<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1546 to 1560.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/global-voices-january-6-2015-subhashish-panigrahi-indian-netizens-criticize-online-censorship-of-jihadi-content"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/tnwnews-may-28-2015-abhimanyu-ghoshal-indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-ft-com-aug-21-2012-victor-mallet-james-crabtree-indian-mobiles-go-quiet-amid-sms-curb"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-march-26-2018-indian-it-firms-not-ready-for-european-unions-proposed-privacy-laws-only-a-few-compliant-with-gdpr"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/indian-internet-lawsuit-puts-spotlight-on-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-intermediary-liability-regime"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/zdnet-mahesh-sharma-march-14-2013-indian-id-crisis-unveils-aadhar-doubts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-register-phil-muncaster-june-27-2013-indian-govt-blocks-40-smut-sites-forgets-to-give-reason"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-january-3-2014-sruthijit-kk-indian-govt-websites-gold-mine-for-cybercriminals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-assam-january-2-2015-indian-govt-still-blocks-websites-india-censorship-on-internet"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception">
    <title>Indian PM Narendra Modi’s digital dream gets bad reception</title>
    <link>https://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception</link>
    <description>
        &lt;b&gt;As Indian Prime Minister Narendra Modi told Silicon Valley’s most powerful chief executives this week how his government “attacked poverty by using the power of networks and mobile phones’’, the entire population of the state of Kashmir remained offline — by order of the state.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Amanda Hodge was published in &lt;a class="external-link" href="http://www.theaustralian.com.au/news/world/indian-pm-narendra-modis-digital-dream-gets-bad-reception/story-e6frg6so-1227547929688"&gt;the Australian&lt;/a&gt; on September 29, 2015. Sunil Abraham gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“I see technology as a means to empower and as a tool that bridges the distance between hope and opportunity,” Mr Modi said yesterday on a trip in which he will also discuss development at the UN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier, in a “town hall” meeting with Facebook chief Mark Zuckerberg Mr Modi hailed the power of social media networks that gave governments the opportunity to correct themselves “every five minutes”, rather than every five years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His remarks during his Digital India tour of the US west coast sparked a storm of Twitter protest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The northern state’s former chief minister Omar Abdullah, who noted the “irony of listening to Prime Minister Modi lecturing about connected digital India, while we are totally disconnected”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ban on mobile and broadband internet in Jammu and Kashmir was imposed last Friday, the beginning of the Muslim holiday of Eid-ul-Zuha during which animals are slaughtered and the meat fed to the poor, for fear social media could inflame tensions over the state government’s decision to enforce a beef ban.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was to have lasted 24 hours but — notwithstanding Twitter feedback — was extended twice as a “precautionary” measure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Mr Modi outlined his dreams of a broadband network connecting the country’s most remote communities, millions of New Delhi mobile phone users continued their daily wrestle with line dropouts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are bringing technology, transparency, efficiency, ease and effectiveness in governance,” he said, as in New Delhi the government talked of pulling down more mobile towers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centre for Internet and Society director Sunil Abraham said yesterday: “Schizophrenia between rhetoric and reality (on digital policy) is the global standard for all world leaders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Politicians in opposition are invariably opposed to surveillance and in favour of free speech but the very day that politician assumes office even if it is someone as splendid as Barack Obama, they change their opinions on these topics and become pro-surveillance and pro-censorship.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Certainly successive Indian governments have had a patchy record on such issues. Last March India’s activist Supreme Court struck down a controversial section of the Information Technology Act which made posting information of a “grossly offensive or menacing character” punishable by up to three years’ jail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That month police in northern Uttar Pradesh arrested a teenager for a Facebook post, which they said “carried derogatory language against a community”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous cases under the former Congress-led government include that of a university professor detained for posting a cartoon about the chief minister of West Bengal and the arrest of two young women over a Facebook post criticising the shutdown of Mumbai following the death of a Hindu right politician.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Mr Modi’s government welcomed the Supreme Court ruling as a “landmark day for freedom of speech and expression”, last month it attempted to block 857 random porn sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notwithstanding the gulf between Mr Modi’s digital dream rhetoric and the reality at home, his second US visit in 17 months has reaped dividends. Google has committed to a joint initiative to roll out free Wi-Fi to 500 railway stations across the country, and Qualcomm has pledged a $US150 million ($213m) tech startup fund.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Mr Abraham warned of the potential for such investments to compromise net neutrality — the principle of allowing internet users access to all content and applications.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception'&gt;https://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2015-09-29T15:23:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/global-voices-january-6-2015-subhashish-panigrahi-indian-netizens-criticize-online-censorship-of-jihadi-content">
    <title>Indian Netizens Criticize Online Censorship of ‘Jihadi’ Content </title>
    <link>https://cis-india.org/internet-governance/blog/global-voices-january-6-2015-subhashish-panigrahi-indian-netizens-criticize-online-censorship-of-jihadi-content</link>
    <description>
        &lt;b&gt;The article on online censorship by Subhashish Panigrahi was published in Global Voices on January 6, 2015.&lt;/b&gt;
        &lt;p&gt;Click to view the article on Global Voices &lt;a class="external-link" href="http://globalvoicesonline.org/2015/01/06/indian-netizens-criticize-online-censorship-of-jihadi-content/"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;
&lt;title&gt;Indian Netizens Criticize Online Censorship of ‘Jihadi’ Content · Global Voices&lt;/title&gt;
&lt;/p&gt;
           
&lt;div class="page-container" id="page-container"&gt;
&lt;div class="header-banner-container" id="header-banner-container"&gt;
&lt;div class="header-banner" id="header-banner"&gt;
&lt;div class="toggle-menu-content"&gt;&lt;span class="hidebutton"&gt;&lt;a href="#" title="Close"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="page-content-container"&gt;
&lt;div class="page-content"&gt;
&lt;div class="post-header"&gt;
&lt;div class="post-header-meta postmeta-container"&gt;&lt;span class="post-menu-toggles"&gt;
&lt;div class="post-terms-container toggle-menu menu-closed"&gt;
&lt;div class="post-terms-list-container toggle-menu-content-container"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;

&lt;div id="main-wrapper"&gt;
&lt;div class="main" id="main"&gt;
&lt;div class="full-article-container" id="full-article-container"&gt;
&lt;div class="full-article" id="full-article"&gt;
&lt;div class="post-container single-post-container" id="single-post-container"&gt;
&lt;div class="post p1 post publish id503318 a-psubhashish c-censorship-topics c-citizen-media c-digital-activism c-english c-freedom-of-speech c-gv-advocacy c-india c-south-asia c-technology c-weblog y2015 m01 d06 h09 ctx-gv-advocacy" id="single-post"&gt;
&lt;div class="post-header-sharing"&gt;
&lt;div class="sharing-tools sharing-tools-floating"&gt;
&lt;div class="share-icons"&gt;&lt;span class="share-links-icons"&gt;&lt;a class="share-link" href="http://twitter.com/share?url=http%3A%2F%2Fglobalvoicesonline.org%2F2015%2F01%2F06%2Findian-netizens-criticize-online-censorship-of-jihadi-content%2F&amp;amp;text=Indian+Netizens+Criticize+Online+Censorship+of+%27Jihadi%27+Content&amp;amp;via=psubhashish" id="gv-st_twitter" target="new" title="twitter"&gt;&lt;span class="icon icon-twitter"&gt; &lt;/span&gt;&lt;/a&gt;&lt;a class="share-link" href="http://www.facebook.com/share.php?u=http%3A%2F%2Fglobalvoicesonline.org%2F2015%2F01%2F06%2Findian-netizens-criticize-online-censorship-of-jihadi-content%2F" id="gv-st_facebook" target="new" title="facebook"&gt;&lt;span class="icon icon-facebook"&gt; &lt;/span&gt;&lt;/a&gt;&lt;a class="share-link" href="http://reddit.com/submit?url=http%3A%2F%2Fglobalvoicesonline.org%2F2015%2F01%2F06%2Findian-netizens-criticize-online-censorship-of-jihadi-content%2F&amp;amp;title=Indian+Netizens+Criticize+Online+Censorship+of+%27Jihadi%27+Content+%7C+Global+Voices" id="gv-st_reddit" target="new" title="reddit"&gt;&lt;span class="icon icon-reddit"&gt; &lt;/span&gt;&lt;/a&gt;&lt;a class="share-link" href="https://plus.google.com/share?url=http%3A%2F%2Fglobalvoicesonline.org%2F2015%2F01%2F06%2Findian-netizens-criticize-online-censorship-of-jihadi-content%2F" id="gv-st_googleplus" target="new" title="googleplus"&gt;&lt;span class="icon  icon-google-plus"&gt; &lt;/span&gt;&lt;/a&gt;&lt;span class="share-link share-link-email"&gt;
&lt;div class="email-share-form-trigger"&gt;&lt;span&gt; &lt;/span&gt;&lt;span class="icon icon-envelope-alt"&gt; &lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;span class="share-link share-link-print"&gt;&lt;span class="print-link"&gt;&lt;a href="http://globalvoicesonline.org/2015/01/06/indian-netizens-criticize-online-censorship-of-jihadi-content/print/" rel="nofollow" title="Print version"&gt;&lt;span class="icon icon-print"&gt; &lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="entry" id="single"&gt;
&lt;div class="wp-caption aligncenter" id="attachment_503552"&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img alt="Mock-up of a blocked URL" class="wp-image-503552 " height="206" src="http://globalvoicesonline.org/wp-content/uploads/2015/01/blocked1.png" title="Mock-up of a blocked URL" width="800" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Mock-up of a blocked URL (Image: Subhashish Panigrahi, CC-by-SA 3.0)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The Government of India in the last week of  2014 asked Internet service providers (ISPs) to block 32 websites  including code repository &lt;a href="http://github.com" target="_blank"&gt;Github&lt;/a&gt;, video streaming sites &lt;a href="http://vimeo.com" target="_blank"&gt;Vimeo &lt;/a&gt;and &lt;a href="http://dailymotion.com" target="_blank"&gt;Dailymotion&lt;/a&gt;, online archive &lt;a href="http://archive.org" target="_blank"&gt;Internet Archive&lt;/a&gt;, free software hosting site &lt;a href="http://sourceforge.net" target="_blank"&gt;Sourceforge &lt;/a&gt;and many other websites on the basis of hosting anti-India content from the violent extremist group known as ISIS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The blanket block on many resourceful sites  has been heavily criticized on social media and blogs by reviving the  hashtag #GoIblocks that evolved in the past against internet censorship  by the government.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img alt="View image on Twitter" class="autosized-media" height="511" src="https://pbs.twimg.com/media/B6KwUsICIAAAaMn.png:large" title="View image on Twitter" width="600" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;div class="entry" id="single"&gt;&lt;br /&gt;&lt;img src="https://cis-india.org/home-images/Govtordersblocking.png" alt="Govt orders blocking" class="image-inline" title="Govt orders blocking" /&gt;&lt;/div&gt;
