<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1886 to 1900.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/january-2014-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-january-29-2014-chinmayi-arun-making-the-powerful-accountable"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/data-privacy-day-chenna-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/data-privacy-day-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/future-of-internet-january-29-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-mathew-thomas-from-the-say-no-to-uid-campaign"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/business-standard-january-24-2014-veenu-sandhu-surabhi-agarwal-the-net-is-taking-over"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-governance-and-india-the-way-forward"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/multi-stakeholders-consultation-on-intl-public-policy-issues-january-21-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-january-20-2014-what-is-net-neutrality-and-why-is-it-important"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gni-assessment-finds-ict-companies-protect-user-privacy-and-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-january-17-2014-moulishree-srivastava-elizabeth-roche-eu-parliament-slams-us-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/about/newsletters/january-2014-bulletin">
    <title>January 2014 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/january-2014-bulletin</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) welcomes you to the first issue of its newsletter (January) for the year 2014:&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;-------------------------------&lt;br /&gt; Highlights&lt;br /&gt; -------------------------------&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Amba Salelkar provides an analysis of the three stages of the Rights for Persons with Disabilities 2013 since it was initially commissioned.&lt;/li&gt;
&lt;li&gt; We published revised chapters for the states of Andhra Pradesh and Chhattisgarh as part of our National Resource Kit project.&lt;/li&gt;
&lt;li&gt; In the first of a three-part study Ananth Padmanabhan examines the "John Doe" orders that courts have passed against ISPs, which entertainment companies have used to block websites.&lt;/li&gt;
&lt;li&gt; The second Institute on Internet and Society is being held in Pune from February 11 to 17.&lt;/li&gt;
&lt;li&gt; CIS signed a memorandum of understanding (MoU) with KIIT University and Kalinga Institute of Social Sciences for furthering Odia Wikipedia.&lt;/li&gt;
&lt;li&gt; Dr. Nishant Shah co-authored a chapter on video games in a book published by Palestinian Art Court-al Hoash.&lt;/li&gt;
&lt;li&gt; Sneha gives an overview of the research enquiry in the  field of Digital Humanities in her blog post on Mapping Digital  Humanities in India.&lt;/li&gt;
&lt;li&gt; In the first of the insightful seven part series, Gautam Bhatia  looks at surveillance and the right to privacy in India from a  constitutional perspective, tracing its genealogy through Supreme Court  case law and compares it with the law in the USA.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------- &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4718&amp;amp;qid=376274" target="_blank"&gt;&lt;br /&gt; Jobs&lt;/a&gt;&lt;br /&gt; -----------------------------------------------&lt;br /&gt; CIS is seeking applications for the posts of Program Officer (Access to Knowledge): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4719&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1fnydB0&lt;/a&gt; and Program Officer (Internet Governance): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4720&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1aA57K6&lt;/a&gt;.  There are two vacancies each for these posts and these are full-time  based in Delhi. To apply, please send your resume to Sunil Abraham (&lt;a href="mailto:sunil@cis-india.org" target="_blank"&gt;sunil@cis-india.org&lt;/a&gt;), Nirmita Narasimhan (&lt;a href="mailto:nirmita@cis-india.org" target="_blank"&gt;nirmita@cis-india.org&lt;/a&gt;) and Pranesh Prakash (&lt;a href="mailto:pranesh@cis-india.org" target="_blank"&gt;pranesh@cis-india.org&lt;/a&gt;)  with three writing samples of which at least one demonstrates your  analytic skills, and one that shows your ability to simplify complex  policy issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4721&amp;amp;qid=376274" target="_blank"&gt;&lt;br /&gt; Accessibility and Inclusion&lt;/a&gt;&lt;br /&gt; ----------------------------------------------&lt;br /&gt; As part of our project (under a grant from the Hans Foundation) on  creating a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India, we bring you draft chapters for the states of Madhya Pradesh and Arunachal Pradesh, and the union territory of Daman and Diu. With this we have completed compilation of draft chapters for 27 states and 5 union territories.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Based on the feedback and comments received from our readers the following chapters were revised&lt;/i&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► National Resource Kit Chapter&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Andhra Pradesh Chapter (by Anandhi Viswanathan, January 31, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4722&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1lzUFcG&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Chhattisgarh Chapter (by Anandhi Viswanathan, January 31, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4723&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1fY4NZ0&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entry&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Right of Persons with Disabilities Bill 2013 and the Lack of Access to Accessibility Rights (by Amba Salelkar, January 31, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4724&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1diSg40&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------------------- &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4725&amp;amp;qid=376274" target="_blank"&gt;&lt;br /&gt; Access to Knowledge&lt;/a&gt;&lt;br /&gt; -----------------------------------------------------------&lt;br /&gt; The Access to Knowledge programme addresses the harms  caused to consumers and human rights, and critically examines Open  Government Data, Open Access to Scholarly Literature, and Open Access to  Law, Open Content, Open Standards, and Free/Libre/Open Source Software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Analysis&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Can Judges Order ISPs to Block Websites for Copyright Infringement? (Part 1) (by Ananth Padmanabhan, January 30, 2014). Ananth  looks at the theory behind John Doe orders and finds that it would be  wrong for Indian courts to grant "John Doe" orders against ISPs: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4726&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1nteYaK&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Open Letter to the Vatican: Request for Holy See to Comment on IPR (by Samantha Cassar, January 31, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4727&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1dGN7OS&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; The Game of IPR: Insights from the 6th Global Intellectual Property Convention in Hyderabad (by Samantha Cassar, January 31, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4728&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1fY5qS6&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The following has been done under grant from the Wikimedia Foundation (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4729&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/SPqFOl&lt;/a&gt;). As part this project (&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4730&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/X80ELd&lt;/a&gt;), we organised 4 workshops in the month of January, published an article in DNA, and signed a memorandum of understanding with KIIT University and Kalinga Institute of Social Sciences to further the development of Odia Wikipedia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Articles / Newspaper Columns&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Odia Wikipedia: Three Years of Active Contributions Gives Life to a Ten Year Old Project (by Subhashish Panigrahi, HASTAC, January 31, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4731&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1jvxD8r&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; WikiSangamotsavam 2013 brings Indian Wikimedians together (by Netha Hussain and Subhashish Panigrahi, DNA, January 14, 2014). The article was edited by Rohini Lakshane: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4732&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1jvynKP&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Announcement&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CIS-A2K, KIIT University and Kalinga Institute of Social Sciences sign MoUs (by Subhashish Panigrahi, January 11, 2014): KIIT University, Kalinga Institute of Social Sciences and the Centre for Internet and Society's Access to Knowledge team (CIS-A2K) have entered into a memorandum of understanding (MoUs) for furthering Odia Wikipedia: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4733&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1j1qtFv&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Wikipedia Editing as Assessment Tool in the Indian Higher Education Classroom (by Dr. Tejaswini Niranjana, Ashwin Kumar A.P. and T. Vishnu Vardhan, January 30, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4734&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1m5QHMD&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Wikipedia at Forefront in Christ University (by Syed Muzamiluddin, January 29, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4735&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/LTFA8E&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Events Organised&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Odia WikiMeetup (Bhubaneswar, January 11, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4736&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/NBkFJi&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Introductory talk about "Wikipedia in Academics" (KIIT School of Technology, Bhubaneswar, January 12, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4737&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1j1yv1f&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Odia Wikipedia's 10th anniversary @ KISS (Kalinga Institute of Social Sciences, Bhubaneswar, January 28, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4738&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1gsqkJC&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Odia Wikipedia 10th anniversary (Indian Institute of Mass Communication, Dhenkanal, January 29, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4739&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1dGRBoy&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Event Participated In&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Dynamics of Education to Employment Journey: Opportunities and Challenges (organized by KIIT School of Management, KIIT University, Bhubaneswar, February 21-22, 2014). T. Vishnu Vardhan gave a talk: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4740&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1ePwqHc&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Media Coverage&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Digitising contest to preserve rare books in Malayalam (The Hindu, January 4, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4741&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/NBtVgz&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; ‘With Internet in every pocket, power to the people’ (by Shubhadeep Chaudhury, The Tribune, January 12, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4742&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1ojb1IZ&lt;/a&gt;. Shubhadeep interviews T. Vishnu Vardhan on internet and social media.&lt;/li&gt;
&lt;li&gt; ଆଦିବାସୀଭାଷାରଉନ୍ନତିକଳ୍ପେଉଇକିପିଡ଼ିଆ(Odishan.com, January 12, 2014):&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4743&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1kAWJmG&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; KIIT University to lead building free knowledge repository initiative (India Education Diary.com, January 20, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4744&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1j1Rzwk&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Odisha: KISS to create tribal languages and heritage repository (Odisha Diary Bureau, January 20, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4745&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1bLBhmB&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt; FDC recognition for the Centre for the Internet and Society (Wikimedia Foundation, January 30, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4746&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1fYdxOz&lt;/a&gt;. Wikimedia Foundation published a resolution declaring CIS eligible for funding through the Annual Plan Grants program. &lt;/li&gt;
&lt;li&gt; Tech-savvy students given tips to enter IT field (The Times of India, January 31, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4747&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1j1QvIX&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Odia Wikipedia (Sanchar, January 31, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4748&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1ePwAON&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Openness&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Event Organised&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; What is happening in South America and how Openness is an opportunity  to Social, Political and Activist Movements? (Centre for Internet and  Society, Bangalore, January 17, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4749&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1bnZaq0&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------- &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4750&amp;amp;qid=376274" target="_blank"&gt;&lt;br /&gt; Internet Governance&lt;/a&gt;&lt;br /&gt; -----------------------------------------------&lt;br /&gt; CIS is doing a project (under a grant from Privacy International and International Development Research Centre (IDRC)) on conducting research on surveillance and freedom of expression (SAFEGUARDS). So far we have organised seven privacy round-tables and drafted the Privacy (Protection) Bill. Gautam Bhatia gives an analysis of the right to privacy from a constitutional perspective and Elonnai Hickok analyses a public report published by GNI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Analyses&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 1: Foundations (by Gautam Bhatia, January 13, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4751&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1ntqsen&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 2: Gobind and the Compelling State Interest Test (by Gautam Bhatia, January 27, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4752&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1dH3meL&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Newspaper Columns / Book Chapter&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Big Brother is Watching You (by Chinmayi Arun, The Hindu, January 3, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4753&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1cGpg0K&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Making the Powerful Accountable (by Chinmayi Arun, The Hindu, January 30, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4754&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1nvzSpC&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Video Games: A Case Study of a Cross-cultural Video Collaboration (by Larissa Hjorth and Nishant Shah, January 31, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4755&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1eTaXLX&lt;/a&gt;. A new book focusing on Palestinian artists’ video, edited by Bashir Makhoul and published by Palestinian Art Court- al Hoash, 2013, includes a chapter co-authored by Larissa and Nishant. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Letter requesting public consultation on position of GoI at WGEC (by Snehashish Ghosh, January 7, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4756&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1g66bL7&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Electoral Databases – Privacy and Security Concerns (by Snehashish Ghosh, January 16, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4757&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/Mb4ktM&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; GNI Assessment Finds ICT Companies Protect User Privacy and Freedom of Expression (by Elonnai Hickok, January 20, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4758&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1mjbpmL&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Interview with Mathew Thomas from the Say No to UID campaign - UID Court Cases (by Maria Xynou, January 27, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4759&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1eT9XHv&lt;/a&gt;. Maria interviewed Mathew Thomas on UID.&lt;/li&gt;
