<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2236 to 2250.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/itech-law-india-ninth-intl-asian-conference"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/index-on-censorship-kirsty-hughes-january-22-2013-internet-freedom-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-democracy-richa-kaul-padte-jan-22-2013-cyber-security-surveillance-and-the-right-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sunday-tribune-january-20-2013-sunil-abraham-tv-vs-social-media"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indianexpress-nishant-shah-january-12-2013-web-of-sameness"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/index-on-censorship-mahima-kaul-january-18-2013-is-freedom-of-expression-under-threat-in-the-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ians-news-is-freedomexpression-under-threat-in-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/bitfilm-and-bitcoin-a-discussion-by-aaron-koenig"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/7th-india-digital-summit-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/third-south-asian-meeting-on-internet-and-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cyber-regulations-advisory-committee-no-civil-society"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance">
    <title>Surveillance Camp: Privatized State Surveillance</title>
    <link>https://cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance</link>
    <description>
        &lt;b&gt;This is the second in a series of posts mapping global surveillance challenges discussed at EFF’s Surveillance Camp in Rio de Janeiro, Brazil.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Katitza Rodriguez's blog post was &lt;a class="external-link" href="https://www.eff.org/deeplinks/2013/01/surveillance-camp-privatize-state-surveillance"&gt;published by the Electronic Frontier Foundation&lt;/a&gt; on their website on January 28, 2013. Elonnai Hickok is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In December 2012, EFF organized a&lt;a href="https://www.eff.org/issues/surveillance-human-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/issues/surveillance-human-rights"&gt;Surveillance and Human Rights Camp&lt;/a&gt; in Brazil that brought together the expertise of a diverse group of people concerned about state electronic surveillance in Latin American and other countries. Among other concerns, participants spotlighted the many ways in which the private sector is increasingly playing a role in state surveillance. Here are a few examples:&lt;/p&gt;
&lt;h3 class="western"&gt;Voluntary Agreements Between Law Enforcement and Private Companies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Often law enforcement agencies will approach companies asking for voluntary disclosure of information for investigative purposes. Those requests may look and sound more like &lt;a href="http://blog.privacylawyer.ca/2011/11/dealing-with-police-letters-of-request.html"&gt;threats&lt;/a&gt;, with a great deal of &lt;a href="http://blog.privacylawyer.ca/2011/11/police-pipeda-requests-for-customer.html"&gt;moral pressure&lt;/a&gt; applied on the companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This voluntary assistance remains out of the public eye and shrouded in secrecy, as notification of state access is never given to the individual concerned, is not codified in law, and is not clearly disclosed in the company's terms of service or user agreement. Currently there is minimal, if any, oversight over such voluntary cooperation, so the scope of assistance provided is not well-documented.&lt;/p&gt;
&lt;h4 class="western"&gt;Canada&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Canadian ISPs &lt;a href="http://www.canlii.org/en/on/onca/doc/2012/2012onca660/2012onca660.html"&gt;have jointly decided&lt;/a&gt; to provide identifying data about &lt;a href="http://www.cippic.ca/agents_of_the_state"&gt;Canadian Internet users&lt;/a&gt; to law enforcement in child exploitation investigations. In fact, &lt;a href="http://www.cba.org/cba/newsletters-sections/pdf/2011-11-privacy1.pdf"&gt;several Canadian ISPs&lt;/a&gt; have developed a formal protocol in conjunction with various law enforcement agencies to be used when those authorities are seeking identification information associated with a given IP address at a specific date and time. Since the adoption of this protocol, some ISPs have expanded their information sharing practices to cover customer identification data in other contexts, such as &lt;a href="http://www.cippic.ca/sites/default/files/AgentsoftheState-Roundtable_Presentation.ppt"&gt;online harassment cases&lt;/a&gt;.&lt;/p&gt;
&lt;h3 class="western"&gt;Law Enforcement Approaching Service Providers Without Legally-Required Authorization&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A growing concern is the number of law enforcement officers skirting the law by asking service providers to simply fork over information without any sort of search warrant. Even when legal procedures, such as a search warrant, exist, police increasingly request information without obtaining a legal authorization. Nevertheless, they often expect full compliance from service providers.&lt;/p&gt;
&lt;h4 class="western"&gt;Chile&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;In 2008, a Chilean website called&lt;a href="http://huelga.cl/"&gt; &lt;/a&gt;&lt;a href="http://huelga.cl/"&gt;Huelga.cl&lt;/a&gt; (“strike” in English) was approached by the Cyber Crime Section of the Chilean Police. The site is an online space for coordinating union actions. The agency demanded that the webmaster hand over data related to pseudonymous user accounts, such as IP addresses, records of previous connections, real names, and physical addresses. The targeted users had left comments on a website about an ongoing strike.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this case, because police did not have a court order to back up the request for information,&lt;a href="http://huelga.cl/"&gt; &lt;/a&gt;&lt;a href="http://huelga.cl/"&gt;Huelga.cl&lt;/a&gt; took a stand by resisting police pressure and refusing to hand over the data without a fight. For legal assistance, they turned to Derechos Digitales, a Chilean online human rights nonprofit organization, and managed to resist the request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another case, the Regional Director of the Chilean Department of Labor, the agency responsible for ensuring the enforcement of labor laws, sent&lt;a href="http://www.derechosdigitales.org/wp-content/uploads/Respuesta-a-DT.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.derechosdigitales.org/wp-content/uploads/Respuesta-a-DT.pdf"&gt;a letter&lt;/a&gt; to Huelga.cl simply demanding the removal of “inappropriate content” from their website along with the disclosure of user information, but it was only for administrative purposes as opposed to serious criminal investigations. Huegal.cl again &lt;a href="http://www.derechosdigitales.org/2010/09/20/huelga-cl-resiste-presion-de-direccion-del-trabajo-por-entregar-informacion-de-usuarios/"&gt;refused to&lt;/a&gt; comply and instead, made the director’s demands public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is not always the case that service providers can resist extralegal government requests, find legal advice or have enough economic resources to fight against those demands as Huelga.cl did. Huelga.cl should be praised for speaking up and managing to make the request from law enforcement public.&lt;/p&gt;
&lt;h3 class="western"&gt;Governments Pressure Private Sector&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Governments frequently impose heavy fines for non-compliance with their requests for data access. This form of coercion acts as a mechanism of enforcement over service providers and can raise serious concerns for free expression. The service provider is left with little incentive or option to resist illegitimate requests from the government when they are threatened with heavy fines.&lt;/p&gt;
&lt;h4 class="western"&gt;Brazil&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;In 2012, a judge from northern Brazil &lt;a href="http://diariodonordeste.globo.com/materia.asp?codigo=1028611"&gt;froze Google's accounts&lt;/a&gt; and imposed a fine on the company for refusing to remove three anonymous blogs or reveal contact details of the bloggers.  The content of the blogs &lt;a href="http://thenextweb.com/la/2011/08/20/google-fined-in-brazil-for-refusing-to-reveal-bloggers-identities/"&gt;state&lt;/a&gt;&lt;a href="http://thenextweb.com/la/2011/08/20/google-fined-in-brazil-for-refusing-to-reveal-bloggers-identities/"&gt;d&lt;/a&gt; the mayor of Varzea Alegre of corruption and embezzlement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While some companies might be able to withstand governmental pressure, alarms were raised that this won’t be the case for smaller companies that lack resources and influence. This is particularly true in contexts where heavy fines for noncompliance are written into legislation, and companies are not given legal avenues to appeal or fight the fine.&lt;/p&gt;
&lt;h3 class="western"&gt;Foreign Governments Access To Individuals’ Data in the Cloud&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Governments are increasingly seeking to negotiate access or interceptation capabilities to user data with companies that do not lie within their jurisdictions. This form of access is complicated because it is not always clear which country’s laws apply or to what extent. Because of the complex nature of these requests, governments often look for "easy" solutions that call for voluntary disclosure of information or simply allow full access to the user data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, government officials in India have been pushing  for real time interception capabilities for all BlackBerry services. In response to the demands from the Indian Government, after a number of unsatisfactory proposals, in 2012 RIM set up a NOC in &lt;a href="http://crackberry.com/rim-installs-blackberry-server-mumbai"&gt;Mumbai&lt;/a&gt;, providing security agencies with access to &lt;a href="http://articles.economictimes.indiatimes.com/2012-12-30/news/36063501_1_lawful-access-lawful-interception-vendors-blackberry-internet-service"&gt;BlackBerry Messenger services&lt;/a&gt;, and created a solution for access to Blackberry Internet Services. In addition to asking RIM for real time access to communications, the Government of India had required Service Providers in India to adopt the solution provided by RIM by end of 2012 or risk being shut down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Elonnai Hickok from the &lt;a href="https://cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt; in Bangalore, India, the discussions between &lt;a href="http://articles.economictimes.indiatimes.com/2012-10-29/news/34798663_1_interception-solution-blackberry-interception-blackberry-services"&gt;RIM and the Indian Government&lt;/a&gt; is just one example of how governments are trying to negotiate their interests in light of the challenges posed by communications stored in the cloud and in multiple jurisdictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Internet is technically borderless, in reality, state actors impose their sovereignty onto online environments with increasing frequency. The &lt;a href="https://www.eff.org/document/cloudy-jurisdiction-addressing-thirst-cloud-data-domestic-legal-processes"&gt;exercise of sovereignty&lt;/a&gt; over shared spaces can subject individuals to the laws of another country without any awareness on their part that this has happened. This in effect transforms the surveillance efforts of one country into privacy risks for all the world’s citizens.&lt;/p&gt;
&lt;h3 class="western"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;State agencies and law enforcement are increasingly outsourcing investigations to private companies who are not under the same sort of judicial oversight as official law enforcement entities would be. The increasingly close and non-transparent connection between the private sector and law enforcement needs to be addressed, as it poses a risk to the rights and freedoms of the individual.  Of major concern to all Camp participants was the notion that private companies are routinely complying with the requests of law enforcement in the absence of due process. We encourage further research and documentation of this phenomenon. To highlight on this issue, we will be blogging next about the privatization of public security in Latin America.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance'&gt;https://cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-01-29T06:51:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs">
    <title>Five Frequently Asked Questions about the Amended ITRs</title>
    <link>https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs</link>
    <description>
        &lt;b&gt;This piece discusses the five major questions that have been the subject of debate after the World Conference on International Telecommunications 2012 (WCIT). The politics surrounding the WCIT are not discussed here but it must be kept in mind that they have played a significant role in the outcome of the conference and in some of the debates about it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Each question is discussed with reference to the text of the treaty, to the minutes of the plenary sessions (which are available via the &lt;a href="http://www.itu.int/en/pages/default.aspx"&gt;ITU website&lt;/a&gt;), a little international law and a few references to other people’s comments on the treaty.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. Do the ITRs apply to content on the internet?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 1.1 (a) has been amended to add the sentence “These Regulations do not address the content-related aspects of telecommunications”. Although some discussions about the &lt;a href="http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf"&gt;International Telecommunication Regulations (ITRs)&lt;/a&gt; and content have ignored this altogether, others seem concerned about its interpretation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ITU Secretary General has issued &lt;a href="http://www.itu.int/en/wcit-12/Pages/statement-toure.aspx"&gt;a statement&lt;/a&gt; in which he has clarified that “The new ITR treaty does NOT cover content issues and explicitly states in the first article that content-related issues are not covered by the treaty”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commentators like &lt;a href="http://tryingtoreason.wordpress.com/2012/12/15/yes-the-new-itrs-do-cover-content-and-the-internet/"&gt;Chuan-Zheng Lee&lt;/a&gt; however, continue to view the treaty with suspicion, on the basis that it is necessary to examine content in order to tell whether it is spam (Lee and &lt;a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/"&gt;Chaparro&lt;/a&gt; differ on this question). However, others like &lt;a href="http://www.nytimes.com/2012/12/15/technology/in-a-huff-a-telling-us-walkout.html?pagewanted=all&amp;amp;_r=0"&gt;Eric Pfanner&lt;/a&gt; have pointed to this paragraph in their skepticism about the US refusal to sign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman proposed the addition to Article 1.1(a) at the tenth plenary session. He did this to address concerns that the ITRs text could be interpreted to apply to content on the Internet. The original formulation that he proposed was ‘These regulations do not address and cannot be interpreted as addressing content’. This text was suggested in the middle of an extended discussion on Article 5A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many countries were skeptical of this insertion. Sudan argued that content could not be avoided in telecommunication networks “because it will always be in transit.” The United Arab Emirates seemed concerned about international interference in states’ existing regulation of content, and said “maybe we could actually say this in the minutes of the meeting that this regulation should not be interpreted as on alteration to Member States content regulation”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns about what the term ‘content’ means and whether it would apply broadly were raised by more than one country, including Saudi Arabia. For instance, it was argued that the text proposed by the Chairman might interfere with parts of the treaty that require operators to send tariff information correspondence. More than one country that felt that the insertion of this text would impact several parts of the treaty, and that it would be difficult to determine what amounted to dealing with content. The primary issue appeared to be that the term ‘content’ was not defined, and it therefore remained unclear what was being excluded. In response to these concerns, the Chairman withdrew his proposal for the amendment excluding content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, several states then spoke up in favour of the Chairman’s proposal, suggesting that the proposed amendment to Article 1.1 influenced their acceptance of Article 5A (on security and robustness of networks – discussed in detail below). Brazil suggested that an answer to the definitional concerns may be found in the work by Study Group 17, which had a definition available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following this, the next day, at the twelfth plenary, the Chairman brought back the Article 1.1 amendment excluding content. He stated explicitly that this amendment might be the way to get Articles 5A and 5B approved. The text he read out was insertion of the words &lt;i&gt;“&lt;/i&gt;to the exclusion of their content”, after ‘’services’ at the end of 1.1A. Interestingly however, the term ‘content’ was never defined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the next plenary session, Iran raised the objection that this phrase was overbroad, and proposed the following formulation instead: “These Regulations do not address the content-related aspects of telecommunications”. This formulation found its way into the amended ITRs as the treaty stands today.