<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1601 to 1615.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-harsimran-julka-february-25-2015-delhi-government-in-consultation-with-centre-to-block-ubers-internet-address"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/reply-to-rti-applications-with-respect-to-foreign-contractors-and-vendors-of-it-and-telecommunication-enterprises"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-today-february-25-2015-sahil-mohan-gupta-google-war-on-nude-photos-goes-against-user-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gender-it-february-19-2015-selection-tweets-how-make-crowdmaps-effectual-mapping-violence-against-women"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/preliminary-submission-on-internet-governance-issues-to-assocham"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/net-gain-working-together-for-stronger-digital-society"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-lalatendu-mishra-sriram-srinivasan-february-11-2015-hindu-facebook-launches-internet-org-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-february-10-2015-moulishree-srivastava-govt-may-turn-to-supercomputing-for-better-use-of-aadhaar-database"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/pc-world-john-riberio-february-10-2015-facebook-offers-free-but-limited-access-to-the-internet-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/digital-security-workshop-for-journalists"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-harsimran-julka-february-25-2015-delhi-government-in-consultation-with-centre-to-block-ubers-internet-address">
    <title>Delhi government in consultation with Centre to block Uber's Internet address</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-harsimran-julka-february-25-2015-delhi-government-in-consultation-with-centre-to-block-ubers-internet-address</link>
    <description>
        &lt;b&gt;The Delhi transport department has started consultation with the central government to block the internet address of taxi hailing app Uber if the San Francisco-based startup does not obtain a radio taxi licence to ply its cabs in the national capital.&lt;/b&gt;
        &lt;p&gt;The article by Harsimran Julka was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2015-02-25/news/59499984_1_delhi-high-court-radio-taxi-licence-transport-department"&gt;published in the Economic Times&lt;/a&gt; on February 25, 2015. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Blocking Uber's IP will mean the company's website and mobile phone  application will no longer be accessible in India, effectively shutting  down operations in a country which the startup estimates is its largest  market outside the &lt;a href="http://economictimes.indiatimes.com/topic/United%20States"&gt;United States&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Uber has operations across 10 cities in India with over 10,000 cabs  registered on its platform."We have initiated a process with the central  government to block (Uber's) IP address in India if the company doesn't  abide by law," said a senior official in the Delhi transport  department.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Uber and other taxi app companies were banned from  operating in Delhi after the alleged rape of a passenger by a driver on  the Uber network in December 2014. Subsequently, the transport  department modified radio taxi laws and directed Uber and rivals &lt;span&gt;OlaCabs&lt;/span&gt; and Taxiforsure to obtain licences to operate legally in the city.  While Ola has obtained a licence, Uber, which terms itself as a  technology company and not a transport provider, has been demanding that  it be regulated under the Information Technology Act. "There has to be  an end to the matter somewhere," said the official quoted above. The  department has given Uber time until February 25 to submit a revised  application for a radio taxi licence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We are waiting to see if they comply and apply for a licence before  issuing a written request (to block the IP address),' said a second  official who confirmed that the transport department had already begun  discussions with the department of IT. Zubeda Begum, the standing  counsel for the Delhi government is likely to submit an affidavit on  Wednesday in the Delhi High Court on the method to be adopted to block  the IP address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The court, which is hearing the case of the  alleged rape, had raised the issue of banning IP addresses of taxi app  companies after the state government complained that the companies  continued to ply in the national despite the ban.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It is the  central government which will have to block the website. The Delhi  government just has to make a request," Begum told ET.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pawan Duggal, cyber law expert and a &lt;a href="http://economictimes.indiatimes.com/topic/Supreme%20Court"&gt;Supreme Court&lt;/a&gt; advocate, said that the blocking of websites in India can be done under Section 69A of the &lt;a href="http://economictimes.indiatimes.com/topic/Information%20Technology%20Act"&gt;Information Technology Act&lt;/a&gt; but the rules to get them unblocked are unclear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"A court order may be needed to get it unblocked," said Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A spokeswoman for Uber said the company will continue to work with the  authorities and is "evaluating the perceived deficiencies in the time  period provided to us by the government."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not the first time that the website of a foreign company  will be banned in India. Last December, about 32 websites including &lt;a href="http://economictimes.indiatimes.com/topic/SourceForge"&gt;SourceForge&lt;/a&gt;, &lt;a href="http://economictimes.indiatimes.com/topic/Archive"&gt;Archive&lt;/a&gt;, &lt;a href="http://economictimes.indiatimes.com/topic/Vimeo"&gt;Vimeo&lt;/a&gt;, &lt;a href="http://economictimes.indiatimes.com/topic/Dailymotion"&gt;Dailymotion&lt;/a&gt; were banned on grounds of national security. Uber itself has had its IP  address blocked in countries such as Spain. Last December, a Madrid  Court ordered Spain's telcos to block access to Uber.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Any state  government department can request the designated authority to block a  website. The authority has to then forward the request to a committee,  which takes the decision," said Pranesh Prakash, at the Centre for  Internet and Society in Bengaluru.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-harsimran-julka-february-25-2015-delhi-government-in-consultation-with-centre-to-block-ubers-internet-address'&gt;https://cis-india.org/internet-governance/news/economic-times-harsimran-julka-february-25-2015-delhi-government-in-consultation-with-centre-to-block-ubers-internet-address&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-03-09T02:12:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked">
    <title>Hacking of SIM card by spy agencies raises fears of sensitive documents being leaked</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked</link>
    <description>
        &lt;b&gt;The hacking of SIM-card and digital security services provider Gemalto by American and British spy agencies has raised fears that sensitive communications, by the Indian government and hundreds of domestic companies, may have been at the risk of being spied on.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by PK Jayadevan and Neha Alawadhi was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2015-02-25/news/59499696_1_gemalto-encryption-keys-security-solutions"&gt;published in the Economic Times&lt;/a&gt; on February 25, 2015. Pranesh Prakash and Sunil Abraham were quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Netherlands-based Gemalto was jointly hacked by the &lt;a href="http://economictimes.indiatimes.com/topic/US%20National%20Security%20Agency"&gt;US National Security Agency&lt;/a&gt; and Britain's Government Communications Headquarters, and encryption  keys were stolen to monitor mobile communications, according to a news  report published last week.&lt;/p&gt;
&lt;div class="mod-articletext mod-economictimesarticletext mod-economictimesarticletextwithadcpc" id="mod-a-body-after-first-para" style="text-align: justify; "&gt;
&lt;p&gt;India's largest telecom vendors including Airtel, Vodafone and &lt;a href="http://economictimes.indiatimes.com/topic/Idea%20Cellular"&gt;Idea Cellular&lt;/a&gt; use SIM cards supplied by Gemalto, the world's biggest maker of  mobile-phone chips and provider of secure devices such as smart cards  and tokens. &lt;a href="http://economictimes.indiatimes.com/topic/Online%20publisher"&gt;Online publisher&lt;/a&gt; The Intercept in its report named Idea Cellular as one of the networks from which the spy agencies accessed encryption keys.&lt;/p&gt;
&lt;p&gt;"Phone calls and text messages by military, government, diplomats, spy  corporations and by ordinary citizen of India - all of those get  affected by this hack," said Pranesh Prakash, Policy Director at  research and advocacy firm &lt;a href="http://economictimes.indiatimes.com/topic/Centre%20for%20Internet"&gt;Centre for Internet&lt;/a&gt; and Society.&lt;/p&gt;
&lt;p&gt;The Intercept, which accessed top secret documents provided by NSA whistleblower &lt;a href="http://economictimes.indiatimes.com/topic/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt;,  said American and British spies dug into the private communications of  Gemalto engineers and other employees to steal encryption keys.&lt;/p&gt;
&lt;p&gt;Gemalto provides security services such as two-factor authentication and  access management, and has hundreds of clients in India. The company in  2012 said it provided 25 million e-driver's licences and vehicle  registration certificates in India that let the government "consolidate  driver and vehicle registration information across the population in a  central repository".&lt;/p&gt;
&lt;p&gt;"We believe that the biggest risk stands for  the large number of Vodafone users in the country as the company has  deployed Gemalto's Near Field Communication services solutions to  provide secure and convenient 'wave and pay' contactless transactions  via mobile phone," said Sanchit Vir Gogia, Chief Analyst and Group CEO,  Greyhound Research.&lt;/p&gt;
&lt;p&gt;"We have no further details of these  allegations, which are industry-wide in nature and are not focused on  any one mobile operator. We will support industry bodies and Gemalto in  their investigations," said a Vodafone spokesperson in an email  response.&lt;/p&gt;
&lt;p&gt;Emails to Idea and &lt;a href="http://economictimes.indiatimes.com/topic/Airtel"&gt;Airtel&lt;/a&gt; were unanswered till the time of going to Press.&lt;/p&gt;
&lt;p&gt;"Indian operators typically go for cheaper Chinese vendors that are  anyway low on security. Among the European SIM vendors, Gemalto has the  largest share in India," said a senior mobile services executive,  requesting anonymity.&lt;/p&gt;
&lt;p&gt;The report on the hack comes at a time when Gemalto was looking to tap the &lt;a href="http://economictimes.indiatimes.com/topic/Indian%20market"&gt;Indian market&lt;/a&gt;,  including e-governance initiatives. The company in a recent email to ET  said it had plans to expand its center of excellence in India to  develop multiple products, offer tech support and provide security  solutions for the domestic market.&lt;/p&gt;
&lt;p&gt;"We take this (breach) very  seriously and will devote all resources necessary to fully investigate  and understand the scope of such highly sophisticated attacks to obtain  SIM card data," a Gemalto spokesperson said. "The target was not  Gemalto, per se - it was an attempt to try and cast the widest net  possible to reach as many mobile phones as possible."&lt;/p&gt;
&lt;p&gt;Initial  investigations indicate that SIM products as well as banking cards,  passports and other products and platforms are secure, the company said.  Gemalto is expected to announce the results of its investigation on  Wednesday. British and US spy agencies have been under fire for hacking  and spying on citizens after Snowden in mid-2013 began leaking documents  that revealed massive surveillance programmes by the two governments.  At the time, the Indian government said the NSA was only collecting  meta-data and had no access to the actual contents of phone calls or  text messages.&lt;/p&gt;
&lt;div class="mod-articletext mod-economictimesarticletext mod-economictimesarticletextwithadcpc" id="mod-a-body-after-second-para"&gt;
&lt;p&gt;Experts suggest a multinational consensus or treaty that strikes a balance between national security concerns and privacy.&lt;/p&gt;
&lt;p&gt;"Governments will have to debate this in the United Nations and some  kind of rules for surveillance, maybe treaties, are relevant in the  future," said Kamlesh Bajaj, Chief Executive at Data Security Council of  India. "They shall have to have some kind of a limit to surveillance.  They can't be vacuuming all data in the name of finding a needle in the  haystack."&lt;/p&gt;
&lt;p&gt;Sunil Abraham, Executive Director at Center for  Internet and Society, suggested the Indian government should replace  proprietary operating systems and Android on phones with pure free  software projects, use of virtual private network on phones to  carry voice and data traffic, and encrypt voice and data payloads  separately.&lt;/p&gt;
&lt;p&gt;"When it comes to all the other services provided by  Gemalto, the India government should insist that they will do key  management on their own. This will also mitigate the compromise of  Gemalto's enterprise networks by the NSA," he said.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked'&gt;https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-09T01:31:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment">
    <title>  Right to Information (RTI) Requests to BSNL and MTNL Regarding Security Equipment</title>
    <link>https://cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment</link>
    <description>
        &lt;b&gt;As part of research, on July 2, 2013, the Centre for Internet and Society (CIS) had sent Right to Information (RTI) requests to two of the largest internet service providers (ISPs) in India: Mahanagar Telephone Nigam Limited (MTNL) and Bharat Sanchar Nigam Limited (BSNL) requesting answers to some questions.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Answers to the following questions were requested:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Please list the companies from which MTNL/BSNL has bought all its security equipment.&lt;/li&gt;
&lt;li&gt;What type of security equipment does MTNL/BSNL use to assist Indian law enforcement agencies in detecting and preventing crime, terrorism and all other illegal activity? Please provide the certification for all such equipment.&lt;/li&gt;
&lt;li&gt;What malware does MTNL/BSNL test for? What does MTNL/BSNL use for testing malware in its networks?&lt;/li&gt;
&lt;li&gt;Which proxy server does MTNL/BSNL use and is it used for filtering data? If so, what type of data is being filtered and for what purpose? Is authorisation required and if so, by whom?&lt;/li&gt;
&lt;li&gt;Does MTNL/BSNL use FinFly ISP? If so, who authorises its use and under what conditions?&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;M. K. Sheda, the appellate authority of MTNL, responded to the above questions on August 3, 2013 with the following answers:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;MTNL procures all its equipment through an open competitive bidding process and the details of all past tenders are available on the MTNL website. Equipment from multiple vendors are operational in GSM MTNL Packet-Core Network and specific 	names cannot be given due to security reasons.&lt;/li&gt;
&lt;li&gt;MTNL uses the security equipment by the Department of Telecommunications, Government of India, to assist Indian law enforcement agencies. The details 	cannot be disclosed as the information is classified as "secret" as per MTNL IT Policy Revision 2.0 and also comes under Section -8 (1) (a) and (d) of the 	RTI Act 2005.&lt;/li&gt;
&lt;li&gt;MTNL GSM Packet Core equipment for data access uses MTNL ISP as its interface with external entities. Thus information is pertaining to MTNL ISP and hence a reply may please be taken from the GM (Broadband) unit.&lt;/li&gt;
&lt;li&gt;Same answer as "3" above.&lt;/li&gt;
