<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1486 to 1500.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/governance-now-march-23-2015-ankita-lahiri-internet-becomes-vernacular-with-relaunch-of-e-bhasha"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-at-liberty-2012"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-liberty-2012"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/internet-and-the-police-tool-to-some-trash-to-others"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/internet-society-challenges-next-steps"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/internet-and-banking-a-trust-broken"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-nytimes-vikas-bajaj-aug-21-2012-internet-analysts-question-indias-efforts-to-stem-panic"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/international-view-of-state-of-the-art-of-cryptography-and-security-and-its-use-in-practice"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/international-symposium-on-electronic-art-isea-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/digitization-and-its-impact-on-society"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/sopa"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/vipul-kharbanda-april-29-2019-international-cooperation-in-cybercrime-the-budapest-convention"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/intl-conferernce-on-mobile-law"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion">
    <title>Internet censorship will continue in opaque fashion</title>
    <link>https://cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion</link>
    <description>
        &lt;b&gt;A division bench of the Supreme Court has ruled on three sections of the Information Technology Act 2000 - Section 66A, Section 79 and Section 69A. The draconian Section 66A was originally meant to tackle spam and cyber-stalking but was used by the powerful elite to crack down on online dissent and criticism.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sunil Abraham was published in the &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/bengaluru/Internet-censorship-will-continue-in-opaque-fashion/articleshow/46681490.cms"&gt;Times of India&lt;/a&gt; on March 25, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Section 79 was meant to give immunity to internet intermediaries for  liability emerging from third-party speech, but it had a chilling effect  on free speech because intermediaries erred on the side of caution when  it came to deciding whether the content was legal or illegal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And Section 69A was the web blocking or internet censorship provision,  but the procedure prescribed did not adhere to the principles of natural  justice and transparency. For instance, when books are banned by  courts, the public is informed of such bans but when websites are banned  in India, there's no clear message from the Internet Service Provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court upheld 69A, so web blocking and internet censorship in  India will continue to happen in an opaque fashion which is worrying.  But on 66A and 79, the landmark judgment protects the right to free  speech and expression. It struck down 66A in entirety, saying the vague  and imprecise language made the provision unconstitutional and it  interfered with "the right of the people to know - the market place of  ideas - which the internet provides to persons of all kinds". However,  it only read down Section 79 saying "unlawful acts beyond what is laid  down" as reasonable restrictions to the right to free speech in the  Constitution "obviously cannot form any part" of the section. In short,  the court has eliminated any additional restrictions for speech online  even though it admitted that the internet is "intelligibly different"  from traditional media and might require additional laws to be passed by  the  Indian Parliament."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion'&gt;https://cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-03-26T02:07:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/governance-now-march-23-2015-ankita-lahiri-internet-becomes-vernacular-with-relaunch-of-e-bhasha">
    <title>Internet becomes vernacular with relaunch of e-bhasha</title>
    <link>https://cis-india.org/internet-governance/news/governance-now-march-23-2015-ankita-lahiri-internet-becomes-vernacular-with-relaunch-of-e-bhasha</link>
    <description>
        &lt;b&gt;With the relaunch of e-bhasha as a mission mode project, there is a fresh urgency to create content and technical solutions in Indian languages.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Ankita Lahiri was published in &lt;a class="external-link" href="http://www.governancenow.com/gov-next/egov/internet-becomes-vernacular-relaunch-ebhasha"&gt;Governance Now&lt;/a&gt; on March 23, 2015. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Computer literacy is often linked to the knowledge of English. With the launch of the e-bhasha project, the government is hoping to make the internet more accessible. The project aims at providing computing tools in Indian languages, thus making government services available to a substantial part of India. These tools were developed more than a decade ago, but sadly remained non-utilised. However, the government has now decided to bring in the e-bhasha project under the umbrella of the national e-governance plan (NeGP) as a mission mode project (MMP).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The project that is being jointly driven by the department of electronics and information technology (DeitY) and technology development for Indian languages (TDIL), will be implemented in all departments across states and promises to provide all government services in 22 scheduled Indian languages. It will also provide a range of technical solutions, browsers and content in local languages. The multilingual aspect will ensure that government services have a wider reach and are accessible to citizens in local languages. The department hopes to get approval for the MMP by early next year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although TDIL has been finalised as the nodal implementing agency, the idea is to create a separate body, the centre of excellence (CoE) for localisation of Indian languages that will do the actual implementation on the ground level. Discussing the wing’s role, Swaran Lata, officer-in-charge, human-centred computing division, TDIL, told Governance Now: “We are like the backbone MMP. We will provide tools and solutions that can be used to generate the content in Indian languages. We will also provide standards and guidelines for the electronic governance domain. The final service delivery will be the responsibility of the various departments.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elaborating on how this platform can potentially transform the lives of the common citizen, Rajat Moona, director general, centre for development of advanced computing (C-DAC), said, “More people will get connected to government services now. It will bring the government closer to the citizen. The platform will change the way people carry out government services.” C-DAC has been working on local language computing and has been a key player driving the initiative on the technology front.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As an MMP, e-bhasha will have two main components: productisation and capacity building. The first step towards creating the e-bhasha platform will be the productisation. As Rajendra Kumar, joint secretary, DeitY, pointed out, “E-bhasha is all about the use of computing tools in Indic languages. It is about the productisation of these software tools, which means the ultimate utilisation of these tools for the end user.” In order to fully implement the MMP, proper training as to how to implement it at the ground level has to be given. The capacity building module of the MMP aims to train both the government departments as well as their technical teams. The training will be implemented jointly by DeitY and TDIL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commenting on the need for capacity building Lata said, “People still don’t have the skills to develop applications in multilingual or bilingual languages.” The training will be given through classroom sessions and various trouble shooting groups. Lata explained that applications will be classified in two groups – new projects and continuing projects. For each group the challenges will be different. For pre-existing applications, the entire application might have to be rewritten since the application as such might not have any provision for local languages. “The localisation of applications will vary according to the existing applications,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After this, content in these languages will be generated by various institutes and research and development organisations. Explaining that the service delivery framework for the MMP has already been designed, Rajendra Kumar said that the centre will extend total support to all the states in implementing the project.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Where India stands&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Work to provide support in the form of tools and content in Indic languages has been going on in the country for more than two decades. C-DAC has been involved in this since 1988. The centre has been working towards developing tools that support Indic languages. Moona said, “We have been supporting Indic languages since 1988, whether it is from left to right or vice versa and languages with multiple fonts, like Konkani.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“As an integral part of the e-bhasha MMP, the centre will provide software tools that will facilitate the citizen in accessing government services in the local languages,” Moona said adding that, “Through the tools, we provide localisation support of government services. We provide government frontend in local languages. That is what the e-bhasha MMP is all about.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;C-DAC has already developed a number of solutions that support the Indic languages including a mobile touch keypad that can be downloaded from its website. Further a screen reader and various templates are also available. “The keyboard is slowly disappearing. We have a touchscreen that supports 27 Indic languages,” Moona said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the key initiatives by TDIL has been in the form of the Sakal Bharti font, a type of open font format (OFF). It is a standard font, applicable to all the 22 schedule languages, irrespective of the platform, programme and language. It allows one to view and edit any document without any loss of data. Similar efforts have also been made by private players in creating the required tools to increase the reach the Indian languages. The Centre for Internet and Society (CIS) has launched several initiatives, including translating Wikipedia in regional languages and creating screen readers that support indigenous languages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the increase in internet penetration and the resulting increase in demand, private players, including digital giants Google and Microsoft, have joined hands to promote content in Indian languages. The initiative called the Indian languages Internet Alliance (ILIA) was launched by Google to cater to the Hindi-speaking population by providing content and solutions. Launched around the same time as the e-bhasha project, the two projects are expected to complement each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is heartening to see support from the government for this initiative. The initiative would shape the thinking around the government’s e-bhasha initiative and we are happy to partner with the government around the three pillars of e-bhasha: e-governance, e-education and culture,” said a Google spokesperson.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In support of the private initiatives that are coming up, Lata explained that an ecosystem has been built. “What happens is that in areas where it is not commercially beneficial, it has to be the government which steps in first. I think the government has received a wake-up call in terms of both e-governance as well as languages.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The chicken or the egg?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The resources have been available with the government for the last two decades, yet it is only now that the push for local languages has got the attention it much needed. According to Kumar, while C-DAC has been involved in developing these tools and their language department, GIST, has been around for at least 15 years the implementation in e-governance did not happen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lata further elaborated, “It is not the correct perspective to say that the localisation of languages is just a frontend issue. It is an architectural issue and a language solution should enable people to search access and retrieve data in the local languages.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surge in the number of users as well as the new government’s heightened interest in electronic governance has created an increased demand. “The push for Indian languages has been there for a long time. Many government websites are bilingual (English and Hindi).  However, with the introduction of electronic governance a lot of activities have been happening. The need for Indian languages has become much higher,” Moona said. “It is an evolutionary process. Internet governance is still a new thing in India, it is only after its introduction that the tools and support for local languages has been required.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director, CIS, said, “Creation of Indic content cannot be left to a single government entity. It needs massive effort from all concerned stakeholders. The reason that there is very little Indic content online is because most internet users today either are comfortable using English or don’t have sufficient purchasing power to sustain different business models. As more and more Indians come online, more and more businesses will begin to leverage Indic content. However, focused and enlightened investments by the government would be very useful in helping Indic languages catch up on the internet.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With Indic languages receiving a push from both the government and private players, it might just be time that the internet really becomes a tool for everyone.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/governance-now-march-23-2015-ankita-lahiri-internet-becomes-vernacular-with-relaunch-of-e-bhasha'&gt;https://cis-india.org/internet-governance/news/governance-now-march-23-2015-ankita-lahiri-internet-becomes-vernacular-with-relaunch-of-e-bhasha&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-04-03T05:49:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-at-liberty-2012">
    <title>Internet at Liberty 2012: Promoting Progress and Freedom </title>
    <link>https://cis-india.org/news/internet-at-liberty-2012</link>
    <description>
        &lt;b&gt;Following the highly successful Internet at Liberty 2010, activists and experts from around the world converged on May 23-24 to explore the most pressing dilemmas and exciting opportunities around free expression in the digital age. &lt;/b&gt;
        
&lt;p&gt;The Internet as a global, free, and open resource, is constantly developing. Over the past year we have seen how the Internet can shift power, broaden scope, and accelerate political and economic change. Simultaneously, governments and multinational companies shape what is possible online. Today, more than any time in history, technological and political forces are colliding to draw lines about how the Internet functions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Internet at Liberty 2012&lt;/strong&gt;, sponsored by &lt;strong&gt;Google&lt;/strong&gt;, brought together global activists and representatives of academic centers, corporations, governments, the media and NGOs. The conference explored ways to expand the free flow of information online. Look for debates about today's most pressing internet freedom issues, and action-oriented workshops.&lt;/p&gt;
&lt;h2&gt;Agenda&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_youtube16.png/image_preview" alt="Youtube" class="image-inline image-inline" title="Youtube" /&gt; = streamed live on the CitizenTube YouTube channel at &lt;a class="external-link" href="http://www.youtube.com/citizentube"&gt;youtube.com/citizentube&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;May 23, 2012&lt;/strong&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&amp;nbsp; 8:30 a.m.&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Registration &amp;amp; Breakfast&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp; 9:30 a.m.- &lt;br /&gt;10:00 a.m.&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Welcome &amp;amp; Introduction&lt;img src="https://cis-india.org/home-images/copy_of_youtube16.png/image_preview" alt="Youtube" class="image-inline image-inline" title="Youtube" /&gt;&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00 a.m. - &lt;br /&gt;11:30 a.m.&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Plenary I &lt;img src="https://cis-india.org/home-images/copy_of_youtube16.png/image_preview" alt="Youtube" class="image-inline image-inline" title="Youtube" /&gt;&lt;/h3&gt;
&lt;p&gt;Debate 1: Should laws and regulations that affect the Internet favor individuals over the state?&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Speakers&lt;/em&gt;:&lt;br /&gt;&lt;br /&gt;John Kampfner - Author and historian&lt;br /&gt;&lt;br /&gt;Noomane Fehri - Tunisian National Constitutional Assembly&lt;br /&gt;&lt;br /&gt;Renata Avila - Lawyer and Advocate for Transparency, Global Voices&lt;br /&gt;&lt;br /&gt;Stewart Baker - Former Assistant Secretary, US Department of Homeland Security&lt;br /&gt;&lt;br /&gt;Susan Glasser - Editor in Chief, Foreign Policy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30 a.m. - &lt;br /&gt;11:45 a.m&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Break&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:45 a.m. - 1.00 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Break-out Discussions&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.00 p.m. - &lt;br /&gt;2:15 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Lunch&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:15 p.m. - &lt;br /&gt;3:45 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Workshop I&lt;/h3&gt;
Choice of workshops:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;New Frontiers in Citizen Journalism&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Economics of Internet Freedom&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Mobile Security Survival Guide: What Every Activist and Rights Defender Needs to Know About Communicating More Safely&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Video for Change: How To Create, Share and Use Video for Impact and Attention&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Social media: Strategies &amp;amp; tools for advocacy campaigns&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Shielding the Messenger: Protecting platforms for free expression&lt;/li&gt;&lt;/ul&gt;
&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:45 p.m. - &lt;br /&gt;4:45 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Afternoon Break&lt;/h3&gt;
&lt;p&gt;Research Displays&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4:45 p.m. - &lt;br /&gt;5:30 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Plenary II&lt;/h3&gt;
&lt;p&gt;Debate 2: Is the Internet--and global communication among citizens--best served by today's organic mix of governing forces, or do we need a more centralized, global system?&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Speaker&lt;/em&gt;:&lt;br /&gt;
&lt;br /&gt;
Ben Wagner - European University Institute&lt;br /&gt;
&lt;br /&gt;
Gary Fowlie - Head, ITU Liaison Office to the United Nations&lt;br /&gt;
&lt;br /&gt;
Riz Khan (Moderator) - Reporter, Al Jazeera English&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5:45 p.m. - &lt;br /&gt;7.00 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Reception&lt;/h3&gt;
