keep social media and web applications such as WhatsApp, Twitter and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;out of its purview.&lt;br /&gt;&lt;br /&gt;In a three-point clarification, the Department of Electronics and Information Technology (DeitY) said some encryption products were exempt. “Mass-use encryption products, currently being used in web applications, social media sites and social media applications, such as WhatsApp, Facebook and Twitter…SSL/TLS encryption products being used in internet banking and payment gateways, as directed by the Reserve Bank of India”, and SSL/TLS encryption products being used for e-commerce and password based transactions,” it said.&lt;br /&gt;&lt;br /&gt;“Ideally, the new policy should only focus on two objectives: It should mandate encryption standards within the government, military, law enforcement and intelligence agencies. It shouldn’t regulate the use of encryption by the private sector; the private sector should be allowed to use whatever it believes is appropriate, as long as it is considered a reasonable security measure by courts, under section 43A of the IT Act,” said Sunil Abraham, director,&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Centre+For+Internet+And+Society" target="_blank"&gt;Centre for Internet and Society &lt;/a&gt;(CIS).&lt;br /&gt;&lt;br /&gt;Prasad reiterated the government, under the leadership of Prime Minister Narendra Modi, had promoted social media activism. “The right of articulation and freedom we fully respect. But at the same time, we need to acknowledge that cyber space transaction is rising enormously for individuals, businesses, the government and companies,” he said.&lt;br /&gt;&lt;br /&gt;Opposition parties slammed the Draft policy. Congress communications in-charge Randeep Surjewala said, “Subjugation of individual freedom, surveillance of the citizen and suppression of dissent have emerged as the DNA of the Narendra Modi-led BJP government. The draft policy on encryption, first circulated, then amended and now, withdrawn with a rider for re-issuing it, is a totalitarian, misconceived and a failed attempt of the Modi government to override all sense of individual freedom of speech and expression and encroach upon the right to privacy of communication…With 243.1 million internet users in India at the end of 2014 (173 million being mobile internet users), 112 million Facebook users, 80 million WhatsApp users, 22 million Twitter users and 950 million mobile connections, the intrusion of individual liberty is fraught with dangerous dimensions under the Modi government.”&lt;br /&gt;&lt;br /&gt;Aam Aadmi Party spokesperson Raghav Chadha said, “Only a fascist government can bring such a policy. The draft policy was in violation of the right to personal liberty and the fundamental tenets of freedom of speech and expression…the draft policy was for snooping. It presupposes the 1.2 billion people of India are potential criminals. It reflects the inclination of the government and its intention to turn India into a totalitarian state.”&lt;br /&gt;&lt;br /&gt;&lt;b&gt;ABOUT THE NATIONAL ENCRYPTION POLICY&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Five things the government  draft policy wanted&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Information security for individuals, businesses and government agencies&lt;/li&gt;
&lt;li&gt;Development of indigenous encryption standards&lt;/li&gt;
&lt;li&gt;Use of digital signatures to authenticate transactions&lt;/li&gt;
&lt;li&gt;Legal interception and data retention&lt;/li&gt;
&lt;li&gt;Service providers to register under appropriate government agency&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Things that caused outrage&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Regulation of private sector encryption&lt;/li&gt;
&lt;li&gt;Storage of all encrypted communications for&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;90 days&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Gaining backdoor into private communications of users&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Amendment &amp;amp; withdrawal&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Omission of mass encryption products such as those used by social networks&lt;/li&gt;
&lt;li&gt; Withdrawal of draft policy following Ravi Shankar Prasad’s statement&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy'&gt;https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-25T01:55:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame">
    <title>Open sesame</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame</link>
    <description>
        &lt;b&gt;The government’s email is shockingly vulnerable.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.thehindubusinessline.com/opinion/open-sesame/article7678142.ece"&gt;Hindu&lt;/a&gt; on September 22, 2015. CIS research on private email accounts is mentioned.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;As the Centre moves towards smart cities and a Digital  India, some critics have cited the country’s increased vulnerability to  cyber attacks. To be sure, cyber threat groups could disrupt our  infrastructure by taking control of many systems. Such attacks could be  quite damaging. Yes, they are rare today, but are much more likely to  arise in conjunction with traditional armed conflicts. Cyber criminal  groups target Indian organisations on a daily basis.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Almost  two years ago, the IT minister’s office triggered national outrage when  it used a public email service for official communication. There was  much hand-wringing about security practices in a ministry responsible  for setting the technology direction (secure email policy) for the  country. Then in December 2013, the Centre for Internet and Society  revealed that up to 90 per cent of Indian government officials used  private email accounts for professional purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A big deal&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Between  then and now, we’ve read about a new email policy and revelations of  several cyber attacks on government officials. And FireEye revealed a  decade-long cyber espionage operation by a group we call ‘APT30’, which  is likely to be sponsored by China. How did they break in? By sending  targeted ‘spear-phish’ emails with malware attached.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Email  doesn’t sound like a big deal. Most of us have been using it for over a  decade, and think we know how to use it right. But when you’re in a  position of authority with access to sensitive information, you  shouldn’t leave it to chance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Today, state-sponsored  attackers craft these spear-phishing emails after considerable  research. APT30 carefully researched their targets and crafted mails  which would appear extremely relevant, with interesting content. The  moment a victim would open an attachment, an exploit would secretly  install a backdoor. Through that backdoor, groups can compromise the  employee’s entire network and extricate sensitive data. Groups bent on  destruction can deploy malware to destroy the data. They could also take  control of systems managing infrastructure or industrial processes and  create havoc.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Spear-phishing has an open rate of 70  per cent, while regular mass emails had an open rate of just 3 per cent.  Email is the front- door for today’s threat groups. That’s why  governments around the world are improving the security of their email  systems to fend off these spear-phishing threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Public concerns&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;When  government employees use webmail for official business, they trade away  their security for convenience. The emails they receive are no longer  screened by cyber security solutions, which detect advanced targeted  email attacks before they reach the inbox. In addition, because people  typically retrieve their webmail in a browser, attackers have a larger  attack surface to exploit when carrying out their attacks. For example,  attackers can coax victims to click on a link to a website, which  delivers an exploit via Adobe Flash.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Webmail opens  the door to threats that would otherwise have been intercepted. When our  government employees use webmail for official business, they leave the  front door wide open to threats. One of the best steps we can take  towards improving our government’s cyber security defences is abandoning  public email services.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;The writer is a software architect at the cyber security firm FireEye&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame'&gt;https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-25T01:31:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi">
    <title>Encryption policy would have affected emails, operating systems, WiFi</title>
    <link>https://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi</link>
    <description>
        &lt;b&gt;Our email data would have to be stored. If we connect to a WiFi, that data would have to be stored, and that's plain ridiculous. There is a problem when the government tries to target citizens to ensure national security, said Pranesh Prakash, policy director at the Bangalore-based Centre for Internet and Society. &lt;/b&gt;
        &lt;p&gt;The article by Amrita Madhukalya was published in &lt;a class="external-link" href="http://www.dnaindia.com/india/report-encryption-policy-would-have-affected-emails-operating-systems-wifi-2127715"&gt;DNA&lt;/a&gt; on September 23, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The &lt;a href="http://www.dnaindia.com/topic/draft-national-policy"&gt;Draft National Policy&lt;/a&gt; on Encryption, withdrawn by the Department of Electronics and  Information Technology (DeiTY) after it created a furore on privacy  issues, would have had allowed the government access to any form of  digital data that required encryption. Not limited to just WhatsApp or  Viber data, it would have affected email services, WiFi, phone operating  systems, etc.&lt;/p&gt;
&lt;p&gt;"Our email data would have to be stored. If we connect to a WiFi,  that data would have to be stored, and that's plain ridiculous. There is  a problem when the government tries to target citizens to ensure  national security," said Pranesh Prakash, policy director at the  Bangalore-based Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;The government, criticised heavily for the policy, withdrew it on  Tuesday afternoon. It said that a new policy will be brought in its  place.&lt;/p&gt;
&lt;p&gt;Nikhil Pahwa of internet watchdog Medianama said that data about  normal day-to-day activities would have to be stored if the policy was  implemented. "The policy would have affected everyday business to  consumer data.&lt;br /&gt; This would mean that if a doctor or lawyer had your data digitised,  they will be open to access, and would have to be kept for at least 90  days," said Pahwa.&lt;/p&gt;
&lt;p&gt;However, he added that a robust encryption is needed. "It is believed that companies like Google, &lt;a href="http://www.dnaindia.com/topic/facebook"&gt;Facebook&lt;/a&gt; allow the NSA to access user data in the US, putting our personal  security, and the national security largely, at risk," said Pahwa.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi'&gt;https://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-25T01:23:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal">
    <title>Huge outcry forces India to backtrack on social media data proposal</title>
    <link>https://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal</link>
    <description>