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2. Does Article 5A on network security legitimize surveillance of Internet content?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5A deals with ‘security and robustness of networks’ and requires member states to “individually and collectively endeavour to ensure the security and robustness of international telecommunication networks...”.  This may have given rise to concerns about interpretations that may extend the security of networks to malware or viruses, and therefore to content on the Internet. However, Article 5A has to be read with Article 1.1(a), and therefore must be interpreted such that it does not ‘address the content-related aspects of telecommunications’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some commentators continue to see Article 5A as problematic. Avri Doria &lt;a href="http://avri.doria.org/post/38641776703/wcit"&gt;has argued&lt;/a&gt; that the use of the word ‘security’ in addition to ‘robustness’ of telecommunication infrastructure suggests that it means Internet security.   However Emma Llansó of the Centre for Democracy and Technology &lt;a href="https://www.cdt.org/blogs/emma-llanso/2012making-sense-wcit-it%E2%80%99s-complicated"&gt;has noted&lt;/a&gt; that the language used in this paragraph is “ far too vague to be interpreted as a requirement or even a recommendation that countries surveil users on their networks in order to maintain security”. Llansó  has suggested that civil society advocates make it clear to countries which attempt to use this article to justify surveillance, that it does not lend itself to such practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5A was one of the most controversial parts of the ITRs and was the subject of much debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On December 11&lt;sup&gt;th&lt;/sup&gt;, in the Chairman’s draft that was being discussed, Article 5A was titled ‘security of networks’, and required members to endeavour to ensure the “security and robustness of international telecommunication networks”.  The Chairman announced that this was the language that came out of Committee 5’s deliberations, and that ‘robustness’ was inserted at the suggestion of CEPT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several countries like Poland, Australia, Germany and the United States of America were keen on explicitly stating that Article 5A was confined to the physical or technical infrastructure, and either wanted a clarification that to this effect or use of the term ‘robustness’ instead of security. Many other countries, such as Russia and China, were strongly opposed to this suggestion and insisted that the term security must remain in the document (India was one of the countries that preferred to have the document use the term ‘security’).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was in the course of this disagreement, during the tenth plenary session, that the Chairman suggested his global solution for Article 1.1 – a clarification that this would not apply to content. This solution was contested by several countries, withdrawn and then reinstated (in the eleventh plenary) after many countries explained that their assent to Article 5A was dependant on the existence of the Article 1 clarification about content (see above for details).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was also some debate about whether Article 5A should use the term ‘robustness’ or the term ‘security’ (eg. The United States clarified that its preference was for the use of ‘resilience and robustness’ rather than security). The Secretary General referred to this disagreement, and said that he was therefore using both terms in the draft. The title of Article 5A was changed, in the eleventh plenary, to use both terms, instead of only referring to security.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3. Does Article 5B apply to spam content on the Internet? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The text of the amended treaty talks of ‘unsolicited bulk electronic communications’ and does not use the term ‘spam’[Article 5B says that ‘Members should endeavour to take necessary measures to prevent the propagation of unsolicited bulk electronic communications and minimize its impact on international telecommunication services’].If this phrase is read in isolation, it may certainly be interpreted as being applicable to spam. Commentators like &lt;a href="http://avri.doria.org/tagged/WCIT/page/2"&gt;Avri Doria&lt;/a&gt; have pointed to sources like&lt;a href="http://www.itu.int/osg/csd/intgov/resoultions_2010/PP-10/RESOLUTION_130.pdf"&gt; Resolution 130 of the Plenipotentiary Conference of the International Telecommunication Union&lt;/a&gt; (Guadalajara, 2010) to demonstrate that ‘unsolicited bulk electronic communications’ ordinarily means spam.  However, others like&lt;a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/"&gt; Enrique A. Chaparro&lt;/a&gt; argue that it cannot possibly extend to content on the Internet given the language used in Article 1.1(a). Chapparo has explained, that given the exclusion of content, Article 5B it authorizes anti-spam mechanisms that do not work on content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5B, which discusses ‘unsolicited bulk electronic communications’, must be read with Article 1, which is the section on purpose and scope of the ITRS. Article 1.1 (a) specifies that the ITRs “do not address the content-related aspects of telecommunications”. Therefore it may be argued that ‘unsolicited bulk electronic communications’ cannot be read as being applicable to content on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, many continue to be concerned about Article 5B’s applicability to spam on the Internet. Although some of them that their fear is that some states may interpret Article 5B as applying to content, despite the contents of Article 1.1(a), many have failed to engage with the issue in the context of Article 1.1(a).&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5B is inextricably linked with the amendment to Article 1.1. Mexico asked specifically about what the proposed amendment to Article 1.1 would mean for Article 5B: “I’m referring to the item which we’ll deal with later, namely unsolicited bulk electronic communications.  Could that be referred to as content, perhaps?”.  The Chairman responded saying, “This is exactly will solve the second Article 5B, that we are not dealing with content here.  We are dealing with measures to prevent propagation of unsolicited bulk electronic messages”.&lt;sup&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment to Article 1.1 was withdrawn soon after it was introduced. Before it was reintroduced, Sweden said (at the eleventh plenary) that it could not see how Article 5B could apply without looking into the content of messages. The United States agreed with this and went on state that the issue of spam was being addressed at the WTSA level, as well as by other organisations. It argued that the spam issue was better addressed at the technical level than by introducing it in treaty text.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment excluding content was reintroduced during the twelfth plenary. The Chairman explicitly stated that it might be the way to get Articles 5A and 5B approved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The word ‘spam’ was dropped from the ITRs in the eight plenary, and “unsolicited bulk electronic communications” was used instead.  However, in the eleventh plenary, as they listed their reasons for not signing the newly-amended ITRs, Canada and the United States of America referred to ‘spam’ which suggests that they may have viewed the change as purely semantic.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4. Does the resolution on Internet Governance indicate that the ITU plans to take over the Internet?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much controversy has arisen over the plenary resolution ‘to foster an enabling environment for the greater growth of the Internet’. This controversy has arisen partly thanks to the manner in which it was decided to include the resolution, and partly over the text of the resolution. The discussion here focuses on the text of the resolution and then describes the proceedings that have been (correctly) criticized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The history of this resolution, as &lt;a href="http://www.circleid.com/posts/20121217_wcit_and_internet_governance_harmless_resolution_or_trojan_horse/"&gt;Wolfgang Kleinwächter&lt;/a&gt; has explained, is that it was part of a compromise to appease the countries which were taking positions on the ITU’s role in Internet governance, that were similar to the &lt;a href="http://files.wcitleaks.org/public/Merged%20UAE%20081212.pdf"&gt;controversial Russian proposal&lt;/a&gt;. The controversial suggestions about Internet governance were excluded from the actual treaty and included instead in a non-binding resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The text of the resolution instructs the Secretary General to “to continue to take the necessary steps for ITU to play an active and constructive role in the development of broadband and the multi-stakeholder model of the Internet as expressed in § 35 of the Tunis Agenda”. This paragraph is particularly controversial since of paragraph 35 of the &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt; says “Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues.” Kleinwächter has pointed out that this selection leaves out later additions that have taken place with progression towards a multi-stakeholder model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The resolution also resolves to invite member states to “to elaborate on their respective positions on international Internet-related technical, development and public-policy issues within the mandate of ITU at various ITU forums including, inter alia, the World Telecommunication/ICT Policy Forum, the Broadband Commission for Digital Development and ITU study groups”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A little after its introduction, people began expressing concerns such as the &lt;a href="https://www.accessnow.org/blog/2012/12/12/wcit-watch-just-taking-the-temperature-a-late-night-resolution-on-the-inter"&gt;Secretary General may treat the resolution as binding&lt;/a&gt;, While the language may raise cause for concern, it is important to note that resolutions of this nature are not binding and countries are free to opt out of them. Opinions vary about the intentions that have driven the inclusion of this resolution, and what it may mean for the future. However commentators like Milton Mueller have scoffed at these concerns, pointing out that the resolution is harmless and may have been a &lt;a href="http://www.internetgovernance.org/2012/12/13/what-really-happened-in-dubai/"&gt;clever political maneuver&lt;/a&gt; to resolve the basic conflict haunting the WCIT, and that &lt;a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/"&gt;mere discussion of the Internet in the ITU harms no one&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Egypt and Bulgaria suggested that the resolution refer to paragraph 55 of the Tunis agenda instead of paragraph 35, by inserted the following text “”Recognizing that the existing arrangements for Internet Governance have worked effectively to make the Internet the highly robust, dynamic and geographically diverse medium it is today, with the private sector taking the lead in day-to-day operations and with innovation and value creation at the edges.” The US was also quite insistent on this language (although it did also argue that this was the wrong forum to discuss these issues).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman was willing to include paragraph 55 in addition to paragraph 35 but Saudi Arabia objected to this inclusion. Finland suggested that the resolution should be removed since it was not supported by all the countries present and was therefore against the spirit of consensus. The Secretary General defended the resolution, suggesting both that it was harmless and that since it was a key component of the compromise, eliminating it would threaten the compromise. South Africa and Nigeria supported this stand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was during this debate that the procedural controversy arose. Late into the night, the Chairman said there was a long list of countries that wished to speak and said “I just wanted to have the feel of the room on who will accept the draft resolution”. He proceeded to have countries indicate whether they would accept the draft resolution or not, and then announced that the majority of the countries in the room were in favour of retaining the resolution. The resolution was then retained. Upon Spain’s raising the question, the Chairman clarified that this was not a vote. The next day, other countries raised the same question and the Chairman, while agreeing that the resolution was adopted on the basis of the ‘taking of temperature’ insisted that it was not a vote so much as an effort to see what majority of the countries wanted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. Does the human rights language used in the preamble, especially the part about states’ access to the Internet, threaten the Internet in any way?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The preamble says “Member States affirm their commitment to implement these Regulations in a manner that respects and upholds their human rights obligations”, and “These Regulations recognize the right of access of Member States to international telecommunication services”. The text of the preamble can be used as an interpretation aid since it is recognized as providing context to, and detailing the object and purpose of, a treaty. However if the meaning resulting from this appears to be ambiguous, obscure, absurd or unreasonable, then supplementary means such as the preparatory work for the treaty and the circumstances for its conclusion may also be taken into account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore anyone who is concerned about the impact of the text inserted in the preamble must (a) identify text within the main treaty that could be interpreted in an undesirable manner using the text in the preamble; and (b) consider preparatory work for the treaty and see whether it supports this worrying interpretation. For example, if there were concerns about countries choosing to interpret the term ‘human rights’ as subordinating political rights to economic rights, it would be important to take note of the Secretary General’s emphasis on the &lt;a href="http://www.un.org/en/documents/udhr/index.shtml"&gt;UDHR&lt;/a&gt; being applicable to all member states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially, only the first insertion about ‘human rights obligations’ was part of the draft treaty. The second insertion, recognizing states’ rights followed after the discussion about human rights language. Some states argued that it was inconsistent to place human rights obligations on states towards their citizens, but to leave out their cross-border obligations. It was immediately after this text was voted into the draft, that the United States, the United Kingdom and other countries refused to sign the ITRs. This particular insertion is phrased as a right of states rather than that of individuals or citizens, which does not align with the language of international human rights. While it may not be strictly accurate to say that human rights have traditionally been individual centric (since collective rights are also recognized in certain contexts), it is certainly very unusual to treat the rights of states or governments as human rights.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States of America and the Netherlands wanted to include language to state explicitly that states’ international human rights obligations are not altered in anyway. This was to clarify that the inclusion of human rights language was not setting the ITU up as a forum in which human rights obligations are debated. Malaysia objected to the use of human rights language in the preamble right at the outset, on the grounds that the ITRs are the wrong place for this, and that the right place is the ITU Constitution. It even pointed to the fact that jurisprudence is ever-evolving, to suggest that the meaning of human rights obligations might change over time. These were the two major perspectives offered towards the beginning of the discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman underlined the fact that the Universal Declaration of Human Rights is already applicable to all UN countries. He argued that reflection of these principles in the ITRs would help build universal public faith in the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first traces of the states’ access rights can be seen in Cuba’s intervention at the ninth plenary – Cuba argued that limiting states’ access to public information networks amounted to infringement of human rights. At the fourteenth plenary, Nigeria proposed on behalf of the African group that the following text be added to the preamble “And recognize the right of access of all Member States to international telecommunication networks and services." Countries like China which had been ambivalent about the human rights language in the preamble, were happy with this move away from an individual-centric understanding of human rights, to one that sees states as representative of people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States was express in its dissent, and said “human rights obligations go to the individual”. Sweden was also not happy with the proposal and argued that it moved away from well-established human rights language that affirmed existing commitments to drafting new human rights language.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was an amended version of the African group proposal that finally found its way into the preamble. It was supported by many countries such as China, Nigeria and Sudan, who took the position that group rights are included within human rights, and that governments represent their citizens and therefore have rights on their behalf. This position was strenuously disputed by states like the USA, Switzerland, United Kingdom and Canada.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs'&gt;https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2013-01-30T05:36:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/itech-law-india-ninth-intl-asian-conference">
