<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1821 to 1835.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/economic-times-april-3-2014-m-rajshekhar-should-nandan-nilekani-aadhar-project-for-identity-proof-and-welfare-delivery-exist"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-april-1-2014-shweta-taneja-the-politics-of-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/marco-civil-da-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/outlook-april-1-2014-two-indians-in-global-commission-on-web-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/bbc-news-india-atish-patel-indias-social-media-election-battle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/intermediary-liability-resources"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/governance-issues-for-private-data-stores"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/cyber-dialogue-conference-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/icann49-public-forum-statement"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/panel-discussion-intermediary-liability-and-freedom-of-expression-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/non-commercial-users-constituency-icann-and-global-internet-governance"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global">
    <title>Between the Local and the Global: Notes Towards Thinking the Nature of Internet Policy</title>
    <link>https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global</link>
    <description>
        &lt;b&gt;This post by Nishant Shah is part of a series related to the 2014 Milton Wolf Seminar on Media and Diplomacy: The Third Man Theme Revisited: Foreign Policies of the Internet in a Time Of Surveillance and Disclosure, which takes place in Vienna, Austria from March 30 – April 1, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;The 2014 seminar is jointly organized  by the Center for Global Communication Studies (CGCS) at the University  of Pennsylvania’s Annenberg School for Communication, the American  Austrian Foundation (AAF), and the Diplomatic Academy of Vienna (DA).   For more information visit the &lt;a href="http://cgcs.asc.upenn.edu/cgi-bin/projects-location.cgi?id=123"&gt;seminar webpage&lt;/a&gt; and &lt;a href="https://www.facebook.com/MiltonWolfSeminar"&gt;Facebook Page&lt;/a&gt;. Dr. Nishant Shah is the co-founder and &lt;a href="http://www.cis-india.org/"&gt;Director-Research at the Centre for Internet and Society, Bangalore&lt;/a&gt;, India.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's post was published on April 1st, 2014 | &lt;a class="external-link" href="http://cgcsblog.asc.upenn.edu/2014/04/01/between-the-local-and-the-global-notes-towards-thinking-the-nature-of-internet-policy/"&gt;by cgcsblog&lt;/a&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;An imagined and perceived gap between the global and the local informs transnational politics and internet policy. The global views the local as both the site upon which the global can manifest itself as well as the microcosm that supports and strengthens global visions by providing mutations, adaptations and reengineering of the governance practices. The local is encouraged to connect with the global through a series of outward facing practices and policies, thus producing two separate domains of preservation and change.  On the one hand, the local, the organic and the traditional, needs to be preserved and make the transnational and the global the exotic other. On the other hand, the local also needs to be in a state of aspiration, transforming itself to belong to global networks of polity and policy that are deemed as desirable, especially for a development and rights based vision of societies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While these negotiations and transactions are often fruitful and local, national, and transnational structures and mechanics have been developed to facilitate this flow, this relationship is precarious. There is an implicit recognition that the local and the transnational, dialectically produced, are often opaque categories and empty signifiers. They sustain themselves through unquestioned presumptions of particular attributes that are taken for granted in these interactions. There have been many different metaphors that have been used to understand and explain these complex transfers of knowledge and information, resources and capital, bodies and ideologies. Vectors, Flows, Disjunctures, Intersections are some of the examples. However, with the rise of the digital technologies and vocabularies, especially the internet, the metaphor of the Network with its distributed nodes has become one of the most potent explanations of contemporary politics. This idea of living in networked worlds is so seductive and ‘common-sense,’ that it has become an everyday practice to think of the global as a robust, never-ending, all-inclusive network where the local becomes an important node because it enables both connectivity within but also an expansion of the edges, in order to connect to that which is outside the traffic capacities of the network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ‘Network Society’ paradigm is distinct from earlier rubrics of information and open society that have informed existing information and communication policies. In this paradigm we have the opportunity to revisit and remap the ways in which local governments and populations function and how they produce locals who can feed into the transnational and global discourse. The network facilitates some knowledge that is valuable and allows us to map inequity and mal-distribution of resources by offering comparisons between the different nodes. Networks force our attention to the edges, the no-person’s-zone which is porous but still serves as an osmotic filter that often keeps the underprivileged and the unintelligible outside its fold. Networks as metaphors are valuable because they produce a cartographic vision of the world with multiple boundaries and layers, dealing with big data sets to create patterns that might otherwise be invisible. They enable the replication of models that can be further localised and adapted to fit the needs of the context.  Networks make the world legible – we write it through the lens of the network, intelligible – we understand it through the language and vocabulary of the network, and accessible – it allows for knowledge and practices to transfer across geographies and times.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, networks are a vicious form of organisation because they work through the logic of resource maximisation, efficiency and optimisation, often disallowing voices of dissent that threaten the consensus making mechanisms of the network. Networks have a self-referential relationship with reality because they produce accounts of reality which can easily stand in for the material and the real. They are the new narratives that can operate with existing data sets and produce such rich insights for analysis that we forget to account for that which cannot be captured in the database structures of these data streams. Networks work through a principle of homogeneity and records, thus precluding forms of operation which cannot be easily quantified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given this complex nature of networks and the fact that they are emerging as the de facto explanations of not only social and cultural relationships but also economic and political transactions, it might be fruitful to approach the world of policy and politics, the local and the transnational, through the lens of the network. Building a critique of the network while also deploying the network as a way to account for the governmental practices might produce key insights into how the world operates. What does it mean to imagine the world in the image of the internet as a gigantic network? What are the ways in which a networked visualisation of policy and governmental processes can help us analyse and understand contemporary politics? What tools can we develop to expose the limitations of a network paradigm and look at more inclusive and sensitive models for public discourse and participation? How do we document events, people, and drivers of political change that often get overlooked in the networked imagination of transnational politics? These are the kind of questions that the Center for Global Communication Study’s Internet Policy Observatory (IPO) could initiate, building empirical, qualitative and historical research to understand the complex state of policy making and its relationship with enforcement, operationalization and localisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the scope and scale of these questions, there are a few specific directions that can be followed to ensure that research is focused and concentrated rather than too vague and generalised:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Bird’s eye views:&lt;/b&gt; The big picture understanding of  transnational political and policy networks is still missing from our  accounts of contemporary discourse. While global representative networks  of multi-stakeholder dialogues have been established, there is not  enough understanding of how they generate traffic (information,  knowledge, data, people, policies) within the network through the  different nodes. Producing an annotated and visual network map that  looks at the different structural and organisational endeavours and  presences, based on available open public data, bolstered by qualitative  interviews would be very useful both as a research resource but also an  analytic prototype to understand the complex relationships between the  various stakeholders involved in processes of political change. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Crisis Mapping:&lt;/b&gt; One of the most important things within Network studies is how the  network identifies and resolves crises. Crises are the moment when the  internal flaws, the structural weaknesses, and the fragile  infrastructure become visible. The digital network, like the internet,  has specific mechanisms of protecting itself against crises. However,  the appearance of a crisis becomes an exciting time to look at the  discrepancy between the ambition of the network and its usage. A crisis  is generally a symptom that shows the potentials for radical subversion,  overthrowing, questioning and the abuse of network designs and visions.  Locating ICT related crises with historical and geographical focuses  could similarly reveal the discrepancies of the processes of making  policy and orchestrating politics.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Longitudinal Studies:&lt;/b&gt; The network remains strong because it works through a prototype  principle. Consequently, no matter how large the network is, it is  possible to splice, slice, and separate a small component of the network  for deep dive studies. This microcosm offers rich data sets, which can  then be applied across the network to yield different results. Further,  working with different actors – from individual to the collective, from  the informal the institutional – but giving them all equal valency  provides a more equal view of the roles, responsibilities, and  aspirations of the different actors involved in the processes. This kind  of a longitudinal study, working on very small case-studies and then  applying them to analyse the larger social and political conditions help  in understanding the transnational and global processes in a new way.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;These research based inquiries could result in many different outputs based on the key users that they are working with and for. The methods could be hybrid, using existing local and experimental structures, with predefined criteria for rigour and robustness. The research, given its nature, would necessitate working with existing networks and expanding them, thus building strong and sustainable knowledge networks that can be diverted towards intervention through capacity building and pedagogy directed at the different actors identified within these nodes.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Dr. Nishant Shah is the co-founder and Director-Research at the Centre for Internet and Society, Bangalore, India. He is an International Tandem Partner at the Centre for Digital Cultures, Leuphana University, Germany and a Knowledge Partner with the Hivos Knowledge Programme, The Netherlands. In these varied roles, he has been committed to producing infrastructure, frameworks and collaborations in the global south to understand and analyse the ways in which emergence and growth of digital technologies have shaped the contemporary social, political and cultural milieu. He is the editor for a series of monographs on ‘Histories of Internet(s) in India’ that looks at the complicated relationship that technologies have with questions of gender, sexuality, body, city, governance, archiving and gaming in a country like India. He is also the principle researcher for a research programme that produced the four-volume anthology ‘Digital AlterNatives With a Cause?’ that examines the ways in which young people’s relationship with digital technologies produces changes in their immediate environments.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global'&gt;https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T03:49:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/economic-times-april-3-2014-m-rajshekhar-should-nandan-nilekani-aadhar-project-for-identity-proof-and-welfare-delivery-exist">
    <title>Should Nandan Nilekani's Aadhaar project, for identity proof and welfare delivery, exist at all?</title>
    <link>https://cis-india.org/news/economic-times-april-3-2014-m-rajshekhar-should-nandan-nilekani-aadhar-project-for-identity-proof-and-welfare-delivery-exist</link>
    <description>
        &lt;b&gt;The foundation of Aadhaar—a Congress flagship project to give every Indian a unique identity number and then use it to deliver services—has been under assault in the past three months.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by M. Rajshekhar was published in the Economic Times on April 3, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Political, legal, reputational.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The political backlash is coming from leaders of BJP, the Congress' principal rival. Meenakshi Lekhi and Ananth Kumar are not, by any stretch of the imagination, the first or the last word on policy matters in the BJP, but they mince no words when they say that if their party forms a government, it will trash Aadhaar —a project that has delivered a unique ID to half of India and on which Rs 3,800 crore has been spent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even as BJP's loose cannons fired, the Supreme Court repeated on March 24 that the government cannot make Aadhaar mandatory to access welfare services like pensions and LPG subsidy. The same day, investigative journalism portal Cobrapost aired videos that allegedly showed agencies agreeing to enrol people from neighbouring countries for a bribe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The BJP piled on. "It (Aadhaar) has served no purpose. They have issued cards to illegal migrants. We want citizenship cards," says Prakash Javadekar, spokesperson of BJP. His party does not have an official policy line on Aadhaar as yet, but another of its leaders, Yashwant Sinha, headed the Parliamentary panel that, in 2011, severely criticised and rejected the draft bill that provided the legal framework for Aadhaar. "We are for direct benefit transfer but not on the basis of Aadhaar, which is a very badly-designed scheme," Sinha told CNBC-TV18 on January 31. "We will give it to all citizens of India on the basis of NPR."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the campaign trail in Bangalore, Nandan Nilekani, the chief architect and implementer of Aadhaar, defends his work as the chairman of Unique Identification Authority of India (UIDAI). "Aadhaar is a pro-development and an anti-corruption platform," says Nilekani, who was brought in by the Congress high command in 2009 and is contesting these elections on a party ticket against BJP's Kumar in Bangalore South. "It is a pity that some vested interests with narrow political and other motives are trying to stall the project."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lost in those binaries are the objectives of Aadhaar, to universalise identity proof and to use it to plug leakages in delivery of welfare services. UIDAI, led by a hands-on Nilekani, pursued this agenda with a certain authority, great speed and an overriding emphasis on technology, all of which delivered outcomes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But they also contributed to shortcomings that saw the project stumble on its way and for which it is now being critiqued. "This is the only way transformation takes place," says K Koshy, who was part of the team that conceptualised Aadhaar and is now with Ernst &amp;amp; Young. "When you know the ultimate system is workable, you sort out the problems as you go along."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Except, given the political winds blowing, it's anyone's guess what the new dispensation will feel about Aadhaar and UIDAI, from where Nilekani resigned on March 13 and which is seeing many officers who came from other parts of the government, on deputation, returning. Will the new dispensation see Aadhaar as an idea that is sound but with parts that need strengthening? Or, will they see it as an idea that is, by itself, fallacious? "I don't know where this is going," says Abhijit Sen, member, Planning Commission, under which UIDAI is housed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At one level, it's a political question. "The next Parliament will have to decide what UIDAI can and cannot do," says Sen. At another level, even that political answer will stem from the answers to three questions that go to the core of what Aadhaar was meant to be and where it fell short.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Does Aadhaar Provide a Unique and Definitive Identity?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yes and no. UIDAI collects two sets of information from an individual. The first is biometrics: prints of all 10 fingers and a scan of the iris in both eyes. Biometric data, which is supposed to be unique to every individual, is used to assign a unique number to the individual. The second set is basic personal information: name, address, father's name, date of birth and address. Individuals can show existing documents—like voter's I-card or passport —as verification. For those who did not have identification documents, UIDAI allowed certain people to attest for them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar is better at identifying individuals through their biometrics than ensuring the accuracy of their add-on data. This is partly due to its design. When Aadhaar was being conceptualised, says Shrikant Nadhamuni, who headed technology for UIDAI: "We wanted to move the ID game—from a state where some people had no ID and others had paper ID to something beyond even what Singapore had, in the form of smart cards, to online. Like biometric. Which is the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here, your presence is enough to vet your ID." This is also partly due to how UIDAI did its enrolments. Shortly after taking charge, Nilekani announced UIDAI would issue 600 million Aadhaar numbers by March 2014. The initial plan was that the National Population Register (NPR), which conducts the decadal Census and which is housed under the ministry of home, would do the enrolments— capturing biometrics and information— and UIDAI would only issue the numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Soon after, Nilekani decided he could not meet his 600 million target if he waited for NPR to give him biometric packets, and offered to do enrolments too. To meet the target, UIDAI wanted to outsource enrolment to multiple vendors. And compared to NPR, UIDAI collected very little demographic data. UIDAI appointed public and private companies as enrolment agencies. Quality issues arose. "90% of the larger enrolment agencies offloaded the work to local, small-time guys," says the head of a Gurgaon-based enrolment agency, not wanting to be named.