&lt;div class="entry"&gt;&lt;/div&gt;
&lt;div class="entry"&gt;
&lt;p&gt;&lt;a href="http://www.medianama.com/2015/01/223-you-broadband-has-published-a-list-of-sites-blocked/"&gt;Nikhil Pahwa&lt;/a&gt; at MediaNama notes that this time many ISPs published the list of the blocked sites:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Typically, users are not informed about which websites are blocked, so this was a welcome move from the ISP.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class="aligncenter wp-caption" id="attachment_503556"&gt;&lt;img alt="Say No to Censorship. #GOIBlocks" class="wp-image-503556 size-featured_image_large" height="450" src="http://globalvoicesonline.org/wp-content/uploads/2015/01/say-no-to-censorship-800x450.png" width="800" /&gt;
&lt;p class="wp-caption-text"&gt;“Say No to Censorship. #GOIBlocks” (taken from Facebook page of &lt;a href="https://www.facebook.com/fsftn/photos/a.512346312126053.126159.196173157076705/987496524611027/?type=1&amp;amp;permPage=1" target="_blank"&gt;Free Software Foundation&lt;/a&gt;, Tamil Nadu)&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;In 2012, opposition party leader &lt;a href="https://en.wikipedia.org/wiki/Narendra_Modi" target="_blank"&gt;Narendra Modi&lt;/a&gt; (who is now India's Prime Minister) &lt;a href="https://twitter.com/narendramodi/status/238913468344958976" target="_blank"&gt;tweeted &lt;/a&gt;against the URL blocks by the earlier ruling of &lt;a href="https://en.wikipedia.org/wiki/Indian_National_Congress" title="Indian National Congress"&gt;India's National Congress &lt;/a&gt;when then-Minister of Communications and Information Technology &lt;a href="https://en.wikipedia.org/wiki/Kapil_Sibal" target="_blank"&gt;Kapil Sibal&lt;/a&gt; ordered to block 300 websites. Many eyebrows were raised when Modi repeated the move this time around.&lt;/p&gt;
&lt;img alt="View image on Twitter" class="autosized-media" height="357" src="https://pbs.twimg.com/media/B6LSaKZCQAAR6Gm.png:large" title="View image on Twitter" width="600" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://en.wikipedia.org/wiki/Internet_censorship_in_India" target="_blank"&gt;Internet censorship in India&lt;/a&gt; has been increasingly prominent since 1999 when Pakistani newspaper &lt;a href="https://en.wikipedia.org/wiki/Dawn_%28newspaper%29" target="_blank"&gt;Dawn&lt;/a&gt; was blocked by the &lt;a href="https://en.wikipedia.org/wiki/VSNL" title="VSNL"&gt;Videsh Sanchar Nigam Limited&lt;/a&gt; for post-&lt;a href="https://en.wikipedia.org/wiki/Kargil_War" title="Kargil War"&gt;Kargil War&lt;/a&gt; views against India. These caught heavy criticism from netizens, often under the hashtag &lt;a href="https://twitter.com/search?q=%23IdiotKapilSibal&amp;amp;src=typd" target="_blank"&gt;#IdiotKapilSibal&lt;/a&gt;. Since then there have been many instances of government-mediated censorship, particularly with the enactment of India's &lt;a href="http://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure"&gt;Information Technology Act of 2000.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Arvind Gupta, head of Information Technology for India's ruling &lt;a href="https://en.wikipedia.org/wiki/Bharatiya_Janata_Party" target="_blank"&gt;Bharatiya Janata Party&lt;/a&gt;, tweeted to clarify that the sites were blocked as advised by the &lt;a href="https://en.wikipedia.org/wiki/Anti_Terrorist_Squad_%28India%29" target="_blank"&gt;Anti-Terrorism Squad&lt;/a&gt;.&lt;/p&gt;
&lt;blockquote cite="https://twitter.com/buzzindelhi/status/550225247455035392" class="tweet subject expanded h-entry"&gt;
&lt;div class="header"&gt;
&lt;div class="h-card p-author with-verification"&gt;&lt;a class="u-url profile" href="https://twitter.com/buzzindelhi"&gt; &lt;img class="u-photo avatar" src="https://pbs.twimg.com/profile_images/461134290181308416/MKSUKfc5_normal.jpeg" /&gt; &lt;span class="full-name"&gt; &lt;span class="p-name customisable-highlight"&gt;Arvind Gupta&lt;/span&gt; &lt;span class="verified" title="Verified Account"&gt;&lt;b&gt;✔&lt;/b&gt;&lt;/span&gt; &lt;/span&gt; &lt;span class="p-nickname" dir="ltr"&gt;@&lt;b&gt;buzzindelhi&lt;/b&gt;&lt;/span&gt; &lt;/a&gt;&lt;/div&gt;
&lt;a class="follow-button profile" href="https://twitter.com/buzzindelhi" title="Follow Arvind Gupta on Twitter"&gt;&lt;i class="ic-button-bird"&gt; &lt;/i&gt;Follow&lt;/a&gt;&lt;/div&gt;
&lt;div class="content e-entry-content"&gt;
&lt;p class="e-entry-title"&gt;The websites that have been blocked were based on an advisory by Anti Terrorism Squad, and were carrying Anti India content from ISIS. 1/2&lt;/p&gt;
&lt;div class="dateline collapsible-container"&gt;&lt;a class="u-url customisable-highlight long-permalink" href="https://twitter.com/buzzindelhi/status/550225247455035392"&gt;&lt;time class="dt-updated" title="Time posted: 31 Dec 2014, 09:41:36 (UTC)"&gt;3:11 PM - 31 Dec 2014&lt;/time&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="footer customisable-border"&gt;&lt;span class="stats-narrow customisable-border"&gt;&lt;span class="stats"&gt; &lt;a href="https://twitter.com/buzzindelhi/status/550225247455035392" title="View Tweet on Twitter"&gt; &lt;span class="stats-retweets"&gt; &lt;b&gt;362&lt;/b&gt; Retweets &lt;/span&gt; &lt;/a&gt; &lt;a href="https://twitter.com/buzzindelhi/status/550225247455035392" title="View Tweet on Twitter"&gt; &lt;span class="stats-favorites"&gt; &lt;b&gt;82&lt;/b&gt; favorites &lt;/span&gt; &lt;/a&gt; &lt;/span&gt; &lt;/span&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p class="e-entry-title" style="text-align: justify; "&gt;After agreeing to remove anti-India content posted by accounts that appeared to have some association with ISIS, &lt;a dir="ltr" href="http://t.co/Vl84LZbhCh" rel="nofollow" target="_blank" title="http://weebly.com"&gt;weebly.com&lt;/a&gt;, &lt;a dir="ltr" href="http://t.co/ynxy4A0tHx" rel="nofollow" target="_blank" title="http://vimeo.com"&gt;vimeo.com&lt;/a&gt;, &lt;a href="http://www.zdnet.com/article/pastebin-access-restored-in-india-no-content-removed-blocks-remain-exclusive/"&gt;Pastebin&lt;/a&gt;, &lt;a dir="ltr" href="http://t.co/QGqUC0Yyk3" rel="nofollow" target="_blank" title="http://dailymotion.com"&gt;dailymotion.com &lt;/a&gt;and &lt;a dir="ltr" href="http://t.co/UmkEYEiGkC" rel="nofollow" target="_blank" title="http://gist.github.com"&gt;gist.github.com&lt;/a&gt; were unblocked.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;These websites have undertaken not to allow pasting of  such propaganda information on their website and also work with the  government to remove such material as per the compliance with the laws  of land.&lt;/p&gt;
&lt;p&gt;-  Ministry of Communications and Information Technology, Government of India (posted in &lt;a href="http://www.business-standard.com/article/news-ians/government-decides-to-unblock-four-websites-out-of-32-114123101162_1.html" target="_blank"&gt;Business Standard&lt;/a&gt;)&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote cite="https://twitter.com/buzzindelhi/status/550367307227078658" class="tweet subject expanded h-entry"&gt;
&lt;div class="header"&gt;
&lt;div class="h-card p-author with-verification"&gt;&lt;a class="u-url profile" href="https://twitter.com/buzzindelhi"&gt; &lt;img class="u-photo avatar" src="https://pbs.twimg.com/profile_images/461134290181308416/MKSUKfc5_normal.jpeg" /&gt; &lt;span class="full-name"&gt; &lt;span class="p-name customisable-highlight"&gt;Arvind Gupta&lt;/span&gt; &lt;span class="verified" title="Verified Account"&gt;&lt;b&gt;✔&lt;/b&gt;&lt;/span&gt; &lt;/span&gt; &lt;span class="p-nickname" dir="ltr"&gt;@&lt;b&gt;buzzindelhi&lt;/b&gt;&lt;/span&gt; &lt;/a&gt;&lt;/div&gt;
&lt;a class="follow-button profile" href="https://twitter.com/buzzindelhi" title="Follow Arvind Gupta on Twitter"&gt;&lt;i class="ic-button-bird"&gt; &lt;/i&gt;Follow&lt;/a&gt;&lt;/div&gt;
&lt;div class="content e-entry-content"&gt;
&lt;p class="e-entry-title"&gt;Action has been initiated to unblock -- &lt;a class="link customisable" dir="ltr" href="http://t.co/Vl84LZbhCh" rel="nofollow" target="_blank" title="http://weebly.com"&gt;&lt;span class="tco-hidden"&gt;http://&lt;/span&gt;&lt;span class="tco-display"&gt;weebly.com&lt;/span&gt;&lt;span class="tco-hidden"&gt; &lt;/span&gt;&lt;span class="tco-ellipsis"&gt;&lt;span class="tco-hidden"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/a&gt;, &lt;a class="link customisable" dir="ltr" href="http://t.co/ynxy4A0tHx" rel="nofollow" target="_blank" title="http://vimeo.com"&gt;&lt;span class="tco-hidden"&gt;http://&lt;/span&gt;&lt;span class="tco-display"&gt;vimeo.com&lt;/span&gt;&lt;span class="tco-hidden"&gt; &lt;/span&gt;&lt;span class="tco-ellipsis"&gt;&lt;span class="tco-hidden"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/a&gt;, &lt;a class="link customisable" dir="ltr" href="http://t.co/QGqUC0Yyk3" rel="nofollow" target="_blank" title="http://dailymotion.com"&gt;&lt;span class="tco-hidden"&gt;http://&lt;/span&gt;&lt;span class="tco-display"&gt;dailymotion.com&lt;/span&gt;&lt;span class="tco-hidden"&gt; &lt;/span&gt;&lt;span class="tco-ellipsis"&gt;&lt;span class="tco-hidden"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/a&gt; and (1/2)&lt;/p&gt;
&lt;div class="dateline collapsible-container"&gt;&lt;a class="u-url customisable-highlight long-permalink" href="https://twitter.com/buzzindelhi/status/550367307227078658"&gt;&lt;time class="dt-updated" title="Time posted: 31 Dec 2014, 19:06:06 (UTC)"&gt;12:36 AM - 1 Jan 2015&lt;/time&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="footer customisable-border"&gt;&lt;span class="stats-narrow customisable-border"&gt;&lt;span class="stats"&gt; &lt;a href="https://twitter.com/buzzindelhi/status/550367307227078658" title="View Tweet on Twitter"&gt; &lt;span class="stats-retweets"&gt; &lt;b&gt;63&lt;/b&gt; Retweets &lt;/span&gt; &lt;/a&gt; &lt;a href="https://twitter.com/buzzindelhi/status/550367307227078658" title="View Tweet on Twitter"&gt; &lt;span class="stats-favorites"&gt; &lt;b&gt;25&lt;/b&gt; favorites &lt;/span&gt; &lt;/a&gt; &lt;/span&gt; &lt;/span&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;blockquote cite="https://twitter.com/buzzindelhi/status/550367320493658112" class="tweet subject expanded h-entry"&gt;
&lt;div class="header"&gt;
&lt;div class="h-card p-author with-verification"&gt;&lt;a class="u-url profile" href="https://twitter.com/buzzindelhi"&gt; &lt;img class="u-photo avatar" src="https://pbs.twimg.com/profile_images/461134290181308416/MKSUKfc5_normal.jpeg" /&gt; &lt;span class="full-name"&gt; &lt;span class="p-name customisable-highlight"&gt;Arvind Gupta&lt;/span&gt; &lt;span class="verified" title="Verified Account"&gt;&lt;b&gt;✔&lt;/b&gt;&lt;/span&gt; &lt;/span&gt; &lt;span class="p-nickname" dir="ltr"&gt;@&lt;b&gt;buzzindelhi&lt;/b&gt;&lt;/span&gt; &lt;/a&gt;&lt;/div&gt;
&lt;p class="e-entry-title"&gt; &lt;/p&gt;
&lt;p class="e-entry-title"&gt;&lt;a class="customisable link" dir="ltr" href="http://t.co/UmkEYEiGkC" rel="nofollow" target="_blank" title="http://gist.github.com"&gt;&lt;span class="tco-display"&gt;gist.github.com&lt;/span&gt;&lt;span class="tco-hidden"&gt; &lt;/span&gt;&lt;span class="tco-ellipsis"&gt;&lt;span class="tco-hidden"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/a&gt; :: &lt;a class="customisable link" dir="ltr" href="http://t.co/o8UNiCEVh6" rel="nofollow" target="_blank" title="http://wap.business-standard.com/article/news-ians/government-decides-to-unblock-four-websites-out-of-32-114123101162_1.html"&gt;&lt;span class="tco-hidden"&gt;http://&lt;/span&gt;&lt;span class="tco-display"&gt;wap.business-standard.com/article/news-i&lt;/span&gt;&lt;span class="tco-hidden"&gt;ans/government-decides-to-unblock-four-websites-out-of-32-114123101162_1.html&lt;/span&gt;&lt;span class="tco-ellipsis"&gt;&lt;span class="tco-hidden"&gt; &lt;/span&gt;…&lt;/span&gt;&lt;/a&gt; (2/2)&lt;/p&gt;