Research Displays&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7.00 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Dinner&lt;/h3&gt;
Keynote Panel&lt;br /&gt;
&lt;br /&gt;
Speaker:&lt;br /&gt;
&lt;br /&gt;
Riz Khan - International Journalist, Television Host, Author at Al Jazeera English&lt;br /&gt;
&lt;br /&gt;
Sana Saleem&lt;br /&gt;
&lt;br /&gt;
Chiranuch “Jiew” Premchaiporn&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.google.com/events/internetatliberty2012/agenda2.html"&gt;See the original agenda in Google News&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;May 24, 2012&lt;/strong&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;8:30 a.m. - &lt;br /&gt;9.00 a.m&lt;/td&gt;
&lt;td&gt;Registration &amp;amp; Breakfast &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp; 9.00 a.m. - &lt;br /&gt;10.00 a.m.&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Plenary III &lt;img src="https://cis-india.org/home-images/copy_of_youtube16.png/image_preview" alt="Youtube" class="image-inline image-inline" title="Youtube" /&gt;&lt;/h3&gt;
&lt;p&gt;Research Lightning Round&lt;br /&gt;&lt;br /&gt;&lt;em&gt;Speaker&lt;/em&gt;:&lt;br /&gt;&lt;br /&gt;Guy Berger, Mapping Digital Media Around the World&lt;br /&gt;&lt;br /&gt;Jeffrey Ghannam, Digital Media After the Arab Spring&lt;br /&gt;&lt;br /&gt;Katrin Verclas, Mobile Monitor&lt;br /&gt;&lt;br /&gt;Nadim Kobeissi, Securing Private Networks with Cryptocat&lt;br /&gt;&lt;br /&gt;Lucas Dixon, DDOS Protection&lt;br /&gt;&lt;br /&gt;Sarah Kendzior, The Impact of Social Media in Azerbaijan&lt;br /&gt;&lt;br /&gt;Claudio Ruiz, Freedom of Expression in Chile&lt;br /&gt;&lt;br /&gt;Christopher Fabian, uReport: UNICEF Innovations&lt;br /&gt;&lt;br /&gt;Nicklas Lunblad, Internet Freedom as Economics Issue&lt;br /&gt;&lt;br /&gt;Zeynep Tufekci&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.00 a.m. - &lt;br /&gt;11.00 a.m.&lt;/td&gt;
&lt;td&gt;Morning Break &lt;br /&gt;Research Displays&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00 a.m. - 12:30 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Workshop II&lt;/h3&gt;
Choice of workshops:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;New Frontiers in Citizen Journalism&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Economics of Internet Freedom&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Mobile Security Survival Guide: What Every Activist and Rights Defender Needs to Know About Communicating More Safely&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Video for Change: How To Create, Share and Use Video for Impact and Attention&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Social Media: Strategies &amp;amp; tools for advocacy campaigns&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Shielding the Messenger: Protecting platforms for free expression&lt;/li&gt;&lt;/ul&gt;
&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Lunch&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.30 p.m. - &lt;br /&gt;3.00 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Plenary IV &lt;img src="https://cis-india.org/home-images/copy_of_youtube16.png/image_preview" alt="Youtube" class="image-inline image-inline" title="Youtube" /&gt;&lt;/h3&gt;
&lt;p&gt;Debate 3: In a world where nearly nine out of ten Internet users are not American, what is the responsibility of United States institutions in promoting internet freedom?&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Speaker&lt;/em&gt;:&lt;br /&gt;&lt;br /&gt;Sunil Abraham - Centre for Internet and Society&lt;br /&gt;&lt;br /&gt;Cynthia Wong - Center for Democracy and Technology&lt;br /&gt;&lt;br /&gt;Mohamed El Dahshan - writer, journalist&lt;br /&gt;&lt;br /&gt;Dunja Mijatović - OSCE Representative on Freedom of the Media&lt;br /&gt;&lt;br /&gt;Judy Woodruff (Moderator) - Senior Correspondent, PBS Newshour&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.00 p.m. - &lt;br /&gt;4.00 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Closing Session&lt;/h3&gt;
&lt;h3&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;a class="external-link" href="http://www.google.com/events/internetatliberty2012/agenda3.html"&gt;See the original agenda in Google News&lt;/a&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-at-liberty-2012'&gt;https://cis-india.org/news/internet-at-liberty-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-05-26T04:17:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-liberty-2012">
    <title>Internet At Liberty 2012</title>
    <link>https://cis-india.org/news/internet-liberty-2012</link>
    <description>
        &lt;b&gt;Activists and experts from all over the world came together for this event organised by Google on May 23 and 24, 2012 to explore free expression in the digital age.&lt;/b&gt;
        &lt;p&gt;&lt;img src="https://cis-india.org/home-images/Internet.jpg/@@images/dc9d1698-03d0-4d2e-bdba-be0f3a5ccb51.jpeg" alt="Internet" class="image-inline" title="Internet" /&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham was a speaker in Plenary IV Debate 3: In a world where nearly nine out of ten Internet users are not American, what is the responsibility of United States institutions in promoting internet freedom? Cynthia Wong, Mohamed El Dahshan, Dunja Mijatović and Judy Woodruff were the other speakers in this panel. See the video below:&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Internet at Liberty 2012: Plenary IV - Sunil Abraham, Cynthia Wong, Mohamed El Dahshan and Dunja Mijatović&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/9YMte4hdYu0" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.youtube.com/watch?v=9YMte4hdYu0"&gt;View the video on YouTube&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-liberty-2012'&gt;https://cis-india.org/news/internet-liberty-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-05T05:24:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/internet-and-the-police-tool-to-some-trash-to-others">
    <title>Internet and the Police: Tool to Some, Trash to Others</title>
    <link>https://cis-india.org/internet-governance/blog/internet-and-the-police-tool-to-some-trash-to-others</link>
    <description>
        &lt;b&gt;Strap: Disconnection with colleagues discomforts one part of the administration, but the other quips, what’s the big deal?&lt;/b&gt;
        &lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Panchkula, Haryana: &lt;/b&gt;Suspension of internet facilities to “prevent mishaps” has been a frequent exercise in Haryana during various agitations, but probing its effect on those responsible to maintain the law &amp;amp; order in the state shows a gap in acceptance of the information tool. There are some who understand its importance in bridging human interaction, and then, there are others who consider it nothing but an easy way to watch porn.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The tricity of Chandigarh, Panchkula and Mohali witnessed chaos and violence when Dera Sacha Sauda (DSS) chief Gurmeet Ram Rahim Singh was convicted in two rape cases on August 25. Mobile internet services were shut down across Punjab, Haryana and Chandigarh for 72 hours as over one lakh followers of the much-revered “godman” started pouring into Panchkula, camping around the district court complex where the special CBI court was hearing the case. The ban was later&lt;a href="http://www.thehindubusinessline.com/news/national/mobile-internet-services-to-remain-suspended-in-haryana-punjab/article9832262.ece"&gt; &lt;/a&gt;&lt;a href="http://www.thehindubusinessline.com/news/national/mobile-internet-services-to-remain-suspended-in-haryana-punjab/article9832262.ece"&gt;extended&lt;/a&gt; for another 48 hours to last till August 29.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Reports claimed that 38 people&lt;a href="https://timesofindia.indiatimes.com/india/rape-convict-gurmeet-ram-rahim-sentenced-to-10-years-in-jail/articleshow/60257535.cms"&gt; &lt;/a&gt;&lt;a href="https://timesofindia.indiatimes.com/india/rape-convict-gurmeet-ram-rahim-sentenced-to-10-years-in-jail/articleshow/60257535.cms"&gt;died&lt;/a&gt; in the interim violence between August 25 and 29. The internet shutdown, evidently, didn’t serve the purpose. But it did affect the efficiency of the mechanism put in place to control the law and order situation.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Shutdowns obstruct us too: Cops&lt;/b&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Panchkula police commissioner Arshinder Singh Chawla said they faced challenges in ascertaining size of the crowd gathering at various locations after the mobile internet communication was temporarily killed.  “We were until then sharing information and photos on WhatsApp to figure out the number of people pouring in the city from various points as it helped identify problem areas. DSS followers had started gathering August 22 onwards,” said Chawla, who was heading the operations when DSS followers went on a rampage in Panchkula.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Unavailability of internet had hindered police operations during the Jat agitation in 2016 as well. Jagdish Sharma, a retired DSP who was part of the team countering agitators at the Munak canal when they targeted the chief source of Delhi’s water supply, said his team faced challenges in gathering strength due to the absence of mobile communication. “The protesters had a much larger count than our personnel at the canal, but they weren’t aware of this. We were fearful that our wireless messages asking for reinforcements may be tapped into by them. We could have easily conveyed the message if WhatsApp was working then,” said Sharma. The cops retained control over Munak canal by remaining at their position for two days, until the reinforcements arrived, while posing as if they were prepared to take on the Jat agitators, Sharma added.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The Panchkula police commissioner said that the drone they were using to take photographs and videos during the DSS violence also fell out of use once mobile internet was curtailed. With drones in operation, their tasks would have been much easier, Chawla said.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Panchkula deputy commissioner Gauri Parashar Joshi faced the brunt when her security staff could not communicate with the security personnel at the district court complex. SP Krishan Murari, who was heading a commando squad on the day, said they had to help Joshi scale a wall to escape the court complex as they could not ascertain a safe escape route. The DSS supporters had surrounded the entrances to the complex and were ready to clash with police authorities, he said. Joshi said she could not reach out to her colleagues in the administration to share important messages and orders as the mobile internet services didn’t work.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;‘Ban can’t always be boon’&lt;/b&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Ram Singh Bishnoi, who was cyber security in-charge with the Haryana police until January 2017, believes a medium like internet should not be broken down. “I agree that rumours spread like wildfire, but the government should devise other ways to counter the problem than imposing a ban on net services,” he said.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;IG (Telecommunication) Paramjit Singh Ahlawat, however, said there is not much use of the internet when the situation turns volatile in the region. Things like internet don’t matter to people when their lives and property are in danger; these services are enjoyed when law and order is under control, he said.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The cops in Haryana, where internet has been shut down over 11 times in the past two years, may find some learning in the way former Mumbai police commissioner Rakesh Maria avoided a scuffle from turning into a communal riot. Maria was&lt;a href="https://www.ndtv.com/mumbai-news/putting-lid-on-rumours-helped-control-situation-in-lalbaug-rakesh-maria-723212"&gt; &lt;/a&gt;&lt;a href="https://www.ndtv.com/mumbai-news/putting-lid-on-rumours-helped-control-situation-in-lalbaug-rakesh-maria-723212"&gt;lauded&lt;/a&gt; for using WhatsApp and SMS service to convince people not to believe rumours being circulated on their phones when clashes broke out between two communities in Lalbaug during Eid celebrations in early 2015.&lt;b&gt;&lt;i&gt; &lt;/i&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Former Haryana DGP Mahender Singh Malik does not believe a ban on internet prevents any untoward incident. Government authorities take such a step in the name of maintaining law and order, but the real reason behind clamping internet is to avoid the masses from being aware of the blunders committed by the same authorities, alleged Malik, terming the decision to ban internet as “unwise” and “against the digital India” initiative of the Centre.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Malik also suggested that people should get compensation when internet shutdown is forced on them.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;‘Internet is for the jobless’&lt;/b&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;However, not all officials in the police department seem to agree with the benefits of internet.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;SP (Telecommunication) Vinod Kumar of Haryana Police said: “How does it (internet) matter to a common man? Internet is for those who have no serious job. It is for those who have time to kill on mobile phones, laptops and at cyber cafes.”&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;In nearby Uttar Pradesh as well, some cops were of the view that internet shutdown did not have much of an impact on their job or general administration. Sub-inspector Vijay Singh was posted in Saharanpur when internet was banned from May 24 for 10 days following caste clashes.  “&lt;i&gt;Internet band hone se farak sirf un logon ko pada jinhe din bhar keval mobile hee chalana hota hai. Kaam karne wala aadmi mobile aur internet par samay nahi bitata &lt;/i&gt;(Only those who have no work suffer because of internet ban. Those who have work in hand do not spend time on mobile and internet),” said Singh, who is now posted in Lucknow.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;“&lt;i&gt;Internet matlab kya - video, Facebook, blue film... aur kya? Agar itne bade gyani hai jinhe internet band hone se farak pada to wo yaha kya kar rahe hai, kahe nahi jakar ke IIT me admission le liye? &lt;/i&gt;(What does internet mean - videos, Facebook, porn films… what else? If you are so affected with internet being banned, why not go and study at IITs,” said Kaushlendra Pandey, another SI-rank policeman from Azamgarh district in UP.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The government of India, on the other hand, is campaigning to promote digital inclusion and accessibility across the country.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt;With additional inputs from Sat Singh and Saurabh Sharma, both members of &lt;/i&gt;&lt;a href="http://www.101reporters.com/"&gt;&lt;i&gt;101Reporters.com&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Manoj Kumar is a Chandigarh based freelance writer and a member of &lt;a href="http://www.101reporters.com/"&gt;101Reporters.com&lt;/a&gt;, a pan-India network of grassroots reporters. He has reported on a wide range of civic issues over the past 12 years. He has written for Dainik Jagran, Dainik Bhaskar, Amar Ujala, Outlook, etc.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Shutdown stories are the output of a collaboration between 101 Reporters and CIS with support from Facebook.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/internet-and-the-police-tool-to-some-trash-to-others'&gt;https://cis-india.org/internet-governance/blog/internet-and-the-police-tool-to-some-trash-to-others&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Manoj Kumar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Shutdown</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-12-19T15:52:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/internet-society-challenges-next-steps">
    <title>Internet and Society in Asia: Challenges and Next Steps</title>
    <link>https://cis-india.org/internet-governance/internet-society-challenges-next-steps</link>
    <description>
        &lt;b&gt;The ubiquitous presence of internet technologies, in our age of digital revolution, has demanded the attention of various disciplines of study and movements for change around the globe. As more of our environment gets connected to the circuits of the World Wide Web, we witness a significant transformation in the way we understand the politics, mechanics and aesthetics of the world we live in, says Nishant Shah in this peer reviewed essay published in Inter-Asia Cultural Studies, Volume 11, Number 1, March 2010.&lt;/b&gt;
        
&lt;p&gt;Traces of digital environments and internet technologies are all 
around us – we can see them in the rise of Digital Natives who are 
increasingly experiencing and living their lives mediated by digital 
technologies; we can see them in new forms of social interactions, such 
as blogs, peer-to-peer networks, internet relay chat, podcasts and so 
on, which are progressively becoming the primary points of information 
dissemination and production; we experience them in the tools and 
techniques of political mobilisation in large scale democratic elections
 and also in sub-cultural and smaller phenomena, such as flash-mobs and 
viral networking; we are incessantly reminded of them in the discourse 
around questions of safety and danger, especially with reference to 
activities such as internet pornography, child sexual abuse, piracy, 
identity theft, etc.&lt;/p&gt;
&lt;p&gt;Internet technologies have become so intricately entwined with our 
daily practices and experiences that it is necessary to seriously look 
at these technologised circuits and the technology mediated identities 
thus produced. Increasingly, we see many different disciplines extending
 their methodologies and perspectives to include cyberspaces and digital
 behaviour in their purview. We already have a new breed of 
cyber-psychologists who are looking at the interaction between the human
 mind, the sense of the self and digital environments. The law, perhaps 
most concerned with questions of property, trade and commerce, is also 
examining questions of what it means to be human, with the emergence of 
post-human categories like cyborgs, cybrids, and genetically modified 
life forms. Anthropologists and sociologists have discovered cyberspace 
as a site that significantly influences the behaviour and thought of 
individuals as well as communities that come into being in the digital 
deliriums of the networked world. Feminism and Gender and Sexuality 
Studies have found great theoretical and political interest in the ways 
in which the internet technologies change the way we understand our 
bodies and practices. New disciplines like Robotics, Artificial 
Intelligence, Cybernetiques, Cyborg Studies, etc. are slowly garnering 
importance and evolving as the spread of digital technologies increases 
exponentially. Cybercultures, a discipline (or perhaps, rather, a 
combination of various disciplines interested in studying cyberspaces) 
that comes into being because of the rise of Internet Technologies, is 
now already institutionalised in many universities and research spaces, 
concentrating on understanding the complex forms of interaction, 
representation and negotiation that happen in the fluid and rapidly 
changing landscape of digital cyberspaces.&lt;/p&gt;
&lt;p&gt;As Internet Technologies continue to grow and become a more integral 
part of our lifestyles, cultural production, and forms of social 
transformation and political mobilisation, there are a few challenges 
that we face, especially when writing from and about Asia.&lt;/p&gt;
&lt;p&gt;Following the trajectory of the development and spread of internet 
technologies, academic attention and research has primarily emerged in 
the North-West and slowly penetrated through disciplines and contexts in
 other parts of the world. It was only after the 1990s, once the digital
 revolution reached the ‘rest of the world’, that interest in and 
research on the phenomenon started to feature in studies in Asia. 