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instances of incomplete addresses, spelling mistakes, people bribing enrolment staff to obtain numbers, emerged. "There is always a trade off between inclusion and accuracy," says Nilekani. "And the fact that these errors happened only shows that the gates were kept wide enough to ensure there would be no exclusion." "The Aadhaar database is based on very weak data," says Sunil Abraham, the head of Bangalore-based Centre for Internet and Society, an Internet and governance think-tank. "It is basically linking biometrics to a person and the name/address he claims as his." This weakness started showing up as the government began to deliver welfare services by transferring money directly into bank accounts of beneficiaries, using Aadhaar. The first step was to add the Aadhaar number to the department and bank databases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reddy Subramanyam, joint secretary of NREGA, tried to seed Aadhaar numbers into his database of NREGA workers. "The current matching is just 25-30%." The mismatch arises because, say, the name will be S Kumar in one and Sunil Kumar in another. Aadhaar is "less ID project and more identification project," says legal researcher Usha Ramanathan. "The onus for ensuring the demographic information is correct falls on the number-holder."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. Are Aadhaar-enabled Cash Transfers Delivering?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If giving every Indian a unique ID was Aadhaar's main mandate, revamping welfare delivery became its second. In 2011, Nilekani headed a committee to create a roadmap to move to a system of welfare delivery where money was transferred directly into bank accounts of beneficiaries—or direct benefit transfers (DBTs). The architectures it proposed pivoted around Aadhaar and online, realtime biometric authentication. This was to replace the existing smart-card architecture, which can work even in areas even without connectivity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI saw the cloud as the future. "We were not very taken with the smart-card solution," says Nadhamuni. "Farmers have to carry multiple smart cards around. And then, there is the cost of the card." Smart-card companies, staring at the prospect of their investments going waste, protested. "Customers and service providers deserve the right to make a convenient choice. Can someone building a public highway insist that only a certain sort of a vehicle can ply on it?" Abhishek Sinha, CEO of Eko India, a mobile-banking start-up told ET in November 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The question is whether the model is working better now than what existed before," defends Koshy. It's a question that has not been answered conclusively and credibly: there have been no independent evaluations by the government of Aadhaarbased DBTs till now. "Aadhaar should not have been rolled out on a mission mode till it was tested on some scale," says MS Sriram, visiting faculty at IIM Bangalore's Centre for Public Policy. When asked about this, Sen says: "There was no independent evaluation. Everyone was rushing." From the field came reports about manual labourers and the aged struggling to authenticate using biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nor were comparative studies conducted to check alternative ways to improve welfare delivery. Economist Reetika Khera argues that Chhattisgarh has removed corruption from its PDS programme through a mix of computerisation and community supervision. This echoes an observation made by the Parliamentary panel while rejecting the UIDAI bill: the government had not considered comparative costs of Aadhaar and other existing ID documents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet, in November 2012, the Congress decided to make DBTs its calling card for the 2014 elections. At a rally in Dudu, Rajasthan, attended by Congress leaders and Nilekani, it announced DBT rollout in the state. A year later, after a patchy rollout, the Congress lost power in the state. And on January 30, the UPA pressed pause on DBTs for cooking gas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. Are there Strong Safeguards to Protect a Person's Privacy?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On February 26, the Mumbai High Court directed UIDAI to share its Goa biometrics with the CBI to help it solve a rape case in the state the agency was struggling to solve. UIDAI refused, saying this would violate the privacy of its number holders. The High Court agreed with the CBI. UIDAI went to the Supreme Court, which ruled that its biometric information cannot be shared with any government agency without the consent of number holders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the CBI request had shown what could go wrong. "Once you create an ID system, other things happen," says Sen. "The most inevitable one is that government departments—like the police—want to access it. A database exists and I want to use it." Says a Supreme Court lawyer, not wanting to be named: "You innocently give your fingerprints to UIDAI because you want your scholarship or gas subsidy or something. You volunteer this information and then you realise this can be used as evidence against you in a criminal trial?" In time, more agencies will use Aadhaar. "The moment you start putting the Aadhaar number into multiple databases, you make them comparable," says Abraham. "Land registry, tax records, etc, all become comparable." Adds Sen: "We need to think about who can use the authentication service."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He cites the example of banks using Aadhaar to judge a borrower's credit record as a good thing. Conversely, he adds, an insurer using a customer's Aadhaar to access hospital records, and take a call on premiums or policy issuance, is a bad outcome. "Insurance is supposed to work by pooling risk. Should they (insurers) even have the right to ask for authentication?" asks Sen. UIDAI officials say three things in their defence. One, they collect innocuous information, which they don't share. Two, for authentication queries, they only give 'yes/no' answers. Three, they have safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What is missing is a legal framework that governs collection, use and retention of biometrics. "India has not passed a data privacy law," says Nadhamuni. "This is a very important legislation we need to draft and enact for projects that use large-scale IT systems, be it Aadhaar, NREGA, voter card, income tax, etc. In the absence of such laws, UIDAI came up with rigorous data privacy and security policies to secure resident data." However, the Parliamentary panel, while rejecting the bill, noted that UIDAI began collecting biometric data even as the government worked on a privacy bill and a data protection bill. "The idea that databases can be used by anyone makes people vulnerable, especially in a state where there is neither law nor much respect for law," says Ramanathan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar stands at an uncomfortable junction. A new government, eager to ensure only citizens have unique numbers, could ask all Aadhaar holders to provide address proof and delete the others. Events of the past three months have framed the issues concerning Aadhaar, sometimes with a touch of rhetoric. "This is a good time to open the regulation issue," says Sen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/economic-times-april-3-2014-m-rajshekhar-should-nandan-nilekani-aadhar-project-for-identity-proof-and-welfare-delivery-exist'&gt;https://cis-india.org/news/economic-times-april-3-2014-m-rajshekhar-should-nandan-nilekani-aadhar-project-for-identity-proof-and-welfare-delivery-exist&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-14T10:27:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-april-1-2014-shweta-taneja-the-politics-of-facebook">
    <title>The politics of Facebook</title>
    <link>https://cis-india.org/news/livemint-april-1-2014-shweta-taneja-the-politics-of-facebook</link>
    <description>
        &lt;b&gt;With the social media becoming an important political battleground, is Facebook affecting friendships and trying to influence our political leanings? &lt;/b&gt;
        &lt;div class="p" id="U200345218720FvG" style="text-align: justify; "&gt;The article by Shweta Tiwari was &lt;a class="external-link" href="http://www.livemint.com/Leisure/vmYyeUOmMYJUqHoaYKMgnJ/The-politics-of-Facebook.html"&gt;published in Livemint&lt;/a&gt; on April 1, 2014. Dr. Nishant Shah is quoted.
&lt;hr /&gt;
&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;When  social activist Uthara Narayanan, 32, posted an innocuous article link  on the Gujarat riots on Facebook in January, she was in for a surprise.  An old friend from college fiercely defended Gujarat chief minister and  Bharatiya Janata Party (BJP) prime ministerial candidate &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Narendra%20Modi"&gt;Narendra Modi&lt;/a&gt;&lt;/span&gt;,  getting abrasive and personal in the post. “I had known her for more  than 14 years and yet hadn’t seen this side to her,” says Narayanan. “I  didn’t realize when she had gone off and gotten such strong views on the  debate.”&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;From then on Narayanan decided to stay away from her friend though  they live in the same city. “It left a bad taste in my mouth and marred  our friendship for me, though I am still Facebook friends with her.”  Almost as if agreeing with her, Facebook’s wall automatically started  keeping her friend’s posts away from her wall—thanks to the EdgeRank  algorithm.&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h3 class="p" style="text-align: justify; "&gt;Like-like stick together&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;EdgeRank, the Facebook algorithm that decides which posts to show in your newsfeed, bases its decision on three factors: an affinity score between the user and the one who’s created the post, the type of post (comment, like, create or tag), and time lapsed since it was created. The first basically means that you will see posts from friends you have interacted with and like to interact with on the social network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In January, Catherine Grevet, a PhD student at the Georgia Institute of Technology in the US, studied this algorithm in the light of politics and concluded that people tend to get attracted to circles of friends who affirm to their own political leanings, all because of Facebook’s algorithms. “People are mainly friends with those who share similar values and interests,” Grevet wrote in the study. “As a result, they aren’t exposed to opposing viewpoints.” Grevet presented the study at the 17th ACM Conference on Computer-Supported Cooperative Work and Social Computing in the US in February.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alok Sharma, a Mumbai-based creative writer who used to be a political cartoonist, says social media has led to Indians opening up. “We are taught to be a little politically correct, especially in face-to-face conversations. But when it comes to social networking sites, Indians express their views like fanatics,” he says. He blocked a couple of Facebook friends after a spate of personal comments on one of his posts. “My friends know me and get the crux of what I might be trying to say in a thread but there are others who are on my Friends list but don’t understand the context and take it all wrong.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The misunderstanding arises because many of us post on the network as we would speak among friends and not as we would say things in public. “Facebook is not a community, a clique or a group of friends,” says Nishant Shah, director of research at Bangalore-based non-profit The Centre for Internet and Society. “It is just a network,” he says. That means that not all people on your Facebook list are friends—you are just connected to them on the network. You might have a professional relationship with them, be teammates or acquaintances or colleagues, but you don’t know them personally. Given that the average Facebook user has 229 Facebook friends—according to the numbers from US think tank Pew Research Center’s Internet Project which tracks statistics about the social network—that’s just too many people to even know personally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The audience on the social network is much larger than the friend list, including Facebook itself, which, if it finds your comment problematic, will censor even before a complaint is produced,” says Shah. A post on Facebook or a comment or a like, can get you in trouble not just with other individuals or communities who take offence but even the law, as happened to a girl in 2012 who put up a post criticizing the shutdown of Mumbai after the death of Shiv Sena patriarch Bal Thackeray.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Though used like it, Facebook is not a conversation,” says Shah, “Because everything you write is archived and recorded. And can be used against you if need be.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A medium to shout in&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;But would you shout at a stranger on the street as you do on Facebook? Basav Biradar, a programme manager based in Bangalore, actively posts on politics and comments on Facebook. He feels most people on Facebook give strong opinions that are not well-informed. “A lot of these opinions are dependent on propaganda and campaigns rather than facts. Why don’t people do some homework before forming an opinion?” With over 100 million Indians active on the social network, however, an uninformed opinion is hardly reason to stop anyone from posting, commenting, liking, offending and getting offended through posts on Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shah calls this phenomenon cyber-bullying in politics. “Specific vocal and passionate groups and communities have emerged who silence any voice of dissent or critique by trolling the dissident,” says Shah. “They do not need anonymity. They don’t try to hide who they are. They feel so empowered by the backing of the politicos who are either hiring or supporting them, that they have risen in hordes and are stifling the space for dissent and questioning even more effectively than they have been able to do in real life.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s almost like standing in a rally and hearing a swarm of slogans. Sashi Kumar, chairman of the trust Media Development Foundation that runs the Asian College of Journalism, Chennai, gives a similar analogy. He believes that the language of communication on Facebook is not written but oral. “Writing implies a well thought through opinion, whereas speech is responsive and involved. Within the Internet, there’s a strange morphing of written form which is expressed in a way of oral communication. You speak to someone on Facebook, you respond, you hear, you react, you communicate, you talk.” He says that this morphing is leading society back to more oral forms of communication where written forms like newspapers will be a thing of the past.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Replacing traditional media&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/PoliticsofFB.png" alt="Politics of FB" class="image-inline" title="Politics of FB" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;With surprising events like the support for Jan Lokpal law, Pink Chaddi campaign and even the backlash against the December 2012 gang rape case in Delhi, social media seems to have somewhere, somehow made all of us more participative, more aware and more active in political and social spaces.&lt;/p&gt;
&lt;p&gt;Most politicians have active Twitter and Facebook accounts. Most  newspapers and even news channels quote their feed as statements when  summing up news. Social networks have become almost mainstream. So much  so that when earlier in March Modi attacked Bihar chief minister &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Nitish%20Kumar"&gt;Nitish Kumar&lt;/a&gt;&lt;/span&gt; at a political rally in Muzaffarpur, Bihar, Kumar’s response was detailed, and through a Facebook post.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;A joint study by the IRIS Knowledge Foundation, a public service initiative of business and financial information provider IRIS Business Services Pvt. Ltd, and the industry body Internet and Mobile Association of India, suggests that social media use is now sufficiently widespread to influence the outcome of the next general election and consequently government formation. The March research, which studied Facebook’s own data, claims that among the social media spaces, Facebook users have the maximum clout.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kumar agrees and feels that news now is more user-generated: “It’s the people who want to pursue their own news, know more about their own news, create news. In a way it democratizes journalism. People are talking more about issues, giving opinions and comparing notes. Politics has shifted from the streets to these social medias.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The future holds more participation, and a sense of being a stakeholder in the political process. An “enlarging of political participation”, as Kumar puts it. “Of course because everyone has a mike, a mouthpiece now, there will be lot of more trivial conversation and hairsplitting which might not add up to anything, but the important thing is that people are engaging themselves politically. We are on the streets. All because of technology.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-april-1-2014-shweta-taneja-the-politics-of-facebook'&gt;https://cis-india.org/news/livemint-april-1-2014-shweta-taneja-the-politics-of-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-03T11:30:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts">
    <title>New privacy Bill more refined &amp; has wider ambit, say experts</title>
    <link>https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts</link>
    <description>