    <title>9th International Asian Conference </title>
    <link>https://cis-india.org/news/itech-law-india-ninth-intl-asian-conference</link>
    <description>
        &lt;b&gt;ITechLaw is organizing the 9th Annual Asian ITechLaw Conference on February 14 and 15, 2013 in India's high technology capital - Bangalore, India. Sunil Abraham will be speaking at this event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;hr /&gt;
&lt;p&gt;This info was &lt;a class="external-link" href="http://www.itechlaw-india.com/index.htm"&gt;published on ITechLaw website&lt;/a&gt; on January 22, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span class="spacing"&gt;This conference will focus on the latest  regulatory, commercial and technology law issues being faced by emerging  and growth industries in India and Asia as well as the U.S. and Europe.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span class="spacing"&gt;Conference Program&lt;/span&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;span class="spacing"&gt;Day 1, Thursday, February 14, 2013&lt;/span&gt;&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;07:45 - 08:45&lt;/td&gt;
&lt;td&gt;Breakfast &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09:00 - 09:10&lt;/td&gt;
&lt;td&gt;&lt;span class="topic"&gt;&lt;b&gt;Plenary Welcome &lt;/b&gt; &lt;/span&gt;&lt;br /&gt; &lt;b&gt;Presidential Welcome &lt;/b&gt;&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;John Beardwood&lt;/b&gt;, Fasken Martineau DuMoulin LLP, Toronto &lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09:10 - 09:30&lt;/td&gt;
&lt;td&gt;&lt;span class="topic"&gt;&lt;b&gt;Keynote Address&lt;/b&gt; (TBD)&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09:30 - 11:15&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span class="topic"&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;b&gt;Moderator:&lt;/b&gt; &lt;a href="http://www.itechlaw-india.com/program.htm"&gt;&lt;span class="moderator"&gt;Calab Gabriel, K&amp;amp;S Partners, New Delhi&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;TBD&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Pravin Anand&lt;/b&gt;, Anand &amp;amp; Anand, New Delhi &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;ISP Liability for IP Infringements &lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Paulo Brancher&lt;/b&gt;, BKBG Attorneys at Law, Sao Paulo, Brazil&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;John Doe IP Enforcement in India&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Sundari Pisupati&lt;/b&gt;, Tempus Law &amp;amp; Associates, Hyderabad&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Counterfeiting in the context of the Semiconductor Industry &lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Gaurav Jabulee&lt;/b&gt;, Senior Counsel - Asia, Texas Instruments, Bangalore &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:15 - 11:30&lt;/td&gt;
&lt;td&gt;&lt;span class="black"&gt;&lt;b&gt;Coffee / Tea / Networking Break&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30 - 13:00&lt;/td&gt;
&lt;td&gt;&lt;span class="topic"&gt;&lt;b&gt;M &amp;amp; A in the Technology Sector &lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;b&gt;Moderator:&lt;/b&gt; &lt;a href="http://www.itechlaw-india.com/program.htm"&gt;&lt;span class="moderator"&gt;&lt;b&gt;Manjula Chawla&lt;/b&gt;, Phoenix Legal, New Delhi&lt;/span&gt;&lt;/a&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Successor Liability &lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Sadhana Kaul&lt;/b&gt;, GC, 3M, Bangalore&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Tax Planning for Software and Intellectual Property Transactions&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Roger Royse&lt;/b&gt;, Royse Law Firm, Palo Alto, California &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Post-M &amp;amp; A Integration of a Tech Company&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Sivaram Nair&lt;/b&gt;, General Counsel, Mphasis India, Bangalore &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00 - 14:00&lt;/td&gt;
&lt;td&gt;&lt;span class="black"&gt;&lt;b&gt;Buffet Lunch and Networking &lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:00 - 15:30&lt;/td&gt;
&lt;td&gt;&lt;span class="topic"&gt;&lt;b&gt;Licensing and Contracting&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;b&gt;Moderator:&lt;/b&gt; &lt;a href="http://www.itechlaw-india.com/program.htm"&gt;&lt;span class="moderator"&gt;Azmul Haque, Shook Lin &amp;amp; Bok LLP, Singapore &lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Software Licensing&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Stephane Lemarchand&lt;/b&gt;, DLA Piper, Paris, France&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Contract Termination &lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Richard Marke&lt;/b&gt;, BWB, London, UK&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;21st Century Sourcing - Latest Negotiation Trends and Alternative Contracting Models&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Nick Pantlin&lt;/b&gt;, Herbert Smith Freehills LLP, London, UK&lt;br /&gt;&lt;br /&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span class="topic"&gt;&lt;b&gt;Internet Gaming and Gambling&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;br /&gt;Moderator:&lt;/b&gt; &lt;a href="http://www.itechlaw-india.com/program.htm"&gt;&lt;span class="moderator"&gt;Ananth Padmanabhan, Advocate, Madras High Court&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Social Gaming  &lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Jenna Karadbil&lt;/b&gt;, Pillsbury Winthrop Shaw Pittman LLP, New York&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Indian Issues in Gaming and Gambling Regulations&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Talha Salaria&lt;/b&gt;, Lawyers at Work, Bangalore&lt;/a&gt;&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Amrut Joshi&lt;/b&gt;, Gamechanger Sports Ventures, Bangalore&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30 - 15:45&lt;/td&gt;
&lt;td&gt;&lt;span class="black"&gt;&lt;b&gt;Coffee / Tea / Networking Break&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:45 - 17:30&lt;/td&gt;
&lt;td&gt;&lt;span class="topic"&gt;&lt;b&gt;Privacy Issues relating to Employee Data&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Moderator:&lt;/b&gt; &lt;a href="http://www.itechlaw-india.com/program.htm"&gt;&lt;span class="moderator"&gt;Poorvi Chothani, LawQuest International, Mumbai&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Legal Barriers for BYOD Strategies - A Holistic Approach to Legal Compliance and Security&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Martin Wiechers&lt;/b&gt;, Deutsche Telekom, Germany&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;EU Employee Data Protection&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Roland Falder&lt;/b&gt;, Bird &amp;amp; Bird, Munich, Germany&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;TBD&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Frederique David&lt;/b&gt;, Co-founding partner, TLD Legal, Paris, France&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span class="topic"&gt;&lt;b&gt;Miscellaneous Hot Topics&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Moderator:&lt;/b&gt; &lt;a href="http://www.itechlaw-india.com/program.htm"&gt;&lt;span class="moderator"&gt;Vineet Subramani, Versus, Mumbai&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Creating an Open Source Policy&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Heather Meeker&lt;/b&gt;, Greenberg Traurig, Palo Alto, California&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Journalism using Social Media - Issues relating to Freedom of  Expression, Privacy and Interpretation of India's Information Technology  Act.&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Swati Sukumar&lt;/b&gt;, Advocate, New Delhi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Estate Planning for Digital Properties&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Wendy Goffe&lt;/b&gt;, Stoel Rives, Seattle, WA, USA&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:00 - 19:00&lt;/td&gt;
&lt;td&gt;&lt;span class="topic"&gt;&lt;b&gt;I-WIN Tea&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19:30 - 22:00&lt;/td&gt;
&lt;td&gt;&lt;span class="black"&gt;&lt;b&gt;Gala Dinner (Ticketed Event)&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;span class="spacing"&gt;Day 2, Friday, February 15, 2013&lt;br /&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;08:00 - 08:45     &lt;span class="topic"&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="topic"&gt;&lt;/span&gt;&lt;span class="topic"&gt;&lt;b&gt;Breakfast &lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09:00 - 09:30&lt;/td&gt;
&lt;td&gt;&lt;span class="topic"&gt;&lt;b&gt;Keynote Address&lt;/b&gt; (TBD)&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09:30 - 11:15&lt;/td&gt;
&lt;td&gt;&lt;span class="topic"&gt;&lt;b&gt;Privacy: Data Protection Issues Across the Globe&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Moderator:&lt;/b&gt; &lt;a href="http://www.itechlaw-india.com/program.htm"&gt;&lt;span class="moderator"&gt;Gabriela Kennedy, Hogan Lovells, Hong Kong&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Cross Border Transfers of Employee Data&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Dr. Wolfgang Büchner&lt;/b&gt;, Jones Day, Munich, Germany&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Data Protection Reform in the EU&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Kristian Foss&lt;/b&gt;, Gille advokater DA, Oslo, Norway&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Addressing the Criminal Aspects of Data Protection Violations&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Claire Bernier&lt;/b&gt;, Altanalaw, Paris, France&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:15 - 11:30&lt;/td&gt;
&lt;td&gt;&lt;span class="black"&gt;&lt;b&gt;Coffee / Tea / Networking Break&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30 - 13:00&lt;/td&gt;
&lt;td&gt;&lt;span class="topic"&gt;&lt;b&gt;E-Commerce &lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Moderator:&lt;/b&gt; &lt;a href="http://www.itechlaw-india.com/program.htm"&gt;&lt;span class="moderator"&gt;Raji Nagarkar,  Cisco, Bangalore&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Privacy Aspects of E-Commerce in Australia&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Philip Catania&lt;/b&gt;, Corrs Chambers Westgart, Melbourne, Australia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Retail Trading and E-Commerce in India&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Samuel Mani&lt;/b&gt;, MCM, Bangalore&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Commerce in the Social Media&lt;br /&gt; &lt;span class="orange"&gt;&lt;b&gt;TBD&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00 - 14:00&lt;/td&gt;
&lt;td&gt;&lt;span class="black"&gt;&lt;b&gt;Buffet Lunch and Networking &lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:00 - 15:30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span class="topic"&gt;&lt;b&gt;Outsourcing&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;br /&gt;Moderator:&lt;/b&gt; &lt;a href="http://www.itechlaw-india.com/program.htm"&gt;&lt;span class="moderator"&gt;Bradley Joslove, Franklin, Paris&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Current Issues - Customer Perspective &lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Mark Rasdale&lt;/b&gt;, A&amp;amp;L Goodbody, Dublin, Ireland&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Current Issues - Service Provider Perspective&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Kalpana Muthireddi&lt;/b&gt;, CSC India, Bangalore&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;2nd Generation Outsourcing Transactions&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Ulrich Baeumer&lt;/b&gt;, Osborne Clarke, Cologne, Germany&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30 - 15:45&lt;/td&gt;
&lt;td&gt;&lt;span class="black"&gt;&lt;b&gt;Coffee / Tea / Networking Break&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:45 - 17:00&lt;/td&gt;
&lt;td&gt;&lt;span class="topic"&gt;&lt;b&gt;Cloud 2.0 Issues&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Moderator:&lt;/b&gt; &lt;a href="http://www.itechlaw-india.com/program.htm"&gt;&lt;span class="moderator"&gt;Rajesh Narang, VP legal &amp;amp; CS, Mindtree, Bangalore&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Virtual Offices and Cloud Computing - Legal Issues &lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Genevieve Gill&lt;/b&gt;, GenLaw, Auckland, New Zealand&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Regulating the Cloud&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;S.P. Purwar&lt;/b&gt;, J. Sagar Associates, Gurgaon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Information Security in the Cloud&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Nagakumar Somasundaram&lt;/b&gt;, Amba Research, Bangalore&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:00 - 18:00&lt;/td&gt;
&lt;td&gt;&lt;span class="topic"&gt;&lt;b&gt;Censorship of Online Content&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;b&gt;Moderator:&lt;/b&gt; &lt;a href="http://www.itechlaw-india.com/program.htm"&gt;&lt;span class="moderator"&gt;Stephen Mathias, Kochhar &amp;amp; Co., Bangalore&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt; Panel Discussion with the following Panelist &lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Marc S Friedman&lt;/b&gt;, SNR Denton, New York, USA &lt;/a&gt;&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Priti Suri&lt;/b&gt;, PSA, New Delhi&lt;/a&gt;&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;Sunil Abraham&lt;/b&gt;, Executive Director, Centre for Internet and Society&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:00 - 18-30&lt;/td&gt;
&lt;td&gt;&lt;span class="topic"&gt;&lt;b&gt;Closing Remarks&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Raffle&lt;/b&gt;&lt;/li&gt;
&lt;li&gt; &lt;b&gt;Valedictory&lt;/b&gt;&lt;br /&gt; &lt;a class="orange" href="http://www.itechlaw-india.com/program.htm"&gt;&lt;b&gt;John Beardwood&lt;/b&gt;, Fasken Martineau DuMoulin LLP, Toronto&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:30 - 20:00&lt;/td&gt;
&lt;td&gt;Closing Reception&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div id="_mcePaste"&gt;&lt;/div&gt;
&lt;p&gt;See the speakers &lt;a class="external-link" href="http://www.itechlaw-india.com/speakers.htm"&gt;list here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/itech-law-india-ninth-intl-asian-conference'&gt;https://cis-india.org/news/itech-law-india-ninth-intl-asian-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-25T18:20:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/index-on-censorship-kirsty-hughes-january-22-2013-internet-freedom-in-india">
    <title>Internet Freedom in India – Open to Debate</title>
    <link>https://cis-india.org/news/index-on-censorship-kirsty-hughes-january-22-2013-internet-freedom-in-india</link>
    <description>