&lt;li&gt; India's Central Monitoring System (CMS): Something to Worry About? (by Maria Xynou, January 30, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4760&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1gsM4oQ&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Events Organized&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Biometrics or Bust? Implications of the UID for Participation and Inclusion (CIS, Bangalore, January 10, 2014). Malavika Jayaram gave a talk: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4761&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1lJZhuK&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt; Digital Citizens: Why Cyber Security and Online Privacy are Vital to  the Success of Democracy and Freedom of Expression (CIS, Bangalore,  January 14, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4762&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/KucEU5&lt;/a&gt;. Michael Oghia gave a talk. &lt;/li&gt;
&lt;li&gt; Nullcon Goa Feb 2014 — International Security Conference (organised by Nullcon, Bogmallo Beach Resort, Goa, February 12 – 15, 2014). CIS is one of the sponsors for this event: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4763&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1lrBu5I&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Events Co-organised&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CPDP 2014 Reforming Data Protection: The Global Perspective (organised by CPDP, Brussels, January 22 – 24, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4764&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/KsgCws&lt;/a&gt;. CIS is one of the sponsors for this event. Malavika Jayaram was a speaker.&lt;/li&gt;
&lt;li&gt; The Future of the Internet, Who Should Govern It and What is at Stake for You? (organised  by Internet and Mobile Association of India, Cellular Operators  Association of India, Internet Democracy project, Media for Change, SFLC and CIS, India International Centre, January 29, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4765&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1eqkSUu&lt;/a&gt;. Chinmayi Arun moderated a session. Snehashish Ghosh participated in the event as a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Events Participated In&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Seminar on "Hate Speech and Social Media" (organized by NALSAR University of Law, Hyderabad and British Deputy High Commission, Hyderabad, January 4 – 5, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4766&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1dmcEkT&lt;/a&gt;. Chinmayi Arun was one of the speakers.&lt;/li&gt;
&lt;li&gt; Multistakeholders Consultation on International Public  Policy Issues (organized by the Department of Electronics &amp;amp;  Information Technology, New Delhi, January 21, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4767&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/Mbfkao&lt;/a&gt;. Snehashish Ghosh participated in this meeting.&lt;/li&gt;
&lt;li&gt; Internet Governance and India: The Way Forward (organized by Observer Research Foundation, New Delhi, January 22, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4768&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1ePFueY&lt;/a&gt;. Snehashish Ghosh participated in the event.&lt;/li&gt;
&lt;li&gt; Data Privacy Day 2014 (organized by Data Security Council of India, Infosys, Bangalore, January 28, 2014). Elonnai Hickok was a panelist: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4769&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1ePFfk8&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; TACTIS Symposium 2014 (organized by Tata Consultancy Service, TCS Siruseri, Chennai, January 28 and 29, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4770&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1bo9y0R&lt;/a&gt;. Sunil Abraham gave the keynote address. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4771&amp;amp;qid=376274" target="_blank"&gt;&lt;br /&gt; News &amp;amp; Media Coverage&lt;/a&gt;&lt;br /&gt; --------------------------------&lt;br /&gt; CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Inventions that will make a difference (by Geeta Padmanabhan, The Hindu, January 1, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4772&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/MKwmfu&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Rise of the bot: all you need to know about the latest threat online (by Danish Raza, Hindustan Times, January 5, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4773&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1dHgNex&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Despite apex court order, IOC proceeds with Aadhaar-linked DBT (by Deepa Kurup, The Hindu, January 6, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4774&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1g6ffjn&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Worldwide: International Privacy - 2013 Year in Review – Asia (by Gonzalo S. Zeballos, James A. Sherer and Alan M. Pate, Mondaq Yearly Review, January 8, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4775&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1iOaYRO&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Election panel rejects Google’s proposal for electoral services tie-up (by Anuja and Moulishree Srivastava, Livemint, January 9, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4776&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1gpaGjF&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Social Notworking - 'Murder by Twitter'(by Malini Nair, The Times of India, January 19, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4777&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1j2kT63&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; The net is taking over (by Veenu Sandhu and Surabhi Agarwal, Business Standard, January 24, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4778&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1hb4eQL&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; The Dangers of Birdsong (by Namrata Joshi, January 25, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4779&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1kB8J7L&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt; Is Bhutan selling its soul to Google? (by Lucky Wangmo from Thimphu and Pema Seldon form Bangalore, Business Bhutan, January 25, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4780&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1fYl3sO&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt; What is net neutrality and why it is important (The Times of India, January 30, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4781&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1ePFZ8P&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4782&amp;amp;qid=376274" target="_blank"&gt;&lt;br /&gt; Digital Humanities&lt;/a&gt;&lt;br /&gt; --------------------------------&lt;br /&gt; CIS is building research clusters in the field of Digital Humanities.  The Digital will be used as a way of unpacking the debates in humanities  and social sciences and look at the new frameworks, concepts and ideas  that emerge in our engagement with the digital. The clusters aim to  produce and document new conversations and debates that shape the  contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entry&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Mapping Digital Humanities in India (by Sneha PP, January 16, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4783&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1gsQEEQ&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4784&amp;amp;qid=376274" target="_blank"&gt;&lt;br /&gt; Digital Natives&lt;/a&gt;&lt;br /&gt; --------------------------------&lt;br /&gt; CIS is doing a research project titled “Making Change”. The project  will explore new ways of defining, locating, and understanding change in  network societies. Having the thought piece 'Whose Change is it Anyway'  as an entry point for discussion and reflection, the project will  feature profiles, interviews and responses of change-makers to questions  around current mechanisms and practices of change in South Asia and  South East Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Making Change Project&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entry&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Creative Activism - Voices of Young Change Makers in India (UDAAN) (by Denisse Albornoz, January 20, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4785&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1cxXAMI&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Other&lt;br /&gt; # Newspaper Column&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; 10 Ways to Say Nothing New (by Nishant Shah, Indian Express, January 19, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4786&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1gsONjn&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------------------&lt;br /&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4787&amp;amp;qid=376274" target="_blank"&gt;Knowledge Repository on Internet Access&lt;/a&gt;&lt;br /&gt; ----------------------------------------------------------&lt;br /&gt; CIS in partnership with the Ford Foundation is executing a project to  create a knowledge repository on Internet and society. This repository  will comprise content targeted primarily at civil society with a view to  enabling their informed participation in the Indian Internet and ICT  policy space. The repository is available at the Internet Institute  website: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4788&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/1iQT2UB&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Ongoing Event&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Institute on Internet and Society (organised by Ford Foundation and CIS, Yashada, Pune, February 11-17, 2014): &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4789&amp;amp;qid=376274" target="_blank"&gt;http://bit.ly/180mQi9&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------------&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4790&amp;amp;qid=376274" target="_blank"&gt;&lt;br /&gt; About CIS&lt;/a&gt;&lt;br /&gt; -----------------------------------------------------&lt;br /&gt; The Centre for Internet and Society is a non-profit research  organization that works on policy issues relating to freedom of  expression, privacy, accessibility for persons with disabilities, access  to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4791&amp;amp;qid=376274" target="_blank"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook group: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4792&amp;amp;qid=376274" target="_blank"&gt;https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Visit us at:&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=4793&amp;amp;qid=376274" target="_blank"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; E-mail: &lt;a href="mailto:a2k@cis-india.org" target="_blank"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;br /&gt; Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:&lt;br /&gt; We invite researchers, practitioners, and theoreticians, both organisationally  and as individuals, to collaboratively engage with Internet and society  and improve our understanding of this new field. To discuss the  research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org" target="_blank"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org" target="_blank"&gt;nishant@cis-india.org&lt;/a&gt;. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at &lt;a href="mailto:vishnu@cis-india.org" target="_blank"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/january-2014-bulletin'&gt;https://cis-india.org/about/newsletters/january-2014-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2014-04-07T07:09:59Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-january-29-2014-chinmayi-arun-making-the-powerful-accountable">
    <title>Making the Powerful Accountable</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-january-29-2014-chinmayi-arun-making-the-powerful-accountable</link>
    <description>
        &lt;b&gt;If powerful figures are not subjected to transparent court proceedings, the opacity in the face of a critical issue is likely to undermine public faith in the judiciary.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Chinmayi Arun's Op-ed was &lt;a class="external-link" href="http://www.thehindu.com/opinion/op-ed/making-the-powerful-accountable/article5627494.ece"&gt;published in the Hindu&lt;/a&gt; on January 29, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It is odd indeed that the Delhi High Court seems to believe that sensational media coverage can sway the Supreme Court into prejudice against one of its own retired judges. Justice Manmohan Singh of the Delhi High Court has said in &lt;i&gt;Swatanter Kumar v. Indian Express and others&lt;/i&gt; that the pervasive sensational media coverage of the sexual harassment allegations against the retired Supreme Court judge 'may also result in creating an atmosphere in the form of public opinion wherein a person may not be able to put forward his defence properly and his likelihood of getting fair trial would be seriously impaired.'  This Delhi High court judgment has drawn upon the controversial 2011 Supreme Court judgment in &lt;i&gt;Sahara India Real Estate Corp. Ltd v. SEBI&lt;/i&gt; (referred to as the Gag Order case here) to prohibit the media from publishing headlines connecting retired Justice Swatanter Kumar with the intern's allegations, and from publishing his photograph in connection with the allegations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the Gag Order judgment was criticised at the time that it was delivered &lt;i&gt;Swatanter Kumar v. Indian Express&lt;/i&gt; illustrates its detractors' argument more vividly that anyone could have imagined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sukumar Muralidharan wrote of Gag Order case that the postponement (of media coverage) order remedy that it created, could become an "instrument in the hands of wealthy and influential litigants, to subvert the course of open justice".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here we find that although a former Supreme Court judge is pitted against a very young former intern within a system over which he once presided, Justice Manmohan Singh seems to think that it is the judge who is danger of being victimised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Swatanter Kumar judgment was enabled by both the Gag Order case as well as the 1966 Supreme Court judgment in &lt;i&gt;Naresh Sridhar Mirajkar v. State of Maharashtra&lt;/i&gt;, which in combination created a process for veiling court proceedings. Naresh Mirajkar stated that courts' inherent powers extend to barring media reports and comments on ongoing trials in the interests of justice, and that such powers do not violate the right to freedom of speech; and the Gag Order case created an instrument - the 'postponement order' - for litigants, such that they can have media reports of a pending case restricted. The manner in which this is used in the Swatanter Kumar judgment raises very worrying questions about how the judiciary views the boundaries of the right to freedom of expression, particularly in the context of reporting court proceedings.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Broad power to restrict reporting&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Gag Order case was problematic: it used arguments for legitimate restraints on media reporting in exceptional circumstances, to permit restrictions on media reporting of court proceedings under circumstances 'where there is a real and substantial risk of prejudice to fairness of the trial or to proper administration of justice'.  The Supreme Court refused to narrow this or clarify what publications would fall within this category. It merely stated that this would depend on the content and context of the offending publication, and that no 'straightjacket formula' could be created to enumerate these categories. This leaves higher judiciary with a broad discretionary power to decide what amounts to&lt;br /&gt;legitimate restraints on media reporting, using an ambiguous standard. Exercise of this power to veil proceedings involving powerful public figures whose actions have public implications, imperils openness and transparency when they are most critical.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Court proceedings are usually open to the public. This openness serves as a check on the judiciary, and ensures public faith in the judiciary. In countries as large as ours, media coverage of important cases ensures actual openness of court proceedings - we are able to follow the arguments made by petitioners who ask that homosexuality be decriminalised, the trial of suspected terrorists and alleged murderers, and the manner in which our legal system handles sexual harassment complaints filed by young women.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When court proceedings are closed to the public (known as 'in-camera' trials) or when media dissemination of information about them is restricted, the openness and transparency of court proceedings is compromised. Such compromise of transparency does take place in many countries, to protect the rights of the parties involved, or prevent miscarriage of justice. For example, child-participants are protected by holding trials in-camera; names of parties to court proceedings are withheld to protect their privacy sometimes; and in countries where juries determine guilt, news coverage that may prejudice the jury is also restricted.