However, the initial research on and the major interest in the 
relationship between internet technologies and society has been 
dependent upon the theoretical categories, examples or ideas produced in
 primarily Western contexts. This has led to the production of a 
narrative where the digital technologies of information and 
communication (like the internet) are looked at as being seamlessly 
exported from the West to the East, without any attention given to the 
geo-political contexts and socio-cultural changes that accompany this 
penetration of technologies. There has been a blindsiding of the role 
that the State, educational institutions and globalised economic powers 
have played in the introduction, the proliferation and the acceptance of
 the internet technologies and digitally mediated lifestyles that have 
become so commonplace in developing Asia today. Research is oblivious to
 the context within which these technologies emerge and the kind of 
negotiations and interactions they have with the larger social and 
cultural fabric of the region.&lt;/p&gt;
&lt;p&gt;One of the main reasons why such a narrative gains currency is that 
we have no vocabulary but that granted by Western scholars and 
practitioners to talk of the technologies and the technologised 
socio-cultural productions that emerge in our own local and regional 
contexts. With the rhetoric of globalisation and homogenisation on the 
one hand and the logic of the universalising nature of internet 
technologies on the other, there has been an un-reflexive theorising of 
digital identities, productions and interactions; this makes Asia more 
an exemplar for the existing Western ideas and hypotheses than a site 
where the drama of these technologies is still unfolding. This process 
is aided and abetted by the accelerated urbanisation that seeks to 
create nondescript and sterile spaces of consumption and lifestyle that 
subscribe to the idea of ‘Global’ or ‘Mega’ cities. Hence, across Asia, 
we see the mushrooming of cities and city-states – Singapore, Tokyo, 
Shanghai, Taipei, Bangalore – that work at actively erasing histories 
and producing these bubbles of consumption and globalisation that are 
disturbingly similar to each other.&lt;/p&gt;
&lt;p&gt;Such theorising also reinforces the disconnect that Western 
Cybercultures has been encouraging between the networked worlds and 
‘reality’, which, though affected and changed by the rise of these 
technologies, still remains strangely continuous and coherent in the 
midst of transformations. Moreover, it contains most theoretical and 
political interventions within the zones of urban consumption and 
change, thus producing a certain middle-class, self-referential work 
that concentrates on these areas, forgetting other crises and problems 
that still need attention. It also encourages a view of Asia as a 
docile, non-agential site upon which technologies are mapped, despite 
the fact that every year in this new century has seen Asian countries 
emerging as substantial stake-holders and players in production, 
proliferation and consumption of internet technologies. Along with the 
liberalisation of markets, the global digital revolution has also seen 
boundaries in social norms, cultural mores and political processes being
 pushed. We have been witness to formerly closed governments attempting 
to restructure themselves in the global world and to an unprecedented 
inflation and consumption in the developing Asian countries. We are in 
the middle of radical reconstruction of academic processes and market 
economies as public private partnerships become the norm. However, these
 landmark changes are often ignored or explored from a West-centric 
view-point, producing extreme and polarised reactions to the spread of 
Internet Technologies and the changes it entails.&lt;/p&gt;
&lt;h3&gt;Beyond Euphoria and Fear&lt;/h3&gt;
&lt;p&gt;Most responses to the widespread reach of internet technologies and 
digital forms have been grounded in euphoria or fear. There is a certain
 boundless celebration on the one hand, that proclaims the internet as 
forming the new public sphere, heralding the democratic potential and 
transparent structures that these networks have within them. The gurus 
have looked upon the internet in a ‘convergence theory’ mode where they 
announce, severally and variously, the death of earlier cultural 
productions like books, movies and music. The ability of digital 
technologies to aid innovation and creativity, as well as new forms of 
employment and entrepreneurship, has spurred the writing of many books 
and essays documenting the process. The roles that internet technologies
 have played in granting voice, visibility, and expression to many 
underprivileged communities, and the way they offer social and economic 
mobility in developing countries, have been unabashedly celebrated. 
Governments, civil society practitioners and theoreticians have all 
looked upon the internet as the panacea that will help level the 
landscape of social justice and political participation around the 
world.&lt;/p&gt;
&lt;p&gt;Simultaneously, there has also been a construction of ‘ecology of 
fear’ around the rise and spread of internet technologies. Massive 
global alarm exists around questions of easy access to pornography and 
other sexual behaviours online, not only for young adults but also for 
mature audiences of potential behaviour addicts. Online gambling has 
emerged as a huge concern and has been at the centre of much debate. 
Cyber-bullying on social networking systems, and cyber-terrorism on a 
much larger scale, have shocked us as new technologies get implicated in
 actions that have disastrous results both at the individual and the 
community level. With the tightening Intellectual Property regimes, 
there has also been great debate around digital piracy and the ability 
of the internet peer-to-peer networks to encourage acts of theft and 
copyright infringement. As the world becomes more digitised, attacks on 
sensitive information by crackers and scammers are also on the increase 
in various forms. The internet has been looked at with growing concern 
and alarm by parents, educators, policy-makers and corporate entities, 
who are all deeply involved in assuring safety, creating opportunities 
and catering to the needs of citizens and consumers.&lt;/p&gt;
&lt;p&gt;This simultaneously celebratory and pathologised approach often 
cripples research in the field of Internet and Society, because it 
constructs technology mediated practices and identities as at once 
universal (hence general) and unique (hence particular). Research that 
emerges is, consequently, confined to producing case-studies explaining 
what happens in each particular incident online and is unable to examine
 either the conditions within which the technologies emerge or the 
contexts that circumscribe certain socio-cultural behaviour. Such 
research, instead of examining the aesthetics and politics of technology
 mediated identities and practices, keeps on documenting the extremely 
fluid and rapidly changing landscape of the digital world – documenting 
fads, evolutions, innovations and the smaller changes therein – thus 
missing the forest for the leaf; the research ends up in concentrating 
on the ‘what happened’ rather than treating these happenings as 
symptomatic of larger paradigmatic changes that they often hint at.&lt;/p&gt;
&lt;h3&gt;Internet and the Convergence Theory&lt;/h3&gt;
&lt;p&gt;This is further complicated by the fact that many theorists and 
analysts seem to treat the internet more as a platform for convergence 
of old media forms in new digital packages. Such a view of internet 
technologies and digital cyberspaces leads to the populist descriptions 
of blogs as extensions of personal diaries, of digital cinema as a 
continuation of the celluloid image, of digitally morphed pictures as 
more sophisticated versions of earlier experiments with still images, of
 social networking systems as evolution of pre-existing social 
structures, of MMORPGs (Massive Multiple Online Role Playing Games) as 
merely complex forms of gaming. These descriptions fail to take into 
account that internet technologies, especially digital cyberspaces, 
while indeed affecting and transforming existing forms of media and 
cultural production, also lead to the emergence of new and interesting 
forms of expression, consumption and interaction.&lt;/p&gt;
&lt;p&gt;Just as the field of Cybercultures has only a vocabulary granted by 
the West, it also lacks a vocabulary that is its own – most research in 
Cybercultures, especially in emerging information societies, relies on 
categories, concepts and ideas that were relevant for earlier popular 
cultural forms like books and movies. Transplanting categories of 
authorship, production, consumption, distribution, etc., and trying to 
map them onto the digital world leads to severe confusion and is a 
futile exercise. For example, if we look at the discourse around the 
online user generated encyclopaedia – Wikipedia - and use the earlier 
existing categories of an author, a reader, an editor and an 
institutional structure of producing knowledge, we immediately realise 
that the discussion cannot be sustained; the categories presuppose other
 forms of writing and production which are not as relevant in the 
digital worlds. Similarly, legal categories like possession, ownership, 
labour and copying are also being made redundant by the advent of the 
internet. As these categories fail to capture the new digital worlds, 
they also fail to explain the human-technology relationship that the 
field of Internet and Society seeks to explore. Despite investment in 
terms of efforts, time and money, much of the research becomes redundant
 because it does not have the vocabulary or the idea that analysis of 
these new digital spaces entails.&lt;/p&gt;
&lt;p&gt;The imagination of the convergent multimedia internet distracts from 
the fact that what appear to be earlier historic forms like text and 
moving images are, in the context of cyberspace and the Web 2.0 
revolution, actually new forms that need their own vocabulary that does 
not carry the baggage of earlier popular technologies. It is time to 
move away from talking about the Internet and its effects in analogies 
and to seek and create an independent&amp;nbsp; and effective language that takes
 into account the mechanics and the potentials of the Internet 
revolution.&lt;/p&gt;
&lt;h3&gt;Institutional Spaces: Internet &amp;amp; Society&lt;/h3&gt;
&lt;p&gt;It is within such contexts and to address questions like these that 
institutional spaces emerge in the field of Internet and Society. As 
more and more disciplines start focusing on internet technologies and 
their intersections with areas as diverse as identity, sexuality, 
governance, cultural production, political mobilisation and social 
transformation, institutions in this space are faced with the daunting 
question of what to concentrate on and how to define the scope of their 
activities. Many global organisations and interventions narrowly define 
the field through their own disciplinary positions and perspectives. The
 Berkman Centre of Internet and Society at the Harvard Law School, for 
example, examines the law and its intersections with the new internet 
technologies and practices. Sarai - a new media organisation in India - 
concentrates on art and cultural production as affected by digital 
technologies and practices. The Association of Internet Researchers 
builds a network of multi-disciplinary researchers and practitioners 
across the globe to meet annually for workshops and conferences and also
 share ideas through a mailing list, concentrating on existing phenomena
 on the World Wide Web. Several Communications and Media Studies schools
 also have established labs and workshops that focus on the internet 
technologies from their disciplinary grounding.&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society, a newly established research and
 advocacy centre founded in Bangalore, India, makes a shift from these 
discipline-bound approaches to Internet and Society, and inaugurates a 
multi-disciplinary, interactive space for theorists, researchers, 
students, practitioners, activists, artists and the larger public to 
initiate a dialogue in the field of Internet and Society. Rather than 
adopting a disciplinary framework, it takes the model of Asian Cultural 
Studies, seeking to produce a sustainable scholarship and methodology to
 talk of the relationship between emergent Internet technologies and the
 changes they produce in the Global South. It sets out to critically 
engage with concerns of digital pluralism, public accountability and new
 pedagogic practices through multidisciplinary research, intervention 
and collaboration, to understand and affect the shape and form of the 
internet and its relationship with the political, cultural, and social 
milieu of our times.&lt;/p&gt;
&lt;p&gt;At CIS, we recognise the contexts within which this field has 
developed and emerged and have initiated many programmes, projects and 
structures to deal with the questions that this essay has charted. 
Drawing from the pedagogy and frameworks developed within Cultural 
Studies in Asia, the research at CIS investigates the local, the 
contextual, the emergent and the negotiated nature of digital spaces and
 internet technologies at three levels – At the national level, looking 
to produce models of research by examining the history, the politics, 
the growth and the significance of internet technologies in the context 
of globalised India; At the regional level, focusing on the similarities
 that global urbanisation and digitisation are bringing to the emerging 
information societies in Asia and the acknowledging the dissimilarities 
that need to be addressed in each of these societies; At the global 
level, engaging with a much larger South-South discourse that 
strengthens the move to approach internet technologies as integral to 
our ways of living rather than of foreign import. Such an approach 
allows us to escape the often restrictive constraints of cybercultures 
discourse that stays within the domains of internet technologies and 
produces disconnect between Internet and Society. Instead, we expand the
 scope of internet technologies to see their relationships with larger 
political, social and cultural economies, lifestyles and consumption 
patterns, and identity and transformation structures in the rapidly 
changing world. In the first two years, for example, we are investing a 
large part of our research energies into producing the Histories of the 
Internets in India – inviting different disciplines and standpoints to 
trace the diverse historically important and culturally significant 
growth of Internet Technologies in India, thus de-homogenising the 
internet as well as the discourse within cybercultures.&lt;/p&gt;
&lt;p&gt;The policy and advocacy work at the Centre for Internet and Society, 
also contributes hugely to this localisation and narrativisation of the 
internet in India, by recognising the law and the State as the largest 
stakeholders in the growth and proliferation of these technologies. We 
have initiated campaigns and projects examining national laws regarding 
intellectual property rights regimes, piracy, e-commerce and security, 
accessibility and disability, to see how they are subject to 
modification with the growth of digital technologies. Original field 
work and ethnography with the consumers, practitioners, stakeholders and
 law enforcers about the nature of technology, its role in the larger 
imagination of the globalised Indian State, and the need to make 
sensitive and informed decisions, has already been initiated, along with
 dissemination platforms like workshops, seminars, meetings and 
conferences.&lt;/p&gt;
&lt;p&gt;Keeping in tune with our model of collaboration and consultation, the
 Society Members have also helped us generate a healthy momentum by 
representing us and helping us find resources around the globe. Prof. 
