<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1746 to 1760.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/igf-2014-session-post-snowden-localisation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/icann2019s-documentary-information-disclosure-policy-2013-i-didp-basics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/june-2014-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-and-surveillance-roundtable-new-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-icann-50"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-policy-brief-iana-transition-fundamentals-and-suggestions-for-process-design"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/understanding-iana-transition"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/common-wealth-domain-name-system-forum-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/privacy-surveillance-roundtable"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/igf-2014-session-post-snowden-localisation">
    <title>Implications of post-Snowden Internet localization proposals</title>
    <link>https://cis-india.org/news/igf-2014-session-post-snowden-localisation</link>
    <description>
        &lt;b&gt;The Ninth Annual Internet Governance Forum (IGF) Meeting will be held in Istanbul, Turkey on 2-5 September 2014. The venue of the meeting is Lütfi Kirdar International Convention and Exhibition Center (ICEC).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham will be speaking &lt;a class="external-link" href="http://www.intgovforum.org/cms/wks2014/index.php/proposal/view_public_duplicate/112"&gt;in this workshop&lt;/a&gt; organized by Internet Society and Center for Democracy and Technology at the IGF.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Following the 2013-2014 disclosures of large-scale pervasive surveillance of Internet traffic, various proposals to "localize" Internet users' data and change the path that Internet traffic would take have started to emerge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Examples include mandatory storage of citizens' data within country, mandatory location of servers within country (e.g. Google, Facebook), launching state-run services (e.g. email services), restricted transborder Internet traffic routes, investment in alternate backbone infrastructure (e.g. submarine cables, IXPs), etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Localization of data and traffic routing strategies can be powerful tools for improving Internet experience for end-users, especially when done in response to Internet development needs. On the other hand, done uniquely in response to external factors (e.g. foreign surveillance), less optimal choices may be made in reactive moves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How can we judge between Internet-useful versus Internet-harmful localisation and traffic routing approaches? What are the promises of data localization from the personal, community and business perspectives? What are the potential drawbacks? What are implications for innovation, user choice and the availability of online services in the global economy? What impact might they have on a global and interoperable Internet? What impact (if any) might these proposals have on user trust and expectations of privacy?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The objective of the session is to gather diverse perspectives and experiences to better understand the technical, social and economic implications of these proposals.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Name(s) and stakeholder and organizational affiliation(s) of institutional co-organizer(s)&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Organizer:&lt;/b&gt;&lt;br /&gt;Nicolas Seidler, Policy advisor&lt;br /&gt; Technical community&lt;br /&gt; Internet Society&lt;br /&gt;&lt;b&gt;Co-organizer:&lt;/b&gt;&lt;br /&gt;Matthew Shears&lt;br /&gt; Civil society&lt;br /&gt; Center for Democracy and Technology&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Names and affiliations (stakeholder group, organization) of speakers the proposer is planning to invite&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Mr. Chris Riley, Senior Policy Engineer, Mozilla Corporation, Private sector (CONFIRMED)&lt;/li&gt;
&lt;li&gt;Mr. Jari Arkko, Chair of the Internet Engineering Task Force, Technical community (CONFIRMED)&lt;/li&gt;
&lt;li&gt;Mr. Christian Kaufmann, Director Network Architecture at Akamai Technologies, Private sector (CONFIRMED)&lt;/li&gt;
&lt;li&gt;Ms. Emma Llanso, Director of Free Expression Project, Center for Democracy and Technology, Civil Society (CONFIRMED)&lt;/li&gt;
&lt;li&gt;Mr. Sunil Abraham, Executive Director, Center for Internet and Society, India, Civil Society (CONFIRMED)&lt;/li&gt;
&lt;li&gt;Mr. Thomas Schneider, Deputy head of international affairs, Swiss  Federal Office of Communication (OFCOM), Government (CONFIRMED)&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 class="title"&gt;Name of Moderator(s)&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Nicolas Seidler, Policy advisor, Internet Society&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Name of Remote Moderator(s)&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Konstantinos Komaitis &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/igf-2014-session-post-snowden-localisation'&gt;https://cis-india.org/news/igf-2014-session-post-snowden-localisation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-03T07:09:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide">
    <title>Models for Surveillance and Interception of Communications Worldwide</title>
    <link>https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide</link>
    <description>
        &lt;b&gt;This is an evaluation of laws and practices governing surveillance and interception of communications in 9 countries. The countries evaluated represent a diverse spectrum not only in terms of their global economic standing but also their intrusive surveillance capabilities. The analysis is limited to the procedural standards followed by these countries for authorising surveillance and provisions for resolving interception related disputes.&lt;/b&gt;
        &lt;table class="grid" style="text-align: justify; "&gt;
&lt;thead&gt;&lt;/thead&gt;
&lt;/table&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;th&gt;Sl. No.&lt;/th&gt; &lt;th&gt;Country&lt;/th&gt; &lt;th&gt;Legislation&lt;/th&gt; &lt;th&gt;Model&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;Australia&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Telecommunications (Interceptions and Access) Act, 1979&lt;/b&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Governs interception of communications&lt;/li&gt;
&lt;li&gt;Relevant provisions: S. 3, 7, 6A, 34, 46&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt; Surveillance Devices Act, 2004 &lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Establishes procedure for obtaining warrants and for use of surveillance devices&lt;/li&gt;
&lt;li&gt;Relevant Provisions: S.13, 14&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;span style="text-align: justify; "&gt;Authorisation for surveillance is granted in the form of a warrant from a &lt;b&gt;Judge or a nominated member of the Administrative Appeals Tribunal&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;The warrant issuing authority must be satisfied that information obtained through interception shall assist in the investigation of a serious crime&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;The Acts provide a list of prescribed offences for which interception of communication may be authorized&lt;/li&gt;
&lt;li&gt;T&lt;span style="text-align: justify; "&gt;he Acts also specify certain federal and state law enforcement agencies that may undertake surveillance&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;td&gt;Brazil&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;Federal Law No. 9,296, 1996&lt;/b&gt;&lt;span style="text-align: justify; "&gt;:&lt;/span&gt; 
&lt;ul&gt;
&lt;li&gt;Regulates wiretapping&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;span style="text-align: justify; "&gt;Authorisation for interception is granted on a &lt;b&gt;Judge’s order&lt;/b&gt; for a period of 15 days at a time&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Interception is only allowed for investigations into serious offences like drug smuggling, corruption murder and kidnapping&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;Canada&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Criminal Code, 1985&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Governs general rules of criminal procedure including search and seizure protocols&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Relevant Provision: §§ 184.2, 184.4&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Grants power to intercept communication by obtaining authorisation from a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;provincial court judge or a judge of the superior court&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Before granting his authorisation, the judge must be satisfied that either the originator of the communication or the recipient thereof  has given his/her consent to the interception&lt;/li&gt;
&lt;li&gt;Under exceptional circumstances, however, a police officer owing to the exigency of the situation may intercept communication without prior authorisation&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.&lt;/td&gt;
&lt;td&gt;France&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;&lt;i&gt;Loi d'orientation et de programmation pour la performance de la sécurité intérieure&lt;/i&gt;&lt;/b&gt;&lt;b style="text-align: justify; "&gt; (LOPPSI 2), 2011&lt;/b&gt;&lt;span style="text-align: justify; "&gt;:&lt;/span&gt; 
&lt;ul&gt;
&lt;li&gt;Authorises use of video surveillance and interception of communications&lt;/li&gt;
&lt;li&gt;Relevant Provisions: Article 36&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;i&gt;Loi de Programmation Militaire&lt;/i&gt;&lt;/b&gt;&lt;b&gt; (LPM), 2013&lt;/b&gt;: 
&lt;ul&gt;
&lt;li&gt;Authorises&lt;b&gt; &lt;/b&gt;surveillance for protection of national security and prevention of terrorism&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;span style="text-align: justify; "&gt;Interception of comm&lt;b&gt;unication under LOPPSI 2 requires previous authorization from an investigating Judge after consultation with the Public Prosecutor&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;
&lt;div style="text-align: left; "&gt;Such authorization is granted for a period of 4 months which is further extendable by another 4 months&lt;/div&gt;
&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;
&lt;div style="text-align: left; "&gt;&lt;span style="text-align: justify; "&gt;
&lt;div style="text-align: left; "&gt;&lt;span style="text-align: justify; "&gt;Interception of communication &lt;b&gt;under LPM does not require prior sanction from an investigating judge and is instead provided by the &lt;/b&gt;&lt;/span&gt;&lt;span style="text-align: justify; "&gt;&lt;b&gt;Prime Minister’s office&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Information that can be intercepted under LPM includes not only metadata but also content and geolocation services&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.&lt;/td&gt;
&lt;td&gt;Germany&lt;/td&gt;
&lt;td&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;&lt;b style="text-align: justify; "&gt;&lt;i&gt;Gesetz zur Beschränkung des Brief-, Post und Fernmeldegeheimnisses &lt;/i&gt;(G10 Act)&lt;i&gt;, &lt;/i&gt;2001&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Imposes restrictions on the right to privacy and authorizes surveillance for protecting freedom and democratic order, preventing terrorism and illegal drug trade&lt;/li&gt;
&lt;li&gt;Relevant Provisions: §3&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;The German Code of Criminal Procedure (StPO), 2002&lt;/b&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Lays down search and seizure protocol and authorizes interception of telecommunications for criminal prosecutions&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Relevant Provisions: §§ 97, 100a&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorises &lt;/span&gt;&lt;b style="text-align: justify; "&gt;warrantless&lt;/b&gt;&lt;span style="text-align: justify; "&gt; surveillance by specific German agencies like the &lt;/span&gt;&lt;i style="text-align: justify; "&gt;Bundesnachrichtendienst &lt;/i&gt;&lt;span style="text-align: justify; "&gt;(Federal Intelligence Service)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Lays down procedure that must be followed while undertaking surveillance and intercepting communications&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorises sharing of intercepted intelligence for criminal prosecutions&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Mandates &lt;/span&gt;&lt;i style="text-align: justify; "&gt;ex post&lt;/i&gt;&lt;span style="text-align: justify; "&gt; notification to persons whose privacy has been violated but no judicial remedies are available to such persons&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;The Code of Criminal Procedure authorises interception of communication of a person suspected of being involved in a serious offence only on the &lt;b&gt;order of a court&lt;/b&gt; upon &lt;b&gt;application by the public prosecution office&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.&lt;/td&gt;
&lt;td&gt;Pakistan&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Pakistan Telecommunications Reorganisation Act, 1996:&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Controls the flow of false and fabricated information and protects national security&lt;/li&gt;
&lt;li&gt;Relevant Provisions: § 54&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;Investigation for Fair Trial Act, 2013:&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Regulates the powers of law enforcement and intelligence agencies regarding covert surveillance and interception of communications&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions:  §§ 6,7, 8, 9&lt;/span&gt;&lt;span style="text-align: left; "&gt; &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorisation for interception is provided by the &lt;/span&gt;&lt;b style="text-align: justify; "&gt;federal government&lt;/b&gt;&lt;span style="text-align: justify; "&gt;. No formal legal structure to monitor surveillance exists&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Interception can be authorized in the interest of national security and on the apprehension of any offence&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Requests for filtering and blocking of content are routed through the Inter-Ministerial Committee for the Evaluation of Websites, a confidential regulatory body&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Under the Fair Trial Act, interception can only be authorised on application to the &lt;/span&gt;&lt;b style="text-align: justify; "&gt;Fedral Minister for Interior&lt;/b&gt;&lt;span style="text-align: justify; "&gt; who shall then permit the application to be placed before a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;High Court Judge&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The warrant shall be issued by a judge only on his satisfaction that interception will aid in the collection of evidence and that a reasonable threat of the commission of a scheduled offence exists&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7.&lt;/td&gt;
&lt;td&gt;South Africa&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;The Regulation of Interception of Communications and Provision of Communication-related Information Act, 2002&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Regulates and authorizes monitoring and interception of telecommunications services&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions: §§ 16, 22&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Warrant for intercepting communications and installing surveillance devices is granted by a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;designated judge&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The warrant is issued on satisfaction of the judge that the investigation relates to a serious offence or that the information gathering is vital to public health or safety, national security or compelling national economic interests&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8.&lt;/td&gt;
&lt;td&gt;United Kingdom&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;Regulation of Investigatory Powers Act, 2000&lt;/b&gt;&lt;span style="text-align: justify; "&gt;:&lt;/span&gt; 
&lt;ul&gt;
&lt;li&gt;Authorises interception of communications and surveillance&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions: §§ 5, 6, 65&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorisation for interception is granted in the form of a warrant by the &lt;/span&gt;&lt;b style="text-align: justify; "&gt;Secretary of State &lt;/b&gt;&lt;span style="text-align: justify; "&gt;or in certain special cases by a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;‘senior officer’&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Communications can be intercepted only it is necessary to do so in the interest of national security or for the purpose of preventing and detecting serious crimes&lt;/li&gt;
&lt;li&gt;Complaints of alleged illegal surveillance are heard by the Investigatory Powers Tribunal&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9.&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;Electronic Communications Privacy Act, 1986 (Title III, Omnibus Crime Control and Safe Streets Act)&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Governs authorisation for wiretapping and interception&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions: §18&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorisation for interception can be granted by &lt;/span&gt;&lt;b style="text-align: justify; "&gt;a  district court or federal appeals court&lt;/b&gt;&lt;span style="text-align: justify; "&gt; on application by a law enforcement officer duly signed by the attorney general&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Application mandates obtaining the information through a service provider before invading upon individual’s privacy&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide'&gt;https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bedaavyasa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>surveillance technologies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2014-07-10T07:50:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011">
    <title>Consultation to Frame Rules under the Whistle Blowers Protection Act, 2011</title>
    <link>https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011</link>
    <description>
        &lt;b&gt;The National Campaign for People's Right to Information (NCPRI) and Centre for Communication Governance at National Law University, Delhi (CCG at NLUD) invite you to a consultation to draft rules under the Whistle Blowers Protection Act, 2011. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The consultation will bring together various stakeholders to discuss the initial stages of framing the draft rules for the legislation. It will take place from 10:00 a.m. to 5:00 p.m. on July 5, 2014 at National Law University, Delhi. Bhairav Acharya will be participating in this event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Click to download:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/consultation-to-frame-rules-under-whistle-blowers-protection-act-2014.pdf" class="internal-link"&gt;Consultation to Frame Rules under the Whistle Blowers Protection Act, 2014&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/whistle-blowers-protection-act-2014.pdf" class="internal-link"&gt;The Whistle Blowers Protection Act, 2014&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011'&gt;https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-02T08:03:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/icann2019s-documentary-information-disclosure-policy-2013-i-didp-basics">
    <title>ICANN’s Documentary Information Disclosure Policy – I: DIDP Basics</title>
    <link>https://cis-india.org/internet-governance/blog/icann2019s-documentary-information-disclosure-policy-2013-i-didp-basics</link>
    <description>
        &lt;b&gt;In a series of blogposts, Vinayak Mithal analyses ICANN's reactive transparency mechanism, comparing it with freedom of information best practices. In this post, he describes the DIDP and its relevance for the Internet community.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Internet Corporation for Assigned Names and Numbers (“ICANN”) is a non-profit corporation incorporated in the state of California and vested with the responsibility of managing the DNS root, generic and country-code Top Level Domain name system, allocation of IP addresses and assignment of protocol identifiers. As an internationally organized corporation with its own multi-stakeholder community of Advisory Groups and Supporting Organisations, ICANN is a large and intricately woven governance structure. Necessarily, ICANN undertakes through its Bye-laws that “&lt;i&gt;in performing its functions ICANN shall remain accountable to the Internet community through mechanisms that enhance ICANN’s effectiveness&lt;/i&gt;”. While many of its documents, such as its Annual Reports, financial statements and minutes of Board meetings, are public, ICANN has instituted the Documentary Information Disclosure Policy (“DIDP”), which like the RTI in India, is a mechanism through which public is granted access to documents with ICANN which are not otherwise available publicly. It is this policy – the DIDP – that I propose to study.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a series of blogposts, I propose to introduce the DIDP to unfamiliar ears, and to analyse it against certain freedom of information best practices. Further, I will analyse ICANN’s responsiveness to DIDP requests to test the effectiveness of the policy. However, before I undertake such analysis, it is first good to know what the DIDP is, and how it is crucial to ICANN’s present and future accountability.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;What is the DIDP?&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One of the core values of the organization as enshrined under Article I Section 4.10 of the Bye-laws note that “in performing its functions ICANN shall remain accountable to the Internet community through mechanisms that enhance ICANN’s effectiveness”. Further, Article III of the ICANN Bye-laws, which sets out the transparency standard required to be maintained by the organization in the preliminary, states - “ICANN and its constituent bodies shall operate to the maximum extent feasible in an open and transparent manner and consistent with procedures designed to ensure fairness”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Accordingly, ICANN is under an obligation to maintain a publicly accessible website with information relating to its Board meetings, pending policy matters, agendas, budget, annual audit report and other related matters. It is also required to maintain on its website, information about the availability of accountability mechanisms, including reconsideration, independent review, and Ombudsman activities, as well as information about the outcome of specific requests and complaints invoking these mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pursuant to Article III of the ICANN Bye-laws for Transparency, ICANN also adopted the DIDP for disclosure of publicly unavailable documents and publish them over the Internet. This becomes essential in order to safeguard the effectiveness of its international multi-stakeholder operating model and its accountability towards the Internet community. Thereby, upon request made by members of the public, ICANN undertakes to furnish documents that are in possession, custody or control of ICANN and which are not otherwise publicly available, provided it does not fall under any of the defined conditions for non-disclosure. Such information can be requested via an email to &lt;a href="mailto:didp@icann.org"&gt;didp@icann.org&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Procedure&lt;/strong&gt;&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Upon the receipt of a DIDP request, it is reviewed by the ICANN staff.&lt;/li&gt;
&lt;li&gt;Relevant documents are identified and interview of the appropriate staff members is conducted.&lt;/li&gt;
&lt;li&gt;The documents so identified are then assessed whether they come under the ambit of the conditions for non-disclosure. 