&lt;div class="collapsible-container dateline"&gt;&lt;a class="long-permalink customisable-highlight u-url" href="https://twitter.com/buzzindelhi/status/550367320493658112"&gt;&lt;time class="dt-updated" title="Time posted: 31 Dec 2014, 19:06:09 (UTC)"&gt;12:36 AM - 1 Jan 2015&lt;/time&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="collapsible-container dateline"&gt;&lt;span class="customisable-border stats-narrow"&gt;&lt;span class="stats"&gt; &lt;a href="https://twitter.com/buzzindelhi/status/550367320493658112" title="View Tweet on Twitter"&gt; &lt;span class="stats-retweets"&gt; &lt;b&gt;39&lt;/b&gt; Retweets &lt;/span&gt; &lt;/a&gt; &lt;a href="https://twitter.com/buzzindelhi/status/550367320493658112" title="View Tweet on Twitter"&gt; &lt;span class="stats-favorites"&gt; &lt;b&gt;12&lt;/b&gt; favorites&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/global-voices-january-6-2015-subhashish-panigrahi-indian-netizens-criticize-online-censorship-of-jihadi-content'&gt;https://cis-india.org/internet-governance/blog/global-voices-january-6-2015-subhashish-panigrahi-indian-netizens-criticize-online-censorship-of-jihadi-content&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-02-10T02:43:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks">
    <title>Indian net service providers too play censorship tricks </title>
    <link>https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks</link>
    <description>
        &lt;b&gt;The study by a Canadian university has found that some major Indian ISPs have deployed web-censorship and filtering technology.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The article by T Ramachandran was &lt;a class="external-link" href="http://www.thehindu.com/news/national/indian-net-service-providers-too-play-censorship-tricks/article4394415.ece"&gt;published in the Hindu&lt;/a&gt; on February 9, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;Your internet service provider (ISP) could be blocking some content. A  study conducted by a Canadian university has found that some major  Indian ISPs have deployed web-censorship and filtering technology widely  used in China and some West Asian countries.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The findings, published on January 15, were the result of a search for  censorship software and hardware on public networks like those operated  by ISPs.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A research team at Citizen Lab, an interdisciplinary laboratory based at  the Munk School of Global Affairs, University of Toronto, found a  software-hardware combo package called PacketShaper being used in many  parts of the world, including India.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The study identified the presence of four PacketShaper installations on  the networks of three major ISPs in India during the period of study in  late 2012. These ISPs had been earlier “implicated in filtering to some  degree,” the report said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The deployment of such traffic management technologies by ISPs could  threaten privacy, freedom of expression and competition, said Sunil  Abraham, Executive Director of the Bangalore-based NGO, Centre for  Internet and Society.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;He said tools like PacketShaper could be used by ISPs for two types of  censorship —“to block entire websites or choke traffic on certain  services or destinations in a highly granular fashion.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The U.S.-based producers of the technology, Blue Coat Systems, are quite  open about the product features on the company’s website. They say it  could be used to control and weed out undesirable content. It could also  be used to slow down or speed up the operation of programmes and  content flow to achieve the goals set by the operators of the networks.&lt;/p&gt;
&lt;h3 class="body" style="text-align: justify; "&gt;Transparency is the key&lt;/h3&gt;
&lt;p class="body" style="text-align: justify; "&gt;Technology experts said such products could be used to exercise  legitimate control over the internet traffic and prioritise the use of  bandwidth and resources, if used ethically.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“If done in a transparent manner that does not discriminate against  different actors within a class it does benefit the collective interest  of the ISP’s clients. However, it could also be used to engage in hidden  censorship against legitimate speech and also for anti-competitive  behaviour,” said Mr. Abraham.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The study focussed on countries where concerns exist over “compliance  with international human rights law, legal due process, freedom of  speech, surveillance, and censorship.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks'&gt;https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-02-13T04:20:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/tnwnews-may-28-2015-abhimanyu-ghoshal-indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed">
    <title>Indian music streaming service Gaana hacked, millions of users’ details exposed</title>
    <link>https://cis-india.org/internet-governance/news/tnwnews-may-28-2015-abhimanyu-ghoshal-indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed</link>
    <description>
        &lt;b&gt;Indian music streaming service Gaana, which has over 7.5 million monthly visitors, has been compromised by a hacker and its user information database is now exposed.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read more at &lt;a class="moz-txt-link-freetext" href="http://thenextweb.com/insider/2015/05/28/indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed/"&gt;http://thenextweb.com/insider/2015/05/28/indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed/&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The hacker, who goes by the moniker Mak Man and appears to be based in Lahore, Pakistan, posted a link to a searchable database of Gaana user details on his Facebook page. Enter a user’s email address and it spits out their full name, email address, MD5-hashed password, date of birth Facebook and Twitter profiles and more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The hack appears to be a SQL injection-based exploit of Gaana’s systems, but the intention behind it is unknown. The database shows more than 12.5 million users are currently registered on Gaana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mak Man also posted images of the service’s admin panel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s worrying that an online service from one of India’s biggest internet companies (&lt;a href="http://www.timesinternet.in/" target="_blank"&gt;Times Internet&lt;/a&gt;) is vulnerable to attacks like this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With user details exposed, it may not do much good to simply change your Gaana password, as it will reflect in the hacker’s database. You’re better off deactivating your account until the issue is resolved, and changing your email, Facebook and Twitter passwords if they’re the same as on Gaana right away.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Update:&lt;/b&gt; &lt;i&gt;Since our story broke, Gaana has &lt;a href="http://gaana.com" target="_blank"&gt;taken its site offline &lt;/a&gt;and the exposed database isn’t returning search results when we queried it with test data.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;i&gt;The hacker has updated his database page with the following message:  “The vulnerable parameter I was using here, has been patched by the  Admin&lt;br /&gt; Now the question is, Was this the only vulnerable parameter I had .. ? ;)”&lt;/i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Update 2: &lt;/b&gt;&lt;i&gt;Times Internet CEO Satyan Gajwani &lt;a href="https://twitter.com/satyangajwani/status/603870753898024960" target="_blank"&gt;tweeted&lt;/a&gt; that only login credentials were accessed and no financial or sensitive personal data was leaked.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Gajwani attempted to contact the hacker on Facebook and  acknowledged the issue. He added that the attack was the hacker’s way of  highlighting Gaana’s vulnerability.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The exposed database has since been removed on Gajwani’s request. All Gaana users’ passwords have been reset.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Gajwani also sought to reassure his followers that no user data  was stored and that the passwords were hashed. Hacker&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; Mak Man also &lt;a href="https://www.facebook.com/themakmaniac/posts/853667861337854" target="_blank"&gt;confirmed this in a Facebook post&lt;/a&gt;.  However, that can’t be confirmed and you’d best change your passwords  for any social accounts and email addresses associated with your Gaana  profile.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;According to &lt;a href="https://twitter.com/pranesh_prakash" target="_blank"&gt;Pranesh Prakash&lt;/a&gt;, Policy Director at &lt;a href="http://cis-india.org/" target="_blank"&gt;Center for Internet and Society&lt;/a&gt; in Bangalore, India, the MD5 hashing algorithm which appears to have  been used for securing passwords isn’t very strong and could easily be  unscrambled using a rainbow table to get the plain-text version of the  data.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Prakash also says that for added security, Gaana should:&lt;/i&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;Stop using MD5 as its password hashing function and instead look at stronger password derivation functions like &lt;a href="https://www.wikiwand.com/en/Scrypt" target="_blank"&gt;scrypt&lt;/a&gt;, &lt;a href="https://www.wikiwand.com/en/Bcrypt" target="_blank"&gt;bcrypt&lt;/a&gt;, or &lt;a href="https://www.wikiwand.com/en/PBKDF2" target="_blank"&gt;PBKDF2&lt;/a&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Sanitize its SQL inputs to prevent against malicious SQL injections.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Enable &lt;a href="http://www.wikiwand.com/en/Two_factor_authentication" target="_blank"&gt;two-factor authentication&lt;/a&gt; for users to log in securely.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Urge its users to use long passphrases instead of short complicated passwords and to never to reuse a password.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;➤ &lt;a href="http://www.gaana.com" target="_blank"&gt;Gaana&lt;/a&gt; [via &lt;a href="http://www.thegeekbyte.com/4841/gaana-com-database-compromised-by-hackers/" target="_blank"&gt;The Geek Byte&lt;/a&gt;]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/tnwnews-may-28-2015-abhimanyu-ghoshal-indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed'&gt;https://cis-india.org/internet-governance/news/tnwnews-may-28-2015-abhimanyu-ghoshal-indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-08-22T16:44:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-ft-com-aug-21-2012-victor-mallet-james-crabtree-indian-mobiles-go-quiet-amid-sms-curb">
    <title>Indian mobiles go quiet amid SMS curbs</title>
    <link>https://cis-india.org/news/www-ft-com-aug-21-2012-victor-mallet-james-crabtree-indian-mobiles-go-quiet-amid-sms-curb</link>
    <description>