        &lt;b&gt;Govt retracts move after strongly negative reaction to 90-day message-saving policy&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by &lt;a class="external-link" href="http://www.todayonline.com/chinaindia/india/huge-outcry-forces-india-backtrack-social-media-data-proposal?singlepage=true"&gt;Today&lt;/a&gt; on September 24, 2015. Pranesh Prakash has been quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Responding to a chorus of withering criticism, Indian officials have  withdrawn a draft policy on encryption that would have required users of  social media and messaging apps to save plain-text versions of their  messages for 90 days so they could be shared with the police.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  proposal, which many condemned as both draconian and impractical, came  as an embarrassment days before Prime Minister Narendra Modi travels to  Silicon Valley to try to attract investment and promote India as an  emerging market for digital technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr Modi is an avid user of social media and has mobilised large networks of online activists during his party’s campaigns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  government issued a statement on Tuesday saying the draft proposing  that users save messages for three months had been withdrawn, as  officials hurried to distance themselves from the idea.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I wish to  make it clear that it is just a draft and not the view of the  government,” said Mr Ravi Shankar Prasad, the Minister of Communications  and Information Technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet policy activists discovered  the draft on a government website late last week and began to lampoon it  online as “absurd”. One offered the example of an iPhone, which  automatically encrypts messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“They can’t intentionally want  people to copy and paste every message a person gets on their iPhone on  to another device,” said Mr Pranesh Prakash, a policy director at the  Center for Internet and Society in Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft, which was  put forward by a committee of unidentified experts in the Department of  Electronics and Information Technology, also overlooked the fact that  most Indians use mobile phones with very little storage space, said Mr  Nikhil Pahwa, the editor of MediaNama.com, which covers digital media  issues in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is incomprehensible how they would have  expected users to keep their messages in plain-text format,” he said.  “And I don’t think that anyone can argue that keeping data in a  plain-text format makes it secure.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An official in the  Communications Ministry, who spoke on the condition of anonymity because  he was not authorised to talk to the media, said the expert committee  had been convened to formulate a policy on the “phenomenal rise” in  encrypted communication over the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said the committee  had intended to require social media platforms and messaging apps, such  as WhatsApp and Viber, to save plain-text versions of messages and did  not intend to impose that burden on individual users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It was interpreted by the netizens as ‘you and I’,” the official said. He added that interpretation was misleading.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  that version of the requirement would also be “outrageous,” Mr Prakash  said. For example, WhatsApp uses “end-to-end” encryption and does not  save communications between users or have access to plain text, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr  Prakash said that as officials revised the proposal, the government  should reach out to “experts in cryptography and human rights”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This  is a very crucial combination of three rights: the right to security,  the right to freedom of expression, and the right to privacy,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  television, spokesmen for Mr Modi’s Bharatiya Janata Party (BJP) found  themselves debating their counterparts from the opposition Indian  National Congress Party, one of whom remarked that “tomorrow they will  start demanding that you videograph what has been going on in your  bedroom for the past 90 days.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The BJP’s national spokeswoman,  Shaina Nana Chudasama, responded with some exasperation. “I don’t know  why we have to have this hue and cry,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Our Prime  Minister believes in absolute freedom on social media. There is no  question of our trying to come down heavily on the freedom of the public  at large.” THE NEW YORK TIMES&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal'&gt;https://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-01T01:31:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-september-22-2015-bowing-to-public-pressure-govt-withdraws-draft-encryption-policy">
    <title>Bowing to public pressure, govt withdraws draft encryption policy </title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-september-22-2015-bowing-to-public-pressure-govt-withdraws-draft-encryption-policy</link>
    <description>
        &lt;b&gt;Bowing to pressure from the public, the government on Tuesday withdrew a draft policy that sought to control secured online communication, including through mass-use social media and web applications such as WhatsApp and Twitter.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by the &lt;a class="external-link" href="http://www.hindustantimes.com/tech/bowing-to-public-pressure-govt-withdraws-draft-encryption-policy/story-kOVNjpFZIuzyuQZGqv4JSN.html;jsessionid=C7FD668754FD1868D4BFE90D6D3C98B5"&gt;Hindustan Times&lt;/a&gt; on September 22, 2015. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Communications and information technology minister Ravi Shankar  Prasad announced the government’s decision at a news conference, saying  the draft National Encryption Policy will be reviewed before it is again  presented to the public for their suggestions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I read the draft. I understand that the manner in which it is  written can lead to misconceptions. I have asked for the draft policy to  be withdrawn and reworded,” Prasad said. He said the draft would be  re-released, but did not say when it would be made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Experts had framed a draft policy...This draft policy is not the  government’s final view,” he added. “There were concerns in some  quarters. There were some words (in the draft policy) that caused  concern.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft will be reviewed and experts will be asked to specify to  whom the policy will be applicable, Prasad said. He did not say when the  new draft will be made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those using social media platforms and web applications fell outside the scope of an encryption policy, Prasad said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several countries have felt the need for an encryption policy because  of the boom in e-commerce and e-governance, he remarked. “Cyber space  interactions are on the rise. There are concerns about security. We need  a sound encryption policy,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before Prasad announced the withdrawal of the draft policy, the  government had issued an addendum early on Tuesday to keep social media  and web applications like WhatsApp, Twitter and Facebook out of its  purview.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secure banking transactions and password protected e-commerce  businesses too will be kept out of the ambit of the proposed policy, the  addendum said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The climb down by the government came following a storm of protests  from users who objected to any stringent state controls on the use of  email, social media accounts and apps.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the original draft, users of apps such as WhatsApp and  Snapchat would be required to save all messages for up to 90 days and be  able to produce them if asked by authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts told Hindustan Times the draft policy, if implemented in its  current form, could compromise the privacy of users and hamper the  functioning of several multi-national service providers in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nikhil Pahwa, editor of the MediaNama website that tracks cyber  issues and tech news, said there were several problems even with the  addendum to the draft policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The usage of the phrase ‘currently in use’ renders the policy vague:  Firstly, when is ‘currently’?” he questioned in a post on his website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Will a new service that uses a different kind of encryption to  protect its users, still be covered? Why should users be ‘restricted to  encryption currently in use’? Why should services like Whatsapp,  Facebook and Twitter define our security standards?” said Pahwa, who  also volunteers for savetheinternet.in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director for The Centre for Internet and  Society, tweeted that even the addendum “does not clarify anything, but  further muddles the encryption policy”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media users called the draft “draconian” and “delusional”, and  Congress leader Manish Tewari too attacked the Union government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The encryption policy (draft) is a snooping and spying orgy. After  net chats, the government may want you to keep a video record of what  you do in your bedroom for 90 days,” the Congress spokesperson told  reporters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft policy had been posted online last week to seek suggestions from the public.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-september-22-2015-bowing-to-public-pressure-govt-withdraws-draft-encryption-policy'&gt;https://cis-india.org/internet-governance/news/hindustan-times-september-22-2015-bowing-to-public-pressure-govt-withdraws-draft-encryption-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Encryption Policy</dc:subject>
    

   <dc:date>2015-10-01T02:15:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash">
    <title>India encryption policy draft faces backlash</title>
    <link>https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash</link>
    <description>
        &lt;b&gt;The department of information technology is facing a backlash from industry experts, Internet watchers and netizens on its draft of the National Encryption Policy that it recently made public.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Moulishree Srivastava was published in &lt;a class="external-link" href="http://www.livemint.com/Industry/3KK1XWztlnFyR10dffTWMM/India-encryption-policy-draft-faces-backlash.html"&gt;Livemint&lt;/a&gt; on September 22, 2015. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While the draft policy aims to enable a secure environment for both information and transactions in cyberspace for individuals, businesses and government, experts are concerned over privacy and outdated standards prescribed in the policy, among other things.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy puts the onus to produce encrypted information when demanded by government agencies on Indian citizens as well as on all the online service providers including instant messaging and e-commerce services that use encryption technology (to convert plain information to an unreadable format).&lt;br /&gt;&lt;br /&gt;The department put the policy online late last week and it came on the radar of industry watchers and experts over the weekend. The policy is open for comments from the public till 16 October.&lt;br /&gt;&lt;br /&gt;The policy, in its current form, is poorly drafted and the measures listed in it make Indian information systems vulnerable to cyber attacks, experts say.&lt;br /&gt;&lt;br /&gt;For instance, the policy has mandated the use of specific standards and algorithms for encryption.&lt;br /&gt;&lt;br /&gt;Encryption can be compared to the process of translating information in one language into a foreign language.