        &lt;b&gt;But creates wide exceptions for government agencies.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/new-privacy-bill-more-refined-has-wider-ambit-say-experts-114040101013_1.html"&gt;published in the Business Standard&lt;/a&gt; on April 2, 2014. CIS welcomes changes in the Bill but is cautious of the wide exceptions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government’s latest attempt to draft a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy+Bill" target="_blank"&gt;privacy Bill&lt;/a&gt; is being termed by as a refined one by experts as it expands its ambit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the Bill creates some wide exceptions for law enforcement and  intelligence agencies to collect personal information of individuals.  The government has made several attempts at drafting a privacy Bill  since 2010, with the aim of protecting individuals against data misuse  by government or private agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first draft, released in 2011, extended the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Right+To+Privacy" target="_blank"&gt;Right to Privacy&lt;/a&gt; to citizens of India. But, the 2014 version has expanded its ambit to  cover all residents of the country. The 2014 Bill also recognises the  Right to Privacy as a part of Article 21 of the Indian Constitution and  extends to the whole of India. In contrast, the 2011 Bill did not  explicitly recognise the Right to Privacy as being a part of Article 21,  and excluded Jammu and Kashmir from its purview.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both the drafts include a list of circumstances under which  authorisation for the collection and processing of sensitive personal  data is not required. The lists are broadly the same. However, the  latest version exempts insurance company and government intelligence  agencies collecting or processing data “in the interest of the  sovereignty, integrity, security or the strategic, scientific or  economic interest of India.”&lt;br /&gt; &lt;br /&gt; A Bangalore-based Internet think-tank Centre for Internet and Society  said it welcomed many changes in the Bill, but were cautious on the wide  exceptions.&lt;br /&gt; &lt;br /&gt; “The Bill carves out another exception for government agencies, allowing  disclosure of sensitive personal data without consent to government  agencies mandated under law for the purposes of verification of  identity, or for prevention, detection, investigation, including cyber  incidents, prosecution and punishment of offences,” the Centre for  Internet and Society said in a note analysing the provisions of the  Bill.&lt;br /&gt; &lt;br /&gt; The privacy Bill was originally conceptualised to ensure the data  collected by the government under various new projects such as Aadhaar  or the National Information Grid (NATGRID) are not misused in any way.  But incidents, such as the tapping of phone conversations involving  former lobbyist &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Niira+Radia" target="_blank"&gt;Niira Radia&lt;/a&gt;, prompted the government to expand the ambit of the privacy law from just being a data protection one to also cover &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Surveillance" target="_blank"&gt;surveillance&lt;/a&gt; and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Interception" target="_blank"&gt;interception&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, it was unable to reach a consensus due to inter-ministerial  conflicts as the law was superseding various provisions under several  existing legislations.&lt;br /&gt; &lt;br /&gt; The government also set up a committee under retired Delhi high court  judge Ajit P Shah under the aegis of the Planning Commission to study  international best practices on privacy and surveillance. This committee  filed a report in 2012.&lt;br /&gt; &lt;br /&gt; Some additions to the Bill include the term personal identifier, defined  by any unique alphanumeric sequence of members, letters, and symbols  that specifically identifies an individual with a database or a data  set.&lt;br /&gt; &lt;br /&gt; The Bill has also re-defined sensitive personal data to denote personal  data relating to physical and mental health, including medical history,  biometric, bodily or genetic information, criminal convictions,  password, banking credit and financial data, narco analysis or polygraph  test data and sexual orientation.&lt;br /&gt; &lt;br /&gt; Once the law comes into being, the government or a private agency will  have to adequately inform citizens before collecting data, stating the  reasons and only collecting as much information as is necessary.&lt;br /&gt; &lt;br /&gt; It will also have to clearly define the time period for which the data  will be stored and the security measures taken to protect it from  misuse. The law also lays down the penalties in case of a breach.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts'&gt;https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-03T11:06:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/marco-civil-da-internet">
    <title>Marco Civil da Internet: Brazil’s ‘Internet Constitution’</title>
    <link>https://cis-india.org/internet-governance/blog/marco-civil-da-internet</link>
    <description>
        &lt;b&gt;On March 25, 2014, Brazil's lower house of parliament passed bill no. 2126/2011, popularly known as Marco Civil da Internet. The Marco Civil is a charter of Internet user-rights and service provider responsibilities, committed to freedom of speech and expression, privacy, and accessibility and openness of the Internet. In this post, the author looks at the pros and cons of the bill.&lt;/b&gt;
        &lt;h3&gt;&lt;em&gt;&lt;strong&gt;Introduction:&lt;/strong&gt;&lt;/em&gt;&lt;/h3&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div&gt;
&lt;div style="text-align: justify; "&gt;Ten months ago, Edward Snowden’s revelations of the U.S. National Security Agency’s extensive, warrantless spying dawned on us. Citizens and presidents alike expressed their outrage at this sweeping violation of their privacy. While India’s position remained carefully neutral, or indeed, supportive of NSA’s surveillance, Germany, France and Brazil cut the U.S. no slack. Indeed, at the 68th session of the United Nations General Assembly, Brazilian President Dilma Rousseff (whose office the NSA had placed under surveillance) stated, “&lt;em&gt;Tampering in such a manner in the affairs of other countries is a breach of International Law and is an affront to the principles that must guide the relations among them, especially among friendly nations.&lt;/em&gt;” Brazil, she said, would “&lt;em&gt;redouble its efforts to adopt legislation, technologies and mechanisms to protect us from the illegal interception of communications and data.&lt;/em&gt;”&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div&gt;Some may say that Brazil has lived up to its word. Later this month, Brazil will be host to &lt;em&gt;NETmundial&lt;/em&gt;, the Global Multi-stakeholder Meeting on the Future of Internet Governance, jointly organized by the Brazilian Internet Steering Committee (CGI.br) and the organization /1Net. The elephantine invisible presence of Snowden vests NETmundial with the hope and responsibility of laying the ground for a truly multi-stakeholder model for governing various aspects of the Internet; a model where governments are an integral part, but not the only decision-makers. The global Internet community, comprising users, corporations, governments, the technical community, and NGOs and think-tanks, is hoping devise a workable method to divest the U.S. Government of its &lt;em&gt;de facto&lt;/em&gt; control over the Internet, which it wields through its contracts to manage the domain name system and the root zone.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt; &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;But as Internet governance expert Dr. Jeremy Malcolm put it, these technical aspects do not make or break the Internet. The real questions in Internet governance underpin the rights of users, corporations and netizens worldwide. Sir Tim Berners-Lee, when he &lt;a class="external-link" href="http://www.theguardian.com/technology/2014/mar/12/online-magna-carta-berners-lee-web"&gt;called for&lt;/a&gt; an Internet Bill of Rights, meant much the same. For Sir Tim, an open, neutral Internet is imperative if we are to keep our governments open, and foster “&lt;em&gt;good democracy, healthcare, connected communities and diversity of culture&lt;/em&gt;”. Some countries agree. The Philippines envisaged a &lt;em&gt;Magna Carta&lt;/em&gt; for Internet Freedom, though the Bill is pending in the Philippine parliament.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt; &lt;/span&gt;&lt;/div&gt;
&lt;h3&gt;&lt;strong&gt;&lt;em&gt;Marco Civil da Internet:&lt;/em&gt;&lt;/strong&gt;&lt;/h3&gt;
&lt;div&gt;Last week, on March 25, 2014, the Brazilian Chamber of Deputies (the lower house of parliament) passed the &lt;em&gt;Marco Civil da Internet&lt;/em&gt;, bill 2126/2011, a charter of Internet rights. The &lt;em&gt;Marco Civi&lt;/em&gt;l is considered by the global Internet community as a one-of-a-kind bill, with Sir Tim Berners-Lee &lt;a class="external-link" href="http://www.webfoundation.org/2014/03/marco-civil-statement-of-support-from-sir-tim-berners-lee/?utm_source=hootsuite&amp;amp;utm_campaign=hootsuite"&gt;hailing&lt;/a&gt; the “&lt;em&gt;groundbreaking, inclusive and participatory process has resulted in a policy that balances the rights and responsibilities of the individuals, governments and corporations who use the Internet&lt;/em&gt;”.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;The &lt;em&gt;Marco Civil&lt;/em&gt;’s journey began with a two-stage public consultation process in October 2009, under the aegis of the Brazilian Ministry of Justice’s Department of Legislative Affairs, jointly with the Getulio Vargas Foundation’s Center for Technology and Society of the Law School of Rio de Janeiro (CTS-FGV). The collaborative process &lt;a class="external-link" href="http://observatoriodainternet.br/wp-content/uploads/2012/11/Internet-Policy-Report-Brazil-2011.pdf"&gt;involved&lt;/a&gt; a 45-day consultation process in which over 800 comments were received, following which a second consultation in May 2010 received over 1200 comments from individuals, civil society organizations and corporations involved in the telecom and technology industries. Based on comments, the initial draft of the bill was revamped to include issues of popular, public importance, such as intermediary liability and online freedom of speech.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;An official English translation of the &lt;em&gt;Marco Civil&lt;/em&gt; is as yet unavailable. But an &lt;a class="external-link" href="https://docs.google.com/document/d/1kJYQx-l_BVa9-3FZX23Vk9IfibH9x6E9uQfFT4e4V9I/pub"&gt;unofficial translation&lt;/a&gt; (please note that the file is uploaded on Google Drive), triangulated against &lt;a class="external-link" href="http://infojustice.org/archives/32527"&gt;online&lt;/a&gt; &lt;a class="external-link" href="http://www.zdnet.com/brazil-passes-groundbreaking-internet-governance-bill-7000027740http://www.zdnet.com/brazil-passes-groundbreaking-internet-governance-bill-7000027740/"&gt;commentary&lt;/a&gt; on &lt;a class="external-link" href="http://www.zdnet.com/all-you-need-to-know-about-brazils-internet-constitution-7000022726/"&gt;the bill&lt;/a&gt;, reveals that the following issues were of primary importance:&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;h3&gt;&lt;strong&gt;&lt;em&gt;The fundamentals:&lt;/em&gt;&lt;/strong&gt;&lt;/h3&gt;
&lt;div&gt;The fundamental principles of the &lt;em&gt;Marco Civil&lt;/em&gt; reveal a commitment to openness, accessibility neutrality and democratic collaboration on the Internet. Art. 2 (see unofficial translation) sets out the fundamental principles that form the basis of the law. It pledges to adhere to freedom of speech and expression, along with an acknowledgement of the global scale of the network, its openness and collaborative nature, its plurality and diversity. It aims to foster free enterprise and competition on the Internet, while ensuring consumer protection and upholding human rights, personality development and citizenship exercise in the digital media in line with the network’s social purposes. Not only this, but Art. 4 of the bill pledges to promote universal access to the Internet, as well as “&lt;em&gt;to information, knowledge and participation in cultural life and public affairs&lt;/em&gt;”. It aims to promote innovation and open technology standards, while ensuring interoperability.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt; &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;The &lt;em&gt;Marco Civil&lt;/em&gt; expands on its commitment to human rights and accessibility by laying down a “&lt;em&gt;discipline of Internet use in Brazil&lt;/em&gt;”. Art. 3 of the bill guarantees freedom of expression, communication and expression of thoughts, under the terms of the Federal Constitution of Brazil, while at the same time guaranteeing privacy and protection of personal data, and preserving network neutrality. It also focuses on preserving network stability and security, by emphasizing accountability and adopting “&lt;em&gt;technical measures consistent with international standards and by encouraging the implementation of best practices&lt;/em&gt;”.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;These principles, however, are buttressed by rights assured to Internet users and responsibilities of and exceptions provided to service providers.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;h3&gt;&lt;strong&gt;&lt;em&gt;Rights and responsibilities of users and service providers:&lt;/em&gt;&lt;/strong&gt;&lt;/h3&gt;
&lt;div&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Net neutrality:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Brazil becomes one of the few countries in the world (joining the likes of the Netherlands, Chile and Israel in part) to preserve network neutrality by legislation. Art. 9 of the &lt;em&gt;Marco Civil&lt;/em&gt; requires all Internet providers to “&lt;em&gt;to treat any data package with isonomy, regardless of content, origin and destination, service, terminal or application&lt;/em&gt;”. Not only this, but Internet providers are enjoined from blocking, monitoring or filtering content during any stage of transmission or routing of data. Deep packet inspection is also forbidden. Exceptions may be made to discriminate among network traffic &lt;em&gt;only&lt;/em&gt; on the basis of essential technical requirements for services-provision, and for emergency services prioritization. Even this requires the Internet provider to inform users in advance of such traffic discrimination, and to act proportionately, transparently and with equal protection.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Data retention, privacy and data protection:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;The &lt;em&gt;Marco Civil&lt;/em&gt; includes provisions for the retention of personal data and communications by service providers, and access to the same by law enforcement authorities. However, record, retention and access to Internet connection records and applications access-logs, as well as any personal data and communication, are required to meet the standards for “&lt;em&gt;the conservation of intimacy, private life, honor and image of the parties directly or indirectly involved&lt;/em&gt;” (Art. 10). Specifically, access to identifying information and contents of personal communication may be obtained &lt;em&gt;only&lt;/em&gt; upon judicial authorization.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;Moreover, where data is collected within Brazilian territory, processes of collection, storage, custody and treatment of the abovementioned data are required to comply with Brazilian laws, especially the right to privacy and confidentiality of personal data and private communications and records (Art. 11). Interestingly, this compliance requirement is applicable also to entities incorporated in foreign jurisdictions, which offer services to Brazilians, or where a subsidiary or associate entity of the corporation in question has establishments in Brazil. While this is undoubtedly a laudable protection for Brazilians or service providers located in Brazil, it is possible that conflicts may arise (&lt;a class="external-link" href="http://www.economist.com/news/americas/21599781-brazils-magna-carta-web-net-closes?frsc=dg%7Ca&amp;amp;fsrc=scn/tw_app_ipad"&gt;with penal consequences&lt;/a&gt;) between standards and terms of data retention and access by authorities in other jurisdictions. In the predictable absence of harmonization of such laws, perhaps rules of conflicts of law may prove helpful.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;While data retention remained a point of contention (Brazil initially sought to ensure a 5-year data retention period), under the &lt;em&gt;Marco Civil&lt;/em&gt;&lt;span&gt;, Internet providers are required to retain connection records for 1 year under rules of strict confidentiality; this responsibility cannot be delegated to third parties (Art. 13). Providers providing the Internet connection (such as Reliance or Airtel in India) are forbidden from retaining records of access to applications on the Internet (Art. 14). While law enforcement authorities may request a longer retention period, a court order (filed for by the authority within 60 days from the date of such request) is required to access the records themselves. In the event the authority fails to file for such court order within the stipulated period, or if court order is denied, the service provider must protect the confidentiality of the connection records.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt; &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;Though initially excluded from the &lt;em&gt;Marco Civil&lt;/em&gt;, the current draft passed by the Chamber of Deputies requires Internet application providers (such as Google or Facebook) to retain access-logs for their applications for 6 months (Art. 15). Logs for other applications may not be retained without previous consent of the owner, and in any case, the provider cannot retain personal data that is in excess of the purpose for which consent was given by the owner. As for connection records, law enforcement authorities may request a greater retention period, but require a court order to access the data itself.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;These requirements must be understood in light of the rights that the &lt;em&gt;Marco Civil&lt;/em&gt; guarantees to users. Art. 7, which enumerates these user-rights, does not however set forth their &lt;em&gt;content&lt;/em&gt;; this is probably left to judicial interpretation of rights enshrined in the Federal Constitution. In any event, Art. 7 guarantees to all Internet users the “&lt;em&gt;inviolability of intimacy and privacy&lt;/em&gt;”, including the confidentiality of all Internet communications, along with “&lt;em&gt;compensation for material or moral damages resulting from violation&lt;/em&gt;”. In this regard, it assures that users are entitled to a guarantee that no personal data or communication shall be shared with third parties in the absence of express consent, and to “&lt;em&gt;clear and complete information on the collection, use, storage, treatment and protection of their personal data&lt;/em&gt;”. Indeed, where contracts violate the requirements of inviolability and secrecy of private communications, or where a dispute resolution clause does not permit the user to approach Brazilian courts as an alternative, Art. 8 renders such contracts null and void.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;Most importantly, Art. 7 states that users are entitled to clear and complete information about how connection records and access logs shall be stored and protected, and to publicity of terms/policies of use of service providers. Additionally, Art. 7 emphasizes quality of service and accessibility to the Internet, and forbids suspension of Internet connections except for failure of payments. Read comprehensively, therefore, Arts. 7-15 of the &lt;em&gt;Marco Civil prima facie&lt;/em&gt; set down robust protections for private and personal data and communications.