&lt;li&gt;Same answer as "3" above.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;BSNL has still not responded to the above questions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click below to download the respective files:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/bsnl-rti-application-2013.pdf" class="external-link"&gt;RTI Application to BSNL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/reply-from-mtnl-to-rti-application.pdf" class="external-link"&gt;Reply from MTNL&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment'&gt;https://cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RTI Application</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-25T15:04:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/reply-to-rti-applications-with-respect-to-foreign-contractors-and-vendors-of-it-and-telecommunication-enterprises">
    <title>Reply to RTI Applications filed with respect to Foreign Contractors and Vendors of IT and Telecommunication Enterprises</title>
    <link>https://cis-india.org/internet-governance/blog/reply-to-rti-applications-with-respect-to-foreign-contractors-and-vendors-of-it-and-telecommunication-enterprises</link>
    <description>
        &lt;b&gt;An RTI application was filed by the Sh. Matthew Thomas on August 06, 2014 enquiring about the details of the foreign contractors and vendors of certain Information Technology and Telecommunication enterprises. Mr. Mathews in his application asked some specific questions.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Information sought in the RTI Application &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The specific questions asked are as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Names, addresses in India and abroad of all their contractors and vendors who are foreign firms, even if they have registered offices in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Permission to inspect files pertaining to subject matter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Details of the orders placed in each of the past 3 or more years on each of their contractors and details of the orders placed in each of the past 3 or 	more years on each of their contractors where the amount is for Rs. 50 crore or more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Enterprises to which the RTI Application was addressed&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The application was sent to the following enterprises:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Department of Electronics &amp;amp; Information Technology, Ministry of Communications and Information Technology, Government of India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Department of Telecommunications, Ministry of Communications and Information Technology, Government of India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Information Technology Branch, Department of Food, Supplies &amp;amp; Consumer Affairs, Government of NCT of Delhi&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Centre for Development of Telematics (C-DOT) - an Indian Government owned telecommunications technology development centre which designs and develops 	digital exchanges and intelligent computer software applications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Centre for Development of Advanced Computing (C-DAC) - a research and development organization under the Department of Electronics and Information 	Technology, Government of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Bharat Sanchar Nigam Ltd. (BSNL) - an Indian state-owned telecommunications company. It is India's oldest and largest communication service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Reply to the RTI Application&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reply to the information sought in the RTI application by these enterprises is as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 1. &lt;span style="text-decoration: underline;"&gt;Department of Electronics &amp;amp; Information Technology, Ministry of Communications and Information Technology, Government of India&lt;/span&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The RTI application was addressed to the Deputy Director of the department who forwarded the application to the Joint Director directing him to provide the 	requisite information directly to the applicant or transfer the application to the concerned Central Public Information Officers (CPIOs) if the subject matter did not pertain to his division. In response, the Joint Director of the Department of Electronics &amp;amp; Information Technology said that the	&lt;b&gt;information on the subject matter was NIL&lt;/b&gt; as far as Engineering/BM section, Fire, Security and Protocol Sections of Department of 	Electronics and Information Technology is concerned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2.&lt;/b&gt; &lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Department of Telecommunications, Ministry of Communications and Information Technology, Government of India&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The RTI application was forwarded by the Deputy Secretary &amp;amp; Nodal Officer (RTI) of the Department of Telecommunications to the following divisions for	&lt;b&gt; &lt;/b&gt;providing the requisite information directly to the applicant or transferring the application to the concerned Central Public Information 	Officers (CPIOs) if the subject matter did not pertain to their division and their replies are as under:-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.&lt;b&gt; &lt;/b&gt; Investment Promotion Cell: The Director (IP Cell) &amp;amp; CPIO said that &lt;b&gt;no information was available&lt;/b&gt; as the subject matter of the 	application did not pertain to IP Cell.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. Access Services-I Division: Director (AS-I) &amp;amp; CPIO asked to &lt;b&gt;treat the information as NIL.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.&lt;b&gt; &lt;/b&gt; Licensing Finance - II Branch: Director (IF-II) &amp;amp; CPIO asked to &lt;b&gt;treat the information as NIL &lt;/b&gt;as the matter did not pertain to that 	branch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d.&lt;b&gt; &lt;/b&gt; Licensing Finance - III Branch: Director (IF-III) &amp;amp; CPIO asked to &lt;b&gt;treat the information as NIL &lt;/b&gt;as the matter did not pertain to that 	branch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e.&lt;b&gt; &lt;/b&gt; Deputy Wireless Adviser: CPIO &amp;amp; Deputy Wireless Adviser to the Govt of India of WPC Wing, SACFA Sectt. said that the	&lt;b&gt;information sought was not available&lt;/b&gt; with that PlO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.&lt;/b&gt; &lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Information Technology Branch, Department of Food, Supplies &amp;amp; Consumer Affairs, Government of NCT of Delhi&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Public Information Officer (HQ) of the Information Technology Branch of Department of Food, Supplies &amp;amp; Consumer Affairs forwarded the RTI 	application to Assistant Commissioner (Policy), Food and Supplies Department and Public Information Officer (HQ), Food and Supplies Department to provide 	the Para wise information directly to the applicant in accordance with section 5(4) of RTI Act as the record related to the information sought was said to 	be available with their office. Section 5(4) of RTI Act reads, 	&lt;i&gt; "The Central Public Information Officer or State Public Information Officer, as the case may be, may seek the assistance of any other officer as he or 		she considers it necessary for the proper discharge of his or her duties." &lt;/i&gt; However, a &lt;b&gt;reply hasn't been received &lt;/b&gt;from the Assistant Commissioner (Policy), Food and Supplies Department and Public Information 	Officer (HQ), Food and Supplies Department yet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.&lt;/b&gt; &lt;b&gt;&lt;span style="text-decoration: underline;"&gt;The Centre for Development of Telematics&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Referring the information sought in the &lt;b&gt;RTI application as vague&lt;/b&gt;, the Centre for Development of Telematics asked the applicant to clearly 	define the information requirements and the period for which it required. The Centre claimed that the information sought at present would lead to handing 	over of a large amount of data which would require application of significant resources of public authority, since the number of the vendors and 	contractors could be more than seven hundred in numbers of different categories, namely, component vendors, equipment suppliers, administrative service 	contractors, etc. The reply was in consistency with section 7(9) of the Right to Information Act which reads, 	&lt;i&gt; "An information shall ordinarily be provided in the form in which it is sought unless it would disproportionately divert the resources of the public 		authority or would be detrimental to the safety or preservation of the record in question." &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5.&lt;/b&gt; &lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Centre for Development of Advanced Computing&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Development of Advanced Computing disregarded the information sought by the applicant and observed that the&lt;b&gt;information sought&lt;/b&gt; was vague in nature, not specific and open ended, therefore,	&lt;b&gt;could not be termed as Information under the RTI Act &lt;/b&gt;without providing any further explanation in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6.&lt;/b&gt; &lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Bharat Sanchar Nigam Ltd. (BSNL), Government of India Enterprise&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The RTI application was referred to the MM cell of BSNL by the AdditionaI General Manager (MIS) &amp;amp; CPIO of BSNL (RTI Cell) who replied that	&lt;b&gt;no information&lt;/b&gt; with respect to the names, addresses in India and abroad of all their contractors and vendors who are foreign firms, even 	if they have registered offices in India &lt;b&gt;was available. As far as the third question regarding &lt;/b&gt;details of the orders placed in each of the 	past 3 or more years on each of their contractors and details of the orders placed in each of the past 3 or more years on each of their contractors where the amount was for Rs. 50 crore or more was concerned, the AGM of MM cell said that the	&lt;b&gt;information could be provided for specific contractor.&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/reply-to-rti-applications-with-respect-to-foreign-contractors-and-vendors-of-it-and-telecommunication-enterprises'&gt;https://cis-india.org/internet-governance/blog/reply-to-rti-applications-with-respect-to-foreign-contractors-and-vendors-of-it-and-telecommunication-enterprises&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Lovisha Aggarwal</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RTI Application</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-25T14:13:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-today-february-25-2015-sahil-mohan-gupta-google-war-on-nude-photos-goes-against-user-rights">
    <title>Google's war on nude photos goes against user rights  </title>
    <link>https://cis-india.org/internet-governance/news/india-today-february-25-2015-sahil-mohan-gupta-google-war-on-nude-photos-goes-against-user-rights</link>
    <description>
        &lt;b&gt;Yesterday, Google announced that starting March 23, 2015 users will be unable to share sexually explicit content on its blogging platform -- Blogger.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sahil Mohan Gupta &lt;a class="external-link" href="http://indiatoday.intoday.in/technology/story/googles-war-on-nude-photos-goes-against-user-rights/1/420809.html"&gt;published by India Today&lt;/a&gt; on February 25, 2015 quotes Sunil Abraham.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a country like India, such content generally causes a 'storm in  teacup' this move might be welcomed, however, experts say that it goes  against the tenets of free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, Google is not alone, but all the major Internet players  indulge in such draconian practices. Facebook cracks down on sexually  explicit content on its platform while Apple also does not allow any app  that has anything close to pornography on its iOS app store.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bigger issue is that these companies allow anything when they are in  the process of attracting users, but turn turtle the moment they attain  a level of stickiness with their user-base. Their U-turns are often on  frivolous grounds, which go against the very tenets of freedom of speech  and human rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, the executive director of The Center of Internet and  Society tells IndiaToday.in that legally big Internet companies like  Google are well within their rights to make such modifications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"According to US and Indian law they 'can' censor as per their own terms  of use which is based on contract law," explains Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Unfortunately, most of the networked public sphere has been privatized  by near monopolies. They are able to use contract law to clamp down on  human rights," he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There, however, is light at the end of the tunnel. According to  Abraham, the only way states can guarantee human rights is by treating  these intermediaries like utilities with narrow exceptions through  regulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That said, this approach is not without risks and  advises extreme caution. "Unfortunately, this will reduce the agile  innovation that these near-monopolies contribute to our information  society," says Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alternatively, increased competition and  amendments to contract law will also help in curtailing the ability of  companies like Google, Facebook, Apple, and Microsoft to deny user  rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the past, Apple notoriously blocked Pulitzer Prize  winner Mark Fiore's app on the App Store. It was reportedly making  editorial calls on the content of the app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We've reviewed  NewsToons and determined that we cannot post this version of your iPhone  application to the App Store because it contains content that ridicules  public figures and is in violation of Section 3.3.14 from the iPhone  Developer Program License Agreement which states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Applications  may be rejected if they contain content or materials of any kind (text,  graphics, images, photographs, sounds, etc.) that in Apple's reasonable  judgment may be found objectionable, for example, materials that may be  considered obscene, pornographic, or defamatory&lt;/i&gt;," replied an Apple iPhone developer program representative to Fiore while rejecting his app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Electronic Frontier Federation (EFF), which is a non-profit  organization that helps defend digital rights feels Apple's App store  policies are outrageous and bad for both developer and users alike. Due  to this, it has not even released an iOS app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google for its part  right now claims, " We'll still allow nudity if the content offers a  substantial public benefit, for example in artistic, educational,  documentary, or scientific contexts."  However, there is no reason why  it could not have a change of heart.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The new rules also mean that  now Google will not only act as a platform owner but also an entity  that will decide what is art and what is good public taste.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook,  the dominant force in the sphere of social networking, has been for  years criticized for its draconian policies regarding terms of use. It  is also known to clampdown on freedom of speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last year, even  Twitter cracked down on explicit sexual Vines. Though Twitter allows  users to share explicit content if they properly mark such content as  sensitive.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-today-february-25-2015-sahil-mohan-gupta-google-war-on-nude-photos-goes-against-user-rights'&gt;https://cis-india.org/internet-governance/news/india-today-february-25-2015-sahil-mohan-gupta-google-war-on-nude-photos-goes-against-user-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-09T01:57:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online">
    <title>Analytics to help govt read public mood online</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online</link>
    <description>
