<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1551 to 1565.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-march-26-2018-indian-it-firms-not-ready-for-european-unions-proposed-privacy-laws-only-a-few-compliant-with-gdpr"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/indian-internet-lawsuit-puts-spotlight-on-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-intermediary-liability-regime"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/zdnet-mahesh-sharma-march-14-2013-indian-id-crisis-unveils-aadhar-doubts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-register-phil-muncaster-june-27-2013-indian-govt-blocks-40-smut-sites-forgets-to-give-reason"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-january-3-2014-sruthijit-kk-indian-govt-websites-gold-mine-for-cybercriminals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-assam-january-2-2015-indian-govt-still-blocks-websites-india-censorship-on-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-vivek-pai-may-4-2017-indian-govt-says-it-is-still-drafting-privacy-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/idg-news-service-august-2-2015-indian-govt-orders-isps-to-block-857-porn-websites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/afp-com-aug-23-2012-indian-govt-defends-internet-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/whdi-reviews-nov-22-2012-indian-government-at-second-position-after-usa-for-demanding-user-data-from-google"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-march-26-2018-indian-it-firms-not-ready-for-european-unions-proposed-privacy-laws-only-a-few-compliant-with-gdpr">
    <title>Indian IT firms not ready for European Union's proposed privacy laws, only a few compliant with GDPR</title>
    <link>https://cis-india.org/internet-governance/news/first-post-march-26-2018-indian-it-firms-not-ready-for-european-unions-proposed-privacy-laws-only-a-few-compliant-with-gdpr</link>
    <description>
        &lt;b&gt;Only a third of Indian IT firms are compliant with the European Union's General Data Protection Regulation (GDPR), which will come into force on 25 May, according to a media report.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="https://www.firstpost.com/business/indian-it-firms-not-ready-for-european-unions-proposed-privacy-laws-only-a-few-compliant-with-gdpr-4405679.html"&gt;published in First Post&lt;/a&gt; on March 26, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The GDPR, the EU's new online privacy rules, is designed to protect users' online privacy. The European Parliament has adopted the regulation but European governments have yet to approve the text.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Only 30-35 percent of all IT/ITeS companies have started their journey to work towards GDPR compliance,” Jaspreet Singh, Cyber Security Partner at EY, was quoted as saying by &lt;em&gt;&lt;a href="https://economictimes.indiatimes.com/tech/ites/only-a-third-of-indian-it-companies-ready-for-eu-privacy-laws/articleshow/63456683.cms" rel="nofollow" target="_blank"&gt;The Economic Times&lt;/a&gt;&lt;/em&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The GDPR is applicable to companies globally, and has significant potential financial penalties. Damages of any breach of privacy of user data from Europe could cost companies as much as four percent of their revenue, according to &lt;em&gt;The Economic Times&lt;/em&gt;. For the Indian IT sector, Europe ranks number two in terms of the amount of business it drives, with US still taking the lead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian firms, according to &lt;a href="http://www.business-standard.com/article/companies/indian-firms-slow-on-cybersecurity-might-gain-from-eu-s-upcoming-gdpr-118030200683_1.html" rel="nofollow" target="_blank"&gt;&lt;em&gt;Business Standard&lt;/em&gt;&lt;/a&gt;, are struggling to understand the GDPR policies. A survey by EY had shown that 60 percent of Indian respondents were unfamiliar with the new regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"When asked to describe their company’s current status with respect to complying with the GDPR, only 33 percent of respondents said that they have a plan, while 39 percent said that they are not familiar with the GDPR at all and 17 percent said that they have heard of the GDPR but have not yet taken any action," EY’s &lt;a href="http://www.ey.com/Publication/vwLUAssets/ey-how-can-you-disrupt-risk-in-an-era-of-digital-transformation/$FILE/ey-how-can-you-disrupt-risk-in-an-era-of-digital-transformation.pdf" rel="nofollow" target="_blank"&gt;Global Forensic Data Analytics Survey&lt;/a&gt; 2018 had said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What the GDPR is all about?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The GDPR attempts to unify data protection laws across the EU. It applies to all companies, regardless of location, that process the personal data of people living in the European Union.  It aims to strengthen the protection of EU citizens' personal details. It will apply to all companies, including those outside of the EU.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The GDPR is considered the biggest shake-up of personal data privacy rules since the birth of the internet. It is intended to give European citizens more control over their online information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the new regulation, users will be asked once and for all whether to accept cookies, rather than every time they visit a new website. Users will have the option of going invisible online, while the rules enshrine the so-called "right to be forgotten" legislation. The industries most deeply affected will be those that collect large amounts of customer data and include technology companies, retailers, healthcare providers, insurers and banks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies must be able to provide European customers with a copy of their personal data and under some circumstances delete it at their behest. They will also be required to report data breaches within 72 hours.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How Indian firms will be affected?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;a href="https://cis-india.org/internet-governance/files/gdpr-and-india" rel="nofollow" target="_blank"&gt;a study published by The Centre for Internet and Society&lt;/a&gt;, as a result of GDPR, data protection procedures like breach notification; excessive documentation and appointment of data protection officer may have to be incorporated in the Indian laws as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"As non – compliance involves high fines, inability of India or the organizations situated in India to qualify as data secure destinations is likely to divert business opportunities to safer locations," the study said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;(With inputs from agencies)&lt;/em&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-march-26-2018-indian-it-firms-not-ready-for-european-unions-proposed-privacy-laws-only-a-few-compliant-with-gdpr'&gt;https://cis-india.org/internet-governance/news/first-post-march-26-2018-indian-it-firms-not-ready-for-european-unions-proposed-privacy-laws-only-a-few-compliant-with-gdpr&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-04-18T00:56:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/indian-internet-lawsuit-puts-spotlight-on-freedom-of-expression">
    <title>Indian Internet Lawsuit Puts Spotlight on Freedom of Expression </title>
    <link>https://cis-india.org/news/indian-internet-lawsuit-puts-spotlight-on-freedom-of-expression</link>
    <description>
        &lt;b&gt;In India, Internet giants such as Google and Facebook are fighting a lawsuit after the government authorized their prosecution for online content on their sites deemed to be offensive. The case has put the spotlight on free speech in the world’s largest democracy. 
&lt;/b&gt;
        
&lt;p&gt;The criminal lawsuit filed by the editor of New Delhi-based Urdu weekly Akbari accuses 21 Internet companies of violating Indian law. Vinay Rai alleged that online material on their websites has the potential to incite religious conflict.&lt;/p&gt;
&lt;p&gt;Rai said his colleagues brought to his attention images of Prophet Muhammad which could offend Muslims. He cited other images and text which could hurt sentiments of Hindus and Christians. Rai wants Internet companies to screen content before it is posted.&lt;/p&gt;
&lt;p&gt;Google and Facebook have asked the Delhi High Court to dismiss the case against them. In an appeal, they&amp;nbsp; said it is impossible to filter all content or stop individuals from posting material online.&lt;/p&gt;
&lt;p&gt;Editor Rai filed the case after the government indicated its approval for the prosecution. The official go-ahead came weeks after the government also raised a similar demand.&lt;/p&gt;
&lt;h3&gt;Voluntary framework &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Telecommunications Minister Kapil Sibal told Internet company representatives to come up with a voluntary framework to keep offensive material off the net. After confronting them with photos and material derogatory of Indian Prime Minister Manmohan Singh and Congress Party leader Sonia Gandhi, he said the companies had not cooperated.&lt;/p&gt;
&lt;p&gt;Both the court case and the government’s demands have stoked fears of net censorship in the world’s largest democracy.&lt;/p&gt;
&lt;p&gt;Advocacy groups say the dispute between authorities and websites began simmering last year when India tightened laws to block content which could be deemed offensive. Citizens and officials can ask sites to block objectionable material and failure to comply within 36 hours can attract penalties or imprisonment of up to seven years.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, with the Center for Internet and Society in India, said these rules have the potential to curtail debate and discussion on the net.&lt;/p&gt;
&lt;p&gt;“These limits are vague.&amp;nbsp; They allow for all sorts of subjective tests by private parties and we predicted they would have a chilling effect on freedom of expression online," Abraham said. "Policy in India has been headed in a very worrisome direction."&lt;/p&gt;
&lt;p&gt;Abraham pointed out that one of his organization’s recent studies indicates that, faced with the threat of stiff penalties, most service providers removed content when asked to do so, even when it was not offensive or controversial.&lt;/p&gt;
&lt;h3&gt;Free media?&lt;/h3&gt;
&lt;p&gt;The government insists its objective is not to encroach on the fundamental right of free speech guaranteed by India’s democratic constitution. The clarification came from Minister Kapil Sibal after his meetings with Internet companies last month.&lt;/p&gt;
&lt;p&gt;"This government does not believe in censorship," noted Sibal. "This government does not believe in either directly or indirectly interfering in the freedom of the press, and we have demonstrated that time and again."&lt;/p&gt;
&lt;p&gt;India does have a vibrant free media and Internet access is largely free, unlike in China. But in a country with a history of religious violence, authorities have long tussled with the dilemma of balancing free speech with the need to not inflame sentiments among religious groups. India was one of the first countries to ban Salman Rushdie’s “The Satanic Verses.”&lt;/p&gt;
&lt;p&gt;Other books and articles have also faced bans. Many are challenged in courts and several have been overturned. Now the focus is on the Internet and questions are being raised about whether the web should or can be policed.&lt;/p&gt;
&lt;h3&gt;Online freedom&lt;/h3&gt;
&lt;p&gt;In a remark widely quoted in the domestic media, a judge hearing the case had warned websites that like China, India might be compelled to block some of them if they did not create means to curb material seen as offensive.&lt;/p&gt;
&lt;p&gt;However, Abraham from the Center of Internet and Society hopes that, as the latest case navigates its way through Indian courts, online freedom will come up the winner.&lt;/p&gt;
&lt;p&gt;"I think the executive in India has always been very conservative in freedom of expression. It is usually the courts in India that protect freedom of expression, the precedent," Abraham said. "So we are every hopeful that the current case is in the appropriate venue, and we are confident that, as in the past, the judiciary in India will stand on the side of freedom of expression."&lt;/p&gt;