        &lt;b&gt;India’s 900m-plus mobile telephones have fallen unusually quiet since Saturday, when the government curbed text and multimedia messages for 15 days in an attempt to dispel panic among north-easterners fearing attacks from angry Muslims.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article written by Victor Mallet in New Delhi and James Crabtree in Mumbai was &lt;a class="external-link" href="http://www.ft.com/intl/cms/s/0/91446d40-eb94-11e1-b8b7-00144feab49a.html#axzz24isDQfds"&gt;published&lt;/a&gt; in Financial Times on August 21, 2012. &lt;i&gt;Additional reporting by Jyotsna Singh in New Delhi. &lt;/i&gt;Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The order limiting the number of SMS and MMS messages to five a day from each pre-paid account – which comprise 97 per cent of the market – has disrupted personal communications and threatens to squeeze the revenues of the mobile operating companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has also urged social media websites including Facebook and Twitter to remove “inflammatory” content it said had helped spread rumours that caused an exodus of migrants from some cities last week. Access to 245 web pages containing doctored videos and images had been blocked, the government claimed, and the relevant sites told to take the pages down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indians send more than a billion text messages a day, although it is not clear how many people have been affected by the restrictions or how many of the messages are mass mailings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Akshat Dwivedi, 20, an undergraduate student at Delhi University, said the restrictions were “a stupid idea”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“How can the government take away something that has become a basic, fundamental need today?” he said. “The ban has affected mostly students who use pre-paid connections because pre-paid connections are cheaper and more affordable for students like us. The ban has hugely disrupted our life. There are many people who rely on text messages because you can’t always call everybody.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Civil rights activists wary of censorship accept that the ban may have been necessary to ease ethnic and religious tensions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There is the fear that the state will exercise inordinate powers,” said Akila Shivdas, a civil and consumer rights activist. “But regulation and state control are two different things … This is an opportunity to look at regulation seriously.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s mobile industry earned about $20bn in revenue last year, of which 15-18 per cent was from data services, according to the Cellular Operators Association of India, a trade body. This suggests operators are set to suffer a loss of about $133m for the 15-day period, according to COAI figures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“When we are going through the trauma of increased costs, being challenged on revenues does not help,” said Rajan Matthew, COAI director-general. “The government’s heart is in the right place in trying to address this issue ... But when we are fighting for every nickel and dime, this loss is not a small amount.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other analysts cautioned that the likely revenue impact would be much smaller, noting that most customers bought pre-paid SMS packages. “I’m not saying there will be no loss, but it will not be dramatic”, said Rohit Chordia, a telecoms analyst at Kotak, a Mumbai-based brokerage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Industry sources and analysts also questioned the government’s decision to impose an extended nationwide ban, rather than experimenting with more limited short-term restrictions targeted to particular trouble spots.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Some kind of limitation on communication was a reasonable step, but restricting everyone to just five per day I don’t think is reasonable at all,” said Pranesh Prakash, programme manager at the Centre for Internet and Society, a Bangalore-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thousands of north-easterners – physically similar to the Bodo people who have been &lt;a href="http://www.ft.com/cms/s/0/939f9604-d56a-11e1-b306-00144feabdc0.html" title="India struggles to control Assam riots - FT.com"&gt;fighting Muslim migrants over land and political power in Assam &lt;/a&gt;– fled from cities such as Bangalore and Hyderabad last week after threats of violence sent by SMS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Muslims in Mumbai had previously been inflamed by media messages purportedly showing brutality towards their fellow followers of Islam, though the Indian government said some pictures were doctored and had been uploaded from Pakistan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Events in Bangalore, said Pavan Duggan, a lawyer specialising in IT issues, were “a classic case of mobile cyberterrorism”. He backed the government’s measures despite concerns about censorship. “Obviously there are some rumblings, but these are still small murmurs because everyone is very clear that the national interest will come over [mobile] revenues.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-ft-com-aug-21-2012-victor-mallet-james-crabtree-indian-mobiles-go-quiet-amid-sms-curb'&gt;https://cis-india.org/news/www-ft-com-aug-21-2012-victor-mallet-james-crabtree-indian-mobiles-go-quiet-amid-sms-curb&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-27T07:15:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-march-26-2018-indian-it-firms-not-ready-for-european-unions-proposed-privacy-laws-only-a-few-compliant-with-gdpr">
    <title>Indian IT firms not ready for European Union's proposed privacy laws, only a few compliant with GDPR</title>
    <link>https://cis-india.org/internet-governance/news/first-post-march-26-2018-indian-it-firms-not-ready-for-european-unions-proposed-privacy-laws-only-a-few-compliant-with-gdpr</link>
    <description>
        &lt;b&gt;Only a third of Indian IT firms are compliant with the European Union's General Data Protection Regulation (GDPR), which will come into force on 25 May, according to a media report.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="https://www.firstpost.com/business/indian-it-firms-not-ready-for-european-unions-proposed-privacy-laws-only-a-few-compliant-with-gdpr-4405679.html"&gt;published in First Post&lt;/a&gt; on March 26, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The GDPR, the EU's new online privacy rules, is designed to protect users' online privacy. The European Parliament has adopted the regulation but European governments have yet to approve the text.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Only 30-35 percent of all IT/ITeS companies have started their journey to work towards GDPR compliance,” Jaspreet Singh, Cyber Security Partner at EY, was quoted as saying by &lt;em&gt;&lt;a href="https://economictimes.indiatimes.com/tech/ites/only-a-third-of-indian-it-companies-ready-for-eu-privacy-laws/articleshow/63456683.cms" rel="nofollow" target="_blank"&gt;The Economic Times&lt;/a&gt;&lt;/em&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The GDPR is applicable to companies globally, and has significant potential financial penalties. Damages of any breach of privacy of user data from Europe could cost companies as much as four percent of their revenue, according to &lt;em&gt;The Economic Times&lt;/em&gt;. For the Indian IT sector, Europe ranks number two in terms of the amount of business it drives, with US still taking the lead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian firms, according to &lt;a href="http://www.business-standard.com/article/companies/indian-firms-slow-on-cybersecurity-might-gain-from-eu-s-upcoming-gdpr-118030200683_1.html" rel="nofollow" target="_blank"&gt;&lt;em&gt;Business Standard&lt;/em&gt;&lt;/a&gt;, are struggling to understand the GDPR policies. A survey by EY had shown that 60 percent of Indian respondents were unfamiliar with the new regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"When asked to describe their company’s current status with respect to complying with the GDPR, only 33 percent of respondents said that they have a plan, while 39 percent said that they are not familiar with the GDPR at all and 17 percent said that they have heard of the GDPR but have not yet taken any action," EY’s &lt;a href="http://www.ey.com/Publication/vwLUAssets/ey-how-can-you-disrupt-risk-in-an-era-of-digital-transformation/$FILE/ey-how-can-you-disrupt-risk-in-an-era-of-digital-transformation.pdf" rel="nofollow" target="_blank"&gt;Global Forensic Data Analytics Survey&lt;/a&gt; 2018 had said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What the GDPR is all about?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The GDPR attempts to unify data protection laws across the EU. It applies to all companies, regardless of location, that process the personal data of people living in the European Union.  It aims to strengthen the protection of EU citizens' personal details. It will apply to all companies, including those outside of the EU.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The GDPR is considered the biggest shake-up of personal data privacy rules since the birth of the internet. It is intended to give European citizens more control over their online information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the new regulation, users will be asked once and for all whether to accept cookies, rather than every time they visit a new website. Users will have the option of going invisible online, while the rules enshrine the so-called "right to be forgotten" legislation. The industries most deeply affected will be those that collect large amounts of customer data and include technology companies, retailers, healthcare providers, insurers and banks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies must be able to provide European customers with a copy of their personal data and under some circumstances delete it at their behest. They will also be required to report data breaches within 72 hours.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How Indian firms will be affected?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;a href="https://cis-india.org/internet-governance/files/gdpr-and-india" rel="nofollow" target="_blank"&gt;a study published by The Centre for Internet and Society&lt;/a&gt;, as a result of GDPR, data protection procedures like breach notification; excessive documentation and appointment of data protection officer may have to be incorporated in the Indian laws as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"As non – compliance involves high fines, inability of India or the organizations situated in India to qualify as data secure destinations is likely to divert business opportunities to safer locations," the study said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;(With inputs from agencies)&lt;/em&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-march-26-2018-indian-it-firms-not-ready-for-european-unions-proposed-privacy-laws-only-a-few-compliant-with-gdpr'&gt;https://cis-india.org/internet-governance/news/first-post-march-26-2018-indian-it-firms-not-ready-for-european-unions-proposed-privacy-laws-only-a-few-compliant-with-gdpr&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-04-18T00:56:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/indian-internet-lawsuit-puts-spotlight-on-freedom-of-expression">
    <title>Indian Internet Lawsuit Puts Spotlight on Freedom of Expression </title>
    <link>https://cis-india.org/news/indian-internet-lawsuit-puts-spotlight-on-freedom-of-expression</link>
    <description>
        &lt;b&gt;In India, Internet giants such as Google and Facebook are fighting a lawsuit after the government authorized their prosecution for online content on their sites deemed to be offensive. The case has put the spotlight on free speech in the world’s largest democracy. 