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;An initial draft of the &lt;em&gt;Marco Civil&lt;/em&gt; &lt;a class="external-link" href="http://www.zdnet.com/companies-brace-for-brazil-local-data-storage-requirements-7000027092/"&gt;sought to mandate&lt;/a&gt; local storage of all Brazilians’ data within Brazilian territory. This came in response to Snowden’s revelations of NSA surveillance, and President Rousseff, in her &lt;a class="external-link" href="http://gadebate.un.org/sites/default/files/gastatements/68/BR_en.pdf"&gt;statement&lt;/a&gt; to the United Nations, declared that Brazil sought to protect itself from “&lt;em&gt;illegal interception of communications and data&lt;/em&gt;”. However, the implications of this local storage requirement was the creation of a &lt;a class="external-link" href="http://bigstory.ap.org/article/brazil-looks-break-us-centric-internet"&gt;geographically isolated&lt;/a&gt; Brazilian Internet, with repercussions for the Internet’s openness and interoperability that the &lt;em&gt;Marco Civil&lt;/em&gt; itself sought to protect. Moreover, there are &lt;a class="external-link" href="http://www.gp-digital.org/gpd-update/data-retention-provisions-in-the-marco-civil/"&gt;implications&lt;/a&gt; for efficiency and business; for instance, small businesses may be unable to source the money or capacity to comply with local storage requirements. Also, they lead to mandating storage on political grounds, and not on the basis of effective storage. Amid widespread protest from corporations and civil society, this requirement was then &lt;a class="external-link" href="http://www.zdnet.com/brazil-gives-up-on-local-data-storage-demands-net-neutrality-7000027493/"&gt;withdrawn&lt;/a&gt; which, some say, propelled the quick passage of the bill in the Chamber of Deputies.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Intermediary liability:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Laws of many countries make service providers liable for third party content that infringes copyright or that is otherwise against the law (such as pornography or other offensive content). For instance, Section 79 of the Indian Information Technology Act, 2000 (as amended in 2008) is such a provision where intermediaries (i.e., those who host user-generated content, but do not create the content themselves) may be held liable. However, stringent intermediary liability regimes create the possibility of private censorship, where intermediaries resort to blocking or filtering user-generated content that they fear may violate laws, sometimes even without intimating the creator of the infringing content. The &lt;em&gt;Marco Civil&lt;/em&gt; addresses this possibility of censorship by creating a restricted intermediary liability provision. Please note, however, that the bill expressly excludes from its ambit copyright violations, which a &lt;a class="external-link" href="http://infojustice.org/archives/31993"&gt;copyright reforms bill&lt;/a&gt; seeks to address.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;At first instance, the &lt;em&gt;Marco Civil&lt;/em&gt; exempts service providers from civil liability for third party content (Art. 18). Moreover, intermediaries are liable for damages arising out of third party content &lt;em&gt;only&lt;/em&gt; where such intermediaries do not comply with court orders (which may require removal of content, etc.) (Art. 19). This leaves questions of infringement and censorship to the judiciary, which the author believes is the right forum to adjudicate such issues. Moreover, wherever identifying information is available, Art. 20 mandates the intermediary to appraise the creator of infringing content of the reasons for removal of his/her content, with information that enables the creator to defend him- or herself in court. This measure of transparency is particularly laudable; for instance, in India, no such intimation is required by law, and you or I as journalists, bloggers or other creators of content may never know why our content is taken down, or be equipped to defend ourselves in court against the plaintiff or petitioner who sought removal of our content. Finally, a due diligence requirement is placed on the intermediary in circumstances where third party content discloses, “&lt;em&gt;without consent of its participants, of photos, videos or other materials containing nudity or sexual acts of private character&lt;/em&gt;”. As per Art. 21, where the intermediary does not take down such content upon being intimated by the concerned participant, it may be held secondarily liable for infringement of privacy.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;This restricted intermediary liability regime is further strengthened by a requirement of specific identification of infringing content, which both the court order issued under Art. 20 and the take-down request under Art. 21 must fulfill. This requirement is missing, for instance, under Section 79 of the Indian Information Technology Act, which creates a diligence and liability regime without requiring idenfiability of infringing content.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;h3&gt;&lt;strong&gt;&lt;em&gt;Conclusion:&lt;/em&gt;&lt;/strong&gt;&lt;/h3&gt;
&lt;div&gt;Brazil’s ‘Internet Constitution’ has done much to add to the ongoing discussion on the rights and responsibilities of users and providers. By expressly adopting protections for net neutrality and online privacy and freedom of expression, the Marco Civil may be considered to set itself up as a model for Internet rights at the municipal level, barring a Utopian bill of rights. Indeed, in an effusive statement of support for the bill, Sir Tim Berners-Lee stated: “&lt;em&gt;If Marco Civil is passed, without further delay or amendment, this would be the best possible birthday gift for Brazilian and global Web users.&lt;/em&gt;”&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;Of course, the &lt;em&gt;Marco Civil&lt;/em&gt; is not without its failings. Authors &lt;a class="external-link" href="http://infojustice.org/archives/32527"&gt;say&lt;/a&gt; that the data retention requirements by connection and application providers, with leeway provided for law enforcement authorities to lengthen retention periods, is problematic. Moreover, the discussions surrounding data localization and a ‘walled-off’ Internet that protects against surveillance ignores the interoperability and openness that forms the core of the Internet.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;On the whole, though, the &lt;em&gt;Marco Civil&lt;/em&gt; may be considered a victory, on many counts. It is possibly the first successful example of a national legislation that is the outcome of a broad, consultative process with civil society and other affected entities. It expressly affirms Brazil’s commitment to the protection of privacy and freedom of expression, as well as to Internet accessibility and the openness of the network. It aims to eliminate the possibility of private censorship online, while upholding privacy rights of users. It seeks to reduce the potential for abuse of personal data and communication by government authorities, by requiring judicial authorization for the same. In a world where warrantless government spying extends across national border, such a provision is novel and desirable. One hopes that, when the global Internet community sits down at its various fora to identify and enumerate principles for Internet governance, it will look to the &lt;em&gt;Marco Civil&lt;/em&gt; as an example of standards that governments may adhere to, and not necessarily resort to the lowest common denominator standards of international rights and protections.&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/marco-civil-da-internet'&gt;https://cis-india.org/internet-governance/blog/marco-civil-da-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-06-19T10:38:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/outlook-april-1-2014-two-indians-in-global-commission-on-web-governance">
    <title>Two Indians in Global Commission on Web Governance</title>
    <link>https://cis-india.org/news/outlook-april-1-2014-two-indians-in-global-commission-on-web-governance</link>
    <description>
        &lt;b&gt;Two Indians are among 25 internationally recognised experts named to assist a global body in identifying and prioritising web governance and Internet policy-related issues.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://news.outlookindia.com/items.aspx?artid=835007"&gt;Outlook&lt;/a&gt;,in the &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2014-04-01/news/48767578_1_internet-governance-two-indians-general-dynamics"&gt;Economic Times &lt;/a&gt; and in &lt;a class="external-link" href="http://mattersindia.com/two-indians-among-25-selected-for-internet-governance-network/"&gt;Matters India&lt;/a&gt; on April 1, 2014. Sunil Abraham has been named as one of the experts.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Subimal Bhattacharjee, former country head of General Dynamics in India and a well known cyber security expert hailing from Assam, and Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society appointed to Research Advisory Network (RAN) of the Global Commission on Internet Governance (GCIG) are the two Indians named.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;GCIG is a two-year initiative launched by the Centre for International Governance Innovation and Chatham House. RAN will assist in identifying and prioritising Internet governance and Internet policy related issues within the commission's mandate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Members of RAN will provide expert briefings to the members of the commission and conduct research and analysis for the commission's preparatory work and final report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chaired by Sweden's Foreign Minister Carl Bildt, the commission will produce a comprehensive stand on the future of multi-stakeholder Internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhattacharjee works on cyber security and critical infrastructure protection policy issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He was one of the 31 experts invited by the UN through UNIDIR in 2008 to deliberate on the agenda for the 20 nations Group of Governmental Experts that was set up in 2009 to study the impact of cyber on international security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He was also a member of the Expert Group on Global Initiatives under the Sam Pitroda Expert Committee to review the functioning of Prasar Bharati.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/outlook-april-1-2014-two-indians-in-global-commission-on-web-governance'&gt;https://cis-india.org/news/outlook-april-1-2014-two-indians-in-global-commission-on-web-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T09:56:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/bbc-news-india-atish-patel-indias-social-media-election-battle">
    <title>India's social media election battle</title>
    <link>https://cis-india.org/news/bbc-news-india-atish-patel-indias-social-media-election-battle</link>
    <description>
        &lt;b&gt;Ahead of the general elections, political parties in India are attempting to woo voters on social media for the first time.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Atish Patel was &lt;a class="external-link" href="http://www.bbc.com/news/world-asia-india-26762391"&gt;published by BBC&lt;/a&gt; on March 31, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Politicians are taking part in Google+ Hangouts, televised interviews  organised by Facebook and using the Facebook-owned smart phone messaging  app WhatsApp to connect with millions of tech-savvy urban voters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India's 16th general election - to be held in &lt;a href="http://www.bbc.com/news/world-asia-india-26445322" title="India names general election dates"&gt;nine phases&lt;/a&gt; over April and May - will be closely fought, with some observers saying  social media will play a vital role in deciding which party wins the  most seats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a report published in April 2013 by the Internet and Mobile  Association of India (IAMAI) and the Mumbai-based Iris Knowledge  Foundation, Facebook users will "wield a tremendous influence" over the  results of the polls in 160 of India's 543 constituencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It's a finding political parties have taken note of, with major  contenders like the ruling Congress party and main opposition Bharatiya  Janata Party (BJP) earmarking 2-5% of their election budgets for social  media, according to an October 2013 study by IAMAI and Mumbai-based  market researcher IMRB International.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Big data&lt;/h3&gt;
&lt;p&gt;During the last general election in 2009, social media usage in India was minuscule.&lt;/p&gt;
&lt;p&gt;Today, however, Facebook has 93 million users and Twitter has an estimated 33 million accounts in the country. Many political parties have beefed up their online presence as a result.&lt;/p&gt;
&lt;p&gt;The main opposition BJP's prime ministerial candidate, Narendra Modi, was among the first Indian politicians to set up a website and today is on Twitter, Facebook and Google+.&lt;/p&gt;
&lt;p&gt;His main rival, Rahul Gandhi, the Congress party's undeclared candidate for PM, however, doesn't have a website and doesn't use any of the three major social networks.&lt;/p&gt;
&lt;p&gt;Anti-corruption campaigner-turned-politician Arvind Kejriwal has amassed 1.5 million followers on Twitter since joining in November 2011, a year before he launched his Aam Aadmi Party (AAP) and over two years after Mr Modi, who has 3.6 million followers, opened his account.&lt;/p&gt;
&lt;p&gt;"Now no serious politician is seen as being able to avoid social media  altogether," said Congress government minister Shashi Tharoor, who until  he was overtaken by Mr Modi last July, was the most followed Indian  politician on Twitter.&lt;/p&gt;
&lt;p&gt;"It does have a significant reach in certain segments of the population  and as far as we're concerned, that's important enough to pay attention  to and clearly the opposition is paying attention to it too," he added.&lt;/p&gt;
&lt;p&gt;Taking a leaf from US President Barack Obama's presidential campaigns,  India's parties are using tools to crunch the insurmountable amounts of  information social media generates - what's known as big data analytics.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Rahul.png" alt="Rahul" class="image-inline" title="Rahul" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;Rahul Gandhi doesn't have a website and doesn't use any of the three major social networks&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Pinstorm, a digital marketing agency used by some of India's biggest  companies to monitor what is being discussed online, now has political  parties as clients.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From its Mumbai office, the agency has been collecting,  storing and analysing tens of thousands of political statements from  over 100 online platforms daily for the past six months to allow parties  to find supporters and tweak their political message.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The agency is able to track conversations at national and  local level, making it a useful tool for both national and regional  parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The anti-corruption AAP, taking part in its first general  election after an impressive debut in local polls in Delhi last year,  uses Pinstorm to "compare how we are faring against others", said Ankit  Lal, the party's social media strategist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Professor Amit Sheth and a team of researchers at the Ohio  Centre of Excellence in Knowledge-enabled Computing at Wright State  University have also been &lt;a href="http://knoesis-twit.cs.wright.edu/twitris_dev/indiaelection/insights/"&gt;tracking political sentiment online&lt;/a&gt; since July.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He says data collected from social media could in the future  replace opinion polls, which many observers say are often rigged in  India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"With social media data, we can measure sentiments, for  example, before a rally, during the rally, and post-analysis. It's much  more frequent [than opinion polls]," Mr Sheth said.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;'Dipstick of the elite'&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There are some, however, who are doubtful about social media's expected effect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media "is not a true dipstick. It really is only a dipstick of the elite," said Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sceptics believe with so many Indians illiterate and lacking internet access, particularly in rural swathes of the country, it is still essential for political leaders to hold rallies and spend on billboard and newspaper advertising to reach the majority of the 814 million-strong electorate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parties are also interacting with voters on their mobile devices and it makes sense.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/FB.png" alt="FB" class="image-inline" title="FB" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Facebook has 93 million users in India&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;There are more mobile phones in India today than toilets, according to the latest census data, and just over half of the country's 1.2 billion population owns one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Mobile is very integral to our strategy," said Arvind Gupta, who heads the BJP's IT and social media cell.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the BJP's most unique electioneering tools allows potential voters to listen in on Mr Modi's rally speeches in real time on their phones from anywhere in India. "It's our own innovation," said Mr Gupta.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The number of smartphone users is growing in India and it's how most of the country's web users go online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That's why WhatsApp, recently purchased by Facebook, is being used by the likes of the BJP and Congress to send photos, videos and messages to potential voters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"No other medium gives as much mass, simultaneous reach as mobile phones in India today," said Milind Pathak from One97 Communications, a Delhi-based mobile marketing firm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Political parties like AAP have signed up tens of thousands of members by urging people to give them a missed call for free - party officers then get in touch and formally enrol them as supporters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Looking forward, I think the medium will continue to be a heavily-invested area for a political party," Mr Pathak said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/bbc-news-india-atish-patel-indias-social-media-election-battle'&gt;https://cis-india.org/news/bbc-news-india-atish-patel-indias-social-media-election-battle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-03T09:37:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011">
    <title>Leaked Privacy Bill: 2014 vs. 2011</title>