        &lt;b&gt;The Union government is in the process of commissioning a project to analyse public sentiment about it on various online platforms. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Talwar &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/analytics-to-help-govt-read-public-mood-online-115022000044_1.html"&gt;published in the Business Standard&lt;/a&gt; quotes Pranesh Prakash.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The project will cover state-owned MyGov.in, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Social+Media" target="_blank"&gt;social media &lt;/a&gt;portals such as &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;and Twitter, and the top 10 &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=News+Websites" target="_blank"&gt;news websites &lt;/a&gt;in the country. The analysis will also extend to &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Twitter" target="_blank"&gt;Twitter &lt;/a&gt;and  Facebook accounts of government ministries and departments, according  to a document evincing interest from companies and defining scope of  work that has been posted on the website of the electronics and  information technology department. The Centre expects the platform to be  ready in two months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is the first time that the Centre is deploying a tool to  'officially' listen in on social media conversations and monitor media  reports as well as subsequent public reaction. The idea is not to see  which journalist is saying what and tell the government "inhe ad dena  band kar do" (don't give them ads), said a government official familiar  with the plans. It has also got "nothing to do with politics or  elections", the official added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The stated objective is to gauge public opinion related to policy  matters and get a "comprehensive picture of the larger issues concerning  the people", the official said. According to the mandate, the company  will analyse comments posted on MyGov.in, which sees about 50,000  responses every week. It will also scan through social media sites,  articles posted on news portals and the comments section, and categorise  these into three "tag clouds" - negative, positive and neutral.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Analytics are not strong if you are looking at it with a tunnel  vision," said the government official, adding they needed to be  comprehensive and corroborated across different platforms. The idea  behind extending the mandate to social media websites and news  organisations, according to the official, is to make sure the  government's policies and initiatives are in sync with the people's  wishes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the government claimed it would only study posts that are  "public" and not build backend access into the network of social media  companies to get a look at all content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the official, the Centre was not interested in "listening  to everything that people are talking about", rather it will restrict  its queries that relate to its business of policymaking. "Anything  beyond that is not our mandate," the official clarified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Mahesh Murthy, founder of digital media firm Pinstorm,  these kinds of sentiment-analysis tools have become quite popular lately  with both companies and political parties, who use these to gauge  public mood before elections.&lt;br /&gt; &lt;br /&gt; "They can cost anywhere between Rs 2 lakh and Rs 10 lakh a month," he  said, adding there were hardly any privacy implications since the data  being analysed was in public domain.&lt;br /&gt; &lt;br /&gt; Pranesh Prakash of the Centre for Internet and Society said, "Privacy  concerns aren't as acute if there is no profiling that is happening."  Prakash added the concept might be worrisome if algorithms became the  determining factor for policymaking, as they could be dangerous for  democratic functioning. "They are like black boxes and you don't how  they function."&lt;br /&gt; &lt;br /&gt; Launched about six months ago, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mygov.in" target="_blank"&gt;MyGov.in &lt;/a&gt;is  the National Democratic Alliance government's citizen-engagement  platform through which it solicits ideas and inputs from the public on  government business.&lt;br /&gt; &lt;br /&gt; Once the sentiment-analysis project is implemented, the government will  be able to automate the process of providing summary of inputs on  discussion topics to the government agencies concerned.&lt;br /&gt; &lt;br /&gt; The volume of comments received on the platform is making it difficult  for the Centre to manually sift through these for the most relevant  ones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The solution would display two sets of dashboards. One would be in  public domain. The other would be restricted through the multi-level  role-based access system provisioned by the solution," said the document  evincing expression of interest from companies.&lt;br /&gt; &lt;br /&gt; Those interested will have to provide a proof of concept before being selected.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online'&gt;https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-09T16:57:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gender-it-february-19-2015-selection-tweets-how-make-crowdmaps-effectual-mapping-violence-against-women">
    <title>A Selection of Tweets on How to Make Crowdmaps Effectual for Mapping Violence against Women</title>
    <link>https://cis-india.org/internet-governance/blog/gender-it-february-19-2015-selection-tweets-how-make-crowdmaps-effectual-mapping-violence-against-women</link>
    <description>
        &lt;b&gt;This is a collection of tweets by Rohini Lakshane on making crowdmaps more effective for mapping gender violence. The compilation of tweets has been republished by GenderIT.org.&lt;/b&gt;
        &lt;div class="storify"&gt;&lt;iframe class="s-header-ext s-header-iframe_rohinil-rohini-s-week-pinthecreep" frameborder="no" id="header-54dc4dbcfefa03f5059dcdb7" scrolling="no" width="100%"&gt;&lt;/iframe&gt;&lt;iframe frameborder="no" height="750" scrolling="no" src="http://storify.com/rohinil/rohini-s-week-pinthecreep/embed?border=false" width="100%"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;div id="footer"&gt;
&lt;div class="section clearfix"&gt;
&lt;div id="clearme"&gt;&lt;/div&gt;
 &lt;/div&gt;
  &lt;/div&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="u-url profile" href="https://twitter.com/pinthecreep"&gt;&lt;span class="full-name"&gt;&lt;span class="p-name customisable-highlight"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
&lt;div class="content e-entry-content"&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;br /&gt;For more see the &lt;a class="external-link" href="http://www.genderit.org/feminist-talk/selection-tweets-how-make-crowdmaps-effectual-mapping-violence-against-women"&gt;original published on the website of Gender IT.org&lt;/a&gt; on February 19, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gender-it-february-19-2015-selection-tweets-how-make-crowdmaps-effectual-mapping-violence-against-women'&gt;https://cis-india.org/internet-governance/blog/gender-it-february-19-2015-selection-tweets-how-make-crowdmaps-effectual-mapping-violence-against-women&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rohini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-12T00:42:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos">
    <title>The Surveillance Industry in India – An Analysis of Indian Security Expos</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos</link>
    <description>
        &lt;b&gt;The author talks about the surveillance industry in India and analyses Indian security expos.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 'Spy Files', a series of documents released by whistleblower website WikiLeaks over the last few years, exposed the tremendous growth of the private 	surveillance industry across the world - a multi-billion dollar industry thriving on increasing governmental and private capabilities for mass surveillance 	of individuals.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; These documents showed how mass surveillance is increasingly made possible through new 	technologies developed by private players, often exploiting the framework of nascent but burgeoning information and communication technologies like the 	internet and communication satellites. Moreover, the unregulated and undiscerning nature of the industry means that it has enabled governments (and also 	private agencies) across the world - from repressive dictatorships to governments in western democracies with a growing track record of privacy and civil 	liberties infringements - to indulge in secretive, undemocratic and often illegal surveillance of their citizens. The Spy Files and related research have 	revealed how the mass surveillance industry utilizes the rhetoric of national security and counter-terrorism to couch technologies of surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;'Security' and the Normalization Of Surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New technologies undoubtedly create a potential for both malicious as well as beneficial use for society. Surveillance technologies are a prime example, 	having both enabled improvements in law enforcement and security, but at the same time creating unresolved implications for privacy and civil liberties. 	These technologies expose what Lawrence Lessig describes as 'latent ambiguities' in the law - ambiguities that require us to assess the implications and 	effects of new technologies and how to govern them, and most importantly, to choose between conflicting values regarding the use of technologies, for 	example, increased security as against decreased privacy.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, In India, the ambiguity seems to have been resolved squarely in favour of surveillance - under the existing regulatory regime, surveillance 	is either expressly mandated or unregulated, and requires surveillance to be built into the architecture and design of public spaces like internet and 	telephone networks, or even public roads and parks. Most of these regulations or mechanisms are framed without democratic debate, through executive 	mechanisms and private contracts with technology providers, without and public accountability or transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, under the telecom licensing regime in India, the ISP and UASL licenses specifically require lawful interception mechanisms through hardware or 	software to be installed by the licensees, for information (Call Data Records, Packet Mirroring, Call Location) to be provided to 'law enforcement 	agencies', as specified by the Government.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; Section 69 of the Information Technology Act, the main 	legislation governing the Internet in India, read with the rules framed under the Act, makes it incumbent upon 'intermediaries' to provide surveillance 	facilities at the behest of government agencies.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond this, the State and its agencies Section 69 and 69B of the IT Act empower the government to intercept and monitor any data on the Internet. The 	Telegraph Act also permits wiretapping of telephony.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; The proposed Central Monitoring System by the Central 	Government would give state agencies centralized access to all telecommunications in real time, on telephony or on the Internet. Other surveillance schemes include the Keyword Tracking system NETRA, as well as several state government proposed comprehensive CCTV-surveillance schemes for cities.	&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; Clearly, therefore, there is a massive market for surveillance technologies in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Tracking the Surveillance Market&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Mass surveillance industry by its very nature is closed, secretive and without democratic oversight, Insights into the prevalence, nature and scope of 	the companies that form this industry, or the technologies that are utilized are far and few. No democratic debate about surveillance can take place in 	such a paradigm. In this context, security expos and exhibitions provide critical insight into this industry. Several of the important revelations about 	the industry in the past have been from examinations of large exhibitions in which the various governmental and industry actors participate, and therefore, 	such analysis is critical to the debate surrounding mass surveillance. Such exhibitions are a logical starting point because they are one of the few 	publically accessible showcases of surveillance-ware, and are also a congregation of most major players who are part of this market both as suppliers and 	purchasers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our research identified at least 13 exhibitions in India that specifically cater to the surveillance industry. A brief outline of each of these exhibitions 	is provided below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Secutech India (Brochures: &lt;/b&gt; 2015 -&lt;a href="http://www.secutechindia.co.in/pdf/secutech%20brochure.pdf"&gt;http://www.secutechindia.co.in/pdf/secutech%20brochure.pdf&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Secutech Expo is an exhibition held in Bombay and Delhi since 2011, to showcase Information Security, Electronic Security and Homeland Security 	technologies. Secutech also organizes the Global Digital Surveillance Forum, a conference amongst the stakeholders of digital surveillance industry in 	India.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Ivis; Matrix Comsec; Neoteric; Smartlink; Kanoe; Micro Technologies; Aditya Infrotech; CoreTech Solutions; Merit Lilin; Schneider Electric; 	Pash systems; Nettrack Technologies Pvt Ltd.; QNAP; Axxonsoft; Hk Vision (China); Alhua; Axis; Vivotech (Taiwan); Endroid (USA); Vantge (UK); Pelco 	(France); Advik; Hi Focus (UK); ESMS; Keeper (China); Neoteric; Vizor, etc&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: The visitor profile and target audience consists of government and defense agencies, besides private agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: Digital surveillance, biometrics, CCTV and RFID are some categories of the technologies which are showcased here.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;IFSEC India (Brochures: &lt;/b&gt; 2013 -	&lt;a href="http://www.ifsecindia.com/uploads/IFSEC%20INDIA%20brochure%202013.pdf"&gt;http://www.ifsecindia.com/uploads/IFSEC%20INDIA%20brochure%202013.pdf&lt;/a&gt;; 	2014 - http://www.ubmindia.in/ifsec_india/uploads/IFSEC_INDIA_Brochure_CS5_new_low.pdf.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IFSEC India, an extension of IFSEC UK, the 'worlds largest security exhibition', proclaims to be South Asia's largest security exhibition with 15,000 	participants in its latest edition, including a special segment on surveillance. It has been held in either Bombay or Delhi since 2007.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Honeywell; Infinova; Radar Vision; QNAP; Ensign; Winposee; Bosch; Comguard; Verint; ACSG; Ensign etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include government agencies such as the Central Industrial Security Force, Border Security Force, Department of Internal Security, 	Railway Protection Force and the Department of Border Management.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: RFID, Video Surveillance, Surveillance Drones, IP Surveillance, Digital Surveillance and Monitoring were some of the categories of 	technologies on display.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;India International Security Expo (Brochures: &lt;/b&gt; 2014 - http://www.indiasecurityexpo.com/images/e_brochure.pdf)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Held in New Delhi since 1996, and organized by the Ministry of Home Affairs, the expo is described as "India's largest show case of goods and services 	related to Homeland Security, Fire Safety, Traffic Management, Industrial Safety and Public Safety, Hospitality and Reality Security." With specific 	reference to the changing 'modus operandi of crime by using technology', the Expo focuses on using surveillance technologies for law enforcement purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Intellivision (USA); Intex (India); ESC Baz (Israel); Sparsh Securitech; Source Security (USA); Intellivision (USA); Interchain Solutions; 	ESSI; Kritikal; Matrix; Pace Solutions etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: According to the show's brochure, visitors include Central &amp;amp; State Police Organisations, Paramilitary Forces, Policy-makers from the 	Government, Industrial Establishments, Security Departments of Educational, Retail, Hospitality, Realty &amp;amp; other sectors, Colonisers, Builders, RWAs, 	System Integrators Large business houses and PSU's.