&lt;br /&gt;&lt;br /&gt;“Specifying certain algorithms to be used for encryption, and restricting the key sizes is same as saying that you are only allowed to communicate using a language from a given set of government-specified languages and no other language can be used,” said Pranesh Prakash, policy director at the Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;However, the ones mentioned in the draft policy are outdated and unsafe to use, experts say. Another thing that weakens the security considerably is the req-uirement for businesses and citizens to keep the information (that was encrypted and sent over) for 90 days, in case law en-forcement agencies demand it. But that also means that for those 90 days, cyber criminals, too, can access it, warn experts.&lt;br /&gt;&lt;br /&gt;Another big gap in the policy is that it leaves out “sensitive departments/agencies of the government designated for performing sensitive and strategic roles”, said Prakash.&lt;br /&gt;&lt;br /&gt;“When the policy states its mission to be the enhancing of confidentiality of information and of security of critical networks by laying out information security best practices, how does it make any sense to keep sensitive or strategic government department and agencies outside its purview?” he asked. “After all, these are the organizations that most need to be kept secure to enhance national cybersecurity.”&lt;br /&gt;&lt;br /&gt;The draft is also ambiguous on which online services—be it shopping online or accessing email—people can use (in compliance with the law) and which online service providers will have to be registered with the government.&lt;br /&gt;&lt;br /&gt;The policy states that “service providers located within and outside India, using encryption technology for providing any type of services in India, must enter into an agreement with the government for providing such services in India”. Users can only use the services that are registered with the government.&lt;br /&gt;&lt;br /&gt;“This is the first time when users are actually being told what are the things they can and cannot do,” said Prakash.&lt;br /&gt;&lt;br /&gt;“The government must take note that the knowledge and expertise of common citizens may be inadequate to understand the nuances of encryption,” said cyber law expert Na Vijayashankar on his blog. “For example, if a citizen uses a service available on the Internet which uses, say, a higher level of encryption than what is appro-ved, then this policy may make him liable for the violation.”&lt;br /&gt;&lt;br /&gt;The problem is enhanced because all online services use some encryption technology. This means that practically all online activity will fall under this new policy.&lt;br /&gt;&lt;br /&gt;For instance, companies like Apple or Microsoft use encryption technologies at various levels of their operating systems; e-commerce services like Flipkart, Amazon and Snapdeal; web browsers like Mozilla Firefox and Google Chrome and mail services like Gmail, Yahoo and Rediff may be required to register with the government. The only way they may escape this requirement is if there is an exemption for products that are in use at a large scale. Network security service providers like Cisco Inc. will also need to comply. (Cisco declined to respond to a query.) Snapdeal said it is still examining the draft policy, while Amazon, Google, Microsoft did not reply to emails sent by Mint. Yahoo said its spokesperson was unavailable.&lt;br /&gt;&lt;br /&gt;One clause that is drawing a lot of ire from industry veterans and technology enthusiasts requires individual users and businesses to store all information that was sent in an encrypted form for 90 days from the date of transaction. The users would also be required to reproduce the plain text and the encrypted text, if demanded by law enforcement agencies.&lt;br /&gt;&lt;br /&gt;The draft policy also overlooks the privacy concerns of citizens and businesses. “It is clearly a violation of freedom of speech. A large part of the policy states how the government can interfere with users, like, by demanding their private messages. The policy is anti-privacy law,” said Prakash. “Privacy and security go hand in hand. So, as this policy weakens the security of the information, it puts the privacy at greater risk.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash'&gt;https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-09-22T01:59:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp">
    <title>Peering behind the veil of ICANN’s DIDP (I)</title>
    <link>https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp</link>
    <description>
        &lt;b&gt;One of the key elements of the process of enhancing democracy and furthering transparency in any institution which holds power is open access to information for all the stakeholders. This is critical to ensure that there is accountability for the actions of those in charge of a body which utilises public funds and carries out functions in the public interest. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;As the body which “&lt;i&gt;...coordinates the Internet Assigned Numbers Authority (IANA) functions, which are key technical services critical to the continued operations of the Internet's underlying address book, the Domain Name System (DNS)&lt;/i&gt;”&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the centrality of ICANN in regulating the Internet (a public good if there ever was one) makes it vital that ICANN’s decision-making processes, financial flows, and operations are open to public scrutiny. ICANN itself echoes the same belief, and upholds “...&lt;i&gt;a proven commitment to accountability and transparency in all of its practices&lt;/i&gt;”&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which is captured in their By-Laws and &lt;a href="https://www.icann.org/resources/pages/affirmation-of-commitments-2009-09-30-en"&gt;Affirmation of Commitments&lt;/a&gt;. In furtherance of this, ICANN has created its own &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;Documentary Information Disclosure Policy&lt;/a&gt;, where it promises to “...&lt;i&gt;ensure that information contained in &lt;b&gt;documents concerning ICANN's operational activities&lt;/b&gt;, and within ICANN's possession, custody, or control, is &lt;b&gt;made available to the public &lt;/b&gt;unless there is a compelling reason for confidentiality.&lt;/i&gt;”&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN has a vast array of documents that are already in the public domain, listed &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;here&lt;/a&gt;. These include annual reports, budgets, registry reports, speeches, operating plans, correspondence, etc. However, their Documentary Information Disclosure Policy falls short of meeting international standards for information disclosure. In this piece, I have focused on an examination of their defined conditions for non-disclosure of information, which seem to undercut the entire process of transparency that the DIDP process aims towards upholding. The obvious comparison that comes to mind is with the right to information laws that governments the world over have enacted in furtherance of democracy. While ICANN cannot be equated to a democratically elected government, it nonetheless does exercise sufficient regulatory power of the functioning of the Internet for it to owe a similar degree of information to all the stakeholders in the internet community. In this piece, I have made an examination of ICANN’s conditions for non-disclosure, and compared it to the analogous exclusions in India’s Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;ICANN’ꜱ Defined Conditions for Non-Disclosure versus Exclusions in Indian Law :&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN, in its DIDP policy identifies a lengthy list of conditions as being sufficient grounds for non-disclosure of information. One of the most important indicators of a strong transparency law is said to be &lt;b&gt;&lt;i&gt;minimum exclusions&lt;/i&gt;&lt;/b&gt;.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, as seen from the table below, ICANN’s exclusions are extensive and vast, and this has been a barrier in the way of free flow of information. An analysis of their responses to various DIDP requests (available &lt;a href="https://www.icann.org/resources/pages/governance/transparency-en"&gt;here&lt;/a&gt;) shows that the conditions for non-disclosure have been invoked in over 50 of the 85 requests responded to (as of 11.09.2015); i.e., over two-thirds of the requests that ICANN receives are subjected to the non-disclosure policies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast, an analysis of India’s Right to Information Act, considered to be among the better drafted transparency laws of the world, reveals a much narrower list of exclusions that come in the way of a citizen obtaining any kind of information sought. The table below compares the two lists:&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;No.&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;ICANN&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;India&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Analysis&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information provided by or to a government or international organization&lt;/b&gt; which was to be kept confidential or would materially affect ICANN’s equation with the concerned body.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information, disclosure of which would prejudicially affect the &lt;b&gt;sovereignty and integrity of India&lt;/b&gt;, the security, "strategic, scientific or economic" interests of the State, relation with foreign State or lead to incitement of an offense&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;/ information &lt;b&gt;received in confidence from foreign government&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The threshold for both the bodies is fairly similar for this exclusion.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internal (staff/Board) information &lt;/b&gt;that, if disclosed, would or would be likely to compromise the integrity of ICANN's deliberative and decision-making process&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cabinet papers including records of deliberations&lt;/b&gt; of the Council of Ministers, Secretaries and other officers, provided that such decisions the reasons thereof, and the material on the basis of which the decisions were taken &lt;b&gt;shall be made public after the decision has been taken&lt;/b&gt;, and the matter is complete, or over (unless subject to these exemptions)&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The Indian law is far more transparent as it ultimately allows for the records of internal deliberation to be made public after the decision is taken.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information related to the &lt;b&gt;deliberative and decision-making process between ICANN, its constituents, and/or other entities with which ICANN cooperates &lt;/b&gt;that, if disclosed, would or would be likely to compromise the integrity of the deliberative and decision-making process&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No similar provision in Indian Law.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is an additional restriction that ICANN introduces in addition to the one above, which in itself is quite broad.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Records relating to an individual's personal information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information which relates to &lt;b&gt;personal information &lt;/b&gt;the disclosure of which has no relationship to any public activity or interest, or which would cause unwarranted invasion of the privacy of the individual (but it is also provided that the information which cannot be denied to the Parliament or a State Legislature shall not be denied by this exemption);&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Again, the Indian law contains a proviso for information with “&lt;i&gt;relationship to any public activity or interest&lt;/i&gt;”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Proceedings of internal appeal mechanisms and investigations.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information which has been &lt;b&gt;expressly forbidden to be published by any court of law &lt;/b&gt;or tribunal or the disclosure of which may constitute contempt of court;&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;While ICANN prohibits the disclosure of all proceedings, in India, the exemption is only to the limited extent of information that the court prohibits from being made public.