&lt;ul&gt;
&lt;li&gt;Yes - A review is conducted as to whether, under the particular circumstances, the public interest in disclosing the documentary information outweighs the harm that may be caused by such disclosure. &lt;/li&gt;
&lt;li&gt;Documents which are considered as responsive and appropriate for public disclosure are posted on the ICANN website.&lt;/li&gt;
&lt;li&gt;In case of request of documents whose publication is appropriate but premature at the time of response then the same is indicated in the response and upon publication thereafter, is notified to the requester.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;strong&gt;Time Period and Publication &lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The response to the DIDP request is prepared by the staff and is made available to the requestor within a period of 30 days of receipt of request via email. The Request and the Response is also posted on the DIDP page &lt;a href="http://www.icann.org/en/about/transparency"&gt;http://www.icann.org/en/about/transparency&lt;/a&gt; in accordance with the posting guidelines set forth at &lt;a href="http://www.icann.org/en/about/transparency/didp"&gt;http://www.icann.org/en/about/transparency/didp&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Conditions for Non-Disclosure&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There are certain circumstances under which ICANN may refuse to provide the documents requested by the public. The conditions so identified by ICANN have been categorized under 12 heads and includes internal information, third-party contracts, non-disclosure agreements, drafts of all reports, documents, etc., confidential business information, trade secrets, information protected under attorney-client privilege or any other such privilege,  information which relates to the security and stability of the internet, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, ICANN may refuse to provide information which is not designated under the specified conditions for non-disclosure if in its opinion the harm in disclosing the information outweighs the public interest in disclosing the information. Further, requests for information already available publicly and to create or compile summaries of any documented information may be declined by ICANN.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Grievance Redressal Mechanism &lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In certain circumstances the requestor might be aggrieved by the response received and so he has a right to appeal any decision of denial of information by ICANN through the Reconsideration Request procedure or the Independent Review procedure established under Section 2 and 3 of Article IV of the ICANN Bye-laws respectively. The application for review is made to the Board which has designated a Board Governance Committee for such reconsideration. The Independent Review is done by an independent third-party of Board actions, which are allegedly inconsistent with the Articles of Incorporation or Bye-laws of ICANN.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Why does the DIDP matter?&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The breadth of ICANN’s work and its intimate relationship to the continued functioning of the Internet must be appreciated before our analysis of the DIDP can be of help. ICANN manages registration and operations of generic and country-code Top Level Domains (TLD) in the world. This is a TLD:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/internet-governance/blog/TLD.jpg/@@images/1bb21859-d1aa-41c6-b5e0-4041ae099f54.jpeg" alt="TLD" class="image-inline" title="TLD" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(&lt;i&gt;Source&lt;/i&gt;: &lt;a class="external-link" href="http://geovoices.geonetric.com/wp-content/uploads/2013/11/parts_of_a_domain_name.jpg"&gt;here&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Operation of many gTLDs, such as .com, .biz or .info, is under contract with ICANN and an entity to which such operation is delegated. For instance, Verisign operates the .com Registry. Any organization that wishes to allow others to register new domain names under a gTLD (sub-domains such as ‘benefithealth’ in the above example) must apply to ICANN to be an ICANN-accredited Registrar. GoDaddy, for instance, is one such ICANN-accredited Registrar. Someone like you or me, who wants to  get our own website – say, vinayak.com – buys from GoDaddy, which has a contract with ICANN under which it pays periodic sums for registration and renewal of individual domain names. When I buy from an ICANN-accredited Registrar, the Registrar informs the Registry Operator (say, Verisign), who then adds the new domain name (vinayak.com) to its registry list, and then it can be accessed on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN’s reach doesn’t stop here, technically. To add a new gTLD, an entity has to apply to ICANN, after which the gTLD has to be added to the root file of the Internet. The root file, which has the list of all TLDs (or all ‘legitimate’ TLDs, some would say), is amended by Verisign under its tripartite contract with the US Government and ICANN, after which Verisign updates the file in its ‘A’ &lt;a href="http://root-servers.org/"&gt;root server&lt;/a&gt;. The other 12 root servers use the same root file as the Verisign root server. Effectively, this means that &lt;i&gt;only &lt;/i&gt;ICANN-approved TLDs (and all sub-domains such as ‘benefithealth’ or ‘vinayak’) are available across the Internet, on a global scale. Or at least, ICANN-approved TLDs have the most and widest reach. ICANN similarly manages country-code TLDs, such as .in for India, .pk for Pakistan or .uk for the United Kingdom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All of this leads us to wonder whether the extent of ICANN’s voluntary and reactive transparency is sufficient for an organization of such scale and impact on the Internet, perhaps as much impact as the governments do. In the next post, I will analyse the DIDP’s conditions for non-disclosure of information with certain freedom of information best practices.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Vinayak Mithal is a final year student at the Rajiv Gandhi National University of Law, Punjab. His interests lie in Internet governance and other aspects of tech law, which he hopes to explore during his internship at CIS and beyond. He may be reached at vinayakmithal@gmail.com.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/icann2019s-documentary-information-disclosure-policy-2013-i-didp-basics'&gt;https://cis-india.org/internet-governance/blog/icann2019s-documentary-information-disclosure-policy-2013-i-didp-basics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vinayak Mithal</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>DIDP</dc:subject>
    
    
        <dc:subject>Transparency</dc:subject>
    

   <dc:date>2014-07-01T13:01:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/june-2014-bulletin">
    <title>June 2014 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/june-2014-bulletin</link>
    <description>
        &lt;b&gt;Our newsletter for month of June is below:&lt;/b&gt;
        &lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Nehaa Chaudhari participated in a Stakeholders Consultation organized by the Planning Commission and the Ministry of Human Resource Development in New Delhi, February 21, 2014, on Mapping Institutions of Intellectual Property. She blogged about the outcome in a two-part series. The first part discusses establishment of a National Institute of Intellectual Property Rights and the second part deals with the documents introduced at the Stakeholders’ Consultation for India’s National Programme on Intellectual Property.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;For the first time in the history of Indian books, 10 Telugu books by a single author were released under Creative Commons license (CC-BY-SA 3.0). These books will be uploaded on Telugu Wikisource and converted into Unicode (searchable) text. This will ensure that these books are freely read, both online and offline in various formats like PDF, epub, mobi, text, etc. This is a major milestone initiative by CIS-A2K to make the sum of all knowledge in Telugu freely available to all Telugus over the internet.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;ICANN published a call for public comments on "Enhancing ICANN Accountability" in the wake of the IANA stewardship transition spearheaded by ICANN and related concerns of ICANN's external and internal accountability mechanisms. CIS submitted its comments.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;ICANN sought comments on the existing barriers to Registrar Accreditation and operation and suggestions on how these challenges might be mitigated. CIS sent its comments.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Vodafone, the world’s second largest mobile carrier released a report disclosing to what extent governments can request their customers’ data. Joe Sheehan analyses the report to tell us that if more companies were transparent about the level of government surveillance their customers were being subjected to then the public would press the government for stronger privacy safeguards and protections.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India. We compiled the National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). We will be publishing this soon. The draft chapters along with the quarterly reports can be accessed on the &lt;a href="https://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed &lt;a href="https://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NVDA and eSpeak&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;►Monthly Update&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/nvda-e-speak-update-june-2014.pdf"&gt;Work Report for June&lt;/a&gt; (by Suman Dogra, June 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Other&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Blog Entry&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/for-a-truly-inclusive-consultative-process"&gt;For a Truly Inclusive Consultative Process&lt;/a&gt; (by Amba Salelkar, June 25, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Media Coverage&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/the-new-indian-express-june-26-2014-nish-website-to-help-disabled"&gt;NISH Website to Help the Disabled&lt;/a&gt; (The New Indian Express, June 26, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k"&gt;Access to Knowledge&lt;br /&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Analysis&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/mapping-institutions-of-intellectual-property-part-a"&gt;Mapping Institutions of Intellectual Property (Part A): India's National Programme on Intellectual Property Management&lt;/a&gt; (by Nehaa Chaudhari, June 10, 2014). This discusses establishment of a National Institute of Intellectual Property Rights.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/mapping-institutions-of-intellectual-property-part-b"&gt;Mapping Institutions of Intellectual Property: Part B — India's National Program on Intellectual Property Management&lt;/a&gt; (by Nehaa Chaudhari, June 26, 2014). This deals with the documents introduced at the Stakeholders’ Consultation for India’s National Program on Intellectual Property&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Participation in Event&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making"&gt;Yogyakarta Meeting on Open Culture and Critical Making&lt;/a&gt; (organized by organized by HONF Foundation, Catec, and r0g, June 12 – 15, 2014). Sharath Chandra Ram was a panelist.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following were done this month:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Articles / Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/twitter-weekly-curation-wearewikipedia-brings-one-wikipedian-every-week"&gt;Twitter weekly Curation WeAreWikipedia brings one Wikipedian Every Week&lt;/a&gt; (by Diptiman Panigrahi, June 16, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/global-voices-online-june-18-2014-subhashish-panigrahi-twitter-account-puts-a-face-to-unsung-volunteer-editors-behind-wikipedia"&gt;This Twitter Account Puts a Face to the Unsung Volunteer Editors Behind Wikipedia&lt;/a&gt; (by Subhashish Panigrahi, Global Voices, June 18, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/odia-language-gets-new-unicode-font-converter"&gt;Odia Language gets a new Unicode Font Converter&lt;/a&gt; (by Subhashish Panigrahi, June 20, 2014). &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/ten-telugu-books-re-released-under-cc-by-sa-license"&gt;Ten Telugu Books Re-released Under CC-BY-SA 3.0 License&lt;/a&gt; (by Rahmanuddin Shaik, June 22, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt; ►Events Organized&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://commons.wikimedia.org/wiki/Category:Kannada_Wikipedia_workshop_for_Kannada_Book_lovers"&gt;Kannada Wikipedia Workshop for Kannada Book Lovers&lt;/a&gt; (co-organized by Navakarnataka Publications, Bangalore, June 4, 2014). Dr. U.B.Pavanaja conducted the workshop. &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/events/knowledge-and-openness-in-digital-era"&gt;Knowledge and Openness in the Digital Era&lt;/a&gt; (co-organized by Andhra Loyola College and CIS, Vijaywada, June 24-25, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►News and Media Coverage&lt;br /&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/coverage-of-event-in-vijaywada-june-25-2014-sakshi"&gt;Knowledge and Openness in the Digital Era: Coverage in Sakshi&lt;/a&gt; (Sakshi, June 25, 2014). &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/eenadu-june-25-2014-coverage-of-vijaywada-event"&gt;Knowledge and Openness in the Digital Era: Coverage in Enadu&lt;/a&gt; (Enadu, June 25, 2014). &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/the-new-indian-express-june-25-2014-loyola-faculty-enlightened-about-open-edn-resources"&gt;Loyola Faculty Enlightened About Open Edn Resources&lt;/a&gt; (The New Indian Express, June 25, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Freedom of Expression&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of our project on Freedom of Expression (funded through a grant from the MacArthur Foundation)  to study the restrictions placed on freedom of expression online by the Indian government and contribute to the debates around Internet governance and freedom of expression at forums like ICANN, ITU, IGF, WSIS, etc., we bring you the following outputs:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Submissions&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-comments-enhancing-icann-accountability"&gt;CIS Comments: Enhancing ICANN Accountability&lt;/a&gt; (by Geetha Hariharan, June 10, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-comments-supporting-the-dns-industry-in-underserved-regions"&gt;Comments to ICANN Supporting the DNS Industry in Underserved Regions&lt;/a&gt; (by Jyoti Panday, June 13, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/free-speech-and-contempt-of-court-2013-i-overview"&gt;Free Speech and Contempt of Court: Overview&lt;/a&gt; (by Gautam Bhatia, June 8, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/multi-stakeholder-models-of-internet-governance-within-states-why-who-how"&gt;Multi-stakeholder Models of Internet Governance within States: Why, Who &amp;amp; How?&lt;/a&gt; (by Geetha Hariharan, June 16, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online"&gt;UN Human Rights Council Urged to Protect Human Rights Online&lt;/a&gt; (by Geetha Hariharan, June 19, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/free-speech-and-source-protection-for-journalists"&gt;Free Speech and Source Protection for Journalists&lt;/a&gt; (by Gautam Bhatia, June 19, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report"&gt;WSIS+10 High Level Event: A Bird's Eye Report&lt;/a&gt; (by Geetha Hariharan, June 20, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/understanding-iana-transition"&gt;Understanding IANA Stewardship Transition&lt;/a&gt; (by Smarika Kumar, June 22, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;IANA Transition: Suggestions for Process Design&lt;/a&gt; (by Smarika Kumar, June 22, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/free-speech-and-civil-defamation"&gt;Free Speech and Civil Defamation&lt;/a&gt; (by Gautam Bhatia, June 25, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-policy-brief-iana-transition-fundamentals-and-suggestions-for-process-design"&gt;CIS Policy Brief: IANA Transition Fundamentals &amp;amp; Suggestions for Process Design&lt;/a&gt; (by Geetha Hariharan and Smarika Kumar, June 22, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework"&gt;An Evidence based Intermediary Liability Policy Framework: Workshop at IGF&lt;/a&gt; (by Jyoti Panday, June 30, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►FOEX Live&lt;br /&gt;We are also posting a selection of news from across India implicating online freedom of expression and use of digital technology: &lt;a href="https://cis-india.org/internet-governance/blog/foex-live-june-8-15-2014"&gt;June 8 – 15, 2014&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/blog/foex-live-june-16-23-2014"&gt;June 16 – 23, 2014&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of our Surveillance and Freedom: Global Understandings and Rights Development (SAFEGUARD) project with Privacy International we are engaged in enhancing respect for the right to privacy in developing countries. We have produced the following outputs during the month:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act"&gt;A Review of the Functioning of the Cyber Appellate Tribunal and Adjudicatory Officers under the IT Act&lt;/a&gt; (by Divij Joshi, June 16, 2014). &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/content-removal-on-facebook"&gt;Content Removal on Facebook — A Case of Privatised Censorship?&lt;/a&gt; (by Jessamine Mathew, June 16, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data"&gt;Vodafone Report Explains Government Access to Customer Data&lt;/a&gt; (by Joe Sheehan, June 16, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt; ►Event Organized&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/privacy-surveillance-roundtable"&gt;Privacy and Surveillance Roundtable&lt;/a&gt; (co-organized with the Cellular Operators Association of India and the Council for Fair Business Practices, June 28, 2014, IMC Building, Churchgate, Mumbai).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt; ►Participation in Events&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/common-wealth-domain-name-system-forum-2014"&gt;Commonwealth Domain Name System Forum 2014&lt;/a&gt; (organized by the CTO, hosted by ICANN, and supported by Nominet and the Public Interest Registry, London, June 19, 2014). Pranesh Prakash was a panelist. Jyoti Panday participated in the event.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/research-advisory-network-meeting"&gt;Research Advisory Network Meeting&lt;/a&gt; (organized by the Global Commission on Internet Governance’s Research Advisory Network, OECD Headquarters, Paris, June 26-27, 2014). Sunil Abraham was a panelist.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news"&gt;►News &amp;amp; Media Coverage&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/livemint-leslie-d-monte-june-5-2014-right-to-be-forgotten-poses-legal-dilemma-in-india"&gt;Right to be forgotten poses a legal dilemma in India&lt;/a&gt; (by Leslie D' Monte, Livemint, June 5, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/the-hindu-june-11-2014-sunita-sekhar-stay-connected-even-when-you-go-underground"&gt;Stay connected even when you go underground&lt;/a&gt; (by Sunita Sekhar, The Hindu, June 12, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new conversations and debates that shape the contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/not-a-goodbye-more-a-come-again"&gt;Not a Goodbye; More a ‘Come Again’: Thoughts on being Research Director at a moment of transition&lt;/a&gt; (by Nishant Shah, June 15, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/living-in-the-archival-moment"&gt;Living in the Archival Moment&lt;/a&gt; (by P.P. Sneha, June 19, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Newspaper Column&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-june-5-2014-a-great-start-for-modi-government"&gt;A Great Start (for the Modi government)&lt;/a&gt; (by Shyam Ponappa, Business Standard and Organizing India Blogspot, June 5, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/june-2014-bulletin'&gt;https://cis-india.org/about/newsletters/june-2014-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2014-07-14T10:05:11Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-and-surveillance-roundtable-new-delhi">