&lt;p&gt;With 100 million people surfing the web, India has the world’s third largest number of Internet users after China and the United States.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.voanews.com/english/news/asia/Indian-Internet-Lawsuit-Puts-Spotlight-on-Freedom-of-Expression--137555168.html"&gt;Published in the Voice of America on 19 January 2012. Sunil Abraham is quoted in this.&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/indian-internet-lawsuit-puts-spotlight-on-freedom-of-expression'&gt;https://cis-india.org/news/indian-internet-lawsuit-puts-spotlight-on-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-01-19T08:59:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-intermediary-liability-regime">
    <title>Indian Intermediary Liability Regime: Compliance with the Manila Principles on Intermediary Liability</title>
    <link>https://cis-india.org/internet-governance/blog/indian-intermediary-liability-regime</link>
    <description>
        &lt;b&gt;This report assesses the compliance of the Indian intermediary liability framework with the Manila Principles on Intermediary Liability, and recommends substantive legislative changes to bring the legal framework in line with the Manila Principles. &lt;/b&gt;
        &lt;p&gt;&lt;span style="text-align: justify; "&gt;The report was edited by Elonnai Hickok and Swaraj Barooah&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The report is an examination of Indian laws based upon the background paper to the Manila Principles as the explanatory text on which these recommendations have been based, and not an assessment of the principles themselves. To do this, the report considers the Indian regime in the context of each of the principles defined in the Manila Principles. As such, the explanatory text to the Manila Principles recognizes that diverse national and political scenario may require different intermediary liability legal regimes, however, this paper relies only on the best practices prescribed under the Manila Principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report is divided into the following sections&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Principle I: Intermediaries should be shielded by law from liability for third-party content&lt;/li&gt;
&lt;li&gt;Principle II: Content must not be required to be restricted without an order by a judicial authority&lt;/li&gt;
&lt;li&gt;Principle III: Requests for restrictions of content must be clear, be unambiguous, and follow due process&lt;/li&gt;
&lt;li&gt;Principle IV: Laws and content restriction orders and practices must comply with the tests of necessity and proportionality&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;Principle V: Laws and content restriction policies and practices must respect due process&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;Principle VI: Transparency and accountability must be built into laws and content restriction policies and practices&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;Conclusion&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/indian-intermediary-liability-regime"&gt;Download the Full report here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-intermediary-liability-regime'&gt;https://cis-india.org/internet-governance/blog/indian-intermediary-liability-regime&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-05-20T15:14:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/zdnet-mahesh-sharma-march-14-2013-indian-id-crisis-unveils-aadhar-doubts">
    <title>Indian ID crisis unveils Aadhaar doubts</title>
    <link>https://cis-india.org/news/zdnet-mahesh-sharma-march-14-2013-indian-id-crisis-unveils-aadhar-doubts</link>
    <description>
        &lt;b&gt;Two separate organizations are capturing biometric data of over 1 billion Indians, creating fresh doubts in the government's justification to catalogue citizens.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The blog post by Mahesh Sharma was &lt;a class="external-link" href="http://www.zdnet.com/in/indian-id-crisis-unveils-aadhaar-doubts-7000012544/"&gt;published in ZD Net&lt;/a&gt; on March 14, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A new US$1 billion national identity card project has undermined the Indian government's ambitious "Aadhaar" project to catalogue the biometric details of over 1 billion citizens.&lt;br /&gt;&lt;br /&gt;Indians' biometric details are being captured by two separate organizations: the National Population Register, to develop the resident identity card (RIC); and the Unique Identification Authority of India (UIDAI), to create a &lt;a href="http://www.zdnet.com/indian-uid-can-resolve-social-ills-2062304315/"&gt;unique identifier&lt;/a&gt; (UID), commonly referred to as "&lt;a href="http://www.zdnet.com/in/uidai-targets-600m-m-banking-users-in-india-7000009927/"&gt;Aadhaar&lt;/a&gt;" number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both projects are designed to streamline the distribution of welfare and social services to citizens--a process that is currently mired in &lt;a href="http://www.zdnet.com/in/india-needs-stronger-will-to-fix-corruption-7000003667/"&gt;corruption&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;In an interview with ZDNet, Centre for Internet and Society's India executive director, Sunil Abraham, said the ID smartcard and ID number are fundamentally different, not complementary, as the government has previously said.&lt;br /&gt;&lt;br /&gt;"Those are two very separate visions. You cannot mix them up and make some kind of salad and have a little bit of this and a little bit of that. You have to go the whole hog in one direction," Abraham said. &lt;br /&gt;&lt;br /&gt;He said it was easier for the government to proceed with both projects, rather than cancel Aadhaar, which has been criticized over reports there were &lt;a href="http://www.zdnet.com/in/india-govt-investigates-aadhar-duplication-claims-7000011595/"&gt;duplicate biometric information and data abuse&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;"The government is afraid it made a mistake," Abraham said. "It could just continue to create a hodgepodge of both ideas, both visions, and continue making big mistakes and have ghosts [in the UID system] and large scale corruption."&lt;br /&gt;&lt;br /&gt;On March 12, India's house of representatives, the Lok Sabha, Member of Parliament, P. Karunakaran asked the Minister of State, R.P.N. Singh, to clarify the overlap between the proposed biometric identity card and UID. Singh confirmed the government would &lt;a href="http://www.zdnet.com/story/create/%20pib.nic.in/newsite/erelease.aspx?relid=93526" target="_blank"&gt;spend over US$1 billion (55.52 billion rupees)&lt;/a&gt; to issue a resident identity card (RIC) that featured the Aadhaar number.&lt;br /&gt;&lt;br /&gt;"The RIC would enable both online and offline authentication of identity in a secure manner and will complement the efforts of Aadhaar," Singh said in a written response. To avoid duplication, he explained that if citizen biometric data was already captured by the UIDAI, then the Aadhaar number would be recorded on the RIC smart card.&lt;br /&gt;&lt;br /&gt;Independent lawyer Usha Ramanathan told ZDNet the government had overstepped its legal bounds. She said the UIDAI has demonstrated biometrics are imperfect but the government has persisited with the project.&lt;br /&gt;&lt;br /&gt;"The UID is lawless. Now we will have an RIC which will be lawless," Ramanathan said. "All we are offered is the UIDAI 'confidence' that the project will work."&lt;br /&gt;&lt;br /&gt;"Privacy and personal security continue to be unprotected. And there seems to be an inexhaustible amount of money to experiment on the whole population," she noted.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/zdnet-mahesh-sharma-march-14-2013-indian-id-crisis-unveils-aadhar-doubts'&gt;https://cis-india.org/news/zdnet-mahesh-sharma-march-14-2013-indian-id-crisis-unveils-aadhar-doubts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-03-15T04:52:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-register-phil-muncaster-june-27-2013-indian-govt-blocks-40-smut-sites-forgets-to-give-reason">
    <title>Indian govt blocks 40 smut sites, forgets to give reason</title>
    <link>https://cis-india.org/news/the-register-phil-muncaster-june-27-2013-indian-govt-blocks-40-smut-sites-forgets-to-give-reason</link>
    <description>
        &lt;b&gt;Don't mind us, we're just censoring your content for you...&lt;/b&gt;
        &lt;p&gt;The article by Phil Muncaster was &lt;a class="external-link" href="http://www.theregister.co.uk/2013/06/27/india_government_smut_sites_ban/"&gt;published in "The Register" on June 27, 2013&lt;/a&gt;. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Indian government has ordered ISPs to block 39 smut flick web sites  hosted outside the country without giving any explanation, stoking  further fears of online censorship by the back door.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most of the sites are web forums and so allow for the uploading of  naughty images and URLs where smut-seekers can download their grumble  flicks, according to &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Govt-goes-after-porn-makes-ISPs-ban-sites/articleshow/20769326.cms" target="_blank"&gt;&lt;i&gt;Times of India&lt;/i&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the sites claim to operate under the 18 USC 2257 rule, meaning  actors are (supposedly) over 18 years of age, and there is apparently no  indication from the Department of Telecom's order why ISPs are being  asked to comply.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The message greeting web users who try to visit a blocked site now reads as follows:&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;This website has been blocked until further notice either pursuant to   court orders or on the directions issued by the Department of   Telecommunications.&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;While the law, updated in 2011, does forbid production, transmission and  sharing of smutty content in India - therefore requiring internet  cafes, for example, to block such content - there is no ban on  consumption, especially from sites hosted outside India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, director of Indian not-for-profit the Centre for Internet and Society, told &lt;i&gt;ToI&lt;/i&gt; that the government is probably interpreting the law to serve its own ends, and that its ISP order “is a clear overreach”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Union government has certainly been quick in the past to order blocks on any content deemed inappropriate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook and Google were &lt;a href="http://www.theregister.co.uk/2012/02/06/india_content_blocking/" target="_blank"&gt;forced to remove&lt;/a&gt; “objectionable content” from their Indian sites last year after complaints it was offensive to Muslims, Hindus and Christians.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government was also one of many across the globe to &lt;a href="http://www.theregister.co.uk/2012/09/19/youtube_backlash_muslim_world/" target="_blank"&gt;force Google&lt;/a&gt; to block notorious YouTube video Innocence of Muslims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A controversial &lt;a href="http://www.theregister.co.uk/2012/06/25/india_pirates_censorship_sites_unblocked/" target="_blank"&gt;anti-piracy ruling&lt;/a&gt; last June, meanwhile, led to a clumsy, large-scale block on a number of  legitimate sites in the country – drawing the ire of hacktivist group &lt;a href="http://www.theregister.co.uk/2012/05/18/anonymous_ddos_india_sites/" target="_blank"&gt;Anonymous&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government also &lt;a href="http://www.theregister.co.uk/2012/08/24/india_bans_twitter_journalists/" target="_blank"&gt;closed hundreds of sites&lt;/a&gt; and social media accounts in August last year in a bid to prevent the escalation of sectarian violence across the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, the number of content removal requests &lt;a href="http://www.google.com/transparencyreport/removals/government/" target="_blank"&gt;received by Google&lt;/a&gt; increased by 90 per cent from July-December 2012 compared with the previous six months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For these reasons, India only enjoys “Partly Free” status, according to the &lt;i&gt;Freedom on the Net 2012&lt;/i&gt; &lt;a href="http://www.freedomhouse.org/sites/default/files/resources/FOTN%202012%20Summary%20of%20Findings.pdf" target="_blank"&gt;report&lt;/a&gt; from not-for-profit Freedom House.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-register-phil-muncaster-june-27-2013-indian-govt-blocks-40-smut-sites-forgets-to-give-reason'&gt;https://cis-india.org/news/the-register-phil-muncaster-june-27-2013-indian-govt-blocks-40-smut-sites-forgets-to-give-reason&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-07-01T09:04:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu">