Subbiah Arunachalam has been travelling across Asia, Europe and North 
America, at international policy and activist forums, promoting Open 
Access to information and knowledge. Lawrence Liang has been involved in
 teaching both at the local and international levels, apart from 
presenting original and influential research examining the relationship 
that internet technologies have with questions of knowledge production, 
ownership and the law. Achal Prabala has been actively working with the 
Wikimedia foundation to facilitate user participation in knowledge 
production online. Atul Ramachandran has been working on developing 
mobile internet platforms for sharing news and information within the 
underprivileged communities in India. Vibodh Parthsarthy has been 
designing academic courses and encouraging research in the fields of 
internet technologies, governance and democracy.&lt;/p&gt;
&lt;p&gt;Because these questions have a much larger regional relevance – with 
the increasing description of Asia as the Mecca of piracy and digital 
infractions – we are also in the process of starting projects that do a 
survey of the laws around intellectual property rights, innovation and 
access in the Asian region, with Sunil Abraham (Director – Policy) 
guiding a team of in-house researchers and external collaborators. 
Cross-boundary research and analysis has also been initiated in terms of
 dialogues and comparative study of technology, space and globalisation,
 initiated by my seven month residential project in Shanghai, where we 
are examining the conditions of technologisation that make global spaces
 possible, in countries like China and India. Apart from these, the team
 of seven people has been making interventions in international 
workshops, conferences and forums, to start dialogues and discussions in
 the field of Internet and Society.&lt;/p&gt;
&lt;p&gt;A significant effort has been spent in starting awareness for the 
public – from the first documentation on our website of work in progress
 by our research and policy collaborators to regular contributions to 
local media sources to organisation of public talks and events – which 
is aimed at demystifying the internet technologies and giving more 
ownership and assurance to a larger public. Jimmy Wales, the founder of 
Wikipedia, gave a public talk on freedom, expression and the internet, 
citing anecdotes and examples from the phenomenal success and growth of 
Wikipedia. In a different media, independent film maker Jamie King 
screened his movies on the piracy cultures and innovation, in Bangalore,
 sparking conversations and debates about copyright, creative commons 
and the domain of cultural expression. Students and visiting artists 
from different countries, through the Shrishti School of Art Design and 
the efforts of Zeenath Hassan, came together at CIS for a discussion on 
fear and gender in public space and how digital technologies contribute 
to it. The discussion feels timely because only a month later, India saw
 the right wing cultural police tyrannising Bangalore and other parts of
 Karnataka, by perpetrating acts of brutal violence against women who 
they saw as progressive or in defiance of the right wing codes of 
decorum and behaviour. CIS was an active part of the ‘Pink Chaddi’ and 
‘Reclaim the Night’ campaigneering, mobilising and participation at a 
local and national level, as a response to these acts of regressive 
violence, using digital environments and platforms to garner support and
 ‘recruit’ people into showing their protest against such fundamental 
ideas and practices.&lt;/p&gt;
&lt;p&gt;Moreover, in order to develop and establish a more accessible 
vocabulary and understanding both within research, higher education and 
practice of internet and society questions, CIS has been investing in 
building national and regional networks of scholars, students and 
theorists in different disciplines to come and discuss the area. Courses
 have been designed and administered for undergraduate, post graduate 
and research students, in the disciplines of social sciences, management
 and media studies, journalism and communication studies, cultural 
studies etc. Networking with institutional and university spaces like 
the Centre for Culture, Media and Governance at the Jamia Millia Islamia
 in Delhi, Mudra Institute of Communications, Ahmedabad, Centre for the 
Study of Culture and Society, Bangalore, Christ University, Bangalore, 
Centre for Media and Culture Studies, at the Tata Institute of Social 
Sciences in Mumbai. We are also in conversation with regional spaces 
like the Centre for Contemporary Cultural Studies at the Shanghai 
University, The Open Source Initiative, International Development 
Research Centre, Hivos and the Asia Scholarship Foundation in Thailand, 
for extending our regional and global networks.&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society, Bangalore, is less than a year 
old and has already embarked upon so many different projects, found a 
wide range of collaborations, initiated diverse enquiries and has 
received the support and interest of a varied and credible list of 
organisations. This warm reception and enthused interest, is as much a 
sign of the evolving and dynamic nature of collaboration and 
consultation in Asia, as it is of the need for interdisciplinary spaces 
like The Centre for Internet and Society, in our times. We see our rapid
 progress as symptomatic of a much larger need to establish more 
institutional spaces that can cater to the widely expanding horizon of 
the field of Internet and Society. While it is indeed laudable that 
different disciplines have already started showing interest in studying 
and analysing these often invisible links between Internet and Society, 
it is also now time, to start looking at technology as more than just an
 object or platform of study. We can already see how, in the foreseeable
 future, the internet technologies are only going to become more 
ubiquitous and central to the crucial mechanics of survival and living. 
Spaces like CIS help us look at technologies like the internet, as not 
merely tools and techniques, but as entwined in the politics, aesthetics
 and economies of the time and spaces we live in.&lt;/p&gt;
&lt;h3&gt;About the Author&lt;/h3&gt;
&lt;p&gt;Nishant Shah is the co-founder and Director for Research at the &lt;a class="external-link" href="http://www.cis-india.org"&gt;Centre for Internet and Society&lt;/a&gt;, Bangalore. Nishant’s doctoral work examines the construction of 
technosocial subjectivities in India, at the intersections of digital 
technology, cyborg identities and globalised spaces. Nishant is the 
recipient of the Asia Scholarship Foundation’s grant which places him in
 Shanghai for a project on IT and the globalisation of Asian cities.&lt;/p&gt;
&lt;p&gt;Read the original published by Inter-Asia Cultural Studies &lt;a class="external-link" href="http://www.meworks.net/meworksv2a/meworks/page1.aspx?no=202672&amp;amp;step=1&amp;amp;newsno=19396"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/internet-society-challenges-next-steps'&gt;https://cis-india.org/internet-governance/internet-society-challenges-next-steps&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2011-12-23T05:56:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/internet-and-banking-a-trust-broken">
    <title>Internet and Banking: A Trust Broken</title>
    <link>https://cis-india.org/internet-governance/blog/internet-and-banking-a-trust-broken</link>
    <description>
        &lt;b&gt;Strap: Some cut down their daily meals and some lost their jobs as the banking sector took a major hit during internet shutdowns.&lt;/b&gt;
        &lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Darjeeling, West Bengal: &lt;/b&gt;As the Internet shutdown in Darjeeling touched the notorious landmark of 100 days in late September, its impact was felt by members of Gorkha Janmukti Morcha (GJM) — the party agitating for a separate state of Gorkhaland. The state government’s move had managed to impair the communication and coordination among the agitators.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;However, for most residents, lack of access to the internet meant months of crippled bank transactions and mounting financial strain. The impact of the move was felt by all sections of society and most services experienced a slowdown or complete paralysis.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Students from the town were among the worst hit as the internet ban cut off a steady flow of money from home for academic purposes.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;“I had to cut down my daily meals to once a day to save whatever little currency notes I had, especially since it was not clear when the ban would be lifted,” said Shradha Subba, a resident of Darjeeling who is pursuing her Bachelors degree in Kolkata.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Her parents were not able to send her money due to the ban and arranging cash from another state was also not an option. “I had no option but to borrow money and even that was difficult as all my friends were from the hills and faced the same problem,” said Subba.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The parents of many students also felt hard done by the shutdown and said they often found it difficult to communicate with their children. Transferring money for their monthly educational needs was also impossible. “We were able to make phone-calls to our children once in a while, but we could not see them as video-calling was out of the question. We also could not send the money for their semester fees on time and had to ask our relatives in Sikkim to arrange cash for them,” said a concerned mother whose daughter was studying in Delhi.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The ban on mobile internet was imposed on June 18, 2017. Two days later, broadband service was also restricted.  The initial shutdown was meant to last for only a week but it had since seen several extensions owing to non-cessation of agitations. Banks were left helpless especially in the face of uncertainty regarding when the restrictions would be lifted.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;“None of the banking services were functional and no transactions were done during the period of internet shutdown. Even the ATMs were closed and people could not be provided normal service,” said Jagabandhu Mondal, district branch manager, State Bank of India.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;People routinely missed bill payments and no online transactions were done during the course of the ban. Reports emerged of people travelling over 80 kilometres, either to Siliguri or to Sikkim, just to withdraw some money.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Those who had purchased new vehicles found themselves struggling to pay their monthly instalments despite having cash in their accounts. Travelling to Siliguri to pay the instalment was also daunting as the road transportation was restricted by agitating political parties and supporters picketing on the streets.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Santosh Rai, a resident who had purchased a car just before the internet ban, said: “I could not go to Siliguri or even pay online. Now I’m facing claims for penalty. It was very hard for the vehicle owners to pay the EMI for three months along with a penalty. I asked for help from my friends but how long will they pay.”&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;He claimed that several people were forced to default on payments due to the blanket ban imposed by the government. “We could have deposited the EMI but the banks were closed, and that is not our fault,” said Rai.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Another victim, Mukesh Rai, also echoed Santosh’s sentiments while describing how he had to default on EMI payments towards his new car. “I used to walk towards Melli, Rangpo, or Singtam (all small towns in Sikkim) to withdraw money as my family and I were in need of liquid cash. Even that became difficult mid-monsoon,” he said.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Experts also pointed out that the ban was enforced even as the rest of the country discussed Digital India and a push towards cashless economy.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Another resident, Pema Namgyal, said he had lost a job because of the ban on internet services. He had opted to work from home for an advertising agency based out of Bangalore. “I had taken up an editing and copywriting job with an advertising agency. I had an issue with my spine and since long leaves are not possible in creative agencies, I opted to work from home. Five days after I reached here, an indefinite strike was called and the internet was shut down. I couldn’t work as per my client’s schedule and when I could not coordinate with him, he looked for another copywriter and asked me to refund an advance payment he had made,” said Namgyal.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The manager of an HDFC bank branch, Paul Tshring Lepcha, said, “We use BSNL connections usually for banking work and once the network was down we had a hard time updating our system… there are alternative portals like Airtel and Vodafone but even that was of no use at the time,” recalls Lepcha,&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Book size of private banks too saw a drop in these 100 days and the regulation regarding monthly maintenance of ₹5,000 in their customers’ accounts could not be continued. Officials from Indusland Bank said that people even started preferring government banks as they have a lower maintenance requirement. “During the ban period, no new account holders were registered and the mutual funds market also experienced a lull,” said an official from a private bank.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Roshan Gupta is a Siliguri-based journalist and a member of &lt;a href="http://www.101reporters.com/"&gt;101Reporters.com&lt;/a&gt;, a pan-India network of grassroots reporters.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Shutdown stories are the output of a collaboration between 101 Reporters and CIS with support from Facebook.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/internet-and-banking-a-trust-broken'&gt;https://cis-india.org/internet-governance/blog/internet-and-banking-a-trust-broken&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Roshan Gupta</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Shutdown</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-12-19T16:10:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-nytimes-vikas-bajaj-aug-21-2012-internet-analysts-question-indias-efforts-to-stem-panic">
    <title>Internet Analysts Question India’s Efforts to Stem Panic</title>
    <link>https://cis-india.org/news/www-nytimes-vikas-bajaj-aug-21-2012-internet-analysts-question-indias-efforts-to-stem-panic</link>
    <description>
        &lt;b&gt;The Indian government’s efforts to stem a weeklong panic among some ethnic minorities has again put it at odds with Internet companies like Google, Facebook and Twitter. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Vikas Bajaj was &lt;a class="external-link" href="http://www.nytimes.com/2012/08/22/business/global/internet-analysts-question-indias-efforts-to-stem-panic.html"&gt;published&lt;/a&gt; by New York Times on August 21, 2012. Sunil Abraham is quoted. This was reposted in &lt;a class="external-link" href="http://www.ndtv.com/article/india/internet-analysts-question-india-s-efforts-to-stem-panic-257760"&gt;NDTV&lt;/a&gt; on August 22, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Officials in New Delhi, who have had disagreements with the companies over restrictions on free speech, say the sites are not responding quickly enough to their requests to delete and trace the origins of doctored photos and incendiary posts aimed at people from northeastern India. After receiving threats online and on their phones, tens of thousands of students and migrants from the northeast have left cities like Bangalore, Pune and Chennai in the last week.&lt;br /&gt;&lt;br /&gt;The government has blocked 245 Web pages since Friday, but still many sites are said to contain fabricated images of violence against Muslims in the northeast and in neighboring Myanmar meant to incite Muslims in cities like Bangalore and Mumbai to attack people from the northeast. India also restricted cellphone users to five text messages a day each for 15 days in an effort to limit the spread of rumors.&lt;br /&gt;&lt;br /&gt;Officials from Google and industry associations said they were cooperating fully with the authorities. Some industry executives and analysts added that some requests had not been heeded because they were overly broad or violated internal policies and the rights of users.&lt;br /&gt;&lt;br /&gt;The government, used to exerting significant control over media like newspapers, films and television, has in recent months been frustrated in its effort to extend similar and greater regulations to Web sites, most of which are based in the United States. Late last year, an Indian minister tried to get social media sites to prescreen content created by their users before it was posted. The companies refused and the attempt failed under withering public criticism.&lt;br /&gt;&lt;br /&gt;While just 100 million of India’s 1.2 billion people use the Internet regularly, the numbers are growing fast among people younger than 25, who make up about half the country’s population. For instance, there were an estimated 46 million active Indian users on Facebook at the end of 2011, up 132 percent from a year earlier.&lt;br /&gt;&lt;br /&gt;Sunil Abraham, an analyst who has closely followed India’s battles with Internet companies, said last week’s effort to tackle hate speech was justified but poorly managed. He said the first directive from the government was impractically broad, asking all Internet “intermediaries” — a category that includes small cybercafes, Internet service providers and companies like Google and Facebook — to disable all content that was “inflammatory, hateful and inciting violence.”&lt;br /&gt;&lt;br /&gt;“The Internet intermediaries are responding slowly because now they have to trawl through their networks and identify hate speech,” said Mr. Abraham, executive director of the Center for Internet and Society, a research and advocacy group based in Bangalore. “The government acted appropriately, but without sufficient sophistication.”&lt;br /&gt;&lt;br /&gt;In the days since the first advisory went out on Aug. 17, government officials have asked companies to delete dozens of specific Web pages. Most of them have been blocked, but officials have not publicly identified them or specified the sites on which they were hosted. Ministers have blamed groups in Pakistan, a neighbor with which India has tense relations, for creating and uploading many of the hateful pages and doctored images.&lt;br /&gt;&lt;br /&gt;A minister in the Indian government, Milind Deora, acknowledged that officials had received assistance from social media sites but said officials were hoping that the companies would move faster.&lt;br /&gt;&lt;br /&gt;“There is a sense of importance and urgency, and that’s why the government has taken these out-of-the-way decisions with regards to even curtailing communications,” Mr. Deora, a junior minister of communications and information technology, said in a telephone interview. “And we are hoping for cooperation from the platforms and companies to help us as quickly as possible.”&lt;br /&gt;&lt;br /&gt;Indian officials have long been concerned about the power of modern communications to exacerbate strife and tension among the nation’s many ethnic and religious groups. While communal violence has broadly declined in the last decade, in part because of faster economic growth, many grievances simmer under the surface. Most recently, fighting between the Bodo tribe and Muslims in the northeastern state of Assam has displaced about half a million people and, through text messages and online posts, affected thousands more across India.&lt;br /&gt;&lt;br /&gt;Officials at social media companies, speaking on the condition of anonymity to avoid offending political leaders, said that they were moving as fast as they could but that policy makers must realize that the company officials have to follow their own internal procedures before deleting content and revealing information like the Internet protocol addresses of users.&lt;br /&gt;&lt;br /&gt;“Content intended to incite violence, such as hate speech, is prohibited on Google products where we host content, including YouTube, Google Plus and Blogger,” Google said in a statement. “We act quickly to remove such material flagged by our users. We also comply with valid legal requests from authorities wherever possible.”&lt;br /&gt;&lt;br /&gt;Facebook said in a statement that it also restricts hate speech and “direct calls for violence” and added that it was “working through” requests to remove content. Twitter declined to comment on the Indian government’s request.&lt;br /&gt;&lt;br /&gt;Telecommunications company executives criticized the government’s response to the crisis as being excessive and clumsy. There was no need to limit text messages to just five a day across the country when problems were concentrated in a handful of big cities, said Rajan Mathews, director general of the Cellular Operators Association of India.&lt;br /&gt;&lt;br /&gt;“It could have been handled much more tactically,” he said.&lt;br /&gt;&lt;br /&gt;Others said the government could have been more effective had it quickly countered hateful and threatening speech by sending out its own messages, which it was slow to do when migrants from the northeast began leaving Bangalore on Aug. 15.&lt;br /&gt;&lt;br /&gt;“It has to also reach out on social networking and Internet platforms and dismantle these rumors,” Mr. Abraham said, “and demonstrate that they are false.”&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A version of this article appeared in print on August 22, 2012, on page B4 of the New York edition with the headline: Internet Moves by India to Stem Rumors and Panic Raise Questions.&lt;/p&gt;