    <title>Privacy and Surveillance Roundtable</title>
    <link>https://cis-india.org/internet-governance/events/privacy-and-surveillance-roundtable-new-delhi</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society and the Cellular Operators Association of India invite you to a roundtable at the India International Centre, New Delhi on July 4, 2014.&lt;/b&gt;
        &lt;h3&gt;Background and Context to the Roundtables&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, lawful interception of communications may be conducted by the state in three ways: firstly, intercepting telephone calls and other telecommunications may take place under powers listed in the Telegraph Act, 1885 and procedure set out in the Telegraph Rules, 1951; secondly, intercepting written communications transmitted through the postal service or by private couriers may occur under the Post Office Act, 1898; and, thirdly, intercepting, de-crypting, and monitoring email messages and other electronic communications may take place under the Information Technology Act, 1950 and two sets of Rules issued in 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government’s intention to create a Central Monitoring System to automate the existing process of telephone tapping is significant for a number of reasons. It will bypass private telephone service providers; currently the active cooperation of TSPs is required and compelled in order to intercept and monitor a telephone conversation. This creates an extra layer of compliance activity for TSPs which is cumbersome and expensive. Interception orders from the state often do not comply with the procedure required by law. This uncertainty is compounded by the lack of an indemnity for TSPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, while the CMS will release TSPs from legal liability, it will leave the government free to conduct telephone interceptions in absolute secrecy and without a credible system of oversight and checks and balances. Amongst the world’s major democratic countries, India is alone in refusing to overhaul its telephone tapping regime. The legal requirements of probable cause, judicial sanction, and warrant-based interception – which are followed with exceptions in democracies around the world – are not adequately protected in India.  The same principles also apply to the interception of postal and electronic communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several intelligence and police agencies in India that conduct interceptions of communications without central coordination. Previous cases in the Supreme Court of India and a few Indian High Courts reveal many cases of improper and even illegal surveillance. The sheer number of interested state agencies, the concerns of inadequate oversight, the lack of a credible legal regime, the constant leaks of private communications, and the poor legal protection given to TSPs and ISPs must be legally addressed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information about the Roundtables&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Privacy and Surveillance Roundtables are a CIS initiative, in partnership with the Cellular Operators Association of India (COAI).  From June 2014 – November 2014, CIS and COAI will host seven Privacy and Surveillance Roundtable discussions across multiple cities in India. The Roundtables will be closed-door deliberations involving multiple stakeholders. Through the course of these discussions we aim to deliberate upon the current legal framework for surveillance in India, and discuss possible frameworks for surveillance in India. The provisions of the draft CIS Privacy Bill 2013, the International Principles on the Application of Human Rights to Communication Surveillance, and the Report of the Group of Experts on Privacy will be used as background material and entry points into the discussion. The recommendations and dialogue from each roundtable will be compiled and submitted to the Department of Personnel and training.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Report of the Group of Experts on Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In January 2012 Justice A.P. Shah formed a committee to create a report of recommendations for privacy legislation in India. The committee met seven times from January 2012 to September 2012.  The Report is made up of six chapters and begins by reviewing the international best practices around privacy and the relevant Indian jurisprudence. The Report then recommends nine National Privacy Principles to be adopted by each sector in India. The Nine National Privacy Principles reflect international standards, as well as taking into consideration the Indian context. Along with the National Privacy Principles, the Report lays out a regulatory framework for privacy including privacy commissioners at the regional and national level, self regulating organizations at the industry level, and a system of complaints. Finally the report demonstrates how the National Privacy Principles could be used to harmonize existing legislation and practices.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Draft CIS Citizens Privacy (Protection) Bill 2013&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been researching privacy in India since 2010 with the objective of raising public awareness, completing in depth research, and driving a privacy legislation in India. As part of this work, the Centre for Internet and Society has drafted the Privacy (Protection) Bill 2013. The Citizens Privacy Protection Bill contains provisions that speak to data protection, interception, and surveillance. The Bill also establishes the powers and functions of the privacy commissioner, and lays out offenses and penalties for contravention of the Act. The Bill represents a citizens’ version of a privacy legislation, and will be shared with civil society, industry, and government. It is hoped that the review and revision of the Bill will be a participatory process, and thus comments and feedback to it’s’ provisions will be included as annex’s to the Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The International Principles on the Application of Human Rights to Communication Surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These principles were defined in 2013 in response to rapidly changing technologies and surveillance practices. The principles are the outcome of a global consultation with civil society groups, industry and international experts in communications surveillance law, policy and technology, spearheaded by the Electronic Frontier Foundation US and Privacy International UK. As technologies that facilitate State surveillance of communications advance, States are failing to ensure that laws and regulations related to communications surveillance adhere to international human rights and adequately protect the rights to privacy and freedom of expression. These principles attempt to explain how international human rights law applies in the current digital environment, particularly in light of the increase in and changes to communications surveillance technologies and techniques. These principles can provide civil society groups, industry, States and others with a framework to evaluate whether current or proposed surveillance laws and practices are consistent with human rights.&lt;/p&gt;
&lt;h3&gt;Tentative Agenda&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.00&lt;br /&gt;11.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Introduction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00&lt;br /&gt;11.30&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30&lt;br /&gt;13.00&lt;/td&gt;
&lt;td&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00&lt;br /&gt;14.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00&lt;br /&gt;16.00&lt;/td&gt;
&lt;td&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.00&lt;br /&gt;16.15&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h3&gt;Resources&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf" class="external-link"&gt;CIS &lt;span class="highlightedSearchTerm"&gt;Privacy&lt;/span&gt; Protection Bill, 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://en.necessaryandproportionate.org/text"&gt;International Principles on the Application of Human Rights to Communication &lt;span class="highlightedSearchTerm"&gt;Surveillance&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;The Report of the Group of Experts on &lt;span class="highlightedSearchTerm"&gt;Privacy&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-and-surveillance-roundtable-new-delhi'&gt;https://cis-india.org/internet-governance/events/privacy-and-surveillance-roundtable-new-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-29T14:50:20Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-icann-50">
    <title>Report on ICANN 50</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-icann-50</link>
    <description>
        &lt;b&gt;Jyoti Panday attended ICANN 50 in London from 22-26 June. Below are some of the highlights from the meeting. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;From 22- 26 June, ICANN hosted its 50&lt;sup&gt;th&lt;/sup&gt; meeting in London, the largest congregation of participants, so far. In the wake of the IANA transition announcement, Internet governance was the flavor of the week. ICANN’s transparency and accountability measures emerged as much contested notions as did references to NETmundial. This ICANN meeting clearly demonstrated that questions as to the role of ICANN in internet governance need to be settled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;ATLAS II&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Coinciding with ICANN meeting was the 2&lt;sup&gt;nd&lt;/sup&gt; At-Large Summit, or ATLAS II, bringing together a network of regionally self organized and self supporting At-Large structures, representing individual Internet users throughout the world. The goal of the meeting was to discuss, reach consensus and draft reports around five issues organized around five issues organized around thematic groups of issues of concerns to the At-Large Community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The subjects for the thematic groups were selected by the representatives of ALSes, each summit participant was allocated to thematic groups according to his/her preferences. The groups included were:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Future of Multistakeholder models &lt;/li&gt;
&lt;li&gt;The Globalization of ICANN &lt;/li&gt;
&lt;li&gt;Global Internet: The User perspective &lt;/li&gt;
&lt;li&gt;ICANN Transparency and Accountability &lt;/li&gt;
&lt;li&gt;At-Large Community Engagement in ICANN &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Fahad Chehade Five Point Agenda &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN President, Mr Chehade in his address to the ICANN community covered five points which he felt were important for ICANN in planning its future role.  The first topic was the &lt;a href="http://icannwiki.com/IANA" title="IANA"&gt;IANA&lt;/a&gt; Stewardship and transition, and he stated that ICANN is committed to being a transparent organization and seeks to be more accountable to the community as the contract with the US government ends. Regarding the IANA transition, he remarked that ICANN had received thousands of comments and proposals regarding the transition of IANA stewardship and understood there would be much more discussion on this subject, and that a coordination group has been proposed of 27 members representing all different stakeholders in order to plot the course forward for IANA transition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His second topic was about ICANN globalization and hardening of operations. He said that ICANN has about 2-3 years to go before he is comfortable that ICANN operations are where they need to be. He applauded the new service channels which allows customer support in many different languages and time zones, and mentioned local language support that would add to the languages in which ICANN content is currently available. Chehade spent a few minutes discussing the future of WHOIS "Directory" technology and highlighted the initial report that a working group had put together, led by Jean-Francois Poussard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Next he covered the GDD, the Global Domains Division of ICANN and an update from that division on the New gTLD program. He mentioned the ICANN Auction, the contracts that had been signed, and the number of New gTLDs that had already been delegated to the Root. Internet Governance was Chehade's 4th topic of discussion, he applauded the NETmundial efforts, though he stressed that internet governance is one of the things that ICANN does and it will not be a high priority. He ended his speech with his last point, calling for more harmony within the ICANN community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;High Level Government Meeting&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During ICANN London, UK government hosted a high-level meeting, bringing together representatives from governments of the world to discuss Internet Governance and specifically the NTIA transition of the IANA contract.  Government representatives recognized that the stewardship of IANA should be a shared responsibility between governments and private sector groups, while other representatives stressed giving governments a stronger voice than other stakeholders. The consensus at the meeting held that the transition should not leave specific governments or interest groups with more control over the Internet, but that governments should have a voice in political issues in Internet Governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;GAC Communiqué&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;GAC Communique, is a report drafted by the &lt;/b&gt;Governmental Advisory Committee, advising the ICANN board on decisions involving policy and implementation. Highlights from the communiqué include:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The GAC advises the Board regarding the .africa string, saying it would like to see an expedited process, especially once the Independent Review Panel comes to a decision regarding the two applicants for the string. They reaffirm their decision that DotConnectAfrica's application should not proceed.&lt;/li&gt;
&lt;li&gt;The GAC mentioned the controversy surrounding .wine and .vin, where some European GAC representatives strongly felt that the applications for these strings should not proceed without proper safeguards for geographic names at the second level. However, the GAC was unable to reach consensus advice regarding this issue and thus did not relay any formal advice to the Board.&lt;/li&gt;
&lt;li&gt;The GAC requested safeguards in the New gTLDs for IGO (Inter-Governmental Organization) names at the second level, and specifically related such advice for names relating to Red Cross and Red Crescent. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil Society in ICANN and Internet Governance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NCUC, or the Noncommercial Users Constituency www.ncuc.org,  voice of civil society in ICANN’s policy processes on generic top level domain names and related matters, as well as other civil society actors from the ICANN community organized a workshop to provide an opportunity for open and vigorous dialogue between public interest advocates who are active both within and outside the ICANN community.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-icann-50'&gt;https://cis-india.org/internet-governance/blog/report-on-icann-50&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-10-12T05:42:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations">
    <title>PMA Policy and COAI Recommendations </title>