    <link>https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has recently received a leaked version of the draft Privacy Bill 2014 that the Department of Personnel and Training, Government of India has drafted.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;After obtaining a copy of the leaked Privacy Bill 2014, we have  replaced the blog "An Analysis of the New Draft Privacy Bill" which was  based off of a report from the Economic Times, with this blog post&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This represents the third leak of potential privacy legislation for India that we know of, with publicly available versions having leaked in &lt;a href="http://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf"&gt;April 2011&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;September 2011&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When compared to the September 2011 Privacy Bill, the text of the 2014 Bill includes a number of changes, additions, and deletions.  Below is an outline of significant changes from the &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;September 2011 Privacy Bill&lt;/a&gt; to the 2014 Privacy Bill:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Scope:&lt;/b&gt; The 2014 Bill extends the right to Privacy to all residents of India. This is in contrast to the 2011 Bill, which extended the Right to Privacy to citizens of India.  The 2014 Bill furthermore recognizes the Right to Privacy as a part of Article 21 of the Indian Constitution and extends to the whole of India, whereas the 2011 Bill did not explicitly recognize the Right to Privacy as being a part of Article 21, and excluded Jammu and Kashmir from its purview.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Definitions:&lt;/span&gt;&lt;/b&gt;&lt;span&gt; The 2014 Bill includes a number of new definitions, redefines existing terms, and deletes others.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Terms that have been added in the 2014 Bill and the definitions&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Personal identifier&lt;/i&gt;:&lt;/b&gt; Any unique alphanumeric sequence of members, letters, and symbols that specifically identifies an individual with a database or a data set.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Legitimate purpose&lt;/i&gt;:&lt;/b&gt; A purpose covered under this Act or any other law for the time being in force, which is certain, unambiguous, and limited in scope for collection of any personal data from a data subject.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Competent authority&lt;/i&gt;&lt;/b&gt; : The authority which is authorized to sanction interception or surveillance, as the case may be, under this Act or rules made there under or any other law for the time being in force.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Notification&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: &lt;/i&gt;Notification issued under this Act and published in the Official Gazette&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Control&lt;/i&gt; :&lt;/b&gt; And all other cognate forms of expressions thereof, means, in relation to personal data, the collection or processing of personal data and shall include the ability to determine the purposes for and the manner in which any personal data is to be collected or processed.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;i&gt;Telecommunications system&lt;/i&gt;:&lt;/b&gt; Any system used for transmission or reception of any communication by wire, radio, visual or other electromagnetic means but shall not include broadcasting services.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Privacy standards&lt;/i&gt;:&lt;/b&gt; The privacy standards or protocols or codes of practice.  developed by industry associations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Terms that have been re-defined in the 2014 Bill from the 2011 Bill and the 2014 Bill definitions&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Communication data:&lt;/i&gt;&lt;/b&gt;The data held or obtained by a telecommunications service provider in relation to a data subject including the data usage of the telecommunications &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Data subject&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;: Any living individual, whose personal data is controlled by any person&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Interception&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: &lt;/i&gt;In relation to any communication in the course of its transmission through a telecommunication system, any action that results in some or all of the contents of that communication being made available, while being transmitted, to a person other than the sender or the intended recipient of the communication. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Person&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: A&lt;/i&gt;ny natural or legal person and shall include a body corporate, partnership, society, trust, association of persons, Government company, government department, urban  local body, or any other officer, agency or instrumentality of the state. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Sensitive personal data&lt;/i&gt;:&lt;/b&gt; Personal data relating to: (a) physical and mental health including medical history, (b) biometric, bodily or genetic information, (c) criminal convictions (d) password, (e) banking credit and financial data (f) narco analysis or polygraph test data, (g) sexual orientation.  Provided that any information that is freely available or accessible in public domain or to be furnished under the Right to Information Act 2005 or any other law for time being in force shall not be regarded as sensitive personal data for the purposes of this Act.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Individual:&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;a resident of Indian &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Covert surveillance&lt;/i&gt;:&lt;/b&gt; covert Surveillance" means obtaining private information about an individual and his private affairs without his knowledge and includes: (i) directed surveillance which is undertaken for the purposes of specific investigation or specific operation in such a manner as is likely to result in the obtaining of private information about a person whether or not that person was specifically identified in relation to the investigation or operation; (ii) intrusive surveillance which is carried out by an individual or a surveillance device  in relation to anything taking place on a residential premise or in any private vehicle. It also covers use of any device outside the premises or a vehicle wherein it can give information of the same quality and detail as if the device were in the premises or vehicle; (iii) covert human intelligence service which is information obtained by a person who establishes or maintains a personal or other relationship with an individual for the covert purpose of using such a relationship to obtain or to provide access to any personal information about that individual&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Re-identify&lt;/i&gt;&lt;/b&gt;: means the recovery of data from an anonymised data, capable of identifying a data subject whose personal data has been anonymised;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Process&lt;/i&gt;:&lt;/b&gt; “process" and all other cognate forms of expressions thereof, means any operation or set of operations, whether carried out through automatic means or not by any person or organization, that relates to:(a) collation, storage, disclosure, transfer, updating, modification, alteration or use of personal data; or (b) the merging, linking, blocking, degradation or anonymisation of personal data;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Direct marketing&lt;/i&gt;&lt;/b&gt;: Direct Marketing means sending of a commercial communication to any individual &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Data controller&lt;/i&gt;&lt;/b&gt;:  any person who controls, at any point in time, the personal data of a data subject but shall not include any person who merely provides infrastructure for the transfer or storage of personal data to it data controller;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt; Government&lt;/i&gt;&lt;/b&gt;: the Central Government or as the case may be, the State Government and includes the Union territory Administration, local authority or any agency and instrumentality of the Government;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Terms that have been removed from the 2014 Bill that were in the 2011 Bill and the 2011 definition:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Consent: Includes implied consent&lt;/li&gt;
&lt;li&gt;Maintain: Includes maintain, collect, use, or disseminate.&lt;/li&gt;
&lt;li&gt;Data processor: In relation to personal data means any person (other than the employee of the data controller), who processes the data on behalf of the data controller. &lt;/li&gt;
&lt;li&gt;Local authority: A municipal committee, district board, body of port commissioners, council, board or other authority legally entitled to, or entrusted by the Government with, the control or management of a municipal or local fund. &lt;/li&gt;
&lt;li&gt;Prescribed: Prescribed by rules made under this Act.&lt;/li&gt;
&lt;li&gt;Surveillance: Surveillance undertaken through installation and use of CCTVs and other system which capture images to identify or monitor individuals (this was removed from the larger definition of surveillance.)&lt;/li&gt;
&lt;li&gt;DNA: Cell in the body of an individual, whether collected from a cheek, cell, blood cell, skin cell or other tissue, which allows for identification of such individual when compared with other individual. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Terms that have remained broadly (with some modification) the same between the 2014 Bill and 2011 Bill (as per the 2014 Bill definition):&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Authority: The Data Protection Authority of India &lt;/li&gt;
&lt;li&gt;Appellate tribunal: the Cyber Appellate Tribunal established under Sub-Section (1) of section n48 of the Information Technology Act, 2000.&lt;/li&gt;
&lt;li&gt;Personal data: Any data which relates to a data subject, if that data subject can be identified from that data, either directly or indirectly, in conjunction with other data that the data controller has or is likely to have and includes any expression of opinion about such data subject. &lt;/li&gt;
&lt;li&gt;Member: Member of the Authority &lt;/li&gt;
&lt;li&gt;Disclose: and all other cognate forms of expression thereof, means disclosure, dissemination, broadcast, communication, distribution, transmission, or make available in any manner whatsoever, of personal data. &lt;/li&gt;
&lt;li&gt;Anonymised: The deletion of all data that identifies the data subject or can be used to identify the data subject by linking such data to any other data of the data subject, by the data controller. &lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Exceptions to the Right to Privacy&lt;/b&gt;: According to the 2011 Bill, the exceptions to the Right to Privacy included: &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Sovereignty, integrity and security of India, strategic, scientific or economic interest of the state &lt;/li&gt;
&lt;li&gt;Preventing incitement to the commission of any offence &lt;/li&gt;
&lt;li&gt;Prevention of public disorder or the detection of crime&lt;/li&gt;
&lt;li&gt;Protection of rights and freedoms of others &lt;/li&gt;
&lt;li&gt;In the interest of friendly relations with foreign state&lt;/li&gt;
&lt;li&gt;Any other purpose specifically mentioned in the Act. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill reflects almost all of the exceptions defined in the 2011 Bill, but removes ‘detection of crime’ from the list of exceptions. The 2014 Bill also qualifies that the application of each exception must be adequate, relevant, and not excessive to the objective it aims to achieve and must be imposed on the manner prescribed – whereas the 2011 Bill stated only that the application of exceptions to the Right to Privacy cannot be disproportionate to the purpose sought to be achieved.&lt;/p&gt;
&lt;p id="content" style="text-align: justify; "&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Acts not to be considered deprivations of privacy:  The 2011 Bill lists five instances that  will not be considered a deprivation of privacy  - namely&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;For journalistic purposes unless it is proven that there is a reasonable expectation of privacy, &lt;/li&gt;
&lt;li&gt;Processing data for personal or household purposes,&lt;/li&gt;
&lt;li&gt;Installation of surveillance equipment for the security of private premises, &lt;/li&gt;
&lt;li&gt;Disclosure of information via the Right to Information Act 2005,&lt;/li&gt;
&lt;li&gt;And any other activity exempted under the Act.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 limits these instances to:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The processing of data purely for personal or household purposes, &lt;/li&gt;
&lt;li&gt;Disclosure of information under the Right to Information Act 2005,&lt;/li&gt;
&lt;li&gt;And any other action specifically exempted under the Act.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Privacy Principles:  Unlike the 2011 Bill, the 2014 Bill defines nine specific privacy principles: notice, choice and consent, collection limitation, purposes limitation, access and correction, disclosure of information, security, openness, and accountability. The Privacy Principles will apply to all existing and evolving practices. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Provisions for Personal Data: Both the 2011 Bill and the 2014 Bill have provisions that apply to the processing of personal and sensitive personal data. The 2011 Bill includes provisions addressing the:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Collection of personal data, &lt;/li&gt;
&lt;li&gt;Processing of personal data, &lt;/li&gt;
&lt;li&gt;Data quality, &lt;/li&gt;
&lt;li&gt;Provisions relating to sensitive personal data, &lt;/li&gt;
&lt;li&gt;Retention of personal data,&lt;/li&gt;
&lt;li&gt;Sharing (disclosure) of personal data, &lt;/li&gt;
&lt;li&gt;Security of personal data, &lt;/li&gt;
&lt;li&gt;Notification of breach of security, &lt;/li&gt;
&lt;li&gt;Access to personal data by data subject,&lt;/li&gt;
&lt;li&gt;Updation of personal data by data subject&lt;/li&gt;
&lt;li&gt;Mandatory processing of data,&lt;/li&gt;
&lt;li&gt;Trans border flows of personal data.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Of these, the 2014 Bill broadly (though not verbatim) reflects the 2011 Bill provisions relating to the:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Collection of personal data,&lt;/li&gt;
&lt;li&gt;Processing of personal data, &lt;/li&gt;
&lt;li&gt;Access to personal data,&lt;/li&gt;
&lt;li&gt;Updating personal data&lt;/li&gt;
&lt;li&gt;Retention of personal data&lt;/li&gt;
&lt;li&gt;Data quality, &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill has further includes provisions addressing:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Openness and accountability, &lt;/li&gt;
&lt;li&gt;Choice, &lt;/li&gt;
&lt;li&gt;Consent,&lt;/li&gt;
&lt;li&gt;Exceptions for personal identifiers. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill has made changes to the provisions addressing:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Provisions relating to sensitive personal data, &lt;/li&gt;
&lt;li&gt;Sharing (disclosure of personal data), &lt;/li&gt;
&lt;li&gt;Notification of breach of security, &lt;/li&gt;
&lt;li&gt;Mandatory processing of data &lt;/li&gt;
&lt;li&gt;Security of personal data&lt;/li&gt;
&lt;li&gt;Trans border flows of personal data. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The changes that have been made have been mapped out below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Provisions Relating to Sensitive Personal Data:&lt;/b&gt; The 2011Bill and 2014 Bill both require authorization by the Authority for the collection and processing of sensitive personal data. At the same time, both Bills include a list of circumstances under which authorization for the collection and processing of sensitive personal data is not required. On the whole, this list is the same between the 2011 Bill and 2014 Bill, but the 2014 Bill adds the following circumstances on which authorization is not needed for the collection and processing of sensitive personal data:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;For purposes related to the insurance policy of the individual if the data relates to the physical or mental health or medical history of the individual and is collected and processed by an insurance company.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Collected or processed by the Government Intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill also allows the Authority to specify additional regulations for sensitive personal data, and requires that any additional transaction sought to be performed with the sensitive personal information requires fresh consent to first be obtained. The 2014 Bill carves out another exception for Government agencies, allowing disclosure of sensitive personal data without consent to Government agencies mandated under law for the purposes of verification of identity, or for prevention, detection, investigation including cyber incidents, prosecution, and punishment of offences.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notification of Breach of Security&lt;/b&gt;: The provisions relating to the notification of breach of security in the 2014 Bill differ from the 2011 Bill. Specifically, the 2014 Bill removes the requirement that data controllers must publish information about a data breach in two national news papers. Thus, in the 2014 Bill, data controllers must only inform the data protection authority and affected individuals of the breach. &lt;br /&gt;&lt;b&gt;&lt;br /&gt;Notice&lt;/b&gt;: The 2014 Bill changes the structure of the notice mechanism – where in the 2011 Bill, prior to the processing of data, data controllers had to take all reasonable steps to ensure that the data subject was aware of the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; &lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The documented purposes for which such personal data is being collected&lt;/li&gt;
&lt;li&gt;Whether providing of personal data by the data subject is voluntary or mandatory under law or in order to avail of any product or service&lt;/li&gt;
&lt;li&gt;The consequences of the failure to provide the personal data &lt;/li&gt;
&lt;li&gt;The recipient or category of recipients of the personal data &lt;/li&gt;
&lt;li&gt;The name and address of the data controller and all persons who are or will be processing information on behalf of the data controller &lt;/li&gt;
&lt;li&gt;If such personal data is intended to be transferred out of the country, details of such transfer. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;In contrast the 2014 Bill provides that before personal data is collected, the data controller must give notice of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;What data is being collected and&lt;/li&gt;
&lt;li&gt;The legitimate purpose for the collection.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;If the purpose for which the data was collected has changed the data controller will then be obligated to provide the data subject with notice of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The use to which the personal data will be put&lt;/li&gt;
&lt;li&gt;Whether or not the personal data will be disclosed to a third party and if so the identity of such person &lt;/li&gt;
&lt;li&gt;If the personal data being collected is intended to be transferred outside India  and the reasons for doing so, how the transfer helps in achieving the legitimate purpose and whether the country to which such data is transferred has suitable legislation to provide for adequate protection and privacy of the data. &lt;/li&gt;
&lt;li&gt;The security and safeguards established by the data controller in relation to the personal data &lt;/li&gt;