        &lt;b&gt;In the aftermath of an Index on Censorship debate in New Delhi, Kirsty Hughes says India’s web users are standing at a crossroads&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Kirsty Hughes was published in &lt;a class="external-link" href="http://www.indexoncensorship.org/2013/01/internet-freedom-in-india-open-to-debate/"&gt;Index on Censorship&lt;/a&gt;. CIS's research on censorship is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If debate is a sign of a positive environment for internet freedom,  then India scores highly. From debates in parliament, and panel  discussions (including Index’s own recent &lt;a href="http://www.indexoncensorship.org/2013/01/india-conference-index/"&gt;event&lt;/a&gt;)  to newspaper editorials, blogs and tweets on the rights and wrongs of  internet freedom, controls on the web, and India’s position in the  international debate, there is no shortage of voices and views.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India  has around 120 million web users — a large number but still only about  10 per cent of  the country’s population. As cheaper smart phones enable  millions more to access the net on their mobiles, India’s net savvy  population is set to soar in the next few years. But what sort of online  environment they will find is open to question — and to wide debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India  has some very broad laws that could apply to a wide range of online  speech, comment and criticism. These laws have been so far rather  randomly applied. But the cases that have arisen — from individuals  criticising politicians by email, Facebook or Twitter to some of the big  web companies such as Google and Facebook (both facing numerous  takedown requests and court cases in India) — show just why India needs  to look at limiting both the range of some of its net laws, and to stop  these laws criminalising a range of speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, there was widespread &lt;a href="http://uncut.indexoncensorship.org/2012/11/india-and-social-media-when-will-it-be-safe-for-the-average-citizen-to-critique-the-powerful/"&gt;outcry&lt;/a&gt; in  India when two women were arrested for complaining on Facebook about  the disruption caused by the funeral of Bal Thackeray, leader of the  right wing Hindu party, Shiv Sena. They were arrested under the infamous  section 66A of India’s IT Act (2008) which criminalises “grossly  offensive” and “menacing” messages sent by electronic means, but also  “false” messages sent to cheat, deceive, mislead or annoy, taking online  censorship beyond offline laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s telecom minister Kapil Sibal spoke out against the arrests. And as part of the fallout, &lt;a href="http://blogs.wsj.com/indiarealtime/2012/11/29/india-tightens-rules-on-hate-speech-law/"&gt;guidelines&lt;/a&gt; were  announced that in future any such charges could only be brought by  senior police. But how effective such a restriction might be was  challenged, with aTimes of India &lt;a href="http://articles.timesofindia.indiatimes.com/2012-12-03/edit-page/35548088_1_section-66a-air-india-employees-intimidation"&gt;editorial&lt;/a&gt; suggesting  “rampant political interference in law enforcement is itself a burning  issue…so to argue that senior police officers will always resist mob  pressure or political diktats isn’t persuasive.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other parts of  the IT Act (2008) are also causing a chilling atmosphere in India’s  cyber sphere — with new regulations introduced in 2011 obliging internet  service providers to take down content within 36 of a complaint  (whether an individual, organisation, government body or anyone else) or  face prosecution. The law covers a sweeping range of grounds for  complaint, including “grossly harmful”, “harassing, “blasphemous” and  more. It also is confused on liability – holding intermediaries large  and small responsible for content on websites and platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of India’s leading policy centres on digital issues, the &lt;a href="https://cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt;,   decided to test how this 36-hour takedown rule could result in  censorship of innocuous and legal content on web sites. They sent  complaints to four main search engines across a range of content — and  as a result got thousands of innocuous posts &lt;a href="http://www.indianexpress.com/news/practise-what-you-preach/941491"&gt;removed&lt;/a&gt;; a censor’s dream outcome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite a debate in parliament calling for repeal of the 2011 rules, for now they remain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some  observers suggest the Indian government is catch-up mode, not fully  understanding the reach or nature of social media or how to deal with  the international range and speed of the web today — something plenty of  other governments around the world are showing some confusion about.  Some think the lively debate on net freedom in India reflects the voice  and demands of the growing Indian middle class. But whether those  demands remain pro-freedom is yet to be seen as internet penetration  grows apace.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are some other encouraging signs. While many in  India are not keen at US dominance of key parts of internet regulation,  there was concern from business and civil society ahead of the  International Telecommunications Union summit in December 2012, when the  Indian government looked like it might advocate some form of top down  control of the web as an alternative. In the event, India, like the EU  and US, did not go along with Russia, China and others keen to include  net governance into the ITU’s remit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is going to be an  increasingly influential voice in global internet debates — with its  rapidly growing number of netizens and its increasing clout more widely  in a multipolar world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Its healthy and lively debate about digital  freedom stands as a beacon of hope in the face of some of its more  disturbing laws. But the laws will need to change, if India is to be a  country that stands for internet freedom.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/index-on-censorship-kirsty-hughes-january-22-2013-internet-freedom-in-india'&gt;https://cis-india.org/news/index-on-censorship-kirsty-hughes-january-22-2013-internet-freedom-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-25T10:45:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-democracy-richa-kaul-padte-jan-22-2013-cyber-security-surveillance-and-the-right-to-privacy">
    <title>Cyber security, surveillance and the right to privacy: country perspectives</title>
    <link>https://cis-india.org/news/internet-democracy-richa-kaul-padte-jan-22-2013-cyber-security-surveillance-and-the-right-to-privacy</link>
    <description>
        &lt;b&gt;This blog post is fourth in a series of eight blog posts to report on the “Third South Asian Meeting on the Internet and Freedom of Expression”  recently concluded in Dhaka, Bangladesh. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This post was published in the &lt;a class="external-link" href="http://www.internetdemocracy.in/2013/01/22/third-south-asian-meeting-on-the-internet-and-freedom-of-expression-blog-4/"&gt;Internet Democracy Project Website&lt;/a&gt; on January 22, 2013. &lt;i&gt;All the blog posts in this series are written by Richa Kaul Padte, the official rapporteur at the meeting. &lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;'The best way to protect people’s rights is to enable people to protect their rights themselves' – Chinmayi Arun&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img alt="Pranesh Prakash" class="wp-image-405 " height="100" src="http://www.internetdemocracy.in/wp-content/uploads/2013/01/IMG_2776-150x150.jpg" width="100" /&gt;&lt;br /&gt;Pranesh Prakash, CIS India&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Opening the session on cyber security, surveillance and privacy, moderator Pranesh Prakash from the &lt;a href="https://cis-india.org/" target="_blank"&gt;Centre for Internet and Society&lt;/a&gt; (India)  frames the debate by talking about how the principles raised by  discussions on security, privacy and surveillance are always in tension  with each other. ‘The boundaries that have been drawn in a pre-digital  era don’t apply online always [and] the classic model of  state-controlled surveillance is not as relevant [today].’&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Taking forward the discussion by setting both a global and national    framework around the issue, Assistant Professor at the Delhi-based &lt;a href="http://nludelhi.ac.in/" target="_blank"&gt;National Law University&lt;/a&gt; Chinmayi  Arun brings to light the ways in which cyber security is   consistently  tabled on several global agendas; however, with little to   no meaningful  parallel discussions around the right to privacy. She   also connects the  idea of surveillance to notions of censorship vis a   vis freedom  of expression, and poignantly states: ‘surveillance is a   lot more  insidious than censorship – [so much] more can take place   before people  realise it is happening.’ Prakash furthers this idea in   his  transition between country perspectives by highlighting the ways in    which surveillance measures are already established and heavily    pervasive, with both Prakash and Arun advocating greater transparency in    areas where these measures are in place. As Arun says, ‘it’s not true    that every instance of surveillance needs to be secret until it’s   done’,  and distinguishing between necessary surveillance measures (in   the case  of crime investigations, for example) and those that position   all  people as criminals who must be monitored, is key to taking the    discussion forward.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;img alt="Chinmayi Arun" class="wp-image-407 " height="108" src="http://www.internetdemocracy.in/wp-content/uploads/2013/01/IMG_2805-150x150.jpg" width="108" /&gt;&lt;/p&gt;
&lt;p style="text-align: left; "&gt;Chinmayi Arun, National Law University Delhi, India&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img alt="Mohammed Nazmuzzaman Bhuian" class="wp-image-406 " height="100" src="http://www.internetdemocracy.in/wp-content/uploads/2013/01/IMG_2784-150x150.jpg" width="100" /&gt;&lt;br /&gt;Mohammed Nazmuzzaman Bhuian, Dhaka University&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Mohammad Nazmuzzaman Bhuian, an Associate Professor from the &lt;a href="http://www.du.ac.bd//" target="_blank"&gt;University of Dhaka&lt;/a&gt;,   opens a Bangladeshi country perspective with the question, ‘how does a   cyber security act become a surveillance act?’ A cyber crime refers to   any crime that involves a computer or a network, and the crimes under   this can play out in two ways. The computer itself may be a target, or   it may be used to carry out a crime. It is when it is used to carry out  a  crime that the question of online surveillance arises&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Offering another perspective from Bangladesh, Head of the Centre for  IT  Security and Privacy and Assistant Professor, University of Asia   Pacific, Mohammad Shahriar Rahman, discusses the manipulation of   security and surveillance laws by the State in order to create greater   security for itself. He cites the ban of YouTube in the country in   response to a US-produced video ridiculing the Prophet Mohammed and the   attacks on bloggers who have advocated for free speech on the Internet,   including speech that may be anti-authoritarian or anti-religious.  These  examples echo Mariyath Mohamed’s perspectives on the interplay   between religion, politics and censorship from the previous session,   which clearly resound through many South Asian countries.&lt;/td&gt;
&lt;td&gt;&lt;img alt="Mohammad Shahriar Rahman, " class="wp-image-413 " height="100" src="http://www.internetdemocracy.in/wp-content/uploads/2013/01/IMG_2771-150x150.jpg" width="100" /&gt;&lt;br /&gt;Mohammad Shahriar Rahman, University of Asia Pacific, Bangladesh&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img alt="Kailash Prasad Neupane" class="wp-image-414 " height="100" src="http://www.internetdemocracy.in/wp-content/uploads/2013/01/IMG_2793-150x150.jpg" width="100" /&gt;&lt;br /&gt;
&lt;p class="wp-caption-text"&gt;Kailash Prasad Neupane, Nepal Telecommunications Authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Perspectives from Nepal, offered by speaker Kailash Prasad Neupane from the &lt;a href="http://www.nta.gov.np/" target="_blank"&gt;Nepal Telecommunications Authority&lt;/a&gt;,   highlight the acute similarities between the laws in different South   Asian countries, which all position the freedom of expression as   ‘subject to certain restrictions’, where the subjectivity of the clause   tends to be interpreted by a powerful and majority State against its   minority citizens, thus undermining both democracy and citizens’ rights.   As Rahman says, ‘if the government wants to be seen as democratic in   these times, they need to realise you can’t jail everyone who is   critical of the Prime Minister.’&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Speaking from the floor, Bishakha Datta, from Mumbai-based women’s media organisation &lt;a href="http://pointofview.org" target="_blank"&gt;Point of View&lt;/a&gt;,   expands on the speakers’ views by highlighting the ways in which,  given  the extensive measures of State security and surveillance,  societies  themselves become structured around a culture of surveillance  that  citizens in turn internalise and see as a necessary part of their   lives. She asks, ‘when we talk about the right to privacy, are we  saying  that we are willing to accept surveillance as long as our  privacy is  maintained, or are we opposing it on the grounds of  privacy?’ Echoing  Prakash’s idea that ‘the way in which security and  privacy are portrayed  as being at loggerheads is false’, Arun responds  to Datta by advocating  privacy as the starting point for  all discussions surrounding security.  In summary she states, ‘we must  underline our right to privacy,and that  right must always dominate. One  must always start with that right, and  then narrow the circumstances  in which, only when it is absolutely  necessary and to the extent  absolutely necessary, it may be violated.’  And it is through this  consistent demand for the right to privacy, and  the placing of citizens  and individuals (rather than the interests of  the State) at the heart  of these conversations, that we can see security  and privacy as  co-existing notions that work to ensure, rather than  suppress, freedom  of expression.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img alt="Bishakha Datta" class="wp-image-416 " height="105" src="http://www.internetdemocracy.in/wp-content/uploads/2013/01/IMG_2735-150x150.jpg" width="105" /&gt;&lt;br /&gt;Bishakha Datta, Point of View, India&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-democracy-richa-kaul-padte-jan-22-2013-cyber-security-surveillance-and-the-right-to-privacy'&gt;https://cis-india.org/news/internet-democracy-richa-kaul-padte-jan-22-2013-cyber-security-surveillance-and-the-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-23T12:10:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sunday-tribune-january-20-2013-sunil-abraham-tv-vs-social-media">
    <title>TV versus Social Media: The Rights and Wrongs</title>
    <link>https://cis-india.org/internet-governance/blog/sunday-tribune-january-20-2013-sunil-abraham-tv-vs-social-media</link>
    <description>