&lt;/b&gt;
        
&lt;p&gt;The criminal lawsuit filed by the editor of New Delhi-based Urdu weekly Akbari accuses 21 Internet companies of violating Indian law. Vinay Rai alleged that online material on their websites has the potential to incite religious conflict.&lt;/p&gt;
&lt;p&gt;Rai said his colleagues brought to his attention images of Prophet Muhammad which could offend Muslims. He cited other images and text which could hurt sentiments of Hindus and Christians. Rai wants Internet companies to screen content before it is posted.&lt;/p&gt;
&lt;p&gt;Google and Facebook have asked the Delhi High Court to dismiss the case against them. In an appeal, they&amp;nbsp; said it is impossible to filter all content or stop individuals from posting material online.&lt;/p&gt;
&lt;p&gt;Editor Rai filed the case after the government indicated its approval for the prosecution. The official go-ahead came weeks after the government also raised a similar demand.&lt;/p&gt;
&lt;h3&gt;Voluntary framework &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Telecommunications Minister Kapil Sibal told Internet company representatives to come up with a voluntary framework to keep offensive material off the net. After confronting them with photos and material derogatory of Indian Prime Minister Manmohan Singh and Congress Party leader Sonia Gandhi, he said the companies had not cooperated.&lt;/p&gt;
&lt;p&gt;Both the court case and the government’s demands have stoked fears of net censorship in the world’s largest democracy.&lt;/p&gt;
&lt;p&gt;Advocacy groups say the dispute between authorities and websites began simmering last year when India tightened laws to block content which could be deemed offensive. Citizens and officials can ask sites to block objectionable material and failure to comply within 36 hours can attract penalties or imprisonment of up to seven years.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, with the Center for Internet and Society in India, said these rules have the potential to curtail debate and discussion on the net.&lt;/p&gt;
&lt;p&gt;“These limits are vague.&amp;nbsp; They allow for all sorts of subjective tests by private parties and we predicted they would have a chilling effect on freedom of expression online," Abraham said. "Policy in India has been headed in a very worrisome direction."&lt;/p&gt;
&lt;p&gt;Abraham pointed out that one of his organization’s recent studies indicates that, faced with the threat of stiff penalties, most service providers removed content when asked to do so, even when it was not offensive or controversial.&lt;/p&gt;
&lt;h3&gt;Free media?&lt;/h3&gt;
&lt;p&gt;The government insists its objective is not to encroach on the fundamental right of free speech guaranteed by India’s democratic constitution. The clarification came from Minister Kapil Sibal after his meetings with Internet companies last month.&lt;/p&gt;
&lt;p&gt;"This government does not believe in censorship," noted Sibal. "This government does not believe in either directly or indirectly interfering in the freedom of the press, and we have demonstrated that time and again."&lt;/p&gt;
&lt;p&gt;India does have a vibrant free media and Internet access is largely free, unlike in China. But in a country with a history of religious violence, authorities have long tussled with the dilemma of balancing free speech with the need to not inflame sentiments among religious groups. India was one of the first countries to ban Salman Rushdie’s “The Satanic Verses.”&lt;/p&gt;
&lt;p&gt;Other books and articles have also faced bans. Many are challenged in courts and several have been overturned. Now the focus is on the Internet and questions are being raised about whether the web should or can be policed.&lt;/p&gt;
&lt;h3&gt;Online freedom&lt;/h3&gt;
&lt;p&gt;In a remark widely quoted in the domestic media, a judge hearing the case had warned websites that like China, India might be compelled to block some of them if they did not create means to curb material seen as offensive.&lt;/p&gt;
&lt;p&gt;However, Abraham from the Center of Internet and Society hopes that, as the latest case navigates its way through Indian courts, online freedom will come up the winner.&lt;/p&gt;
&lt;p&gt;"I think the executive in India has always been very conservative in freedom of expression. It is usually the courts in India that protect freedom of expression, the precedent," Abraham said. "So we are every hopeful that the current case is in the appropriate venue, and we are confident that, as in the past, the judiciary in India will stand on the side of freedom of expression."&lt;/p&gt;
&lt;p&gt;With 100 million people surfing the web, India has the world’s third largest number of Internet users after China and the United States.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.voanews.com/english/news/asia/Indian-Internet-Lawsuit-Puts-Spotlight-on-Freedom-of-Expression--137555168.html"&gt;Published in the Voice of America on 19 January 2012. Sunil Abraham is quoted in this.&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/indian-internet-lawsuit-puts-spotlight-on-freedom-of-expression'&gt;https://cis-india.org/news/indian-internet-lawsuit-puts-spotlight-on-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-01-19T08:59:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-intermediary-liability-regime">
    <title>Indian Intermediary Liability Regime: Compliance with the Manila Principles on Intermediary Liability</title>
    <link>https://cis-india.org/internet-governance/blog/indian-intermediary-liability-regime</link>
    <description>
        &lt;b&gt;This report assesses the compliance of the Indian intermediary liability framework with the Manila Principles on Intermediary Liability, and recommends substantive legislative changes to bring the legal framework in line with the Manila Principles. &lt;/b&gt;
        &lt;p&gt;&lt;span style="text-align: justify; "&gt;The report was edited by Elonnai Hickok and Swaraj Barooah&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The report is an examination of Indian laws based upon the background paper to the Manila Principles as the explanatory text on which these recommendations have been based, and not an assessment of the principles themselves. To do this, the report considers the Indian regime in the context of each of the principles defined in the Manila Principles. As such, the explanatory text to the Manila Principles recognizes that diverse national and political scenario may require different intermediary liability legal regimes, however, this paper relies only on the best practices prescribed under the Manila Principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report is divided into the following sections&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Principle I: Intermediaries should be shielded by law from liability for third-party content&lt;/li&gt;
&lt;li&gt;Principle II: Content must not be required to be restricted without an order by a judicial authority&lt;/li&gt;
&lt;li&gt;Principle III: Requests for restrictions of content must be clear, be unambiguous, and follow due process&lt;/li&gt;
&lt;li&gt;Principle IV: Laws and content restriction orders and practices must comply with the tests of necessity and proportionality&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;Principle V: Laws and content restriction policies and practices must respect due process&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;Principle VI: Transparency and accountability must be built into laws and content restriction policies and practices&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;Conclusion&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/indian-intermediary-liability-regime"&gt;Download the Full report here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-intermediary-liability-regime'&gt;https://cis-india.org/internet-governance/blog/indian-intermediary-liability-regime&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-05-20T15:14:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/zdnet-mahesh-sharma-march-14-2013-indian-id-crisis-unveils-aadhar-doubts">
    <title>Indian ID crisis unveils Aadhaar doubts</title>
    <link>https://cis-india.org/news/zdnet-mahesh-sharma-march-14-2013-indian-id-crisis-unveils-aadhar-doubts</link>
    <description>
        &lt;b&gt;Two separate organizations are capturing biometric data of over 1 billion Indians, creating fresh doubts in the government's justification to catalogue citizens.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The blog post by Mahesh Sharma was &lt;a class="external-link" href="http://www.zdnet.com/in/indian-id-crisis-unveils-aadhaar-doubts-7000012544/"&gt;published in ZD Net&lt;/a&gt; on March 14, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A new US$1 billion national identity card project has undermined the Indian government's ambitious "Aadhaar" project to catalogue the biometric details of over 1 billion citizens.&lt;br /&gt;&lt;br /&gt;Indians' biometric details are being captured by two separate organizations: the National Population Register, to develop the resident identity card (RIC); and the Unique Identification Authority of India (UIDAI), to create a &lt;a href="http://www.zdnet.com/indian-uid-can-resolve-social-ills-2062304315/"&gt;unique identifier&lt;/a&gt; (UID), commonly referred to as "&lt;a href="http://www.zdnet.com/in/uidai-targets-600m-m-banking-users-in-india-7000009927/"&gt;Aadhaar&lt;/a&gt;" number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both projects are designed to streamline the distribution of welfare and social services to citizens--a process that is currently mired in &lt;a href="http://www.zdnet.com/in/india-needs-stronger-will-to-fix-corruption-7000003667/"&gt;corruption&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;In an interview with ZDNet, Centre for Internet and Society's India executive director, Sunil Abraham, said the ID smartcard and ID number are fundamentally different, not complementary, as the government has previously said.&lt;br /&gt;&lt;br /&gt;"Those are two very separate visions. You cannot mix them up and make some kind of salad and have a little bit of this and a little bit of that. You have to go the whole hog in one direction," Abraham said. &lt;br /&gt;&lt;br /&gt;He said it was easier for the government to proceed with both projects, rather than cancel Aadhaar, which has been criticized over reports there were &lt;a href="http://www.zdnet.com/in/india-govt-investigates-aadhar-duplication-claims-7000011595/"&gt;duplicate biometric information and data abuse&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;"The government is afraid it made a mistake," Abraham said. "It could just continue to create a hodgepodge of both ideas, both visions, and continue making big mistakes and have ghosts [in the UID system] and large scale corruption."&lt;br /&gt;&lt;br /&gt;On March 12, India's house of representatives, the Lok Sabha, Member of Parliament, P. Karunakaran asked the Minister of State, R.P.N. Singh, to clarify the overlap between the proposed biometric identity card and UID. Singh confirmed the government would &lt;a href="http://www.zdnet.com/story/create/%20pib.nic.in/newsite/erelease.aspx?relid=93526" target="_blank"&gt;spend over US$1 billion (55.52 billion rupees)&lt;/a&gt; to issue a resident identity card (RIC) that featured the Aadhaar number.&lt;br /&gt;&lt;br /&gt;"The RIC would enable both online and offline authentication of identity in a secure manner and will complement the efforts of Aadhaar," Singh said in a written response. To avoid duplication, he explained that if citizen biometric data was already captured by the UIDAI, then the Aadhaar number would be recorded on the RIC smart card.&lt;br /&gt;&lt;br /&gt;Independent lawyer Usha Ramanathan told ZDNet the government had overstepped its legal bounds. She said the UIDAI has demonstrated biometrics are imperfect but the government has persisited with the project.&lt;br /&gt;&lt;br /&gt;"The UID is lawless. Now we will have an RIC which will be lawless," Ramanathan said. "All we are offered is the UIDAI 'confidence' that the project will work."&lt;br /&gt;&lt;br /&gt;"Privacy and personal security continue to be unprotected. And there seems to be an inexhaustible amount of money to experiment on the whole population," she noted.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/zdnet-mahesh-sharma-march-14-2013-indian-id-crisis-unveils-aadhar-doubts'&gt;https://cis-india.org/news/zdnet-mahesh-sharma-march-14-2013-indian-id-crisis-unveils-aadhar-doubts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-03-15T04:52:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-register-phil-muncaster-june-27-2013-indian-govt-blocks-40-smut-sites-forgets-to-give-reason">
    <title>Indian govt blocks 40 smut sites, forgets to give reason</title>
    <link>https://cis-india.org/news/the-register-phil-muncaster-june-27-2013-indian-govt-blocks-40-smut-sites-forgets-to-give-reason</link>
    <description>
        &lt;b&gt;Don't mind us, we're just censoring your content for you...&lt;/b&gt;
        &lt;p&gt;The article by Phil Muncaster was &lt;a class="external-link" href="http://www.theregister.co.uk/2013/06/27/india_government_smut_sites_ban/"&gt;published in "The Register" on June 27, 2013&lt;/a&gt;. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Indian government has ordered ISPs to block 39 smut flick web sites  hosted outside the country without giving any explanation, stoking  further fears of online censorship by the back door.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most of the sites are web forums and so allow for the uploading of  naughty images and URLs where smut-seekers can download their grumble  flicks, according to &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Govt-goes-after-porn-makes-ISPs-ban-sites/articleshow/20769326.cms" target="_blank"&gt;&lt;i&gt;Times of India&lt;/i&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the sites claim to operate under the 18 USC 2257 rule, meaning  actors are (supposedly) over 18 years of age, and there is apparently no  indication from the Department of Telecom's order why ISPs are being  asked to comply.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The message greeting web users who try to visit a blocked site now reads as follows:&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;This website has been blocked until further notice either pursuant to   court orders or on the directions issued by the Department of   Telecommunications.&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;While the law, updated in 2011, does forbid production, transmission and  sharing of smutty content in India - therefore requiring internet  cafes, for example, to block such content - there is no ban on  consumption, especially from sites hosted outside India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, director of Indian not-for-profit the Centre for Internet and Society, told &lt;i&gt;ToI&lt;/i&gt; that the government is probably interpreting the law to serve its own ends, and that its ISP order “is a clear overreach”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Union government has certainly been quick in the past to order blocks on any content deemed inappropriate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook and Google were &lt;a href="http://www.theregister.co.uk/2012/02/06/india_content_blocking/" target="_blank"&gt;forced to remove&lt;/a&gt; “objectionable content” from their Indian sites last year after complaints it was offensive to Muslims, Hindus and Christians.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government was also one of many across the globe to &lt;a href="http://www.theregister.co.uk/2012/09/19/youtube_backlash_muslim_world/" target="_blank"&gt;force Google&lt;/a&gt; to block notorious YouTube video Innocence of Muslims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A controversial &lt;a href="http://www.theregister.co.uk/2012/06/25/india_pirates_censorship_sites_unblocked/" target="_blank"&gt;anti-piracy ruling&lt;/a&gt; last June, meanwhile, led to a clumsy, large-scale block on a number of  legitimate sites in the country – drawing the ire of hacktivist group &lt;a href="http://www.theregister.co.uk/2012/05/18/anonymous_ddos_india_sites/" target="_blank"&gt;Anonymous&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government also &lt;a href="http://www.theregister.co.uk/2012/08/24/india_bans_twitter_journalists/" target="_blank"&gt;closed hundreds of sites&lt;/a&gt; and social media accounts in August last year in a bid to prevent the escalation of sectarian violence across the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, the number of content removal requests &lt;a href="http://www.google.com/transparencyreport/removals/government/" target="_blank"&gt;received by Google&lt;/a&gt; increased by 90 per cent from July-December 2012 compared with the previous six months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For these reasons, India only enjoys “Partly Free” status, according to the &lt;i&gt;Freedom on the Net 2012&lt;/i&gt; &lt;a href="http://www.freedomhouse.org/sites/default/files/resources/FOTN%202012%20Summary%20of%20Findings.pdf" target="_blank"&gt;report&lt;/a&gt; from not-for-profit Freedom House.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-register-phil-muncaster-june-27-2013-indian-govt-blocks-40-smut-sites-forgets-to-give-reason'&gt;https://cis-india.org/news/the-register-phil-muncaster-june-27-2013-indian-govt-blocks-40-smut-sites-forgets-to-give-reason&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-07-01T09:04:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu">