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: Access control systems, surveillance devices, RFID, traffic surveillance and GPS Tracking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Secure Cities Expo (Brochures: &lt;/b&gt; 2013 - &lt;a href="http://securecitiesindia.com/Secure_Cities_2013_Brochure.pdf"&gt;http://securecitiesindia.com/Secure_Cities_2013_Brochure.pdf&lt;/a&gt;; 2014 - 	http://securecitiesindia.com/images/2014/SC_2014_Brochure.pdf.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secure Cities Expo has been organized since 2008, on the platform of providing homeland security solutions and technologies to government and private 	sector participants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Dell; Palo Alto Networks; Motorola; Konnet; Vian Technologies; Quick Heal; Intergraph, GMR, Tac Technologies, Steria, Teleste, Elcom, Indian 	Eye Security; Mirasys; CBC Group; Verint (USA); IBM (USA); Digitals; EyeWatch; Kanoe; NEC (Japan); ACSG Corporate; ESRI (USA), etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include government and law enforcement agencies including the Ministry of Home Affairs as well as systems integrators and private firms 	including telecom firms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: CCTV, Biometrics, Covert Tracking and Surveillance Software, Communication Interception, Location and Tracking systems, and IT 	Security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Defexpo India (Brochures: No publically available brochures)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By far India's largest security exposition, the Ministry of Defense has organized Defexpo India since 1999, showcasing defense, border, and homeland 	security systems from technology providers internationally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Aurora Integrated; Airbus Defence (France); Boeing (USA); Hacking Team (Italy); Kommlabs (Germany); Smoothwall; Atlas Electronik; Cyint; 	Audiotel International; Cobham; Tas-Agt; Verint; Elsira (Elbit) (Israel); IdeaForge; Comint; Controp; Northrop Gruman; Raytheon; C-DoT; HGH Infrared 	(Israel); Okham Solutions (France); Septier (Israel); Speech Technology Centre (Russia); Aerovironment (USA); Textron; Sagem (France); Amesys (France); 	Exelis; ITP Novex (Israel), etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: The latest edition of the Expo saw participation from governmental delegations from 58 countries, besides Indian governmental and law enforcement 	authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: The entire spectrum of surveillance and homeland security devices is on display at Defexpo, from Infrared Video to Mass Data 	Interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Convergence India Expo (Brochures: &lt;/b&gt; 2012 - &lt;a href="http://convergenceindia.org/download/CI2012-PSR.pdf"&gt;http://convergenceindia.org/download/CI2012-PSR.pdf&lt;/a&gt;; 2014 -&lt;a href="http://www.convergenceindia.org/pdf/CI-2014-Brochure.pdf"&gt;http://www.convergenceindia.org/pdf/CI-2014-Brochure.pdf&lt;/a&gt;; 2015 -	&lt;a href="http://www.convergenceindia.org/pdf/brochure-2015.pdf"&gt;http://www.convergenceindia.org/pdf/brochure-2015.pdf&lt;/a&gt;.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Convergence India, being held in New Delhi since 1991, is a platform for interaction between Information and Communication Technology providers and 	purchasers in the market. In recent years, the expo has catered to the niche market for IT surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: ELT (UK); Comguard; Fastech; Synway (China); Saltriver; Anritsu (Japan); Cdot; Fastech; Rahul Commerce; Deviser Electronics; RVG Diginet; Blue 	Coat (USA); Cyberoam (USA); ZTE (China); Net Optics (USA); Controp; Comint etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include Paramilitary Forces, Cable Operators, Government Ministries and PSU's and Telecom and Internet Service Providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on Display: Biometrics, Content Filtering, Data Mining, Digital Forensics, IP-Surveillance, Embedded Softwares, Network Surveillance and 	Satellite Monitoring were some of the technologies on display.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;International Police Expo (Brochures: &lt;/b&gt; 2014 - http://www.nexgengroup.in/exhibition/internationalpoliceexpo/download/International_Police_Expo_2014.pdf.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The International Police Expo held in New Delhi focuses on providing technologies to police forces across India, with specific focus on IT security and 	communications security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: 3G Wireless Communications Pvt Ltd; Motorola Solutions; Cyint; Matrix Comsec; Cellebrite; Hayagriva; MKU; CP Plus etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include State Police, Procurement Department, CISF, CRPF, RAF, BSF, Customs, GRPF, NDRF, Special Frontier Force, Para Commandos, Special 	Action Group, COBRA and PSU's and educational institutes, stadiums and municipal corporations, among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: Technologies include RFID and surveillance for Internal Security and Policing, CCTV and Monitoring, Vehicle Identification 	Systems, GPS, Surveillance for communications and IT, Biometrics and Network surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. &lt;/b&gt; &lt;b&gt;Electronics For You Expo (EFY Expo) (&lt;/b&gt; 2014 -	&lt;a href="http://2013.efyexpo.com/wp-content/uploads/2014/03/efy_PDFisation.pdf"&gt;http://2013.efyexpo.com/wp-content/uploads/2014/03/efy_PDFisation.pdf&lt;/a&gt;; 	2015 - http://india.efyexpo.com//wp-content/uploads/2014/03/5th%20EFY%20Expo%20India_Brochure.pdf.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;EFY Expo is a electronics expo which showcases technologies across the spectrum of electronics industry. It has been held since 2010, in New Delhi, and is 	partnered by the Ministry of Communications and IT and the Ministry of Electronics and IT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Vantage Security; A2z Securetronix; Avancar Security; Digitals security; Securizen Systems; Vision Security; Mangal Security Systems, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: The visitors include Government Agencies and ministries as well as systems integrators and telecom and IT providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: Identification and Tracking Products and Digital Security Systems are a specific category of the technologies on display.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9. &lt;/b&gt; &lt;b&gt;Indesec Expo (Brochures: &lt;/b&gt; 2009 - http://www.ontaero.org/Storage/14/897_INDESEC_Oct11-13_2009.pdf. &lt;b&gt;)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An exhibition focused on homeland security, and sponsored by the Ministry of Home Affairs, the expo has been held since 2008 in New Delhi, which includes a 	specific category for cyber security and counter terrorism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Rohde and Schwarz; Salvation Data; AxxonSoft; KritiKal; Shyam Networks; Teledyne Dalsa; Honeywell; General Dynamics; Northrop Grumman; 	Interchain Solutions, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include officials of the central government, central police and paramilitary forces, Ministry of Defence, central government 	departments, institutes and colleges, state government and police and ports and shipping companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10. &lt;/b&gt; &lt;b&gt;Next Generation Cyber Threats Expo &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Held since 2012 in New Delhi and Mumbai, the Next Generation Cyber Threats Expo focuses on securing cyber infrastructure and networks in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Ixia, CheckPoint, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include Strategic Planning Specialists, Policy Makers and Law Enforcement among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11. &lt;/b&gt; &lt;b&gt;SmartCards/RFID/e-Security/Biometrics expo (Brochures: &lt;/b&gt; 2013 - 	&lt;a href="http://cis-india.org/internet-governance/blog/brochures-from-expos-in-india-2013"&gt; http://cis-india.org/internet-governance/blog/brochures-from-expos-in-india-2013 &lt;/a&gt; ; 2015 -	&lt;a href="http://www.smartcardsexpo.com/pdf/SmartCards_Expo_2015_Brochure_$.pdf"&gt;http://www.smartcardsexpo.com/pdf/SmartCards_Expo_2015_Brochure_$.pdf&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These expos are organized by Electronics Today in Delhi or Mumbai since 1999 and supported by the Ministries of Commerce, Home Affairs and External 	Affairs. They showcase various identification solutions, attended by hundreds of domestic and international exhibitors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Target audiences include central and local level law enforcement and government organizations, Colleges and Universities, and defense forces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12. &lt;/b&gt; &lt;b&gt;Com-IT Expo (Brochure: &lt;/b&gt; 2014 - http://www.comitexpo.in/doc/Brochure.pdf)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This expo has been organized by the Trade Association of Information and Technology in Mumbai since 2008, and focuses on software and hardware Information 	Technology, with specific focus on IT security and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include Government Agencies, Airport Authorities, Police and Law Enforcement, Urban Planners, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies Displayed: CCTV's, Surveillance Devices and IP Cameras, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13. &lt;/b&gt; &lt;b&gt;GeoIntelligence India (Brochures: &lt;/b&gt; 2013 - http://www.geointelligenceindia.org/2013/Geointelligence%20India%20Brochure.pdf; 2014 - http://geointworld.net/Documents/GeoInt_Brochure_2014.pdf.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is an exposition held in New Delhi since 2014, organized by Geospatial Media and Communications Pvt Ltd, and is 'dedicated to showcasing the highest 	levels of information exchange and networking within the Asian defense and security sector.'&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: ESRI (USA); BAE Systems (UK); Leica (Switzerland); Helyx (UK); Digital Globe; Intergraph; Trimble (USA); RSI Softech; Silent Falcon etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors included the Director General of Information Systems, CRPF, Manipur, Delhi, Haryana and Nagaland Police, CBI, ITBP, NSDI, SSB, National 	Investigation Agency, Signals Intelligence Directorate among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Surveillance Wares in India - The Surveillance Exhibits and what they tell us about the Indian Surveillance Industry&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An analysis of the above companies and their wares give us some insight into what is being bought and sold in the surveillance industry, and by whom. 	Broadly, the surveillance technologies can be grouped in the following categories:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Video Surveillance and Analysis&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IP Video Surveillance and CCTV are quickly becoming the norm in public spaces. Emerging video surveillance tools allow for greater networking of cameras, 	greater fields of vision, cheaper access and come with a host of tools such as facial recognition and tracking as well as vehicle tracking. For example, 	IBM has developed an IP Video Analytics system which couples monitoring with facial recognition.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; USA's Intellivision also offers analytics systems which enable licence plate tracking, facial recognition and object recognition.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; HGH Infrared's &lt;i&gt;Spynel &lt;/i&gt;system allows infrared wide-area surveillance,&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; and CBC's GANZ allows long-range, hi-resolution surveillance.	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Video surveillance is gradually infiltrating public spaces in most major cities, with Governments promoting large-scale video surveillance schemes for 	security, with no legal sanctions or safeguards for protecting privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Video Surveillance: 3G Wireless Communications Pvt Ltd, Motorola Solutions (USA), Bosch, CP Plus, Ivis, Aditya Infotech, Micro 	technologies, Core Tech (Denmark), Merit Lilin , Schneider Electric, Shyam Systems, Dalsa, Honeywell, Teleste, Mirasys, CBC Group, Infinova, Radar Vision, 	QNAP, Ensign, Winposee, Bosch, Hik Vision (China), Alhua, Axis Communications, Vivotech (Taiwan), Endroid (USA), Vantge (UK), Pelco (France), Advik, Hi 	Focus (UK), ESMS, Keeper (China), Neoteric, Vizor, Verint (USA), IBM (USA), Digitals Security, Intellivision (USA), Intex, Esc Baz (Israel), Sparsh 	Securitech, A2zsecuretronix, Avancar Security, Securizen Systems, Vision Security, HGH Infrared (Israel).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;RFID/Smart Cards/Biometric Identification&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has begun the implementation of the Unique Identification Programme for its 1.2 billion strong population, combining a host of identification 	technologies to provide a unique identification number and Aadhar Card - promoted as an all-purpose ID. However, this remains without legislative sanction, 	and continues in the face of severe privacy concerns. Such centralized, accessible databases of ostensibly private information present a grave threat to 	privacy. RFID, Smart Cards and Biometric Identification technologies (like the Aadhar) all make individual monitoring and surveillance significantly easier 	by enabling tracking of individual movements, consumer habits, attendance, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Identification Technologies:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;AxxonSoft, Matrix Comsec, Ensign, Hi focus, Intellivision (USA), Interchain solutions, Inttelix, Kanoe, NEC (Japan), Pace, Realtime, Secugen, Source 	Security (USA), Spectra, Speech technology centre (Russia), BioEnable Technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(For a more detailed list, see the Smart Cards Expo Brochures, linked above)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mass Data Gathering, Monitoring and Analysis &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The age of Big Data has led to big surveillance. Information and communication technologies now host significant amounts of individual data, and the 	surveillance industry makes all of this data accessible to a surveyor. Government mandated surveillance means any and all forms of communication and data 	monitoring are being implemented in India - there are network taps on telephony and deep packet inspection on internet lines, which makes telephone calls, 	SMS, VoIP, Internet searches and browsing and email all vulnerable to surveillance, constantly monitored through systems like the Central Monitoring 	System. Moreover, centralized information stores enable data mining - extracting and extrapolating data to enable better surveillance, which is what 	India's NATGRID aims to do.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hacking Team Italy, Blue Coat USA and Amesys France, three of the five companies identified as 'enemies of the internet' for enabling dictatorships to use 	surveillance to quell dissent and violate human rights,&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; have all presented surveillance solutions at 	Defexpo India. Cyberoam USA and ZTE China also market Deep Packet Inspection technology,&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; while ESRI's Big Data suite allows analysis through mass surveillance and analysis of social media and publically available sources.	&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian companies showcasing mass data monitoring technologies include Cyint, Fastech DPI tools,&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; Kommlabs VerbaProbe packet switching probes,&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; and ACSG's OSINT, which allows Big Data social media 	surveillance and Call Data Record analysis.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Data Gathering and Monitoring technologies:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cobham, Comguard, Cyint, ELT (UK), Fastech, Hacking Team (Italy), Smoothwall (USA), Verint Systems (USA), Cyint technologies, Atlas Electronik (Germany), 	Audiotel International (UK), Avancar, Cobham (UK), ELT (UK), Eyewatch, Kommlabs, Mangal Security Systems, Merit Lilin (Taiwan), Ockham Solutions (France), 	Septier (Israel), Synway (China), ACSG Corporate, Amesys (France), Anritsu (Japan), Axis (Sweden), BAE Systems (UK), Blue Coat (USA), C-dot, Comint, 	Cyberoam (USA), Deviser Electronics, Elsira (Elbit) (Israel), Esri (USA), Exelis, General Dynamics (USA), Helyx (UK), ITP Novex (Israel), Leica 	(Switzerland), Net Optics (Ixia) (USA), Northrop Gruman (USA), Rahul Commerce, Rohde And Schwarz (Germany), RVG Diginet, Tas-Agt, Trueposition (USA), Zte 	Technologies (China).