        &lt;b&gt;For most ordinary Netizens, everyday speech on social media has as much impact as graffiti in a toilet, and therefore employing the 'principle of equivalence' will result in overregulation of new media.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham's guest column was &lt;a class="external-link" href="http://www.tribuneindia.com/2013/20130120/edit.htm#2"&gt;published in the Tribune &lt;/a&gt;on January 20, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Many in traditional media, especially television, look at social media with a mixture of envy and trepidation. They have been at the receiving end of various unsavoury characters online and consequently support regulation of social media. A common question asked by television anchors is "shouldn't they be subject to the same regulation as us?" This is because they employ the 'principle of equivalence', according to which speech that is illegal on broadcast media should also be illegal on social media and vice versa. According to this principle, criticising a bandh on national TV or in a newspaper op-ed or on social media should not result in jail time and, conversely, publishing obscene content, in either new or old media, should render you a guest of the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that Section 66-A of the Information Technology Act, 2000, places more draconian and arguably unconstitutional limits on free speech when compared to the regulation of traditional and broadcast media, those in favour of civil liberties may be tempted to agree with the 'principle of equivalence' since that will mean a great improvement from status quo. However, we must remember that this compromise goes too far since potential for harm through social media is usually very limited when compared to traditional media, especially when it comes to hate speech, defamation and infringement of privacy. A Facebook update or 'like' or a tweet from an ordinary citizen usually passes completely unnoticed. On rare occasion, an expression on social media originating from an ordinary citizen goes viral and then the potential for harm increases dramatically. But since this is the fringe case we cannot design policy based on it. On the other hand, public persons (those occupying public office and those in public life), including television journalists, usually have tens and hundreds of thousands friends and followers on these social networks and, therefore, can more consistently cause harm through their speech online. For most ordinary Netizens, everyday speech on social media has as much impact as graffiti in a public or residential toilet and therefore employing the 'principle of equivalence' will result in overregulation of new media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ideally speech regulation should address the asymmetries in the global attention economy by constantly examining the potential for harm. This applies to both 'speech about' public persons and also 'speech by' them. Since 'speech about' public persons is necessary for transparent and accountable governance and public discourse, such speech must be regulated less than 'speech about' ordinary citizens. Let us understand this using two examples: One, a bunch of school kids referring to a classmate as an idiot on a social network is bullying, but citizens using the very same term to criticise a minister or television anchor must be permitted. Two, an ordinary citizen should be allowed to photograph or video-record the acts of a film or sports star at a public location and upload it to a social network, but this exception to the right of privacy based on public interest will not imply that the same ordinary citizen can publish photographs or videos of other ordinary citizens. Public scrutiny and criticism is part of the price to be paid for occupying public office or public life. If speech regulation is configured to prevent damage to the fragile egos of public persons, then it would have a chilling effect on many types of speech that are critical in a democracy and an open society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When it comes to 'speech by' those in public office or in public life - given the greater potential for harm - they should be held more liable for their actions online. For example, an ordinary citizen with less than 100 followers causes very limited harm to the reputation of a particular person through a defamatory tweet. However, if the very same tweet is retweeted by a television anchor with millions of followers, there can be more severe damage to that particular person's reputation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many in television also wish to put an end to anonymous and pseudonymous speech online. They would readily agree with Nandan Nilekani's vision of tagging all - visits to the cyber cafe, purchases of broadband connections and SIM cards and, therefore, all activities from social media accounts with the UID number. I have been following coverage of the Aadhaar project for the past three years. Often I see a 'senior official from the UIDAI' make a controversial point. If anonymous speech is critical to protect India's identity project then surely it is an important form of speech. But, unlike the print media, which more regularly uses anonymous sources for their stories, television doesn't see clearly the connection between anonymous speech and free media. This is because many of the trolls that harass them online often hide behind pseudonymous identities. Television forgets that anonymous speech is at the very foundation of our democracy, i.e., the electoral ballot.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sunday-tribune-january-20-2013-sunil-abraham-tv-vs-social-media'&gt;https://cis-india.org/internet-governance/blog/sunday-tribune-january-20-2013-sunil-abraham-tv-vs-social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-21T03:09:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indianexpress-nishant-shah-january-12-2013-web-of-sameness">
    <title>Web of Sameness</title>
    <link>https://cis-india.org/internet-governance/blog/indianexpress-nishant-shah-january-12-2013-web-of-sameness</link>
    <description>
        &lt;b&gt;The social Web has been an ominous space at the start of 2013. It has been awash with horror, pain and grief. The recent gang rape and death of a medical student in Delhi prevents one from being too optimistic about the year to come. My live feeds on various social networks are filled with rue and rage at the gruesome incident and the seeming depravity of our society. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Nishant Shah's column was &lt;a class="external-link" href="http://www.indianexpress.com/news/web-of-sameness/1058374/0"&gt;published in the Indian Express&lt;/a&gt; on January 18, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As I contemplate the event, I see that the Web has become a space for coping with pain and mitigating the horror of our lives. I feel comforted, when I go online, and see people grieving for a woman they never knew, and demanding better conditions for all. As I look at these resolves for change, battle cries demanding justice, and angry responses directed at imagined and imaginary perpetrators of these crimes, I realise that I have heard it all before, over and over again.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Not Again!” has been the refrain of the year. If life were a musical, this would have been the persistent chorus line of 2012. From fighting against censorship and violation of privacy by government and corporations to acts of hatred, or from ridiculing the map glitches on the iPhone to seeing the growing stronghold of authoritarian forces over the social Web, we have repeatedly rolled our digital sleeves, gnashed our fingers on the keyboards and shouted in political solidarity, “Not Again!”. While this show of protest, this robust expression of change holds a promise of how things will change for the better, it is also a refrain that has lost its bite. What does it mean, this ability to repeatedly say “Not Again!” only to experience these horrors in despairing cyclic patterns?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I want to see how the social Web and the new public spheres online might offer us outlets for emotions but not necessarily platforms for action. Some of the earliest critiques of the Web expressed the fear that given the extreme customisation of social networks, we might soon reside only in digital echo chambers. In the heavily informatised ages that we live in, it is not uncommon to set up specific groups that we belong to, identify friends that we talk with, mark people we follow, set up circles we share in, and configure filters that help us receive information that is tailor-made to suit our personalised preferences. Unfortunately, this quest for selective information sampling often means that we separate the digital spaces of life from the physical ones, without even realising it. We might be seamlessly navigating these two spaces, not really caring for the distinctions of “virtual reality” and “real life”, but in instances like these, it is easy to see how we shroud ourselves in echo chambers, never allowing voices to translate into the world of action.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You are sure to have been bombarded with tweets that have insightfully analysed the conditions of safety in our public spaces. And in all of this, like me, you must have been comforted thinking that there is still hope. But for every “like” you received on your status update, for every time your tweet got favourited or retweeted, for every time you found yourself agreeing with the social experts, you also separated yourself from the reality. Because the people who gave your opinions the attention, are actually people just like you. They are already on your side of things. Talking to them, exchanging ideas with them, calling for change side-by-side is like preaching to the choir, but it gives us a sense of having reached out. The voices in an echo chamber are not just repeated ad nauseum, but they are also not heard by anybody else on the outside, thus stifling the energy and passions that might have resulted in real change.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Web also offers an easy separation of us versus them. As coping mechanisms and as a way of distancing ourselves from these events, the Web offers us a clear disavowal of guilt. The young man, who shot those children in the school, was mentally unstable. The laws that allowed him to purchase guns are because of the politicians and the arms industry. The student, who got raped in a bus, is the responsibility of the ‘rape capital’ Delhi. If we were in charge, these things would not have happened this way. But now they have happened, and so we will be angry, we will be shocked, we will tweet “Not Again!” and then quickly shift our ever-expanding attention to the burgeoning space of information online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And then we will wait, for the next incident to happen — oh, not the same, but similar — and we will go through this process once again.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If I have to look into the future and hope that 2013 shall be the year of change, then I am hoping that the change will be from “Not Again” to a “Never Again”. We will have to learn how to use the energy, the power of the Web, the influence of the digital crowds on the digital commons, to produce a change that goes beyond the social network feeds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I hope that the social Web matures. We have to make sure that the promise of change that the digital social network offers, does not die as armchair clicktivism that witnesses but does nothing to change the act that affects us.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indianexpress-nishant-shah-january-12-2013-web-of-sameness'&gt;https://cis-india.org/internet-governance/blog/indianexpress-nishant-shah-january-12-2013-web-of-sameness&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-18T06:17:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/index-on-censorship-mahima-kaul-january-18-2013-is-freedom-of-expression-under-threat-in-the-digital-age">
    <title>Is freedom of expression under threat in the digital age?</title>
    <link>https://cis-india.org/news/index-on-censorship-mahima-kaul-january-18-2013-is-freedom-of-expression-under-threat-in-the-digital-age</link>
    <description>
        &lt;b&gt;This week Index held a high level panel debate in partnership with the Editors Guild of India and the India International Centre to discuss the question “Is freedom of expression under threat in the digital age?” Mahima Kaul reports&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This post by Mahima Kaul was &lt;a class="external-link" href="http://www.indexoncensorship.org/2013/01/india-conference-index/"&gt;published in Index on Censorship&lt;/a&gt; on January 18, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Index on Censorship, in partnership with The Editors Guild of India,  hosted a debate in New Delhi on Tuesday (15 January) asking, “Is freedom  of expression under threat in the digital age?”  Discussing the topic  were Ajit Balakrishnan (founder and Chief Executive of &lt;a href="http://rediff.com/" target="_blank"&gt;rediff.com&lt;/a&gt;),  Index on Censorship CEO Kirsty Hughes, Sunil Abraham (Executive  Director of the centre for Internet and Society), and Professor Timothy  Garton Ash, Director of the Free Speech Debate  project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil  Abraham  questioned the idea of technology specific “internet freedom”  that has been advocated by many not least the US Secretary of State  Hillary Clinton. He said there was for instance much greater freedom and  diversity on Indian TV than in the US.  He also argued that that this  freedom does not seem to extend to a right of access to knowledge, as  demonstrated by the charges brought against open access activist and  developer Aaron Swartz, who committed suicide earlier this month. Swartz  was &lt;a href="http://blog.indexoncensorship.org/2013/01/14/aaron-swartz-reddit/" target="_blank"&gt;facing charges&lt;/a&gt; for allegedly downloading 4.8 million academic articles from subscription-only digital library JSTOR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham  said one unintentional effect of censorship by governments is that it  teaches citizens how to protect themselves online. Finally, he  questioned the Indian government’s draconian laws and arbitrary actions &lt;a href="http://uncut.indexoncensorship.org/2012/08/india-internet-freedom/" target="_blank"&gt;in the digital realm&lt;/a&gt;,  wondering whether this is the authorities’ way of warning future  netizens about “acceptable online behaviour”, to condition the public  not to criticise the government and to create a chilling effect.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img class="wp-image-43807" height="316" src="http://www.indexoncensorship.org/wp-content/uploads/2013/01/indiaevent.jpg" title="indiaevent" width="602" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div id="themename"&gt;&lt;a href="http://www.indexoncensorship.org/theme/digital-media/" rel="tag"&gt;Digital&lt;/a&gt;&lt;/div&gt;
&lt;h1 class="post"&gt;&lt;a href="http://www.indexoncensorship.org/2013/01/india-conference-index/" rel="bookmark"&gt;Is freedom of expression under threat in the digital age?&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;&lt;span class="date"&gt;18 Jan 2013&lt;/span&gt;&lt;/p&gt;
&lt;div class="clearfix buttons-wrap" style="float:left; "&gt;&lt;br /&gt;
&lt;div&gt;
&lt;div class="fb_iframe_widget fb_edge_widget_with_comment fb-like"&gt;&lt;span&gt; &lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;b&gt;This week Index held a&lt;/b&gt;&lt;b&gt; high level panel&lt;/b&gt;&lt;b&gt; debate  in partnership with the Editors Guild of India and the India  International Centre to discuss the question “Is freedom of expression  under threat in the digital age?” Mahima Kaul reports &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span id="more-43750"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Index  on Censorship, in partnership with The Editors Guild of India, hosted a  debate in New Delhi on Tuesday (15 January) asking, “Is freedom of  expression under threat in the digital age?”  Discussing the topic were  Ajit Balakrishnan (founder and Chief Executive of &lt;a href="http://rediff.com/" target="_blank"&gt;rediff.com&lt;/a&gt;),  Index on Censorship CEO Kirsty Hughes, Sunil Abraham (Executive  Director of the centre for Internet and Society), and Professor Timothy  Garton Ash, Director of the Free Speech Debate  project.&lt;/p&gt;
&lt;p&gt;Sunil  Abraham  questioned the idea of technology specific “internet freedom”  that has been advocated by many not least the US Secretary of State  Hillary Clinton. He said there was for instance much greater freedom and  diversity on Indian TV than in the US.  He also argued that that this  freedom does not seem to extend to a right of access to knowledge, as  demonstrated by the charges brought against open access activist and  developer Aaron Swartz, who committed suicide earlier this month. Swartz  was &lt;a href="http://blog.indexoncensorship.org/2013/01/14/aaron-swartz-reddit/" target="_blank"&gt;facing charges&lt;/a&gt; for allegedly downloading 4.8 million academic articles from subscription-only digital library JSTOR.&lt;/p&gt;