&lt;li&gt;The processes available to a data subject to access and correct  his personal data&lt;/li&gt;
&lt;li&gt;The recourse open to a data subject, if he has any complaints in respect of collection or processing of the personal data and the procedure relating thereto&lt;/li&gt;
&lt;li&gt;The name, address, and contact particulars of the data controller and all persons who will be processing the personal data on behalf of the data controller. &lt;/li&gt;
&lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Disclosure of personal data&lt;/b&gt;: Though titled as ‘sharing of personal data’ both the 2011 Bill and 2014 Bill require consent for the disclosure of personal information, but list exceptional circumstances on which consent is not needed. In the 2011 bill, the relevant provision permits disclosure of personal data without consent only if (i) the sharing was a part of the documented purpose, (ii) the sharing is for any purpose relating to the exceptions to the right to privacy or (iii) the Data Protection Authority has authorized the sharing.  In contrast, the 2014 Bill permits disclosure of personal data without consent if (i) such disclosure is part of the legitimate purpose (ii) such disclosure is for achieving any of the objectives of section 5 (iii) the Authority has by order authorized such disclosure (iv) the disclosure is required under any law for the time being in force (v) the disclosure is made to the Government Intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.  As a safeguard, the 2014 Bill requires that any person to whom  personal information is disclosed, whether a resident or not, must adhere to all provisions of the Act. Furthermore, the disclosure of personal data must be limited to the extent which is necessary to achieve the purpose for which the disclosure is sought and no person can make public any personal data that is in its control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transborder flow of information&lt;/b&gt;: Though both the 2011 Bill and the 2014 Bill require any country that data is transferred to must have equivalent or stronger data protection standards in place, the 2014 Bill carves out an exception for law enforcement and intelligence agencies and the transfer of any personal data outside the territory of India, in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mandatory Processing of Data&lt;/b&gt;: Both the 2011 Bill and 2014 Bill have provisions that address the mandatory processing of data. These provisions are similar, but the 2014 Bill includes a requirement that data controllers must anonymize personal data that is collected without prior consent from the data subject within a reasonable time frame after collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security of Personal Data:&lt;/b&gt; The provision relating to the security of personal information in the 2014 Bill has been changed from the 2011 Bill by expanding the list and type of breaches that must be prevented, but removing requirements that data controllers must ensure all contractual arrangements with data processors specifically ensure that the data is maintained with the same level of  security.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Conditions on which provisions do not apply:&lt;/b&gt; Both the 2011Bill and 2014 Bill define conditions on which the provisions of updating personal data, access, notification of breach of security, retention of personal data, data quality, consent, choice, notice, and right to privacy  will not apply to personal data.  Though the 2011 Bill and 2014 Bill reflect the same conditions, the 2014 Bill  carves out an exception for Government Intelligence Agencies  - stating that the provisions of  updating personal data, access to data by the data subject, notification about breach of security, retention of personal data, data quality, processing of personal data, consent, choice, notice, collection from an individual will not apply to data collected or processed in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy Officers&lt;/b&gt;: Unlike the 2011 Bill, the 2014 Bill defines the role of the privacy officer that must be established by every data controller for the purpose of overseeing the security of personal data and implementation of the provisions of the Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Power of Authority to Exempt: &lt;/b&gt; Both the 2011 Bill and 2014 Bill contain provisions that enable the Authority to waive the applicability of specific provisions of the Act. The circumstances on which this can be done are based on the exceptions to the Right to Privacy in both the 2011 and 2014 Bill. To this extent, the 2014 Bill differs slightly from the 2011 Bill, by removing the power of the Authority to exempt for the ‘detection of crime’ and ‘any other legitimate purpose mentioned in this Act’ .&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Data Protection Authority:&lt;/b&gt; The 2011 Bill and 2014 Bill both establish Data Protection Authorities, but the 2014 Bill further clarifies certain aspects of the functioning of the Authority and expands the functions and the powers of the Authority.  For example, new functions of the Authority include:&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Auditing any or all personal data controlled by the data controller to assess whether it is being maintained in accordance with the Act, &lt;/li&gt;
&lt;li&gt; Suggesting international instruments relevant to the administration of the Act,&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Encouraging industry associations to evolve privacy standards for self regulations, adjudicating on disputes arising between data controllers or between individuals and data controllers.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill also expands the powers of the Data Protection Authority – importantly giving him the power to receive, investigate complaints about alleged violations of privacy and issue appropriate orders or directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, the 2014 Bill carves out an exception for Government Intelligence Agencies and Law Enforcement agencies – preventing the Authority from conducting investigations, issuing appropriate orders or directions, and adjudicating complaints in respect to actions taken by the Government Intelligences Agencies and Law Enforcement,  if for the objectives of  (a) sovereignty, integrity or security of India; or(b) strategic, scientific or economic interest of India; or(c) preventing incitement to the commission of any offence, or (d) prevention of public disorder, or(e) the investigation of any crime; or (f) protection of rights and freedoms of others; or (g) friendly relations with foreign states; or (h) any other legitimate purpose mentioned in this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This power is instead vested with a court of competent jurisdiction.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The National Data Controller Registry&lt;/b&gt;: The 2014 Bill removes the National Data Controller Registry and requirements for data controllers to register themselves and oversight of the Registry by the Data Protection Authority.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Direct Marketing: &lt;/b&gt;Both the 2011 and 2014 Bills contain provisions regulating the use of personal information for direct marketing purposes. Though the provisions are broadly the same, the 2011 Bill envisions that no person will undertake direct marketing unless he/she is registered in the ‘National Data Registry’  and one of the stated purposes is direct marketing. As the 2014 Bill removes the National Data Registry, the 2014 Bill now requires that any person undertaking direct marketing must have on record where he/she has obtained personal data from.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Interception of Communications&lt;/b&gt;: Though maintaining some of the safeguards defined in the 2011 Bill for interception,  2014 Bill changes  the interception regime envisioned in the 2011 Bill by carving out a wide exception for organizations monitoring the electronic mail of employees,  removing provisions requiring the interception take place only for the minimum period of time required for achieving the purposes, and removing provisions excluding the use of intercepted communications as evidence in a court of law. Similar to the 2011 Bill, the 2014 Bill specifies that the principles of notice, choice and consent, access and correction, and openness will not apply to the interception of communications.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Video Recording Equipment in public places&lt;/b&gt;: Unlike the 2011 Bill, which addressed only the use of CCTV’s, the 2014 Bill addresses the installation and use of video recording equipment in public places. Though both the 2011 Bill and 2014 Bill both prevent the use of recording equipment and CCTVs for the purpose of identifying an individual, monitoring his personal particulars, or revealing personal, or otherwise adversely affecting his right to privacy - the 2014 Bill requires that the use of recording equipment must be in accordance with procedures, for a legitimate purpose, and proportionate to the objective for which the equipment was installed. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The 2014 Bill makes a broad exception to these safeguards for law enforcement agencies and government intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific, or economic interest of India.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy Standards and Self Regulation&lt;/b&gt;: The 2014 Bill establishes a specific mechanism of self regulation where industry associations will develop privacy standards and adhere to them.  For this purpose, an industry ombudsman should be appointed. The standards must be in conformity with the National Privacy Principles and the provisions of the Privacy Bill. The developed standards will be submitted to the Authority and the Authority may frame regulations based on the standards. If an industry association has not developed privacy standards, the Authority may frame regulations for a specific sector.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Settlement of Disputes and Appellate Tribunal:&lt;/b&gt; The 2014 Bill makes significant change to the process for settling disputes from the 2011 Bill. In the 2014 Bill an Alternative Dispute Mechanism is established where disputes between individuals and data controllers are first addressed by the Privacy Officer of each Data Controller or the industry level Ombudsman. If individuals are not satisfied with the decision of the Ombudsman they may take the complaint to the Authority. Individuals can also take the complaint directly to the Authority if they wish.  If an individual is aggrieved with the decision of the Authority, by a privacy officer or ombudsman through the Alternative Dispute Resolution mechanism, or by the adjudicating officer of the Authority, they may approach the Appellate Tribunal. Any order from the Appellate Tribunal can be appealed at a high court. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In the 2011 Bill disputes between the data controller and an individual can be taken directly to the Appellate Tribunal and orders from the Authority can be appealed at the Tribunal. There is not further path for appeal to an order of the tribunal.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Offences and Penalties:&lt;/b&gt; The 2014 Bill changes the structure of the offences and penalties section by breaking the two into separate sections - one addressing offences and one addressing penalties while the 2011 Bill addressed offences and penalties in the same section. &lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Offences&lt;/b&gt;: The 2014 Bill penalizes every offence with imprisonment and a fine and empowers a police officer not below the rank of Deputy Superintendent of Police to investigate any offence, limits the courts ability to take cognizance of an offence to only those brought by the Authority, requires that the Court be no lower than a Chief Metropolitan Magistrate or a Chief Judicial Magistrate, and permits courts to compound offences. The 2014 Bill further specifies that any offence that is punishable with three years in prison and above is cognizable, and offences punishable with three years in prison are bailable. . Under the 2014 Bill offences are defined as:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Unauthorized interception of communications &lt;/li&gt;
&lt;li&gt;Disclosure of intercepted communications &lt;/li&gt;
&lt;li&gt;Undertaking unauthorized Covert Surveillance &lt;/li&gt;
&lt;li&gt;Unauthorized use of disclosure of communication data &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The offences defined under the Act are reflected in the 2011 Bill, but the time in prison and fine is higher in the 2014 Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Penalties&lt;/b&gt;: The 2014 Bill provides a list of penalties including:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Penalty for obtaining personal data on false pretext&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Penalty for violation of conditions of license pertaining to maintenance of secrecy and confidentiality by telecommunications service providers &lt;/li&gt;
&lt;li&gt;Penalty for disclosure of other personal information &lt;/li&gt;
&lt;li&gt;Penalties for contravention of directions of the Authority &lt;/li&gt;
&lt;li&gt;Penalties for data theft &lt;/li&gt;
&lt;li&gt;Penalties for unauthorised collection, processing, and disclosure of personal data&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Penalties for unauthorized use of personal data for direction marketing. These penalties reflect the penalties in the 2011 bill, but prescribe higher fines&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adjudicating Officer&lt;/b&gt;: Unlike the 2011 Bill that did not have in place an adjudicating officer, the 2014 Bill specifies that the Chairperson of the Authority will appoint a Member of the Authority not  below the Rank of Director of the Government of India to be an adjudicating officer. The adjudicating officer will have the power to impose a penalty and will have the same powers as vested in a civil court under the Code of Civil Procedure. Every proceeding before the adjudicating officer will be considered a judicial processing. When adjudicating the officer must take into consideration the amount of disproportionate gain or unfair advantage, the amount of loss caused, the respective nature of the default&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil Remedies and compensation&lt;/b&gt;: Both the 2011 and 2014 Bill contain provisions that permit an individual to pursue a civil remedy, but the 2014 Bill limits these instances to - if loss or damage has been suffered or an adverse determination is made about an individual due to negligence on complying with the Act, and provides for the possibility that the contravening parties will have to provide a public notice of the offense. &lt;br /&gt;&lt;br /&gt;The 2014 Bill removes provisions specifying that individuals that have suffered loss due to a contravention by the data controller of the Act are entitled to compensation.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Exceptions for intelligence agencies&lt;/b&gt;:  Unlike the 2011 Bill, the 2014 Bill includes an exception for Government Intelligence Agencies and Law Enforcement Agencies – stating that the Authority will not have the power to conduct investigations, issue appropriate orders and directions or otherwise adjudicate complaints in respect of action taken by the Government intelligence agencies and Law  Enforcement agencies for achieving any of the objectives that reflect the defined exceptions to privacy.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society welcomes many of the changes that are reflected in the Privacy Bill 2014, but are cautious about the wide exceptions that have been carved out for law enforcement and intelligence agencies in the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, the Report of Group of Expert s on Privacy was developed for the purpose of informing a privacy framework for India. As such the Centre for Internet and Society will be analyzing in upcoming posts the draft Privacy Bill 2014 and the recommendations in the Report of the Group of Experts on Privacy.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011'&gt;https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-01T10:52:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/intermediary-liability-resources">
    <title>Intermediary Liability Resources</title>
    <link>https://cis-india.org/internet-governance/blog/intermediary-liability-resources</link>
    <description>
        &lt;b&gt;We bring you a list of intermediary resources as part of research on internet governance. This blog post will be updated on an ongoing basis.&lt;/b&gt;