    <title>Indian Government's Submission to ITU</title>
    <link>https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu</link>
    <description>
        &lt;b&gt;The following is the text of the submission made by the Government of India to the World Conference of International Telecommunications, Dubai on November 3, 2012. This is the final version of a draft that was circulated earlier.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Read the &lt;a class="external-link" href="http://http//cis-india.org/internet-governance/blog/reaction-to-draft-proposal-from-india-on-final-draft-itr-document-of-itu"&gt;detailed comments&lt;/a&gt; on India's draft proposal on the Proposed Amendments to the ITU’s ITR’s – November 3, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p align="LEFT"&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt; &lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;
World Conference on International&lt;br /&gt;Telecommunications (WCIT-12)&lt;br /&gt;Dubai, 3-14 December 2012&lt;/th&gt; &lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;img class="image-inline" src="../resources/resolveuid/2b2aa8d8eaa543589c198514e272696f" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p align="LEFT"&gt;&lt;span&gt;&lt;span&gt;PLENARY MEETING&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;th&gt;Document 21-E&lt;br /&gt;3 November 2012&lt;br /&gt;Original: English&lt;br /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="CENTER"&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;India (Republic of)&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: center; "&gt;PROPOSALS FOR THE WORK OF THE CONFERENCE&lt;/p&gt;
&lt;p align="LEFT"&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt; &lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;We recognise and appreciate the efforts of  International Telecommunication Union in preparing the Draft on proposed  ITRs for WCIT 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  attached proposal is developed through a consultation process involving  various stakeholder groups, both, in Indian Public and Private sectors.   Due consideration has been given to the existing legislations and  government policies in the preparation of this proposal. We acknowledge  that since 1988, there have been significant changes and challenges in  Telecommunications / ICTs in terms of Technological breakthroughs, New  Services and Market Structure. Acknowledging this fact, India’s proposal  is offered in the form of addition (ADD) or modification (MOD) only on  some of the relevant proposals, by giving reference to the appropriate  CWG/4/XXX number mentioned in the Annex 2 of the ITU Document  4(Add.2)-E. Considering the magnitude of issues in International  Telecommunications, India may take appropriate stand on other provisions  of the draft ITR document during the WCIT discussions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further,  the proposals from different regions to the conference as well as its  preparatory process were carefully studied. In order to help the  conference achieve a consensus on the various issues being discussed,  the content of this proposal has been largely drawn from the output of  the Council Working Group on WCIT (WCIT/4 Add.2 ” Draft of the future  ITRs”).&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;A new proposal on &lt;i&gt;5A: Confidence and Security of Telecommunications/ICTs&lt;/i&gt; is also included as India believes that an international framework on Security is of importance in today’s connected world.&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;b&gt; INTERNATIONAL TELECOMMUNICATION&lt;br /&gt;REGULATIONS&lt;/b&gt;&lt;br /&gt;&lt;b&gt;PREAMBLE&lt;/b&gt;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;MOD&lt;/p&gt;
&lt;/th&gt;
&lt;td&gt;IND/21/1&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1&lt;/b&gt; While the sovereign right of each Member State to regulate its  telecommunications is fully recognized, the provisions of the present  International Telecommunication Regulations (hereinafter “Regulations”)  complement the Constitution and Convention of the International  Telecommunication Union, with a view to attaining the purposes of the  International Telecommunication Union in promoting the development of  telecommunication services and their most efficient operation while  harmonizing the development of facilities for world-wide  telecommunications.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/3&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 1&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;Purpose and Scope of the Regulations&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3A&lt;/b&gt; &lt;i&gt;c)&lt;/i&gt; These Regulations recognize that Member States should endeavour to take  the necessary measures to prevent interruptions of services and ensure  that no harm is caused by their operating agencies to the operating  agencies of other Member States which are operating in accordance with  the provisions of these Regulations.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/12&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/3&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3B&lt;/b&gt; &lt;i&gt;d)&lt;/i&gt; These Regulations recognize the absolute priority for safety of life  telecommunications, including distress telecommunications, emergency  telecommunications services and telecommunications for disaster relief  as provided in Article.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/14&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 2&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;Definitions&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/4&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14A&lt;/b&gt; 2.1A	&lt;i&gt;Telecommunication/ICT: &lt;/i&gt;Any  transmission, emission or reception, including processing, of signs,  signals, writing, images and sounds or intelligence of any nature by  wire, radio, optical or other electromagnetic systems, having a bearing  on Telecommunication Technologies and Services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/48&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/5&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27A &lt;/b&gt;2.11	&lt;i&gt;Transit rate&lt;/i&gt;: a rate set by the point of transit in a third country (indirect relation).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/74&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27C &lt;/b&gt;2.13	&lt;i&gt;Spam&lt;/i&gt;:  information transmitted over telecommunication networks as text, sound,  image, tangible data used in a man-machine interface bearing  advertizing nature or having no meaningful message, simultaneously or  during a short period of time, to a large number of particular  addressees without prior consent of the addressee (recipient) to receive  this information or information of this nature.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/78&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27D &lt;/b&gt;2.14	&lt;i&gt;Hub&lt;/i&gt;:  a transit center (or network operator) that offers to other operators a  telecommunication traffic termination service to nominated destinations  contained in the offer.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/80&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27E &lt;/b&gt;2.15	&lt;i&gt;Hubbing&lt;/i&gt;:  the routing of telecommunication traffic in hubbing mode consists in  the use of hub facilities to terminate telecommunication traffic to  other destinations.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/82&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/9&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27F &lt;/b&gt;2.16	&lt;i&gt;Network fraud&lt;/i&gt;:  (fraud on international telecommunication networks): The causing of  harm to operating agencies or to the public, the wrongful obtaining of  gain in the provision of international telecommunication services  through abuse of trust or deception, including through inappropriate use  of numbering resources.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/87&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/10&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27G &lt;/b&gt;2.17	&lt;i&gt;Global telecommunication service (GTS)&lt;/i&gt;:  A service which enables communication to be established through a  global number between subscribers whose physical location and national  jurisdiction have no bearing on the tariff to be set for the service’s  use; which satisfies and complies with recognized and accepted  international standards; and which is provided over the public  telecommunication network by operating agencies having obtained the  relevant numbering resources from ITU-T.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/89&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/11&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27H &lt;/b&gt;2.21	&lt;i&gt;Originating Identification&lt;/i&gt;:  The Originating Identification is the service by which the terminating  party shall receive the identity information in order to identify the  origin of the communication.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/81&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/12&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27L &lt;/b&gt;2.25	&lt;i&gt;Stability of the international telecommunication network&lt;/i&gt;:  The capability of the international telecommunication network to carry  international traffic in the event of failure of telecommunication nodes  or links and also in the face of internal and external destructive  actions and to return to its original state.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/99&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/13&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27M &lt;/b&gt;2.26	&lt;i&gt;Security of the international telecommunication network&lt;/i&gt;:  The capability of the international telecommunication network to  withstand internal and external destabilizing actions liable to  compromise its functioning.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/101&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/14&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27N &lt;/b&gt;2.27	&lt;i&gt;International&lt;/i&gt; &lt;i&gt;Roaming&lt;/i&gt;:  Provision to the subscriber of the opportunity to use telecommunication  services offered by other operating agencies of other member states,  with which the subscriber has not concluded an agreement.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/103&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/15&lt;/p&gt;
&lt;p&gt;&lt;b&gt;27O &lt;/b&gt;2.28	&lt;i&gt;IP interconnection: &lt;/i&gt;IP interconnection refers to means and rules employed to ensure the delivery of IP traffic through different networks.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/105&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/16&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27P &lt;/b&gt;2.29	&lt;i&gt;End to end quality of service delivery and best effort delivery: &lt;/i&gt;End  to End quality of service delivery refers to the delivery of PDU  (Packet Data Unit) with predefined end-to-end performance objectives;  Best-effort delivery refers delivery to of a PDU without predefined  performance targets.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/107&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 3&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;International Network&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/17&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;31A &lt;/b&gt;3.5 	Member States shall ensure that international naming, numbering,  addressing and identification resources are used only by the assignees  and only for the purposes for which they were assigned; and that  unassigned resources are not used.  The provisions of the relevant ITU-T  Recommendations shall be applied.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/134&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/18&lt;/p&gt;