&lt;p&gt;Abraham  said one unintentional effect of censorship by governments is that it  teaches citizens how to protect themselves online. Finally, he  questioned the Indian government’s draconian laws and arbitrary actions &lt;a href="http://uncut.indexoncensorship.org/2012/08/india-internet-freedom/" target="_blank"&gt;in the digital realm&lt;/a&gt;,  wondering whether this is the authorities’ way of warning future  netizens about “acceptable online behaviour”, to condition the public  not to criticise the government and to create a chilling effect.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.indexoncensorship.org/wp-content/uploads/2013/01/indiaevent.jpg"&gt;&lt;img class="wp-image-43807" height="316" src="http://www.indexoncensorship.org/wp-content/uploads/2013/01/indiaevent.jpg" title="indiaevent" width="602" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom  of expression is always under threat and in need of defending, argued  Timothy Garton Ash. However, he didn’t think the threat was particularly  high today  in the digital realm — rather the threats to privacy were  what were particularly concerning online. With 76.8 per cent of India’s  1.2 billion population connected by mobile phone, there is an  extraordinary opportunity for the prevalence of freedom of expression  brought about by new technologies. But he said there are also a lot of  challenges to free expression in India — and that “swing states” such as  Brazil and India will be very important in determining where the global  conversation goes on freedom of expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajit Balakrishnan,  founder of web portal Rediff.com, explained that many of the problems  that have occurred in the digital realm in India have to do with poor  drafting of legislation. He was particularly concerned about  intermediary liability and explained why and how intermediaries roles  needed protecting. He also explained that government officials have  genuine problems with phrasing, and that when it comes to the  application of these laws, understanding them and when they should be  applied will take another 25 years. He added that the country is  challenged by a legal system ill-equipped for coping with new  technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kirsty Hughes said that freedom of expression is a  universal right, meant to be applied across borders not just within  countries.  She said that while the digital domain allowed a big  expansion in freedom of expression there were risks we are heading  towards a more controlled net, a partially censored net, and a  fragmented net (for instance with Iran attempting to build its own  internet disconnected from the rest of the world). She said that some of  the negative reactions by government to social media in India were seen  to in the UK where there had been a trend towards criminalising  supposedly offensive comment — although the new interim guidelines on  social media prosecutions were a step in the right direction.  Hughes  emphasised three main concerns — state censorship, privatisation of  censorship and the role of big companies, and mass surveillance. She  pointed out that the British government had pushed for extensive  surveillance with the Communications Data Bill, but this has now been  shelved after a critical report from MPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ramanjit Singh Chima,  policy adviser for Google, said that  the question is not about absolute  freedom, but about what is appropriate and lawful. He emphasised that  in the US, judges had strongly defended free expression online as they  saw the digital world as a powerful space for free exprssion.  He  pointed out how effective social media tools, including Google’s own  products, have become in helping during emergency situations like  natural disasters and terrorist attacks. He also pointed out that the  internet is not only about free expression but business as well. The  internet contributes to 1.6 per cent of India’s GDP. Singh Chima said  positive judgements by US  and EU courts protect the users, adding that  regulation for the net should be appropriate for its engineering.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/index-on-censorship-mahima-kaul-january-18-2013-is-freedom-of-expression-under-threat-in-the-digital-age'&gt;https://cis-india.org/news/index-on-censorship-mahima-kaul-january-18-2013-is-freedom-of-expression-under-threat-in-the-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-02-03T10:50:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ians-news-is-freedomexpression-under-threat-in-digital-age">
    <title>Is freedom of expression under threat in digital age?</title>
    <link>https://cis-india.org/news/ians-news-is-freedomexpression-under-threat-in-digital-age</link>
    <description>
        &lt;b&gt;With social networking site Facebook boasting of 1 billion members globally and micro-blogging site Twitter claiming millions, opinion was divided on whether the freedom of expression was under threat in the digital age.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article was originally published by&lt;a class="external-link" href="http://in.news.yahoo.com/freedom-expression-under-threat-digital-age-035801134.html"&gt; Indo Asian News Service&lt;/a&gt; on January 16, 2013. It was also covered in &lt;a class="external-link" href="http://www.business-standard.com/generalnews/ians/news/is-freedomexpression-under-threat-in-digital-age/110168/"&gt;Business Standard&lt;/a&gt;, &lt;a class="external-link" href="http://www.vancouverdesi.com/news/is-freedom-of-expression-under-threat-in-digital-age/453154/"&gt;Vancouver Desi&lt;/a&gt;, &lt;a class="external-link" href="http://www.dnaindia.com/scitech/report_is-freedom-of-expression-under-threat-in-digital-age_1789344"&gt;DNA&lt;/a&gt;, and &lt;a class="external-link" href="http://tech2.in.com/news/general/is-freedom-of-expression-under-threat-in-digital-age/695272"&gt;Tech2&lt;/a&gt;. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p id="yui_3_5_1_19_1358402432026_232" style="text-align: justify; "&gt;"Censorship of content should be  the last resort as curbing a particular content online actually  amplifies its spread over the internet," said &lt;span class="cs4-ndcor yshortcuts" id="lw_1358308825_6"&gt;Sunil Abraham&lt;/span&gt; from Centre for Internet and Society.&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_224" style="text-align: justify; "&gt;He was speaking at a panel discussion organised by London based &lt;span class="cs4-ndcor yshortcuts" id="lw_1358308825_7"&gt;Index on Censorship&lt;/span&gt; and the &lt;span class="cs4-ndcor yshortcuts" id="lw_1358308825_1"&gt;Editors Guild of India&lt;/span&gt; on the issue at the &lt;span class="cs4-ndcor yshortcuts" id="lw_1358308825_3"&gt;India International Centre&lt;/span&gt; Tuesday evening.&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_276" style="text-align: justify; "&gt;"The government has refused to  amend Section 66(A) of the IT Act which is used to curb free speech on  the net," said Guild chief TN Ninan who moderated the debate. "The law  treats digital media differently than the print media," he said.&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_230" style="text-align: justify; "&gt;Director of Free Speech Debate, Oxford University, &lt;span class="cs4-ndcor yshortcuts" id="lw_1358308825_5"&gt;Timothy Garton Ash&lt;/span&gt; said, "There was no threat to the freedom of speech as internet was  actually an opportunity for spreading freedom of expression."&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_289" style="text-align: justify; "&gt;India with the large number of  net users could act as swing state between two extremes of China which  is trying to control the net and the US which champions free speech, he  said.&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_296" style="text-align: justify; "&gt;"The question is what are the legitimate limits of free speech rather than asking for unlimited speech," said Ash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajit Balakrishnan, CEO and founder of online portal rediff.com, said  "there was a sense of powerlessness among nation states as only local  laws applied to any such violations."&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_277" style="text-align: justify; "&gt;He said the internet was not so  democratic as it sounded as the actual numbers of users who posted  content on Facebook were just 8-9 million while the rest just watched.  The same was with Twitter with just 7-8 percent users actually posting  messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kirsty Hughes, CEO, Index on Censorship, said "freedom of speech was  universal" while noting a "worrying trend that increasingly governments  were moving to control the internet."&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_284" style="text-align: justify; "&gt;"The risks of such controls are that we could have a much more controlled, censored and fragmented internet," she said.&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_228" style="text-align: justify; "&gt;Ramanjit Singh Chima of Google India stressed on the need to have laws to protect &lt;span class="cs4-ndcor yshortcuts" id="lw_1358308825_4"&gt;internet freedom&lt;/span&gt; as such curbs affected livelihood of many users and contributed to local economies.&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_295" style="text-align: justify; "&gt;He said the internet allowed people to instantly collaborate and publish critical information during emergency situations.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ians-news-is-freedomexpression-under-threat-in-digital-age'&gt;https://cis-india.org/news/ians-news-is-freedomexpression-under-threat-in-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-17T06:16:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/bitfilm-and-bitcoin-a-discussion-by-aaron-koenig">
    <title>An Introduction to Bitfilm and Bitcoin – A Discussion by Aaron Koenig</title>
    <link>https://cis-india.org/internet-governance/events/bitfilm-and-bitcoin-a-discussion-by-aaron-koenig</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society, Bangalore invites you to a talk by Aaron Koenig, Managing Director, Bitfilm Networks of Hamburg, Germany on January 23, 2013, from 7.00 p.m. to 9.00 p.m.&lt;/b&gt;
        &lt;h3&gt;The Talk&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Aaron Koenig will give a talk on the creation and use of Bitcoin, a  new digital currency and payment system designed for the voting process  of the Bitfilm Festival for Digital Film. Since the year 2000, the  Bitfilm Festival has been showcasing films that use digital technology  in a creative and innovative way. It takes place on the Internet. However,  physical screenings of the films will be held in Bangalore and in  Hamburg. Each of the 59 nominated digital animations has its own Bitcoin  account, and users worldwide may vote by donating Bitcoins to the films  they like anonymously and without any transfer costs. The donated money  will be divided among the most popular films (the films with the most  votes/Bitcoins).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aaron will also present an animated short about Bitcoin which he has  produced with an animation team based in Bangalore. Of course, the  animators were paid in Bitcoin.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More info on the Bitfilm Festival: &lt;a class="moz-txt-link-freetext" href="http://www.bitfilm.com/festival"&gt;http://www.bitfilm.com/festival&lt;/a&gt;&lt;br /&gt;More info on Bitcoin: &lt;a class="moz-txt-link-freetext" href="http://blink.li/current-issue"&gt;http://blink.li/current-issue&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;VIDEO&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/mOCBjDM6ZiQ" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aaron Koenig&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Aaron is the Managing Director of Bitfilm. He has  run the organization since 1999. He is a vibrant member of art and film  societies and an Entrepreneur. Currently engaged with Bitfilm.com, Aaron  also publishes a political magazine called BLINK.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/bitfilm-and-bitcoin-a-discussion-by-aaron-koenig'&gt;https://cis-india.org/internet-governance/events/bitfilm-and-bitcoin-a-discussion-by-aaron-koenig&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-02-05T10:14:54Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights">
    <title>Draft International Principles on Communications Surveillance and Human Rights</title>
    <link>https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights</link>
    <description>
        &lt;b&gt;These principles were developed by Privacy International and the Electronic Frontier Foundation and seek to define an international standard for the surveillance of communications. The Centre for Internet and Society has been contributing feedback to the principles. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The principles are still in draft form. The most recent version can be accessed &lt;a class="external-link" href="http://necessaryandproportionate.net"&gt;here&lt;/a&gt;. &lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Our goal is that these principles will provide civil society groups, industry, and governments with a framework against which we can evaluate whether current or proposed surveillance laws and practices are consistent with human rights. We are concerned that governments are failing to develop legal frameworks to adhere to international human rights and adequately protect communications privacy, particularly in light of innovations in surveillance laws and techniques.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These principles are the outcome of a consultation with experts from civil society groups and industry across the world. It began with a meeting in Brussels in October 2012 to address shared concerns relating to the global expansion of government access to communications. Since the Brussels meeting we have conducted further consultations with international experts in communications surveillance law, policy and technology.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We are now launching a global consultation on these principles. Please send us comments and suggestions by January 3rd 2013, by emailing rights (at) eff (dot) org.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Preamble&lt;/b&gt;&lt;br /&gt;Privacy is a fundamental human right, and is central to the maintenance of democratic societies. It is essential to human dignity and it reinforces other rights, such as freedom of expression and association, and is recognised under international human rights law.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; Activities that infringe on the right to privacy, including the surveillance of personal communications by public authorities, can only be justified where they are necessary for a legitimate aim, strictly proportionate, and prescribed by law.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before public adoption of the Internet, well-established legal principles and logistical burdens inherent in monitoring communications generally limited access to personal communications by public authorities. In recent decades, those logistical barriers to mass surveillance have decreased significantly. The explosion of digital communications content and information about communications, or “communications metadata”, the falling cost of storing and mining large sets of data, and the commitment of personal content to third party service providers make surveillance possible at an unprecedented scale.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it is universally accepted that access to communications content must only occur in exceptional situations, the frequency with which public authorities are seeking access to information about an individual’s communications or use of electronic devices is rising dramatically—without adequate scrutiny. &lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; When accessed and analysed, communications metadata may create a profile of an individual's private life, including medical conditions, political and religious viewpoints, interactions and interests, disclosing even greater detail than would be discernible from the content of a communication alone. &lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Despite this, legislative and policy instruments often afford communications metadata a lower level of protection and do not place sufficient restrictions on how they can be subsequently used by agencies, including how they are data-mined, shared, and retained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is therefore necessary that governments, international organisations, civil society and private service providers articulate principles establishing the minimum necessary level of protection for digital communications and communications metadata (collectively "information") to match the goals articulated in international instruments on human rights— including a democratic society governed by the rule of law. The purpose of these principles is to:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Provide guidance for legislative changes and advancements related to communications and   communications metadata to ensure that pervasive use of modern  communications technology does not result in an erosion of privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Establish appropriate      safeguards to regulate access by public authorities (government agencies,      departments, intelligence services or law enforcement agencies) to      communications and communications metadata about an individual’s use of an      electronic service or communication media. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;We call on governments to establish stronger protections as required by their constitutions and human rights obligations, or as they recognize that technological changes or other factors require increased protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These principles focus primarily on rights to be asserted against state surveillance activities. We note that governments are required not only to respect human rights in their own conduct, but to protect and promote the human rights of individuals in general.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; Companies are required to follow data protection rules and yet are also compelled to respond to lawful requests. Like other initiatives,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; we hope to provide some clarity by providing the below principles on how state surveillance laws must protect human rights.