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cell-Phone Location Tracking and Vehicle Monitoring&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A number of technologies enable location tracking through vehicle GPS, GLONASS or other location technologies. RFID or optical character recognition 	further enables Automatic Number Plate Recognition, which can be exploited to enable vehicle surveillance to track individual movements. Embedded hardware 	and software on mobile phones also allows constant transmission of location data, which is exploited by surveillance agencies to track individual movements 	and location.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Cell-Phone Location Tracking technologies: Verint, Eyewatch, Septier (Israel), True Position (USA),&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Vehicle Monitoring technologies: Hi-techpoint technologies pvt ltd, Axxonsoft, Essi, Fareye, Intellivision (USA), Interchain 	Solutions, ITP Novex (Israel), Kaneo, Kritikal, NEC (Japan), Saltriver Infosystems, Vision Security Systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Air/Ground Drones and Satellite Surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of unmanned drones for security purposes is being adopted for law enforcement and surveillance purposes across the world, and India is no 	exception, using UAV's for surveillance in insurgency-hit areas,&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; amongst other uses, while still having 	no regulations for their use.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; Drones, both aerial and ground level, are capable of large-scale 	territorial surveillance, often equipped with high-technology video surveillance that allows for efficient monitoring at the ground level.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Digital Globe offers satellite reconnaissance surveillance coupled with Big Data analysis for predictive monitoring.	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; Controp offers cameras specifically for aerial surveillance, while Sagem's Patroller Drone and Sperwer, and Silent Falcon's Solar Powered surveillance drone are Unmanned Aerial Vehicles (UAV's) for aerial video surveillance. Auruora Integrated,	&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; and IdeaForge are Indian companies which have developed UAV surveillance drones in collaboration with 	Indian agencies.&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Drone Surveillance: Aurora Integrated, Controp (Israel), Aerovironment (USA), Digital Globe (USA), ESRI (USA), Intergraph (USA), RSI 	Softech, Sagem (France), Silent Falcon (UAS), Textron (USA), Trimble (USA), Northrop Grumman (USA).&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Wikileaks, The Spy Files, &lt;i&gt;available at &lt;/i&gt;https://www.wikileaks.org/the-spyfiles.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Lawrence Lessig, &lt;i&gt;Code V 2.0.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; For more information on the licensing regime, see&lt;i&gt; 'Data Retention in India', available at &lt;/i&gt; http://cis-india.org/internet-governance/blog/data-retention-in-india.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Rule 13, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Section 5, Indian Telegraph Act, 1885.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; &lt;i&gt;See, for example, &lt;/i&gt; the Bangalore Traffic Police CCTV Scheme, 			&lt;a href="http://www.bangaloretrafficpolice.gov.in/index.php?option=com_content&amp;amp;view=article&amp;amp;id=66&amp;amp;btp=66"&gt; http://www.bangaloretrafficpolice.gov.in/index.php?option=com_content&amp;amp;view=article&amp;amp;id=66&amp;amp;btp=66 &lt;/a&gt; ; the surveillance scheme supported by the MPLAD Scheme,			&lt;a href="http://mplads.nic.in/circular08112012.pdf"&gt;http://mplads.nic.in/circular08112012.pdf&lt;/a&gt;; Mumbai's proposed video surveillance scheme, 			http://www.business-standard.com/article/companies/wipro-tata-ibm-reliance-among-31-bids-for-cctv-scheme-in-mumbai-112112600160_1.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Information on the Forum is available at http://gdsf-india.com/Global-Digital-Surveillance-Forum1/images/GDSF-Bengaluru-Conference-program.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; http://www-01.ibm.com/support/knowledgecenter/SS88XH_1.6.0/iva/int_i2frs_intro.dita&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; http://www.intelli-vision.com/products/recognition-suite&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; http://www.hgh-infrared.com/Products/Optronics-for-security&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; http://www.ifsecglobal.com/cbc-high-end-surveillance-tech-on-display-at-ifsec-india/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; http://surveillance.rsf.org/en/category/corporate-enemies/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; http://www.cyberoam.com/firewall.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; http://www.esri.com/products/arcgis-capabilities/big-data&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; http://www.fastech-india.com/packetBrokers.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; http://www.kommlabs.com/products-verbaprobe.asp&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; http://www.acsgcorporate.com/osint-software.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; http://timesofindia.indiatimes.com/india/UAV-proves-ineffective-in-anti-Maoist-operations/articleshow/20400544.cms&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; http://dronecenter.bard.edu/drones-in-india/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; https://www.digitalglobe.com/products/analytic-services&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; http://www.aurora-is.com/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; http://www.ideaforge.co.in/home/&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos'&gt;https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-03-08T12:25:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/preliminary-submission-on-internet-governance-issues-to-assocham">
    <title>Preliminary Submission on "Internet Governance Issues" to the Associated Chambers of Commerce &amp; Industry of India </title>
    <link>https://cis-india.org/internet-governance/blog/preliminary-submission-on-internet-governance-issues-to-assocham</link>
    <description>
        &lt;b&gt;On January 30, 2015, Associated Chambers of Commerce &amp; Industry of India (ASSOCHAM) held a consultation on Internet governance. A committee was set up to draft a report on Internet governance, with a focus on issues relevant to India. The Centre for Internet and Society (CIS) is represented on the committee, and has provided its preliminary comments to ASSOCHAM.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;ASSOCHAM convened a meeting of its members and other stakeholders, at which CIS was represented. At this meeting, inputs were sought on Internet governance issues relevant for India, on which the industry body proposed to make comments to the Ministry of External Affairs, Government of India. Such a discussion, proposing to consolidate the views of ASSOCHAM members in consultation with other stakeholders, is a commendable move. This submission presents preliminary comments from the Centre for Internet and Society (CIS) in light of ASSOCHAM's consultation on Internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I. &lt;/b&gt; &lt;b&gt;&lt;span&gt;About CIS&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; CIS is a non-profit research organization that works, &lt;i&gt;inter alia&lt;/i&gt;, on issues relating to privacy, freedom of expression, intermediary liability and 	internet governance, access to knowledge, open data and open standards, intellectual property law, accessibility for persons with disabilities, and engages 	in academic research on the budding Indian disciplines of digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; CIS engages in international and domestic forums for Internet governance. We are a Sector-D member of the International Telecommunications Union (ITU),&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; and participated in the World Conference on International Telecommunications (WCIT), 2012 (Dubai)	&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; and the Plenipotentiary Conference, 2014 (Busan).&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; We 	have also participated in the WSIS+10 Multistakeholder Preparatory Platform (MPP)&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; and the WSIS+10 High 	Level Event, organized by the ITU.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; CIS is also a member of the Non-Commercial Users Constituency (NCUC) at ICANN. Pranesh Prakash, our Policy Director, held a position on the NCUC Executive 	Committee from December 2013 to November 2014.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; CIS has been engaging at the Internet Governance Forum (IGF) since 2008, and has organized and participated in over 60 panels to date.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; We have also organized panels at the Asia-Pacific Regional IGF (APrIGF).	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; Our Executive Director Sunil Abraham is a member of the Multistakeholder Advisory Group (MAG) for the 	India-IGF, and has attended in its meetings.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; We are also in the process of developing international principles for intermediary liability, in collaboration with international civil society organisations like EFF and Article19.	&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II. &lt;/b&gt; &lt;b&gt;&lt;span&gt;Structure of Submission&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; In this submission, we identify issues in Internet governance where engagement from and within India is necessary. In particular, brief descriptions of 	issues such as freedom of expression and privacy online, cyber-security, critical Internet resources and ICANN, multistakeholderism and net neutrality are 	provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III. &lt;/b&gt; &lt;b&gt;&lt;span&gt;Internet Governance Issues&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; The history of the Internet is unique, in that it is not exclusively government-regulated. Though governments regulate the Internet in many ways (for 	instance, by ordering website blocking or filtering, licensing of ISPs, encryption controls, investment caps, etc.), the running of the Internet is largely 	in the hands of private businesses, technical organisations and end-users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; International processes like the World Summit on Information Society (WSIS), and forums such as ICANN, the ITU, the IGF and the UN are involved in 	governing in the Internet in many ways. Regional organisations like the OECD, APEC and the Shanghai Cooperation Organisation (SCO) are also involved (for 	instance, in cyber-security matters).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. &lt;/b&gt; The issues surrounding Internet governance are many, and range from telecom infrastructure and technical coordination to human rights and access to 	information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;&lt;span&gt;Rights Online&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9. &lt;/b&gt; The status of 'human rights online' has come under discussion, with the	&lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;NETmundial Outcome Document&lt;/a&gt; affirming that offline 	rights must also be protected online. These issues are important in the context of, among others, the large scale violations of privacy in light of the 	Snowden Revelations,&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; and increased instances of website blocking and takedowns in different parts of 	the world.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10. &lt;/b&gt; Internationally, issues of freedom of speech, privacy and access or the digital divide (though it is debatable that the latter is a human right) are discussed at the UN Human Rights Council, such as the	&lt;a href="http://geneva.usmission.gov/2012/07/05/internet-resolution/"&gt;resolution on human rights and the Internet&lt;/a&gt;, and the UN Human Rights Commissioner's	&lt;a href="http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf"&gt;report on the right to privacy in the digital age&lt;/a&gt; , which discusses the need for checks and balances on digital mass surveillance. During the Universal Periodic Review of India in 2012, India noted a 	&lt;a href="http://www.upr-info.org/database/index.php?limit=0&amp;amp;f_SUR=77&amp;amp;f_SMR=All&amp;amp;order=&amp;amp;orderDir=ASC&amp;amp;orderP=true&amp;amp;f_Issue=All&amp;amp;searchReco=&amp;amp;resultMax=100&amp;amp;response=&amp;amp;action_type=&amp;amp;session=&amp;amp;SuRRgrp=&amp;amp;SuROrg=&amp;amp;SMRRgrp=&amp;amp;SMROrg=&amp;amp;pledges=RecoOnly"&gt; recommendation from Sweden &lt;/a&gt; to " 	&lt;i&gt; ensure that measures limiting freedom of expression on the internet is based on clearly defined criteria in accordance with international human rights 		standard &lt;/i&gt; ".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11. &lt;/b&gt; Freedom of speech and privacy are also relevant for discussion at the ITU.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; For instance, at the Plenipotentiary meeting in 2014 (Busan), India proposed a resolution that sought, among other things, complete traceability of all Internet communications.	&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; This has implications for privacy that are not yet addressed by our domestic laws. A Privacy Bill and 	such other protections are only in the pipeline in India.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12. &lt;/b&gt; At ICANN as well, the &lt;a href="http://en.wikipedia.org/wiki/DNS_root_zone"&gt;root zone management&lt;/a&gt; function may affect freedom of expression. If, for 	instance, a top level domain (TLD) such as &lt;b&gt;.com &lt;/b&gt;is erased from the root zone file, hundreds of thousands of websites and their content can 	be wiped from the World Wide Web. A TLD can be erased by Verisign if a request to that effect is raised or accepted by ICANN, and signed off on by the National Telecommunications and Information Administration (NTIA) of the US government. Similarly,&lt;a href="http://whois.icann.org/en/about-whois"&gt;the WHOIS database&lt;/a&gt;, which contains information about the holders of domain names and IP addresses, has	&lt;a href="http://en.wikipedia.org/wiki/Domain_privacy"&gt;implications for privacy and anonymity&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13. &lt;/b&gt; In India, the judiciary is currently adjudicating the constitutionality of several provisions of the Information Technology Act, 2000 (as amended in 2008), 	including S. 66A, S. 69A and S. 79. A series of writ petitions filed, among others, by the Internet Service Providers Association of India (ISPAI) and Mouthshut.com, relate to the constitutionality of the nature of content controls on the Internet, as well as intermediary liability.	&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14. &lt;/b&gt; A judgment on the constitutionality of Ss. 66A, 69A and 79 are crucial for end-users and citizens, as well as companies in the Internet ecosystem. For 	instance, an uncertain intermediary liability regime with penalties for intermediaries - S. 79, IT Act and Intermediaries Guidelines Rules, 2011 - disincentivises ISPs, online news websites and other content providers like Blogger, Youtube, etc. from allowing free speech to flourish online.	&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; The ongoing cases of &lt;i&gt;Kamlesh Vaswani &lt;/i&gt;v. &lt;i&gt;UOI &lt;/i&gt;and &lt;i&gt;Sabu George &lt;/i&gt;v. &lt;i&gt;UOI&lt;/i&gt; also have consequences for ISPs and search engines, as well as for fundamental rights.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; International and domestic engagement is desirable, including in consultations with the Law Commission of India (for instance, the	&lt;a href="http://www.lawcommissionofindia.nic.in/views/Consultation%20paper%20on%20media%20law.doc"&gt;consultation on media laws&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;&lt;span&gt;Critical Internet Resources&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;15. &lt;/b&gt; Critical Internet Resources form the backbone of the Internet, and include management of IP addresses, the domain name system (DNS) and the root zone.	