&lt;hr /&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-nytimes-vikas-bajaj-aug-21-2012-internet-analysts-question-indias-efforts-to-stem-panic'&gt;https://cis-india.org/news/www-nytimes-vikas-bajaj-aug-21-2012-internet-analysts-question-indias-efforts-to-stem-panic&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-09-04T11:46:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/international-view-of-state-of-the-art-of-cryptography-and-security-and-its-use-in-practice">
    <title>International View of the State-of-the-Art of Cryptography and Security and its Use in Practice (IV)</title>
    <link>https://cis-india.org/news/international-view-of-state-of-the-art-of-cryptography-and-security-and-its-use-in-practice</link>
    <description>
        &lt;b&gt;Building on the workshop in Dagstuhl in June-July 2011 (International View of the State-of-the-Art of Cryptography and Security and its Use in Practice), Beijing  (International View of the State-of-the-Art of Cryptography and Security and its Use in Practice  II), and Athens (International View of the State-of-the-Art of Cryptography and Security and its Use in Practice  III) that set the stage for discussions on cryptography among a group of key researchers from Europe, Asia, and North America, the  one day workshop in Bangalore, following AsiaCrypt 2013  will again bring together internationally recognized scientists to discuss direction and development in  theoretical and applied cryptography and surrounding societal issues. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;There will be four focus areas:&lt;/p&gt;
&lt;ul style="list-style-type: disc; text-align: justify; "&gt;
&lt;li&gt;Real-life cryptography&lt;/li&gt;
&lt;li&gt;Standardization&lt;/li&gt;
&lt;li&gt;Regulatory requirements&lt;/li&gt;
&lt;li&gt;Innovative use cases for cryptography&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Each focus area will be anchored in an invited talk               and/or panel, but the emphasis will be on discussion. The               participants will address broad research directions in               encryption and secure computation and their applications               in cloud computing, smart grid, mobile and embedded               computing, hardware, software, and network security. They               will also examine non-technical issues surrounding               deployment and adoption of new security technologies using               encryption, such as privacy or economic consideration.               Approaches and projects in different countries will be               discussed, in order to increase awareness of the R&amp;amp;D               activities internationally and continue to for a strong               community of research and practice and in order to               generate new ideas in this field.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the workshop will cover a broad spectrum of               issues from the list presented below with a specific focus               that will be announced shortly. The topics of               interest include (but are not limited to) the following               subjects:&lt;/p&gt;
&lt;ul style="list-style-type: disc; text-align: justify; "&gt;
&lt;li&gt; Secret versus public ciphers&lt;/li&gt;
&lt;li&gt; Cipher and algorithm development process&lt;/li&gt;
&lt;li&gt; Algorithms maturity and review&lt;/li&gt;
&lt;li&gt; Lightweight cryptography&lt;/li&gt;
&lt;li&gt; New requirements for cryptography for novel                 applications&lt;/li&gt;
&lt;li&gt; Cipher implementation and interoperability&lt;/li&gt;
&lt;li&gt; Standardization&lt;/li&gt;
&lt;li&gt; Regulatory initiatives&lt;/li&gt;
&lt;li&gt; Privacy enhancing cryptography&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;8:15 a.m.&lt;/td&gt;
&lt;td&gt;Registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8:30 a.m.&lt;/td&gt;
&lt;td&gt;Opening statement (Organizers)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8:40 a.m.&lt;/td&gt;
&lt;td&gt;Opening keynote (TBD)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:10 a.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Panel 1 and discussion: Advances in cryptography; new use cases, Participants:  Dan Bernstein (University of Illinois at Chicago), Tanja Lange (Eindhoven), Veni Madhavan (ERNET), others TBD&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30 a.m.&lt;/td&gt;
&lt;td&gt;Coffee break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00 a.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Panel II and  discussion: Regulatory environment and standardization: Sunil Abraham (India CIS), Kazue Sako (NEC), Claire Vishik (Intel), others TBD&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.30 a.m.&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.30 p.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Panel 3 and discussion: Implementation and interoperability for new environments (e.g., smart grid, Internet of things): Reji Kumar (Smart Grid India), other TBD&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.00 p.m.&lt;/td&gt;
&lt;td&gt;Coffee break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.30 p.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Panel IV and discussion: Privacy, social networking, ubiquitous connectivity and cryptography: Rene Peralta (NIST), Kumar Ranganathan, others TBD&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.00 p.m.&lt;/td&gt;
&lt;td&gt;Thoughts and next workshop&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.20 p.m.&lt;/td&gt;
&lt;td&gt;Closing statements (Organizers)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.30 p.m.&lt;/td&gt;
&lt;td&gt;Adjourn&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul style="list-style-type: disc; text-align: justify; "&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/international-view-of-state-of-the-art-of-cryptography-and-security-and-its-use-in-practice'&gt;https://cis-india.org/news/international-view-of-state-of-the-art-of-cryptography-and-security-and-its-use-in-practice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-26T09:05:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/international-symposium-on-electronic-art-isea-2017">
    <title>International Symposium on Electronic Art (ISEA 2017)</title>
    <link>https://cis-india.org/internet-governance/news/international-symposium-on-electronic-art-isea-2017</link>
    <description>
        &lt;b&gt;Sharat Chandra Ram was part of a 90 minute academic panel at ISEA 2017 organized by the University of Caldas, Manizales in Columbia. The event was held from June 11 to 16, 2017.&lt;/b&gt;
        &lt;div&gt;The Panel was titled - “&lt;b&gt;Biocreation of Informatics: Rethinking Data Ecosystems in the Network Economy&lt;/b&gt;. The Panel consisted of 4 papers:&lt;/div&gt;
&lt;div&gt;1. &lt;b&gt;Pilar Saenz&lt;/b&gt; - Karisma Foundation, Bogota -&lt;b&gt; Data and Public Policy&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;2. &lt;b&gt;Offray Vladimir Luna&lt;/b&gt; - HackBo &amp;amp; University of Caldas  - &lt;b&gt;Civic Media and Data (H)ac(K)tivism&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;3. &lt;b&gt;Jose Cuartas&lt;/b&gt; - Los Libertadores &amp;amp; University of Caldas  - &lt;b&gt;Democratisation of Data and Internet of Things&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;4. Sharath Chandra Ram - Signal Territories, Infrastructures and Intermediaries&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/international-symposium-on-electronic-art-isea-2017'&gt;https://cis-india.org/internet-governance/news/international-symposium-on-electronic-art-isea-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-07T01:49:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/digitization-and-its-impact-on-society">
    <title>International Summer School: "Digitization and its Impact on Society"</title>
    <link>https://cis-india.org/news/digitization-and-its-impact-on-society</link>
    <description>
        &lt;b&gt;Dr. Nishant Shah will be the key note speaker in the session "Social Networks and the Revolution of Political Communication". The event is being hosted by the Dresden Center for Digital Linguistics from September 29 to October 5, 2013. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://linguistik.zih.tu-dresden.de/digitization/wp-content/uploads/2013/08/Programme_summerschool_DigitizationV2.pdf"&gt;Click to read the full programme schedule published by the Dresden Center for Digital Linguistics&lt;/a&gt;. More details on the program &lt;a class="external-link" href="http://linguistik.zih.tu-dresden.de/digitization/wp-content/uploads/2013/05/Program_summerschool-Digitization1.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Summer School takes place on the TUD campus, mainly in the buildings of the Faculty of Computer Science (Nöthnitzer Straße 46) and the Max Planck Institute for the Physics of Complex Systems (Nöthnitzer Straße 38).&lt;/p&gt;
&lt;h3&gt;Co - Conveners and Scientific Committee&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Noah Bubenhofer, Dresden Center for Digital Linguistics, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Thomas Bürger, Saxon State and University Library Dresden (SLUB)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wolfgang Donsbach, Chair of Communication Studies I, Institute of Media and Communication, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Katrin Etzrodt, Institute of Media and Communication, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Horst - Peter Götting, Chair of Civil Law and Intellectual Property Law, Institute for Intellectual Property, Competition and Media Law, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Lutz Hagen, Chair of Communications Studies II, Institute of Media and Communication, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Thomas Köhler, Professorship for Educational Technology, Institute for Vocational Education, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Holger Kuße,Chair of Linguistics and History of Slavonic Languages, Institute of Slavonic Studies, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Claudia Lange, Chair of English Linguistics, Institute of English and American Studies, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rebecca Renatus, Institute of Media and Communication, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Anne Lauber-Rönsberg, Institute for Intellectual Property, Competition and Media Law, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Joachim Scharloth, Chair of Applied Linguistics, Institute of German Studies, TU Dresden&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Eric Schoop, Chair of Business Informatics, esp Information Management, Faculty of Business and Economics&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Marcel Thum, Chair of Public Economics, TU Dresden&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Coordination:&lt;/b&gt; Dresden Center for Digital Linguistics, Joachim Scharloth, Noah Bubenhofer, Yvonne Krämer&lt;/p&gt;
&lt;p&gt;Website: &lt;a class="external-link" href="http://linguistik.zih.tu-dresden.de/digitization/"&gt;http://linguistik.zih.tu-dresden.de/digitization/&lt;/a&gt;&lt;br /&gt;Email: &lt;a class="mail-link" href="mailto:summerschool.gsw@tu-dresden.de"&gt;summerschool.gsw@tu-dresden.de&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/digitization-and-its-impact-on-society'&gt;https://cis-india.org/news/digitization-and-its-impact-on-society&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-11-20T10:00:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018">
    <title>International Network on Feminist Approaches to Bioethics 2018</title>
    <link>https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018</link>
    <description>
        &lt;b&gt;The event was co-organized by Feminist Approaches to Bioethics and Sama - A Resource Centre for Women and Health and was held at St. John's Medical College in Bangalore between December 3 and 5, 2018. &lt;/b&gt;
        &lt;p&gt;Aayush Rathi and Ambika Tandon participated in the event as speakers. Aayush presented a paper 'Sexual Surveillance and Data Regimes: Development in the Data Economy' co-authored by himself and Ambika.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/fab-congress/"&gt;Download the agenda&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018'&gt;https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-04T15:46:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/sopa">
    <title> International human rights community vs SOPA</title>
    <link>https://cis-india.org/news/sopa</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society was mentioned in a news story published in BoingBoing. Cory Doctorow wrote the story published on November 17, 2011.&lt;/b&gt;
        
&lt;p&gt;An enormous, diverse global coalition of press freedom and human rights groups have signed onto a letter (PDF) opposing America's Stop Online Piracy Act, the worst proposed Internet law in the USA's legislative history. Included signatories are as varied as India's Center for Internet and Society, the Church of Sweden, Colombia's Karisma, the UK Open Rights Group, and Reporters Without Borders. The letter itself is a great piece of writing: "This is as unacceptable to the international community as it would be if a foreign country were to impose similar measures on the United States." (&lt;em&gt;Thanks, Alan!&lt;/em&gt;)&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original published in BoingBoing &lt;a class="external-link" href="http://boingboing.net/2011/11/17/international-human-rights-com.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/sopa'&gt;https://cis-india.org/news/sopa&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-28T10:15:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/vipul-kharbanda-april-29-2019-international-cooperation-in-cybercrime-the-budapest-convention">
    <title>International Cooperation in Cybercrime: The Budapest Convention</title>
    <link>https://cis-india.org/internet-governance/blog/vipul-kharbanda-april-29-2019-international-cooperation-in-cybercrime-the-budapest-convention</link>
    <description>
        &lt;b&gt;In today’s increasingly digitized world where an  increasing volume of information is being stored in the digital format, access to data generated by digital technologies and on digital platforms is important in solving crimes online and offline.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/budapest-convention-paper.pdf"&gt;&lt;b&gt;Click to download the file here &lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However, the global nature of the internet challenges traditional methods of law enforcement by forcing states to cooperate with each other for a greater variety and number of cases than ever before in the past. The challenges associated with accessing data across borders in order to be able to fully investigate crimes which may otherwise have no international connection forces states to think of easier and more efficient ways of international cooperation in criminal investigations. One such mechanism for international cooperation is the Convention on Cybercrime adopted in Budapest (“&lt;/span&gt;&lt;strong&gt;Budapest&lt;/strong&gt;&lt;span&gt; &lt;/span&gt;&lt;strong&gt;Convention&lt;/strong&gt;&lt;span&gt;”). Drafted by the Council of Europe along with Canada, Japan, South Africa and the United States of America it is the first and one of the most important multilateral treaties addressing the issue of cybercrime and international cooperation.&lt;/span&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Extradition&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 24 of the Budapest Convention deals with the issue of extradition of individuals for offences specified in Articles 2 to 11 of the Convention. Since the Convention allows Parties to prescribe different penalties for the contraventions contained in Articles 2-11, it specifies that extradition cannot be asked for unless the crime committed by the individual carries a maximum punishment of deprivation of liberty for atleast one year.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In order to not complicate issues for Parties which may already have extradition treaties in place, the Convention clearly mentions that in cases where such treaties exist, extradition will be subject to the conditions provided for in such extradition treaties.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Although extradition is also subject to the laws of the requested Party, if the laws provide for the existence of an extradition treaty, such a requirement shall be deemed to be satisfied by considering the Convention as the legal basis for the extradition.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Convention also specifies that the offences mentioned in Articles 2 to 11 shall be deemed to be included in existing extradition treaties and Parties shall include them in future extradition treaties to be executed.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention also recognises the principle of "&lt;em&gt;aut dedere aut judicare&lt;/em&gt;" (extradite or prosecute) and provides that if a Party refuses to extradite an offender solely on the basis that it shall not extradite their own citizens,&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; then, if so requested, such Party shall prosecute the offender for the offences alleged in the same manner as if the person had committed a similar offence in the requested Party itself.