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;The Principles&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legality&lt;/b&gt;: Any limitation to the right to privacy must be prescribed by law. Neither the Executive nor the Judiciary may adopt or implement a measure that interferes with the right to privacy without a previous act by the Legislature that results from a comprehensive and participatory process. Given the rate of technological change, laws enabling limitations on the right to privacy should be subject to periodic review by means of a participatory legislative or regulatory process&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legitimate Purpose&lt;/b&gt;: Laws should only allow access to communications or communications metadata by authorised public authorities for investigative purposes and in pursuit of a legitimate purpose, consistent with a free and democratic society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Necessity&lt;/b&gt;: Laws allowing access to communications or communications metadata by authorised public authorities should limit such access to that which is strictly and demonstrably necessary, in the sense that an overwhelmingly positive justification exists, and justifiable in a democratic society in order for the authority to pursue its legitimate purposes, and which the authority would otherwise be unable to pursue. The onus of establishing this justification, in judicial as well as in legislative processes, is on the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adequacy&lt;/b&gt;: Public authorities should restrain themselves from adopting or implementing any measure of intrusion allowing access to communications or communications metadata that is not appropriate for fulfillment of the legitimate purpose that justified establishing that measure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Competent Authority&lt;/b&gt;: Authorities capable of making determinations relating to communications or communications metadata must be competent and must act with independence and have adequate resources in exercising the functions assigned to them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Proportionality&lt;/b&gt;: Public authorities should only order the preservation and access to specifically identified, targeted communications or communications metadata on a case-by-case basis, under a specified legal basis. Competent authorities must ensure that all formal requirements are fulfilled and must determine the validity of each specific attempt to access or receive communications or communications metadata, and that each attempt is proportionate in relation to the specific purposes of the case at hand. Communications and communications metadata are inherently sensitive and their acquisition should be regarded as highly intrusive. As such, requests should &lt;b&gt;at a minimum&lt;/b&gt; establish a) that there is a very high degree of probability that a serious crime has been or will be committed; b) and that evidence of such a crime would be found by accessing the communications or communications metadata sought; c) other less invasive investigative techniques have been exhausted; and d) that a plan to ensure that the information collected will be only that information reasonably related to the crime and that any excess information collected will be promptly destroyed or returned. Neither the scope of information types, the number or type of persons whose information is sought, the amount of data sought, the retention of that data held by the authorities, nor the level of secrecy afforded to the request should go beyond what is demonstrably necessary to achieve a specific investigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Due process&lt;/b&gt;: Due process requires that governments must respect and guarantee an individual’s human rights, that any interference with such rights must be authorised in law, and that the lawful procedure that governs how the government can interfere with those rights is properly enumerated and available to the general public.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;While criminal investigations and other considerations of public security and safety may warrant limited access to information by public authorities, the granting of such access must be subject to guarantees of procedural fairness. Every request for access should be subject to prior authorisation by a competent authority, except when there is imminent risk of danger to human life. &lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;User notification&lt;/b&gt;: Notwithstanding the notification and transparency requirements that governments should bear, service providers should notify a user that a public authority has requested his or her communications or communications metadata with enough time and information about the request so that a user may challenge the request. In specific cases where the public authority wishes to delay the notification of the affected user or in an emergency situation where sufficient time may not be reasonable, the authority should be obliged to demonstrate that such notification would jeopardize the course of investigation to the competent judicial authority reviewing the request. In such cases, it is the responsibility of the public authority to notify the individual affected and the service provider as soon as the risk is lifted or after the conclusion of the investigation, whichever is sooner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transparency about use of government surveillance&lt;/b&gt;: The access capabilities of public authorities and the process for access should be prescribed by law and should be transparent to the public. The government and service providers should provide the maximum possible transparency about the access by public authorities without imperiling ongoing investigations, and with enough information so that individuals have sufficient knowledge to fully comprehend the scope and nature of the law, and when relevant, challenge it. Service providers must also publish the procedure they apply to deal with data requests from public authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Oversight&lt;/b&gt;: An independent oversight mechanism should be established to ensure transparency of lawful access requests. This mechanism should have the authority to access information about public authorities' actions, including, where appropriate, access to secret or classified information, to assess whether public authorities are making legitimate use of their lawful capabilities, and to publish regular reports and data relevant to lawful access. This is in addition to any oversight already provided through another branch of government such as parliament or a judicial authority. This mechanism must provide – at a minimum – aggregate information on the number of requests, the number of requests that were rejected, and a specification of the number of requests per service provider and per type of crime. &lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Integrity of communications and systems&lt;/b&gt;: It is the responsibility of service providers to transmit and store communications and communications metadata securely and to a degree that is minimally necessary for operation. It is essential that new communications technologies incorporate security and privacy in the design phases. In order, in part, to ensure the integrity of the service providers’ systems, and in recognition of the fact that compromising security for government purposes almost always compromises security more generally, governments shall not compel service providers to build surveillance or monitoring capability into their systems. Nor shall governments require that these systems be designed to collect or retain particular information purely for law enforcement or surveillance purposes. Moreover, &lt;i&gt;a priori&lt;/i&gt; data retention or collection should never be required of service providers and orders for communications and communications metadata preservation must be decided on a case-by-case basis. Finally, present capabilities should be subject to audit by an independent public oversight body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards for international cooperation&lt;/b&gt;: In response to changes in the flows of information and the technologies and services that are now used to communicate, governments may have to work across borders to fight crime. Mutual legal assistance treaties (MLATs) should ensure that, where the laws of more than one state could apply to communications and communications metadata, the higher/highest of the available standards should be applied to the data. Mutual legal assistance processes and how they are used should also be clearly documented and open to the public. The processes should distinguish between when law enforcement agencies can collaborate for purposes of intelligence as opposed to sharing actual evidence. Moreover, governments cannot use international cooperation as a means to surveil people in ways that would be unlawful under their own laws. States must verify that the data collected or supplied, and the mode of analysis under MLAT, is in fact limited to what is permitted. In the absence of an MLAT, service providers should not respond to requests of the government of a particular country requesting information of users if the requests do not include the same safeguards as providers would require from domestic authorities, and the safeguards do not match these principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards against illegitimate access&lt;/b&gt;: To protect individuals against unwarranted attempts to access communications and communications metadata, governments should ensure that those authorities and organisations who initiate, or are complicit in, unnecessary, disproportionate or extra-legal interception or access are subject to sufficient and significant dissuasive penalties, including protection and rewards for whistleblowers, and that individuals affected by such activities are able to access avenues for redress. Any information obtained in a manner that is inconsistent with these principles is inadmissible as evidence in any proceeding, as is any evidence derivative of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cost of surveillance&lt;/b&gt;: The financial cost of providing access to user data should be borne by the public authority undertaking the investigation. Financial constraints place an institutional check on the overuse of orders, but the payments should not exceed the service provider’s actual costs for reviewing and responding to orders, as such would provide a perverse financial incentive in opposition to user’s rights.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Signatories&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Organisations&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Article 19 (International)&lt;/li&gt;
&lt;li&gt;Bits of Freedom (Netherlands)&lt;/li&gt;
&lt;li&gt;Center for Internet &amp;amp;      Society India (CIS India)&lt;/li&gt;
&lt;li&gt;Derechos Digitales (Chile)&lt;/li&gt;
&lt;li&gt;Electronic Frontier Foundation      (International)&lt;/li&gt;
&lt;li&gt;Privacy International      (International)&lt;/li&gt;
&lt;li&gt;Samuelson-Glushko Canadian      Internet Policy and Public Interest Clinic (Canada)&lt;/li&gt;
&lt;li&gt;Statewatch (UK)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Individuals&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Renata Avila, human rights      lawyer (Guatemala)&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Footnotes&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]For more information about the      background to these principles and the process undertaken, see      https://www.privacyinternational.org/blog/towards-international-principles-on-communications-surveillance&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]Universal Declaration of Human      Rights Article 12, United Nations Convention on Migrant Workers Article      14, UN Convention of the Protection of the Child Article 16, International      Covenant on Civil and Political Rights, International Covenant on Civil      and Political Rights Article 17; regional conventions including Article 10      of the African Charter on the Rights and Welfare of the Child, Article 11      of the American Convention on Human Rights, Article 4 of the African Union      Principles on Freedom of Expression, Article 5 of the American Declaration      of the Rights and Duties of Man, Article 21 of the Arab Charter on Human      Rights, and Article 8 of the European Convention for the Protection of      Human Rights and Fundamental Freedoms; Johannesburg Principles on National      Security, Free Expression and Access to Information, Camden Principles on      Freedom of Expression and Equality.&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]Martin Scheinin, “Report of the      Special Rapporteur on the promotion and protection of human rights and      fundamental freedoms while countering terrorism,” p11, available at &lt;a href="http://www2.ohchr.org/english/issues/terrorism/rapporteur/docs/A_HRC_13_37_AEV.pdf"&gt;http://www2.ohchr.org/english/issues/terrorism/rapporteur/docs/A_HRC_13_37_AEV.pdf&lt;/a&gt;.      See also General Comments No. 27, Adopted by The Human Rights Committee      Under Article 40, Paragraph 4, Of The International Covenant On Civil And      Political Rights, CCPR/C/21/Rev.1/Add.9, November 2, 1999, available at &lt;a href="http://www.unhchr.ch/tbs/doc.nsf/0/6c76e1b8ee1710e380256824005a10a9?Opendocument"&gt;http://www.unhchr.ch/tbs/doc.nsf/0/6c76e1b8ee1710e380256824005a10a9?Opendocument&lt;/a&gt;.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]Communications metadata may      include information about our identities (subscriber information, device      information), interests, including medical conditions, political and      religious viewpoints (websites visited, books and other materials read,      watched or listened to, searches conducted, resources used), interactions      (origins and destinations of communications, people interacted with,      friends, family, acquaintances), location (places and times, proximities      to others); in sum, logs of nearly every action in modern life, our mental      states, interests, intentions, and our innermost thoughts.&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]For example, in the United      Kingdom alone, there are now approximately 500,000 requests for      communications metadata every year, currently under a self-authorising      regime for law enforcement agencies, who are able to authorise their own      requests for access to information held by service providers. Meanwhile,      data provided by Google’s Transparency reports shows that requests for      user data from the U.S. alone rose from 8888 in 2010 to 12,271 in 2011.&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]See as examples, a review of      Sandy Petland’s work, ‘Reality Mining’, in MIT’s Technology Review, 2008,      available at &lt;a href="http://www2.technologyreview.com/article/409598/tr10-reality-mining/"&gt;http://www2.technologyreview.com/article/409598/tr10-reality-mining/&lt;/a&gt; and also see Alberto Escudero-Pascual and Gus Hosein, ‘Questioning lawful      access to traffic data’, Communications of the ACM, Volume 47 Issue 3,      March 2004, pages 77 - 82.&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]Report of the UN Special      Rapporteur on the promotion and protection of the right to freedom of      opinion and expression, Frank La Rue, May 16 2011, available at &lt;a href="http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/a.hrc.17.27_en.pdf"&gt;http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/a.hrc.17.27_en.pdf&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]The Global Network Initiative      establishes standards to help the ICT sector protect the privacy and free      expression of their users. See &lt;a href="http://www.globalnetworkinitiative.org/"&gt;http://www.globalnetworkinitiative.org/&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]As defined by international and      regional conventions mentioned above.&lt;br /&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]Where judicial review is waived      in such emergency cases, a warrant must be retroactively sought within 24      hours.&lt;br /&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]One example of such a report is      the US Wiretap report, published by the US Court service. Unfortunately      this applies only to interception of communications, and not to access to      communications metadata. See &lt;a href="http://www.uscourts.gov/Statistics/WiretapReports/WiretapReport2011.aspx"&gt;http://www.uscourts.gov/Statistics/WiretapReports/WiretapReport2011.aspx&lt;/a&gt;.      The UK Interception of Communications Commissioner publishes a report that      includes some aggregate data but it is does not provide sufficient data to      scrutinise the types of requests, the extent of each access request, the      purpose of the requests, and the scrutiny applied to them. See &lt;a href="http://www.intelligencecommissioners.com/sections.asp?sectionID=2&amp;amp;type=top"&gt;http://www.intelligencecommissioners.com/sections.asp?sectionID=2&amp;amp;type=top&lt;/a&gt;.&lt;/p&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights'&gt;https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:55:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin">
    <title>Statement of Solidarity on Freedom of Expression and Safety of Internet Users in Bangladesh</title>
    <link>https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin</link>
    <description>
        &lt;b&gt;This is a statement on the violent attack on blogger Asif Mohiuddin by the participants to the Third South Asian Meeting on the Internet and Freedom of Expression that took place in Dhaka, Bangladesh, on January 14–15, 2013.&lt;/b&gt;
        &lt;p&gt;Bangladeshi blogger Asif Mohiuddin was brutally attacked in a stabbing last evening.  His condition is currently said to be critical.  Violent attacks on mediapersons have led to at least four deaths in the past year.  This trend is now extending to those writing online.&lt;/p&gt;