&lt;p&gt;&lt;b&gt;31B &lt;/b&gt;3.6	International calling party number delivery shall be provided in accordance with relevant ITU-T Recommendations.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/142&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 4&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;International Telecommunication Services&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/19&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;34&lt;/b&gt; 4.3	Subject to national law, Member States shall endeavour to ensure  that operating agencies provide and maintain, to the greatest extent  practicable, a satisfactory quality of service corresponding to the  relevant ITU-T Recommendations with respect to:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/168&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/20&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;35&lt;/b&gt; &lt;i&gt;a)&lt;/i&gt; access to the international network by users using terminals which are  permitted to be connected to the network and which do not cause harm or  diminish the level of safety and security of technical facilities and  personnel;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/174&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/21&lt;/p&gt;
&lt;p&gt;&lt;b&gt;36&lt;/b&gt; &lt;i&gt;b)&lt;/i&gt; international telecommunication facilities and services available to customers for their use;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/176&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/22&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;37&lt;/b&gt; &lt;i&gt;c)&lt;/i&gt; at least a form of telecommunication service which is reasonably  accessible to the public, including those who may not be subscribers to a  specific telecommunication service; and&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/179&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/23&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38&lt;/b&gt; &lt;i&gt;d)&lt;/i&gt; a capability for interworking between different services, as  appropriate, to facilitate international telecommunication services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/181&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/24&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38A &lt;/b&gt;4.4 	Member States shall ensure that operating agencies providing  international telecommunication services, including roaming, make  available to subscribers information on tariffs and taxes. Each  subscriber should be able to have access to such information and receive  it in a timely manner and free of charge when roaming (entering into  roaming), except where the subscriber has previously declined to receive  such information.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/188&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/25&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38B &lt;/b&gt;4.5 	Given the particular characteristics of GTS, which allows subscribers  to have a worldwide number, implement GTSs in accordance with the  National regulations.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/195&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/26&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38E &lt;/b&gt;4.8 	Member States, subject to national security requirements, may foster  the establishment of mutual agreements on mobile services accessed  within a predetermined border zone in order to prevent or mitigate  inadvertent roaming charges.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/201&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 5&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;Safety of Life and Priority of Telecommunications&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/27&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;39&lt;/b&gt; 5.1	Safety of life telecommunications, including distress  telecommunications, emergency telecommunication services and  telecommunications for disaster relief, shall be entitled to  transmission as of right and shall, where technically practicable, have  absolute priority over all other telecommunications, in accordance with  the relevant Articles of the Constitution, Convention and relevant ITU-T  Resolutions and Recommendations.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/204&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/28&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;41B &lt;/b&gt;5.5 	Member States should cooperate to introduce in addition to their  existing national emergency numbers, a global number for calls to the  emergency services globally.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/217&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/29&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;41C &lt;/b&gt;5.6 	Member States shall ensure that operating agencies inform every roaming  subscriber of the number to be used for calls to the emergency  services, while entering into roaming, free of charge.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/219&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/30&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 5A&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;Confidence and security of telecommunications/ICTs&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/221&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/31&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;41D&lt;/b&gt; 5A1.	Member‐States shall have the right to take appropriate measures to  protect and Secure the  ICT Network infrastructure and data contained   in or flowing through the Network and also to  prevent the misuse of ICT  network and services within their state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5A2.	 The Member States should endeavour to take appropriate measures,  individually or in cooperation with other Member states, to ensure  Security of the ICT Network and information, including user information,   contained in or flowing through the ICT network within their  jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5A3.	 Member‐States  should endeavour to oversee that Operating Agencies  in  their territory do not engage in activities which impinge on the  security and integrity of ICT  network such as denial of service attack,  unsolicited electronic communication (spam), unsolicited access to  network elements and devices etc., to enable  effective functioning of  ICTs in secure and trustworthy conditions.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;a name="id.tyjcwt"&gt;&lt;/a&gt; 5A4.	 Member States  should endeavour to cooperate to harmonize national laws,  jurisdictions, and practices in the relevant areas.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; Combined proposal on clauses proposed from &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/222 &lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;to&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt; 232&lt;/a&gt;&lt;/span&gt; in 5A and 5B.&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 6&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;Charging and Accounting&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/32&lt;/p&gt;
&lt;p&gt;&lt;b&gt;43A&lt;/b&gt; 6.1.1A	Cost of International Roaming Services&lt;/p&gt;
&lt;p&gt;a)	Member States shall encourage competition in the international roaming market;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b)	Member States are encouraged to cooperate to develop policies for reducing charges on international roaming services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/243&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/33&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;45&lt;/b&gt; 6.1.3	Member States are free to levy fiscal taxes on international  telecommunication services in accordance with their national laws;  however, the Member States should endeavour to avoid international  double taxation on such services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/249&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/34&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54E&lt;/b&gt; 6.10	Subject to national law, Member States shall ensure that Operating  Agencies collaborate in preventing and controlling fraud in  international telecommunications by:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;–	 Identifying and transmitting to the transit and destination Operating  Agencies the pertinent information required for the purposes of payment  for the routing of international traffic, in particular the originating  Country Code, National Destination Code and the Calling Party Number.&lt;/p&gt;
&lt;p&gt;–	Following up requests of other Member States or their Operating  Agencies to investigate calls that cannot be billed, and helping to  resolve outstanding accounts.&lt;/p&gt;
&lt;p&gt;–	Following up requests of other Member States or their Operating  Agencies to identify the source of calls originated from their  territories exerting potential fraudulent activity.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/287&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/35&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54F&lt;/b&gt; 6.11	The ITU Standardization Sector shall be responsible for  disseminating the regulatory frameworks in place in administrations  having an impact on matters related to fraud.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/289&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/36&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54H&lt;/b&gt; 6.12A	Member States shall foster the establishment of international  roaming mobile services prices based on principles of reasonability,  competitiveness and non-discrimination relative to prices applied to  local users of the visited country.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/293&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/37&lt;/p&gt;
&lt;p&gt;&lt;b&gt;54K&lt;/b&gt; 6.14	Member States should foster continued investment in high-bandwidth infrastructures.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/299&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/38&lt;/p&gt;
&lt;p&gt;&lt;b&gt;54L&lt;/b&gt; 6.15	Member States shall promote cost-oriented pricing.   Regulatory measures may be imposed to the extent that this cannot be  achieved through market mechanisms and to the extent that such measures  do not hinder competition.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/301&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/39&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54N&lt;/b&gt; 6.17	Member States shall promote transparency of end-user prices, in  particular to avoid surprising bills for international services (e.g  mobile roaming and data roaming).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/305&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/40&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54S&lt;/b&gt; 6.D	Member States should endeavour to take measures to ensure that an  adequate return is provided on investments in network infrastructures in  identified areas.  If this cannot be achieved through market  mechanisms, then other mechanisms may be used.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/315&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/41&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54O&lt;/b&gt; 6.18	Member States should consider measures to favour special interconnection rates for landlocked countries.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/307&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/42&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54P&lt;/b&gt; 6.18A	Member States should endeavour that Recognized Operating Agencies  establish charging units and parameters that bill telecommunication  service consumers according to what is effectively consumed.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/309&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/43&lt;/p&gt;