&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; ICANN, a global non-profit entity incorporated in California, manages the IANA functions (Internet 	Assigned Numbers Authority) for the global Internet. These functions include allocating the global pool of IP addresses (IPv4 and IPv6) to Regional 	Internet Registries (RIRs), administering the domain name system and maintaining a protocol registry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;16. &lt;/b&gt; At present, the IANA functions are performed under a &lt;a href="http://www.ntia.doc.gov/page/iana-functions-purchase-order"&gt;contract with the NTIA&lt;/a&gt;. On March 14, 2014, the	&lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;NTIA announced&lt;/a&gt; its intention 	to transition oversight of the IANA functions to an as-yet-undetermined "global multi-stakeholder body". The deadline for this transition is September 30, 2015, though the NTIA has	&lt;a href="http://www.ntia.doc.gov/speechtestimony/2015/remarks-assistant-secretary-strickling-state-net-conference-1272015"&gt;expressed its willingness&lt;/a&gt; to renew the IANA contract and extend the deadline. ICANN was charged with convening the transition process, and set up the	&lt;a href="https://www.icann.org/stewardship/coordination-group"&gt;IANA Coordination Group&lt;/a&gt; (ICG), a team of 30 individuals who will consolidate community input to create a transition proposal. At the moment, the&lt;a href="https://www.icann.org/en/system/files/files/cwg-naming-transition-01dec14-en.pdf"&gt;names (CWG-Names)&lt;/a&gt;,&lt;a href="https://www.nro.net/wp-content/uploads/ICG-RFP-Number-Resource-Proposal.pdf"&gt;numbers (CRISP)&lt;/a&gt; and	&lt;a href="http://datatracker.ietf.org/doc/draft-ietf-ianaplan-icg-response/"&gt;protocols (IETF)&lt;/a&gt; communities are debating existing draft proposals. A 	number of new entities with which ICANN will have contractual arrangements have been proposed. At ICANN's meetings in Singapore (February 7-12, 2015) and 	Buenos Aires (June 2015), these proposals will be discussed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;17. &lt;/b&gt; At the same time, a parallel track to examine ICANN's own transparency and accountability has been introduced. The	&lt;a href="https://community.icann.org/display/acctcrosscomm/CCWG+on+Enhancing+ICANN+Accountability"&gt;CCWG-Accountability&lt;/a&gt; is considering ICANN's 	accountability in two Workstreams: first, in light of the IANA transition and second, a revision of ICANN's policies and by-laws to strengthen 	accountability. ICANN's accountability and transparency are crucial to its continued role in Internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;18. &lt;/b&gt; Several issues arise here: Should ICANN continue to remain in the US? Should the IANA Functions Department be moved into a separate entity from ICANN? 	Ought ICANN's by-laws be amended to create oversight over the Board of Directors, which is now seen to have consolidated power? Ought ICANN be more 	transparent in its financial and operational matters, proactively and reactively?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;19. &lt;/b&gt; It is, for instance, beneficial to the stability of the Internet and to India if the IANA department is separate from ICANN - this will ensure a&lt;a href="https://cis-india.org/internet-governance/blog/cis-india.org/internet-governance/blog/icann-accountability-iana-transition-and-open-questions"&gt;separation of powers&lt;/a&gt;. Second,	&lt;a href="http://cis-india.org/internet-governance/blog/cis-comments-enhancing-icann-accountability"&gt;stronger transparency and accountability mechanisms&lt;/a&gt; are necessary for ICANN; it is a growing corporate entity performing a globally Internet function. As such,	&lt;a href="http://cis-india.org/internet-governance/blog/cis-receives-information-on-icanns-revenues-from-domain-names-fy-2014"&gt;granular information&lt;/a&gt; about ICANN's revenues and expenses should be made public. See, for ex.,&lt;a href="https://www.icann.org/en/system/files/files/cis-request-18dec14-en.pdf"&gt;CIS' request&lt;/a&gt; for ICANN's expenses for travel and meetings, and	&lt;a href="https://www.icann.org/en/system/files/files/cis-response-17jan15-en.pdf"&gt;ICANN's response&lt;/a&gt; to the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;20. &lt;/b&gt; The most ideal forum to engage in this is ICANN, and within India, working groups on Internet governance at the Ministry level. As such, ASSOCHAM may seek 	open, transparent and inclusive consultations with the relevant departments of the Government (the Ministry of External Affairs, DeitY, Department of 	Telecommunications). At ICANN, industry bodies can find representation in the Business Constituency or the Commercial Stakeholders Group. Additionally, 	comments and proposals can be made to the ICG and the CCWG-Accountability by anyone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;&lt;span&gt;Cyber-security &lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;21. &lt;/b&gt; Cyber-security is often used as an umbrella-term, covering issues ranging from network security (DNSSEC and the ICANN domain), cyber-crime, and 	cyber-incidents such as the 	&lt;a href="http://timesofindia.indiatimes.com/tech/it-services/How-to-fight-cyber-war-Estonia-shows-the-way/articleshow/24274994.cms"&gt; Distributed Denial of Service attacks &lt;/a&gt; on Estonian public institutions and the &lt;a href="http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet"&gt;Stuxnet virus&lt;/a&gt; that attacked Iran's nuclear programme. Within the ITU, spam and child safety online are also assessed as security issues (See	&lt;a href="http://www.itu.int/en/ITU-T/about/groups/Pages/sg17.aspx"&gt;Study Group 17 under ITU-T&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;22. &lt;/b&gt; At the international level, the UN Group of Governmental Experts has	&lt;a href="http://www.un.org/disarmament/topics/informationsecurity/"&gt;published three reports&lt;/a&gt; to date, arguing also that in cyber-security incidents, 	international humanitarian law will apply. International humanitarian law applies during armed attacks on states, when special rules apply to the treatment 	of civilians, civilian and military buildings, hospitals, wounded soldiers, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;23. &lt;/b&gt; The ITU also launched a &lt;a href="http://www.itu.int/en/action/cybersecurity/Pages/gca.aspx"&gt;Global Cybersecurity Agenda&lt;/a&gt; in 2007, aiming at international cooperation. Such cooperative methods are also being employed at the OSCE, APEC and the SCO, which have developed drafts of	&lt;a href="http://www.osce.org/pc/109168?download=true"&gt;Confidence Building Measures&lt;/a&gt;. The Global Conferences on Cyberspace (London 2011, Budapest 2012, Seoul 2013, The Hague 2015) resulted in, &lt;i&gt;inter alia&lt;/i&gt;, the	&lt;a href="http://conventions.coe.int/Treaty/EN/Treaties/Html/185.htm"&gt;Budapest Convention on Cybercrime&lt;/a&gt;. India has not ratified the Convention, and 	remains tight-lipped about its security concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;24. &lt;/b&gt; Surveillance and monitoring of online communications is a crucial issue in this regard. In India, the surveillance power finds its source in S. 5, Telegraph Act, 1888, and the	&lt;a href="http://cis-india.org/internet-governance/resources/rule-419-a-indian-telegraph-rules-1951"&gt;Rule 419A of the Telegraph Rules, 1951&lt;/a&gt;. Further, S. 	69 of the Information Technology Act, 2000 and the 	&lt;a href="http://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009"&gt; Interception Rules, 2009 &lt;/a&gt; enable the government and authorized officers to intercept and monitor Internet traffic on certain grounds. Information regarding the implementation of 	these Rules is scant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;25. &lt;/b&gt; In any event, the applicability of targeted surveillance should be	&lt;a href="http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india"&gt;subject to judicial review&lt;/a&gt; , and a balance should be struck between fundamental rights such as freedom of speech and privacy and the needs of security. An	&lt;a href="http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability"&gt;accountability model&lt;/a&gt; such as that present in the UK for the Interception of Communications Commissioner may provide valuable insight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;26. &lt;/b&gt; In India, the government does not make public information regarding its policies in cyber-security and cybercrime. This would be welcome, as well as 	consultations with relevant stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;&lt;span&gt;Models of Internet Governance&lt;/span&gt;&lt;/i&gt;&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27. &lt;/b&gt; Multi-stakeholderism has emerged as one of the catchphrases in Internet governance. With the display of a multi-stakeholder model at NETmundial (April 	2014), controversies and opinions regarding the meaning, substance and benefits of multi-stakeholderism have deepened.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;28. &lt;/b&gt; The debates surrounding stakeholder-roles in Internet governance began with ¶49 of the Geneva Declaration of Principles and ¶35 of the	&lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt;, which delineated clear roles and responsibilities. It created a 	'contributory' multi-stakeholder model, where states held sovereign authority over public policy issues, while business and civil society were contributed 	to 'important roles' at the 'technical and economic fields' and the 'community level', respectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;29. &lt;/b&gt; As the WGEC meeting (April 30-May 2, 2014) demonstrated, there is as yet no consensus on stakeholder-roles. Certain governments remain strongly opposed to 	equal roles of other stakeholders, emphasizing their lack of accountability and responsibility. Civil society is similarly splintered, with a majority 	opposing the Tunis Agenda delineation of stakeholder-roles, while others remain dubious of permitting the private sector an equal footing in public 	policy-making.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;30. &lt;/b&gt; The positions in India are similarly divided. While there is appears to be high-level acceptance of "multi-stakeholder models" across industry, academia 	and civil society, there exists no clarity as to what this means. In simple terms, does a multi-stakeholder model mean that the government should consult industry, civil society, academia and the technical community? Or should decision-making power be split among stakeholders? In fact, the debate is	&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2354377"&gt;more specific&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;31. &lt;/b&gt; In India, the Multistakeholder Advisory Group (MAG) for the India-IGF was established in February 2014, and some meetings were held. Unfortunately, neither 	the minutes of the meetings nor action points (if any) are publicly available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;32. &lt;/b&gt; The Indian government's position is more complex. At the 68&lt;sup&gt;th&lt;/sup&gt; UN General Assembly session in 2011, India argued for a (multilateral) 50-member 	UN &lt;a href="http://cis-india.org/internet-governance/blog/india-statement-un-cirp"&gt;Committee on Internet-related Policies (CIRP)&lt;/a&gt;. However, the Ministry 	for Communications and Information Technology (MCIT) has, over the years, presented differing views at the IGF and ITU through its two departments: DeitY and DoT. Further, at the meetings of the Working Group on Enhanced Cooperation (WGEC), India has presented	&lt;a href="http://unctad.org/Sections/un_cstd/docs/WGEC_IndiaMission.pdf"&gt;more nuanced views&lt;/a&gt;, suggesting that certain issues remain within the 	governmental domain (such as cyber-security and child online protection). At the 9&lt;sup&gt;th&lt;/sup&gt; IGF (Istanbul, September 2014), Mr. R.S. Sharma of the 	DeitY &lt;a href="http://www.intgovforum.org/cms/174-igf-2014/transcripts/1977-2014-09-04-ms-evolution-of-the-ig-main-room"&gt;echoed such a view&lt;/a&gt; of 	delineated roles for stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;33. &lt;/b&gt; A clear message from the Indian government, on whether it favours multistakeholderism or governmental policy authority for specific issues, would be 	invaluable in shaping opinion and domestic processes. In any event, a transparent consultative procedure to take into account the views of all stakeholders 	is desirable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;&lt;span&gt;Emerging Issues&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;Net Neutrality&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;34. &lt;/b&gt; In simple terms, net neutrality concerns differential treatment of packets of data by carriers such as ISPs, etc. over networks. The issue has gained international attention following the U.S. FCC's regulatory stance, and the U.S. Court of Appeal's 2014 decision in	&lt;a href="http://www.cadc.uscourts.gov/internet/opinions.nsf/3AF8B4D938CDEEA685257C6000532062/$file/11-1355-1474943.pdf"&gt;Verizon v. FCC&lt;/a&gt;. Though this decision turned on the interpretation of 'broadband providers' under the Communications Act, 1934, net neutrality has since been debated in the US, both	&lt;a href="http://techcrunch.com/2015/02/09/fcc-chairman-tom-wheeler-defends-his-net-neutrality-proposal/"&gt;by the FCC&lt;/a&gt; and other stakeholders. There is no international consensus in sight; the NETmundial Outcome Document	&lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;recognized&lt;/a&gt; net neutrality as an emerging issue (page 	11, no. IV).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;35. &lt;/b&gt; In India, a TRAI consultation on Over-The-Top Services on August 5, 2014 brought concerns of telecom and cellular operators to light. OTTs were seen as 	hijacking a portion of telcos' revenues, and as lacking consumer protection and privacy safeguards. While these concerns are legitimate, net neutrality regulation is not yet the norm in India. In any event, any such regulation must	&lt;a href="http://cis-india.org/telecom/blog/otts-eating-into-our-revenue-telcos-in-india"&gt;take into account&lt;/a&gt; the consequences of regulation on 	innovation, competition, and consumer choice, as well as on the freedom of the medium (which may have detrimental impacts freedom of expression).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;36. &lt;/b&gt; Though net neutrality regulation is being mooted, there is as yet an&lt;a href="http://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions"&gt;array of definitions&lt;/a&gt; of 'net neutrality'. The	&lt;a href="http://www.medianama.com/2014/11/223-net-neutrality-telcos-india/"&gt;views of telcos themselves differ&lt;/a&gt; in India. Further study on the methods of 	identifying and/or circumventing net neutrality is necessary before a policy position can be taken.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IV. &lt;/b&gt; &lt;b&gt;&lt;span&gt;Conclusions&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;37. &lt;/b&gt; CIS welcomes ASSOCHAM's initiative to study and develop industry-wide positions on Internet governance. This note provides brief descriptions of several 	issues in Internet governance where policy windows are open internationally and domestically. These issues include freedom of expression and privacy under 	Part III (Fundamental Rights) of the Constitution of India. The Supreme Court's hearing of a set of cases alleging unconstitutionality of Ss. 66A, 69, 69A 	and 79 (among others) of the IT Act, 2000, as well as consultations on issues such as pornography by the Rajya Sabha Parliamentary Committee and media laws 	by the Law Commission of India are important in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38. &lt;/b&gt; International and domestic engagement is necessary in the transition of stewardship of the IANA functions, as well as ICANN's own accountability and 	transparency measures. Similarly, in the area of cyber-security, though several initiatives are afoot internationally, India's engagement has been cursory 	until now. A concrete position from India's stakeholders, including the government, on these and the question of multi-stakeholderism in Internet 	governance would be of immense assistance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;39. &lt;/b&gt; Finally, net neutrality is an emerging issue of importance to industry's revenues and business models, and to users' rights such as access to information 	and freedom of expression.