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The damage done&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Although the Supreme Court stated in principle that the openness of court proceedings should only be restricted where strictly necessary, this appears to lend itself to very varied interpretation. For example, it is very difficult for some of us to understand why it was strictly necessary to restrict media coverage of sexual harassment proceedings in the Swatanter Kumar case. J. Manmohan Singh on the other hand seems to believe that the adverse public opinion will affect the retired judge's chance of getting a fair trial. His judgment also seems to indicate his concern that the sensational headlines will impact the public confidence in the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Delhi High Court's apprehension about the effects of the newspaper coverage on the reputation of the judge did not need to translate into a prior restraint on media coverage. They may better have been addressed later, by evaluating a defamation claim pertaining to published material. The larger concerns about the reputation of the judiciary are better addressed by openness: if powerful public figures, especially those with as much influence as a former Supreme Court judge are not subjected to transparent court proceedings, the opacity in the face of such a critical issue is likely to undermine public faith in the judiciary as an institution.Such opacity undermines the purpose of open courts. It is much worse for the reputation of the judiciary than publicised complaints about individual judges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the Delhi High Court ruling, there has been little media coverage of the sexual harassment case. Suppression of media coverage leaves the young woman comparatively isolated. Wide coverage of the harassment complaint involving Justice Ganguly, helped the intern in that case find support. The circulation of information enabled other former interns as well as a larger network of lawyers and activists, reach out to her. This is apart from the general pressure to be fair that arises when a case is being followed closely by the public. Media coverage is often critical to whether someone relatively powerless is able to assert her rights against a very powerful person. This is why media freedom is sacred to democracies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the Supreme Court was confident that the high courts in India would use their broad discretionary power under the Gag Order case sparingly and only in the interests of justice, the Swatanter Kumar case should offer it grounds to reconsider.  Openness and freedom of expression are not meant to be diluted to protect the powerful - they exist precisely to ensure that even the powerful are held accountable by state systems that they might otherwise be able to sway.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(Chinmayi Arun is research director, Centre for Communication  Governance, National Law University, Delhi, and fellow, Centre for  Internet and Society, Bangalore.)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-january-29-2014-chinmayi-arun-making-the-powerful-accountable'&gt;https://cis-india.org/internet-governance/blog/the-hindu-january-29-2014-chinmayi-arun-making-the-powerful-accountable&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Transparency and Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2014-01-30T06:43:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/data-privacy-day-chenna-2014">
    <title>TACTIS Symposium 2014</title>
    <link>https://cis-india.org/news/data-privacy-day-chenna-2014</link>
    <description>
        &lt;b&gt;Tata Consultancy organized the TACTIS Symposium at TCS Siruseri, Chennai on January 28 and 29, 2014. Sunil Abraham participated in the event and gave the key note address.&lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/data-privacy-day-chennai.pdf" class="internal-link"&gt;Click to download the event brochure here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/data-privacy-day-chenna-2014'&gt;https://cis-india.org/news/data-privacy-day-chenna-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-04T07:32:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/data-privacy-day-2014">
    <title>Data Privacy Day 2014</title>
    <link>https://cis-india.org/news/data-privacy-day-2014</link>
    <description>
        &lt;b&gt;January 28 is annually celebrated as Data Privacy Day (DPD). Data Security Council of India (DSCI) organized the annual meeting J N Tata Hall, Bldg 1, Infosys Campus, Infosys Ltd., Electronics City, Bangalore. Elonnai Hickok was a panelist.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Programme Details&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;2:30 - 3:00 p.m.: Keynote address by Srinath Batni, Member of the Board, Infosys&lt;/li&gt;
&lt;li&gt;3:00 - 4:30 p.m.: Panel Discussion on "Privacy today and tomorrow in Indian and Global Context"&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Panelists:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;M D Sharath, Deputy Superintendent of Police, Cyber Crimes Division, CID Headquarters, Karnataka Police&lt;/li&gt;
&lt;li&gt;Srinivas Poosarla, Associate Vice President and Head (Global), Privacy &amp;amp; Data Protection, Infosys Ltd&lt;/li&gt;
&lt;li&gt;Joshi Joseph, Senior Information Risk Manager, ING Vyasa Bank&lt;/li&gt;
&lt;li&gt;Na.Vijayashankar (Naavi), Information Assurance Consultant&lt;/li&gt;
&lt;li&gt;Elonnai Hickok, Policy &amp;amp; Advocacy Associate, Centre for Internet &amp;amp; Society (CIS)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;IT Product / Internet services company&lt;br /&gt;&lt;br /&gt;Panel will be moderated by Rahul Jain, Principal Consultant, DSCI&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;4:30- 5:00 p.m.: Presentation on Privacy by Rahul Jain, Principal Consultant, DSCI&lt;/li&gt;
&lt;li&gt;5:00- 5:30 p.m.: High Tea&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;For more info on the event &lt;a class="external-link" href="http://www.dsci.in/events/about/1697"&gt;see here&lt;/a&gt;.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/data-privacy-day-2014'&gt;https://cis-india.org/news/data-privacy-day-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-04T05:34:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/future-of-internet-january-29-2014">
    <title>The Future of the Internet, Who Should Govern It and What is at Stake for You?</title>
    <link>https://cis-india.org/events/future-of-internet-january-29-2014</link>
    <description>
        &lt;b&gt;Internet and Mobile Association of India, Cellular Operators Association of India, Internet Democracy project, Media for Change, SFLC and the Centre for Internet Society is organizing a Multi-stakeholder Dialogue on the future of internet on January 29, 2014 at Multipurpose Hall, India International Center (IIC).&lt;/b&gt;
        &lt;p&gt;Snehashish Ghosh will participate in the event as a speaker.&lt;/p&gt;
&lt;h3&gt;Schedule&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;10.00 - 10.30: Registration&lt;/li&gt;
&lt;li&gt;10.30 -13.30: Discussion and Open House&lt;/li&gt;
&lt;li&gt;13.30: Lunch&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The meeting seeks to address, among others, the following questions:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue of governing the internet through a multistakeholder mechanism (including government, business, civil society, academia and the technical community) versus a multilateral one (or an intergovernmental one, including only governments in a decision making role) is leading the global discourse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What is multistakeholderism? How is it practiced? How is it different from multilateralism or intergovernmental decision making? Why has multistakeholderism assumed such an important role in internet governance?&lt;br /&gt;Moderator – Subi Chutervedi&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several of the arguments are based in a framework document known as ‘Tunis Agenda 2005’.&lt;br /&gt;What is the role of the Tunis Agenda in these debates? Since its formulation 9 years ago, is it still relevant? What does “stakeholders in their respective roles” mean in 2014 and beyond?&lt;br /&gt;Moderator – Subi Chaturvedi&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The positions taken by the Government of India at international fora are linked to its cyber security concerns. &lt;br /&gt;Will India’s position of multilateral/intergovernmental governance of the Internet actually address these cyber security concerns?&lt;br /&gt;Moderator – Anja Kovacs&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the Snowden revelations, mass surveillance by governments has assumed center stage and is driving the recent discourse.&lt;br /&gt;Will a multilateral/inter-governmental mechanism adequately address serious concerns of government surveillance and intrusion into the privacy of internet users and citizens?&lt;br /&gt;Moderator – Anja Kovacs&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Innovation, freedom of speech and expression and privacy rights are critical to a free and open internet. How are these impacted under a multistakeholder vis-à-vis a multilateral/inter-governmental mechanism?&lt;br /&gt;Moderator- Chinmayi Arun&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet governance has both a domestic and a global angle. In 2014, what should be the process of policy making involving stakeholders? Should there be consultation and what should be the process, quality and outcome of such consultation, especially as it relates to Internet Governance?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What process should the government adopt before taking a position internationally and while formulating domestic policy related to internet governance?&lt;br /&gt;Moderator Chinmayi Arun&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/future-of-internet-january-29-2014'&gt;https://cis-india.org/events/future-of-internet-january-29-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-12T11:12:54Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-2">
    <title>Surveillance and the Indian Constitution - Part 2: Gobind and the Compelling State Interest Test</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-2</link>
    <description>
        &lt;b&gt;Gautam Bhatia analyses the first case in which the Supreme Court recognized a constitutional right to privacy, Gobind v. State of Madhya Pradesh, and argues that the holding in that case adopted the three-pronged American test of strict scrutiny, compelling State interest, and narrow tailoring in its approach to privacy violations.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;After its judgment in Kharak Singh, the Court was not concerned with the privacy question for a while. The next case that dealt – peripherally – with the issue came eleven years later. In &lt;i&gt;R.M. Malkani v State of Maharashtra&lt;/i&gt;, the Court held that attaching a recording device to a person’s telephone did not violate S. 25 of the Telegraph Act, because&lt;/p&gt;
&lt;blockquote class="italized" style="text-align: justify; "&gt;"where a person talking on the telephone allows another person to record it or to hear it, it can-not be said that the other person who is allowed to do so is damaging, removing, tampering, touching machinery battery line or post for intercepting or acquainting himself with the contents of any message. There was no element of coercion or compulsion in attaching the tape recorder to the telephone."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Although this case was primarily about the admissibility of evidence, the Court also took time out to consider – and reject – a privacy-based Article 21 argument, holding that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Article 21 was invoked by submitting that the privacy of the appellant’s conversation was invaded. Article 21 contemplates procedure established by law with regard to deprivation of life or personal liberty. The telephonic conversation of an innocent citizen will be protected by Courts against wrongful or high handed interference by tapping the conversation. The protection is not for the guilty citizen against the efforts of the police to vindicate the law and prevent corruption of public servants. It must not be understood that the Courts will tolerate safeguards for the protection of the citizen to be imperiled by permitting the police to proceed by unlawful or irregular methods."&lt;br /&gt;&lt;br /&gt; Apart from the fact that it joined Kharak Singh in refusing to expressly find a privacy right within the contours of Article 21, there is something else that unites Kharak Singh and R.M. Malkani: they hypothetical in Kharak Singh became a reality in Malkani – what saved the telephone tapping precisely because it was directed at "… a guilty person", with the Court specifically holding that the laws were not for targeting innocent people. Once again, then, the targeted  and specific nature of interception became a crucial – and in this case, a decisive – factor. One year later, in another search and seizure case, Pooran Mal v Inspector, the Court cited M.P. Sharma and stuck to its guns, refusing to incorporate the Fourth Amendment into Indian Constitutional law.&lt;br /&gt;&lt;br /&gt;It is &lt;i&gt;Gobind v State of MP&lt;/i&gt;, decided in 1975, that marks the watershed moment for Indian privacy law in the Constitution. Like Kharak Singh, Gobind also involved domiciliary visits to the house of a history-sheeter. Unlike Kharak Singh, however, in Gobind the Court found that the Regulations did have statutory backing – S. 46(2)(c) of the Police Act, which allowed State Government to make notifications giving effect to the provisions of the Act, one of which was the prevention of commission of offences. The surveillance provisions in the impugned regulations, according to the Court, were indeed for the purpose of preventing offences, since they were specifically aimed at repeat offenders. To that extent, then, the Court found that there existed a valid “law” for the purposes of Articles 19 and 21.&lt;br /&gt;&lt;br /&gt;By this time, of course, American constitutional law had moved forward significantly from eleven years ago, when Kharak Singh had been decided. The Court was able to invoke &lt;i&gt;Griswold v Connecticut&lt;/i&gt; and &lt;i&gt;Roe v Wade&lt;/i&gt;, both of which had found a "privacy" as an "interstitial" or "penumbral" right in the American Constitution – that is, not reducible to any one provision, but implicit in a number of separate provisions taken together. The Court ran together a number of American authorities, referred to Locke and Kant, to dignity, to liberty and to autonomy, and ended by holding, somewhat confusingly:&lt;br /&gt;&lt;br /&gt;“the right to privacy must encompass and protect the personal intimacies of the home, the family marriage, motherhood, procreation and child rearing. This catalogue approach to the question is obviously not as instructive as it does not give analytical picture of that distinctive characteristics of the right of privacy. Perhaps, the only suggestion that can be offered as unifying principle underlying the concept has been the assertion that a claimed right must be a fundamental right implicit in the concept of ordered liberty… there are two possible theories for protecting privacy of home. The first is that activities in the home harm others only to the extent that they cause offence resulting from the mere thought that individuals might he engaging in such activities and that such ‘harm’ is not Constitutionally protective by the state. The second is that individuals need a place of sanctuary where they can be free from societal control. The importance of such a sanctuary is that individuals can drop the mask, desist for a while from projecting on the world the image they want to be accepted as themselves, an image that may reflect the values of their peers rather than the realities of their natures… the right to privacy in any event will necessarily have to go through a process of case-by-case development."&lt;br /&gt;&lt;br /&gt;But if no clear principle emerges out of the Court’s elucidation of the right, it was fairly unambiguous in stressing the importance of the right itself. Interestingly, it grounded the right within the context of the freedom struggle. "Our founding fathers," it observed, "were thoroughly opposed to a Police Raj even as our history of the struggle for freedom has borne eloquent testimony to it." (Para 30) The parallels to the American Fourth Amendment are striking here: in his historical analysis Akhil Amar tells us that the Fourth Amendment was meant precisely to avoid the various abuses of unreasonable searches and seizures that were common in England at the time.