        &lt;ol&gt; &lt;/ol&gt;&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Shielding the Messengers: Protecting Platforms for Expression and Innovation. &lt;/b&gt;The Centre for Democracy and Technology. December 2012, available at: &lt;a href="https://www.cdt.org/files/pdfs/CDT-Intermediary-Liability-2012.pdf"&gt;https://www.cdt.org/files/pdfs/CDT-Intermediary-Liability-2012.pdf&lt;/a&gt;: This paper analyses the impact that intermediary liability regimes have on freedom of expression, privacy, and innovation. In doing so, the paper highlights different models of intermediary liability regimes, reviews different technological means of restricting access to content, and provides recommendations for intermediary liability regimes and provides alternative ways of addressing illegal content online.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Internet Intermediaries: Dilemma of Liability:&lt;/b&gt; Article 19. 2013, available at: &lt;a href="http://www.article19.org/data/files/Intermediaries_ENGLISH.pdf"&gt;http://www.article19.org/data/files/Intermediaries_ENGLISH.pdf:&lt;/a&gt;This Policy Document reviews different components of intermediary liability and highlights the challenges and risks that current models of liability have to online freedom of expression. Relying on international standards for freedom of expression and comparative law,  the document includes recommendations and alternative models that provide stronger protection for freedom of expression. The key recommendation in the document include: web hosting providers or hosts should be immune from liability to third party content if they have not modified  the content, privatised enforcement should not be a model and removal orders should come only from courts or adjudicatory bodies, the model of notice to notice should replace notice and takedown regimes, in cases of alleged serious criminality clear conditions should be in place and defined.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Comparative Analysis of the National Approaches to the Liability of Internet Intermediaries:&lt;/b&gt; Prepared by Daniel Seng for WIPO, available at http://www.wipo.int/export/sites/www/copyright/en/doc/liability_of_internet_intermediaries.pdf:This Report reviews the intermediary liability regimes and associated laws in place across fifteen different contexts with a focus on civil copyright liability for internet intermediaries. The Report seeks to find similarities and differences across the regimes studied and highlight  principles and components in different that can be used in international treaties and instruments, upcoming policies, and court decisions.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Freedom of Expression, Indirect Censorship, &amp;amp; Liability for Internet Intermediaries.&lt;/b&gt; The Electronic Frontier Foundation. February 2011, available at: &lt;a href="http://infojustice.org/download/tpp/tpp-civil-society/EFF%20presentation%20ISPs%20and%20Freedom%20of%20Expression.pdf"&gt;http://infojustice.org/download/tpp/tpp-civil-society/EFF%20presentation%20ISPs%20and%20Freedom%20of%20Expression.pdf&lt;/a&gt;:This presentation was created for the Trans-Pacific Partnership Stakeholder Forum in Chile and highlights that for freedom of expression to be protected, clear legal protections for internet intermediaries are needed and advocates for a regime that provides blanket immunity to intermediaries or is based on judicial takedown notices.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Study on the Liability of Internet Intermediaries. Contracted by the European Commission.&lt;/b&gt; 2007, available at: &lt;a href="http://ec.europa.eu/internal_market/e-commerce/docs/study/liability/final_report_en.pdf"&gt;http://ec.europa.eu/internal_market/e-commerce/docs/study/liability/final_report_en.pdf&lt;/a&gt;. This Report provides insight on the application of the intermediary liability sections of the EU e-commerce directive  and studies the impact of the regulations under the Directive on the functioning of intermediary information society services. To achieve this objective, the study identifies relavant case law across member states, calls out and evaluates developing trends across Member States, and draws conclusions.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Internet Intermediary Liability: Identifying Best Practices for Africa.&lt;/b&gt; Nicolo Zingales for the Association for Progressive Communications,  available at: &lt;a href="https://www.apc.org/en/system/files/APCInternetIntermediaryLiability_BestPracticesAfrica_20131125.pdf"&gt;https://www.apc.org/en/system/files/APCInternetIntermediaryLiability_BestPracticesAfrica_20131125.pdf&lt;/a&gt;: This background paper seeks to identify challenges and opportunities in addressing intermediary liability for countries in the African Union and recommend safeguards that can be included in emerging intermediary liability regimes in the context of human rights. The paper also reviews different models of intermediary liability and discusses the limitations, scope, and modes of operation of each model. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Liability of Internet Intermediaries in Nigeria, Kenya, South Africa, and Uganda&lt;/b&gt;: An uncertain terrain. Association for Progressive Communications. October 2012, available at: &lt;a href="http://www.academia.edu/2484536/The_liability_of_internet_intermediaries_in_Nigeria_Kenya_South_Africa_and_Uganda_An_uncertain_terrain"&gt;http://www.academia.edu/2484536/The_liability_of_internet_intermediaries_in_Nigeria_Kenya_South_Africa_and_Uganda_An_uncertain_terrain&lt;/a&gt;:This Report reviews intermediary liability in Nigeria, Kenya, South Africa and Uganda – providing background to the political context, relevant legislation, and present challenges . In doing so, the Report provides insight into how intermediary liability has changed in recent years in these contexts and explores past and present debates on intermediary liability. The Report concludes with recommendations for stakeholders affected by intermediary liability. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Fragmentation of intermediary liability in the UK&lt;/b&gt;. Daithi Mac Sithigh. 2013, available at: &lt;a href="http://jiplp.oxfordjournals.org/content/8/7/521.full.pdf?keytype=ref&amp;amp;ijkey=zuL8aFSzKJqkozT"&gt;http://jiplp.oxfordjournals.org/content/8/7/521.full.pdf?keytype=ref&amp;amp;ijkey=zuL8aFSzKJqkozT&lt;/a&gt;. This article looks at the application of the Electronic Commerce Directive across Europe and argues that it is being intermixed and subsequently replaced with provisions from national legislation  and provisions of law from area specific legislation. Thus, the article argues that systems for intermediary liability are diving into multiple systems – for example for content related to copyright intermediaries are being placed with new responsibilities while for content related to defamation, there is a reducing in the liability that intermediaries are held to. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Regimes of Legal Liability for Online Intermediaries: an Overview&lt;/b&gt;. OECD, available at:  &lt;a href="http://www.oecd.org/sti/ieconomy/45509050.pdf"&gt;http://www.oecd.org/sti/ieconomy/45509050.pdf&lt;/a&gt;. This article provides an overview of different intermediary liability regimes  including EU and US. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; Closing the Gap: Indian Online Intermediaries and a Liability System Not Yet Fit for Purpose&lt;/b&gt;. GNI. 2014, available at: &lt;a href="http://www.globalnetworkinitiative.org/sites/default/files/Closing%20the%20Gap%20-%20Copenhagen%20Economics_March%202014_0.pdf"&gt;http://www.globalnetworkinitiative.org/sites/default/files/Closing%20the%20Gap%20-%20Copenhagen%20Economics_March%202014_0.pdf&lt;/a&gt;.  This Report argues that the provisions of the Information Technology Act 2000 are not adequate to deal with ICT innovations , and argues that the current liability regime in India is hurting the Indian internet economy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Intermediary Liability in India&lt;/b&gt;. Centre for Internet and Society. 2011, available at: &lt;a href="https://cis-india.org/internet-governance/intermediary-liability-in-india.pdf"&gt;http://cis-india.org/internet-governance/intermediary-liability-in-india.pdf&lt;/a&gt;. This report reviews and ‘tests’  the effect of the Indian intermediary liability on freedom of expression. The report concludes that the present regime in India has a chilling effect on free expression and offers recommendations on how the Indian regime can be amended to protect this right. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Liability of Internet Service providers and the exercise of the freedom of expression in Latin America have been explored in detail through the course of this research paper by Claudio Ruiz Gallardo and J. Carlos Lara Galvez. The paper explores the efficacy and the implementation of proposals to put digital communication channels under the oversight of certain State sponsored institutions in varying degrees. The potential consequence of legal intervention in media and digital platforms, on the development of individual rights and freedoms has been addressed through the course of this study. The paper tries to arrive at relevant conclusions with respect to the enforcement of penalties that seek to redress the liability of communication intermediaries and the mechanism that may be used to oversee the balance between the interests at stake as well as take comparative experiences into account. The paper also analyses the liability of technical facilitators of communications while at the same time attempting to define a threshold beyond which the interference into the working of these intermediaries may constitute an offence of the infringement of the privacy of users. Ultimately, it aims to derive a balance between the necessity for intervention, the right of the users who communicate via the internet and interests of the economic actors who may be responsible for the service: &lt;a class="external-link" href="http://www.palermo.edu/cele/pdf/english/Internet-Free-of-Censorship/02-Liability_Internet_Service_Providers_exercise_freedom_expression_Latin_America_Ruiz_Gallardo_Lara_Galvez.pdf"&gt;http://www.palermo.edu/cele/pdf/english/Internet-Free-of-Censorship/02-Liability_Internet_Service_Providers_exercise_freedom_expression_Latin_America_Ruiz_Gallardo_Lara_Galvez.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;&lt;a class="external-link" href="https://crm.apc.org/civicrm/mailing/view?reset=1&amp;amp;id=191"&gt;Click to read the newsletter&lt;/a&gt; from the Association of Progressive Communications. The summaries for the reports can be found below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet Intermediaries: The Dilemma of Liability in Africa. APC News, May 2014, available at: &lt;a href="http://www.apc.org/en/node/19279/"&gt;http://www.apc.org/en/node/19279/&lt;/a&gt;. This report summarizes the challenges facing internet content regulators in Africa, and the effects of these regulations on the state of the internet in Africa. Many African countries do not protect intermediaries from potential liability, so some intermediaries are too afraid to transmit or host content on the internet in those countries. The report calls for a universal rights protection for internet intermediaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;APC’s Frequently Asked Questions on Internet Intermediary Liability:  APC, May 2014, available at: &lt;a href="http://www.apc.org/en/node/19291/"&gt;http://www.apc.org/en/node/19291/&lt;/a&gt;. This report addresses common questions pertaining to internet intermediaries, which are entities which provide services that enable people to use the internet, from network providers to search engines to comments sections on blogs. Specifically, the report outlines different models of intermediary liability, defining two main models. The “Generalist” model intermediary liability is judged according to the general rules of civil and criminal law, while the “Safe Harbour” model protects intermediaries with a legal safe zone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New Developments in South Africa: APC News, May 2014, available at: &lt;a href="http://www.apc.org/en/news/intermediary-liability-new-developments-south-afri"&gt;http://www.apc.org/en/news/intermediary-liability-new-developments-south-afri&lt;/a&gt;. This interview with researchers Alex Comninos and Andrew Rens goes into detail about the challenges of intermediary in South Africa. The researchers discuss the balance that needs to be struck between insulating intermediaries from a fear of liability and protecting women’s rights in an environment that is having trouble dealing with violence against women. They also discuss South Africa’s three strikes policy for those who pirate material.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Preventing Hate Speech Online In Kenya: APCNews, May 2014, available at: &lt;a href="http://www.apc.org/en/news/intermediary-liability-preventing-hate-speech-onli"&gt;http://www.apc.org/en/news/intermediary-liability-preventing-hate-speech-onli&lt;/a&gt;. This interview with Grace Githaiga investigates the uncertain fate of internet intermediaries under Kenya’s new regime. The new government has mandated everyone to register their SIM cards, and indicated that it was monitoring text messages and flagging those that were deemed risky. This has led to a reduction in the amount of hate speech via text messages. Many intermediaries, such as newspaper comments sections, have established rules on how readers should post on their platforms. Githaiga goes on to discuss the issue of surveillance and the lack of a data protection law in Kenya, which she sees as the most pressing internet issue in Kenya.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New Laws in Uganda Make Internet Providers More Vulnerable to Liability and State Intervention: APCNews, May 2014, available at: &lt;a href="http://www.apc.org/en/news/new-laws-uganda-make-internet-providers-more-vulne"&gt;http://www.apc.org/en/news/new-laws-uganda-make-internet-providers-more-vulne&lt;/a&gt;. In an interview, Lilian Nalwoga discusses Uganda’s recent anti-pornography law that can send intermediaries to prison. The Anti-Pornography Act of 2014 criminalizes any sort of association with any form of pornography, and targets ISPs, content providers, and developers, making them liable for content that goes through their systems. This makes being an intermediary extremely risky in Uganda. The other issue with the law is a vague definition of pornography. Nalwoga also explains the Anti-Homosexuality Act of 2014 bans any promotion or recognition of homosexual relations, and the monitoring technology the government is using to enforce these laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New Laws Affecting Intermediary Liability in Nigeria: APCNews, May 2014, available at: &lt;a href="http://www.apc.org/en/news/new-laws-affecting-intermediary-liability-nigeria"&gt;http://www.apc.org/en/news/new-laws-affecting-intermediary-liability-nigeria&lt;/a&gt;. Gbenga Sesan, executive director of Paradigm Initiative Nigeria, expounds on the latest trends in Nigerian intermediary liability. The Nigerian Communications Commission has a new law that mandates ISPs store users data for at least here years, and wants to make content hosts responsible for what users do on their networks. Additionally, in Nigeria, internet users register with their real name and prove that you are the person who is registration. Sesan goes on to discuss the lack of safe harbor provisions for intermediaries and the remaining freedom of anonymity on social networks in Nigeria.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet Policies That Affect Africans: APC News, May 2014, available at: &lt;a href="http://www.apc.org/en/news/intermediary-liability-internet-policies-affect-af"&gt;http://www.apc.org/en/news/intermediary-liability-internet-policies-affect-af&lt;/a&gt;. The Associsation for Progressive Communcations interviews researcher Nicolo Zingales about the trend among African governments establishing further regulations to control the flow of information on the internet and hold intermediaries liable for content they circulate. Zingales criticizes intermediary liability for “creating a system of adverse incentives for free speech.” He goes on to offer examples of intermediaries and explain the concept of “safe harbor” legislative frameworks. Asked to identify best and worst practices in Africa, he highlights South Africa’s safe harbor as a good practice, and mentions the registration of users via ID cards as a worst practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Towards Internet Intermediary Responsibility: Carly Nyst, November 2013, available at: &lt;a href="http://www.genderit.org/feminist-talk/towards-internet-intermediary-responsibility"&gt;http://www.genderit.org/feminist-talk/towards-internet-intermediary-responsibility&lt;/a&gt;. Nyst argues for a middle ground between competing goals in internet regulation in Africa. Achieving one goal, of protecting free speech through internet intermediaries seems at odds with the goal of protecting women’s rights and limiting hate speech, because one demands intermediaries be protected in a legal safe harbor and the other requires intermediaries be vigilant and police their content. Nyst’s solution is not intermediary liability but &lt;i&gt;responsibility&lt;/i&gt;, a role defined by empowerment, and establishing an intermediary responsibility to promote positive gender attitudes.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/intermediary-liability-resources'&gt;https://cis-india.org/internet-governance/blog/intermediary-liability-resources&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-03T06:45:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame">
    <title>The Age of Shame</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame</link>
    <description>
        &lt;b&gt;The ability to capture private images is breeding a dangerous form of digital shaming. Within the online space, where wonderments often run rife, and conspiracy theories travel at the speed of light, there are many dark recesses where netizens half-jokingly, self-referentially, in a spirit of part-truth, part-exaggeration, often wonder on what the real reason is for the internet to exist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr. Nishant Shah's column was &lt;a class="external-link" href="http://indianexpress.com/article/opinion/columns/the-age-of-shame/99/"&gt;published in the Indian Express&lt;/a&gt; on March 30, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Within the online space, where wonderments often run rife, and conspiracy theories travel at the speed of light, there are many dark recesses where netizens half-jokingly, self-referentially, in a spirit of part-truth, part-exaggeration, often wonder on what the real reason is for the internet to exist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One suggestion, and probably the most persuasive one, drawing from the Broadway musical Avenue Q, is that the internet was made for porn. Positing a competing argument is a clowder of cat lovers, who insist that the internet was made for cats. Or, at least, it is definitely made of cats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the first internet memes like LOL Cats (and then subsequently Grumpy Cat, Ceiling Cat and Hipster Kitty), which had pictures of cats used for strong social, cultural and political commentary, to Caturday — a practice where users on the Web’s largest unmoderated discussion board, 4Chan, post pictures of cats every Saturday — cats are everywhere.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I want to add to this list and suggest that the internet was meant for “shame”. With the explosion of the interactive Web, more people getting access to mobile computing devices, and more websites inviting users to write reviews, leak pictures, expose videos and reveal more personal and private information online, there seems to be no doubt that we live in the age of digital shaming.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aesthetic, also embedded in peer-to-peer platforms like chatroulete, or snapchat, where people often engage in sexting, is also becoming common in popular media. The ability to spy, to capture private images and videos, and expose the people who violate some imagined moral code has dangerous implications for the future of the Web and our own private lives. And as more of it goes unpunished and gets naturalised in our everyday digital practices, it is time to realise that the titillation it offers through scandal is far outweighed by the growing stress and grief it causes to victims. While there are some values to public shaming that ask for more transparency and accountability, we need to reflect on how it is creating societies of shame.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It sometimes emerges as an attempt to shame governments, private institutions, places of consumption, for compromise of the rights of the users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anything, from denial of service and corruption in government offices to bad food and substandard goods in restaurants and malls, is now reported in an attempt to shame the people responsible for it. This kind of “citizen journalism” allows for individual voices and experiences to be heard and documented, and the people in question are forced to be accountable for their jobs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From fascinating websites like IPaidABribe.com to restaurant review sites like Zomato, we have seen an interesting phenomenon of “naming and shaming” that gives voice to individual discontent and anger. And so commonplace has this become, that most managers of different services and goods track, respond and mitigate the situation, often offering apologies and freebies to make up for that one bad experience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most big organisations have Twitter handles that function in a similar way, addressing grievances of users in real time, and helping to deliver better services and products. It is a new era of granular accountability that ensures that individual acts of discrimination, neglect or just disservice get reported and have direct impact on those responsible for it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other end of the spectrum of this call for transparent and accountable structures, is the phenomenon of shaming and cyber bullying that is also increasing, especially with digital natives who spend more time online. On social networking sites, it has become almost passé, for personal and sensitive information to be leaked in order to shame and expose a person’s weaknesses and vulnerabilities. Especially for young teens who might be in a disadvantaged position — for reasons of sexual orientation, location, practices or interests — the shaming through exposing their private information often creates extremely traumatic conditions, even leading people to take their lives.&lt;br /&gt;Shaming takes up particularly dire forms on websites and platforms that are designed to leak this kind of information. Hunter Moore, who has recently earned the title of being the most hated man on the internet, was the founder of a revenge-porn website, which invited male users to reveal sexual and embarrassing pictures of their former girlfriends and even spouses, to reveal them in compromising positions and shame them for being “sluts”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moore’s website has been shut down now and he is facing multiple charges of felony in the US, but that one site was just the tip of the iceberg. Slut shaming and trying to humiliate women has become a strong underground practice on the dark web. Hidden by anonymity and the security that the Web can sometimes offer, people betray the trust of their friends and lovers and expose them to be punished by voyeuristic audiences.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame'&gt;https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T04:05:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/governance-issues-for-private-data-stores">