    <link>https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Ministry of Communications and Information Technology on the 10th of February, 2012 released a notification &lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt; in the Official Gazette outlining the Preferential Market Access &lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt; Policy for Domestically Manufactured Electronic Goods 2012. The Policy is applicable to procurement of telecom products by Government Ministries/Departments and to such electronics that had been deemed to having security concerns, thus making the policy applicable to private bodies in the latter half. The Notification reasoned that preferential access was to be given to domestically manufactured electronic goods predominantly for security reasons. Each Ministry or Department was to notify the products that had security implications, with reasons, after which the notified agencies would be required to procure the same from domestic manufacturers. This policy was also meant to be applicable to even procurement of electronic goods by Government Ministries/Agencies for Governmental purposes except Defence. Each Ministry would be required to notify its own percentage of such procurement, though it could not be less than 30%, and also had to specify the Value Addition that had to be made to a particular product to qualify it as a domestically manufactured product, with the policy again specifying the minimum standards. The policy was also meant for procurement of electronic hardware as a service from Managed Service Providers (MSPs).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The procurement was to be done as according to the policies of the each procuring agency. The tender was to be apportioned according to the procurement percentage notified and the preference part was to be allotted to the domestic manufacturer at the lowest bid price. If there were no bidders who were domestic manufacturers or if the tender was not severable, then it was to be awarded to the Foreign Manufacturer and the percentage adjusted as against other electronic procurement for that period.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Telecom equipment that qualifies as domestically manufactured telecom products for preferential market access include: encryption and UTM platforms, Core/Edge/Enterprise routers, Managed leased line network equipment, Ethernet Switches, IP based Soft Switches, Media gateways, Wireless/Wireline PABXs, CPE, 2G/3G Modems, Leased-line Modems, Set Top Boxes, SDH/Carrier Ethernet/Packet Optical Transport Eqiupments, DWDN systems, GPON equipments, Digital Cross connects, small size 2G/3G GSM based Base Station Systems, LTE based broadband wireless access systems, Wi-Fi based broadband wireless access systems, microwave radio systems, software defined radio cognitive radio systems, repeaters, IBS, and distributed antenna system, satellite based systems, copper access systems, network management systems, security and surveillance communication systems (video and sensors based), optical fiber cable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy also mentioned the creation of a self-certification system to declare domestic value addition to the vendor. The checks would be done by the laboratories accredited by the Department of Information Technology. The policy was to be in force for a period of 10 years and any dispute concerning the nature of product was to be referred to the Department of Information Technology.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;International and Domestic Response to the Policy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There was a large scale opposition, usually from international sectors, towards the mooting of this policy. Besides business houses, even organizations like those of the United States Trades Representatives criticized the policy as being harmful to the global market and in violation of the World Trade Organization Guidelines.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Criticism also poured in from domestic bodies in terms of recommendations towards modification of the policy largely on three grounds: (i) the high domestic value addition requirement and the method of calculation of the same, (ii) the lack of a link between manufacturing and security and (iii) application of the policy to the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Cellular Operations Association of India (COAI) in a letter dated March 15, 2012 to the Secretary of the Department Technology and Chairman of the Telecom Commission expressed its views on the telecom manufacturing in the country.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;The COAI stated that such a development had to be done realistically and holistically so that the whole eco-system was developed as a comprehensive whole. In that regard it also forwarded a study that had been commissioned by COAI and conducted by M/s. Booz and Company titled “Telecom Manufacturing Policy – Developing an Actionable Roadmap”. The report was a comprehensive study of the telecom industry and outlined the challenges and opportunities that lay on its development trajectory. It also talked about Government involvement in the development process. The Report while citing the market share of Indian Telecom Industry which would be around 3% &lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt; of the Global Market highlighted the fact that no country could be self-sufficient in technology. It further talked about the development of local clusters in order to cut costs and encourage manufacturing, while ensuring that the PMA Policy was consistent with the WTO Guidelines. It further recommended opening up of foreign investments and making capital available to ensure growth of innovation. Finally it highlighted the lack of a connection between manufacturing and security and instead stressed upon proper certification, checks and development of a comprehensive CIIP framework across all sensitive networks for security purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a further letter to the Joint Secretary of the Department of Information and Technology dated April 25, 2012 the COAI expressed some reservations concerning the draft guidelines that had been published along with the notification.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; While stressing upon the fact that a higher value addition would be impossible with the lack of basic manufacturing capabilities for the development of technological units, it also highlighted the need to redefine Bill of Materials which had been left ambiguous and subject to exploitation. It further highlighted the fact that allowing every Ministry to make its own specifications would lead to inconsistent definitions and an administrative challenge and hence such matters should be handled by a Central Body. Furthermore it opined that the calculation of BOMs and the Value Additions should be done using the concept of substantial transformation as has been given in the Booz Study. Furthermore, while discouraging the use of disincentives, it stated that one individual Ministry should be in charge of specifying such incentives to avoid confusion and for the sake of ease of business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another letter to a Member of the Department of Telecommunications dated July 12, 2012 the COAI stressed upon the futility of having high value additions as the same was impossible under the present scenario.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; There was a lack of manufacturing sector which had to be comprehensively developed backed by fiscal incentives and comprehensive policies. In spite of that, it stressed that no country could become self-reliant and that such policies, like the PMA, were reminiscent of the “license and permit raj” era. It further said that such policies should be consistent with WTO Guidelines and should not give undue preference to domestic manufacturers to the detriment of other manufacturers. Countering the security aspect, it said that the same had been addressed by the DoT License Amendment of May 31, 2011 whereby all equipments on the network would have to comply with the “Safe to Connect” standard, and stressed upon the lack of any link between manufacturing and security. Furthermore for calculation of Value Addition it suggested an alternative to the method proposed by the Government as the same would lead to disclosures of sensitive commercial information which were contained in the BOMs. The COAI said that the three stages as laid out in the Substantial Transformation (as mentioned in the Booz Study) should be used for calculating the VA. It made several proposals to develop the telecom manufacturing industry in India including provision of fiscal incentives, development of telecom clusters and comprehensive policies which led to harmonization with laws and creation of SEZs among other such benefits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In October 2012 the Government released a draft notification notifying products due to security consideration in furtherance of the PMA Policy.&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;The document outlined the minimum PMA and VA specification for a range of products. It also stated several security reasons for pursuing such a policy and stated that India had to be completely self-reliant for its active telecom products. It also contained data on the predicted growth of the telecom market in India. The COAI thereafter released a document commenting upon the draft notification of the Government.&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides highlighting the fact that the COAI still had not received a response to its former comments, it again stressed upon the lack of a link between security and manufacturing. It reiterated its point on the impossibility of a complete self-reliance on any nation’s part, and stressed upon the need of involving other stakeholders in the promulgation of such policies. It also made changes to the notified list of equipments, reclassifying it according to technology and only listing equipments which had volumes. Furthermore it also suggested changes towards the calculation of value addition to include materials sourced from local suppliers, in-house assemblage to be considered local material and the calculation to be done for complete order and not for each item in the order. It further recommended a study be conducted and the industry be involved while predicting demands as such were dated and needed revision. The Government thereafter released a revised notification&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; on October 5, 2012 but it did not contain much of the commented changes that the COAI had proposed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thereafter in April 2013, the DeitY released draft guidelines&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; for providing preference to domestically manufactured electronic products in Government Procurement in further of the second part of the PMA Policy. The guidelines besides containing definitions to several terms such as BOM also prescribed a minimum of 20% domestic procurement while leaving the specifications onto individual Ministries. It recommended the establishment of a technical committee by the concerned Ministry or Department that would recommend value addition to products. It followed a BOM based calculation of Value Addition while leaving the matter of certification to be dealt by DeitY certified laboratories that are notified for such purposes by the concerned Ministry/Department. DeitY was the nodal ministry for monitoring the implementation of the policy while particular monitoring was left to each Ministry or Department concerned. Among the annexures were indicative lists of generic and telecom products and a format for Self Certification regarding Domestic Value Addition in an Electronic Product.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI thereafter released a revised draft containing its own comments on April 15, 2013.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; The COAI pointed out faults in the definition of BOM. It highlighted the difficulty in splitting R&amp;amp;D according to countries, and also stressed upon the impractical usage of BOM in calculation of value addition as the same was confidential business information. As it had already suggested earlier, it reiterated the usage of the Substantial Transformation process for the calculation of Value Addition. While removing the lists of equipments mentioned, it further pointed out that the disqualification in the format for self-certification would be a very harsh disincentive and would result in driving away manufacturers. It suggested that there should be incentives for compliance instead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI along with the Association of Unified Telecom Service Providers of India sent a letter dated January 24, 2013 to the Secretary, DoT containing their inputs on Draft List of Security Sensitive Telecom Products for Preferential Market Access (PMA).&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; It again stressed upon the fact that security and manufacturing were not related and that the security aspect had been dealt by the “Safe to Connect” requirement mandated by the DoT License Amendment. It talked of the impossibility of arriving at VA figures until the same is defined to internationally accepted norms. Further it opined that if the Government had security concerns it should consider VA at a network level in the configurations as would be deployed in the network or its segments rather at element or subsystem levels as the latter would leave too many calculations open and the procurement entities will find it very difficult to ensure if they meet the PMA requirement or not. It further stressed upon the need to comply with WTO Guidelines while stressing upon the need to pay heed to certification standards than pursue the unavailable link between manufacturing and security through a PMA Policy. Finally it suggested a grouping of telecom products for the policy based on technology rather than individual products.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pursuant to a Round Table Conference Organized by the Department of Information and Technology, AUSPI and COAI sent another letter dated April 15, 2013 to the Secretary, Department of Information and Technology.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; It reiterated several points that both the AUSPI and COAI had been suggesting to the Government on the Telecom Manufacturing Policy. It cited the examples of other manufacturing nations to reiterate the fact that no country could be completely self-reliant in manufacturing electronics and such positions would only lead to creation of an environment that would not be conducive to global business. It further stressed upon the need to change the manner of calculation of VA while highlighting the fact that every Department should notify its list of products having security implications and the list of telecom equipment should be deleted from the draft guidelines being issued by DeitY to ensure better implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A major change came in on July 8, 2013 when the Prime Minister’s Office made a press release withdrawing the PMA policy for review and withholding all the notifications that had been issued in that regard.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; It said that  he revised proposal will incorporate a detailed provision for project / product / sector specific security standards, alternative modes of security certification, and a roadmap for buildup of domestic testing capacity. It further noted that the revised proposal on PMA in the private sector for security related products will not have domestic manufacturing requirements, percentage based or otherwise and that the revised proposal will incorporate a mechanism for a centralised clearing house mechanism for all notifications under the PMA Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI thereafter on November 7, 2013 sent a letter to the DoT containing feedback on the list of items slated for Government procurement.&lt;a href="#fn16" name="fr16"&gt;[16] &lt;/a&gt;It noted that there were 23 products on which PMA was applicable. It pointed out that there were no local manufacturers for many of the products notified. It also asked the Government to take steps to ensure that fiscal incentives were given to encourage manufacturing sector which was beset by several costs such as landing costs which acted as impediments to its development. It stressed upon the tiered development of the industry needed to ensure that a holistic and comprehensive growth is attained which would result in manufacturing of local products. It requested that the Government "focus on right enablers (incentives, ecosystem, infrastructure, taxation) as the outcome materializes once all of these converge."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI sent a further letter dated November 13, 2013 to the DoT concerning the investment required in the telecom manufacturing industry.&lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;It noted the projected required investment of 152bn USD in the telecom sector and that the Government had projected that 92% of the investment would have to come from the Private Sector. COAI, while stressing upon the need of the Government and the Private Industry to work in tandem with each other, suggested that the Government devise methods to attract investments in the telecom sectors from international telecom players and that the Telecom Equipment Manufacturing Council meet to review and revise methods for attracting such investments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pursuant to the PMO directive, DeitY released a revised PMA Policy on the 23rd of December, 2014.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; While there have been a few major changes, not all of recommendations by various bodies have been adhered to.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;The major changes in the revised policy included the exemption of the private sector from the policy and the removal of PMA Policy to equipments notified for security reasons. The manner of calculation of the domestic value addition has not been changed though there has been a reduction in the percentage of value addition needed to qualify a product as domestic product. Another addition has been of a two-tiered implementation mechanism for the Policy. Tier-I includes a National Planning and Monitoring Council for Electronic Products which would design a 10-year roadmap for the implementation of the policy including notification of the products and subsequent procurement. Under Tier-II, the Ministries and Departments will be issuing notifications specifying products and the technical qualifications of the same, after approval by the Council. The former notifications under the 2012 Policy, including the notification of 23 telecom products by Department of Telecom,&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; are still valid until revised further.&lt;a href="#fn21" name="fr21"&gt;[21] &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. No. 8(78)/2010-IPHW. Available at http://www.dot.gov.in/sites/default/files/5-10-12.PDF (accessed 03 June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Preferential Market Access&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See &lt;i&gt;The PMA Debate, &lt;/i&gt;DataQuest at http://www.dqindia.com/dataquest/feature/191001/the-pma-debate/page/1 (accessed June 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. The letter is available at http://www.coai.com/Uploads/MediaTypes/Documents/letter-to-dit-on-pma-notification.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Around $17bn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. The letter is available at http://www.coai.com/Uploads/MediaTypes/Documents/letter-to-dit-on-pma-notification.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. The letter is available at http://www.coai.com/Uploads/MediaTypes/Documents/coai-to-dot-on-enhancing-domestic-manufacturing-of-telecom-equipment-bas.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. The notification no. 18-07/2010-IP can be found at http://www.coai.com/Uploads/MediaTypes/Documents/DoT-draft-notification-on-Policy-for-preference-to-domestically-manufactured-telecom-products-in-procurement-October-2012.pdf  (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. The commented COAI draft can be found at http://www.coai.com/Uploads/MediaTypes/Documents/Annexure-1-Comments-on-draft-notification-by-DoT.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Available at http://www.coai.com/Uploads/MediaTypes/Documents/dots-notification-on-telecom-equipment-oct-5,-2012.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The draft guidelines can be found at http://www.coai.com/Uploads/MediaTypes/Documents/pma_draft-govt-procurement-guidelines-april-2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. The COAI commented draft can be found at http://www.coai.com/Uploads/MediaTypes/Documents/pma-draft-security-guidelines-15-april-2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/jac-007-to-dot-on-Januarys-list-of-telecom-products-final.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/jac-to-moc-on-pma.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. The press release can be found at http://www.coai.com/Uploads/MediaTypes/Documents/pmo-on-pma.pdfhttp://www.coai.com/Uploads/MediaTypes/Documents/pmo-on-pma.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/COAI-letter-to-DoT-on-Feedback-on-List-of-Items-for-Govt-Procurement.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/COAI-letter-to-DoT-on-Investments-Required-(TEMC)-Nov%2013-2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. The Notification No. 33(3)/2013-IPHW can be found at http://deity.gov.in/sites/upload_files/dit/files/Notification_Preference_DMEPs_Govt_%20Proc_23_12_2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. For more information, see http://electronicsb2b.com/policy-corner/revised-preferential-market-access-policy/# (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. The notification has been mentioned and discussed above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. A list of notifications dealing with electronic products except telecom products can be found on the website of DeitY at http://deity.gov.in/esdm/pma (accessed June, 2014).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations'&gt;https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>dipankar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-02T06:45:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design">