&lt;br /&gt;&lt;br /&gt;The parallels with the United States become even more pronounced, however, when the Court examined the grounds for limiting the right to privacy. "Assuming that the fundamental rights explicitly guaranteed to a citizen have penumbral zones and that the right to privacy is itself a fundamental right, that fundamental right must be subject to restriction on the basis of compelling public interest." "Compelling public interest" is an interesting phrase, for two reasons. First, “public interest” is a ground for fundamental rights restrictions under Article 19 (see, e.g., Article 19(6)), but the text of the Article 19 restrictions do not use – and the Court, in interpreting them, has not held – that the public interest must be “compelling”. This suggests a stricter standard of review for an Article 21 privacy right violation than Article 19 violations. This is buttressed by the fact that in the same paragraph, the Court ended by observing: “even if it be assumed that Article 19(5) [restrictions upon the freedom of movement] does not apply in terms, as the right to privacy of movement cannot be absolute, a law imposing reasonable restriction upon it for compelling interest of State must be upheld as valid.” The Court echoes the language of 19(5), and adds the word “compelling”. This surely cannot be an oversight.&lt;br /&gt;&lt;br /&gt;More importantly – the compelling State interest is an American test, used often in equal protection cases and cases of discrimination, where “suspect classes” (such as race) are at issue. Because of the importance of the right at issue, the compelling state interest test goes hand-in-hand with another test: narrow tailoring. Narrow tailoring places a burden upon the State to demonstrate that its restriction is tailored in a manner that infringes the right as narrowest manner that is possible to achieve its goals. The statement of the rule may be found in the American Supreme Court case of Grutter v Bollinger:&lt;br /&gt;&lt;br /&gt;"Even in the limited circumstance when drawing racial distinctions is permissible to further a compelling state interest, government is still constrained under equal protection clause in how it may pursue that end: the means chosen to accomplish the government’s asserted purpose must be specifically and narrowly framed to accomplish that purpose."&lt;br /&gt;&lt;br /&gt; To take an extremely trivial example that will illustrate the point: the State wants to ban hate speech against Dalits. It passes legislation that bans “all speech that disrespects Dalits.” This is not narrowly tailored, because while all hate speech against Dalits necessarily disrespects them, all speech that disrespects Dalits is not necessarily hate speech. It was possible for the government to pass legislation banning only hate speech against Dalits, one that would have infringed upon free speech more narrowly than the “disrespect law”, and still achieved its goals. The law is not narrowly tailored.&lt;br /&gt;&lt;br /&gt;Crucially, then, the Court in Gobind seemed to implicitly accept the narrow-tailoring flip side of the compelling state interest coin. On the constitutionality of the Police Regulations itself, it upheld their constitutionality by reading them narrowly. Here is what the Court said:&lt;br /&gt;&lt;br /&gt;“Regulation 855, in our view, empowers surveillance only of persons against whom reasonable materials exist to induce the opinion that they show a determination, to lead a life of crime – crime in this context being confined to such as involve public peace or security only and if they are dangerous security risks. Mere convictions in criminal cases where nothing gravely imperiling safety of society cannot be regarded as warranting surveillance under this Regulation. Similarly, domiciliary visits and picketing by the police should be reduced to the clearest cases of danger to community security and not routine follow-up at the end of a conviction or release from prison or at the whim of a police officer.”&lt;br /&gt;&lt;br /&gt; But Regulation 855 did not refer to the gravity of the crime at all. Thus, the Court was able to uphold its constitutionality only by narrowing its scope in a manner that the State’s objective of securing public safety was met in a way that minimally infringed the right to privacy.&lt;br /&gt;&lt;br /&gt;Therefore, whether the Gobind bench was aware of it or not, its holding incorporates into Indian constitutional law and the right to privacy, not just the compelling State interest test, but narrow tailoring as well. The implications for the CMS are obvious. Because with narrow tailoring, the State must demonstrate that bulk surveillance of all individuals, whether guilty or innocent, suspected of crimes or not suspected of crimes (whether reasonably or otherwise), possessing a past criminal record or not, speaking to each other of breaking up the government or breaking up a relationship – every bit of data must be collected to achieve the goal of maintaining public security, and that nothing narrower will suffice. Can the State demonstrate this? I do not think it can, but at the very least, it should be made to do so in open Court.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-2'&gt;https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Constitutional Law</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-27T18:03:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-mathew-thomas-from-the-say-no-to-uid-campaign">
    <title>Interview with Mathew Thomas from the Say No to UID campaign - UID Court Cases</title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-mathew-thomas-from-the-say-no-to-uid-campaign</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) recently interviewed Mathew Thomas from the Say No to UID campaign about his ongoing efforts to challenge the UID scheme legally in the Bangalore High Court and Supreme Court of India. Read this interview and gain an interesting insight on recent legal developments with regards to the UID!&lt;/b&gt;
        
&lt;h3&gt;&lt;b&gt;Hi Mathew! We've heard that you've been in court a lot over the last few years with regards to the UID scheme. Could you please tell us about the UID case you have filed?&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY" class="western"&gt;In early 2012, I filed a civil suit at the Bangalore Court to declare the UID scheme illegal and to stop further biometric enrollments. I alleged that foreign agencies are involved in the process of biometric enrollment, and that cases of corruption have occurred with regards to the companies contracted by the UID Authority of India (UIDAI). Many dubious companies have been empanelled  for biometric enrollments by the UIDAI and many cases of corruption have been noted, especially with regards to the preparation of biometric databases for below poverty line (BPL) ration cards in Karnataka.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;In 2010, according to a government audit report, COMAT Technologies Private Limited had a contract with the Karnataka Government and was required to undertake a door-to-door survey and to set up biometric devices. COMAT Technologies Private Limited was paid ₹ 542.3 million for this purpose, but it turns out that the company did not comply with the terms of the contract and did not fullfill its obligations under the contract. Even though COMAT Technologies Private Limited had been contracted and had been paid ₹ 542.3 million, the company did not hand over any biometric device to the Karnataka Government. Instead, when the company got questioned, it walked away from the contract in 2010, even though it had been paid for a service it did not deliver.&lt;/p&gt;

&lt;p style="text-align: justify; "&gt;In the same year, 2010, COMAT Technologies was empanelled as an Enrolling Agency of the UIDAI. COMAT Technologies also carries out enrollments in Mysore and a TV  channel sting operation revealed that fake IDs were being issued in the  Mysore enrollment center. After much persuasion, the e-Government department of Karnataka informed me that they have filed an FIR. And this is just one case of a corrupt company empanelled as an enrollement agency with the UIDAI. Many similar cases with other companies have occurred in other cities in India, such as Mumbai, where the empanelled agencies have committed fraud and police complaints have been filed. But unfortunately, there is no publicly available information on the state of the investigations.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;As such, I filed a case at the Bangalore Court and stated that the whole UID system is insecure, that it will not achieve the objective of preventing leakages of welfare subsidies and that, therefore, it is a waste of public funds, which also affects individuals' right to privacy and right to life. In my complaint in the civil court I made allegations of corruption and dangers to national security backed by documentary evidence. According to Order 8 of the Civil Procedure Code (CPC), defendants are required to specifically deny each of the allegations against them and if they don't, the court is required to accept the allegations as accurate. According to law, vague, bald denials are not acceptable in courts. Interestingly enough, the defendants in this court case did &lt;i&gt;not&lt;/i&gt; deny any of the allegations, but instead stated that they (allegations) are “trivial” and requested the judge to dismiss the case without a trial. The judge requested the defendants to file a written application, asking for the suit to be dismissed under Order 7, Rule 11, of the Civil Procedure Code. Nonetheless, in May 2012, the judge observed that this is a serious case which should not be dismissed and that he would like to have a daily hearing of the case, especially since the case was grounded on the allegation that thousands of crores of rupees of public money are spent every day.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;However, one month later in June 2012, the judge dismissed the case by stating that I did not have a “cause of action” and that the case is not of civil nature under Section 9 of the Code of Civil Procedure. I argued that tax payers have a right to know where their money is going and that we all have a right to privacy and that therefore, I &lt;i&gt;did&lt;/i&gt; have a cause for action. I quoted the Supreme Court case setting out the law relating to the meaning of “civil nature”. The Apex court said, “Anything which is not of criminal nature is of civil nature”. I also quoted several court precedents which explained conditions under which complaints could be dismissed under Order VII Rule 11. Unfortunately though, the judge dismissed all of this and  suggested that I should take this case to the High Court or to the Supreme Court, since the Bangalore Court did not have the authority to address the violation of fundamental human rights. In my opinion, the fallacy in this judgement was that, on the one hand, the judge stated in his order that there was “no cause for action”, but on the other hand, he said that I should take the case to the High Court or to the Supreme Court! And on top of that, the judge stated that my case was frivolous and levied on me a Rs. 25, 000 fine, because apparently I was “wasting the court's time” !&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;In addition to all of this, the judge made a very intriguing statement in his order: he claimed that the biometric enrollment with the UIDAI is voluntary and that therefore I need not enrol. I argued that although the UID is voluntary in theory, it is actually mandatory on many levels, especially since access to many governmental services require enrollment with the UIDAI. Nonetheless, the judge insisted that the UID is purely voluntary and that if I am not happy with the UID, then I should just “stay at home”.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;And how did the case continue thereafter?&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY" class="western"&gt;In October 2012 I appealed against this to the High Court by stating that there was a misapplication of Order 7, Rule 11, of the Civil Procedure Code and requested the High Court to send the suit back for trial at the Bangalore Court.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;Now, when you appeal in India, the Court has to issue notices to the opposite party, which are usually sent by registered post. However, nothing was happening, so I filed a number of applications to hear the case. The registrar’s office filed a number of trivial “objections” with which I needed to comply and this took three months, until January 2013. For example, one “objection” was that the lower court order stated the date of the order as "03-07-12", whereas I had mentioned the date as 3 July 2012.  Then they would argue that the acknowledgement of the receipt of the notice from the respondents was not received. The High Court is located next to the head post office (GPO) in Bangalore and normally it would be sent there, then directly to the GPO in Delhi and from there to the Planning Commission or to the UIDAI. Yet, the procedure was delayed because apparently the notices weren't sent. In one hearing, the court clerk said that the address of the defendant was wrong and that the address of the Planning Commission should also be included. All in all, it seemed to me like there was some deliberate attempt to delay the procedure and the dismissal of the case by the Bangalore Court seemed very questionable. As a result, in January 2013, I asked the High Court to permit me to personally hand over my appeal to the Government Council. And finally, on 17th December 2013, my appeal was heard by the Bangalore High Court!&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;Over the last three months, the defendants have not filed any counter affidavit. Instead, the Government Council came to the High Court and stated that I have not filed a “paper book” (which includes depositions and evidence, among other things). However, the judge stated that this is not a case which requires a “paper book”, since my appeal was about the misapplication of Order 7, Rule 11, of the Civil Procedure Code. Then the Government Council asked for more time to review the appeal and it is has been postponed.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;Have there been any other recent court cases against the UID?&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY" class="western"&gt;Yes. While all of this was going on, retired judge, Justice Puttaswamy, filed a petition in the Supreme Court, stating that the UID scheme is illegal, since it violates article 73 of the Constitution. Aruna Roy, who is an activist at the National Council for People’s Right to Information, has also filed a petition where she has questioned the UID because it violates privacy rights and the rights of the poor.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;Furthermore, petitions have been filed in the Madras High Court and in the Mumbai High Court.  In 2012, it was argued in the Madras High Court that the only legal provision for taking fingerprints  exists under the Prisoners Act, whereas the UIDAI is taking the fingerprints of people who are not prisoners and therefore it is illegal. In 2013, Vikram Crishna, Kamayani Bahl and a few others argued in the Mumbai High Court that the right to privacy is being violated through the UID scheme. It is noteworthy that in most of these cases, the defendants have not filed any counter-arguments. The only exceptions were in the Aruna Roy and Puttaswamy cases, where the defendants claimed that the UID is secure and supported it in general. In the end, the Supreme Court directed that the cases in Mumbai and Madras should be clubbed together and addressed by it. As such, the cases filed in the Madras and Mumbai High Courts have been sent to the Supreme Court of India.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;Major General Vombathakere also filed a petition in the Supreme Court, arguing that the UID scheme violates individuals' right to privacy. When the counsel for the General commenced his arguments the judge pointed to the possibility of the Government passing the NIA Bill soon, which will contain provisions for privacy, as stated by the Government. As such, the judge implied that if the Government passes such a law the argument, that the Government is implementing the scheme in a legal vacuum, may not be valid.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;So what is the status of your pending court cases?&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY" class="western"&gt;Well, I impleaded myself in Aruna Roy's petition and brought my arguments with regards to corruption in the case of companies contracted with the UIDAI and the danger to national security through the involvement of persons linked to US intelligence agencies. The last hearing in the Supreme Court was on 10th December 2013, but it was postponed to 28 January 2014. So in short, in the Supreme Court I am currently filing a case for investigation with regards to corruption and links with foreign intelligence agencies by companies contracted with the UIDAI, while in the Bangalore High Court, I have appealed a civil trial with regards to the misplacement of Order 7, Rule 11, of the Civil Procedure Code.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-mathew-thomas-from-the-say-no-to-uid-campaign'&gt;https://cis-india.org/internet-governance/blog/interview-with-mathew-thomas-from-the-say-no-to-uid-campaign&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-27T12:47:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/business-standard-january-24-2014-veenu-sandhu-surabhi-agarwal-the-net-is-taking-over">
    <title>The net is taking over</title>
    <link>https://cis-india.org/news/business-standard-january-24-2014-veenu-sandhu-surabhi-agarwal-the-net-is-taking-over</link>
    <description>