&lt;p&gt;&lt;b&gt;54R&lt;/b&gt; 6.20	Rendering and Settlement of Accounts&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6.20.1 	The settlement of international accounts shall be regarded as current  transactions and shall be effected in accordance with the current  international obligations of the Member States and Sector Members  concerned in those cases where their governments have concluded  arrangements on this subject. Where no such arrangements have been  concluded, and in the absence of special agreements made under Article  42 of the Constitution, these settlements shall be effected in  accordance with the Administrative Regulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6.20.2 	Administrations of Member States and Sector Members which operate  international telecommunication services shall come to an agreement with  regard to the amount of their debits and credits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6.20.3 	The statement of accounts with respect to debits and credits referred  to in No. 498 above shall be drawn up in accordance with the provisions  of the Administrative Regulations, unless special arrangements have been  concluded between the parties concerned.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; The text is taken from CV 497, 498 and 499. This proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/313&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/44&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;57B&lt;/b&gt; Member States shall encourage the provision of global services based on  international standards that ensure accessible telecommunications and  ICT services to persons with disabilities.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0005/en"&gt;HNG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0005/en"&gt;/5/2&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu'&gt;https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-09T00:48:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-january-3-2014-sruthijit-kk-indian-govt-websites-gold-mine-for-cybercriminals">
    <title>Indian government websites: Gold mine for cybercriminals</title>
    <link>https://cis-india.org/news/the-times-of-india-january-3-2014-sruthijit-kk-indian-govt-websites-gold-mine-for-cybercriminals</link>
    <description>
        &lt;b&gt;If you are a cybercriminal trying to commit identity theft or digitally impersonate a citizen, you have help from the unlikeliest of sources — the Government of India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Srutijith KK was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Indian-government-websites-Gold-mine-for-cybercriminals/articleshow/28320517.cms"&gt;published in the Times of India&lt;/a&gt; on January 3, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Various &lt;a href="http://timesofindia.indiatimes.com/topic/government-agencies"&gt;government agencies&lt;/a&gt; have put vast amount of &lt;a href="http://timesofindia.indiatimes.com/topic/personal-information-online"&gt;personal information online&lt;/a&gt;, often with little barrier to access and with hardly any provision to prevent their misuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Combine a few of these databases and you have a gold mine of information on India's citizens, including some of its wealthiest residents, whose bank accounts are of special interest to thieves. "If I want to target someone, I now have access to so much detail that shouldn't have been in public. Hackers with good social engineering skills will be able to call a call centre and impersonate a person. And from a stalking perspective, it has implications for not just celebrities, but anybody with a jilted lover, a political rival, and so on," said Binoo Thomas, a digital security expert at McAfee Labs.&lt;br /&gt;&lt;br /&gt;For example, if somebody wants to get personal details of some of India's richest people, he would simply need to click on the LPG transparency links on Indane, Bharat Gas and HP portals and narrow the search to the South Mumbai region. Many gas agencies have their area of service in their names, such as Bandra Gas Agency or Colaba Gas Agency.&lt;br /&gt;&lt;br /&gt;Select one of these gas agencies and you have a list of all the customers, with their consumer number, address and, in many cases, a mobile number. This database is also searchable by name. You can quickly search for any famous surname and be rewarded with a consumer number, residence address and in many cases, a mobile phone number.&lt;br /&gt;&lt;br /&gt;A cursory search gave ET the mobile number and full residential address of the well-known matriarch of a famous business family. A search under the Bandra Gas Agency promptly showed the full residential address of a famous Bollywood actress. Your next stop could be the website of the Election Commission of India, which has asked all state Election Commissions to place the entire voter rolls online.&lt;br /&gt;&lt;br /&gt;The voter roll also has the full residential address, age and gender of a person. A quick search on the MTNL Mumbai directory online will reveal the landline number for a person. With a little bit of luck and time to troll social networks such as Facebook and LinkedIn, a skilled cybercriminal can discern your date of birth and professional details.&lt;br /&gt;&lt;br /&gt;Date of birth, phone number, alternate number and billing address are the details many telephone companies and banks use to determine whether a person calling its customer helpline is indeed who she says she is. This kind of information also allows a hacker to design effective phishing attacks, which lures a person into revealing information such as passwords or credit card numbers. An email that lists accurate personal information appears authoritative and has greater likelihood of being trusted by a recipient.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Thread of identity theft&lt;/b&gt;&lt;br /&gt;This kind of crime has been on the rise. In December, US Department of Justice estimated that $24.7 billion were lost to identity theft in 2012, as 11.5 million Americans found themselves defrauded. Similar data is unavailable for India. "Privacy has become a matter of personal security. As the state has been pushed to function in a more transparent manner, authorities are making the details about us transparent instead! The data protection principles are well evolved all over the world.&lt;br /&gt;&lt;br /&gt;All of these data controllers are in violation of every good principle. We don't need to wait for a law to observe these principles," said Usha Ramanathan, an independent law researcher specialising in privacy, surveillance and related issues. The ministry of rural development, which administers the Mahatma Gandhi National Rural Employment Guarantee Scheme, goes a step further, and places online the bank account numbers and IFSC codes for all its beneficiaries.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;RTI requirements&lt;/b&gt;&lt;br /&gt;The justification for publishing this kind of data online is typically section 4 of the RTI Act, which requires all government departments to proactively publish details of subsidy programmes, including details of the subsidy availed. However, section 8(1) of the same Act says that personal information that invades privacy of an individual need not be published unless an appellate authority decides that a larger public interest is served by it. It's unclear what public interest is served by the publication of full residential address, mobile number or bank accounts by various agencies.&lt;br /&gt;&lt;br /&gt;In some cases, like the MNREGS and the voter rolls, sector-specific laws also apply. "Going by the provisions of the MGNREGA, which mandates proactive disclosures, we keep all processes in the public view... We have not perceived any threat in displaying bank account numbers of wage seekers, most of which have been opened for receiving wages," said R Subrahmanyam, the joint secretary at the ministry of rural development who heads the MNREGA division.&lt;br /&gt;&lt;br /&gt;The petroleum ministry did not respond to an email requesting comment. In an emailed response, Chief Election Commissioner VS Sampath referred to Rule 33 of the Registration of Elector Rules, 1960, to establish that the voter roll was a public document. "Thus it can be seen that Electoral Roll is a public document which is available to the public for inspection. The Commission has, therefore, given instructions to put this public document on the website to facilitate inspection by public. When law stipulates that it is a public document, the public has a right to access it," he said. But no law states that anonymising techniques or relevant barriers to accessing private information should not be deployed.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Legal vacuum&lt;/b&gt;&lt;br /&gt;India does not have an omnibus privacy law that overrides sector specific legislation. According to Sunil Abraham of the Bangalore-based thinktank Centre for Internet and Society, there are some 50 different laws that have a privacy element in India. The Department of Personnel and Training has been working on a draft privacy law for three years now.&lt;br /&gt;&lt;br /&gt;"We need to think of this problem in the light of the privacy law that is being drafted. Traditionally and culturally our view of privacy has been different. A more explicit understanding of the privacy needs of the citizens is certainly welcome. Section 43A of the IT Act has provisions for data protection," said J Satyanarayana, secretary at the department of information technology.&lt;br /&gt;&lt;br /&gt;But 43A applies only to corporations, and government agencies are not bound by it. Apart from the central government agencies, several state government agencies and schemes also collect and store personal information. But no standard protocol binds them in deciding who shall have access and who shall not.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-january-3-2014-sruthijit-kk-indian-govt-websites-gold-mine-for-cybercriminals'&gt;https://cis-india.org/news/the-times-of-india-january-3-2014-sruthijit-kk-indian-govt-websites-gold-mine-for-cybercriminals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-31T06:18:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail">
    <title>Indian government wakes up to risk of Hotmail, Gmail</title>
    <link>https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail</link>
    <description>