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information provided to ICANN by a party that, if disclosed, would or would be likely to &lt;b&gt;materially prejudice the commercial interests, financial interests, and/or competitive position &lt;/b&gt;of such party or was provided to ICANN pursuant to a nondisclosure agreement or nondisclosure provision within an agreement.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information including &lt;b&gt;commercial confidence, trade secrets &lt;/b&gt;or intellectual property, the &lt;b&gt;disclosure of which would harm the competitive position of a third party&lt;/b&gt;, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information;&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is fairly similar for both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;7.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Confidential business information &lt;/b&gt;and/or internal policies and procedures.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No similar provision in Indian Law. This is encapsulated in the abovementioned provision&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is fairly similar in both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;8.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information that, if disclosed, would or would be likely to &lt;b&gt;endanger the life, health, or safety &lt;/b&gt;of any individual or materially prejudice the administration of justice.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information, the disclosure of which would &lt;b&gt;endanger the life or physical safety of any person &lt;/b&gt;or identify the source of information or assistance given in confidence for law enforcement or security purposes;&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This is fairly similar for both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information subject to any kind of privilege&lt;/b&gt;, which might prejudice any investigation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information, the disclosure of which would cause a &lt;b&gt;breach of privilege of Parliament &lt;/b&gt;or the State Legislature&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;/Information which would &lt;b&gt;impede the process of investigation or apprehension or prosecution of offenders&lt;/b&gt;;&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This is fairly similar in both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Drafts of all correspondence, reports, documents, agreements, contracts, emails, or any other forms of communication.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in Indian Law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This exclusion is not present in Indian law, and it is extremely broadly worded, coming in the way of full transparency.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information that relates in any way to the &lt;b&gt;security and stability of the Internet&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in Indian Law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is perhaps necessary to ICANN’s role as the IANA Functions Operator. However, given the large public interest in this matter, there should be some proviso to make information in this regard available to the public as well.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Trade secrets and commercial and financial information &lt;/b&gt;not publicly disclosed by ICANN.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information including &lt;b&gt;commercial confidence, trade secrets &lt;/b&gt;or intellectual property, the disclosure of which would harm the competitive position of a third party, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information;&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This is fairly similar in both cases.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information requests:&lt;/p&gt;
&lt;p&gt;● which are not reasonable;&lt;/p&gt;
&lt;p&gt;● which are excessive or overly burdensome&lt;/p&gt;
&lt;p&gt;● complying with which is not feasible&lt;/p&gt;
&lt;p&gt;● which are made with an abusive or vexatious purpose or by a vexatious or querulous individual.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in Indian Law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Of all the DIDP exclusions, this is the one which is most loosely worded. The terms in this clause are not clearly defined, and it can effectively be used to deflect any request sought from ICANN because of its extreme subjectivity. What amounts to ‘reasonable’? Whom is the process going to ‘burden’? What lens does ICANN use to define a ‘vexatious’ purpose? Where do we look for answers?&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in ICANN’s DIDP.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information available to a person in his &lt;b&gt;fiduciary relationship&lt;/b&gt;, unless the competent authority is satisfied that the larger public interest warrants the disclosure of such information;&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in ICANN’s DIDP.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information which providing access to would involve an &lt;b&gt;infringement of copyright subsisting in a person other than the State&lt;/b&gt;.&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Thus, the net cast by the DIDP exclusions policy is more vast than even than that of a democratic state’s transparency law. Clearly, the exclusions above have effectively allowed ICANN to dodge answers to most of the requests floating its way. One can only hope that ICANN realises that these exclusions come in the way of the transparency that they are so committed to, and does away with this unreasonably wide range on the road to the IANA Transition.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/resources/pages/welcome-2012-02-25-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/resources/accountability&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/resources/pages/didp-2012-02-25-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Shekhar Singh, &lt;i&gt;India: Grassroot Initiatives&lt;/i&gt; in Tʜᴇ Rɪɢʜᴛ ᴛᴏ Kɴᴏᴡ 19, 44 (Ann Florin ed., 2007)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In a proviso, ICANN’s DIDP states that all these exemptions can be overridden if the larger public interest is higher. However, this has not yet been reflected in their responses to any DIDP requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(a), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(f), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(i), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(j), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(b), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section (1)(d), Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(g), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(c), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(h), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section (1)(d), Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(e), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 9, Right to Information Act, 2005.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp'&gt;https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padmini Baruah</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-15T02:42:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore">
    <title>Sustainable Smart Cities India Conference 2015, Bangalore</title>
    <link>https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore</link>
    <description>
        &lt;b&gt;Nispana Innovative Platforms organized a Sustainable Smart Cities India Conference 2015, in Bangalore on 3rd and 4th September, 2015. The event saw participation from people across various sectors including Government Representatives from Ministries, Municipalities, Regulatory Authorities, as well as Project Management Companies, Engineers, Architects, Consultants, Handpicked Technology Solution Providers and Researchers. National and International experts and stakeholders were also present to discuss the opportunities and challenges in creating smart and responsible cities as well as citizens, and creating a roadmap for converting the smart cities vision into a reality that is best suited for India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The objective of the conference was to discuss the meaning of a smart city, the promises made, the challenges and possible solutions for implementation of ideas by transforming Indian Cities towards a Sustainable and Smart Future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Smart Cities Mission&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering the pace of rapid urbanization in India, it has been estimated that the urban population would rise by more than 400 million people by the year 2050&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; and would contribute nearly 75% to India’s GDP by the year 2030. It has been realized that to foster such growth, well planned cities are of utmost importance. For this, the Indian government has come up with a Smart Cities initiative to drive economic growth and improve the quality of life of people by enabling local area development and harnessing technology, especially technology that leads to Smart outcomes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially, the Mission aims to cover 100 cities across the countries (which have been shortlisted on the basis of a Smart Cities Proposal prepared by every city) and its duration will be five years (FY2015-16 to FY2019-20). The Mission may be continued thereafter in the light of an evaluation to be done by the Ministry of Urban Development (MoUD) and incorporating the learnings into the Mission. This initiative aims to focus on area-based development in the form of redevelopment, or developing new areas (Greenfield) to accommodate the growing urban population and ensure comprehensive planning to improve quality of life, create employment and enhance incomes for all, especially the poor and the disadvantaged.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is being done?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Smart City Mission will be operated as a Centrally Sponsored Scheme (CSS) and the Central Government proposes to give financial support to the Mission to the extent of Rs. 48,000 crores over five years i.e. on an average Rs. 100 crore per city per year.The Government has come up with 2 missions:Atal Mission for Rejuvenation and Urban Transformation (AMRUT) and Smart Cities Mission for the purpose of achieving urban transformation.The vision is to preserve India’s traditional architecture, culture &amp;amp; ethnicity while implementing modern technology to make cities livable, use resources in a sustainable manner and create an inclusive environment. Additionally, Foreign Direct Investment regulations have been relaxed to invite foreign capital and help into the Smart City Mission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is a Smart City?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the two-day conference, various speakers shared a common sentiment that the Governments’ mission does not clearly define what encompasses the idea of a Smart City. There is no universally accepted definition of a Smart City and its conceptualization varies from city to city and country to country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A global consensus on the idea of a smart city is a city which is livable, sustainable and inclusive. Hence, it would mean a city which has mobility, healthcare, smart infrastructure, smart people, traffic maintenance, efficient waste resource management, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, there is a global debate at United Nations regarding developmental goals. One of these goals is gender equality which is very important for the smart city initiative. According to this, a smart city must be such where the women have a life free from violence, must be made to participate and are economically empowered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Promises&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The promises of the Smart City mission include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Make a sustainable future, reduce carbon footprint, adequate water supply, assured electricity supply, proper sanitation, including solid waste management, efficient urban mobility and public transport, affordable housing especially for the poor, robust IT connectivity and digitalization, good governance, especially e-Governance and citizen participation, sustainable environment, safety and security of citizens, particularly women, children and the elderly, and health and education.