        &lt;b&gt;For many days to come, people will speculate what caused Sunanda Pushkar's death last week in a New Delhi hotel. Did Union minister Shashi Tharoor's wife die of poisoning or a drug overdose? Wasn't she unwell? Was it suicide? Or was it murder? No less a matter of speculation has been the social media's role in the whole affair.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Veenu Sandhu and Surabhi Agarwal &lt;a class="external-link" href="http://www.business-standard.com/article/beyond-business/the-net-is-taking-over-114012401193_1.html"&gt;published in the Business Standard&lt;/a&gt; on January 24, 2014 quotes Sunil Abraham.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Writer Suketu Mehta has called it "murder by &lt;a href="http://www.business-standard.com/search?type=news&amp;amp;q=Twitter" target="_blank"&gt;Twitter&lt;/a&gt;". Pushkar's very public spat with Mehr Tarar, a Pakistani journalist, on the micro-blogging site, many psychologists feel, may have multiplied her anguish. Apart from other things, Tarar had tweeted: "The blonde's &lt;i&gt;aqal&lt;/i&gt; is weaker thn (sic) her grammar &amp;amp; spellings." Still others believe Pushkar had the premonition that end was near, and it was there for all to see on social media. &lt;i&gt;"Hasta hua jayega,"&lt;/i&gt; (will go laughing), she had tweeted a few days before her death.&lt;br /&gt;&lt;br /&gt;Social media is no longer time-pass in the country, certainly not with over 90 million users. The line that divides online and offline lives has blurred. &lt;a href="http://www.business-standard.com/search?type=news&amp;amp;q=Networking+Sites" target="_blank"&gt;Networking sites&lt;/a&gt; have begun to impact human behaviour. Lives are being lived in the open: open to comment, analysis and abuse. Mahesh Murthy, the founder of digital brand management firm Pinstorm, calls it the "demise of the culture of secrecy". This is the age, he says, "of diversity, of coming out in the open with sexual preferences &lt;i&gt;et cetera&lt;/i&gt;. Social media will help slaughter sacred cows. It is a good thing to happen, except for the sacred cows." According to Murthy, the pitfalls of uncensored speech are for those "who think they can control their lives or are insecure".&lt;br /&gt;&lt;br /&gt;But pitfalls are showing up. Some time ago, a high-profile couple from Delhi approached marriage and family counsellor Nisha Khanna. Their problem was aggravated by the wife's obsession with &lt;a href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook&lt;/a&gt;, to the extent that she would put out everything, including the ups and downs of her relationship with her husband, as status messages for the consumption of her social media friends and acquaintances. The husband was livid - he felt exposed. It took six months of rigorous counselling before the wife started controlling, though marginally, her social media behaviour. "We are seeing obsession, irrationality and an inability to spot the very &lt;i&gt;thick&lt;/i&gt; line that divides the private from the public," says Varkha Chulani, clinical psychologist, psychotherapist and consultant with Lilavati Hospital in Mumbai. People, she adds, are looking for Facebook 'like' buttons even in real life.&lt;br /&gt;&lt;br /&gt;Feelings of extreme happiness, depression, loneliness and even suicidal thoughts are being shared not with family and friends but with Facebook 'connections' and Twitter 'followers'. Tweets or status updates that point to suicidal tendencies, in particular, can be telling. Some of these key expressions are "depressed", "feeling abused", "it's over" or "empty inside". A study - Tracking Suicide Risk Factors through Twitter - conducted in the US last year found a strong correlation between the number of tweets that indicated suicidal intentions and the number of suicides committed.&lt;br /&gt;&lt;br /&gt;Having realised that the platform is also being used as a medium to vent and express personal trauma, Facebook has, for about a year, been sending reports on profiles of people with suicide risk to Mumbai-based suicide helpline Aasra. "In the last one year, we have received 350 such email intimations concerning Indians," says Aasra Director Johnson Thomas. Aasra then mails that person to subtly and sensitively convey that there is help at hand, in case it is needed. Facebook and Twitter did not offer any comment for this article.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Decoding Social Media Slang&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;I  am an aggregator who has left a cookie crumb trail (while writing   this) for a machine algorithm to follow. So, can it point out to my boss   the scoops and their origin? In all probability, yes. For an   all-devouring algorithm, no crumb, no target, is too small. Algorithms   (at their core, a step-by-step method for doing a job) can sound scary,   but social media analysts depend on these little-understood, obscure   mathematical creatures.&lt;br /&gt;&lt;br /&gt; So, information posted publicly on  blogs, Facebook, Twitter, and  other sites are fair game for these data  predators. Suppose you click  ‘like’ on Facebook, you’re giving away a  lot more than you might think.  Your ‘likes’ can be pieced together to  form an eerily true portrait of  yourself. A study of 58,000 volunteers  by Michal Kosinski and David  Stillwell (University of Cambridge) and  Thore Graepel (Microsoft  Research, Cambridge) charts the chances of an  accurate prediction: 67  per cent for single versus in a relationship,  73 per cent for cigarette  smoking, 70 per cent for alcohol drinking, 65  per cent for drug use, 88  per cent for male homosexuality, 75 per cent  for female homosexuality,  and 93 per cent for gender.&lt;br /&gt;&lt;br /&gt; Another  point is not all data out there are cold facts. Far from  that, most  are sentiments and slang: sweet, bitter and often intimate.  “Wazup  homie!! howz it going!!” is a profound example. “‘Yo, homie, I'll  be at  my house in case you want to come kick it later” is another. How  is a  number cruncher such as an algorithm expected to crunch slang and   emotions? But experts insist there’s a bull market in sentiments and   foul language. And an emerging field known as sentiment analysis is   taking shape. The simplest algorithms here work by scanning keywords to   categorise a statement as positive or negative, based on a simple  binary  analysis (‘love’ is good, ‘hate’ is bad). But a more reliable  analysis  requires decoding many linguistic shades of gray. For example,  to get at  the true intent of a statement like ‘dude, i'm  like......duuuude,’ the  software will have to activate several  different filters, including  polarity (is the statement positive or  negative?), intensity (what is  the degree of emotion being expressed?)  and subjectivity (how partial or  impartial is the source?)&lt;br /&gt;&lt;br /&gt; “People first thought that emotions expressed on social media were  just  cute and stupid,” says Sreeju Thankan who has done computer science   and engineering from the Indian Institute of Technology Roorkee and is   now working at Mango Solutions. “Now, they are recognising it as a rich   vein.” But translating slang into binary code can be much tougher.   “Sentiments are different from conventional facts,” says Thankan. “There   is a long way for slang patrol to go.” For casual web surfers, a   simpler sentiment-analysis tool, Tweetfeel, is available. It tells you   the numbers of positive and negative tweets on a given topic. It also   gives you their percentages. Its analysis is based not just on   emoticons, but also words and phrases.&lt;/p&gt;
&lt;p style="text-align: right; "&gt;Ashish Sharma&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Last October in Mumbai, a 17-year-old college student, Aishwarya Dahiwal, killed herself after her parents barred her from using Facebook. "Is Facebook so bad? I cannot stay in a home with such restrictions as I can't live without Facebook," her suicide note reportedly read. The parents were in utter shock. "Girls are more prone to putting personal and emotional messages on social networking sites," says Manju Chhabra, child counsellor who runs an organisation called Cactus Lily in Delhi. And they tend to get more affected by what people say and how they react. "And comments on this very impersonal medium which we are giving a very personal space can be very cruel."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Seema Hingorrany, a Mumbai-based psychologist, says one of her recent patients is a girl studying in Class 9. Her friend from school had uploaded a photo of herself, which got 200 'likes'. That upset the patient terribly because it reinforced her belief that she was unattractive and she became extremely upset, to the extent that her parents felt she needed counselling. Constant use of Facebook can affect one's self-esteem, if it's already low. Another of Hingorrany's patient was a 30-year-old who took to social media after he lost his job. But seeing other people's photos and updates made him increasingly jealous, and he began posting nasty comments. The recipients of his ire began "unfriending" him, which only made him more withdrawn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Irrational behaviour can also be seen in the world of random video chat. Sites like Omegle and Chatroulette aim to bring together surfers together with the help of webcams. The promise is irresistible: an endless stream of visitors in your room. When Ashish Sharma (the author of the accompanying article) logged on, he met a gaggle of girls who giggled endlessly, a German painter who was looking for his muse and wanted him to pose in a state of undress, a Swede who danced around and asked him to sing in praise of his bottom, and a man with an iron mask. It was crude and shocking. The excessively sexual behaviour can be unsettling for an unsuspecting (and young) visitor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is another side to it. "Twitter posts," says an article posted on rediff.com, "have saved lives. A man lost on a ski slope in Switzerland got help when he tweeted his predicament. Another got bail from arrest as his friends discovered from a tweet that he was jailed in a foreign country." Human resource managers check out the profiles of job applicants on social media. "People might mask many judgmental things in an interview; there is a possibility that they might express it on social media," says Debdas Sen, leader of technology consulting, PricewaterhouseCoopers. "Inclusion and diversity are important for us." But job seekers have become wise to it. That's why many airbrush their social media profiles. All politically incorrect posts are removed. Friends are treated lavishly offline so that they write nice posts on Facebook pages. Some even hire professional photographers for as much as Rs 20,000 to paste good profile pictures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But those who hire have started to see through it. Says Murthy of Pinstrip, "One can easily figure out the truthfulness of your statements by seeing what your friends are saying." One human resource manager says he pays more attention to what people post after 10 pm because "it tends to be more truthful". A senior functionary of a Gurgaon-headquartered firm says that he had hired somebody after he had found nothing suspicious on his LinkedIn profile; it was only later he found out that this person had been involved in some financial misdemeanour in his earlier job. "His LinkedIn profile had no clues, he was not on Facebook. That should have struck me," he says. Of course, the person was asked to leave.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, the executive director of Bangalore-based Centre for Internet and Society, says social media has made people forget the distinction between private, semi-private and public statements. "Speech used to be ephemeral, but Internet has given it the power it never had," he says. "Internet never forgets." The fact that traces of a communication may remain in cyberspace even after they have been deleted has prompted a legislation called the Right to Erasure by the European Union. Under the law, earlier called Right to be Forgotten, an individual can request all his data to be erased, including by third parties. India is also mulling a similar legislation under its Privacy Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those at the bottom of the social pyramid, who have little to lose, express themselves most freely on social media, while those with reputations to protect are cautious. The consequences can be serious, as the Mumbai girl who questioned the city's shutdown after Bal Thackeray's death in November 2012 on Facebook and her friend who "liked" realised: both were called in by the police. It's not surprising why even standup comedians, who can't resist taking potshots at one and all, turn extremely careful before they tweet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, is social media good or bad? "Social media can help," Amartya Sen said at the recent Jaipur Literature Festival, "But you must read more books".&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/business-standard-january-24-2014-veenu-sandhu-surabhi-agarwal-the-net-is-taking-over'&gt;https://cis-india.org/news/business-standard-january-24-2014-veenu-sandhu-surabhi-agarwal-the-net-is-taking-over&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-04T05:57:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-governance-and-india-the-way-forward">
    <title>Internet Governance and India: The Way Forward</title>
    <link>https://cis-india.org/news/internet-governance-and-india-the-way-forward</link>
    <description>
        &lt;b&gt;Snehashish Ghosh is participating in this event organized by the Observer Research Foundation on January 22 in New Delhi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Internet Governance Forum’s (IGF) purpose is to support the United Nations Secretary-General in carrying out the mandate from the World Summit on the Information Society (WSIS) with regard to convening a new forum for multi-stakeholder policy dialogue. The eighth edition of the Internet Governance Forum started on October 22, in Bali, Indonesia. Representatives of governments, intergovernmental organisations, private sector, technical and academic community and civil society gathered together to discuss Internet governance related issues, under the general theme of “Building Bridges – Enhancing Multistakeholder Cooperation for Growth and Sustainable Development”. Cybersecurity, open internet, freedom of expression, protection of human rights were some of the topics discussed and debated at the three day conference. There was also a mutual consensus amongst the participants on the multistakeholder model for internet governance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Programme&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;10.30: Registration/Tea&lt;/li&gt;
&lt;li&gt;11.00: Opening Remarks by Mahima Kaul, Fellow-ORF&lt;/li&gt;
&lt;li&gt;11.10:  Subi Chaturvedi, Assistant Professor Journalism &amp;amp; Communication, Lady Shri Ram College for Women &amp;amp; Founder Trustee Media For Change&lt;/li&gt;
&lt;li&gt;11.25: Dr. Anja Kovacs, Director, Internet Democracy Project, New Delhi.&lt;/li&gt;
&lt;li&gt;11.40: Dr. Govind, CEO, National Internet Exchange of India, Department of Electronics and Information Technology, Government of India.&lt;/li&gt;
&lt;li&gt;11.55: Virat Bhatia, Chairman, FICCI Communications &amp;amp; Digital Economy Committee and President, IEA AT&amp;amp;T, SouthAsia&lt;/li&gt;
&lt;li&gt;12.10: Question and Answer&lt;/li&gt;