        &lt;b&gt;Worried by US spying revelations, India has begun drawing up a new email policy to help secure government communications, but the man responsible for drafting the rules still regularly uses Hotmail.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was originally published by &lt;a class="external-link" href="http://www.google.com/hostednews/afp/article/ALeqM5goPLsuDV0nXQ5To1xWzthPSETXlw?docId=f8f4236f-1218-4fea-bf25-a01a9f50351a"&gt;AFP&lt;/a&gt; on December 7, 2013, was also mirrored by the &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-12-09/internet/44988376_1_new-email-policy-nsa-official-email"&gt;Times of India&lt;/a&gt;, &lt;a class="external-link" href="http://www.livemint.com/Home-Page/VBuZT9V4A5vsNOcEDuZZfL/India-wakes-up-to-risk-of-Hotmail-Gmail.html"&gt;Livemint&lt;/a&gt;, &lt;a class="external-link" href="http://www.gulf-times.com/india/185/details/374083/govt-wakes-up-to-hotmail,-gmail-risk"&gt;Reuters&lt;/a&gt;, &lt;a class="external-link" href="http://www.dawn.com/news/1061413/indian-government-wakes-up-to-risk-of-hotmail-gmail"&gt;Dawn&lt;/a&gt;, &lt;a class="external-link" href="http://www.ndtv.com/article/india/indian-government-wakes-up-to-risk-of-hotmail-gmail-455999"&gt;NDTV&lt;/a&gt;, &lt;a class="external-link" href="http://nz.news.yahoo.com/a/-/technology/20216609/indian-government-wakes-up-to-risk-of-hotmail-gmail/"&gt;Yahoo News&lt;/a&gt;, &lt;a class="external-link" href="http://www.themalaysianinsider.com/technology/article/indian-government-wakes-up-to-risk-of-hotmail-gmail"&gt;The Malaysian Insider&lt;/a&gt; and &lt;a class="external-link" href="http://www.digitalone.com.sg/news/article/28250"&gt;Asia One Digital&lt;/a&gt;. A slightly modified version was &lt;a class="external-link" href="http://www.siliconindia.com/news/enterpriseit/Indian-Government-Boots-to-Safe-Mode-After-Gmail-And-Hotmail-Security-Threats--nid-157899-cid-7.html"&gt;published by Silicon India&lt;/a&gt; on December 11. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Like many of his peers in ministries across New Delhi, IT Minister Kapil Sibal's office recently sent an email inviting journalists to the launch of his new personal website using the free email service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others, including senior foreign ministry officials, the information and broadcasting minister and the health ministry secretary, also use Gmail, Hotmail or Yahoo instead of their government accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When asked why he continued to use his Hotmail for official use, Sibal declined to comment, but a senior bureaucrat in his ministry admitted that he personally preferred Gmail because it is "just a lot easier".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We keep moving, get different designations, go different places and with that, our emails change. You lose contacts and important emails, which you don't need to worry about with a Gmail account," the bureaucrat told AFP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"To be honest, the quality of our official mail isn't that great yet. It still needs some work," he added on condition of anonymity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Security concerns&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;IT security expert Sunil Abraham said the use of Gmail and the like was highly risky since the American services had their servers in the US and the National Security Agency has been known to tap into their database systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unclear how many state and federal public workers actively use popular email services for office, but some of the estimates are startling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"As much as 90 percent of government officials use private email (services) for official use... that's because their official email is not as stable or speedy," said Abraham, executive director of the Bangalore-based Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In September Sibal's ministry announced a new "Email Policy of the Government of India" in the wake of spying allegations about the NSA revealed by former NSA contractor Edward Snowden.&lt;br /&gt;NSA's tentacles not only crept into the Indian embassy in Washington and its UN office in New York, but also accessed email and chat messenger contact lists of hundreds of millions of ordinary citizens worldwide, according to media reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During a single day last year, the NSA's Special Source Operations branch collected 444,743 email address books from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail and 22,881 from unspecified other providers, The Washington Post said, according to an internal NSA presentation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The $11 million Indian project aims to bring some five million public employees onto the government's email domain powered by the National Informatics Centre (NIC) as early as mid-December.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is awaiting clearances and suggestions from all ministries before the proposal goes to the cabinet this month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;J. Satyanarayana, secretary of the department of electronics and IT, dismissed claims that the policy was too late and was a response to the Snowden scandal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The policy is not a reaction to any global spying revelations, it was already in the works. It is just a mere coincidence that both came around the same time," he said.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Fresh doubts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some cyber security experts say bringing millions aboard a centralised server could make a hacker's job easier, with all critical government information available on a single platform.&lt;br /&gt;More than 11,000 Indian websites were hacked or defaced between May and August this year, with a large number of attacks on the ".in" domain whose servers are in India, the Times of India reported last month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Making the use of a centralised government server is not the best way to proceed. Having everything on one platform makes it even more vulnerable to cyber attacks and hacking," said Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It also brings about new worries of the NIC becoming the local snoop."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some also predict that the ambitious policy would eventually fizzle out for lack of attention from ministers and bureaucrats, who work in government offices where stacks of yellowing files and papers are still a common sight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It's sad but most of these officials don't understand much about technology, so mastering email is something that is miles and miles away," said Vijay Mukhi, a Mumbai-based cyber security expert.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These guys saw all the snooping news and suddenly they woke up and said 'lets make an email policy'. Enforcing this is not possible on a practical basis."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT ministry also plans to conduct workshops to teach employees about email security such as when to change passwords and user names and how to use email.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Every employee should know how, what and when critical data can be vulnerable... with most work still done on paper, it is important to know the nitty-gritty of using email," Satyanarayana said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail'&gt;https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-12-30T04:24:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business">
    <title>Indian government to bar politicians from using Gmail for official business</title>
    <link>https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business</link>
    <description>
        &lt;b&gt;US-based email services seen as too risky.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This article by Neil McAllister was &lt;a class="external-link" href="http://www.theregister.co.uk/2013/08/30/india_government_gmail_ban/"&gt;published in the Register on August 30, 2013&lt;/a&gt;. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The government of India is reportedly planning to bar its employees  from using Gmail and other foreign-based email services, amid concerns  over surveillance by US spy agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Gmail data of Indian users  resides in other countries as the servers are located outside," J  Satyanarayana, India's secretary of electronics and information  technology, &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Cyberspying-Government-may-ban-Gmail-for-official-communication/articleshow/22156529.cms" target="_blank"&gt;told&lt;/a&gt; the &lt;i&gt;Times of India&lt;/i&gt;. "Currently, we are looking to address this in the government domain, where there are large amounts of critical data."&lt;/p&gt;
&lt;div class="not_moved article_side_content" style="text-align: justify; "&gt;
&lt;div id="article-mpu-container"&gt;
&lt;div class="adu" id="ad-mu1-spot"&gt;
&lt;div id="ad-mu1-spot_ad_container"&gt;&lt;ins&gt;&lt;ins&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The Indian government currently employs some 500,000 people, many  of whom use Gmail for their primary email addresses. A quick glance at  the &lt;a href="http://deity.gov.in/content/people-and-offices" target="_blank"&gt;contact page&lt;/a&gt; for the country's Department of Electronics and Information Technology  reveals at least eight senior officials using Gmail, and still others  with Yahoo! addresses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the new directive, government  employees will be asked to stick to official email addresses provided by  India's National Informatics Centre (NIC). But an unnamed senior  government IT official told the &lt;i&gt;Times of India&lt;/i&gt; that many  government workers choose Gmail and other foreign services because they  are easier to use, and setting up accounts is much faster than working  within the bureaucratic process of the NIC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move toward  locally run email for Indian government workers comes in the wake of a  string of revelations from documents leaked by Edward Snowden. Among the  recent disclosures has been details of US electronic surveillance of  foreign governments on US soil, where the National Security Agency even  went as far as to snoop encrypted communications from &lt;a href="http://www.theregister.co.uk/2013/08/27/un_to_question_us_on_nsa/"&gt;United Nations headquarters&lt;/a&gt; in New York City.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No  doubt equally concerning was a motion filed by Google in a US district  court earlier this month, in which the Chocolate Factory &lt;a href="http://www.theregister.co.uk/2013/08/14/google_cloud_users_have_no_legitimate_expectation_of_privacy/"&gt;asserted&lt;/a&gt; that "a person has no legitimate expectation of privacy in information  he voluntarily turns over to third parties" such as Gmail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  Sunil Abraham of the Bangalore-based think tank the Centre for Internet  and Society said that foreign spying wasn't the only reason why  government officials should be required to use a homegrown email.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Use  of official government email would also make it easier to achieve  greater transparency and anti-corruption initiatives," Abraham told the  paper. "Ministers, intelligence and law enforcement officials should not  be allowed to use alternate email providers under any circumstance."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When  contacted for comment, a spokeswoman for Google India said the company  had not been informed of the proposed ban, adding, "Nothing is  documented so far, so for us, it is still speculation." ®&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business'&gt;https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2013-09-05T09:52:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-assam-january-2-2015-indian-govt-still-blocks-websites-india-censorship-on-internet">
    <title>Indian Government still blocks 20+ websites – Indian Censorship on Internet</title>
    <link>https://cis-india.org/internet-governance/news/times-of-assam-january-2-2015-indian-govt-still-blocks-websites-india-censorship-on-internet</link>
    <description>
        &lt;b&gt;Indian Government has blocked 20+ major websites to counter ISIS propaganda. The government has removed blocking of github.com, vimeo.com and other 10+ websites blocked till December 31, 2014.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="https://www.timesofassam.com/technology/indian-government-still-blocks-20-websites-indian-censorship-internet/"&gt;published in the Times of Assam&lt;/a&gt; on January 2, 2015. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A confidential department of telecom  order – dated December 17, 2014 – instructing all internet service  licensees to block the websites appeared online on Wednesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When contacted to verify the news, Dr  Gulshan Rai – Director of the Indian Computer Emergency Response Team  (CERT-In) – told, the directions had been issued to internet service  providers following a Mumbai Additional Chief metropolitan magistrate’s  November order directing the government’s Department of Electronics and  Information Technology (DeitY) to implement the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash – Policy Director at  Bengaluru-based Center for Internet and Society – questioned the lack of  transparency around the practice of blocking websites under the Indian  law. “Qn for govt: Why does the law require secrecy of web blocking  orders when it doesn’t allow such secrecy for books, films? #GoIBlocks,”  he tweeted, adding, “The 69A Rules don’t allow for transparency,  accountability, time-limits on blocks, etc. So easily misused by govt. +  courts + individuals.” The websites were blocked under section 69 A of  the IT Act, 2000 and the IT (Procedure and sdafeguards for Blocking of  Access of Information by Public) rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/PP.png" alt="PP" class="image-inline" title="PP" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, the Supreme Court is in the middle of hearing a clutch of  petitions challenging several IT Act provisions, including blocking and  takedown of websites.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-assam-january-2-2015-indian-govt-still-blocks-websites-india-censorship-on-internet'&gt;https://cis-india.org/internet-governance/news/times-of-assam-january-2-2015-indian-govt-still-blocks-websites-india-censorship-on-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-01-03T03:47:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-vivek-pai-may-4-2017-indian-govt-says-it-is-still-drafting-privacy-law">