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Convention also requires the Secretary General of the Council of Europe to maintain an updated register containing the authorities designated by each of the Parties for making or receiving requests for extradition or provisional arrest in the absence of a treaty.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Mutual Assistance Requests&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention imposes an obligation upon the Parties to provide mutual assistance “to the widest extent possible” for investigations or proceedings of criminal offences related to computer systems and data.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Just as in the case of extradition, the mutual assistance to be provided is also subject to the conditions prescribed by the domestic law of the Parties as well as mutual assistance treaties between the Parties.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, it is in cases where no mutual assistance treaties exist between the Parties that the Convention tries to fill the lacuna and provide for a mechanism for mutual assistance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention requires each Party to designate an authority for the purpose of sending and answering mutual assistance requests from other Parties as well as transmitting the same to the relevant authority in their home country. Similar to the case of authorities for extradition, the Secretary General is required to maintain an updated register of the central authorities designated by each Party.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Recognising the fact that admissibility of the evidence obtained through mutual assistance in the domestic courts of the requesting Party is a major concern, the Convention provides that the mutual assistance requests are to be executed in accordance with the procedures prescribed by the requesting Party unless such procedures are incompatible with the laws of the requested Party.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parties are allowed to refuse a request for mutual assistance on the grounds that (i) the domestic laws of the requested party do not allow it to carry out the request;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (ii) the request concerns an offence considered as a political offence by the requested Party;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or (iii) in the opinion of the requested Party such a request is likely to prejudice its sovereignty, security, &lt;em&gt;ordre public &lt;/em&gt;or other essential interests.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The requested Party is also allowed to postpone any action on the request if it thinks that acting on the request would prejudice criminal investigations or proceedings by its own authorities.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In cases where assistance would be refused or postponed, the requested Party may consult with the other Party and consider whether partial or conditional assistance may be provided.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In practice it has been found that though States refuse requests on a number of grounds,&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; some states even refuse cooperation in the event that the case is minor but requires an excessive burden on the requested state.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A case study of a true instance recounted below gives an idea of the effort and resources it may take for a requested state to carry out a mutual assistance request:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In the beginning of 2005, a Norwegian citizen (let’s call him A.T.) attacked a bank in Oslo. He intended to steal money and he did so effectively. During his action, a police officer was killed. A.T. ran away and could not be found in Norway. Some days later, police found and searched his home and computer and discovered that A.T. was the owner of an email account from a provider in the United Kingdom. International co-operation was required from British authorities which asked the provider to put his email account under surveillance. One day, A.T. used his email account to send an email message. In the United Kingdom, police asked the ISP information about the IP address where the communication came from and it was found that it came from Spain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;British and Spanish authorities installed an alert system whose objective was to know, each time that A.T. used his email account, where he was. Thus, each time A.T. used his account, British police obtained the IP address of the computer in the origin of the communication and provided it immediately to Spanish police. Then, Spanish police asked the Spanish ISPs about the owner or user of the IP address. All the connexions were made from cybercafés in Madrid. Even proceeding to that area very quickly, during a long period of time it was not possible to arrive at those places before A.T. was gone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Later, A.T. began to use his email account from a cybercafé in Malaga. This is a smaller town than Madrid and there it was possible to put all the cybercafés from a certain area permanently under physical surveillance. After some days of surveillance, British police announced that A.T. was online, using his email account, and provided the IP address. Very rapidly, the Spanish ISP informed Spanish police from the concrete location of the cybercafé what allowed the officers in the street to identify and arrest A.T. in place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A.T. was extradited to Norway and prosecuted.”&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear from the above that although the crime occurred in Norway, a lot of work was actually done by the authorities in the United Kingdom and Spain. In a serious case such as this where there was a bank robbery as well as a murder involved, the amount of effort expended by authorities from other states may be appropriate but it is unlikely that the authorities in Britain and Spain would have allocated such resources for a petty crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In sensitive cases where the requests have to be kept secret or confidential for any reason, the requesting Party has to specify that the request should be kept confidential except to the extent required to execute the request (such as disclosure in front of appropriate authorities to obtain the necessary permissions). In case confidentiality cannot be maintained the requested Party shall inform the requesting Party of this fact, which shall then take a decision regarding whether to withdraw the request or not.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; On the other hand the requested Party may also make its supply of information conditional to it being kept confidential and that it not be used in proceedings or investigations other than those stated in the request.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; If the requesting Party cannot comply with these conditions it shall inform the requested Party which will then decide whether to supply the information or not.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the normal course the Convention envisages requests being made and executed through the respective designated central authorities, however it also makes a provision, in urgent cases, for requests being made directly by the judicial authorities or even the Interpol.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Even in non urgent cases, if the authority of the requested Party is able to comply with the request without making use of coercive action, requests may be transmitted directly to the competent authority without the intervention of the central authority.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention clarifies that through these mutual assistance requests a Party may ask another to (i) either search, seize or disclose computer data within its territory,&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (ii) provide real time collection of traffic data with specified communications in its territory;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and (iii) provide real time collection or recording of content data of specified communications.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The provision of mutual assistance specified above has to be in accordance with the domestic laws of the requested Party.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The procedure for sending mutual assistance requests under the Convention is usually the following:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Preparation of a request for mutual assistance by the prosecutor or enforcement agency which is responsible for an investigation.&lt;/li&gt;
&lt;li&gt;Sending the request by the prosecutor or enforcement agency to the Central Authority for verification (and translation, if necessary).&lt;/li&gt;
&lt;li&gt;The Central Authority then submits the request either, (i) to the foreign central authority, or (ii) directly to the requested judicial authority.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The following procedure is then followed in the corresponding receiving Party:&lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Receipt of the request by the Central Authority.&lt;/li&gt;
&lt;li&gt;Central Authority then examines the request against formal and legal requirements (and translates it, if necessary).&lt;/li&gt;
&lt;li&gt;Central Authority then transmits the request to the competent prosecutor or enforcement agency to obtain court order (if needed).&lt;/li&gt;
&lt;li&gt;Issuance of a court order (if needed).&lt;/li&gt;
&lt;li&gt;Prosecutor orders law enforcement (e.g. cybercrime unit) to obtain the requested data.&lt;/li&gt;
&lt;li&gt;Data obtained is examined against the MLA request, which may entail translation or&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;using a specialist in the language.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The information is then transmitted to requesting State via MLA channels.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In practice, the MLA process has generally been found to be inefficient and this inefficiency is even more pronounced with respect to electronic evidence. The general response times range from six months to two years and many requests (and consequently) investigations are often abandoned.&lt;/span&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Further, the lack of awareness regarding procedure and applicable legislation of the requested State lead to formal requirements not being met. Requests are often incomplete or too broad; do not meet legal thresholds or the dual criminality requirement.&lt;/span&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Preservation Requests&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Budapest Convention recognises the fact that computer data is highly volatile and may be deleted, altered or moved, rendering it impossible to trace a crime to its perpetrator or destroying critical proof of guilt. The Convention therefore envisioned the concept of preservation orders which is a limited, provisional measure intended to take place much more rapidly than the execution of a traditional mutual assistance. Thus the Convention gives the Parties the legal ability to obtain the expeditious preservation of data stored in the territory of another (requested) Party, so that the data is not altered, removed or deleted during the time taken to prepare, transmit and execute a request for mutual assistance to obtain the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention therefore provides that a Party may request another Party to obtain the expeditious preservation of specified computer data in respect of which such Party intends to submit a mutual assistance request. Once such a request is received the other Party has to take all appropriate measures to ensure compliance with such a request. The Convention also specifies that dual criminality is not a condition to comply with such requests for preservation of data since these are considered to be less intrusive than other measures such as seizure, etc.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However in cases where parties have a dual criminality requirement for providing mutual assistance they may refuse a preservation request on the ground that at the time of providing the data the dual criminality condition would not be met, although in regard to the offences covered under Articles 2 to 11 of the Convention, the requirement of dual criminality will be deemed to have been satisfied.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In addition to dual criminality a preservation request may also be refused on the grounds that (i) the offence alleged is a political offence; and (ii) execution of the request would likely to prejudice the sovereignty, security, &lt;em&gt;ordre public &lt;/em&gt;or other essential interests of the requested Party.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case the requested Party feels that preservation will not ensure the future availability of the data or will otherwise prejudice the investigation, it shall promptly inform the requesting Party which shall then take a decision as to whether to ask for the preservation irrespective.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Preservation of the data pursuant to a request will be for a minimum period of 60 days and upon receipt of a mutual assistance request will continue to be preserved till a decision is taken on the mutual assistance request.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; If the requested Party finds out in the course of executing the preservation request that the data has been transmitted through a third state or the requesting Party itself, it has a duty to inform the requesting Party of such facts as well as provide it with sufficient traffic data in order for it to be able to identify the service provider in the other state.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Jurisdiction and Access to Stored Data &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The problem of accessing data across international borders stems from the international law principle which provides that the authority to enforce (an action) on the territory of another State is permitted only if the latter provides consent for such behaviour. States that do not acquire such consent may therefore be acting contrary to the principle of non-intervention and may be in violation of the sovereignty of the other State.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Convention specifies two situations in which a Party may access computer data stored in another Party’s jurisdiction; (i) when such data is publicly available; and (ii) when the Party has accessed such data located in another state through a computer system located in its own territory provided it has obtained the “lawful and voluntary consent of the person who has the lawful authority to disclose the data to the Party through that computer system”.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These are two fairly obvious situations where a state should be allowed to use the computer data without asking another state, infact if a state was required to take the permission of the state in the territory of which the data was physically located even in these situations, then it would likely delay a large number of regular investigations where the data would otherwise be available but could not be legally used unless the other country provided it under the terms of the Convention or some other legal instrument. At the time of drafting the Convention it appears that Parties could not agree upon any other situations where it would be universally acceptable for a state to unilaterally access data located in another state, however it must be noted that other situations for unilaterally accessing data are neither authorized, nor precluded.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the language of the Budapest Convention stopped shy of addressing other situations law enforcement agencies had been engaged in unilateral access to data stored in other jurisdictions on an uncertain legal basis risking the privacy rights of individuals raising concerns regarding national sovereignty.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn41"&gt;&lt;sup&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It was to address this problem that the Cybercrime Committee established the “ad-hoc sub-group of the T-CY on jurisdiction and transborder access to data and data flows” (the “Transborder Group”) in November 2011 which came out with a Guidance Note clarigying the legal position under Article 32.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Guidance Note # 3 on Article 32 by the Cybercrime Committee specifies that Article 32(b) would not cover situations where the data is not stored in another Party or where it is uncertain where the data is located. A Party is also not allowed to use Article 32(b) to obtain disclosure of data that is stored domestically. Since the Convention neither authorizes nor precludes other situations, therefore if it is unknown or uncertain that data is stored in another Party, Parties may need to evaluate themselves the legitimacy of a search or other type of access in the light of domestic law, relevant international law principles or considerations of international relations.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn42"&gt;&lt;sup&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Budapest Convention does not require notification to the other Party but parties are free to notify the other Party if they deem it appropriate.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The “voluntary and lawful consent” of the person means that the consent must be obtained without force or deception. Giving consent in order to avoid or reduce criminal charges would also constitute lawful and voluntary consent. If cooperation in a criminal investigation requires explicit consent in a Party, this requirement would not be fulfilled by agreeing to the general terms and conditions of an online service, even if the terms and conditions indicate that data would be shared with criminal justice authorities.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The person who is lawfully authorized to give consent is unlikely to include service providers with respect to their users’ data. This is because normally service providers would only be holders of the data, they would not own or control the data and therefore cannot give valid consent to share the data.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Guidance Note also specifies that with respect to the location of the person providing access or consent, while the standard assumption is that the person would be physically located in the requesting Party however there may be other situations, “It is conceivable that the physical or legal person is located in the territory of the requesting law enforcement authority when agreeing to disclose or actually providing access, or only when agreeing to disclose but not when providing access, or the person is located in the country where the data is stored when agreeing to disclose and/or providing access. The person may also be physically located in a third country when agreeing to cooperate or when actually providing access. If the person is a legal person (such as a private sector entity), this person may be represented in the territory of the requesting law enforcement authority, the territory hosting the data or even a third country at the same time.” Parties are also required to take into account the fact that third Parties may object (and some even consider it a criminal offence) if a person physically located in their territory is directly approached by a foreign law enforcement authority to seek his or her cooperation.