&lt;li&gt;12.50: Concluding remarks&lt;br /&gt;13.00:  Lunch, ORF Lounge.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Speakers Biography&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Subi Chaturvedi, Asstt. Professor Journalism &amp;amp; Communication, Lady Shri Ram College for Women &amp;amp; Founder Trustee Media For Change.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Chaturvedi strives to promote the role and participation of the youth, women and girls in ICT and the policy dialogue and decision making, along with Improving e-governance and deepening democracy through 'media for change'. She also works on building bridges between different stakeholders in IG and enabling conversations on the national and domestic level on important policy concerns such as cybersecurity, openness, universality, human rights, permission less innovation and freedom of speech and expression online, through roundtables, workshops, public hearings and youth meets (Internet Dialogues) for India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She also actively participates in domestic as well as International meetings on Internet governance and enhanced cooperation to represent her stakeholder perspective, especially as a women academician and a member of the media and civil society from a developing country and an emerging economy. She often writes opinion and edits pieces for national dailies, journals and provides inputs and commentary to the electronic media to inform the debate and dialogue on Internet Governance policy questions&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Dr. Anja Kovacs,&lt;/b&gt; &lt;i&gt;Director, Internet Democracy Project, Delhi&lt;/i&gt;&lt;br /&gt;Dr. Anja Kovacs directs the Internet Democracy Project, Delhi, where her work focuses on questions regarding freedom of expression, cybersecurity and the architecture of Internet governance as they relate to the Internet and democracy. She is currently also a member of the of the Investment Committee of the Digital Defenders Partnership and of the interim Steering Group of Best Bits, a global network of civil society members. In addition, Anja has worked as an international consultant on Internet issues, including for the United Nations Development Programme Asia Pacific and the UN Special Rapporteur on Freedom of Expression, Mr. Frank La Rue, and has been an IREX Fellow and a Fellow at the Centre for Internet and Society in Bangalore. Prior to focusing her work on the information society, Anja researched, lectured and consulted on a wide range of development-related issues, including at the University of East Anglia, Norwich, and Ambedkar University, Delhi. She obtained her PhD in Development Studies from the University of East Anglia in the UK.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Dr. Govind,&lt;/b&gt; &lt;i&gt;CEO, National Internet Exchange of India, Department of Electronics and Information Technology, Government of India&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Virat Bhatia&lt;/b&gt;, &lt;i&gt;Chairman, FICCI Communications &amp;amp; Digital Economy Committee and President, IEA AT&amp;amp;T, SouthAsia&lt;/i&gt;&lt;br /&gt;As Chairman of the FICCI Communications and Digital Economy Committee, Mr. Bhatia currently leads the combined advocacy and policy reform efforts of nearly 150 members - representing leading telecom industry associations, mobile service providers, domestic and long distance service providers, ISPs, internet companies, social media, infrastructure and tower companies, device manufacturers, consultants, legal experts and other related stakeholders in India’s ICT space. He is appointed as a member of   the Joint Working Group (JWG) which drafted the “Guidelines on Protection of National Critical Information Infrastructure”, later released by the NSA in June 2013.  He serves on the Multistakeholder Advisory Group (MAG) of DeitY for India IGF, and in the past, on the JWG dealing with issues of cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At AT&amp;amp;T, Mr. Bhatia serves as President, IEA, for the South Asia region. He has responsibility for supporting all of AT&amp;amp;T’s businesses, corporate development activities, new investments and business strategies. He has been involved with the digital economy sector since 1994.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-governance-and-india-the-way-forward'&gt;https://cis-india.org/news/internet-governance-and-india-the-way-forward&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-03T10:33:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/multi-stakeholders-consultation-on-intl-public-policy-issues-january-21-2014">
    <title>Multistakeholders Consultation on International Public Policy Issues</title>
    <link>https://cis-india.org/news/multi-stakeholders-consultation-on-intl-public-policy-issues-january-21-2014</link>
    <description>
        &lt;b&gt;The Department of Electronics &amp; Information Technology has called for a meeting on January 21 in New Delhi to discuss international public policy issues. Snehashish Ghosh will participate in the meeting.&lt;/b&gt;
        &lt;p&gt;MAG Meeting Notice issued by the Department of Electronics &amp;amp; Information Technology on January 13 can be &lt;a href="https://cis-india.org/internet-governance/blog/mag-notice.pdf" class="internal-link"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/multi-stakeholders-consultation-on-intl-public-policy-issues-january-21-2014'&gt;https://cis-india.org/news/multi-stakeholders-consultation-on-intl-public-policy-issues-january-21-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-03T10:07:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-january-20-2014-what-is-net-neutrality-and-why-is-it-important">
    <title>What is net neutrality and why it is important</title>
    <link>https://cis-india.org/news/times-of-india-january-20-2014-what-is-net-neutrality-and-why-is-it-important</link>
    <description>
        &lt;b&gt;Internet is built around the idea of openness. It allows people to connect and exchange information freely, if the information or service is not illegal. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2014-01-20/internet/46373677_1_net-neutrality-web-service-web-users/2"&gt;published in the Times of India&lt;/a&gt; on January 20, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Much of this is because of the idea of net neutrality. If you like the current state of the internet, you should know about net neutrality. Many web users are aware of it. But if you are not, don't worry. We explain it here:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is net neutrality?&lt;/b&gt;&lt;br /&gt;&lt;a href="http://timesofindia.indiatimes.com/topic/Net-Neutrality"&gt;Net neutrality&lt;/a&gt; is an idea derived from how telephone lines have worked since the beginning of the 20th century. In case of a telephone line, you can dial any number and connect to it. It does not matter if you are calling from operator A to operator B. It doesn't matter if you are calling a restaurant or a drug dealer. The operators neither block the access to a number nor deliberately delay connection to a particular number, unless forced by the law. Most of the countries have rules that ask telecom operators to provide an unfiltered and unrestricted phone service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When the internet started to take off in 1980s and 1990s, there 	were no specific rules that asked that internet service providers 	(ISPs) should follow the same principle. But, mostly because telecom 	operators were also ISPs, they adhered to the same principle. This 	principle is known as net neutrality. An ISP does not control the 	traffic that passes its servers. When a web user connects to a 	website or web service, he or she gets the same speed. Data rate for 	Youtube videos and Facebook photos is theoretically same. Users can 	access any legal website or web service without any interference 	from an ISP.&lt;/p&gt;
&lt;p&gt;Some countries have rules that enforce net neutrality but most 	don't. Instead, the principle is followed because that is how it has 	always been. It is more of a norm than a law.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;How did net neutrality shape the internet?&lt;/b&gt;&lt;br /&gt;Net 	neutrality has shaped the internet in two fundamental ways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One, web users are free to connect to whatever website or service 	they want. ISPs do not bother with what kind of content is flowing 	from their servers. This has allowed the internet to grow into a 	truly global network and has allowed people to freely express 	themselves. For example, you can criticize your ISP on a blog post 	and the ISP will not restrict access to that post for its other 	subscribers even though the post may harm its business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But more importantly, net neutrality has enabled a level playing 	field on the internet. To start a website, you don't need lot of 	money or connections. Just host your website and you are good to go. 	If your service is good, it will find favour with web users. Unlike 	the cable TV where you have to forge alliances with cable connection 	providers to make sure that your channel reaches viewers, on 	internet you don't have to talk to ISPs to put your website online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This has led to creation Google, Facebook, Twitter and countless 	other services. All of these services had very humble beginnings. 	They started as a basic websites with modest resources. But they 	succeeded because net neutrality allowed web users to access these 	websites in an easy and unhindered way.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What will happen if there is no net neutrality?&lt;/b&gt;&lt;br /&gt;If 	there is no net neutrality, ISPs will have the power (and 	inclination) to shape internet traffic so that they can derive extra 	benefit from it. For example, several ISPs believe that they should 	be allowed to charge companies for services like YouTube and Netflix 	because these services consume more bandwidth compared to a normal 	website. Basically, these ISPs want a share in the money that 	YouTube or Netflix make.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Without net neutrality, the internet as we know it will not 	exist. Instead of free access, there could be "package plans" 	for consumers. For example, if you pay Rs 500, you will only be able 	to access websites based in India. To access international websites, 	you may have to pay a more. Or maybe there can be different 	connection speed for different type of content, depending on how 	much you are paying for the service and what "add-on package" 	you have bought.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lack of net neutrality, will also spell doom for innovation on 	the web. It is possible that ISPs will charge web companies to 	enable faster access to their websites. Those who don't pay may see 	that their websites will open slowly. This means bigger companies 	like Google will be able to pay more to make access to Youtube or 	Google+ faster for web users but a startup that wants to create a 	different and better video hosting site may not be able to do that.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead of an open and free internet, without net neutrality we 	are likely to get a web that has silos in it and to enter each silo, 	you will have to pay some "tax" to ISPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the state of net neutrality in India?&lt;/b&gt;&lt;br /&gt; Legally, the concept of net neutrality doesn't exist in India. Sunil  Abraham, director of Centre for internet and Society in Bangalore, says  that Trai, which regulates the telecom industry, has tried to come up  with some rules regarding net neutrality several times. For example it  invited comments on the concept of net neutrality from industry bodies  and stakeholders in 2006. But no formal rules have been formed to uphold  and enforce net neutrality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, despite lack of formal  rules, ISPs in India mostly adhere to the principal of net neutrality.  There have been some incidents where Indian ISPs have ignored net  neutrality but these are few and far between.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Will the concept of net neutrality survive?&lt;/b&gt;&lt;br /&gt; Net neutrality is sort of gentlemen's agreement. It has survived so far  because few people realized the potential of internet when it took off  around 30 years ago. But now when the internet is an integral part of  the society and incredibly important, ISPs across the world are trying  to get the power to shape and control the traffic. But there are ways to  keep net neutrality alive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consumers should demand that ISPs  continue their hands-off approach from the internet traffic. If  consumers see a violation of net neutrality, they ought to take a  proactive approach and register their displeasure with the ISP. They  should also reward ISPs that uphold the net neutrality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the  same time, as Abraham says, Trai needs to come out with a set of clear  and precise rules that protect the net neutrality. "We have started  seeing ISPs trying to take control of the traffic that flows from their  servers but Trai can regulate them. It can keep the internet open and  consumer-friendly by forming rules that protect net neutrality. These  are early days so it is easy to do. If ISPs manage to change the system,  it may become too late," he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-january-20-2014-what-is-net-neutrality-and-why-is-it-important'&gt;https://cis-india.org/news/times-of-india-january-20-2014-what-is-net-neutrality-and-why-is-it-important&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-03T08:24:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gni-assessment-finds-ict-companies-protect-user-privacy-and-freedom-of-expression">
    <title>GNI Assessment Finds ICT Companies Protect User Privacy and Freedom of Expression</title>
    <link>https://cis-india.org/internet-governance/blog/gni-assessment-finds-ict-companies-protect-user-privacy-and-freedom-of-expression</link>
    <description>
        &lt;b&gt;Elonnai Hickok analyses a public report recently published by GNI on the independent assessment process for Google, Microsoft, and Yahoo. The report finds Google, Microsoft, and Yahoo to be in compliance with the GNI principles on privacy and freedom of expression.&lt;/b&gt;
        &lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In January 2014, the &lt;a href="http://www.globalnetworkinitiative.org/sites/default/files/GNI_-_Principles_1_.pdf"&gt;Global Network Initiative (GNI)&lt;/a&gt; published t&lt;a href="http://globalnetworkinitiative.org/sites/default/files/GNI%20Assessments%20Public%20Report.pdf"&gt;he &lt;i&gt;Public Report on the Independent Assessment Process for Google, Microsoft, and Yahoo&lt;/i&gt;&lt;/a&gt;&lt;i&gt;. &lt;/i&gt;GNI is an industry consortium that was started in 2008 with the objective of protecting user’s right to privacy and freedom of expression globally. The main objectives of GNI are to provide a framework for companies that is based on international standards, ensure accountability of ICT companies through independent assessments, create opportunities for policy engagement, and create opportunities for stakeholders from multiple jurisdictions to engage in dialogue with each other. The Centre for Internet and Society, Bangalore, is a member of GNI. Companies based in India have yet to join as members to the GNI network.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Overview of the Public Report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Public Report provides an overview of assessments completed on the practices and policies of Google, Yahoo, and Microsoft from 2011 - 2013 to measure company compliance with the &lt;a href="http://www.globalnetworkinitiative.org/sites/default/files/GNI_-_Principles_1_.pdf"&gt;GNI principles&lt;/a&gt; on freedom of expression and privacy. The principles lay out broad guidelines that member companies  should seek to incorporate in their internal and external practices and speak to freedom of expression, privacy, responsible company decision making, multi – stakeholder collaboration, and organizational governance, accountability, and transparency. The GNI principles have also been developed with &lt;a href="https://globalnetworkinitiative.org/sites/default/files/GNI_-_Implementation_Guidelines_1_.pdf"&gt;Implementation Guidelines&lt;/a&gt; to provide companies with a framework for companies to respond to government requests. The assessment carried out by GNI reviewed cases in each company pertaining to governmental: blocking and filtering, takedown requests, criminalization of speech, intermediary liability, selective enforcement, content surveillance, and requests for user information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly, the assessment undertaken by GNI finds Yahoo, Microsoft, and Google to be in compliance with the GNI principles on freedom of expression and privacy. The Report highlights practices by the companies that work to protect freedom of expression and privacy such as conducting human rights impact assessments, issuing transparency reports, and notifying affected users when content is removed, have been, adopted by these companies. For example, Google conducts Human Rights Impact Assessments to assess potential threats to freedom of expression and privacy. Google also has in place internal processes to review governmental requests impacting freedom of expression and privacy, and the legal team at Google prepares a “global removal report” to provide a bird’s eye view of trends emerging from content removal requests. If Google has the email address of a user who’s posted content is removed, Google will often notify the user and directs the user to the Chilling Effects website. Google has also published a transparency report since 2010. Like Google, Microsoft conducts Human Rights Impact Assessments before making decisions on whether to incorporate certain features into its platforms when operating in high risk markets. Microsoft has also issued two global law enforcement requests reports in 2013. Yahoo has established a Business and Human Rights Program to ensure responsible actions are taken by the company with regards to freedom of expression and privacy, and now issues transparency reports about government requests. Yahoo’s Public Policy team also engages in dialogue with governments  on an international level about existing and proposed legislation impacting and implicating privacy and freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report highlights challenges to compliance with the GNI principles that companies face – namely legal restraints and mandates that they are faced with. On the issue of transparency, the assessment found that companies do not disclose information when there are legal prohibitions on such disclosure, when users privacy would be implicated, when companies choose to assert attorney client privilege, and when trade secrets are involved. Despite this, the assessment found that companies do deny and push back on governmental requests impacting freedom of expression and privacy for reasons such as the request needed clarification and modification, or that the request needed to follow established procedure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A number of findings came out of the assessments undertaken for the Report including:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;As demonstrated by the lack of ability to access information about secret national security requests, and the lack of ability for companies to disclose information on this topic there is a dire need for governments to reform surveillance policy and law impacting freedom of expression and privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The implementation of the GNI Principles is challenging when a company is undergoing an acquisition. In this scenario, contractual provisions limiting third party disclosure are critical in ensuring protection of privacy and free expression rights. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Companies need to pro-actively and on an ongoing basis internally review governmental restrictions on content to determine if it is in compliance with the commitment made by that company to the GNI Principles. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The assessment resulted in GNI defining a number of actionable (non-binding) recommendations for companies such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Improving the integration of human rights considerations in the due diligence process with respect to the acquiring and selling companies. &lt;/li&gt;