    <title>Indian Government's Submission to ITU</title>
    <link>https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu</link>
    <description>
        &lt;b&gt;The following is the text of the submission made by the Government of India to the World Conference of International Telecommunications, Dubai on November 3, 2012. This is the final version of a draft that was circulated earlier.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Read the &lt;a class="external-link" href="http://http//cis-india.org/internet-governance/blog/reaction-to-draft-proposal-from-india-on-final-draft-itr-document-of-itu"&gt;detailed comments&lt;/a&gt; on India's draft proposal on the Proposed Amendments to the ITU’s ITR’s – November 3, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p align="LEFT"&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt; &lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;
World Conference on International&lt;br /&gt;Telecommunications (WCIT-12)&lt;br /&gt;Dubai, 3-14 December 2012&lt;/th&gt; &lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;img class="image-inline" src="../resources/resolveuid/2b2aa8d8eaa543589c198514e272696f" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p align="LEFT"&gt;&lt;span&gt;&lt;span&gt;PLENARY MEETING&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;th&gt;Document 21-E&lt;br /&gt;3 November 2012&lt;br /&gt;Original: English&lt;br /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="CENTER"&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;India (Republic of)&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: center; "&gt;PROPOSALS FOR THE WORK OF THE CONFERENCE&lt;/p&gt;
&lt;p align="LEFT"&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt; &lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;We recognise and appreciate the efforts of  International Telecommunication Union in preparing the Draft on proposed  ITRs for WCIT 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  attached proposal is developed through a consultation process involving  various stakeholder groups, both, in Indian Public and Private sectors.   Due consideration has been given to the existing legislations and  government policies in the preparation of this proposal. We acknowledge  that since 1988, there have been significant changes and challenges in  Telecommunications / ICTs in terms of Technological breakthroughs, New  Services and Market Structure. Acknowledging this fact, India’s proposal  is offered in the form of addition (ADD) or modification (MOD) only on  some of the relevant proposals, by giving reference to the appropriate  CWG/4/XXX number mentioned in the Annex 2 of the ITU Document  4(Add.2)-E. Considering the magnitude of issues in International  Telecommunications, India may take appropriate stand on other provisions  of the draft ITR document during the WCIT discussions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further,  the proposals from different regions to the conference as well as its  preparatory process were carefully studied. In order to help the  conference achieve a consensus on the various issues being discussed,  the content of this proposal has been largely drawn from the output of  the Council Working Group on WCIT (WCIT/4 Add.2 ” Draft of the future  ITRs”).&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;A new proposal on &lt;i&gt;5A: Confidence and Security of Telecommunications/ICTs&lt;/i&gt; is also included as India believes that an international framework on Security is of importance in today’s connected world.&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;b&gt; INTERNATIONAL TELECOMMUNICATION&lt;br /&gt;REGULATIONS&lt;/b&gt;&lt;br /&gt;&lt;b&gt;PREAMBLE&lt;/b&gt;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;MOD&lt;/p&gt;
&lt;/th&gt;
&lt;td&gt;IND/21/1&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1&lt;/b&gt; While the sovereign right of each Member State to regulate its  telecommunications is fully recognized, the provisions of the present  International Telecommunication Regulations (hereinafter “Regulations”)  complement the Constitution and Convention of the International  Telecommunication Union, with a view to attaining the purposes of the  International Telecommunication Union in promoting the development of  telecommunication services and their most efficient operation while  harmonizing the development of facilities for world-wide  telecommunications.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/3&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 1&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;Purpose and Scope of the Regulations&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3A&lt;/b&gt; &lt;i&gt;c)&lt;/i&gt; These Regulations recognize that Member States should endeavour to take  the necessary measures to prevent interruptions of services and ensure  that no harm is caused by their operating agencies to the operating  agencies of other Member States which are operating in accordance with  the provisions of these Regulations.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/12&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/3&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3B&lt;/b&gt; &lt;i&gt;d)&lt;/i&gt; These Regulations recognize the absolute priority for safety of life  telecommunications, including distress telecommunications, emergency  telecommunications services and telecommunications for disaster relief  as provided in Article.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/14&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 2&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;Definitions&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/4&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14A&lt;/b&gt; 2.1A	&lt;i&gt;Telecommunication/ICT: &lt;/i&gt;Any  transmission, emission or reception, including processing, of signs,  signals, writing, images and sounds or intelligence of any nature by  wire, radio, optical or other electromagnetic systems, having a bearing  on Telecommunication Technologies and Services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/48&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/5&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27A &lt;/b&gt;2.11	&lt;i&gt;Transit rate&lt;/i&gt;: a rate set by the point of transit in a third country (indirect relation).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/74&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27C &lt;/b&gt;2.13	&lt;i&gt;Spam&lt;/i&gt;:  information transmitted over telecommunication networks as text, sound,  image, tangible data used in a man-machine interface bearing  advertizing nature or having no meaningful message, simultaneously or  during a short period of time, to a large number of particular  addressees without prior consent of the addressee (recipient) to receive  this information or information of this nature.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/78&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27D &lt;/b&gt;2.14	&lt;i&gt;Hub&lt;/i&gt;:  a transit center (or network operator) that offers to other operators a  telecommunication traffic termination service to nominated destinations  contained in the offer.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/80&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27E &lt;/b&gt;2.15	&lt;i&gt;Hubbing&lt;/i&gt;:  the routing of telecommunication traffic in hubbing mode consists in  the use of hub facilities to terminate telecommunication traffic to  other destinations.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/82&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/9&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27F &lt;/b&gt;2.16	&lt;i&gt;Network fraud&lt;/i&gt;:  (fraud on international telecommunication networks): The causing of  harm to operating agencies or to the public, the wrongful obtaining of  gain in the provision of international telecommunication services  through abuse of trust or deception, including through inappropriate use  of numbering resources.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/87&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/10&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27G &lt;/b&gt;2.17	&lt;i&gt;Global telecommunication service (GTS)&lt;/i&gt;:  A service which enables communication to be established through a  global number between subscribers whose physical location and national  jurisdiction have no bearing on the tariff to be set for the service’s  use; which satisfies and complies with recognized and accepted  international standards; and which is provided over the public  telecommunication network by operating agencies having obtained the  relevant numbering resources from ITU-T.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/89&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/11&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27H &lt;/b&gt;2.21	&lt;i&gt;Originating Identification&lt;/i&gt;:  The Originating Identification is the service by which the terminating  party shall receive the identity information in order to identify the  origin of the communication.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/81&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/12&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27L &lt;/b&gt;2.25	&lt;i&gt;Stability of the international telecommunication network&lt;/i&gt;:  The capability of the international telecommunication network to carry  international traffic in the event of failure of telecommunication nodes  or links and also in the face of internal and external destructive  actions and to return to its original state.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/99&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/13&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27M &lt;/b&gt;2.26	&lt;i&gt;Security of the international telecommunication network&lt;/i&gt;:  The capability of the international telecommunication network to  withstand internal and external destabilizing actions liable to  compromise its functioning.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/101&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/14&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27N &lt;/b&gt;2.27	&lt;i&gt;International&lt;/i&gt; &lt;i&gt;Roaming&lt;/i&gt;:  Provision to the subscriber of the opportunity to use telecommunication  services offered by other operating agencies of other member states,  with which the subscriber has not concluded an agreement.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/103&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/15&lt;/p&gt;
&lt;p&gt;&lt;b&gt;27O &lt;/b&gt;2.28	&lt;i&gt;IP interconnection: &lt;/i&gt;IP interconnection refers to means and rules employed to ensure the delivery of IP traffic through different networks.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/105&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/16&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27P &lt;/b&gt;2.29	&lt;i&gt;End to end quality of service delivery and best effort delivery: &lt;/i&gt;End  to End quality of service delivery refers to the delivery of PDU  (Packet Data Unit) with predefined end-to-end performance objectives;  Best-effort delivery refers delivery to of a PDU without predefined  performance targets.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/107&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 3&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;International Network&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/17&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;31A &lt;/b&gt;3.5 	Member States shall ensure that international naming, numbering,  addressing and identification resources are used only by the assignees  and only for the purposes for which they were assigned; and that  unassigned resources are not used.  The provisions of the relevant ITU-T  Recommendations shall be applied.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/134&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/18&lt;/p&gt;
&lt;p&gt;&lt;b&gt;31B &lt;/b&gt;3.6	International calling party number delivery shall be provided in accordance with relevant ITU-T Recommendations.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/142&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 4&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;International Telecommunication Services&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/19&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;34&lt;/b&gt; 4.3	Subject to national law, Member States shall endeavour to ensure  that operating agencies provide and maintain, to the greatest extent  practicable, a satisfactory quality of service corresponding to the  relevant ITU-T Recommendations with respect to:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/168&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/20&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;35&lt;/b&gt; &lt;i&gt;a)&lt;/i&gt; access to the international network by users using terminals which are  permitted to be connected to the network and which do not cause harm or  diminish the level of safety and security of technical facilities and  personnel;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/174&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/21&lt;/p&gt;
&lt;p&gt;&lt;b&gt;36&lt;/b&gt; &lt;i&gt;b)&lt;/i&gt; international telecommunication facilities and services available to customers for their use;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/176&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/22&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;37&lt;/b&gt; &lt;i&gt;c)&lt;/i&gt; at least a form of telecommunication service which is reasonably  accessible to the public, including those who may not be subscribers to a  specific telecommunication service; and&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/179&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/23&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38&lt;/b&gt; &lt;i&gt;d)&lt;/i&gt; a capability for interworking between different services, as  appropriate, to facilitate international telecommunication services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/181&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/24&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38A &lt;/b&gt;4.4 	Member States shall ensure that operating agencies providing  international telecommunication services, including roaming, make  available to subscribers information on tariffs and taxes. Each  subscriber should be able to have access to such information and receive  it in a timely manner and free of charge when roaming (entering into  roaming), except where the subscriber has previously declined to receive  such information.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/188&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/25&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38B &lt;/b&gt;4.5 	Given the particular characteristics of GTS, which allows subscribers  to have a worldwide number, implement GTSs in accordance with the  National regulations.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/195&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/26&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38E &lt;/b&gt;4.8 	Member States, subject to national security requirements, may foster  the establishment of mutual agreements on mobile services accessed  within a predetermined border zone in order to prevent or mitigate  inadvertent roaming charges.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/201&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 5&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;Safety of Life and Priority of Telecommunications&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/27&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;39&lt;/b&gt; 5.1	Safety of life telecommunications, including distress  telecommunications, emergency telecommunication services and  telecommunications for disaster relief, shall be entitled to  transmission as of right and shall, where technically practicable, have  absolute priority over all other telecommunications, in accordance with  the relevant Articles of the Constitution, Convention and relevant ITU-T  Resolutions and Recommendations.