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn46"&gt;&lt;sup&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Production Order&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A similar problem arises in case of Article 18 of the Convention which requires Parties to put in place procedural provisions to compel a person in their territory to provide specified stored computer data, or a service provider offering services in their territory to submit subscriber information.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It must be noted here, that the data in question must be already stored or existing data, which implies that this provision does not cover data that has not yet come into existence such as traffic data or content data related to future communications.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Since the term used in this provision is that the data must be within the “possession or control” of the person or the service provider, therefore this provision is also capable of being used to access data stored in the territory of a third party as long as the data is within the possession and control of the person on whom the Production Order has been served. In this regard it must be noted that the Article makes a distinction between computer data and subscriber information and specifies that computer data can only be asked for from a person (including a service provider) located within the territory of the ordering Party even if the data is stored in the territory of a third Party.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However subscriber information&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; can be ordered only from a service provider even if the service provider is not located within the territory of the ordering Party as long as it is offering its services in the territory of that Party and the subscriber information relates to the service offered in the ordering Party’s territory.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the power under Article 18 is a domestic power which potentially can be used to access subscriber data located in another State, the use of this Article may raise complicated jurisdictional issues. This combined with the growth of cloud computing and remote data storage also raises concerns regarding privacy and data protection, the jurisdictional basis pertaining to services offered without the service provider being established in that territory, as well as access to data stored in foreign jurisdictions or in unknown or multiple locations “within the cloud”.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Even though some of these issues require further discussions and a more nuanced treatment, the Cybercrime Committee felt the need to issue a Guidance Note to Article 18 in order to avoid some of the confusion regarding the implementation of this provision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 18(1)(b) may include a situation where a service provider is located in one jurisdiction, but stores the data in another jurisdiction. Data may also be mirrored in several jurisdictions or move between jurisdictions without the knowledge or control of the subscriber. In this regard the Guidance Note points out that legal regimes increasingly recognize that, both in the criminal justice sphere and in the privacy and data protection sphere, the location of the data is not the determining factor for establishing jurisdiction.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Guidance Note further tries to clarify the term “offering services in its territory” by saying that Parties may consider that a service provider is offering services if: (i) the service provider enables people in the territory of the Party to subscribe to its services (and does not, for example, block access to such services); and (ii) the service provider has established a real and substantial connection that Party. Relevant factors to determine whether such a connection has been established include “the extent to which a service provider orients its activities toward such subscribers (for example, by providing local advertising or advertising in the language of the territory of the Party), makes use of the subscriber information (or associated traffic data) in the course of its activities, interacts with subscribers in the Party, and may otherwise be considered established in the territory of a Party”.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A service provider will not be presumed to be offering services within the territory of a Party just because it uses a domain name or email address connected to that country.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Guidance Note provides a very elegant tabular illustration of its requirements to serve a valid Production Order on a service provider:&lt;sup&gt;&lt;sup&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn56"&gt;[56]&lt;/a&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p align="center"&gt;&lt;strong&gt;PRODUCTION ORDER CAN BE SERVED&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p align="center"&gt;IF&lt;/p&gt;
&lt;p&gt;The criminal justice authority has jurisdiction over the offence&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p align="center"&gt;AND&lt;/p&gt;
&lt;p&gt;The service provider is in possession or control of the subscriber information&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p align="center"&gt;AND&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;The service provider is in the territory of the Party&lt;/p&gt;
&lt;p&gt;(&lt;em&gt;Article 18(1)(a)&lt;/em&gt;)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Or&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A Party considers that a service provider is “offering its services in the territory of the Party” when, for example:&lt;/p&gt;
&lt;p&gt;- the service provider enables persons in the territory of the Party to subscribe to its services (and does not, for example, block access to such services);&lt;/p&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;p&gt;- the service provider has established a real and substantial connection to a Party. Relevant factors include the extent to which a service provider orients its activities toward such subscribers (for example, by providing local advertising or advertising in the language of the territory of the Party), makes use of the subscriber information (or associated traffic data) in the course of its activities, interacts with subscribers in the Party, and may otherwise be considered established in the territory of a Party.&lt;/p&gt;
&lt;p&gt;(&lt;em&gt;Article 18(1)(b)&lt;/em&gt;)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p align="center"&gt;AND&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;the subscriber information to be submitted is relating to services of a provider offered in the territory of the Party.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The existing processes for accessing data across international borders, whether through MLATs or through the mechanism established under the Budapest Convention are clearly too slow to be a satisfactory long term solution. It is precisely for that reason that the Cybercrime Committee has suggested alternatives to the existing mechanism such as granting access to data without consent in certain specific emergency situations;&lt;/span&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; or access to data stored in another country through a computer in its own territory provided the credentials for such access are obtained through lawful investigative activities.&lt;/span&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Another option suggested by the Cybercrime Committee is to look beyond the principle of territoriality, specially in light of the recent developments in cloud computing where the location of the data may not be certain or data may be located in multiple locations,&lt;/span&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; and look at a connecting legal factor as an alternative such as the “power of disposal”. This option implies that even if the location of the data cannot be determined it can be connected to the person having the power to “alter, delete, suppress or render unusable as well as the right to exclude other from access and any usage whatsoever”.&lt;/span&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn60"&gt;&lt;sup&gt;&lt;sup&gt;[60]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Language of Requests&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was found from practice that the question of the language in which the mutual assistance requests were made was a big issue in most States since it created problems such as delays due to translations, costly translations, quality of translations, etc. The Cybercrime Committee therefore suggested that an additional protocol be added to the Budapest Convention to stipulate that requests sent by Parties should be accepted in English atleast in urgent cases since most States accepted a request in English.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Due to these problems associated with the language of assistance requests, the Cybercrime Convention Committee has already released a provisional draft Additional Protocol to address the issue of language of mutual assistance requests for public comments.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn62"&gt;&lt;sup&gt;&lt;sup&gt;[62]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;24/7 Network&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parties are required to designate a point of contact available on a twenty-four hour, seven-day-a week basis, in order to ensure the provision of immediate assistance for the purpose of investigations or proceedings concerning criminal offences related to computer systems and data, or for the collection of evidence, in electronic form, of a criminal offence. The point of contact for each Party is required to have the capacity to carry out communications with the points of contact for any other Party on an expedited basis. It is the duty of the Parties to ensure that trained and properly equipped personnel are available in order to facilitate the operation of the network.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn63"&gt;&lt;sup&gt;&lt;sup&gt;[63]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Parties recognized that establishment of this network is among the most important means provided by the Convention of ensuring that Parties can respond effectively to the law enforcement challenges posed by computer-or computer-related crimes.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn64"&gt;&lt;sup&gt;&lt;sup&gt;[64]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In practice however it has been found that in a number of Parties there seems to be a disconnect between the 24/7 point of contact and the MLA request authorities leading to situations where the contact points may not be informed about whether preservation requests are followed up by MLA authorities or not.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn65"&gt;&lt;sup&gt;&lt;sup&gt;[65]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Drawbacks and Improvements&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Budapest Convention, whilst being the most comprehensive and widely accepted document on international cooperation in the field of cybercrime, has its own share of limitations and drawbacks. Some of the major limitations which can be gleaned from the discussion above (and potential recommendations for the same) are listed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;span&gt;Weakness and Delays in Mutual Assistance:&lt;/span&gt;&lt;/em&gt; In practice it has been found that though States refuse requests on a number of grounds,&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn66"&gt;&lt;sup&gt;&lt;sup&gt;[66]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; some states even refuse cooperation in the event that the case is minor but requires an excessive burden on the requested state. Further, the delays associated with the mutual assistance process are another major hurdle, and are perhaps the reason by police-to-police cooperation for the sharing of data related to cybercrime and e-evidence is much more frequent than mutual legal assistance.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn67"&gt;&lt;sup&gt;&lt;sup&gt;[67]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The lack of regulatory and legal awareness often leads to procedural lapses due to which requests do not meet legal thresholds. More training, more information on requirements to be met and standardised and multilingual templates for requests may be a useful tool to address this concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;span&gt;Access to data stored outside the territory:&lt;/span&gt;&lt;/em&gt; Access to data located in another country without consent of the authorities in that country poses another challenge. The age of cloud computing with processes of data duplication and delocalisation of data have added a new dimension to this problem.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn68"&gt;&lt;sup&gt;&lt;sup&gt;[68]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It is precisely for that reason that the Cybercrime Committee has suggested alternatives to the existing mechanism such as granting access to data without consent in certain specific emergency situations;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn69"&gt;&lt;sup&gt;&lt;sup&gt;[69]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or access to data stored in another country through a computer in its own territory provided the credentials for such access are obtained through lawful investigative activities.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn70"&gt;&lt;sup&gt;&lt;sup&gt;[70]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Another option suggested by the Cybercrime Committee is to look beyond the principle of territoriality and look at a connecting legal factor as an alternative such as the “power of disposal”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;span&gt;Language of requests:&lt;/span&gt;&lt;/em&gt; Language of requests create a number of problems such as delays due to translations, cost of translations, quality of translations, etc. Due to these problems, the Cybercrime Convention Committee has already released for public comment, a provisional draft Additional Protocol to address the issue.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn71"&gt;&lt;sup&gt;&lt;sup&gt;[71]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;span&gt;Bypassing of 24/7 points of contact:&lt;/span&gt;&lt;/em&gt; Although 24/7 points have been set up in most States, it has been found that there is often a disconnect between the 24/7 point of contact and the MLA request authorities leading to situations where the contact points may not be informed about whether preservation requests are followed up by MLA authorities or not.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn72"&gt;&lt;sup&gt;&lt;sup&gt;[72]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;India and the Budapest Convention &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although countries outside the European Union have the option on signing the Budapest Convention and getting onboard the international cooperation mechanism envisaged therein, India has so far refrained from signing the Budapest Convention. The reasons for this refusal appear to be as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;India did not participate in the drafting of the treaty and therefore should not sign. This concern, while valid is not a consistent foreign policy stand that India has taken for all treaties, since India has signed other treaties, where it had no hand in the initial drafting and negotiations.&lt;sup&gt;&lt;sup&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn73"&gt;[73]&lt;/a&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;li&gt;Article 32(b) of the Budapest Convention involves tricky issues of national sovereignty since it allows for cross border access to data without the consent of the other party. Although, as discussed above, the Guidance Note on Article 32 clarified this issue to an extent, it appears that arguments have been raised in some quarters of the government that the options provided by Article 32 are too limited and additional means may be needed to deal with cross border data access.&lt;sup&gt;&lt;sup&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn74" style="text-align: justify; "&gt;[74]&lt;/a&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;li&gt;The mutual legal assistance framework under the Convention is not effective enough and the promise of cooperation is not firm enough since States can refuse to cooperate on a number of grounds.&lt;sup&gt;&lt;sup&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn75" style="text-align: justify; "&gt;[75]&lt;/a&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;li&gt;It is a criminal justice treaty and does not cover state actors; further the states from which most attacks affecting India are likely to emanate are not signatories to the Convention either.&lt;sup&gt;&lt;sup&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn76" style="text-align: justify; "&gt;[76]&lt;/a&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;li&gt;Instead of joining the Budapest Convention, India should work for and promote a treaty at the UN level.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn77" style="text-align: justify; "&gt;&lt;sup&gt;&lt;sup&gt;[77]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Although in January 2018 there were a number of news reports indicating that India is seriously considering signing the Budapest Convention and joining the international cooperation mechanism under it, there have been no updates on the status of this proposal.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn78"&gt;&lt;sup&gt;&lt;sup&gt;[78]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Budapest Convention has faced a number of challenges over the years as far as provisions regarding international cooperation are concerned. These include delays in getting responses from other states, requests not being responded to due to various reasons (language, costs, etc.), requests being overridden by mutual agreements, etc. The only other alternative which is the MLAT system is no better due to delays in providing access to requested data.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn79"&gt;&lt;sup&gt;&lt;sup&gt;[79]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This however does not mean that international cooperation through the Budapest Convention is always late and inefficient, as was evident from the example of the Norwegian bank robber-murderer given above. There is no doubt that the current mechanisms are woefully inadequate to deal with the challenges of cyber crime and even regular crimes (specially in the financial sector) which may involve examination of electronic evidence. However that does not mean the end of the road for the Budapest Convention, one has to recognize the fact that it is the pre-eminent document on international cooperation on electronic evidence with 62 State Parties as well as another 10 Observer States. Any mechanism which offers a solution to the thorny issues of international cooperation in the field of cyber crime would require most of the nations of the world to sign up to it; till such time that happens, expanding the scope of the Budapest Convention to address atleast some of the issues discussed above by leveraging the work already done by the Cybercrime Committee through various reports and Guidance Notes (some of which have been referenced in this paper itself) may be a good option as this could be an incentive for non signatories to become parties to a better and more efficient Budapest Convention providing a more robust international cooperation regime.