&lt;li&gt;Consider the impact of hardware on freedom of expression and privacy.&lt;/li&gt;
&lt;li&gt;Improve external and internal reporting.&lt;/li&gt;
&lt;li&gt;Review employee access to user data to ensure that employee access rights are restricted by both policy and technical measures on a ‘need to know’ basis across global operations. &lt;/li&gt;
&lt;li&gt;Review executive management training.&lt;/li&gt;
&lt;li&gt;Improve stakeholder engagement.&lt;/li&gt;
&lt;li&gt;Improve communication with users. &lt;/li&gt;
&lt;li&gt;Increase sharing of best practices. &lt;/li&gt;
&lt;li&gt;The GNI principles are focused on freedom of expression and privacy and are based on internationally recognized laws and standards for human rights. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;NSA leaks, global push for governmental surveillance reform, and the Public Report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;With special attention given to the various companies responses to the NSA leaks, the Report notes that in response to the NSA leaks the assessed companies have issued public statements and filed legal challenges with the US government  and filed suit with the FISA Court seeking the right to disclose data relating to the number of FISA requests received with the public. All three companies have also supported legislation and policy that would allow for such transparency. Furthermore in December 2014, the companies , along with other internet companies, developed and issued the five &lt;a href="http://reformgovernmentsurveillance.com/"&gt;Principles on Global Government Surveillance Reform&lt;/a&gt;.  Similar to other efforts to end mass and disproportionate surveillance, such as the &lt;a href="https://en.necessaryandproportionate.org/text"&gt;Necessary and Proportionate&lt;/a&gt; principles, the Principles on Global Government Surveillance Reform address: Limiting Governments’ Authority to Collect Users’ Information, Oversight and Accountability, Transparency about Government Demands, Respecting the Free Flow of Information, Avoiding Conflicts Among Governments. Other companies that signed these principles include AOL, Facebook, LinkedIn, and Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Along these lines, on January 14&lt;sup&gt;th&lt;/sup&gt;, GNI released the statement &lt;a href="http://globalnetworkinitiative.org/news/surveillance-reforms-protect-rights-and-restore-trust"&gt;“Surveillance Reforms to Protect Rights and Restore Trust”, &lt;/a&gt; urging the U.S Government to review and enact surveillance legislation that incorporate a ‘rights based’ approach to issues involving national security. In the statement, GNI specifically recommends the Government to action and: end mass collection of communications metadata, protect and uphold the rights of non-Americans, continue to increase transparency of surveillance practices, support the use of strong encryption standards.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion and way forward&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Looking ahead, GNI is planning on developing and implementing a mechanism to address effectively address consumer engagement and complaints issued by individuals who feel that GNI member companies have not acted consistently with the commitments made as a GNI member. GNI is also looking to expand work around public policy and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Public Report on the Independent Assessment Process for Google, Microsoft, and Yahoo is an important step towards ensuring ICT sector companies are accountable to the public in their practices impacting freedom of expression and privacy. The assessment comes at a time when ICT companies often find themselves stuck between a rock and a hard place – with Governments issuing surveillance and censorship demands with mandates for non-disclosure, and the public demanding transparency, company resistance to such demands from the Government, and a strong commitment to users freedom of expression and privacy. Hopefully, the GNI assessment is and will evolve into a middle ground for ICT companies – where they can be accountable to the public and their customers and compliant with Governmental mandates in all jurisdictions that they operate in. It will be interesting to see if in the future Indian companies join GNI as members and being to adopt the GNI principles and undergo GNI assessments.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gni-assessment-finds-ict-companies-protect-user-privacy-and-freedom-of-expression'&gt;https://cis-india.org/internet-governance/blog/gni-assessment-finds-ict-companies-protect-user-privacy-and-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-01-20T06:17:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter">
    <title>Social Notworking - 'Murder by Twitter'</title>
    <link>https://cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter</link>
    <description>
        &lt;b&gt;Suketu Mehta (@suketumehta) - terrible news about sunanda tharoor. this is murder by twitter. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Malini Nair &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2014-01-19/social-media/46345808_1_sunanda-pushkar-social-media-that-pushkar"&gt;published in the Times of India&lt;/a&gt; quotes Nishant Shah.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Even before forensic science has 		declared the reasons behind Sunanda Pushkar's shocking death on 		Friday night, social media has been accused of murder. Writer 		Suketu Mehta wasn't the only one to point fingers. "First 		murder by @TwitterIndia , claps, fellow &lt;a href="http://timesofindia.speakingtree.in/topics/thoughts/twitter"&gt;twitter&lt;/a&gt; matured guns!" is how another tweet went. Besides the deadly 		cocktail of depression, drugs, a strained marriage, questions have 		been raised about whether the vicious banter and collective howls 		of derision on social media over her very public meltdown — again 		on social media — pushed her over the edge. &lt;br /&gt;Have we, the 		tweeple, in our eagerness to share every detail of our lives over 		an internet megaphone, not quite understood what the social media 		can do, especially its pitfalls? Is the line between the public and 		private blurring too fast? Commentators say that the rules that 		govern human and social behaviour haven't changed, and the fault 		lies in how we negotiate the cyber turf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Can our digital lives 		have serious offline consequences? Nishant Shah, director, research 		, Centre for Internet &amp;amp; Society, Bangalore, says people need to 		realize that though twitter amplifies everything, but the ability 		to hurt, be mean, fight, question, critique and bully is not new.&lt;/p&gt;
&lt;p&gt;"These are human practices , which replay themselves across 	different media forms. What is perhaps new is that our most personal 	and darkest desires have become available for public spectacle," 	says Shah.&lt;/p&gt;
&lt;div dir="LTR" id="mod-a-body-after-first-para" style="text-align: justify; "&gt;
&lt;p&gt;That the twitterati can be brutal has been shown 	often enough this last year. When Tehelka editor Tarun Tejpal was 	mired in allegations of sexual harassment, his daughter was hounded 	on social media. Recently when novelist Lavanya Sankaran wrote an 	op-ed for New York Times defending the decent Indian man, she was 	royally derided, so much so that another journalist Rahul Bhatia 	tweeted in her defence, asking people to lay off.&lt;/p&gt;
&lt;p&gt;Sunanda's 	story hurtled towards a tragedy in a space of 48 hours after she 	went public. As Shah points out it wasn't as though there were no 	affairs and scandals before the dawn of social media but the tangle 	would have spun out differently and less brutally in another time 	and age. It all began, as Pushkar admitted to some papers and later 	denied, with the spilling of alleged BBMs sent by Pakistani 	journalist Mehr Tarar to Tharoor on his twitter account.&lt;/p&gt;
&lt;p&gt;Predictably, the effect of the first round of revelations was 	explosive. In fact, Pushkar herself appeared taken aback by the fact 	that a twitter spat ended up making front page headlines.&lt;/p&gt;
&lt;p&gt;The 	entire drama which, in another age, would have played out at home or 	a circle of family, friends and acquaintances — and at the most in 	far less dramatic gossip columns and on TV— was up on social 	media, provide enormous vicarious pleasure to thousands of social 	media bystanders. That Pushkar herself set the virtual assault in 	motion only adds to the bleak irony of it all. This was also not the 	first time Pushkar took a spat to twitter. @SPTVrocks tweeted about 	her fight with a journalist in Dubai earlier this month.&lt;/p&gt;
&lt;p&gt;Clinical 	psychologist Varkha Chulani says it is the personality behind the 	media usage not the form itself that is to be blamed. "People 	choose to talk about their private lives to impress others, to get 	attention. We forget what is real and what is virtual." Shah, 	however, believes that we live in a world of digital striptease and 	that the ubiquitous and pervasive technologies that surround us have 	forever blurred the lines between real and virtual.&lt;/p&gt;
&lt;p&gt;Activists 	have often pointed out that the social media has everything going 	for it — quick and vast connect and instant response — but what 	it lacks is empathy. It is easy enough to send out an RIP message, 	for instance, for someone you don't know or even care for, 	positioning yourself as a caring, empathetic soul in 140 characters.&lt;/p&gt;
&lt;p&gt;Post Pushkar's death, news anchor Barkha Dutt tweeted that we 	need to limit viciousness , stop judging and use greater compassion 	on twitter.&lt;/p&gt;
&lt;p&gt;Shah makes a similar plea for the human touch.&lt;/p&gt;
&lt;p&gt;"We 	are all so self-involved , creating narratives of our selves, 	bit-stripping every moment , instagramming every event, tweeting 	every encounter, and liking all the various things that happen 	around us, that we don't always have enough time to stop, to 	respond, to think and reflect upon other people's conditions . We 	have become jaded, to the various 'great' moments in people's time 	lines, but we are also becoming jaded to the pain that our 	involvement in these social networks can bring to those who are the 	subject of our attention," he says.&lt;/p&gt;
&lt;/div&gt;
&lt;div dir="LTR" id="mod-a-body-after-second-para" style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;With additional reporting by Shobita Dhar&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter'&gt;https://cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-04T07:02:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-january-17-2014-moulishree-srivastava-elizabeth-roche-eu-parliament-slams-us-surveillance">
    <title>EU parliament report slams US surveillance</title>
    <link>https://cis-india.org/news/livemint-january-17-2014-moulishree-srivastava-elizabeth-roche-eu-parliament-slams-us-surveillance</link>
    <description>
        &lt;b&gt;Report that outlines need for stringent laws for protecting citizen privacy, democratizing Internet governance holds lessons for India, say analysts.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Moulishree Srivastava and Elizabeth Roche quotes Sunil Abraham. It was &lt;a class="external-link" href="http://www.livemint.com/Home-Page/nYXiR4LEVJLiROfl95aFxH/EU-parliament-report-slams-US-surveillance.html"&gt;published in Livemint&lt;/a&gt; on January 17, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A European Union (EU) parliament report that outlines the need for stringent laws for protecting citizen privacy, democratizing Internet governance and rebuilding trust between Europe and the US holds many lessons for India, analysts and policymakers say.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US government listened into Indian communications as part of its massive global surveillance, which was exposed last year in leaks to the media. The embassies of France, Italy, Greece, Japan, Mexico, South Korea and Turkey were also subjected to the surveillance put in place after the September 2001 terrorist attacks. According to the external affairs ministry, India has registered its protest at least thrice over the issue with US authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A draft report on the US National Security Agency’s surveillance programme by the European parliament’s committee on civil liberties, justice and home affairs states that trust between the two transatlantic partners, trust among EU member-states, and trust between citizens and their governments were profoundly shaken because of the spying, and to rebuild trust in all these dimensions a comprehensive plan was urgently needed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It is very doubtful that data collection of such magnitude is only guided by the fight against terrorism, as it involves the collection of all possible data of all citizens; points therefore to the possible existence of other power motives such as political and economic espionage," says the report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report recommends prohibiting blanket mass surveillance activities and bulk processing of personal data, and asks EU member-states, including the UK, Germany, France, Sweden and the Netherlands, to revise their national legislation and practices governing the activities of intelligence services to ensure that they are in line with the standards of the European Convention on Human Rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also calls on the US to revise its legislation without delay in order to bring it in line with international law, recognizing privacy and other rights as well as providing for judicial redress for EU citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The American approach to privacy regulation has been deeply flawed. The US dominance over the Internet affects the structure and substance of Internet governance and among other human rights, the right to privacy," said Sunil Abraham, executive director of the Centre for Internet and Society, a Bangalore-based not-for-profit research organization. "The (EU) report, if implemented, may change the future of Internet governance by deepening the existing leadership provided by the EU in promoting their privacy standards globally."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On India’s rather restrained reaction to the spying, he said, “It is a tragedy that our politicians are not as proactive when it comes to protecting our rights. While India has only focused on changing its official email policy after the revelations of mass surveillance, it has done nothing as concrete and comprehensive as EU."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There is neither the recognition of (the) pervasive nature of global mass surveillance, nor is there full appreciation (of) the damaging consequences," Abraham added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;J. Satyanarayana, secretary in India’s department of electronics and information technology, said the concerns over privacy are the same for India as for the EU, but declined to comment on what preventive steps the government is implementing due to security reasons. The EU report called for concluding the EU-US umbrella pact, a framework agreement on data protection in the field of police and judicial cooperation, to ensure proper redress mechanisms for EU citizens in the event of data transfers from the EU to the US for law enforcement purposes. The report asks EU policymakers not to initiate any new sectoral agreements or arrangements for the transfer of personal data for law enforcement purposes and suggests suspending the terrorist finance tracking programme until the umbrella agreement negotiations are concluded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"EU wants to use EU-US umbrella agreement...to raise the US standards, to ensure the rights of EU citizens and perhaps all the citizens. All humans will need protection under US law as is currently the case in the EU,” said Abraham. “The prohibition of blanket surveillance that the report recommends will hopefully apply to all citizens regardless of their nationality."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft report goes as far as suggesting suspending Safe Harbour, the legal instrument used for the transfer of EU personal data to the US through Google, Microsoft, Yahoo, Facebook, Apple and LinkedIn, until a full review has been conducted and current loopholes are plugged. The report’s proposals and recommendations are likely to be implemented after election to the European parliament in May.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to reforms in the existing systems, the report outlines the importance of development of European clouds as it notes that trust in US cloud computing and cloud services providers has been affected by the surveillance practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Three of the major computerized reservation systems used by airlines worldwide are based in the US and that PNR (passenger name record) data are saved in cloud systems operating on US soil under US law...lacks data protection adequacy," states the report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;C.U. Bhaskar, analyst with the South Asia Monitor think tank, was of the view that India had “adequately” responded to the US through quiet diplomacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It is unlikely that the US will give up cyber surveillance,” he said, adding, “We should acquire our own capacity to ensure adequate defensive and offensive firewalls and build up appropriate capacity for our cyber programmes."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Given our expertise in the IT (information technology) sector, as an analyst my opinion is that we have a reasonable capacity to build up our capabilities," Bhaskar added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-january-17-2014-moulishree-srivastava-elizabeth-roche-eu-parliament-slams-us-surveillance'&gt;https://cis-india.org/news/livemint-january-17-2014-moulishree-srivastava-elizabeth-roche-eu-parliament-slams-us-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-03T06:13:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns">