    <title>IANA Transition: Suggestions for Process Design</title>
    <link>https://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design</link>
    <description>
        &lt;b&gt;With analysis of community-input and ICANN processes, Smarika Kumar offers concrete suggestions for process design. She urges the Indian government to take a stronger position in matters of IANA transition. &lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Introduction:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;On 14 March 2014, the NTIA of the US Government &lt;a class="external-link" href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;announced&lt;/a&gt; its intention to transition key internet domain name functions to the global multistakeholder community. These key internet domain name functions comprise functions executed by Internet Assigned Numbers Authority (IANA), which is currently contracted to ICANN by the US government. The US Government delineated that the IANA transition proposal must have broad community support and should address the following four principles:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span&gt;Support and enhance the multistakeholder model;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Maintain the security, stability, and resiliency of the Internet DNS;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Meet the needs and expectation of the global customers and partners of the IANA services; and&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Maintain the openness of the Internet.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the US Government asked ICANN to convene a multistakeholder process to develop the transition plan for IANA. In April 2014, ICANN issued a &lt;a class="external-link" href="https://www.icann.org/en/system/files/files/iana-transition-scoping-08apr14-en.pdf"&gt;Scoping Document&lt;/a&gt; for this process which outlined the scope of the process, as well as, what ICANN thinks, should &lt;i&gt;not &lt;/i&gt;be a part of the process. In the spirit of ensuring broad community consensus, ICANN issued a &lt;a class="external-link" href="https://www.icann.org/resources/pages/draft-proposal-2014-04-08-en"&gt;Call for Public Input&lt;/a&gt;&lt;span&gt; on the Draft Proposal of the Principles, Mechanisms and Process to Develop a Proposal to Transition NTIA’s Stewardship of IANA Functions on 8 April 2014, upon which the Government of India made its &lt;a class="external-link" href="http://mm.icann.org/pipermail/ianatransition/attachments/20140507/8a49e95f/2014-4-16-India-Ministry-ICT.pdf"&gt;submission&lt;/a&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN is currently deliberating the process for the development of a proposal for transition of IANA functions from the US Government to the global multistakeholder community, a step which would have implications for internet users all over the world, including India. The outcome of this process will be a proposal for IANA transition. The Scoping Document and process for development of the proposal are extremely limited and exclusionary, hurried, and works in ways which could potentially further ICANN’s own interests instead of global public interests. Accordingly, the Government of India is recommended take a stand on the following key points concerning the suggested process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Submissions by the Government of India thus far, have however, failed to comment on the process being initiated by ICANN to develop a proposal for IANA transition. While the actual outcome of the process in form of a proposal for transition is an important issue for deliberation, we hold that it is of immediate importance that the Government of India, along with all governments of the world, &lt;span&gt;pay particular attention to the way ICANN is conducting the process itself&lt;/span&gt; to develop the IANA transition proposal. The scrutiny of this process is of immense significance in order to ensure that democratic and representative principles sought by the GoI in internet governance are being upheld within the process of developing the IANA transition proposal. How the governance of the IANA functions will be structured will be an outcome of this process. Therefore if one expects a democratic, representative and transparent governance of IANA functions as the outcome, it is &lt;span&gt;absolutely essential to ensure that the process itself is democratic, representative and transparent&lt;/span&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Issues and Recommendations:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Ensuring adequate representation and democracy of all stakeholders in the process for developing the proposal for IANA transition is essential to ensuring representative and democratic outcomes. Accordingly, one must take note of the following issues and recommendations concerning the process.&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Open, inclusive deliberation by global stakeholders must define the Scope of the Process for developing proposal for IANA transition:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The current Scoping Document was issued by ICANN to outline the scope of the process by which the proposal for IANA transition would be deliberated. The Scoping Document was framed unilaterally by ICANN, without involvement of the global stakeholder community, and excluding all governments of the world including USA. Although this concern was voiced by a number of submissions to the Public Call by ICANN on the Draft Proposal, such concern was not reflected in ICANN’s &lt;a class="external-link" href="https://www.icann.org/resources/pages/process-next-steps-2014-06-06-en"&gt;Revised Proposal&lt;/a&gt; of 6 June 2014. It merely states that the Scoping Document outlines the “&lt;i&gt;focus of this process&lt;/i&gt;.” Such a statement is not enough because the focus as well as the scope of the process needs to be decided in a democratic, unrepresentative and transparent manner by the global stakeholder community, including all governments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This unilateral approach to outline which aspects of IANA transition should be allowed for discussion, and which aspects should not, itself defeats the multistakeholder principle which ICANN and the US government claim the process is based on. Additionally, global community consensus which the US Govt. hopes for the outcome of such process, cannot be conceivable when the scope of such process is decided in a unilateral and undemocratic manner. Accordingly, the &lt;span&gt;current Scoping Document should be treated only as a draft&lt;/span&gt;, and should be made &lt;span&gt;open to public comment and discussion&lt;/span&gt; by the global stakeholder community in order that the scope of the process reflects concerns of global stakeholders, and not just of the ICANN or the US Government.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Accountability of ICANN must be linked to IANA Transition within Scope of the Process:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;ICANN Accountability must not run merely as a parallel process, since ICANN accountability has direct impact on IANA transition. The current Scoping Document states, “&lt;i&gt;NTIA exercises no operational role in the performance of the IANA functions. Therefore, ICANN’s role as the operator of the IANA functions is not the focus of the transition: it is paramount to maintain the security, stability, and resiliency of the DNS, and uninterrupted service to the affected parties&lt;/i&gt;.” However this rationale to exclude ICANN’s role as operator of IANA from the scope of the process is not sound because NTIA does choose to appoint ICANN as the operator of IANA functions, thereby playing a vicarious operational role in the performance of IANA functions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The explicit exclusion of ICANN’s role as operator of IANA functions from the scope of the process works to serve ICANN’s own interests by preventing discussions on those alternate models where ICANN does not play the operator role. Basically, this presumes that in absence of NTIA stewardship ICANN will control the IANA functions. Such presumption raises disturbing questions regarding ICANN’s accountability as the IANA functions operator. If discussions on ICANN’s role as operator of IANA functions is to be excluded from the process of developing the proposal for IANA transition, it also implies exclusion of discussions regarding ICANN’s accountability as operator of these functions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although ICANN announced a process to enhance its accountability on 6 May 2014, this was designed as a separate, parallel process and de-linked from the IANA transition process. As shown, ICANN’s accountability, its role as convenor of IANA transition process, and its role as current and/or potential future operator of IANA functions are intrinsically linked, and must not be discussed in separate, but parallel process. It is recommended that &lt;span&gt;ICANN accountability in the absence of NTIA stewardship, and ICANN’s role as the operator of IANA functions must be included within the Scoping Document&lt;/span&gt; as part of the scope of the IANA transition process. This is to ensure that no kind of IANA transition is executed without ensuring ICANN’s accountability as and if as the operator of IANA functions so that democracy and transparency is brought to the governance of IANA functions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Misuse or appearance of misuse of its convenor role by ICANN to influence outcome of the Process must not be allowed:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;ICANN has been designated the convenor role by the US Govt. on basis of its unique position as the current IANA functions contractor and the global co-ordinator for the DNS. However it is this unique position itself which creates a potential for abuse of the process by ICANN. As the current contractor of IANA functions, ICANN has an interest in the outcome of the process being conducive to ICANN. In other words, ICANN prima facie is an interested party in the IANA transition process, which may tend to steer the process towards an outcome favourable to itself. ICANN has already been attempting to set the scope of the process to develop the proposal for IANA transition unilaterally, thus abusing its position as convenor. ICANN has also been trying to separate the discussions on IANA transition and its own accountability by running them as parallel processes, as well as attempting to prevent questions on ICANN’s role as operator of IANA functions by excluding it from the Scoping Document. Such instances provide a strong rationale for defining the limitations of the role of ICANN as convenor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although ICANN’s Revised Proposal of 6 June 2014 stating that ICANN will have a neutral role, and the Secretariat will be independent of ICANN staff is welcome, additional safeguards need to be put in place to avoid conflicts of interest or appearance of conflicts of interest. The Revised Proposal itself was unilaterally issued, whereby ICANN incorporated some of the comments made on its Proposed Draft, in the revised Draft, but excluded some others without providing rationale for the same. For instance, comments regarding inclusion of ICANN’s role as the operator of IANA functions within the Scoping Document, were ignored by ICANN in its Revised Proposal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is accordingly suggested that &lt;span style="text-decoration: underline;"&gt;ICANN should limit its role to merely facilitating discussions&lt;/span&gt; and not extend it to reviewing or commenting on emerging proposals from the process. ICANN should further &lt;span style="text-decoration: underline;"&gt;not compile comments on drafts to create a revised draft&lt;/span&gt; at any stage of the process. Additionally, &lt;span style="text-decoration: underline;"&gt;ICANN staff must not be allowed to be a part of any group or committee&lt;/span&gt; which facilitates or co-ordinates the discussion regarding IANA transition.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Components of Diversity Principle should be clearly enunciated in the Draft Proposal:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Diversity Principle was included by ICANN in the Revised Proposal of 6 June 2014 subsequent to submissions by various stakeholders who raised concerns regarding developing world participation, representation and lack of multilingualism in the process. This is laudable. However, past experience with ICANN processes has shown that many representatives from developing countries as well as from stakeholder communities outside of the ICANN community are unable to productively involve themselves in such processes because of lack of multilingualism or unfamiliarity with its way of functioning. This often results in undemocratic, unrepresentative and non-transparent decision-making in such processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In such a scenario, merely mentioning diversity as a principle is not adequate to ensure abundant participation by developing countries and non-ICANN community stakeholders in the process. Concrete mechanisms need to be devised to include &lt;span style="text-decoration: underline;"&gt;adequate and fair geographical, gender, multilingual and developing countries’ participation&lt;/span&gt; and representation on all levels so that the process is not relegated merely to domination by North American or European entities. Accordingly, &lt;span style="text-decoration: underline;"&gt;all the discussions in the process should be translated&lt;/span&gt; into multiple native languages of participants &lt;i&gt;in situ&lt;/i&gt;, so that everyone participating in the process can understand what is going on. &lt;span style="text-decoration: underline;"&gt;Adequate time must be given for the discussion issues to be translated and circulated&lt;/span&gt; widely amongst all stakeholders of the world, before a decision is taken or a proposal is framed. To concretise its diversity principle, &lt;span style="text-decoration: underline;"&gt;ICANN should also set aside funds&lt;/span&gt; and develop a programme with community support for capacity building for stakeholders in developing nations to ensure their fruitful involvement in the process.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Co-ordination Group must be made representative of the global multistakeholder community:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Currently, the Co-ordination Group includes representatives from ALAC, ASO, ccNSO, GNSO, gTLD registries, GAC, ICC/BASIS, IAB, IETF, ISOC, NRO, RSSAC and SSAC. Most of these representatives belong to the ICANN community, and is not representative of the global multistakeholder community including governments. This is not representative of even a multistakeholder model which the US Govt. has announced for the transition; nor in the multistakeholder participation spirit of NETmundial.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is recommended that the Co-ordination Group then must be made democratic and representative to include larger global stakeholder community, including Governments, Civil Society, and Academia, with suitably diverse representation across geography, gender and developing nations. Adequate number of seats on the Committee must be granted to each stakeholder so that they can each co-ordinate discussions within their own communities and ensure wider and more inclusive participation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Framing of the Proposal must allow adequate time:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;All stakeholder communities must be permitted adequate time to discuss and develop consensus. Different stakeholder communities have different processes of engagement within their communities, and may take longer to reach a consensus than others. If democracy and inclusiveness are to be respected, then each stakeholder must be allowed enough time to reach a consensus within its own community, unlike the short time given to comment on the Draft Proposal. The process must not be rushed to benefit a few.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;Smarika Kumar is a graduate of the National Law Institute University, Bhopal, and a member of the Alternative Law Forum, a collective of lawyers aiming to &lt;span&gt;integrate alternative lawyering with critical research, alternative dispute resolution, pedagogic interventions and sustained legal interventions in social issues&lt;/span&gt;. Her &lt;span&gt;areas of interest include interdisciplinary research on the Internet, issues affecting indigenous peoples, eminent domain, traditional knowledge and pedagogy.&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design'&gt;https://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Smarika Kumar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Transparency and Accountability</dc:subject>
    