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; CIS gets ITU-D Sector Membership, &lt;a href="http://goo.gl/PBGKWt"&gt;goo.gl/PBGKWt&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Letter for Civil Society Involvement in WCIT, &lt;a href="http://goo.gl/gXpYQD"&gt;goo.gl/gXpYQD&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; See, ex., Hariharan, &lt;i&gt;What India's ITU Proposal May Mean for Internet Governance&lt;/i&gt;, &lt;a href="http://goo.gl/hpWaZn"&gt;goo.gl/hpWaZn&lt;/a&gt; (l.a. 8 			Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Panday, &lt;i&gt;WSIS +10 High Level Event: Open Consultation Process MPP: Phase Six: Fifth Physical Meeting&lt;/i&gt;,			&lt;a href="http://goo.gl/3XR24X"&gt;goo.gl/3XR24X&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Hariharan, &lt;i&gt;WSIS+10 High Level Event: A Bird's Eye Report&lt;/i&gt;, &lt;a href="http://goo.gl/8XkwyJ"&gt;goo.gl/8XkwyJ&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Pranesh Prakash elected as Asia-Pacific Representative to the Executive Committee of NonCommercial Users Constituency,			&lt;a href="http://goo.gl/iJM7C0"&gt;goo.gl/iJM7C0&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; See, ex., &lt;i&gt;CIS@IGF 2014&lt;/i&gt;, &lt;a href="http://goo.gl/Werdiz"&gt;goo.gl/Werdiz&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; &lt;i&gt;Multi-stakeholder Internet Governance: The Way Ahead&lt;/i&gt; , &lt;a href="http://goo.gl/NuktNi"&gt;goo.gl/NuktNi&lt;/a&gt;; &lt;i&gt;Minimising legal risks of online Intermediaries while protecting user rights,&lt;/i&gt; &lt;a href="http://goo.gl/mjQyww"&gt;goo.gl/mjQyww&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; First Meeting of the Multistakeholder Advisory Group for India Internet Governance Forum, &lt;a href="http://goo.gl/NCmKRp"&gt;goo.gl/NCmKRp&lt;/a&gt; (l.a. 8 			Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; See Zero Draft of Content Removal Best Practices White Paper, &lt;a href="http://goo.gl/RnAel8"&gt;goo.gl/RnAel8&lt;/a&gt; (l.a. 8 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; See, ex., &lt;i&gt;UK-US surveillance regime was unlawful 'for seven years'&lt;/i&gt;, &lt;a href="http://goo.gl/vG8W7i"&gt;goo.gl/vG8W7i&lt;/a&gt; (l.a. 9 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; See, ex., &lt;i&gt;Twitter: Turkey tops countries demanding content removal&lt;/i&gt;, &lt;a href="http://goo.gl/ALyO3B"&gt;goo.gl/ALyO3B&lt;/a&gt; (l.a. 9 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; See, ex., &lt;i&gt;The ITU convenes a programme on Child Online Protection&lt;/i&gt;, &lt;a href="http://goo.gl/qJ4Es7"&gt;goo.gl/qJ4Es7&lt;/a&gt; (l.a. 9 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Hariharan, &lt;i&gt;Why India's Proposal at the ITU is Troubling for Internet Freedoms&lt;/i&gt;, &lt;a href="http://goo.gl/Sxh5K8"&gt;goo.gl/Sxh5K8&lt;/a&gt; (l.a. 9 			Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Hickok, &lt;i&gt;Report of the Group of Experts on Privacy vs. The Leaked 2014 Privacy Bill&lt;/i&gt;, &lt;a href="http://goo.gl/454qA6"&gt;goo.gl/454qA6&lt;/a&gt; (l.a. 			9 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; See, &lt;i&gt;Supreme Court Of India To Hear Eight IT Act Related Cases On 11th April 2014 - SFLC&lt;/i&gt;, &lt;a href="http://goo.gl/XLWsSq"&gt;goo.gl/XLWsSq&lt;/a&gt; (l.a. 9 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; See, Dara, &lt;i&gt;Intermediary Liability in India: Chilling Effects on Free Expression on the Internet&lt;/i&gt;,			&lt;a href="http://goo.gl/bwBT0x"&gt;goo.gl/bwBT0x&lt;/a&gt; (l.a. 9 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; See, ex., Arun, &lt;i&gt;Blocking online porn: who should make Constitutional decisions about freedom of speech?&lt;/i&gt;,&lt;a href="http://goo.gl/NPdZcK"&gt;goo.gl/NPdZcK&lt;/a&gt;; Hariharan &amp;amp; Subramanian,			&lt;i&gt;Search Engine and Prenatal Sex Determination: Walking the Tight Rope of the Law&lt;/i&gt;, &lt;a href="http://goo.gl/xMj4Zw"&gt;goo.gl/xMj4Zw&lt;/a&gt; (l.a. 9 			Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; CSTD, &lt;i&gt;The mapping of international Internet public policy issues&lt;/i&gt;, &lt;a href="http://goo.gl/zUWdI1"&gt;goo.gl/zUWdI1&lt;/a&gt; (l.a. 9 Feb. 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/preliminary-submission-on-internet-governance-issues-to-assocham'&gt;https://cis-india.org/internet-governance/blog/preliminary-submission-on-internet-governance-issues-to-assocham&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-12T14:52:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/net-gain-working-together-for-stronger-digital-society">
    <title>NetGain: Working Together for a Stronger Digital Society</title>
    <link>https://cis-india.org/internet-governance/news/net-gain-working-together-for-stronger-digital-society</link>
    <description>
        &lt;b&gt;Sunil Abraham made a presentation at this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Join the conversation on Twitter using the hashtag &lt;a href="https://twitter.com/hashtag/NetGain?src=hash" target="_blank"&gt;#NetGain&lt;/a&gt;. This was published by the &lt;a class="external-link" href="http://www.fordfoundation.org/issues/human-rights/internet-rights/news?id=937"&gt;Ford Foundation&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;We need everyone’s help to identify the biggest challenges         that lie ahead of us. How do we balance security and privacy?         How will we connect the entire world’s population? How will we         archive all information and make this knowledge accessible? How         can technology make democracies more participatory and         responsive? Think big, and &lt;a href="http://netgainchallenge.org/" target="_blank"&gt;take the           Netgain Challenge&lt;/a&gt;: Submit your ideas and help us focus on         the most significant challenges at the intersection of the         Internet and philanthropy.&lt;/i&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Event Information&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet has transformed how we work, learn, and express       ourselves. It has connected us with each other and sparked bold       thinking about how to create a more fair and just world. Building       that better world—and living in it—depends on an open, secure, and       equitable Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What is philanthropy’s role in addressing the challenges and       potential of our digital society? Can we collaborate, as we have       in the past on other crucial issues, to bend the arc of progress       and ensure that everyone shares in the tremendous opportunity the       Internet offers? Have we thought big—really big—about what the       digital revolution can mean for the common good?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Feb. 11, the presidents of the &lt;a href="http://www.knightfoundation.org/" target="_blank"&gt;Knight&lt;/a&gt;,       &lt;a href="http://www.opensocietyfoundations.org/" target="_blank"&gt;Open         Society&lt;/a&gt;, &lt;a href="https://www.mozilla.org/en-US/foundation/" target="_blank"&gt;Mozilla,&lt;/a&gt; and Ford Foundations—along with a special surprise guest—will come       together with leading figures from government, philanthropy,       business, and the tech world to launch a major new partnership,       explore shared principles, and get ambitious about the next       generation of innovation for social change and progress.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.fordfoundation.org/newsroom/news-from-ford/940"&gt;Read         the press release.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8:45 – 9:30 am &lt;br /&gt; Registration and Breakfast&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9:30 – 9:45 am &lt;br /&gt; Welcome&lt;/b&gt; &lt;br /&gt; &lt;a href="http://www.fordfoundation.org/about-us/leadership/darren-walker"&gt;Darren         Walker&lt;/a&gt; &lt;i&gt;President, Ford Foundation&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9:45 – 10:00 am &lt;br /&gt; Keynote Address: New York City Mayor Bill de Blasio&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10:00 – 10:45 am &lt;br /&gt; The Internet, Philanthropy, and Progress: Principles for Future         Work&lt;/b&gt; &lt;br /&gt; &lt;a href="http://www.fordfoundation.org/pdfs/news/NetGain_Principles.pdf" target="_blank" title="Click to download PDF"&gt;&lt;i&gt;Read           the principles&lt;/i&gt;&lt;/a&gt; &lt;a href="http://www.fordfoundation.org/pdfs/news/NetGain_Principles.pdf" target="_blank" title="Click to download PDF"&gt;&lt;span class="pdf file-type"&gt;139 KB&lt;/span&gt;&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;i&gt;Introduction by&lt;/i&gt;&lt;a href="http://www.fordfoundation.org/regions/united-states/team/jenny-toomey"&gt; Jenny Toomey&lt;/a&gt; &lt;i&gt;Director, Internet Rights, Ford Foundation&lt;/i&gt; &lt;br /&gt; &lt;a href="https://blog.mozilla.org/press/bios/mitchell-baker/"&gt;Mitchell         Baker&lt;/a&gt; &lt;i&gt;Executive Chairwoman, Mozilla Foundation&lt;/i&gt; &lt;br /&gt; &lt;a href="http://www.opensocietyfoundations.org/people/chris-stone"&gt;Chris         Stone&lt;/a&gt; &lt;i&gt;President, Open Society Foundations&lt;/i&gt; &lt;br /&gt; &lt;a href="http://www.fordfoundation.org/about-us/leadership/darren-walker"&gt;Darren         Walker&lt;/a&gt; &lt;i&gt;President, Ford Foundation&lt;/i&gt; &lt;br /&gt; &lt;i&gt;Moderator &lt;/i&gt;&lt;a href="http://www.pbs.org/weta/washingtonweek/profile/gwen-ifill"&gt;Gwen         Ifill &lt;/a&gt;&lt;i&gt;Managing Editor, “Washington Week”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10:45 – 11:00 am &lt;br /&gt; Break&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11:00 am – 12:20 pm &lt;br /&gt; NetGain Challenges&lt;/b&gt; &lt;br /&gt; &lt;i&gt;Hosted by:&lt;/i&gt; &lt;br /&gt; &lt;a href="http://jpalfrey.andover.edu/top/bio/"&gt;John Palfrey&lt;/a&gt; &lt;i&gt;Head         of School, Phillips Academy&lt;/i&gt; &lt;br /&gt; &lt;a href="http://www.media.mit.edu/people/ethanz"&gt;Ethan Zuckerman&lt;/a&gt; &lt;i&gt;Director, MIT Center for Civic Media&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Presenters:&lt;/i&gt; &lt;br /&gt; &lt;a href="http://www.media.mit.edu/people/ethanz"&gt;Ethan Zuckerman&lt;/a&gt; &lt;i&gt;Director, MIT Center for Civic Media&lt;/i&gt; &lt;br /&gt; &lt;a href="http://www.journalism.columbia.edu/profile/304-emily-bell/10"&gt;Emily         Bell&lt;/a&gt; &lt;i&gt;Director, Tow Center for Digital Journalism,         Columbia University Graduate School of Journalism&lt;/i&gt; &lt;br /&gt; &lt;a href="http://www.domesticworkers.org/staff/alicia-garza"&gt;Alicia         Garza &lt;/a&gt; &lt;i&gt;Co-Founder, #BlackLivesMatter; Special Projects         Director, National Domestic Workers Alliance&lt;/i&gt; &lt;br /&gt; &lt;a href="http://cis-india.org/publications-automated/cis/sunil"&gt;Sunil         Abraham&lt;/a&gt; &lt;i&gt;Executive Director, Centre for Internet &amp;amp;         Society&lt;/i&gt; &lt;br /&gt; &lt;a href="http://www.comptel.org/chippickering"&gt;Chip Pickering&lt;/a&gt; &lt;i&gt;CEO, Comptel&lt;/i&gt; &lt;br /&gt; &lt;a href="http://www.praxisfilms.org/about/laura-poitras"&gt;Laura         Poitras&lt;/a&gt; &lt;i&gt;Filmmaker, “Citizenfour”&lt;/i&gt; &lt;br /&gt; &lt;a href="https://www.dubfire.net/"&gt;Chris Soghoian &lt;/a&gt; &lt;i&gt;Principal         Technologist, Speech, Privacy, &amp;amp; Technology Project, ACLU&lt;/i&gt; &lt;br /&gt; &lt;a href="https://archive.org/about/bios.php"&gt;Brewster Kahle&lt;/a&gt; &lt;i&gt;Digital         Librarian and Founder, Internet Archive&lt;/i&gt; &lt;br /&gt; &lt;a href="http://www.media.mit.edu/people/joi"&gt;Joi Ito&lt;/a&gt; &lt;i&gt;Director,         MIT Media Lab&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12:20 – 12:45 pm &lt;br /&gt; Break&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12:45 – 1:30 pm &lt;br /&gt; Lunch Discussion: Celebrating 25 Years of the World Wide Web&lt;/b&gt; &lt;br /&gt; &lt;i&gt;Introduction by&lt;/i&gt;&lt;a href="http://www.knightfoundation.org/staff/alberto-ibarguen/"&gt; Alberto Ibargüen&lt;/a&gt; &lt;i&gt;President and CEO, Knight Foundation&lt;/i&gt; &lt;br /&gt; &lt;a href="http://www.w3.org/People/Berners-Lee/"&gt;Tim Berners-Lee&lt;/a&gt; &lt;i&gt;Inventor, World Wide Web&lt;/i&gt; &lt;br /&gt; &lt;a href="http://hls.harvard.edu/faculty/directory/11154/Crawford"&gt;Susan         Crawford&lt;/a&gt; &lt;i&gt;Co-Director, Berkman Center for Internet &amp;amp;         Society, Harvard University&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1:30 – 2:00 pm &lt;br /&gt; Break&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2:00 – 4:30 pm &lt;br /&gt; &lt;i&gt;Citizenfour&lt;/i&gt; Screening and Discussion&lt;/b&gt; &lt;br /&gt; &lt;i&gt;Introduction by&lt;/i&gt;&lt;a href="http://www.macfound.org/about/people/76/"&gt; Eric Sears&lt;/a&gt; &lt;i&gt;Program Officer, Human Rights, MacArthur Foundation&lt;/i&gt; &lt;br /&gt; &lt;a href="http://www.praxisfilms.org/about/laura-poitras"&gt;Laura         Poitras&lt;/a&gt; &lt;i&gt;Filmmaker, “Citizenfour”&lt;/i&gt; &lt;br /&gt; &lt;a href="https://www.aclu.org/blog/author/ben-wizner"&gt;Ben Wizner&lt;/a&gt; &lt;i&gt;Director, Speech, Privacy &amp;amp; Technology Project, ACLU&lt;/i&gt; &lt;br /&gt; &lt;i&gt;Moderator &lt;/i&gt;&lt;a href="http://www.wnyc.org/people/brian-lehrer/"&gt;Brian Lehrer&lt;/a&gt; &lt;i&gt;Host, “The Brian Lehrer Show,” WNYC&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/net-gain-working-together-for-stronger-digital-society'&gt;https://cis-india.org/internet-governance/news/net-gain-working-together-for-stronger-digital-society&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-13T02:32:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-lalatendu-mishra-sriram-srinivasan-february-11-2015-hindu-facebook-launches-internet-org-in-india">
    <title>Facebook launches Internet.org in India</title>
    <link>https://cis-india.org/internet-governance/news/hindu-lalatendu-mishra-sriram-srinivasan-february-11-2015-hindu-facebook-launches-internet-org-in-india</link>
    <description>
        &lt;b&gt;Joins hands with Reliance Communications. Move spurs neutrality concerns.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Lalatendu Mishra and Sriram Srinivasan was &lt;a class="external-link" href="http://www.thehindu.com/business/Industry/facebook-launches-internetorg-in-india/article6879310.ece"&gt;published in the Hindu&lt;/a&gt; on February 11, 2015. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Facebook on Tuesday announced a tie-up with Reliance Communications to  launch Internet.org in India, bringing to the land of a billion-plus  people a service that the social media giant says helps affordable  Internet access but whose critics disapprove its restrictiveness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India now becomes the sixth destination for Internet.org, a Facebook-led  initiative envisaged about a year-and-a-half back with six other  founding partners, including Samsung and Qualcomm. The service has  already been launched in Zambia, Tanzania, Kenya, Colombia and Ghana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook’s 30-year-old founder and CEO Mark Zuckerberg announced the  development on his social network. He posted, “More than a billion  people in India don’t have access to the internet. That means they can’t  enjoy the same opportunities many of us take for granted, and the  entire world is robbed of their ideas and creativity.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The tie-up gives subscribers of the Anil Ambani-led Reliance  Communications who have Internet-enabled handsets free access to 38  Websites – a mix of news, music, education, weather and health sites.  The list includes Facebook, Wikipedia, and Reliance Astrology. The lone  search option available is Microsoft’s Bing. They can be accessed via an  Android app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the time being, the service has gone live in Maharashtra, Gujarat,  Andhra Pradesh, Tamil Nadu, and Kerala. The pan-India launch is planned  in three months. Nearly 70% of Reliance’s customers who have  Internet-enabled phones but are now offline are expected to avail  themselves of this service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gurdeep Singh, CEO, Consumer Business, Reliance Communications, said  during the launch in Mumbai, “This partnership will not only accelerate  internet penetration In India, it will also open new socioeconomic  opportunities to users in fields like education, information and  commerce.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chris Daniels, Vice President of Internet.org at Facebook, said, “This  is a big step forward in our efforts to connect every one in India to  the internet and help people discover new tools and information that can  create more jobs and opportunities.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critics, however, see little altruism in Internet.org. Rather, what they  see is a huge challenge to the neutrality of the Internet. Their point  is that a selective access to the Internet makes it extremely difficult  for rivals not part of the service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lawyer Prashant Reddy said, “It will be interesting to see how Trai (the  regulator Telecom Regulatory Authority of India) handles such deals,  and whether the market will accuse both these players of violating  network neutrality.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said, “Also one needs to see how public understands the principles of  Net neutrality.” His point is: there is no outcry when data packs are  offered free but controversy erupts when a service provider tries to  charge subscribers for services, as in the case of Airtel recently.