    <title>Indian Government says it is still drafting privacy law, but doesn’t give timelines</title>
    <link>https://cis-india.org/internet-governance/news/medianama-vivek-pai-may-4-2017-indian-govt-says-it-is-still-drafting-privacy-law</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read the original published by Medianama &lt;a class="external-link" href="http://www.medianama.com/2016/05/223-government-privacy-draft-policy/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Government is drafting a legislation to protect privacy of  individuals breached through unlawful means in consultation with  stakeholders, the minister for communications and information technology  Ravi Shankar Prasad &lt;a href="http://164.100.47.234/question/annex/239/Au706.pdf"&gt;said&lt;/a&gt; in the Rajya Sabha. However, no timeline was provided, which is really  the problem: Is the Indian government even interested in a privacy law?&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;In August last year, the Government of India had said in the Supreme Court of India that had said that “&lt;a href="http://www.medianama.com/2015/08/223-privacy-india-aadhaar/"&gt;violation of privacy doesn’t mean anything because privacy is not a guaranteed right”&lt;/a&gt;, actually arguing that the citizens of India do not have a fundamental right to privacy.&lt;/li&gt;
&lt;li&gt;In September last year, the DeitY had also sought to make encryption (and personal and business security) weaker via a &lt;a href="http://www.medianama.com/2015/09/223-india-draft-encryption-policy/"&gt;draft policy on encryption&lt;/a&gt;,  requiring all users to store the plaintexts of the corresponding  encrypted information for 90 days from the date of transaction and  provide the verifiable plain-text to Law and Enforcement Agencies if  required. After a public outcry, the paper was &lt;a href="http://www.medianama.com/2015/09/223-draft-national-encryption-policy-paper-withdrawn-says-telecom-minister-r-s-prasad/"&gt;withdrawn&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Last month, the DoT made it &lt;a href="http://www.medianama.com/2016/04/223-dot-mandatory-gps-panic-button/"&gt;mandatory&lt;/a&gt; to have GPS on all phones by 2018.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;We’re in a situation where the country doesn’t have a privacy law on  one hand, and is setting up surveillance systems like the Centralized  Monitoring System, NETRA, NATGRID (for collecting data from across  databases), and linking citizens and databases across the unique  identity number in Aadhaar on the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What happened to the old Privacy bill?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While India does not yet have a comprehensive privacy policy, back in  2014, the Centre for Internet and Society received a leaked version of  the draft Privacy Bill 2014 that the Department of Personnel and  Training, Government of India had drafted. A comparison of the draft  bill from 2014 and the draft privacy bill of 2011 can be found &lt;a href="http://www.medianama.com/2014/04/223-leaked-privacy-bill-2014-vs-2011-cis-india/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per Prasad, as of now, the Section 43, 43A and 72A of the IT Act  of 2000 provide the legal framework for digital privacy and security,  mandating that agencies collecting personal data must provide a privacy  policy, and compensations must be paid to the victim in case of  unauthorized access or leakage of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="message_body"&gt;&lt;b&gt;Questions asked in Rajya Sabha&lt;/b&gt;: &lt;/span&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;&lt;span class="message_body"&gt;Whether Government  intends   to  bring  a  specific  legislation  to  address  the  concerns  regarding privacy in the country, if so, the details thereof, if not,  the reason therefore; and &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="message_body"&gt;Whether the legislation would provide for  protection of ‘personal data’ along the lines of the European Union’s  Data Protection Directive, if so, the details thereof, if not, the  reasons therefor&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;EU Privacy Bill&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, the question posed to the minister asked if the  legislation would provide for protection of personal data along the  lines of European Union’s General Data Protection Directive (GDRP),  which were approved just &lt;a href="http://www.allenovery.com/publications/en-gb/data-protection/Pages/Timetable.aspx"&gt;last month&lt;/a&gt;.  EU’s directive defines “any information relating to an identified or  identifiable natural person directly or indirectly, in particular by  reference to an identification number or to one or more factors specific  to his physical, physiological, mental, economic, cultural or social  identity”, as personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The GDRP has a pretty wide scope and is pretty consumer friendly. The  laws require users to provide explicit consent for data collection,  companies to report as soon as they have a data breach, and a ‘right to  erasure’ that lets users request all personal data related to them to be  deleted. It also imposes a significant fine of up to 4% of annual  worldwide turnover of a company in the previous financial year, in case  of non compliance. For a comprehensive overview of the policy read  handbook on European data protection law (&lt;a href="http://www.echr.coe.int/Documents/Handbook_data_protection_ENG.pdf"&gt;pdf&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Email privacy bill US&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US does not have a comprehensive digital privacy law like the EU  and mostly relies on the the privacy act of 1974. However, recently the  US House of Representatives &lt;a href="https://nakedsecurity.sophos.com/2016/04/29/us-house-unanimously-passes-email-privacy-act/"&gt;unanimously passed the Email Privacy Act&lt;/a&gt; that would require investigators to get a warrant before forcing  companies to hand over customer email or other electronic  communications, no matter how old the communication.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-vivek-pai-may-4-2017-indian-govt-says-it-is-still-drafting-privacy-law'&gt;https://cis-india.org/internet-governance/news/medianama-vivek-pai-may-4-2017-indian-govt-says-it-is-still-drafting-privacy-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-15T02:10:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system">
    <title>Indian Government Quietly Brings In Its 'Central Monitoring System': Total Surveillance Of All Telecommunications</title>
    <link>https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system</link>
    <description>
        &lt;b&gt;There's a worrying trend around the world for governments to extend online surveillance capabilities to encompass all citizens -- often justified with the usual excuse of combatting terrorism and/or child pornography.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The blog post was &lt;a class="external-link" href="https://www.techdirt.com/articles/20130508/09302923002/indian-government-quietly-brings-its-central-monitoring-system-total-surveillance-all-communications.shtml"&gt;published in &lt;b&gt;tech dirt&lt;/b&gt;&lt;/a&gt; on June 8, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The latest to join this unhappy club is India, which has put in place what sounds like &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Government-can-now-snoop-on-your-SMSs-online-chats/articleshow/19932484.cms"&gt;a massively intrusive system&lt;/a&gt;, as this article from The Times of India makes clear:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;The government last month quietly began rolling out a  project that gives it access to everything that happens over India's  telecommunications network -- online activities, phone calls, text  messages and even social media conversations. Called the Central  Monitoring System, it will be the single window from where government  arms such as the National Investigation Agency or the tax authorities  will be able to monitor every byte of communication.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;This project has been under development for two years, but in almost total secrecy:  &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;"In the absence of a strong privacy law that promotes  transparency about surveillance and thus allows us to judge the utility  of the surveillance, this kind of development is very worrisome," warned  Pranesh Prakash, director of policy at the Centre for Internet and  Society. "Further, this has been done with neither public nor  parliamentary dialogue, making the government unaccountable to its  citizens."&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt; That combination of total surveillance and zero transparency is a  dangerous one, providing the perfect tool for monitoring and controlling  political and social dissent.  If India wishes to maintain its claim to  be "the world's largest democracy", its government would do well to  introduce some safeguards against abuse of the new system, such as  strong privacy laws, as well as engaging the Indian public in an open  debate about &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;what exactly such extraordinary surveillance powers might be used for&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system'&gt;https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-02T09:12:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/idg-news-service-august-2-2015-indian-govt-orders-isps-to-block-857-porn-websites">
    <title>Indian government orders ISPs to block 857 porn websites</title>
    <link>https://cis-india.org/internet-governance/news/idg-news-service-august-2-2015-indian-govt-orders-isps-to-block-857-porn-websites</link>
    <description>
        &lt;b&gt;The Indian government has ordered a large number of porn websites to be blocked, creating an uproar among users and civil rights groups in the country.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;The blog post by John Ribeiro was &lt;a class="external-link" href="http://www.pcworld.com/article/2955832/indian-government-orders-isps-to-block-857-porn-websites.html"&gt;originally published by IDG News Service and mirrored on PC World website&lt;/a&gt; on August 2, 2015.&lt;/p&gt;
&lt;p&gt;&lt;section class="page"&gt;
&lt;p style="text-align: justify; "&gt;The  Department of Telecommunications has issued orders for the blocking of  857 websites serving pornography, said two persons familiar with the  matter, who declined to be named.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 69 (A) of India’s  Information Technology Act allows the government to order blocking of  public access to websites and other information through computer  resources, though this section appears to be designed to be invoked when  a threat is perceived to the sovereignty and integrity of India,  security of the state, friendly relations with foreign states or public  order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The government cannot on its own block private access to  pornography under current statutes,” said Pranesh Prakash, policy  director of the Centre for Internet and Society in Bangalore.  “Parliament has not authorized the government to ban porn on its own.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“However,  courts have in the past ordered specific websites to be blocked for  specific offences such as defamation, though as far as I know not for  obscenity,” Prakash added.&lt;/p&gt;