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The vision is to preserve country’s traditional architecture, culture &amp;amp; ethnicity while implementing modern technology. It was discussed how the Smart City Mission is currently attracting global investment, will create new job opportunities, improve communications and infrastructure, decrease pollution and ultimately improve the quality of living.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Challenges&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main challenges for implementation of these objectives are with respect to housing, dealing&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;with existing cities and adopting the idea of retro-fitting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, another challenge is that of eradicating urban poverty, controlling environment degradation, formulating a fool-proof plan, proper waste management mechanism, widening roads but not at the cost of pedestrians and cyclist and building cities which are inclusive and cater to the needs of women, children and disabled people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the top challenges will include devising a fool-proof plan to develop smart cities, meaningful public-private partnership, increasing the renewable energy, water supply, effective waste management, traffic management, meeting power demand, urban mobility, ICT connectivity, e-governance, etc., while preparing for new threats that can emerge with implementation of these new technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What needs to be done?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following suggestions were made by the experts to successfully implement government’s vision of creating successful smart cities in India.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Focus on the 4 P’s: Public-Private-People Partnership since people very much form a part of the cities.&lt;/li&gt;
&lt;li&gt;Integration of organizations, government bodies, and the citizens. The Government can opt for a sentiment analysis.&lt;/li&gt;
&lt;li&gt;Active participation by state governments since Land is a state subject under the Constitution. There must be a detailed framework to monitor the progress and the responsibilities must be clearly demarcated.&lt;/li&gt;
&lt;li&gt;Detailed plans, policies and guidelines&lt;/li&gt;
&lt;li&gt;Strengthen big data initiatives&lt;/li&gt;
&lt;li&gt;Resource maximization&lt;/li&gt;
&lt;li&gt;Make citizens smart by informing them and creating awareness&lt;/li&gt;
&lt;li&gt;Need for competent people to run the projects&lt;/li&gt;
&lt;li&gt;Visionary leadership&lt;/li&gt;
&lt;li&gt;Create flexible and shared spaces for community development.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National/International case studies&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several national and international case studies were discussed to list down practical challenges to enable the selected Indian cities learn from their mistakes or include successful schemes in their planning from its inception.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Amsterdam Smart City: It is said to be a global village which was transformed into a smart city by involving the people. They took views of the citizens to make the plan a success. The role of big data and open data was highly emphasized. Also, it was suggested that there must be alignment with respect to responsibilities with the central, state and district government to avoid overlap of functions. The city adopted smart grid integration to make intelligent infrastructure and subsidized initiatives to make the city livable.&lt;/li&gt;
&lt;li&gt;GIFT City, Gujarat: This is an ICT based sustainable city which is a Greenfield development. It is strategically situated. One of the major features of the City is a utility tunnel for providing repair services and the top of the tunnel can be utilized as a walking/jogging track. The city has smart fire safety measures, wide roads to control traffic, smart regulations.&lt;/li&gt;
&lt;li&gt;TEL AVIV Smart City, Israel: It has been named as the Mediterranean cool city with young and free spirted people. The city comprises of creative class with 3 T’s-talent, technology and tolerance. The city welcomes startups and focuses on G2G, G2C and C2C initiatives by adopting technologically equipped initiatives for effective governance and community building programmes.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event saw participation from people across various sectors including Government Representatives of Ministries, Municipalities, Regulatory Authorities, as well as Project Management Companies, Engineers, Architects, Consultants, Handpicked Technology Solution Providers and Researchers.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Foundation for Futuristic Cities:&lt;/b&gt; The conference saw participation from this think tank based out of Hyderabad working on establishing vibrant smart cities for a vibrant India. They are currently working on developing a "Smart City Protocol" for Indian cities collaborating with Technology, Government and Corporate partners by making a framework for Smart Cities, Big Data and predictive analytics for safe cities, City Sentiment Analysis, Situation Awareness Tools and mobile Apps for better city life by way of Hackathons and Devthons.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Centre for SMART cities, Bangalore:&lt;/b&gt; This is a research organization which aims to address the challenge of collaborating and sharing knowledge, resources and best practices that exist both in the private sector and governments/municipal bodies in a usable form and format.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;BDP – India (Studio Leader – Urbanism): &lt;/b&gt;The Organization is based out of Delhi and is involved in providing services relating to master planning, urbanism, design and landscape design. The team includes interior designers, engineers, urbanists, sustainability experts, lighting designers, etc. The vision is to help build and create high quality, effective and inspiring built spaces.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;UN Women: &lt;/b&gt;It is a United Nations Organization working on gender equality, women empowerment and elimination of discrimination. They strive to strengthen rights of women by working with women, men, feminists, women’s networks, governments, local authorities and civil society to create national strategies to advance gender equality in line with national and international priorities. The UN negotiated the 2030 Agenda for Sustainable Development in August 2015 (which would be formally adopted by World leaders in September 2015) and it feature 17 sustainable development goals, one of them being achievement of gender equality and empowerment of all women and girls.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Elematic India Pvt. Ltd.: &lt;/b&gt;The Company is a leading supplier of precast concrete technology worldwide providing smart solutions for concrete buildings to help enable build smart cities with safe infrastructure.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event discussed in great detail about what a smart city would look like in a country like India where every city has different demographics, needs and resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Participants had a mutual understanding that a city is not gauged by its length and width, but by the broadness of its vision and height of its dream. The initiative of creating smart cities would echo across the country as a whole and would not be limited to the urban centers. Hence, the plan must be inclusive in implementation and right from its inception, the people and their needs must be given due consideration to make it a success. The issue of the road ahead was resonating in the minds of many, as to how would this exactly happen. Hence, the first step, as was suggested by the experts, was to involve the citizens by primarily informing them, taking their suggestions and planning the project for every city accordingly. While focusing on cities which would be made better by human ingenuity and technology, along with building mechanism for housing, commerce, transportation and utilities, it must not be forgotten that technology is timely, but culture is timeless. The cities must not be faceless and community space must be built with walkable spaces with smart utilization of limited resources. Also, it must be ensured that the cities do not cater to the needs of the elite and skilled population, but also the less privileged community. Adequate urban mapping must be done to ensure placement for community facilities, such as restrooms, trash bins, and information kiosks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A story shared from personal experience by an expert Architect in building Green infrastructure was highly instrumental in setting the tone of the conference and is bound to stay with many of the participants. The son of the Architect, a small child from Baroda left his father speechless when he questioned him about the absence of butterflies from the Big City of Mumbai since he used to play with butterflies every morning in his hometown in Gujarat. The incident was genuinely thought provoking and left every architect, government representative and engineer thinking that before they step on to build a smart cities with technologically equipped infrastructure and utilities - can we, as a country, come together and ensure to build a smart city with butterflies? Can we pay equal attention to sustainability, environment and requirements of a community in the smart city that is envisioned by the Government to make the city livable and inclusive?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions that I, as a participant, am left with are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Building a Greenfield project is comparatively easier than upgrading the existing cities into Smart ones, which requires planning and optimum utilization of resources. The role of local bodies needs to be strengthened which would primarily require skilled workforce, beginning from planning to execution. Therefore, what must be done to make the current cities “Smarter” and how encourage and fund ordinary citizens to redefine and prioritize local needs?&lt;/li&gt;
&lt;li&gt;The conference touched upon the need for a well-planned policy framework to govern the smart cities; however, what was missing was a discussion on the kind of policies that would be required for every city to ensure governance and monitor the operations. Chalking out well thought of urban policies is the first step towards implementation of the Project and requires deliberation in this regard.&lt;/li&gt;