   <dc:date>2014-06-22T09:15:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-policy-brief-iana-transition-fundamentals-and-suggestions-for-process-design">
    <title>CIS Policy Brief: IANA Transition Fundamentals &amp; Suggestions for Process Design </title>
    <link>https://cis-india.org/internet-governance/blog/cis-policy-brief-iana-transition-fundamentals-and-suggestions-for-process-design</link>
    <description>
        &lt;b&gt;In March 2014, the US government announced that it would transfer oversight of IANA functions to an as-yet-indeterminate global multi-stakeholder body. This policy brief, written by Smarika Kumar and Geetha Hariharan, explains the process concisely.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Short Introduction:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In March 2014, the National Telecommunications and Information Administration (NTIA) &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;announced its intention&lt;/a&gt; to transition key Internet domain name functions to the global multi-stakeholder community. Currently, the NTIA oversees coordination and implementation of IANA functions through contractual arrangements with ICANN and Verisign, Inc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NTIA will not accept a government-led or inter-governmental organization to steward IANA functions. It requires the IANA transition proposal to have broad community support, and to be in line with the following principles: &lt;span&gt;(1) support and enhance the multi-stakeholder model; (2) maintain the security, stability, and resiliency of the Internet DNS; (3) meet the needs and expectation of the global customers &amp;amp; partners of IANA services; (4) maintain the openness of the Internet.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN was charged with developing a proposal for IANA transition. It initiated a &lt;a href="https://www.icann.org/resources/pages/draft-proposal-2014-04-08-en"&gt;call for public input&lt;/a&gt; in April 2014. Lamentably, the &lt;a href="https://www.icann.org/en/system/files/files/iana-transition-scoping-08apr14-en.pdf"&gt;scoping document&lt;/a&gt; for the transition did not include questions of ICANN’s own accountability and interests in IANA stewardship, &lt;a href="http://www.internetgovernance.org/2014/04/16/icann-anything-that-doesnt-give-iana-to-me-is-out-of-scope/"&gt;including&lt;/a&gt; whether it should continue to coordinate the IANA functions. Public Input received in May 2014 revolved around the composition of a Coordination Group, which would oversee IANA transition. &lt;span&gt;Now, ICANN will hold an open session on June 26, 2014 at ICANN-50 to gather community feedback on issues relating to IANA transition, including composition of the Coordination Group. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;CIS Policy Brief:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;CIS' Brief on IANA Transition Fundamentals explains the process further, and throws light on the Indian government's views. To read the brief, &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/iana-transition-descriptive-brief" class="internal-link"&gt;please go here&lt;/a&gt;&lt;/b&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Suggestions for Process Design &lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;As convenor of the IANA stewardship transition, ICANN has sought public comments on issues relating to the transition process. We suggest certain principles for open, inclusive and transparent process-design:&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Short Introduction:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In March 2014, the US government through National Telecommunications and Information Administration (NTIA) &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;announced its intention&lt;/a&gt; to transition key Internet domain name functions (IANA) to the global  multi-stakeholder community. The NTIA announcement states that it will  not accept a government-led or intergovernmental organization solution  to replace its own oversight of IANA functions. The Internet Corporation  for Assigned Names and Numbers (ICANN) was charged with developing a  Proposal for the transition.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;At ICANN-49 in Singapore (March 2014), ICANN rapidly gathered inputs  from its community to develop a draft proposal for IANA transition. It  then &lt;a href="https://www.icann.org/resources/pages/draft-proposal-2014-04-08-en"&gt;issued&lt;/a&gt; a call for public input on the Draft Proposal in April 2014. Some responses were incorporated to create a &lt;a href="https://www.icann.org/resources/pages/process-next-steps-2014-06-06-en"&gt;Revised Proposal&lt;/a&gt;, published on June 6, 2014.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Responses had called for transparent composition of an IANA transition  Coordination Group, a group comprising representatives of ICANN’s  Advisory Committees and Supporting Organizations, as well as Internet  governance organizations such as the IAB, IETF and ISOC. Also, ICANN was  asked to have a neutral, facilitative role in IANA transition. This is  because, as the current IANA functions operator, it has a vested  interest in the transition. Tellingly, ICANN’s &lt;a href="https://www.icann.org/en/system/files/files/iana-transition-%20scoping-08apr14-en.pdf"&gt;scoping document&lt;/a&gt; for IANA transition did not include questions of its own role as IANA functions operator.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;ICANN is currently deliberating the process to develop a Proposal for  IANA transition. At ICANN-50, ICANN will hold a governmental high-level  meeting and a public discussion on IANA transition, where comments and  concerns can be voiced. In addition, discussion in other Internet  governance fora is encouraged.&lt;/span&gt;&lt;/p&gt;
&lt;h3 class="column"&gt;CIS Policy Brief:&lt;/h3&gt;
&lt;div class="column"&gt;&lt;span style="text-align: justify; "&gt;CIS' Brief on IANA Transition Principles explains our recommendations for transition process-design. To read the brief, &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-policy-brief-ii-iana-transition-suggestions-for-process-design" class="internal-link"&gt;please go here&lt;/a&gt;&lt;/b&gt;.&lt;/span&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-policy-brief-iana-transition-fundamentals-and-suggestions-for-process-design'&gt;https://cis-india.org/internet-governance/blog/cis-policy-brief-iana-transition-fundamentals-and-suggestions-for-process-design&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-08T08:39:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/understanding-iana-transition">
    <title>Understanding IANA Stewardship Transition</title>
    <link>https://cis-india.org/internet-governance/blog/understanding-iana-transition</link>
    <description>
        &lt;b&gt;Smarika Kumar describes the process of the IANA stewardship transition, and enumerates what the NTIA announcement does and does not do. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;NTIA Announcement and ICANN-convened Processes:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On 14 March 2014, the National Telecommunications and Information Administration (NTIA) of the US Government &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;announced&lt;/a&gt; “&lt;i&gt;its intent to transition key Internet domain name functions to the global multistakeholder community&lt;/i&gt;”. These key Internet domain name functions refer to the Internet Assigned Numbers Authority (IANA) functions. For this purpose, the NTIA &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;asked&lt;/a&gt; the Internet Corporation for Assigned Names and Numbers (ICANN) to “&lt;i&gt;convene global stakeholders to develop a proposal to transition the current role played by NTIA in the coordination of the Internet’s domain name system (DNS)&lt;/i&gt;”. This was welcome news for the global Internet community, which has been criticising unilateral US Government oversight of Critical Internet Resources for many years now. NTIA further announced that IANA transition proposal must have broad community support and should address the following four principles:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Support and enhance the multistakeholder model;&lt;/li&gt;
&lt;li&gt;Maintain the security, stability, and resiliency of the Internet DNS;&lt;/li&gt;
&lt;li&gt;Meet the needs and expectation of the global customers and partners of the IANA services; and&lt;/li&gt;
&lt;li&gt;Maintain the openness of the Internet.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Subsequently, during ICANN49 in Singapore (March 23-27, 2014), ICANN held flurried discussions to gather initial community feedback from participants to come up with a Draft Proposal of the Principles, Mechanisms and Process to Develop a Proposal to Transition NTIA’s Stewardship of the IANA Functions on 8 April 2014, which was open to public comments until 8 May 2014, which was further extended to 31 May 2014. Responses by various stakeholders were collected in this very short period and some of them were incorporated into a Revised Proposal issued by ICANN on 6th June 2014. ICANN also unilaterally issued a Scoping Document defining the scope of the process for developing the proposal and also specifying what was not part of the scope. This Scoping Document came under severe criticism by various commentators, but was not amended.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN &lt;a href="https://www.icann.org/public-comments/enhancing-accountability-2014-05-06-en"&gt;also initiated&lt;/a&gt; a separate but parallel process to discuss enhancement of its accountability on 6 May 2014. This was launched upon widespread distress over the fact that ICANN had excluded its role as operator of IANA functions from the Scoping Document, as well as over questions of accountability raised by the community at ICANN49 in Singapore. In the absence of ICANN’s contractual relationship with NTIA to operate the IANA functions, it remains unclear how ICANN will stay accountable upon the transition. The accountability process looks to address the same through the ICANN community. The issue of ICANN accountability is then envisioned to be coordination within ICANN itself through an ICANN Accountability Working Group comprised of community members and a few subject matter experts.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What are the IANA Functions?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Internet Assigned Numbers Authority, or IANA functions consist of &lt;a href="https://www.icann.org/en/system/files/files/iana-transition-scoping-08apr14-en.pdf"&gt;three separate tasks&lt;/a&gt;:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Maintaining a central repository for protocol name and number registries used in many Internet protocols.&lt;/li&gt;
&lt;li&gt;Co-ordinating the allocation of Internet Protocol (IP) and Autonomous System (AS) numbers to the Regional Internet Registries, who then distribute IP and AS numbers to ISPs and others within their geographic regions.&lt;/li&gt;
&lt;li&gt;Processing root zone change requests for Top Level Domains (TLDs) and making the Root Zone WHOIS database consisting of publicly available information for all TLD registry operators.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The first two of the abovementioned functions are operated by ICANN in consonance with policy developed at the Internet Engineering Task Force (IETF) and Address Supporting Organisation (ASO) respectively, both of which exist under the ICANN umbrella.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The performance of last of these functions is distributed between ICANN and Verisign. NTIA has a Cooperative Agreement with Verisign to perform the related root zone management functions. The related root zone management functions are the management of the root zone “zone signing key” (ZSK), as well as implementation of changes to and distribution of the DNS authoritative root zone file, which is the authoritative registry containing the lists of names and addresses for all top level domains.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, the US Government oversees this entire set of operations by contracting with ICANN as well as Verisign to execute the IANA functions. Though the US Government does not interfere generally in operations of either ICANN or Verisign in their role as operators of IANA functions, it cannot be denied that it exercises oversight on both the operators of IANA functions, through these contracts.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Import of the NTIA Announcement:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The NTIA announcement of 14th March intends to initiate the withdrawal of such oversight of IANA functions by the NTIA in order to move towards global multistakeholder governance. NTIA has asked ICANN to initiate a process to decide upon what such global multistakeholder governance of IANA functions may look like. The following diagram presents the current governance structure of IANA functions and the areas that the NTIA announcement seeks to change:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/internet-governance/blog/Untitled.png/@@images/160cccd1-af49-43fe-aeb2-a60153b6a07c.png" alt="NTIA Announcement" class="image-inline" title="NTIA Announcement" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IANA Oversight Mechanism (&lt;a class="external-link" href="https://www.icann.org/en/system/files/files/iana-transition-scoping-08apr14-en.pdf"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What does the NTIA Announcement NOT DO?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The NTIA announcement DOES NOT frame a model for governance of IANA functions once it withdraws its oversight role.  NTIA has asked ICANN to convene a process, which would figure the details of IANA transition and propose an administrative structure for IANA functions once the NTIA withdraws its oversight role. But what this new administrative structure would look like has not itself been addressed in the NTIA announcement. As per the NTIA announcement, the new administrative structure is yet to be decided by a global multistakeholder community in accordance with the four principles outlined by the NTIA through a process, which ICANN shall convene.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NTIA announcement DOES NOT limit discussions and participation in IANA transition process to within the ICANN community. NTIA has asked ICANN to convene “global stakeholders to develop a proposal to transition” IANA functions. This means all global stakeholders participation, including that of Governments and Civil Society is sought for the IANA transition process. ICANN has been asked “to work collaboratively with the directly affected parties, including the Internet Engineering Task Force (IETF), the Internet Architecture Board (IAB), the Internet Society (ISOC), the Regional Internet Registries (RIRs), top level domain name operators, VeriSign, and other interested global stakeholders”, in the NTIA announcement. This however does not signify that discussions and participation in development of proposal for IANA transition needs to be limited to the ICANN community or the technical community.  In fact, ICANN has itself said that the list of events provided as “Timeline of Events” in &lt;a href="https://www.icann.org/resources/pages/draft-proposal-2014-04-08-en"&gt;its Draft Proposal&lt;/a&gt; of 8 April 2014 for engagement in development of a proposal for IANA transition is &lt;a href="https://www.icann.org/resources/pages/process-next-steps-2014-06-06-en"&gt;non-exhaustive&lt;/a&gt;. This means proposal for IANA transition can be developed by different stakeholders, including governments and civil society in different fora appropriate to their working, including at the IGF and WSIS+10.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NTIA announcement DOES NOT mean devolution of IANA functions administration upon ICANN. NTIA chooses ICANN and Verisign to operate the IANA functions. If NTIA withdraws from its role, the question whether ICANN or Verisign should operate the IANA functions at all becomes an open one, and should be subject to deliberation. By merely asking ICANN to convene the process, the NTIA announcement in no way assigns any administration of IANA functions to ICANN. It must be remembered that the NTIA announcement says that key Internet domain name functions shall transition to the global multistakeholder community, and not the ICANN community.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NTIA announcement DOES NOT prevent the possibility of removal of ICANN from its role as operator of IANA functions. While ICANN has tried to frame the Scoping Document in a language to prevent any discussions on its role as operator of IANA functions, the question whether ICANN should continue in its operator role remains an open one. There are at least 12 submissions made in response to ICANN’s Draft Proposal by varied stakeholders, which in fact, call for the separation of ICANN’s role as policy maker (through IETF, ASO, gNSO, ccNSO), and ICANN’s role as the operator of IANA functions.  Such calls for separation come from private sector, civil society, as well as the technical community, among others. Such separation was also &lt;a href="http://netmundial.org/netmundial-multistakeholder-statement/"&gt;endorsed&lt;/a&gt; in the final NETmundial outcome document (paragraph 27). Governments have, in general, expressed no opinion on such separation in response to ICANN’s Draft Proposal. It is however urged that governments express their opinion in favour of such separation to prevent consolidation of both policy making and implementation within ICANN, which would lead to increased potential situations for the ICANN Board to abuse its powers.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;Smarika Kumar is a graduate of the National Law Institute University, Bhopal, and a member of the Alternative Law Forum, a collective of lawyers aiming to &lt;span&gt; integrate alternative lawyering with critical research, alternative dispute resolution, pedagogic interventions and sustained legal interventions in social issues&lt;/span&gt;. Her &lt;span&gt;areas of interest include interdisciplinary research on the Internet, issues affecting indigenous peoples, eminent domain, traditional knowledge and pedagogy. &lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/understanding-iana-transition'&gt;https://cis-india.org/internet-governance/blog/understanding-iana-transition&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Smarika Kumar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>NTIA Announcement</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-06-22T03:23:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/common-wealth-domain-name-system-forum-2014">