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/204&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/28&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;41B &lt;/b&gt;5.5 	Member States should cooperate to introduce in addition to their  existing national emergency numbers, a global number for calls to the  emergency services globally.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/217&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/29&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;41C &lt;/b&gt;5.6 	Member States shall ensure that operating agencies inform every roaming  subscriber of the number to be used for calls to the emergency  services, while entering into roaming, free of charge.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/219&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/30&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 5A&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;Confidence and security of telecommunications/ICTs&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/221&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/31&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;41D&lt;/b&gt; 5A1.	Member‐States shall have the right to take appropriate measures to  protect and Secure the  ICT Network infrastructure and data contained   in or flowing through the Network and also to  prevent the misuse of ICT  network and services within their state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5A2.	 The Member States should endeavour to take appropriate measures,  individually or in cooperation with other Member states, to ensure  Security of the ICT Network and information, including user information,   contained in or flowing through the ICT network within their  jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5A3.	 Member‐States  should endeavour to oversee that Operating Agencies  in  their territory do not engage in activities which impinge on the  security and integrity of ICT  network such as denial of service attack,  unsolicited electronic communication (spam), unsolicited access to  network elements and devices etc., to enable  effective functioning of  ICTs in secure and trustworthy conditions.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;a name="id.tyjcwt"&gt;&lt;/a&gt; 5A4.	 Member States  should endeavour to cooperate to harmonize national laws,  jurisdictions, and practices in the relevant areas.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; Combined proposal on clauses proposed from &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/222 &lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;to&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt; 232&lt;/a&gt;&lt;/span&gt; in 5A and 5B.&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 6&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;Charging and Accounting&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/32&lt;/p&gt;
&lt;p&gt;&lt;b&gt;43A&lt;/b&gt; 6.1.1A	Cost of International Roaming Services&lt;/p&gt;
&lt;p&gt;a)	Member States shall encourage competition in the international roaming market;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b)	Member States are encouraged to cooperate to develop policies for reducing charges on international roaming services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/243&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/33&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;45&lt;/b&gt; 6.1.3	Member States are free to levy fiscal taxes on international  telecommunication services in accordance with their national laws;  however, the Member States should endeavour to avoid international  double taxation on such services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/249&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/34&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54E&lt;/b&gt; 6.10	Subject to national law, Member States shall ensure that Operating  Agencies collaborate in preventing and controlling fraud in  international telecommunications by:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;–	 Identifying and transmitting to the transit and destination Operating  Agencies the pertinent information required for the purposes of payment  for the routing of international traffic, in particular the originating  Country Code, National Destination Code and the Calling Party Number.&lt;/p&gt;
&lt;p&gt;–	Following up requests of other Member States or their Operating  Agencies to investigate calls that cannot be billed, and helping to  resolve outstanding accounts.&lt;/p&gt;
&lt;p&gt;–	Following up requests of other Member States or their Operating  Agencies to identify the source of calls originated from their  territories exerting potential fraudulent activity.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/287&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/35&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54F&lt;/b&gt; 6.11	The ITU Standardization Sector shall be responsible for  disseminating the regulatory frameworks in place in administrations  having an impact on matters related to fraud.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/289&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/36&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54H&lt;/b&gt; 6.12A	Member States shall foster the establishment of international  roaming mobile services prices based on principles of reasonability,  competitiveness and non-discrimination relative to prices applied to  local users of the visited country.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/293&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/37&lt;/p&gt;
&lt;p&gt;&lt;b&gt;54K&lt;/b&gt; 6.14	Member States should foster continued investment in high-bandwidth infrastructures.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/299&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/38&lt;/p&gt;
&lt;p&gt;&lt;b&gt;54L&lt;/b&gt; 6.15	Member States shall promote cost-oriented pricing.   Regulatory measures may be imposed to the extent that this cannot be  achieved through market mechanisms and to the extent that such measures  do not hinder competition.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/301&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/39&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54N&lt;/b&gt; 6.17	Member States shall promote transparency of end-user prices, in  particular to avoid surprising bills for international services (e.g  mobile roaming and data roaming).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/305&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/40&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54S&lt;/b&gt; 6.D	Member States should endeavour to take measures to ensure that an  adequate return is provided on investments in network infrastructures in  identified areas.  If this cannot be achieved through market  mechanisms, then other mechanisms may be used.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/315&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/41&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54O&lt;/b&gt; 6.18	Member States should consider measures to favour special interconnection rates for landlocked countries.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/307&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/42&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54P&lt;/b&gt; 6.18A	Member States should endeavour that Recognized Operating Agencies  establish charging units and parameters that bill telecommunication  service consumers according to what is effectively consumed.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/309&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/43&lt;/p&gt;
&lt;p&gt;&lt;b&gt;54R&lt;/b&gt; 6.20	Rendering and Settlement of Accounts&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6.20.1 	The settlement of international accounts shall be regarded as current  transactions and shall be effected in accordance with the current  international obligations of the Member States and Sector Members  concerned in those cases where their governments have concluded  arrangements on this subject. Where no such arrangements have been  concluded, and in the absence of special agreements made under Article  42 of the Constitution, these settlements shall be effected in  accordance with the Administrative Regulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6.20.2 	Administrations of Member States and Sector Members which operate  international telecommunication services shall come to an agreement with  regard to the amount of their debits and credits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6.20.3 	The statement of accounts with respect to debits and credits referred  to in No. 498 above shall be drawn up in accordance with the provisions  of the Administrative Regulations, unless special arrangements have been  concluded between the parties concerned.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; The text is taken from CV 497, 498 and 499. This proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/313&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/44&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;57B&lt;/b&gt; Member States shall encourage the provision of global services based on  international standards that ensure accessible telecommunications and  ICT services to persons with disabilities.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0005/en"&gt;HNG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0005/en"&gt;/5/2&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu'&gt;https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-09T00:48:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-january-3-2014-sruthijit-kk-indian-govt-websites-gold-mine-for-cybercriminals">
    <title>Indian government websites: Gold mine for cybercriminals</title>
    <link>https://cis-india.org/news/the-times-of-india-january-3-2014-sruthijit-kk-indian-govt-websites-gold-mine-for-cybercriminals</link>
    <description>
        &lt;b&gt;If you are a cybercriminal trying to commit identity theft or digitally impersonate a citizen, you have help from the unlikeliest of sources — the Government of India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Srutijith KK was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Indian-government-websites-Gold-mine-for-cybercriminals/articleshow/28320517.cms"&gt;published in the Times of India&lt;/a&gt; on January 3, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Various &lt;a href="http://timesofindia.indiatimes.com/topic/government-agencies"&gt;government agencies&lt;/a&gt; have put vast amount of &lt;a href="http://timesofindia.indiatimes.com/topic/personal-information-online"&gt;personal information online&lt;/a&gt;, often with little barrier to access and with hardly any provision to prevent their misuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Combine a few of these databases and you have a gold mine of information on India's citizens, including some of its wealthiest residents, whose bank accounts are of special interest to thieves. "If I want to target someone, I now have access to so much detail that shouldn't have been in public. Hackers with good social engineering skills will be able to call a call centre and impersonate a person. And from a stalking perspective, it has implications for not just celebrities, but anybody with a jilted lover, a political rival, and so on," said Binoo Thomas, a digital security expert at McAfee Labs.&lt;br /&gt;&lt;br /&gt;For example, if somebody wants to get personal details of some of India's richest people, he would simply need to click on the LPG transparency links on Indane, Bharat Gas and HP portals and narrow the search to the South Mumbai region. Many gas agencies have their area of service in their names, such as Bandra Gas Agency or Colaba Gas Agency.&lt;br /&gt;&lt;br /&gt;Select one of these gas agencies and you have a list of all the customers, with their consumer number, address and, in many cases, a mobile number. This database is also searchable by name. You can quickly search for any famous surname and be rewarded with a consumer number, residence address and in many cases, a mobile phone number.&lt;br /&gt;&lt;br /&gt;A cursory search gave ET the mobile number and full residential address of the well-known matriarch of a famous business family. A search under the Bandra Gas Agency promptly showed the full residential address of a famous Bollywood actress. Your next stop could be the website of the Election Commission of India, which has asked all state Election Commissions to place the entire voter rolls online.&lt;br /&gt;&lt;br /&gt;The voter roll also has the full residential address, age and gender of a person. A quick search on the MTNL Mumbai directory online will reveal the landline number for a person. With a little bit of luck and time to troll social networks such as Facebook and LinkedIn, a skilled cybercriminal can discern your date of birth and professional details.&lt;br /&gt;&lt;br /&gt;Date of birth, phone number, alternate number and billing address are the details many telephone companies and banks use to determine whether a person calling its customer helpline is indeed who she says she is. This kind of information also allows a hacker to design effective phishing attacks, which lures a person into revealing information such as passwords or credit card numbers. An email that lists accurate personal information appears authoritative and has greater likelihood of being trusted by a recipient.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Thread of identity theft&lt;/b&gt;&lt;br /&gt;This kind of crime has been on the rise. In December, US Department of Justice estimated that $24.7 billion were lost to identity theft in 2012, as 11.5 million Americans found themselves defrauded. Similar data is unavailable for India. "Privacy has become a matter of personal security. As the state has been pushed to function in a more transparent manner, authorities are making the details about us transparent instead! The data protection principles are well evolved all over the world.&lt;br /&gt;&lt;br /&gt;All of these data controllers are in violation of every good principle. We don't need to wait for a law to observe these principles," said Usha Ramanathan, an independent law researcher specialising in privacy, surveillance and related issues. The ministry of rural development, which administers the Mahatma Gandhi National Rural Employment Guarantee Scheme, goes a step further, and places online the bank account numbers and IFSC codes for all its beneficiaries.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;RTI requirements&lt;/b&gt;&lt;br /&gt;The justification for publishing this kind of data online is typically section 4 of the RTI Act, which requires all government departments to proactively publish details of subsidy programmes, including details of the subsidy availed. However, section 8(1) of the same Act says that personal information that invades privacy of an individual need not be published unless an appellate authority decides that a larger public interest is served by it. It's unclear what public interest is served by the publication of full residential address, mobile number or bank accounts by various agencies.&lt;br /&gt;&lt;br /&gt;In some cases, like the MNREGS and the voter rolls, sector-specific laws also apply. "Going by the provisions of the MGNREGA, which mandates proactive disclosures, we keep all processes in the public view... We have not perceived any threat in displaying bank account numbers of wage seekers, most of which have been opened for receiving wages," said R Subrahmanyam, the joint secretary at the ministry of rural development who heads the MNREGA division.&lt;br /&gt;&lt;br /&gt;The petroleum ministry did not respond to an email requesting comment. In an emailed response, Chief Election Commissioner VS Sampath referred to Rule 33 of the Registration of Elector Rules, 1960, to establish that the voter roll was a public document. "Thus it can be seen that Electoral Roll is a public document which is available to the public for inspection. The Commission has, therefore, given instructions to put this public document on the website to facilitate inspection by public. When law stipulates that it is a public document, the public has a right to access it," he said. But no law states that anonymising techniques or relevant barriers to accessing private information should not be deployed.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Legal vacuum&lt;/b&gt;&lt;br /&gt;India does not have an omnibus privacy law that overrides sector specific legislation. According to Sunil Abraham of the Bangalore-based thinktank Centre for Internet and Society, there are some 50 different laws that have a privacy element in India. The Department of Personnel and Training has been working on a draft privacy law for three years now.&lt;br /&gt;&lt;br /&gt;"We need to think of this problem in the light of the privacy law that is being drafted. Traditionally and culturally our view of privacy has been different. A more explicit understanding of the privacy needs of the citizens is certainly welcome. Section 43A of the IT Act has provisions for data protection," said J Satyanarayana, secretary at the department of information technology.&lt;br /&gt;&lt;br /&gt;But 43A applies only to corporations, and government agencies are not bound by it. Apart from the central government agencies, several state government agencies and schemes also collect and store personal information. But no standard protocol binds them in deciding who shall have access and who shall not.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-january-3-2014-sruthijit-kk-indian-govt-websites-gold-mine-for-cybercriminals'&gt;https://cis-india.org/news/the-times-of-india-january-3-2014-sruthijit-kk-indian-govt-websites-gold-mine-for-cybercriminals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-31T06:18:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail">