&lt;li&gt;The Government plans seem to cater to the needs of a handful of sections of the society and must focus on safety of women, chalk out initiatives to build basic utilities like public toilets, plan the infrastructure keeping in mind the disabled individuals, etc. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;This is of paramount importance since it is necessary for the Government to consider who would be the potential inhabitants of these future smart cities and what would be their particular needs. Before the cities are made better by use of technology, there is a requirement of more toilets as a basic utility. Thus, instead of focusing on technological advancement as the sole foundation to make lives of the people easy, the cities must have provision of utilities which are accessible to develop livable smart cities. Hence, what measures would the Government and other bodies involved in the plan take to ensure that the urban enclaves would not oversee the under privileged class?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another issue that went unnoticed during the two-day event was pertaining to the Fundamental Rights of individuals within the city. For example, the right of privacy, right to access services and utilities, right to security, etc. These basic rights must be given due recognition by the smart city developers to uphold the spirit of these internationally accepted Human Rights principles. Therefore, it is important to ask how these future cities are going to address the rights of its people in the cities?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from plans of working on waste management, another important factor that must not be overlooked is sustainability in terms of maximization of the available resources in the best possible ways and techniques to be adopted to stop the fast paced degradation of the environment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The conference could suggest more solutions to adopt measures like rain water harvesting, better sewage management in the existing cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, the importance of big data in building the smart cities was emphasized by many experts. However, the question of regulation of data being generated and released was not talked about. Use of big data analytics involves massive streaming of data which required regulation and control over its use and generation to ensure such information is not misutilised in any way. In such a scenario, how would these cities regulate and govern big data techniques to make the infrastructure and utilities technologically efficient on one hand, but also to use the large data sets in a monitored fashion on the other?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An answer to these crucial issues and questions would have brought about a lot of clarity in minds of all the officials, planners and the potential residents of the Smart Cities in India.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; 2014 revision of the World Urbanization Prospects, United Nations, Department of Economic and Social Affairs, July 2014, Available at : http://www.un.org/en/development/desa/publications/2014-revision-world-urbanization-prospects.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Smart Cities, Mission Statement and Guidelines, Ministry of Urban Development, Government of India, June 2015, Available at : http://smartcities.gov.in/writereaddata/SmartCityGuidelines.pdf&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore'&gt;https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-21T02:24:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing">
    <title>Outrage before sharing</title>
    <link>https://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing</link>
    <description>
        &lt;b&gt;Has the social media converted people into a lynch mob that seeks out justice and passes judgement instantly, without bothering to hear both sides of the story? &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nikhil Varma was &lt;a class="external-link" href="http://m.thehindu.com/features/metroplus/outrage-before-sharing/article7633402.ece"&gt;published in the Hindu on September 9, 2015&lt;/a&gt;. Rohini Lakshané was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Internet has changed the way we communicate in more ways than we can  imagine. Apart from being a medium to share pictures and updates with  family and friends, social media has also become an arena where  political debates are a commonplace and people are quick to make  judgements. The social media space has become one where superlatives are  commonly used and videos or conversations about inappropriate behaviour  or even a tweet or Facebook post has a tendency to go viral and  snowball into a shaming of the individual or organisation in question,  without bothering to hear out the other side of the story. Outraging can  be over anything, from the faults of the Government, to lay people who  sometimes find themselves the subject of an online shaming campaign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, an FB user put up pictures of a person, who she claimed  misbehaved with her on a street in Delhi. Within a few hours, the man’s  picture went viral and he was arrested by the police, even as he was  called names and abused on social media networks. A few days later,  eyewitness accounts corroborated the man’s account of the incident. The  response online now put the girl at fault and blamed her for  politicising the issue. The initial response to the video of the Rohtak  sisters bashing up alleged molesters also saw the outrage shifting  sides.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How does one deal with people making judgements with a click of a  button? Does online shaming dent the chances of people getting justice  in genuine cases of assault?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rohini Lakshané, a researcher at the Centre for Internet and Society  says, “Online, public shaming is a useful and often effective strategy  for calling out unacceptable behaviour when recourse to other remedies  is tedious, time-consuming, or non-existent. Its flipside is that  shaming online could lead to mob justice or a witch-hunt. The onus  should be on the viewers or readers of such an act of shaming to not  take the law into their own hands and on the news media to do their  basic duty of checking facts before publishing or broadcasting  anything.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She adds, “People use social networking sites, among other things, as  verandas where they can gather gossip, and talk about their interests.  If people jumping the gun and being judgemental offline isn’t a cause  for concern, I don’t see why it should be when it happens online.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On checks, Rohini contends, “They would not be in the interest of free  speech. It would, of course, make a difference if social media users  paused to think.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;V. Shakti, Social Media and Branding Professional, points out that the  mass adoption of social media platforms has had positive and negative  effects. “It has ensured that anyone can reach out and get any  information. The flip side is that this power to reach millions needs to  be handled with care and responsibility. The Jasleen Kaur incident is a  glaring reflection. Such is the mindset of people online that anyone  who is shamed is assumed guilty and derided. Sometimes the shaming does  permanent damage to the target and the effects are life-long. The minute  Jasleen posted a picture online, even the media jumped in calling the  guy a ‘pervert’, if this were some other country, they would be sued. We  need to understand that un-shaming is not an option and hence be  careful when throwing mud at someone online. Remember, it could be you  tomorrow. Think, verify and then act. Like I always say, there are three  sides to every story - yours, mine and the truth.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For psychiatrist and Integrative medicine specialist Shyam Bhatt, online  shaming is a combination of a sense of mob justice and the feeling of  participating in a cause. “It is easy to sign up for a cause online, you  can click share and feel good about yourself. People also tend to get  swayed by what their friend circles are talking about.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media user Praveen Rao feels an attempt to feel involved with causes is responsible for this phenomenon.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is important for people to check the authenticity and wait for a  clear picture to emerge before talking about something. However, in the  rush to appear clued in, people tend to share anything that goes viral,  without pausing to think if someone’s life could be ruined. It is a good  tool to call out genuine cases of misbehaviour and assault, but mob  justice should be avoided.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing'&gt;https://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-20T17:08:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-request-12-revenues">
    <title>DIDP Request #12: Revenues</title>
    <link>https://cis-india.org/internet-governance/blog/didp-request-12-revenues</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) sought information from ICANN on their revenue streams by sending them a second request under their Documentary Information Disclosure Policy. This request and their response have been described in this blog post.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;CIS Request&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;22 July 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Cherine Chalaby, Chair, Finance Committee of the Board&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Xavier Calvez, Chief Financial Officer&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Samiran Gupta, ICANN India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All other members of Staff involved in accounting and financial tasks&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Sub: Raw data with respect to granular income/revenue statements of ICANN from 1999-2011&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We  would  like  to  thank  ICAN  for  their  prompt  response  to  our  earlier  requests.  We appreciate that the granular Revenue Details  for FY14  have been  posted online.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; We also appreciate that a similar  document  has  been  posted  for  FY13.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And  we  hope  that  one  for  FY12  would  be  posted soon, as noted by you in your Response to our Request No. 20141222-1.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As also noted by you in the same request, similar reports cannot be prepared for FY99 to  FY11 since “[i]t would be extremely time consuming and overly burdensome to cull through the raw data in order to compile the reports for the prior years”.&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, it was also mentioned that the “relevant information is available in other public available documents”.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, we  would like to request  for the raw  data for years FY99 to FY11, for our research on accountability  and  transparency  mechanisms  in  Internet  governance,  specifically  of  ICANN. Additionally,  we  would  also  like  to  request  for  the links  to  such  public  documents where the information is available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We look forward to the receipt of this information within the stipulated period of 30 days. Please feel free to contact us in the event of any doubts regarding our queries. &lt;br /&gt;Thank you very much. &lt;br /&gt;Warm regards, &lt;br /&gt;Aditya Garg,  &lt;br /&gt;I Year, National Law University, Delhi &lt;br /&gt;For Centre for Internet &amp;amp; Society &lt;br /&gt;W: http://cis-india.org&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;ICANN Response&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;ICANN referred to our earlier DIDP request (see &lt;a href="https://www.icann.org/resources/pages/20141222-1-2015-01-22-en"&gt;here&lt;/a&gt;) where we had sought for a detailed report of their granular income and revenue statements from 1999-2014. They refused to disclose the data on grounds that it would be ‘time consuming’ and ‘overly burdensome’, which is a ground for refusal as per their exceptions to disclosure.&lt;/p&gt;