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr /&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Explanatory Report to the Convention on Cybercrime, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;, para 304.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 24(1)(a). Except in cases where a different minimum threshold has been provided by a mutual arrangement, in which case such other minimum threshold shall be applied.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 24(5).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 24(3).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 24(2).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Explanatory Report to the Convention on Cybercrime, Para 304, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;, para 251.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 24(6).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 24(7).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 25(1).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 25(4).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(2).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(3) read with para 267 of the Explanatory Note to the Budapest Convention.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 25(4).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(4)(a).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(4)(b).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(5).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(6).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Some of the grounds listed by Parties for refusal are: (i) grounds listed in Article 27 of the Convention, (ii) the request does not meet formal or other requirements, (iii) the request is motivated by race, religion, sexual orientation, political opinion or similar, (iv) the request concerns a political or military offence, (v) Cooperation may lead to torture or death penalty, (vi) Granting the request would prejudice sovereignty, security, public order or national interest or other essential interests, (vii) the person has already been punished or acquitted or pardoned for the same offence “&lt;em&gt;Ne bis in idem&lt;/em&gt;”, (viii) the investigation would impose an excessive burden on the requested State or create practical difficulties, (ix) Granting the request would interfere in an ongoing investigation (in which case the execution of the request may be postponed). Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 34.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 34.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Pedro Verdelho, &lt;em&gt;Discussion Paper: The effectiveness of international cooperation against cybercrime: examples of good practice&lt;/em&gt;, 2008, pg. 5, &lt;a href="https://www.coe.int/t/dg1/legalcooperation/economiccrime/cybercrime/T-CY/DOC-567study4-Version7_en.PDF"&gt;https://www.coe.int/t/dg1/legalcooperation/economiccrime/cybercrime/T-CY/DOC-567study4-Version7_en.PDF&lt;/a&gt;, accessed on March 28, 2019.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(8).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, disclosure of the material to the defence and the judicial authorities is an implicit exception to this rule. Further the ability to use the material in a trial (which is generally a public proceeding) is also a recognised exception to the right to limit usage of the material. &lt;em&gt;See&lt;/em&gt; para 278 of the the Explanatory Note to the Budapest Convention.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 28.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(9)(a) and (b).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(9)(d) read with para 274 of the Explanatory Note to the Budapest Convention.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 31.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 33.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 34.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 37.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 123.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;em&gt;Ibid&lt;/em&gt; at 124.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 29(3) read with para 285 of the Explanatory Note to the Budapest Convention.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 29(4).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 29(5).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 29(6).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 29(7).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 30.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Anna-Maria Osula, &lt;em&gt;Accessing Extraterritorially Located Data: Options for States&lt;/em&gt;,   &lt;a href="http://ccdcoe.eu/uploads/2018/10/Accessing-extraterritorially-located-data-options-for-States_Anna-Maria_Osula.pdf"&gt;http://ccdcoe.eu/uploads/2018/10/Accessing-extraterritorially-located-data-options-for-States_Anna-Maria_Osula.pdf&lt;/a&gt;, accessed on March 28, 2019.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 32.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Explanatory Report to the Convention on Cybercrime, Para 304, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;, para 293.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref41"&gt;&lt;sup&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee, Report of the Transborder Group, &lt;em&gt;Transborder access and jurisdiction: What are the options?&lt;/em&gt;, December 2012, para 310.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref42"&gt;&lt;sup&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note # 3, Transborder access to data (Article 32), para 3.2.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note # 3, Transborder access to data (Article 32), para 3.3.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note # 3, Transborder access to data (Article 32), para 3.4.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note # 3, Transborder access to data (Article 32), para 3.6.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref46"&gt;&lt;sup&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note # 3, Transborder access to data (Article 32), para 3.8.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 18.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Explanatory Report to the Convention on Cybercrime, Para 304, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;, para 170.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Explanatory Report to the Convention on Cybercrime, Para 304, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;, para 173.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Defined in Article 18(3) as “any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data and by which can be established:&lt;/p&gt;
&lt;p&gt;a. the type of communication service used, the technical provisions taken thereto and the period of service;&lt;/p&gt;
&lt;p&gt;b. the subscriber’s identity, postal or geographic address, telephone and other access number, billing and payment information, available on the basis of the service agreement or arrangement;&lt;/p&gt;
&lt;p&gt;c. any other information on the site of the installation of communication equipment, available on the basis of the service agreement or arrangement.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Explanatory Report to the Convention on Cybercrime, Para 304, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;, para 173.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note #10, Production orders for subscriber information (Article 18 Budapest Convention), at pg.3.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note #10, Production orders for subscriber information (Article 18 Budapest Convention), para 3.5 at pg. 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note #10, Production orders for subscriber information (Article 18 Budapest Convention), para 3.6 at pg. 8.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;em&gt;Id.&lt;/em&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note #10, Production orders for subscriber information (Article 18 Budapest Convention), para 3.8 at pg. 9.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Situations such as preventions of imminent danger, physical harm, the escape of a suspect or similar situations including risk of destruction of relevant evidence.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee, Subgroup on Transborder Access, (Draft) Elements of an Additional Protocol to the Budapest Convention on Cybercrime Regarding Transborder Access to Data, April 2013, pg. 49.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Cloud Evidence Group, &lt;em&gt;Criminal justice access to data in the cloud: challenges (Discussion paper)&lt;/em&gt;, May 2015, pgs 10-14.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref60"&gt;&lt;sup&gt;&lt;sup&gt;[60]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee, Subgroup on Transborder Access, (Draft) Elements of an Additional Protocol to the Budapest Convention on Cybercrime Regarding Transborder Access to Data, April 9, 2013, pg. 50.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 35.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref62"&gt;&lt;sup&gt;&lt;sup&gt;[62]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.coe.int/en/web/cybercrime/-/towards-a-protocol-to-the-budapest-convention-further-consultatio-1"&gt;https://www.coe.int/en/web/cybercrime/-/towards-a-protocol-to-the-budapest-convention-further-consultatio-1&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref63"&gt;&lt;sup&gt;&lt;sup&gt;[63]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 35.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref64"&gt;&lt;sup&gt;&lt;sup&gt;[64]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Explanatory Report to the Convention on Cybercrime, Para 304, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;, para 298.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref65"&gt;&lt;sup&gt;&lt;sup&gt;[65]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 86.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref66"&gt;&lt;sup&gt;&lt;sup&gt;[66]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Some of the grounds listed by Parties for refusal are: (i) grounds listed in Article 27 of the Convention, (ii) the request does not meet formal or other requirements, (iii) the request is motivated by race, religion, sexual orientation, political opinion or similar, (iv) the request concerns a political or military offence, (v) Cooperation may lead to torture or death penalty, (vi) Granting the request would prejudice sovereignty, security, public order or national interest or other essential interests, (vii) the person has already been punished or acquitted or pardoned for the same offence “&lt;em&gt;Ne bis in idem&lt;/em&gt;”, (viii) the investigation would impose an excessive burden on the requested State or create practical difficulties, (ix) Granting the request would interfere in an ongoing investigation (in which case the execution of the request may be postponed). Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 34.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref67"&gt;&lt;sup&gt;&lt;sup&gt;[67]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref68"&gt;&lt;sup&gt;&lt;sup&gt;[68]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Giovanni Buttarelli, &lt;em&gt;Fundamental Legal Principles for a Balanced Approach&lt;/em&gt;, Selected papers and contributions from the International Conference on “Cybercrime: Global Phenomenon and its Challenges”, Courmayeur Mont Blanc, Italy available at &lt;a href="http://ispac.cnpds.org/download.php?fld=pub_files&amp;amp;f=ispacottobre2012bassa.pdf"&gt;ispac.cnpds.org/download.php?fld=pub_files&amp;amp;f=ispacottobre2012bassa.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref69"&gt;&lt;sup&gt;&lt;sup&gt;[69]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Situations such as preventions of imminent danger, physical harm, the escape of a suspect or similar situations including risk of destruction of relevant evidence.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref70"&gt;&lt;sup&gt;&lt;sup&gt;[70]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee, Subgroup on Transborder Access, (Draft) Elements of an Additional Protocol to the Budapest Convention on Cybercrime Regarding Transborder Access to Data, April 2013, pg. 49.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref71"&gt;&lt;sup&gt;&lt;sup&gt;[71]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.coe.int/en/web/cybercrime/-/towards-a-protocol-to-the-budapest-convention-further-consultatio-1"&gt;https://www.coe.int/en/web/cybercrime/-/towards-a-protocol-to-the-budapest-convention-further-consultatio-1&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref72"&gt;&lt;sup&gt;&lt;sup&gt;[72]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 86.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref73"&gt;&lt;sup&gt;&lt;sup&gt;[73]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Dr. Anja Kovaks, &lt;em&gt;India and the Budapest Convention - To Sign or not? Considerations for Indian Stakeholders&lt;/em&gt;, available at &lt;a href="https://internetdemocracy.in/reports/india-and-the-budapest-convention-to-sign-or-not-considerations-for-indian-stakeholders/"&gt;https://internetdemocracy.in/reports/india-and-the-budapest-convention-to-sign-or-not-considerations-for-indian-stakeholders/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref74"&gt;&lt;sup&gt;&lt;sup&gt;[74]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Alexander Seger, &lt;em&gt;India and the Budapest Convention: Why not?&lt;/em&gt;, Digital Debates: The CyFy Journal, Vol III, available at &lt;a href="https://www.orfonline.org/expert-speak/india-and-the-budapest-convention-why-not/"&gt;https://www.orfonline.org/expert-speak/india-and-the-budapest-convention-why-not/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref75"&gt;&lt;sup&gt;&lt;sup&gt;[75]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;em&gt;Id&lt;/em&gt;&lt;em&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref76"&gt;&lt;sup&gt;&lt;sup&gt;[76]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;em&gt;Id.&lt;/em&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref77"&gt;&lt;sup&gt;&lt;sup&gt;[77]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;em&gt;Id.&lt;/em&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref78"&gt;&lt;sup&gt;&lt;sup&gt;[78]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://indianexpress.com/article/india/home-ministry-pitches-for-budapest-convention-on-cyber-security-rajnath-singh-5029314/"&gt;https://indianexpress.com/article/india/home-ministry-pitches-for-budapest-convention-on-cyber-security-rajnath-singh-5029314/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref79"&gt;&lt;sup&gt;&lt;sup&gt;[79]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Elonnai Hickok and Vipul Kharbanda, &lt;em&gt;Cross Border Cooperation on Criminal Matters - A perspective from India&lt;/em&gt;, available at &lt;a href="https://cis-india.org/internet-governance/blog/cross-border-cooperation-on-criminal-matters"&gt;https://cis-india.org/internet-governance/blog/cross-border-cooperation-on-criminal-matters&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/vipul-kharbanda-april-29-2019-international-cooperation-in-cybercrime-the-budapest-convention'&gt;https://cis-india.org/internet-governance/blog/vipul-kharbanda-april-29-2019-international-cooperation-in-cybercrime-the-budapest-convention&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>International Cooperation</dc:subject>
    
    
        <dc:subject>Budapest Convention</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>MLAT</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Crime</dc:subject>
    

   <dc:date>2019-04-29T22:35:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/intl-conferernce-on-mobile-law">
    <title>International Conference on Mobile Law</title>
    <link>https://cis-india.org/news/intl-conferernce-on-mobile-law</link>
    <description>
        &lt;b&gt;Pranesh Prakash spoke in the panel on Mobiles -  Privacy and Social Media on March 1, 2012.&lt;/b&gt;
        
&lt;h2&gt;Draft Agenda&lt;/h2&gt;
&lt;h3&gt;March 1, 2012&lt;br /&gt;&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;9:00am to 9:30am&lt;/td&gt;
&lt;td&gt; Registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30am to 10:45am &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Inauguration Session&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:45am to 11:15am&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt; Icml Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:15am to 11:45am&lt;/td&gt;
&lt;td&gt; Session I: Mobile law- An introduction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:45am to 1:15pm&lt;/td&gt;
&lt;td&gt;Session II: Mobile Revolution, Mcommerce and Crimes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:15pm to 2:00pm&lt;/td&gt;
&lt;td&gt; Icml Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:00pm to 3:15pm&lt;/td&gt;
&lt;td&gt;Session III: Mobiles -&amp;nbsp; Privacy &amp;amp; Social Media&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:15pm to 3:30pm &amp;nbsp;&amp;nbsp;&lt;/td&gt;
&lt;td&gt; Icml Tea&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:30pm to 4:45pm&lt;/td&gt;
&lt;td&gt;Session IV: Mobiles &amp;amp; Security&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4:45pm to 6:00pm&lt;/td&gt;
&lt;td&gt;Session V: Safe Harbour Protection for Mobiles Service Providers In India&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;March 2, 2012&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:30am to 11:00am&lt;/td&gt;
&lt;td&gt;Session VI-Mobile Banking &amp;amp; Payments&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00am to 11:30am&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Icml Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30 am to 12:15pm&lt;/td&gt;
&lt;td&gt;Session VII:&amp;nbsp; Mobile Law Challenges in India&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:15pm to 1:30pm&lt;/td&gt;
&lt;td&gt;&amp;nbsp; Icml Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:30pm to 2:15pm&lt;/td&gt;
&lt;td&gt; Session VIII:&amp;nbsp; Mobile Governance&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:15pm to 3:30pm&lt;/td&gt;
&lt;td&gt;Icml Tea&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:30pm to 3:45pm&lt;/td&gt;
&lt;td&gt;Session IX: Internet Governance In The Mobile Ecosystem&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:45pm to 5:00pm&lt;/td&gt;
&lt;td&gt; Session X : 2G Spectrum Allocation: Post Supreme Court Judgment- Challenges &amp;amp; Opportunities&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5:00pm&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&amp;nbsp; Valedictory Function&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;a class="external-link" href="http://mobilelawconf.wordpress.com/program/"&gt;Read the original here&lt;/a&gt;
&lt;p&gt;Venue: ASSOCHAM House, 47, Prithvi Raj Road, New Delhi, India&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/intl-conferernce-on-mobile-law'&gt;https://cis-india.org/news/intl-conferernce-on-mobile-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-04-03T08:24:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