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Internet activist and director of the Center for Civic Media at MIT, Ethan Zuckerman, told &lt;i&gt;The Hindu&lt;/i&gt; in an email interview that "If Facebook were donating millions or  billions to upgrade infrastructure - or even to lobby mobile phone  carriers for cheaper data services for all - it would be less troubling.  But instead, they're offering a limited version of the internet, one  that centers on Facebook, to low-income internet users. That raises real  concerns that this is not a charitable effort, but a customer  acquisition strategy."&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Pranesh Prakash, Policy Director of the Bengaluru-based research and  advocacy organisation The Centre for Internet &amp;amp; Society, said he is  worried about the long-term consequences. “The Internet.org model  violates most definitions of net neutrality, as it provides access to a  limited menu of services claiming to be the Internet — being based on a  cable TV model — rather than providing actual access to the Internet at a  low cost.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;He said, “Since it is an exclusive deal with a single mobile service  provider, it also calls into question the genuineness of Mark  Zuckerberg’s publicly-stated motive of bringing the Internet to a  billion people and bridging the digital divide.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It isn’t clear how Facebook and Reliance would bear the cost of the free  service. What Facebook said in its annual report of 2013 is that it  would continue to invest in projects even if it doesn’t have a clear  path to monetisation, “such as our commitment to the Internet.org  initiative to increase global Internet access.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Even prior to the internet.org initiative, companies such as Facebook  and Twitter have individually worked out deals with telecom companies in  fast-growing markets to make their services free for subscribers.  Research firm eMarketer had forecast India to be the fastest-growing  geography for Facebook in terms of users in 2014.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;(With inputs from Sanjay Vijayakumar)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-lalatendu-mishra-sriram-srinivasan-february-11-2015-hindu-facebook-launches-internet-org-in-india'&gt;https://cis-india.org/internet-governance/news/hindu-lalatendu-mishra-sriram-srinivasan-february-11-2015-hindu-facebook-launches-internet-org-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-13T02:27:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-february-10-2015-moulishree-srivastava-govt-may-turn-to-supercomputing-for-better-use-of-aadhaar-database">
    <title>Govt may turn to supercomputing for better use of Aadhaar database </title>
    <link>https://cis-india.org/internet-governance/news/livemint-february-10-2015-moulishree-srivastava-govt-may-turn-to-supercomputing-for-better-use-of-aadhaar-database</link>
    <description>
        &lt;b&gt;Technology experts working with the Aadhaar project have spotted other potential uses for it, all to be powered by a string of supercomputers.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Moulishree Srivastava was &lt;a class="external-link" href="http://www.livemint.com/Politics/PYN4cIu1tiRL5BCuTUoXBO/Govt-may-turn-to-supercomputing-for-better-use-of-Aadhaar-da.html"&gt;published in Livemint &lt;/a&gt;on February 10, 2015. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;When India launched a scheme in 2009 to give every one of its residents a unique identity number called Aadhaar, there were two main objectives: an efficient delivery of welfare services, and a tool for monitoring government schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Six years on, as the government moves a step closer to covering all 1.25 billion citizens with Aadhaar, technology experts working with the project have spotted other potential uses, all to be powered by a string of supercomputers. With Aadhaar having crossed the 700 million milestone in 2014, the government is preparing to launch supercomputing applications to make more sense of the scheme’s massive database. These will help link the database to public services by running data analytics, which in turn will throw up trends that can help promote better-informed policy-making.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are talking about the Aadhaar database and the huge population data associated with it. Right now it is only a collection of data, but once we start rolling out applications, the amount of information that will be generated and the amount of usage that will happen will be enormous,” said Rajat Moona, director general of the Pune-based Centre for Development of Advanced Computing (CDAC), the research and development arm of the department of electronics and information technology responsible for the National Supercomputing Mission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Big data analysis and big data visualization, these are supercomputing problems. It (handling Aadhaar database) is actually visualization of huge data that can help in the planning,” he added. “When you have that much amount of information, you can do a lot of data analysis and figure out trends. We can thus see what are the policies needed to be defined. Therefore proactive policymaking based on previous trends is possible provided we have data,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar is being used by the government for transferring cash subsidies directly into the bank accounts of beneficiaries in order to plug leakages. It is used to identify beneficiaries for transferring funds under scholarship schemes, pension money, cooking gas subsidy as well as seeding of bank accounts to weed out multiple beneficiaries under the government’s financial inclusion programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are also plans to use Aadhaar to curb black money in real estate transactions. Developing these applications further, says Moona, needs supercomputers, which will give far better results. “In order to develop these applications we need to understand supercomputing and use of supercomputing,” he said. “We don’t have such applications developed…we usually take larger applications developed elsewhere and customize it according to our needs. So applications that are developed for solving India-centric problems will actually give a better output,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are talking about creating related applications that can run on supercomputing cloud of million cores (cloud supported by million-core supercomputers),” he added. “It will be a platform, where we can solve a large number of problems using shared model.” “It (supercomputing cloud) will not be a public cloud. There will be research institutes, research organizations, security agencies, government departments and each of them will have its own data and access pattern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is going to be a part of our application-centric usage of (the proposed) supercomputing (grid).” The million-core supercomputing cloud is a part of the government’s Rs.4,500 crore project aimed at setting up a grid of more than 70 supercomputers to be hooked up across these institutions and organizations over the next five to seven years. This will enable Indian researchers to build applications on the network, as well as to harness the power of supercomputers for research and development. India has 12 of the world’s 500 most powerful supercomputers, the largest currently deployed being a 500 teraflops (equivalent to half a petaflop) computer, administered by the CDAC. To work on supercomputing applications in areas such as the Aadhaar database, terrorism, advanced weather monitoring— including cyclone and flood prediction—and geo exploration, the government plans to train 22,000 high-quality professionals over 5-7 years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some experts point out that a centralized Aadhaar database faces cybersecurity risks that can threaten people’s privacy. Centralization is a terrible idea from the perspective of cybersecurity, said Sunil Abraham, executive director of the Bengaluru-based research organization Centre for Internet and Society. “This is a honeypot (a computer system that is set up to attract and trap people who attempt to penetrate other people’s computer systems) and variety of bad actors, i.e. criminals, terrorists, as well as states and corporations, will target this database hoping to compromise it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A petition filed by former Justice K.S. Puttaswamy in 2012 said that Aadhaar scheme infringes citizens’ privacy as applicants need to provide personal information on biometrics, iris and fingerprints, which infringes their right to privacy that is a part of the fundamental right to life under Article 21 of the Constitution. Security experts have been raising concerns about lack of secure and foolproof system to ensure that all the data will be safe and will not be misused. “How do we address the security and innovation imperative without compromising on the right to privacy? We must build individual transaction databases for each government department/ministry and (have) decentralised authentication. Only anonymized dataset should be made available to the supercomputing applications that are being built,” Abraham said. “For innovation and improved e-governance, anonymized data is sufficient.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-february-10-2015-moulishree-srivastava-govt-may-turn-to-supercomputing-for-better-use-of-aadhaar-database'&gt;https://cis-india.org/internet-governance/news/livemint-february-10-2015-moulishree-srivastava-govt-may-turn-to-supercomputing-for-better-use-of-aadhaar-database&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-08T05:53:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/pc-world-john-riberio-february-10-2015-facebook-offers-free-but-limited-access-to-the-internet-in-india">
    <title>Facebook offers free but limited access to the Internet in India</title>
    <link>https://cis-india.org/internet-governance/news/pc-world-john-riberio-february-10-2015-facebook-offers-free-but-limited-access-to-the-internet-in-india</link>
    <description>
        &lt;b&gt;Facebook-backed Internet.org is extending its offer of free but limited Internet access to India via a mobile app. &lt;/b&gt;
        &lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The blog post was &lt;a class="external-link" href="http://www.pcworld.com/article/2882272/facebook-offers-free-but-limited-access-to-the-internet-in-india.html"&gt;published in PC World&lt;/a&gt; on February 10, 2015. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The launch of the app in India follows similar introductions in Ghana,  Zambia, Colombia, Kenya and Tanzania, despite criticism from activists  that the program does not meet its stated objective of providing free  and unfettered Internet access to all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The common thread in all these launches is that the app is available  only to subscribers of one operator in the country. In India, for  example, Internet.org has tied with Reliance Communications, the  country’s fourth-largest mobile services provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet.org is a collaborative effort, launched in 2013 by Facebook and  other tech companies including Ericsson and Samsung Electronics, that  aims to provide Internet access to those who don’t yet have it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Connectivity can’t just be a privilege for some of the rich and  powerful,” Facebook CEO Mark Zuckerberg said last year at the first  meeting of Internet.org. “It needs to be something that everyone shares,  and an opportunity for everyone.”&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;But the way the free service has been offered has come in for criticism from some social activists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is a walled garden approach that undermines the infrastructure of  free expression in India,” said Pranesh Prakash, policy director at  Centre for Internet and Society, a Bangalore-based organization focused  on research and policy advocacy, who pointed out that the app does not  offer truly free access to the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash is also critical that the service will only be available to  subscribers of Reliance Communications, defeating the stated aim of  Internet.org of providing free Internet access to all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The free access is limited to 38 websites, including Facebook and its  Messenger service, Bing Search, Dictionary.com, Wikipedia, BBC News,  Reuters Market Lite for crop and farming information, and local jobs and  news sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The service will only cover a few Indian states in South India. Reliance  customers in the six states can access the free services through the  Android app, from the start screen of the Opera Mini mobile web browser,  and using the Android app UC Browser for Internet.org. The services  will be available in English, Hindi, Tamil, Telugu, Malayalam, Gujarati  and Marathi.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/pc-world-john-riberio-february-10-2015-facebook-offers-free-but-limited-access-to-the-internet-in-india'&gt;https://cis-india.org/internet-governance/news/pc-world-john-riberio-february-10-2015-facebook-offers-free-but-limited-access-to-the-internet-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-08T07:42:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions">
    <title>Collection of Net Neutrality Definitions</title>
    <link>https://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions</link>
    <description>
        &lt;b&gt;As part of CIS's inquiry into 'Network Neutrality' in the developing world, we have collected a set of definitions of the term from different sources. The definitions were collated and compiled by Manoj Kurbet, Maitreya Subramaniam and Tarun Krishnakumar under the guidance of Sunil Abraham.&lt;/b&gt;
        
&lt;table class="listing"&gt;&lt;/table&gt;
&lt;h3 style="text-align: center;"&gt;&lt;a title="View Collection of Net Neutrality Definitions on Scribd" href="https://www.scribd.com/doc/255177669/Collection-of-Net-Neutrality-Definitions"&gt;Collection of Net Neutrality Definitions&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: center;"&gt;Please feel free to get in touch if you would like to suggest definitions to be added to this &amp;nbsp;working database.&lt;/p&gt;
&lt;div style="text-align: center;"&gt;&lt;iframe src="https://www.scribd.com/embeds/255177669/content?start_page=1&amp;amp;view_mode=scroll&amp;amp;show_recommendations=true" frameborder="0" scrolling="no" height="600" width="100%" id="doc_47259" class="scribd_iframe_embed"&gt;&lt;/iframe&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions'&gt;https://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tarun</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-09T13:33:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/digital-security-workshop-for-journalists">
    <title>Digital Security Workshop for Journalists</title>
    <link>https://cis-india.org/internet-governance/events/digital-security-workshop-for-journalists</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society and the Mumbai Press Club are jointly organizing a workshop for journalists on February 7, 2015, from 9.30 a.m. to 1.30 p.m. at Mumbai Press Club, Azad Maidan.&lt;/b&gt;
        &lt;h3&gt;Event Flier&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/DigitalSecurity.png" alt="Digital Security" class="image-inline" title="Digital Security" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The event would cover these topics:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Why should journalists care about digital security?&lt;/li&gt;
&lt;li&gt;The threat model: assessing digital security risks and responses.&lt;/li&gt;
&lt;li&gt;Security measures and solutions: alternatives to unsecure software and tools, good security practices, computer hygiene etcetera.&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Event Pictures&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Pics01.JPG" alt="Pics 01" class="image-inline" title="Pics 01" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Pic2.jpg" alt="Pics 02" class="image-inline" title="Pics 02" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/digital-security-workshop-for-journalists'&gt;https://cis-india.org/internet-governance/events/digital-security-workshop-for-journalists&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Security</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-08T05:25:34Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