&lt;p&gt;Our request may be found &lt;a href="https://www.icann.org/en/system/files/files/didp-request-20150722-2-redacted-22jul15-en.pdf"&gt;here&lt;/a&gt;, and their response is linked to &lt;a href="https://www.icann.org/en/system/files/files/didp-response-20150722-2-21aug15-en.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See &lt;i&gt;FY14 Revenue Detail By Source&lt;/i&gt;, https://www.icann.org/en/system/files/files/fy2014-revenue-source-01may15-en.pdf.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. See FY13 Revenue Detail By Source, https://www.icann.org/en/system/files/files/fy2013-revenue-source-01may15-en.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See &lt;i&gt;Response to Documentary Information Disclosure Policy Request No. 20141222-1&lt;/i&gt;, https://www.icann.org/en/system/files/files/cis-response-21jan15-en.pdf.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;i&gt;Id&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. See &lt;i&gt;Response to Documentary Information Disclosure Policy Request No. 20141222-1&lt;/i&gt;, https://www.icann.org/en/system/files/files/cis-response-21jan15-en.pdf.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-request-12-revenues'&gt;https://cis-india.org/internet-governance/blog/didp-request-12-revenues&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aditya Garg</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-14T15:32:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-request-11-netmundial-principles">
    <title>DIDP Request #11: NETmundial Principles</title>
    <link>https://cis-india.org/internet-governance/blog/didp-request-11-netmundial-principles</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) followed up on the implementation of the NETmundial Principles that ICANN has been endorsing by sending them a second request under their Documentary Information Disclosure Policy. This request and their response have been described in this blog post. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;22 July 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Fadi Chehade, CEO and President&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Steve Crocker, Chairman of the Board&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Cherine Chalaby, Chair, Finance Committee of the Board&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Xavier Calvez, Chief Financial Officer&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Sub: Details of documents within ICANN regarding implementation of NETmundial Principles and documents modified within ICANN as a result of the same&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It  is  our  understanding  that  ICANN  is  one  of  the founding  members  of  the  NETmundial Initiative. And hence, it has been credited in the public forum for championing the Initiative.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr.  Fadi  Chehade,  CEO  and  President  of  ICANN,  has  maintained  that  it  is  time  for  the  global community to act and implement the Principles set forth in the initiative.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN itself, in response to one of our earlier requests, has acknowledged that "NETmundial Principles are high-level statements that permeate through the work of any entity –particularly a multistakeholder entity like ICANN."&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We,  therefore,  request  for  all  existing  documents  within  ICANN  which  represent  its  efforts  to implement  the  NETmundial  Principles  within  its  working.  Additionally, we would  also  want  to request  for  all  the  documents  which  were  modified  as  the  result  of  ICANN’s support of the NETmundial Initiave, highlighting the modification so made.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We look forward to the receipt of this information within the stipulated period of 30 days. Please feel free to contact us in the event of any doubts regarding our queries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thank you very much.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Warm regards,&lt;br /&gt;Aditya Garg,&lt;br /&gt;1st Year, National Law University, Delhi for Centre for Internet &amp;amp; Society&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;ICANN Response&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;ICANN in their response pointed to an earlier DIDP request that we had sent in, and they replied along the same lines. They brought to our attention that ICANN was not responsible for the implementation of the NETMundial Principles, despite it being one of the founding members of the Initiative. They reiterated their earlier statement of ICANN not being the “…&lt;i&gt;home for implementation of the NETmundial Principles or the evolution of multistakeholder participation in Internet governance.&lt;/i&gt;”  They have failed to provide us with documentary proof of the implementation of these principles, and have only pointed to statements which indicate a potential prospective adoption of said the initiative &lt;a href="#fn4" name="fr4"&gt;[4]; &lt;/a&gt;the responses have been near identical to those for the earlier DIDP request, which you can find &lt;a href="https://www.icann.org/en/system/files/files/cis-netmundial-response-27jan15-en.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, ICANN claims that the information we seek falls within the scope of the exceptions to disclosure they lay down, as it is not within their operational activities, an explanation that fails to satisfy us. As always, they have used the wide scope of their non-disclosure policy to avoid providing us with the requisite information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The request can be found &lt;a href="https://www.icann.org/en/system/files/files/didp-request-20150722-1-redacted-22jul15-en.pdf"&gt;here&lt;/a&gt;, and ICANN’s response has been linked &lt;a href="https://www.icann.org/en/system/files/files/didp-response-20150722-1-21aug15-en.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See McCarthy, I’m Begging You To Join, The Register (12 December 2014), http://www.theregister.co.uk/2014/12/12/im_begging_you_to_join_netmundial_initiative_gets_desperate/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. See NETmundial Initiative Goes Live, Gobal Internet Community Invited to Participate (Press Release), https://www.netmundial.org/press-release-1&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See Response to Documentary Information Disclosure Policy Request No. 20141228-1-NETmundial, https://www.icann.org/en/system/files/files/cis-netmundial-response-27jan15-en.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Such as Objective 4.3 of their Strategic Five Year Plan. “&lt;i&gt;Demonstrate leadership by implementing best practices in multistakeholder mechanisms within the distributed Internet governance ecosystem while encouraging all stakeholders to implement the principles endorsed at NETmundial&lt;/i&gt;” at https://www.icann.org/en/system/files/files/strategic-plan-2016-2020-10oct14-en.pdf&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-request-11-netmundial-principles'&gt;https://cis-india.org/internet-governance/blog/didp-request-11-netmundial-principles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aditya Garg</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-14T15:08:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-submission-on-ccwg-accountability-2nd-draft-proposal-on-work-stream-1-recommendations">
    <title>CIS Submission on CCWG-Accountability 2nd Draft Proposal on Work Stream 1 Recommendations</title>
    <link>https://cis-india.org/internet-governance/blog/cis-submission-on-ccwg-accountability-2nd-draft-proposal-on-work-stream-1-recommendations</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) submitted the below to ICANN's CCWG-Accountability.&lt;/b&gt;
        &lt;p&gt;The CCWG Accountability proposal is longer than many countries' constitutions.  Given that, we will keep our comments brief, addressing a very limited set of the issues in very broad terms.&lt;/p&gt;
&lt;h3&gt;Human Rights&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;ICANN is unique in many ways.  It is a global regulator that has powers of taxation to fund its own operation.  ICANN is not a mere corporation. For such a regulator, ensuring fair process (what is often referred to as "natural justice") as well as substantive human rights (such as the freedom of expression, right against discrimination, right to privacy, and cultural diversity), are important.  Given this, the narrow framing of "free expression and the free flow of information" in Option 1, we believe Option 2 is preferable.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Diversity&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We are glad that diversity is being recognized as an important principle.  As we noted during the open floor session at ICANN49: [We are] extremely concerned about the accountability of ICANN to the global community.  Due to various decisions made by the US government relating to ICANN's birth, ICANN has had a troubled history with legitimacy.  While it has managed to gain and retain the confidence of the technical community, it still lacks political legitimacy due to its history.  The NTIA's decision has presented us an opportunity to correct this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, ICANN can't hope to do so without going beyond the current ICANN community, which while nominally being 'multistakeholder' and open to all, grossly under-represents those parts of the world that aren't North America and Western Europe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of the 1010 ICANN-accredited registrars, 624 are from the United States, and 7 from the 54 countries of Africa.  In a session yesterday, a large number of the policies that favour entrenched incumbents from richer countries were discussed.  But without adequate representation from poorer countries, and adequate representation from the rest of the world's Internet population, there is no hope of changing these policies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is true not just of the business sector, but of all the 'stakeholders' that are part of global Internet policymaking, whether they follow the ICANN multistakeholder model or another.  A look at the board members of the Internet Architecture Board, for instance, would reveal how skewed the technical community can be, whether in terms of geographic or gender diversity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Without greater diversity within the global Internet policymaking communities, there is no hope of equity, respect for human rights — civil, political, cultural, social and economic — and democratic functioning, no matter how 'open' the processes seem to be, and no hope of ICANN accountability either.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, there are those who are concerned that diversity should not prevail over skill and experience.  Those who have the greatest skill and experience will be those who are insiders in the ICANN system.  To believe that being an insider in the ICANN system ought to be privileged over diversity is wrong.  A call for diversity isn't just political correctness.  It is essential for legitimacy of ICANN as a globally-representative body, and not just one where the developed world (primarily US-based persons) makes policies for the whole globe, which is what it has so far been.  Of course, this cannot be corrected overnight, but it is crucial that this be a central focus of the accountability initiative.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Jurisdiction, Membership Models and Voting Rights&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Sole-Member Community Mechanism (SMCM) that has been proposed seems in large part the best manner provided under Californian law relating to public benefit corporations of dealing with accountability issues, and is the lynchpin of the whole accountability mechanism under workstream.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the jurisdictional analysis laid down in 11.3 will only be completed post-transition, as part of workstream. Thus the SMCM may not necessarily be the best model under a different legal jurisdiction. It would be useful to discuss the dependency between these more clearly.  In this vein, it is essential that the Article XVIII Section 1 not be designated a fundamental bylaw.  Further, it would be useful to add that for some limited aspects of the transition (such as IANA functioning), ICANN should seek to enter into a host country agreement to provide legal immunity, thus providing a qualification to para 125 ("ICANN accountability requires compliance with applicable legislation, in jurisdictions where it operates.") since the IANA functions operator ought not be forced by a country not to honour requests made by, for example, North Korea.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should also be noted that accountability needs independence, which may be of two kinds: independence of financial source, and independence of appointment.  