    <title>Governance issues for private data stores</title>
    <link>https://cis-india.org/news/governance-issues-for-private-data-stores</link>
    <description>
        &lt;b&gt;Malavika Jayaram is a speaker at this event co-hosted by Harvard Faculty Club and Web Science Trust at 20 Quincy Street, Cambridge on March 28, 2014.&lt;/b&gt;
        &lt;h3&gt;Agenda&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8.30: Introductory remarks&lt;/b&gt; - Meeting in the shadow of the Presidents 90 day plan for Big Data and Privacy: are we right to have a hopeful expectation that algorithms can resolve questions that algorithms pose?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Prof. Jim Waldo, CTO, Harvard University, Sun Distinguished Engineer&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prof. Andreas Weigend, Stanford University (past Chief Scientist Amazon)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8.45 - 10.00: The network is always on: and you are always on the network.&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The worker and the workplace - Anna Burger (past Secretary Treasurer, SEIU)/Carol Rose, Director Ma., ACLU&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Personalised messages - targeted advertising - George Pappachen (WPP) /Mike Smith (Hearst Corpn.)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sensor sensibility:Smart metering/Transport/Home - Yves Alexandre de Montjoye, MIT /John Taysom&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Personal medicine - John Wilbanks, Chief Commons Officer, Sage Bionetworks, Senior Fellow, Ewing&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Marion Kaufman Foundation&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Education - Prof. Jim Waldo, CTO Harvard&lt;/li&gt;
&lt;li&gt;National Security - Dr. Malavika Jayaram, Berkman Centre, Harvard, The Indian national id system.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;10.00-10.15: Coffee&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10.15 - 11.30: The dual nature of the web - publisher and data gatherer&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Is the problem a web protocol problem? Is there a protocol solution?&lt;br /&gt;Brendan Eich, CEO Mozilla&lt;br /&gt;Steve MacBeath Product Lead, Microsoft Personal Cloud&lt;br /&gt;John Taysom, Can we build a DMZ for individual id information?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.30 - 12.30: Governance systems for private data stores - what wont work, and what might?&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;An example of multi-generational national asset management : Sir Henry Studholme, Chair, UK Forestry Commission.&lt;/li&gt;
&lt;li&gt;Mozilla.com and Mozilla.org - Denelle Dixon-Thayer, GC Mozilla&lt;/li&gt;
&lt;li&gt;DigiTrust - Jordan Mitchell&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;12.30: working lunch: Privacy as a competitive advantage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Microsoft view - Steve MacBeath&lt;/li&gt;
&lt;li&gt;The Mozilla view - Brendan Eich&lt;/li&gt;
&lt;li&gt;The SalesForce view - JPRangaswami, Chief Scientist, Salesforce.com&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;1.30 - 2.15: Essential additional policy considerations&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Is “privacy” anyway the wrong target - did we really mean “intimacy”? Dorothy Zinberg, Harvard/ How would we police privacy policies anyway? Adam Towvim, TrustLayers&lt;/li&gt;
&lt;li&gt;AOB from the floor&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;2.15 - 2.30: Interim Conclusions&lt;/b&gt; - John Taysom&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2.30 - 3.00: Discussion and critique of interim conclusions&lt;/b&gt; - Prof. Nico Mele, Harvard/ Prof. Dame Wendy Hall, WST&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.00- 3.30: Conclusions and proposed draft recommendations&lt;/b&gt; - J Taysom&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/governance-issues-for-private-data-stores'&gt;https://cis-india.org/news/governance-issues-for-private-data-stores&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T10:30:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/cyber-dialogue-conference-2014">
    <title>Cyber Dialogue Conference 2014</title>
    <link>https://cis-india.org/news/cyber-dialogue-conference-2014</link>
    <description>
        &lt;b&gt;The Cyber Dialogue conference, presented by the Canada Centre for Global Security Studies at the Munk School of Global Affairs, University of Toronto, will convene an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated public plenary conversations and working groups around cyberspace security and governance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Malavika Jayaram is &lt;a class="external-link" href="http://www.cyberdialogue.ca/2014-participants/"&gt;participating in this event&lt;/a&gt; being held on March 30 and 31, 2014. Full event &lt;a class="external-link" href="http://www.cyberdialogue.ca/"&gt;details here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;After Snowden, Whither Internet Freedom?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A recent stream of documents leaked by former NSA contractor Edward Snowden has shed light on an otherwise highly secretive world of cyber surveillance. Among the revelations — which include details on mass domestic intercepts and covert efforts to shape and weaken global encryption standards — perhaps the most important for the future of global cyberspace are those concerning the way the U.S. government compelled the secret cooperation of American telecommunications, Internet, and social media companies with signals intelligence programs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For American citizens, the NSA story has touched off soul-searching discussions about the legality of mass surveillance programs, whether they violate the Fourth and Fifth Amendments of the U.S. Constitution, and whether proper oversight and accountability exist to protect American citizens' rights. But for the rest of the world, they lay bare an enormous “homefield advantage” enjoyed by the United States — a function of the fact that AT&amp;amp;T, Verizon, Google, Facebook, Twitter, Yahoo!, and many other brand name giants are headquartered in the United States.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to the Snowden revelations, global governance of cyberspace was already at a breaking point. The vast majority of Internet users — now and into the future — are coming from the world’s global South, from regions like Africa, Asia, Latin America, and the Middle East. Of the six billion mobile phones on the planet, four billion of them are already located in the developing world. Notably, many of the fastest rates of connectivity to cyberspace are among the world’s most fragile states and/or autocratic regimes, or in countries where religion plays a major role in public life. Meanwhile, countries like Russia, China, Saudi Arabia, Indonesia, India, and others have been pushing for greater sovereign controls in cyberspace. While a US-led alliance of countries, known as the Freedom Online Coalition, was able to resist these pressures at the Dubai ITU summit and other forums like it, the Snowden revelations will certainly call into question the sincerity of this coalition. Already some world leaders, such as Brazil’s President Rousseff, have argued for a reordering of governance of global cyberspace away from U.S. controls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the fourth annual Cyber Dialogue, we are inviting a selected group of participants to address the question, “After Snowden, Whither Internet Freedom?” What are the likely reactions to the Snowden revelations going to be among countries of the global South? How will the Freedom Online Coalition respond? What is the future of the “multi-stakeholder” model of Internet governance? Does the “Internet Freedom” agenda still carry any legitimacy? What do we know about “other NSA’s” out there? What are the likely implications for rights, security, and openness in cyberspace of post-Snowden nationalization efforts, like those of Brazil’s?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As in previous Cyber Dialogues, participants will be drawn from a cross-section of government (including law enforcement, defence, and intelligence), the private sector, and civil society. In order to canvass worldwide reaction to the Snowden revelations, this year’s Cyber Dialogue will include an emphasis on thought leaders from the global South, including Africa, Asia, Latin America, and the Middle East.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/cyber-dialogue-conference-2014'&gt;https://cis-india.org/news/cyber-dialogue-conference-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-08T05:09:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/icann49-public-forum-statement">
    <title>CIS Statement at ICANN 49's Public Forum</title>
    <link>https://cis-india.org/internet-governance/blog/icann49-public-forum-statement</link>
    <description>
        &lt;b&gt;This was a statement made by Pranesh Prakash at the ICANN 49 meeting (on March 27, 2014), arguing that ICANN's bias towards the North America and Western Europe result in a lack of legitimacy, and hoping that the IANA transition process provides an opportunity to address this.&lt;/b&gt;
        &lt;p&gt;Good afternoon. My name is Pranesh Prakash, and I'm with the Yale Information Society Project and the Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;I am extremely concerned about the accountability of ICANN to the global community.  Due to various decisions made by the US government relating to ICANN's birth, ICANN has had a troubled history with legitimacy.  While it has managed to gain and retain the confidence of the technical community, it still lacks political legitimacy due to its history.  The NTIA's decision has presented us an opportunity to correct this.&lt;/p&gt;
&lt;p&gt;However, ICANN can't hope to do so without going beyond the current ICANN community, which while nominally being 'multistakeholder' and open to all, grossly under-represents those parts of the world that aren't North America and Western Europe.&lt;/p&gt;
&lt;p&gt;Of the 1010 ICANN-accredited registrars, 624 are from the United States, and 7 from the 54 countries of Africa.  In a session yesterday, a large number of the policies that favour entrenched incumbents from richer countries were discussed.  But without adequate representation from poorer countries, and adequate representation from the rest of the world's Internet population, there is no hope of changing these policies.&lt;/p&gt;
&lt;p&gt;This is true not just of the business sector, but of all the 'stakeholders' that are part of global Internet policymaking, whether they follow the ICANN multistakeholder model or another.  A look at the boardmembers of the Internet Architecture Board, for instance, would reveal how skewed the technical community can be, whether in terms of geographic or gender diversity.&lt;/p&gt;
&lt;p&gt;Without greater diversity within the global Internet policymaking communities, there is no hope of equity, respect for human rights -- civil, political, cultural, social and economic --, and democratic funtioning, no matter how 'open' the processes seem to be, and no hope of ICANN accountability either.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/icann49-public-forum-statement'&gt;https://cis-india.org/internet-governance/blog/icann49-public-forum-statement&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IANA</dc:subject>
    
    
        <dc:subject>IG4all</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>North vs South</dc:subject>
    

   <dc:date>2014-06-04T05:31:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/panel-discussion-intermediary-liability-and-freedom-of-expression-in-india">
    <title>Panel Discussion – Intermediary Liability &amp; Freedom of Expression in India</title>
    <link>https://cis-india.org/news/panel-discussion-intermediary-liability-and-freedom-of-expression-in-india</link>
    <description>
        &lt;b&gt;Bhairav Acharya will participate in a panel discussion on  ‘Intermediary Liability &amp; Freedom of Expression’ on Wednesday evening (26th March 2014) from 6:00 pm onwards at the India International Centre Annex. The event is organized by the Centre for Communication Governance at NLU Delhi in association with the Global Network Initiative, Washington D.C.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The panel comprises of three eminent personalities: Shyam Divan, Senior  Advocate, Supreme Court of India;   Siddharth Varadarajan, Journalist  and Senior Fellow, Centre for Public Affairs and Critical Theory, New  Delhi and; Jermyn Brooks,&lt;b&gt; &lt;/b&gt;Independent Chair, Global Network Initiative, Washington D.C.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The objective of the panel was to focus on the Indian legal framework  governing Internet platforms and explore questions related to Internet  intermediaries and the balance that should be involved in regulations  affecting user-generated content, in the context of the civil liberties  that are key to democracy, in particular free expression and privacy.  The discussion was aimed at drawing connections between this ostensibly  Internet-related issue and the traditional media, to highlight recurring  issues and useful perspectives.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;For more details, &lt;a class="external-link" href="http://www.nludelhi.ac.in/?p=4873"&gt;click here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/panel-discussion-intermediary-liability-and-freedom-of-expression-in-india'&gt;https://cis-india.org/news/panel-discussion-intermediary-liability-and-freedom-of-expression-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T10:10:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/non-commercial-users-constituency-icann-and-global-internet-governance">
    <title>ICANN and Global Internet Governance: The Road to São Paulo, and Beyond</title>
    <link>https://cis-india.org/news/non-commercial-users-constituency-icann-and-global-internet-governance</link>
    <description>
        &lt;b&gt;A conference to be held on Friday 21 March 2014 at the ICANN 49 meeting venue, the Raffles City Convention Centre, Singapore, in the Olivia Room, from 10:00 to 18:00. Organized by the NonCommercial Users Constituency (NCUC) of the Generic Names Supporting Organization, with the generous support of ICANN. Geetha Hariharan participated in this event.&lt;/b&gt;
        &lt;p&gt;Click to read more on the &lt;a class="external-link" href="http://www.ncuc.org/singapore2014/"&gt;conference here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://netmundial.br"&gt;NETMundial Global Multistakeholder Meeting on the Future of the Internet Governance&lt;/a&gt; will be held in São Paulo, Brazil on 23-24 April 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initiated by Brazilian President Dilma Rousseff and ICANN CEO Fadi Chehadé, and co-organized by the &lt;a href="http://CGI.br"&gt;Brazilian Internet Steering Committee&lt;/a&gt; and &lt;a href="http://1Net.org"&gt;/1Net&lt;/a&gt;,  the meeting will bring together a wide range of government, business,  technical community, civil society and academic participants from around  the world. The organizers describe its objectives as, “crafting  Internet governance principles and proposing a roadmap for the further  evolution of the Internet governance ecosystem.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The purpose of this NCUC conference is to provide a first opportunity  for intensive, F2F cross-community dialogue on the main substantive  topics likely to be addressed in São Paulo. Stakeholders from across the  ICANN community have expressed a range of views and uncertainties about  the meeting’s precise substantive focus, expected outcomes, and  potential significance in the continuing evolution of the global  Internet governance ecosystem.  It is hoped that the NCUC conference  will help the community to work through the issues at stake and to  prepare for its participation in the NETMundial.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;On Site Participation&lt;/b&gt;&lt;br /&gt; The meeting is free of charge and open to all members of the ICANN community. People wishing to attend must &lt;b&gt;&lt;a href="http://www.amiando.com/NCUC49.html"&gt;register for the conference&lt;/a&gt;&lt;/b&gt; and indicate whether they wish to be included in the lunch and/or the reception. Attendees must also &lt;b&gt;&lt;a href="https://registration.icann.org"&gt;register for the ICANN meeting&lt;/a&gt;&lt;/b&gt; in order to access the conference venue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Remote Participation&lt;/b&gt;&lt;br /&gt; ICANN will provide live remote participation via Adobe Connect,  audiocast, and telephone dial-in. They also will videotape the  conference for subsequent web access. For access please visit &lt;a href="http://singapore49.icann.org/en/schedule/fri-ncuc-ig"&gt;http://singapore49.icann.org/en/schedule/fri-ncuc-ig&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Written Inputs&lt;/b&gt;&lt;br /&gt; Members of the ICANN community are invited to provide personal or  organizational written inputs related to the four panel topics indicated  on the conference program. These will be added to the online repository  associated with each of the sessions.  If interested, please send your  inputs to &lt;a href="mailto:ncuc@ncuc.org"&gt;ncuc@ncuc.org&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Programme details &lt;a class="external-link" href="http://www.ncuc.org/singapore2014/programme/"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/non-commercial-users-constituency-icann-and-global-internet-governance'&gt;https://cis-india.org/news/non-commercial-users-constituency-icann-and-global-internet-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-03T09:54:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