    <title>Commonwealth Domain Name System Forum 2014 </title>
    <link>https://cis-india.org/news/common-wealth-domain-name-system-forum-2014</link>
    <description>
        &lt;b&gt;This event took place on 19 June 2014 from 09:00-17:30 BST at ICANN50 | London in the Viscount room. It was organized by the CTO, hosted by ICANN, and supported by Nominet and the Public Interest Registry.&lt;/b&gt;
        &lt;p&gt;Pranesh Prakash was a panelist for this event. The detailed &lt;a href="https://cis-india.org/internet-governance/blog/domain-name-system-forum.pdf" class="internal-link"&gt;brochure of the event can be downloaded here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/common-wealth-domain-name-system-forum-2014'&gt;https://cis-india.org/news/common-wealth-domain-name-system-forum-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-03T09:27:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report">
    <title>WSIS+10 High Level Event: A Bird's Eye Report</title>
    <link>https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report</link>
    <description>
        &lt;b&gt;The WSIS+10 High Level was organised by the ITU and collaborative UN entities on June 9-13, 2014. It aimed to evaluate the progress on implementation of WSIS Outcomes from Geneva 2003 and Tunis 2005, and to envision a post-2015 Development Agenda. Geetha Hariharan attended the event on CIS' behalf.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;The World Summit on Information Society (WSIS) +10 &lt;/span&gt;&lt;a href="http://www.itu.int/wsis/implementation/2014/forum/"&gt;High Level Event&lt;/a&gt;&lt;span&gt; (HLE) was hosted at the ITU Headquarters in Geneva, from June 9-13, 2014. The HLE aimed to review the implementation and progress made on information and communication technology (ICT) across the globe, in light of WSIS outcomes (&lt;/span&gt;&lt;a href="http://www.itu.int/wsis/index-p1.html"&gt;Geneva 2003&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://www.itu.int/wsis/index-p2.html"&gt;Tunis 2005&lt;/a&gt;&lt;span&gt;). Organised in three parallel tracks, the HLE sought to take stock of progress in ICTs in the last decade (High Level track), initiate High Level Dialogues to formulate the post-2015 development agenda, as well as host thematic workshops for participants (Forum track).&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The High Level Track:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/internet-governance/blog/copy2_of_HighLevelTrack.jpg/@@images/be5f993c-3553-4d63-bb66-7cd16f8407dc.jpeg" alt="High Level Track" class="image-inline" title="High Level Track" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Opening Ceremony, WSIS+10 High Level Event &lt;/i&gt;(&lt;a class="external-link" href="https://twitter.com/ITU/status/334587247556960256/photo/1"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The High Level track opened officially on June 10, 2014, and culminated with the endorsement by acclamation (as is ITU tradition) of two &lt;a href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;Outcome Documents&lt;/a&gt;. These were: (1) WSIS+10 Statement on the Implementation of WSIS Outcomes, taking stock of ICT developments since the WSIS summits, (2) WSIS+10 Vision for WSIS Beyond 2015, aiming to develop a vision for the post-2015 global information society. These documents were the result of the WSIS+10 &lt;a href="http://www.itu.int/wsis/review/mpp/"&gt;Multi-stakeholder Preparatory Platform&lt;/a&gt; (MPP), which involved WSIS stakeholders (governments, private sector, civil society, international organizations and relevant regional organizations).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;strong&gt;MPP&lt;/strong&gt; met in six phases, convened as an open, inclusive consultation among WSIS stakeholders. It was not without its misadventures. While ITU Secretary General Dr. Hamadoun I. Touré consistently lauded the multi-stakeholder process, and Ambassador Janis Karklins urged all parties, especially governments, to “&lt;i&gt;let the UN General Assembly know that the multi-stakeholder model works for Internet governance at all levels&lt;/i&gt;”, participants in the process shared stories of discomfort, disagreement and discord amongst stakeholders on various IG issues, not least human rights on the Internet, surveillance and privacy, and multi-stakeholderism. Richard Hill of the Association for Proper Internet Governance (&lt;a href="http://www.apig.ch/"&gt;APIG&lt;/a&gt;) and the Just Net Coalition writes that like NETmundial, the MPP was rich in a diversity of views and knowledge exchange, but stakeholders &lt;a href="http://www.ip-watch.org/2014/06/16/what-questions-did-the-wsis10-high-level-event-answer/"&gt;failed to reach consensus&lt;/a&gt; on crucial issues. Indeed, Prof. Vlamidir Minkin, Chairman of the MPP, expressed his dismay at the lack of consensus over action line C9. A compromise was agreed upon in relation to C9 later.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some members of civil society expressed their satisfaction with the extensive references to human rights and rights-centred development in the Outcome Documents. While governmental opposition was seen as frustrating, they felt that the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;MPP had sought and achieved a common understanding&lt;/span&gt;&lt;/strong&gt;, a sentiment &lt;a href="https://twitter.com/covertlight/status/476748168051580928"&gt;echoed&lt;/a&gt; by the ITU Secretary General. Indeed, even Iran, a state that had expressed major reservations during the MPP and felt itself unable to agree with the text, &lt;a href="https://twitter.com/covertlight/status/476748723750711297"&gt;agreed&lt;/a&gt; that the MPP had worked hard to draft a document beneficial to all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns around the MPP did not affect the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;review of ICT developments&lt;/span&gt;&lt;/strong&gt; over the last decade. High Level Panels with Ministers of ICT from states such as Uganda, Bangladesh, Sweden, Nigeria, Saudi Arabia and others, heads of the UN Development Programme, UNCTAD, Food and Agriculture Organisation, UN-WOMEN and others spoke at length of rapid advances in ICTs. The focus was largely on ICT access and affordability in developing states. John E. Davies of Intel repeatedly drew attention to innovative uses of ICTs in Africa and Asia, which have helped bridge divides of affordability, gender, education and capacity-building. Public-private partnerships were the best solution, he said, to affordability and access. At a ceremony evaluating implementation of WSIS action-lines, the Centre for Development of Advanced Computing (C-DAC), India, &lt;a href="https://twitter.com/covertlight/status/476748723750711297"&gt;won an award&lt;/a&gt; for its e-health application MOTHER.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Outcome Documents themselves shall be analysed in a separate post. But in sum, the dialogue around Internet governance at the HLE centred around the success of the MPP. Most participants on panels and in the audience felt this was a crucial achievement within the realm of the UN, where the Tunis Summit had delineated strict roles for stakeholders in paragraph 35 of the &lt;/span&gt;&lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt;&lt;span&gt;. Indeed, there was palpable relief in Conference Room 1 at the &lt;/span&gt;&lt;a href="http://www.cicg.ch/en/"&gt;CICG&lt;/a&gt;&lt;span&gt;, Geneva, when on June 11, Dr. Touré announced that the Outcome Documents would be adopted without a vote, in keeping with ITU tradition, even if consensus was achieved by compromise.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The High Level Dialogues:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/internet-governance/blog/HighLevelDialogues.jpg/@@images/3c30d94f-7a65-4912-bb42-2ccd3b85a18d.jpeg" alt="High Level Dialogues" class="image-inline" title="High Level Dialogues" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Prof. Vladimir Minkin delivers a statement.&lt;/i&gt; (&lt;a class="external-link" href="https://twitter.com/JaroslawPONDER/status/476288845013843968/photo/1"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The High Level Dialogues on developing a post-2015 Development Agenda, based on WSIS action lines, were active on June 12. Introducing the Dialogue, Dr. Touré lamented the Millennium Development Goals as a “&lt;i&gt;lost opportunity&lt;/i&gt;”, emphasizing the need to alert the UN General Assembly and its committees as to the importance of ICTs for development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As on previous panels, there was &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;intense focus on access, affordability and reach in developing countries&lt;/span&gt;&lt;/strong&gt;, with Rwanda and Bangladesh expounding upon their successes in implementing ICT innovations domestically. The world is more connected than it was in 2005, and the ITU in 2014 is no longer what it was in 2003, said speakers. But we lack data on ICT deployment across the globe, said Minister Knutssen of Sweden, recalling the gathering to the need to engage all stakeholders in this task. Speakers on multiple panels, including the Rwandan Minister for CIT, Marilyn Cade of ICANN and Petra Lantz of the UNDP, emphasized the need for ‘smart engagement’ and capacity-building for ICT development and deployment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A crucial session on cybersecurity saw Dr. Touré envision a global peace treaty accommodating multiple stakeholders. On the panel were Minister Omobola Johnson of Nigeria, Prof. Udo Helmbrecht of the European Union Agency for Network and Information Security (ENISA), Prof. A.A. Wahab of Cybersecurity Malaysia and Simon Muller of Facebook. The focus was primarily on building laws and regulations for secure communication and business, while child protection was equally considered.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of laws/regulations for cybersecurity (child pornography and jurisdictional issues, for instance), or other legal protections (privacy, data protection, freedom of speech) in rapidly connecting developing states was noted. But the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;question of cross-border surveillance and wanton violations of privacy went unaddressed&lt;/span&gt;&lt;/strong&gt; except for the customary, unavoidable mention. This was expected. Debates in Internet governance have, in the past year, been silently and invisibly driven by the Snowden revelations. So too, at WSIS+10 Cybersecurity, speakers emphasized open data, information exchange, data ownership and control (the &lt;a href="https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties"&gt;right to be forgotten&lt;/a&gt;), but did not openly address surveillance. Indeed, Simon Muller of Facebook called upon governments to publish their own transparency reports: A laudable suggestion, even accounting for Facebook’s own undetailed and truncated reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a nutshell, the post-2015 Development Agenda dialogues repeatedly emphasized the importance of ICTs in global connectivity, and their impact on GDP growth and socio-cultural change and progress. The focus was on taking this message to the UN General Assembly, engaging all stakeholders and creating an achievable set of action lines post-2015.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Forum Track:&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/blog/copy_of_ForumTrack.jpg/@@images/dfcce68a-18d7-4f1e-897b-7208bb60abc9.jpeg" alt="Forum Track" class="image-inline" title="Forum Track" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Participants at the UNESCO session on its Comprehensive Study on Internet-related Issues&lt;/i&gt; (&lt;a class="external-link" href="https://twitter.com/leakaspar/status/476690921644646400/photo/1"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The HLE was organized as an extended version of the WSIS Forum, which hosts thematic workshops and networking opportunities, much like any other conference. Running in parallel sessions over 5 days, the WSIS Forum hosted sessions by the ITU, UNESCO, UNDP, ICANN, ISOC, APIG, etc., on issues as diverse as the WSIS Action Lines, the future of Internet governance, the successes and failures of &lt;a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/"&gt;WCIT-2012&lt;/a&gt;, UNESCO’s &lt;a href="http://www.unesco.org/new/internetstudy"&gt;Comprehensive Study on Internet-related Issues&lt;/a&gt;, spam and a taxonomy of Internet governance.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Detailed explanation of each session I attended is beyond the scope of this report, so I will limit myself to the interesting issues raised.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At ICANN’s session on its own future (June 9), Ms. Marilyn Cade emphasized the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;importance of national and regional IGFs&lt;/span&gt;&lt;/strong&gt; for both issue-awareness and capacity-building. Mr. Nigel Hickson spoke of engagement at multiple Internet governance fora: “&lt;i&gt;Internet governance is not shaped by individual events&lt;/i&gt;”. In light of &lt;a href="http://www.internetgovernance.org/2014/04/16/icann-anything-that-doesnt-give-iana-to-me-is-out-of-scope/"&gt;criticism&lt;/a&gt; of ICANN’s apparent monopoly over IANA stewardship transition, this has been ICANN’s continual &lt;a href="https://www.icann.org/resources/pages/process-next-steps-2014-06-06-en"&gt;response&lt;/a&gt; (often repeated at the HLE itself). Also widely discussed was the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;role of stakeholders in Internet governance&lt;/span&gt;&lt;/strong&gt;, given the delineation of roles and responsibilities in the Tunis Agenda, and governments’ preference for policy-monopoly (At WSIS+10, Indian Ambassador Dilip Sinha seemed wistful that multilateralism is a “&lt;i&gt;distant dream&lt;/i&gt;”).&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This discussion bore greater fruit in a session on Internet governance ‘taxonomy’. The session saw &lt;a href="https://www.icann.org/profiles/george-sadowsky"&gt;Mr. George Sadowsky&lt;/a&gt;, &lt;a href="http://www.diplomacy.edu/courses/faculty/kurbalija"&gt;Dr. Jovan Kurbalija&lt;/a&gt;, &lt;a href="http://www.williamdrake.org/"&gt;Mr. William Drake&lt;/a&gt; and &lt;a href="http://www.itu.int/wsis/implementation/2014/forum/agenda/session_docs/170/ThoughtsOnIG.pdf"&gt;Mr. Eliot Lear&lt;/a&gt; (there is surprisingly no official profile-page on Mr. Lear) expound on dense structures of Internet governance, involving multiple methods of classification of Internet infrastructure, CIRs, public policy issues, etc. across a spectrum of ‘baskets’ – socio-cultural, economic, legal, technical. Such studies, though each attempting clarity in Internet governance studies, indicate that the closer you get to IG, the more diverse and interconnected the eco-system gets. David Souter’s diagrams almost capture the flux of dynamic debate in this area (please see pages 9 and 22 of &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20framework%20for%20IG%20assessments%20-%20D%20Souter%20-%20final_0.pdf"&gt;this ISOC study&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There were, for most part, insightful interventions from session participants. Mr. Sadowsky questioned the effectiveness of the Tunis Agenda delineation of stakeholder-roles, while Mr. Lear pleaded that techies be let to do their jobs without interference. &lt;a href="http://internetdemocracy.in/"&gt;Ms. Anja Kovacs&lt;/a&gt; raised pertinent concerns about &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;including voiceless minorities in a ‘rough consensus’ model&lt;/span&gt;&lt;/strong&gt;. Across sessions, &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;questions of mass surveillance, privacy and data ownership rose&lt;/span&gt;&lt;/strong&gt; from participants. The protection of human rights on the Internet – especially freedom of expression and privacy – made continual appearance, across issues like spam (&lt;a href="http://www.itu.int/ITU-D/CDS/sg/rgqlist.asp?lg=1&amp;amp;sp=2010&amp;amp;rgq=D10-RGQ22.1.1&amp;amp;stg=1"&gt;Question 22-1/1&lt;/a&gt; of ITU-D Study Group 1) and cybersecurity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The HLE was widely attended by participants across WSIS stakeholder-groups. At the event, a great many relevant questions such as the future of ICTs, inclusions in the post-2015 Development Agenda, the value of muti-stakeholder models, and human rights such as free speech and privacy were raised across the board. Not only were these raised, but cognizance was taken of them by Ministers, members of the ITU and other collaborative UN bodies, private sector entities such as ICANN, technical community such as the ISOC and IETF, as well as (obviously) civil society.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Substantively, the HLE did not address mass surveillance and privacy, nor of expanding roles of WSIS stakeholders and beyond. Processually, the MPP failed to reach consensus on several issues comfortably, and a compromise had to be brokered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;But perhaps a big change at the HLE was the positive attitude to multi-stakeholder models from many quarters, not least the ITU Secretary General Dr. Hamadoun Touré. His repeated calls for acceptance of multi-stakeholderism left many members of civil society surprised and tentatively pleased. Going forward, it will be interesting to track the ITU and the rest of UN’s (and of course, member states’) stances on multi-stakeholderism at the ITU Plenipot, the WSIS+10 Review and the UN General Assembly session, at the least.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report'&gt;https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WSIS+10</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Multi-stakeholder</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Access</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2014-06-20T15:57:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/privacy-surveillance-roundtable">
    <title>Privacy and Surveillance Roundtable</title>
    <link>https://cis-india.org/events/privacy-surveillance-roundtable</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society and the Cellular Operators Association of India
in collaboration with the Council for Fair Business Practices invite you to a "Privacy Roundtable" at IMC Building, IMC Marg, Churchgate, Mumbai on June 28, 2014, 10.00 a.m. to 4.00 p.m.
&lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Details&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00 – 11:00&lt;/td&gt;
&lt;td&gt;Introduction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00 - 11:30&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30 - 13:00&lt;/td&gt;
&lt;td&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00 - 14:00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00 - 16.00&lt;/td&gt;
&lt;td&gt;Discussion &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.00 - 16.15&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Background and Context to the Roundtables&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, lawful interception of communications may be conducted by the state in three ways: firstly, intercepting telephone calls and other telecommunications may take place under powers listed in the Telegraph Act, 1885 and procedure set out in the Telegraph Rules, 1951; secondly, intercepting written communications transmitted through the postal service or by private couriers may occur under the Post Office Act, 1898; and, thirdly, intercepting, de-crypting, and monitoring email messages and other electronic communications may take place under the Information Technology Act, 1950 and two sets of Rules issued in 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government’s intention to create a Central Monitoring System to automate the existing process of telephone tapping is significant for a number of reasons. It will bypass private telephone service providers; currently the active cooperation of TSPs is required and compelled in order to intercept and monitor a telephone conversation. This creates an extra layer of compliance activity for TSPs which is cumbersome and expensive. Interception orders from the state often do not comply with the procedure required by law. This uncertainty is compounded by the lack of an indemnity for TSPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, while the CMS will release TSPs from legal liability, it will leave the government free to conduct telephone interceptions in absolute secrecy and without a credible system of oversight and checks and balances. Amongst the world’s major democratic countries, India is alone in refusing to overhaul its telephone tapping regime. The legal requirements of probable cause, judicial sanction, and warrant-based interception – which are followed with exceptions in democracies around the world – are not adequately protected in India.  The same principles also apply to the interception of postal and electronic communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several intelligence and police agencies in India that conduct interceptions of communications without central coordination. Previous cases in the Supreme Court of India and a few Indian High Courts reveal many cases of improper and even illegal surveillance. The sheer number of interested state agencies, the concerns of inadequate oversight, the lack of a credible legal regime, the constant leaks of private communications, and the poor legal protection given to TSPs and ISPs must be legally addressed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information about the Roundtables&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Privacy and Surveillance Roundtables are a CIS initiative, in partnership with the Cellular Operators Association of India (COAI).  From June 2014 – November 2014, CIS and COAI will host seven Privacy and Surveillance Roundtable discussions across multiple cities in India. The Roundtables will be closed-door deliberations involving multiple stakeholders. Through the course of these discussions we aim to deliberate upon the current legal framework for surveillance in India, and discuss possible frameworks for surveillance in India. The provisions of the draft CIS Privacy Bill 2013, the International Principles on the Application of Human Rights to Communication Surveillance, and the Report of the Group of Experts on Privacy will be used as background material and entry points into the discussion. The recommendations and dialogue from each roundtable will be compiled and submitted to the Department of Personnel and training.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Report of the Group of Experts on Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In January 2012 Justice A.P. Shah formed a committee to create a report of recommendations for privacy legislation in India. The committee met seven times from January 2012 to September 2012.  The Report is made up of six chapters and begins by reviewing the international best practices around privacy and the relevant Indian jurisprudence. The Report then recommends nine National Privacy Principles to be adopted by each sector in India. The Nine National Privacy Principles reflect international standards, as well as taking into consideration the Indian context. Along with the National Privacy Principles, the Report lays out a regulatory framework for privacy including privacy commissioners at the regional and national level, self regulating organizations at the industry level, and a system of complaints. Finally the report demonstrates how the National Privacy Principles could be used to harmonize existing legislation and practices.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Draft CIS Citizens Privacy (Protection) Bill 2013&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been researching privacy in India since 2010 with the objective of raising public awareness, completing in depth research, and driving a privacy legislation in India. As part of this work, the Centre for Internet and Society has drafted the Privacy (Protection) Bill 2013. The Citizens Privacy Protection Bill contains provisions that speak to data protection, interception, and surveillance. The Bill also establishes the powers and functions of the privacy commissioner, and lays out offenses and penalties for contravention of the Act. The Bill represents a citizens’ version of a privacy legislation, and will be shared with civil society, industry, and government. It is hoped that the review and revision of the Bill will be a participatory process, and thus comments and feedback to it’s’ provisions will be included as annex’s to the Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The International Principles on the Application of Human Rights to Communication Surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These principles were defined in 2013 in response to rapidly changing technologies and surveillance practices. The principles are the outcome of a global consultation with civil society groups, industry and international experts in communications surveillance law, policy and technology, spearheaded by the Electronic Frontier Foundation US and Privacy International UK. As technologies that facilitate State surveillance of communications advance, States are failing to ensure that laws and regulations related to communications surveillance adhere to international human rights and adequately protect the rights to privacy and freedom of expression. These principles attempt to explain how international human rights law applies in the current digital environment, particularly in light of the increase in and changes to communications surveillance technologies and techniques. These principles can provide civil society groups, industry, States and others with a framework to evaluate whether current or proposed surveillance laws and practices are consistent with human rights.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Tentative schedule for the Roundtables:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Mumbai – June 28th&lt;/li&gt;
&lt;li&gt;New Delhi – July 4th&lt;/li&gt;
&lt;li&gt;Ahmedabad/Hyderabad – August 1st&lt;/li&gt;
&lt;li&gt;Bangalore – September 5th&lt;/li&gt;
&lt;li&gt;New Delhi – October 3rd&lt;/li&gt;
&lt;li&gt;Chennai – October 24th&lt;/li&gt;
&lt;li&gt;New Delhi – November 7th&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Resources&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf" class="external-link"&gt;Draft CIS Privacy Bill 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://en.necessaryandproportionate.org/text"&gt;International Principles on the Application of Human Rights and Communication Surveillance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/privacy-surveillance-roundtable'&gt;https://cis-india.org/events/privacy-surveillance-roundtable&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-20T05:26:10Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online">
    <title>UN Human Rights Council urged to protect human rights online</title>
    <link>https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online</link>
    <description>
        &lt;b&gt;63 civil society groups urged the UN Human Rights Council to address global challenges to freedom of expression, privacy and other human rights on the Internet. Centre for Internet &amp; Society joined in the statement, delivered on behalf of the 63 groups by Article 19. 
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The 26th session of the United Nations Human Rights Council (UNHRC) is currently ongoing (June 10-27, 2014). &lt;span&gt;On June 19, 2014, 63 civil society groups joined together to urge the United Nations Human Rights Council to protect human rights online and address global challenged to their realization. Centre for Internet &amp;amp; Society joined in support of the statement ("&lt;strong&gt;the Civil Society Statement&lt;/strong&gt;"), which was delivered by Article 19 on behalf of the 63 groups.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its consensus resolution &lt;a class="external-link" href="http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/20/8"&gt;A/HRC/20/8 (2012)&lt;/a&gt;, the UNHRC affirmed that the "&lt;span&gt;&lt;i&gt;same rights that people have offline must also be protected online, in particular freedom of expression, which is applicable regardless of frontiers and through any media of one’s choice&lt;/i&gt;". India, a current member of the UNHRC, stood in support of resolution 20/8. The protection of human rights online was also a matter of popular agreement at &lt;a class="external-link" href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;NETmundial 2014&lt;/a&gt;, which similarly emphasised the importance of protecting human rights online in accordance with international human rights obligations. Moreover, the WSIS+10 High Level Event, organised by the ITU in collaboration with other UN entities, emphasized the criticality of expanding access to ICTs across the globe, including infrastructure, affordability and reach.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Civil Society Statement at HRC26 highlights the importance of retaining the Internet as a global resource - a democratic, free and pluralistic platform. However, the recent record of freedom of expression and privacy online have resulted in a deficit of trust and free, democratic participation. &lt;a class="external-link" href="http://www.nytimes.com/2014/03/21/world/europe/turkish-officials-block-twitter-in-leak-inquiry.html"&gt;Turkey&lt;/a&gt;, &lt;a class="external-link" href="http://www.bbc.com/news/blogs-trending-25756864"&gt;Malaysia&lt;/a&gt;, &lt;a class="external-link" href="http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/05/27/thailands-cybercoup/"&gt;Thailand&lt;/a&gt;, &lt;a class="external-link" href="http://www.theguardian.com/world/2014/jun/02/egypt-police-monitor-social-media-dissent-facebook-twitter-protest"&gt;Egypt&lt;/a&gt; and &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/Facebook-under-fire-for-blocking-pages-in-Pakistan/articleshow/36194872.cms"&gt;Pakistan&lt;/a&gt; have blocked web-pages and social media content, while Edward Snowden's &lt;a class="external-link" href="https://www.eff.org/deeplinks/2014/05/looking-back-one-year-after-edward-snowden-disclosures-international-perspective"&gt;revelations&lt;/a&gt; have heightened awareness of human rights violations on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At a time when governance of the Internet and its institutions is evolving, a human rights centred perspective is crucial. Openness and transparency - both in the governance of Internet institutions and rights online - are crucial to continuing growth of the Internet as a global, democratic and free resource, where freedom of expression, privacy and other rights are respected regardless of location or nationality. In particular, the Civil Society Statement calls attention to &lt;a class="external-link" href="https://en.necessaryandproportionate.org/take-action/EFF"&gt;principles of necessity and proportionality&lt;/a&gt; to regulate targeted interception and collection of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UNHRC, comprising 47 member states, is called upon to address these global challenges. Guided by resolutions A/HRC/20/8 and &lt;a class="external-link" href="http://www.un.org/ga/search/view_doc.asp?symbol=A/C.3/68/L.45/Rev.1"&gt;A/RES/68/167&lt;/a&gt;, the WSIS+10 High Level Event &lt;a class="external-link" href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;Outcome Documents&lt;/a&gt; (especially operative paragraphs 2, 8 and 11 of the Vision Document) and the &lt;a class="external-link" href="http://www.ohchr.org/EN/Issues/DigitalAge/Pages/DigitalAgeIndex.aspx"&gt;forthcoming report&lt;/a&gt; of the UN High Commissioner for Human Rights regarding privacy in the digital age, the UNHRC as well as other states may gather the opportunity and intention to put forth a strong case for human rights online in our post-2015 development-centred world.&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Civil Society Statement:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The full oral statement can be accessed &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/unhrc-civil-society-statement-26th-session" class="internal-link"&gt;here&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online'&gt;https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>UNHRC</dc:subject>
    

   <dc:date>2014-06-19T13:28:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