From what one could gather from the CCWG proposal, the Independent Review Panel will be funded by the budget the ICANN Board prepares, while the appointment process is still unclear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the most important accountability mechanisms with regard to the IANA functions is that of changing the IANA Functions Operator.  As per the CWG Stewardship's current proposal, the "Post-Transition IANA" won't be an entity that is independent of ICANN.  If the PTI's governance is permanently made part of ICANN's fundamental bylaws (as an affiliate controlled by ICANN), how is it proposed that the IFO be moved from PTI to some other entity if the IANA Functions Review Team so decides? Additionally, for such an important function, the composition of the IFRT should not be left unspecified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it is welcome that a separation is proposed between the IANA budget and budget for rest of ICANN's functioning, the current discussion around budgets seems to be based on the assumption that all IANA functions will be funded by ICANN, whereas if the IANA functions are separated, each community might fund it separately.  That provides two levels of insulation to IANA functions operator(s): separate sources of operational revenue, as well as separate budgets within ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should be noted that there have been some responses that express concern about the shifting of existing power structures within ICANN through some of the proposed alternative voting allocations in the SMCM. However, rather than present arguments as to why these shifts would be beneficial or harmful for ICANN's overall accountability, these responses seem to assume that shift from the current power structures are harmful.  This is an unfounded assumption and cannot be a valid reason, nor can speculation of how the United States Congress will behave be a valid reason for rejecting an otherwise valid proposal.  If there are harms, they ought to be clearly articulated: shifts from the status quo and fear of the US Congress aren't valid harms.  Thus, while it is important to consider how different voting rights models might change the status quo while arriving at any judgments, that cannot be the sole criterion for judgment of its merits.  Further, as the French government notes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[T]he French Government still considers that linking Stress Test 18 to a risk of capture of ICANN by governments and NTIA’s requirement that no “government-led or intergovernmental organization solution would be acceptable”, makes no sense. . . . Logically, the risk of capture of ICANN by governments in the future is as low as it is now and in any case, it cannot lead to a “government-led or intergovernmental organization solution”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While dealing with the question of relative voting proportions, the community must remembered that not all parts of the world are equally developed with regard to the domain name industry and with respect to civil society as those countries in North America, Western Europe, and other developed nations, and thus may not find adequate representation via the SOs.  In many parts of the world, civil society organizations — especially those focussed on Internet governance and domain name policies — are non-existent.  Thus a system that privileges the SOs to the exclusion of other components of a multistakeholder governance model would not be representative or diverse.  A multistakeholder model cannot disproportionately represent business interests over all other interests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this regard, the comments of former ICANN Chairperson, Rod Beckstrom, at ICANN43 ought to be recalled:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN must be able to act for the public good while placing commercial and financial interests in the appropriate context . . . How can it do this if all top leadership is from the very domain name industry it is supposed to coordinate independently?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Kieren McCarthy points out about ICANN:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Board does have too many conflicted members&lt;br /&gt;The NomCom is full of conflicts&lt;br /&gt;There are not enough independent voices within the organization&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reforms in these ought to be as crucial to accountability as the membership model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The current mechanisms for ensuring transparency, such as the DIDP process, are wholly inadequate.  We have summarized our experience with the DIDP process, and how often we were denied information on baseless grounds in this &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/table-of-cis-didp-requests"&gt;table&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-submission-on-ccwg-accountability-2nd-draft-proposal-on-work-stream-1-recommendations'&gt;https://cis-india.org/internet-governance/blog/cis-submission-on-ccwg-accountability-2nd-draft-proposal-on-work-stream-1-recommendations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-23T14:58:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-multi-stakeholder-cooperation">
    <title>Transnational Due Process: A Case Study in Multi-stakeholder Cooperation </title>
    <link>https://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-multi-stakeholder-cooperation</link>
    <description>
        &lt;b&gt;The Internet &amp; Jurisdiction Project is organizing the workshop “Transnational due process: A case study in multi-stakeholder cooperation” at the Internet Governance Forum convened by the United Nations on November 10-13, 2015. Sunil Abraham will be a speaker in this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Multi-stakeholder cooperation is  necessary to develop and implement operational solutions to Internet  Governance challenges. One such challenge is the tension between the  cross-border nature of the Internet and diverse national jurisdictions.  As a result, direct requests are increasingly addressed by public  authorities and courts in one country to Internet platforms and DNS  operators in other jurisdictions for domain seizures, content takedowns  and user identification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since 2012, the Internet &amp;amp;  Jurisdiction Project facilitates a multi-stakeholder dialogue process on  this issue. More than 80 entities have collaboratively produced a draft  transnational due process framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The roundtable at the Internet  Governance Forum 20125 will gather participants in the I&amp;amp;J Project  from different stakeholder groups to report on the progress of the  Internet &amp;amp; Jurisdiction process and talk about:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;the method employed to develop this framework, challenges encountered and solutions found&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;the potential distribution of roles among the respective stakeholders in the operation of the diverse framework components&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Participants&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;ANNE CARBLANC, Head of Division, Directorate for Science, Technology and Industry, OECD&lt;/li&gt;
&lt;li&gt;EILEEN DONAHUE, Director Global Affairs, Human Rights Watch&lt;/li&gt;
&lt;li&gt;BYRON HOLLAND, President and CEO, CIRA (Canadian ccTLD)&lt;/li&gt;
&lt;li&gt;CHRISTOPHER PAINTER, Coordinator for Cyber Issues, US Department of State&lt;/li&gt;
&lt;li&gt;SUNIL ABRAHAM, Executive Director, CIS India&lt;/li&gt;
&lt;li&gt;ALICE MUNYUA, Lead dotAfrica Initiative and GAC representative, African Union Commission&lt;/li&gt;
&lt;li&gt;Speaker tbc, Google&lt;/li&gt;
&lt;li&gt;FRANK LaRUE, Former UN Special Rapporteur for Freedom of Expression&lt;/li&gt;
&lt;li&gt;Speaker tbc, German Federal Foreign Office&lt;/li&gt;
&lt;li&gt;HARTMUT GLASER, Executive Secretary, Brazilian Internet Steering Committee&lt;/li&gt;
&lt;li&gt;MATT PERAULT, Head of Policy Development, Facebook&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;This was &lt;a class="external-link" href="http://www.internetjurisdiction.net/ij-project-workshop-at-internet-governance-forum-2015/"&gt;published on the website of Internet &amp;amp; Jurisdiction&lt;/a&gt; Also see this on &lt;a class="external-link" href="http://igf2015.sched.org/event/c5aca9d5712654402e069bbe2dd97eb2?iframe=no&amp;amp;w=i:0;&amp;amp;sidebar=yes&amp;amp;bg=no#.Vj4RWl58hQo"&gt;IGF website&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-multi-stakeholder-cooperation'&gt;https://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-multi-stakeholder-cooperation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-07T15:47:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015">
    <title>Bangalore Chapter Meet of DSCI</title>
    <link>https://cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) will host the Bangalore Chapter Meeting of Data Security Council of India (DSCI) on September 26, 2015 at its Bangalore office in Domlur. The event will be held from 2.30 p.m. to 5.30 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;After the Nasscom cyber security task force meeting held at Wipro in June, followed by DSCI Best Practices meet in July, we now have the next chapter meeting at CIS.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Speakers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first speaker will be &lt;b&gt;Melissa Hathaway, Commissioner, Global Commission for Internet Governance&lt;/b&gt;. She is an internationally distinguished cyber security expert and has worked as cyber security adviser in two US Presidential Administrations, and is the former acting Senior Director for cyberspace at the National Security Council in the US. The topic she will be speaking on is "&lt;a href="https://cis-india.org/internet-governance/blog/connected-choices" class="external-link"&gt;Connected Choices&lt;/a&gt;".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second speaker will be &lt;b&gt;Sunil Abraham, Executive Director, CIS&lt;/b&gt; (Center for internet &amp;amp; Society). Sunil is a renowned thought leader when it comes to internet governance, cyber space &amp;amp; its interface with civil society and actively contributes to DSCI and other forums. He will  be presenting on "&lt;a href="https://cis-india.org/internet-governance/blog/anonymity-in-cyberspace" class="external-link"&gt;Anonymity in Cyberspace&lt;/a&gt;" - the SIG that he led over last 8 months along with a diverse group of members from the industry in Bangalore.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda&lt;/h3&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Topic&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.30 p.m. - 2.45 p.m.&lt;/td&gt;
&lt;td&gt;Recent Developments and Updates from DSCI&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.45 p.m. - 4.00 p.m.&lt;/td&gt;
&lt;td&gt;Srinivas P. (Anchor): DSCI Bangalore Chapter&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.00 p.m. - 5.00 p.m.&lt;/td&gt;
&lt;td&gt;Melissa Hathaway: Connected Choices&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.00 p.m. - 5.30 p.m.&lt;/td&gt;
&lt;td&gt;Sunil Abraham: Anonymity in Cyberspace&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This will be followed by High Tea &amp;amp; Networking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For participation, please send your email confirmation to Rajesh of Infosys at &lt;a class="mail-link" href="mailto:Rajesh_K18@infosys.com"&gt;Rajesh_K18@infosys.com&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since seats are limited, the participation will be restricted to first 50 confirmations. We had to organize it on a Saturday, due to Melissa’s availability – I’m sure many of you who know about her as expert security speaker, will not see weekend as a constraint to attend. Look forward to meeting you at CIS.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015'&gt;https://cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-09T01:40:56Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