&lt;p&gt;Viewing pornography privately is not a crime in the country, though its sale and distribution is an offense.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some  porn websites were still accessible through certain Internet service  providers on Monday, as some ISPs took some time to implement the order.  “All the 857 websites will be blocked by all ISPs today,” said a source  in the ISP industry, who requested anonymity. “As licensees we have to  follow the orders.”&lt;/p&gt;
&lt;p&gt;The government could not be immediately reached for comment.&lt;/p&gt;
&lt;aside class="desktop tablet smartphone nativo-promo"&gt; &lt;/aside&gt;
&lt;p&gt;Reports of the blocks created a furore among Internet users in the country, who criticized the move on &lt;a href="http://www.reddit.com/r/india/comments/3fdwhm/are_porn_sites_getting_blocked/"&gt;Reddit,&lt;/a&gt; Twitter and other social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s  Supreme Court struck down in March as unconstitutional an Internet law  that provided for the arrest of people sending online messages  considered offensive or menacing. But it upheld Section 69 (A) in that  same ruling, which it described as a “narrowly drawn provision” limited  to a few subjects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a public interest lawsuit &lt;a href="http://www.thehindu.com/news/national/cant-stop-an-adult-from-watching-porn-in-his-room-says-sc/article7400690.ece"&gt;on the blocking of pornography&lt;/a&gt;,  the Supreme Court last month declined to issue an interim order that  would block porn websites at the request of the private litigant,  according to a report.&lt;/p&gt;
&lt;/section&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/idg-news-service-august-2-2015-indian-govt-orders-isps-to-block-857-porn-websites'&gt;https://cis-india.org/internet-governance/news/idg-news-service-august-2-2015-indian-govt-orders-isps-to-block-857-porn-websites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-09-13T08:18:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/afp-com-aug-23-2012-indian-govt-defends-internet-blocking">
    <title>Indian government defends Internet blocking</title>
    <link>https://cis-india.org/news/afp-com-aug-23-2012-indian-govt-defends-internet-blocking</link>
    <description>
        &lt;b&gt;India on Friday defended itself against accusations of heavy-handed online censorship, saying it had been successful in blocking content blamed for fuelling ethnic tensions.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Published by &lt;a class="external-link" href="http://www.google.com/hostednews/afp/article/ALeqM5j9Zg_2BZKDQTYM_Mm10RjCze0hsg?docId=CNG.392d5578e0e2c7d8a0f7efa54d2c061b.6b1"&gt;AFP&lt;/a&gt; on August 23, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government over the past week has ordered Internet service  providers to block 309 webpages, images and links on sites including  Facebook, Twitter, Wikipedia, news channel ABC of Australia and  Qatar-based Al-Jazeera.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The orders were an effort to halt the  spread of "hateful" material and rumours that Muslims planned to attack  students and workers who have migrated from the northeast region to live  in Bangalore and other southern cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We have met with  success. These pages were a threat to India's national security and we  demanded their immediate deletion," Kuldeep Singh Dhatwalia, a spokesman  for India's home ministry, told AFP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Spreading rumours to encourage violence or cause tension will not be tolerated. The idea is not to restrict communication."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  government has blamed Internet activity for fanning fears that resulted  in tens of thousands of migrants fleeing back to the northeast last  week from Bangalore and elsewhere.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Twitter users, legal  experts and analysts criticised the government's approach, which  appeared to have resulted in only partial blocking of material, much of  which was still accessible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The officials who are trusted with  this don't know the law or modern technology well enough," Pranesh  Prakash, programme manager at the Centre for Internet and Society  research group, told AFP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I hope that this fiasco shows the folly  of excessive censorship and encourages the government to make better  use of social networks and technology to reach out to people."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among  the blocked content were photographs by AFP and other news agencies  from Myanmar in the British Daily Telegraph, a parody Twitter account  pretending to be from Prime Minister Manmohan Singh and dozens of  YouTube videos.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ABC issued a statement saying it was "surprised by  the action" after content on its website about unrest in Myanmar  between Muslims and Buddhists was included on the blocking list.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India's  Home Minister Sushil Kumar Shinde insisted in a statement the  government was "only taking strict action against those accounts or  people which are causing damage or spreading rumours."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shinde  added that the government sought to block the Myanmar online photos  because they were "disturbing the atmosphere here in India."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  government said photographs of clashes in Myanmar were circulating on  the Internet with fake captions claiming the scenes were from the  northeastern Indian state of Assam, where 80 people have died in recent  ethnic violence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vivek Sood, senior Supreme Court lawyer and an  author on Internet legalisation, called the government's step "a gross  abuse of power."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It's completely illegal under the Indian IT Act," he told The Economic Times.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian  journalist Kanchan Gupta, who is often critical of the government, had  his Twitter account targeted by a government blocking order in a move he  called a "political vendetta".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Al Jazeera webpages on the  blocking list, including a report on the exodus from Bangalore, appeared  unaffected by the government orders, the channel's Delhi bureau chief  Anmol Saxena told AFP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ministers earlier complained they had not received cooperation from websites and social network groups.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government on Thursday said Twitter had agreed to remove six fake accounts parodying Prime Minister Singh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  prime minister's office issued a statement on Friday quoting Twitter  that they have "removed the reported profiles from circulation due to  violation of our Terms of Service regarding impersonation".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;United  States State Department spokeswoman Victoria Nuland said as India  "seeks to preserve security, we are urging them also to take into  account the importance of freedom of expression in the online world".&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The above was carried in the following places as well:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;a class="external-link" href="http://www.thenational.ae/lifestyle/spectre-of-violence-justified-internet-blocking-indian-officials-say"&gt;The National&lt;/a&gt; (August 25, 2012)&lt;/span&gt;&lt;span&gt;&lt;a href="http://news.ph.msn.com/sci-tech/indian-govt-defends-internet-blocking" target="_blank"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;a href="http://news.ph.msn.com/sci-tech/indian-govt-defends-internet-blocking" target="_blank"&gt;&lt;span&gt;MSN News&lt;/span&gt;&lt;/a&gt; (August 24, 2012) &lt;/span&gt;&lt;span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;a href="http://www.starafrica.com/en/news/detail-news/view/india-warns-twitter-over-ethnic-violence-249196.html" target="_blank"&gt;StarAfrica.com&lt;/a&gt; &lt;/span&gt;&lt;span&gt;(August 24, 2012)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt; &lt;a href="http://www.thejakartaglobe.com/international/india-defends-internet-censorship/540161" target="_blank"&gt;Jakarta Globe&lt;/a&gt;&lt;/span&gt;&lt;span&gt; (August 24, 2012)&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/afp-com-aug-23-2012-indian-govt-defends-internet-blocking'&gt;https://cis-india.org/news/afp-com-aug-23-2012-indian-govt-defends-internet-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-28T10:07:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/whdi-reviews-nov-22-2012-indian-government-at-second-position-after-usa-for-demanding-user-data-from-google">
    <title>Indian government at second position after U.S.A for demanding user data from Google</title>
    <link>https://cis-india.org/news/whdi-reviews-nov-22-2012-indian-government-at-second-position-after-usa-for-demanding-user-data-from-google</link>
    <description>
        &lt;b&gt;The Indian government has secured 2nd position in the list of the governments demanding for Web user information. It is behind only from the United States government.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This blog entry was &lt;a class="external-link" href="http://whdi-reviews.com/2012/11/indian-government-at-second-position-after-u-s-a-for-demanding-user-data-from-google/"&gt;published in WHDI Reviews&lt;/a&gt; on November 22, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;This fact came to light in the ‘Transparency Report’ published by web services major. The report covers the time period from January to June in the present year. During this time period, the Govt. of India has asked Google for user information 2,319 times over 3,647 user accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This has been done by the way of court orders and requests made by police. Google has allowed the disclosure of the information sometimes partially and sometimes completely. The U.S.A government on the other hand requested for more information 7,969 requests over 16,281 accounts. The compliance rate by Google to Indian and U.S requests was 64% and 90% respectively. The report gives details about two categories of interactions: firstly to divulge data and secondly to pull down content. India now ranks 7th in the list of countries which had made requests to pull down data. India could have achieved even a better rank but owing to the lack of any constitutional power which backs its action, it has to be satisfied with the seventh position.  According to Pranesh, (policy director with Bangalore-based Centre for Internet and Society) these requests for pulling down data are an attempt made by the government so that its criticism is not able to reach a wide audience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google (which is banned in China) supports the cause of disclosure of the information related to governments. The other net service providers which put out similar transparency reports are twitter, Linkedin and Cloud storage service Dropbox. These content pull down request made by the government is not healthy for a democratic country like India.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/whdi-reviews-nov-22-2012-indian-government-at-second-position-after-usa-for-demanding-user-data-from-google'&gt;https://cis-india.org/news/whdi-reviews-nov-22-2012-indian-government-at-second-position-after-usa-for-demanding-user-data-from-google&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2012-11-30T05:05:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