    <title>Electoral Databases – Privacy and Security Concerns</title>
    <link>https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns</link>
    <description>
        &lt;b&gt;In this blogpost, Snehashish Ghosh analyzes privacy and security concerns which have surfaced with the digitization, centralization and standardization of the electoral database and argues that even though the law provides the scope for protection of electoral databases, the State has not taken any steps to ensure its safety.&lt;/b&gt;
        &lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The recent move by the Election Commission of India (ECI) to tie-up with Google for providing electoral look-up services for citizens and electoral information services has faced heavy criticism on the grounds of data security and privacy.&lt;a href="#_edn1" name="_ednref1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[i]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; After due consideration, the ECI has decided to drop the plan.&lt;a href="#_edn2" name="_ednref2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The plan to partner with Google has led to much apprehension regarding Google gaining access to the database of 790 million voters including, personal information such as age, place of birth and residence. It could have also gained access to cell phone numbers and email addresses had the voter chosen to enroll via the online portal on the ECI website.  Although, the plan has been cancelled, it does not necessarily mean that the largest database of citizens of India is safe from any kind of security breach or abuse. In fact, the personal information of each voter in a constituency can be accessed by anyone through the ECI website and the publication of electoral rolls is mandated by the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Publication of Electoral Rolls&lt;/b&gt;&lt;br /&gt;The electoral roll essentially contains the name of the voter, name of the relationship (son of/wife of, etc.), age, sex, address and the photo identity card number. The main objective of creation and maintenance of electoral rolls and the issue of Electoral Photo Identity Card (EPIC) was to ensure a free and fair election where the voter would have been  able to cast his own vote as per his own choice. In other words, the main purpose of the exercise was to curtail bogus voting. This is achieved by cross referencing the EPIC with the electoral roll.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The process of creation and maintenance of electoral rolls is governed by the Registration of Electors Rules, 1960. Rule 22 requires the registration officer to publish the roll with list of amendments at his office for inspection and public information. Furthermore, ECI may direct the registration officer to send two copies of the electoral roll to every political party for which a symbol has exclusively been reserved by the ECI. It can be safely concluded that the electoral roll of a constituency is a public document&lt;a href="#_edn3" name="_ednref3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; given that the roll is published and can be circulated on the direction of the ECI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the computational turn, in 1998 the ECI took the decision to digitize the electoral databases. Furthermore, printed electoral rolls and compact discs containing the rolls are available for sale to general public.&lt;a href="#_edn4" name="_ednref4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iv]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; In addition to that, the electoral rolls for the entire country are available on the ECI website.&lt;a href="#_edn5" name="_ednref5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[v]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; However, the current database is not uniform and standardized, and entries in some constituencies are available only in the local language. The ECI has taken steps to make the database uniform, standardized and centralized.&lt;a href="#_edn6" name="_ednref6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security Concerns&lt;/b&gt;&lt;br /&gt;The Registration of Electoral Rules, 1960 is an archaic piece of delegated legislation which is still in force and casts a statutory duty on the ECI to publish the electoral rolls. The publication of electoral rolls is not a threat to security when it is distributed in hard copies and the availability of electoral rolls is limited. The security risks emerge only after the digitization of electoral database, which allows for uniformity, standardization and centralization of the database which in turn makes it vulnerable and subject to abuse. The law has failed to evolve with the change in technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a recent article, Bill Davidow analyzes "the dark side of Moore’s Law" and argues that with the growth processing power there has been a growth in surveillance capabilities and on this note the article is titled, “&lt;i&gt;With Great Computing Power Comes Great Surveillance”&lt;/i&gt;&lt;a href="#_edn7" name="_ednref7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Drawing from Davidow’s argument, with the exponential growth in computing power, search has become convenient, faster and cheap. A uniform, standardized and centralized database bearing the personal information of 790 million voters can be searched and categorized in accordance with the search terms. The personal information of the voters can be used for good, but it can be equally abused if it falls into the wrong hands. Big data analysis or the computing power makes it easier to target voters, as bits and pieces of personal information give a bigger picture of an individual, a community, etc. This can be considered intrusive on individual’s privacy since the personal information of every voter is made available in the public domain&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, the availability of a centralized, searchable database of voters along with their age would allow the appropriate authorities to identify wards or constituencies, which has a high population of voters above the age of 65. This would help the authority to set up polling booths at closer location with special amenities. However, the same database can be used to search for density of members of a particular community in a ward or constituency based on the name, age, sex of the voters. This information can be used to disrupt elections, target vulnerable communities during an election and rig elections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Current IT Laws does not mandate the protection of the electoral database&lt;/b&gt;&lt;br /&gt;A centralized electoral database of the entire country can be considered as a critical information infrastructure (CII) given the impact it may have on the election which is the cornerstone of any democracy. Under Section 70 of the Information Technology Act, 2000 (IT Act) CII means “the computer resource, incapacitation or destruction of which, shall have debilitating impact on national security, economy.”&lt;a href="#_edn8" name="_ednref8"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[viii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; However, the appropriate Government has not notified the electoral database as a protected system&lt;a href="#_edn9" name="_ednref9"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ix]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;. Therefore, information security practices and procedures for a protected system are not applicable to the electoral database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Rules (IT Rules) are also not applicable to electoral databases, &lt;i&gt;per se&lt;/i&gt;. Since, ECI is not a body corporate, the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information), Rules, 2011 (&lt;i&gt;hereinafter &lt;/i&gt;Reasonable Security Practices Rules) do not apply to electoral databases. Ignoring that Reasonable Security Practices Rules only apply to a body corporate, the electoral database does fall within the ambit of definition of “personal information”&lt;a href="#_edn10" name="_ednref10"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[x]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; and should arguably be made subject to the Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The intent of the ECI for hosting the entire country’s electoral database online &lt;i&gt;inter alia&lt;/i&gt; is to provide electronic service delivery to the citizens. It seeks to provide “electoral look up services for citizens ... for better electoral information services.”&lt;a href="#_edn11" name="_ednref11"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; However, the Information Technology (Electronic Service Delivery) Rules, 2011 are not applicable to the electoral database given that it is not notified by the appropriate Government as a service to be delivered electronically. Hence, the encryption and security standards for electronic service delivery are not applicable to electoral rolls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT Act and the IT Rules provide a reasonable scope for the appropriate Government to include electoral databases within the ambit of protected system and electronic service delivery. However, the appropriate government has not taken any steps to notify electoral database as protected system or a mode of electronic service delivery under the existing laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;Publication of electoral rolls is a necessary part of an election process. It ensures free and fair election and promotes transparency and accountability. But unfettered access to electronic electoral databases may have an adverse effect and would endanger the very goal it seeks to achieve because the electronic database may pose threat to privacy of the voters and also lead to security breach.  It may be argued that the ECI is mandated by the law to publish the electoral database and hence, it is beyond the operation of the IT Act. But Section 81 of the IT Act has an overriding effect on any law inconsistent, therewith. The appropriate Government should take necessary steps under the IT Act and notify electoral databases as a protected system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is recommended that the Electors Registration Rules, 1960 should be amended, taking into account the advancement in technology. Therefore, the Rules should aim at restricting the unfettered electronic access to the electoral database and also introduce purposive limitation on the use of the electoral database. It should also be noted that more adequate and robust data protection and privacy laws should be put in place, which would regulate the collection, use, storage and processing of databases which are critical to national security.&lt;/p&gt;
&lt;div&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="edn1"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref1" name="_edn1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[i]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Pratap Vikram Singh, Post-uproar, EC’s Google tie-up plan may go for a toss, Governance Now, January 7, 2014 available at &lt;a class="external-link" href="http://www.governancenow.com/news/regular-story/post-uproar-ecs-google-tie-plan-may-go-toss"&gt;http://www.governancenow.com/news/regular-story/post-uproar-ecs-google-tie-plan-may-go-toss&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn2"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref2" name="_edn2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Press Note No.ECI/PN/1/2014, Election Commission of India , January 9, 2014 available at &lt;a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf"&gt;http://eci.nic.in/eci_main1/current/PN09012014.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn3"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref3" name="_edn3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Section 74, Indian Evidence Act, 1872&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn4"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref4" name="_edn4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iv]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; &lt;a class="external-link" href="http://eci.nic.in/eci_main1/the_function.aspx"&gt;eci.nic.in/eci_main1/the_function.aspx&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn5"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref5" name="_edn5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[v]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; &lt;a class="external-link" href="http://eci.nic.in/eci_main1/Linkto_erollpdf.aspx"&gt;http://eci.nic.in/eci_main1/Linkto_erollpdf.aspx&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn6"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref6" name="_edn6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; “At present, in most States and UTs the Electoral Database is kept at the district level. In some cases it is kept even with the vendors. In most States/UTs it is maintained in MS Access, while in some cases it is on a primitive technology like FoxPro and in some other cases on advanced RDBMS like Oracle or Sql Server. The database is not kept in bilingual form in some of the States/UTs, despite instructions of the Commission. In most cases Unicode fonts are not used. The database structure not being uniform in the country, makes it almost impossible for the different databases to talk to each other” –  Election Commission of India, Revision of Electoral Rolls with reference to 01-01-2010 as the qualifying date – Integration and Standardization of the database- reg., No. 23/2009-ERS, January 6, 2010 available at e&lt;a class="external-link" href="http://eci.nic.in/eci_main/eroll&amp;amp;epic/ins06012010.pdf"&gt;ci.nic.in/eci_main/eroll&amp;amp;epic/ins06012010.pdf&lt;/a&gt;&lt;span dir="RTL"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn7"&gt;
&lt;p class="MsoEndnoteText"&gt;&lt;a href="#_ednref7" name="_edn7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf"&gt;&lt;span&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;http://www.theatlantic.com/technology/archive/2014/01/with-great-computing-power-comes-great-surveillance/282933/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn8"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref8" name="_edn8"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[viii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Section 70, Information Technology Act, 2000&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn9"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref9" name="_edn9"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ix]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Computer resource which directly or indirectly affects the facility of Critical Information Infrastructure&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn10"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref10" name="_edn10"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[x]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Rule 2(1)(i), Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn11"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref11" name="_edn11"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Press Note No.ECI/PN/1/2014, Election Commission of India , January 9, 2014 available at &lt;a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf"&gt;http://eci.nic.in/eci_main1/current/PN09012014.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns'&gt;https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Safety</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Security</dc:subject>
    
    
        <dc:subject>e-Governance</dc:subject>
    
    
        <dc:subject>Transparency, Politics</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    

   <dc:date>2014-01-16T11:07:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