    <title>Indian government wakes up to risk of Hotmail, Gmail</title>
    <link>https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail</link>
    <description>
        &lt;b&gt;Worried by US spying revelations, India has begun drawing up a new email policy to help secure government communications, but the man responsible for drafting the rules still regularly uses Hotmail.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was originally published by &lt;a class="external-link" href="http://www.google.com/hostednews/afp/article/ALeqM5goPLsuDV0nXQ5To1xWzthPSETXlw?docId=f8f4236f-1218-4fea-bf25-a01a9f50351a"&gt;AFP&lt;/a&gt; on December 7, 2013, was also mirrored by the &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-12-09/internet/44988376_1_new-email-policy-nsa-official-email"&gt;Times of India&lt;/a&gt;, &lt;a class="external-link" href="http://www.livemint.com/Home-Page/VBuZT9V4A5vsNOcEDuZZfL/India-wakes-up-to-risk-of-Hotmail-Gmail.html"&gt;Livemint&lt;/a&gt;, &lt;a class="external-link" href="http://www.gulf-times.com/india/185/details/374083/govt-wakes-up-to-hotmail,-gmail-risk"&gt;Reuters&lt;/a&gt;, &lt;a class="external-link" href="http://www.dawn.com/news/1061413/indian-government-wakes-up-to-risk-of-hotmail-gmail"&gt;Dawn&lt;/a&gt;, &lt;a class="external-link" href="http://www.ndtv.com/article/india/indian-government-wakes-up-to-risk-of-hotmail-gmail-455999"&gt;NDTV&lt;/a&gt;, &lt;a class="external-link" href="http://nz.news.yahoo.com/a/-/technology/20216609/indian-government-wakes-up-to-risk-of-hotmail-gmail/"&gt;Yahoo News&lt;/a&gt;, &lt;a class="external-link" href="http://www.themalaysianinsider.com/technology/article/indian-government-wakes-up-to-risk-of-hotmail-gmail"&gt;The Malaysian Insider&lt;/a&gt; and &lt;a class="external-link" href="http://www.digitalone.com.sg/news/article/28250"&gt;Asia One Digital&lt;/a&gt;. A slightly modified version was &lt;a class="external-link" href="http://www.siliconindia.com/news/enterpriseit/Indian-Government-Boots-to-Safe-Mode-After-Gmail-And-Hotmail-Security-Threats--nid-157899-cid-7.html"&gt;published by Silicon India&lt;/a&gt; on December 11. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Like many of his peers in ministries across New Delhi, IT Minister Kapil Sibal's office recently sent an email inviting journalists to the launch of his new personal website using the free email service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others, including senior foreign ministry officials, the information and broadcasting minister and the health ministry secretary, also use Gmail, Hotmail or Yahoo instead of their government accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When asked why he continued to use his Hotmail for official use, Sibal declined to comment, but a senior bureaucrat in his ministry admitted that he personally preferred Gmail because it is "just a lot easier".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We keep moving, get different designations, go different places and with that, our emails change. You lose contacts and important emails, which you don't need to worry about with a Gmail account," the bureaucrat told AFP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"To be honest, the quality of our official mail isn't that great yet. It still needs some work," he added on condition of anonymity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Security concerns&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;IT security expert Sunil Abraham said the use of Gmail and the like was highly risky since the American services had their servers in the US and the National Security Agency has been known to tap into their database systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unclear how many state and federal public workers actively use popular email services for office, but some of the estimates are startling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"As much as 90 percent of government officials use private email (services) for official use... that's because their official email is not as stable or speedy," said Abraham, executive director of the Bangalore-based Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In September Sibal's ministry announced a new "Email Policy of the Government of India" in the wake of spying allegations about the NSA revealed by former NSA contractor Edward Snowden.&lt;br /&gt;NSA's tentacles not only crept into the Indian embassy in Washington and its UN office in New York, but also accessed email and chat messenger contact lists of hundreds of millions of ordinary citizens worldwide, according to media reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During a single day last year, the NSA's Special Source Operations branch collected 444,743 email address books from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail and 22,881 from unspecified other providers, The Washington Post said, according to an internal NSA presentation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The $11 million Indian project aims to bring some five million public employees onto the government's email domain powered by the National Informatics Centre (NIC) as early as mid-December.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is awaiting clearances and suggestions from all ministries before the proposal goes to the cabinet this month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;J. Satyanarayana, secretary of the department of electronics and IT, dismissed claims that the policy was too late and was a response to the Snowden scandal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The policy is not a reaction to any global spying revelations, it was already in the works. It is just a mere coincidence that both came around the same time," he said.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Fresh doubts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some cyber security experts say bringing millions aboard a centralised server could make a hacker's job easier, with all critical government information available on a single platform.&lt;br /&gt;More than 11,000 Indian websites were hacked or defaced between May and August this year, with a large number of attacks on the ".in" domain whose servers are in India, the Times of India reported last month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Making the use of a centralised government server is not the best way to proceed. Having everything on one platform makes it even more vulnerable to cyber attacks and hacking," said Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It also brings about new worries of the NIC becoming the local snoop."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some also predict that the ambitious policy would eventually fizzle out for lack of attention from ministers and bureaucrats, who work in government offices where stacks of yellowing files and papers are still a common sight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It's sad but most of these officials don't understand much about technology, so mastering email is something that is miles and miles away," said Vijay Mukhi, a Mumbai-based cyber security expert.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These guys saw all the snooping news and suddenly they woke up and said 'lets make an email policy'. Enforcing this is not possible on a practical basis."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT ministry also plans to conduct workshops to teach employees about email security such as when to change passwords and user names and how to use email.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Every employee should know how, what and when critical data can be vulnerable... with most work still done on paper, it is important to know the nitty-gritty of using email," Satyanarayana said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail'&gt;https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-12-30T04:24:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business">
    <title>Indian government to bar politicians from using Gmail for official business</title>
    <link>https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business</link>
    <description>
        &lt;b&gt;US-based email services seen as too risky.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This article by Neil McAllister was &lt;a class="external-link" href="http://www.theregister.co.uk/2013/08/30/india_government_gmail_ban/"&gt;published in the Register on August 30, 2013&lt;/a&gt;. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The government of India is reportedly planning to bar its employees  from using Gmail and other foreign-based email services, amid concerns  over surveillance by US spy agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Gmail data of Indian users  resides in other countries as the servers are located outside," J  Satyanarayana, India's secretary of electronics and information  technology, &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Cyberspying-Government-may-ban-Gmail-for-official-communication/articleshow/22156529.cms" target="_blank"&gt;told&lt;/a&gt; the &lt;i&gt;Times of India&lt;/i&gt;. "Currently, we are looking to address this in the government domain, where there are large amounts of critical data."&lt;/p&gt;
&lt;div class="not_moved article_side_content" style="text-align: justify; "&gt;
&lt;div id="article-mpu-container"&gt;
&lt;div class="adu" id="ad-mu1-spot"&gt;
&lt;div id="ad-mu1-spot_ad_container"&gt;&lt;ins&gt;&lt;ins&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The Indian government currently employs some 500,000 people, many  of whom use Gmail for their primary email addresses. A quick glance at  the &lt;a href="http://deity.gov.in/content/people-and-offices" target="_blank"&gt;contact page&lt;/a&gt; for the country's Department of Electronics and Information Technology  reveals at least eight senior officials using Gmail, and still others  with Yahoo! addresses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the new directive, government  employees will be asked to stick to official email addresses provided by  India's National Informatics Centre (NIC). But an unnamed senior  government IT official told the &lt;i&gt;Times of India&lt;/i&gt; that many  government workers choose Gmail and other foreign services because they  are easier to use, and setting up accounts is much faster than working  within the bureaucratic process of the NIC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move toward  locally run email for Indian government workers comes in the wake of a  string of revelations from documents leaked by Edward Snowden. Among the  recent disclosures has been details of US electronic surveillance of  foreign governments on US soil, where the National Security Agency even  went as far as to snoop encrypted communications from &lt;a href="http://www.theregister.co.uk/2013/08/27/un_to_question_us_on_nsa/"&gt;United Nations headquarters&lt;/a&gt; in New York City.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No  doubt equally concerning was a motion filed by Google in a US district  court earlier this month, in which the Chocolate Factory &lt;a href="http://www.theregister.co.uk/2013/08/14/google_cloud_users_have_no_legitimate_expectation_of_privacy/"&gt;asserted&lt;/a&gt; that "a person has no legitimate expectation of privacy in information  he voluntarily turns over to third parties" such as Gmail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  Sunil Abraham of the Bangalore-based think tank the Centre for Internet  and Society said that foreign spying wasn't the only reason why  government officials should be required to use a homegrown email.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Use  of official government email would also make it easier to achieve  greater transparency and anti-corruption initiatives," Abraham told the  paper. "Ministers, intelligence and law enforcement officials should not  be allowed to use alternate email providers under any circumstance."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When  contacted for comment, a spokeswoman for Google India said the company  had not been informed of the proposed ban, adding, "Nothing is  documented so far, so for us, it is still speculation." ®&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business'&gt;https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2013-09-05T09:52:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-assam-january-2-2015-indian-govt-still-blocks-websites-india-censorship-on-internet">
    <title>Indian Government still blocks 20+ websites – Indian Censorship on Internet</title>
    <link>https://cis-india.org/internet-governance/news/times-of-assam-january-2-2015-indian-govt-still-blocks-websites-india-censorship-on-internet</link>
    <description>
        &lt;b&gt;Indian Government has blocked 20+ major websites to counter ISIS propaganda. The government has removed blocking of github.com, vimeo.com and other 10+ websites blocked till December 31, 2014.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="https://www.timesofassam.com/technology/indian-government-still-blocks-20-websites-indian-censorship-internet/"&gt;published in the Times of Assam&lt;/a&gt; on January 2, 2015. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A confidential department of telecom  order – dated December 17, 2014 – instructing all internet service  licensees to block the websites appeared online on Wednesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When contacted to verify the news, Dr  Gulshan Rai – Director of the Indian Computer Emergency Response Team  (CERT-In) – told, the directions had been issued to internet service  providers following a Mumbai Additional Chief metropolitan magistrate’s  November order directing the government’s Department of Electronics and  Information Technology (DeitY) to implement the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash – Policy Director at  Bengaluru-based Center for Internet and Society – questioned the lack of  transparency around the practice of blocking websites under the Indian  law. “Qn for govt: Why does the law require secrecy of web blocking  orders when it doesn’t allow such secrecy for books, films? #GoIBlocks,”  he tweeted, adding, “The 69A Rules don’t allow for transparency,  accountability, time-limits on blocks, etc. So easily misused by govt. +  courts + individuals.” The websites were blocked under section 69 A of  the IT Act, 2000 and the IT (Procedure and sdafeguards for Blocking of  Access of Information by Public) rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/PP.png" alt="PP" class="image-inline" title="PP" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, the Supreme Court is in the middle of hearing a clutch of  petitions challenging several IT Act provisions, including blocking and  takedown of websites.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-assam-january-2-2015-indian-govt-still-blocks-websites-india-censorship-on-internet'&gt;https://cis-india.org/internet-governance/news/times-of-assam-january-2-2015-indian-govt-still-blocks-websites-india-censorship-on-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-01-03T03:47:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