&lt;p&gt;It is the duty of societies at large to ensure that principles we universally consider sacrosanct, such as the right to life and liberty and of freedom of expression are in fact ideas, and of the government to actively protect the rights guaranteed under the Constitution of Bangladesh and to ensure they are not just words on paper.&lt;/p&gt;
&lt;p&gt;Article 39 of the Constitution of Bangladesh—and Article 19 of the Universal Declaration of Human Rights—guarantee both the freedom of thought and conscience, as well as the right of every citizen of freedom of speech and expression, and freedom of the press.&lt;/p&gt;
&lt;p&gt;Article 32 of the Constitution of Bangladesh—and Article 3 of the Universal Declaration of Human Rights—guarantee that no person shall be deprived of life or personal liberty except by law.&lt;/p&gt;
&lt;p&gt;The attack on Asif Mohiuddin constitutes a violation these fundamental principle by criminals, and we request the government to act decisively to show it will not tolerate such violations.&lt;/p&gt;
&lt;p&gt;Reporters Without Borders note that "the ability of those in the media to work freely has deteriorated alarmingly in Bangladesh, which is now ranked 129th of 179 countries in the 2011-2012 World Press Freedom Index".&lt;/p&gt;
&lt;p&gt;In general, the situation of those working as non-professional 'citizen journalists' is even worse.  In a 2010 report, the UN Special Rapporteur wrote:
&lt;blockquote&gt;"Citizen journalists are by nature more isolated, they are more vulnerable to attack than professional journalists. However, citizen journalists enjoy less protection than their counterparts in traditional media, as they do not have the support of media organizations and networks, in particular the organizational resources, including lawyers and financial resources, which can help shield them from harassment."&lt;/blockquote&gt;
This reality of greater vulnerability is equally applicable to those who do not self-identify as 'citizen journalists', but use social media to express unpopular opinions.&lt;/p&gt;
&lt;p&gt;Keeping this in mind, we call upon the government on Bangladesh to carry out swift investigations into this particular incident and bring the perpetrators to justice, and to grant greater legal support to citizen journalists and ensure better protections for all those who use the Internet as a means of expression.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin'&gt;https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Safety</dc:subject>
    
    
        <dc:subject>Statement</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-15T11:51:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/7th-india-digital-summit-2013">
    <title>7th India Digital Summit 2013</title>
    <link>https://cis-india.org/news/7th-india-digital-summit-2013</link>
    <description>
        &lt;b&gt;This summitt organised by Internet and Mobile Association of India is being held in New Delhi from January 16 to 17, 2013 at the Lalit Hotel&lt;/b&gt;
        &lt;p&gt;Sunil Abraham is the moderator for Plenary Session 3: Discussion on Social Media – Freedom, Moderation or Regulation.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/7th-india-digital-summit-2013" class="internal-link"&gt;Click to download the agenda&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Theme of the Summit&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;951 million mobile users with 448 million mobile data subscribers; 137 million Internet users and rural Internet growing 7x in the last two years make India one of the top three digital markets in the world. One of only top two at this scale with free market economy democratic polity; and the only one where there is still headroom for growth. The time to invest in Digital India is now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By 2020 riding on a government investment of 4 billion USD [roughly 10 billion USD on PPP terms] Internet users is expected to be 600 million; and mobile would possibly penetrate 100% of rural India creating the largest free economy digital market in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Digital Opportunity now and in the next 5 years in India is explosive. And the need to create a Digital Economy on scale is a developmental necessity. The opportunity, however, lies in addressing the current challenges of the ability to provide: low cost connectivity, universal access, usable content, secure networks, affordable devices and enabling policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Building on the theme of “Creating the World’s Largest Free Market Digital Economy” the 7th India Digital Summit will focus on five tracks: Infrastructure, Regulatory Frameworks, Services &amp;amp; Content, Entrepreneurship / Innovation and Business 3.0.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Webcast of the Event&lt;/h2&gt;
&lt;h3&gt;Day 1, January 16, 2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Inaugural&lt;/a&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Welcome Address&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Mr. Hitesh Oberoi, Chairman, IAMAI &amp;amp; Co-Founder and Chief Executive Officer, Info Edge India Limited&lt;br /&gt;&lt;b&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Address by Chief Guest&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Mr. Montek Singh Ahluwalia, Deputy Chairman, Planning Commission, Government of India&lt;b&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Keynote Address by&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Mr. R Chandrashekhar, Chairman (TC) &amp;amp; Secretary , Department of Telecommunications, Ministry of Communications and IT&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Plenary Session 1: 1000 digital startups a year: How to make it happen?&lt;/a&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Session Chair and presenter: &lt;br /&gt;Mr. Satyan Gajwani, CEO, Times Internet&lt;/p&gt;
&lt;p&gt;Presenter ‐&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Mahesh Murthy, Founder, Pinstorm  and Co-founder, Seedfund&lt;/li&gt;
&lt;li&gt;Mr. Manish Vij, Founder, VUN Network&lt;/li&gt;
&lt;li&gt;Mr. Pranay Gupta, Joint CEO, Centre for Innovation&lt;/li&gt;
&lt;li&gt;Mr. Rajesh Sawhney, Founder, GSF Accelerator &amp;amp; Superangels&lt;/li&gt;
&lt;li&gt;Mr. Mukund Mohan, CEO in Residence, Microsoft Startup Accelerator&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;Business track&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Topic: Importance of Creativity to Digital Advertising&lt;/a&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Session Chair and presenter Neville Taraporewalla, Sr. Director - Emerging Markets| India, Malaysia,Thailand &amp;amp; Korea, Advertising and Online, Microsoft&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Discussion:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;M Mohit Hira, Senior Vice President &amp;amp; Regional Business Leader-Airtel, JWT&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Vineet Gupta, Managing Partner, 22feet Communications&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Arun Sharma, VP Marketing - Head Media &amp;amp; Rural, Bharti Airtel&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Vikas Tandon, Managing Director, Indigo Consulting Aditya Save, Head-Media &amp;amp; Digital Marketing, Marico &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Audience Interaction &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;“Lowering the barrier for mobile web - for both operators and users”&lt;/a&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Keynote Address by Mr. Peter Panait Løjmand, Senior Vice President, Opera Software&lt;br /&gt;Interaction with Mr. Sanjay Goyal, Chief Executive Officer, ACL Wireless &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Plenary Session 2: Cloud – Leveraging the Cloud for Business Efficiency &lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Session Chair and presenter&lt;br /&gt;Mr. Manoj Chugh, Regional President, Global Accounts-APJ, EMC&lt;/p&gt;
&lt;p&gt;Presenters:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Manav Khanna, Sr. Consultant –Enterprise Security, SafeNet Inc.&lt;/li&gt;
&lt;li&gt;Mr. Jasminder Singh Gulati, Co-founder and Chief Executive Officer, Nowfloats&lt;/li&gt;
&lt;li&gt;Mr. Ravi Shankar, Chief Executive Officer, Nevales Networks&lt;/li&gt;
&lt;li&gt;Mr. Mandar Kulkarni, Vice President, Solution Engg &amp;amp; Pvt. Cloud Practice, Netmagic&lt;/li&gt;
&lt;li&gt;Mr. Balaka Baruah Aggarwal, Business Evangelist, Amazon Web Services&lt;/li&gt;
&lt;li&gt;Mr. Jaydeep Nargund, Head Services-India, AKAMAI&lt;/li&gt;
&lt;li&gt;Mr. Vivek Ravindran, Director-Core &amp;amp; App Platform, Microsoft&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Email Marketing Roundtable with juvlon&lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Email Marketing in the Year of the Snake - 2013&lt;br /&gt;Presented by Mr. Naresh Bhagtani, CEO, Juvlon, Niche Software &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;“Unique Identity and Its Positive Externalities for Inclusiveness"&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Keynote Address by Mr. Nandan Nilekani , Chairman, UAIDI&lt;br /&gt;Interaction with Mr. Shubhashis Gangopadhyay, IDF research&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;“Bharat Broadband [NOFN]: Going extra mile with public investment”&lt;/a&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Keynote Address by Mr. Sam Pitroda&lt;br /&gt;Interaction with Mr. Lalitesh Katragadda, Country Head-India Products, Google&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Plenary Session 3: Discussion on Social media – Freedom, moderation or regulation&lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Session Chair  &amp;amp; Moderator:&lt;br /&gt;Sunil Abraham, Executive Director, The Centre for Internet and Society &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Discussion with:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Rajesh Kalra, Chief Editor, Times Internet&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; R Sukumar, Managing Editor, Mint&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Shivam Vij, Kafila.org &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Track 3: The last mile of customer connect: m-Engagement from OPENHOUSE&lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Presenter:&lt;br /&gt;Mr. Ankit Singh, Senior Manager, Enterprise mobility, IMI Mobile&lt;br /&gt;Mr. Ramesh Raman , Senior manager, Marketing, IMI Mobile&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Day 2, January 17, 2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;“Future of Apps and their Monetization”&lt;/a&gt; &lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Keynote Address by Mr. Ilja Laurs, Founder and Chairman, GetJar&lt;br /&gt;Moderated by : Mr. Kiruba Shankar&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;“Communications challenges in the age of Social media” &lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Keynote address by &lt;br /&gt;Dr Shashi Tharoor, Minister of State for Human Resource Development, Government of India&lt;br /&gt;Interaction with audience Moderated by Mr. R Jagannanthan&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;Track 4:&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;CXOs Closed door discussion on Local Language – The Game Changer&lt;/a&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Session moderated by&lt;br /&gt;Gyan Gupta, Chief Operating Officer, Dainik Bhaskar;&lt;br /&gt;&lt;br /&gt;Address by speakers&lt;br /&gt;Mr. Arvind Pani, Co-founder, Reverie language Technologies&lt;br /&gt;Mr. Ajay Gallwale, Founder, Maayboli&lt;br /&gt;Mr. C Mathew, DGM (Marketing), Malayala Manorama Mr. Manoj Gupta, Head, VAS &amp;amp; Applications, Micromax&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Audience Interaction&lt;br /&gt;Summarising by Moderator &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Start-Up Unconference&lt;/a&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;A peer to peer, informal sharing of views between new entrepreneurs and start-ups of our industry &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Chaired by:&lt;br /&gt;Mr. Sanjiv Bikhchandani, Founder and Executive Vice Chairman, Infoedge&lt;/p&gt;
&lt;p&gt;Moderator by:&lt;br /&gt;Kiruba Shankar&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Plenary Session 5: Discussion on e-Commerce 2.0– Emerging trend &lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Session Chair  &amp;amp; Moderator:&lt;br /&gt;Mr. Avnish Bajaj, Managing Director, Matrix Partners&lt;/p&gt;
&lt;p&gt;In Discussion with:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Alok Mittal, Managing Director, Canaan Patners India&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Sachin Bansal, Co-founder &amp;amp; CEO, Flipkart&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Sundeep Malhotra, Chief Executive Officer, HomeShop18&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Muralikrishnan B, Country Manager, eBay&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Mukesh Bansal, Founder, Myntra.com&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Ankur Warikoo, Chief Executive Officer, Groupon India&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Plenary Session 6: Marketers Viewpoint – Online and Mobile Marketing &lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Session Chair:&lt;br /&gt;Mr. Upen Rai, Chief Operating Officer and Executive Director, AntFarm&lt;/p&gt;
&lt;p&gt;Presenters:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Sanjay Tripathy, EVP - Head Marketing, Products and Direct Channels -  HDFC Life&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Manish Kalra, Chief Marketing Officer, Makemytrip&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Vinay Bhatia, Customer Care Associate and VP - Marketing and Loyalty, Shoppers Stop&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Samil Malhotra, Vice President Sales and Marketing. The Lalit Suri Hospitality Group&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Manu Kumar Jain, Co-founder &amp;amp; Managing Director, Jabong&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Plenary Session 7: Interaction: Attracting and retaining talent for Digital Industry &lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Thought sharing by Industry Leaders &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Interaction between Industry leaders and Students&lt;br /&gt;Industry Leaders:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Sanjiv Bikhchandani, Founder and Executive Vice Chairman, Infoedge&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Deep Kalra, Founder and Chief Executive Officer, Makemytrip&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Anupam Mittal, Founder and Chief Executive Officer, People Group&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Dinesh Agarwal, Founder and Chief Executive Officer, IndiaMART&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Neville Taraporewalla, Sr. Director , Emerging Markets-India, Malaysia, Thailand &amp;amp; Korea, Advertising and Online, Microsoft&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Student Entrepreneurs:&lt;br /&gt;FMS&lt;br /&gt;IMT Ghaziabad&lt;br /&gt;IITD Moderated by Kiruba Shankar&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;India Digital Award Ceremony&lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/7th-india-digital-summit-2013'&gt;https://cis-india.org/news/7th-india-digital-summit-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-02-13T06:32:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/third-south-asian-meeting-on-internet-and-freedom-of-expression">
    <title>Third South Asian Meeting on the Internet and Freedom of Expression</title>
    <link>https://cis-india.org/news/third-south-asian-meeting-on-internet-and-freedom-of-expression</link>
    <description>
        &lt;b&gt;Internet Democracy Project, Voices for Interactive Choice &amp; Empowerment and Global Partners &amp; Associates are organizing this event in Dhaka on January 14 - 15, 2013.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Pranesh Prakash is moderating the session on "Understanding cyber security and surveillance in South Asia today". Chinmayi Arun is speaking in this panel.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Third South Asian Meeting on the Internet and Freedom of Expression seeks to address the question of how freedom of expression on the Internet is best protected by taking as its starting point two of the biggest challenges for freedom of expression online in South Asia today: hate speech online on the one hand, and cyber security and surveillance on the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting seeks to investigate how these challenges affect freedom of expression on the Internet as well as how they can be addressed most effectively while protecting free speech online. It will also touch briefly on the important question of what kind of Internet governance processes are most likely to ensure the desired outcomes materialise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A very short history of the South Asian Meeting on the Internet and Freedom of Expression&lt;/b&gt;&lt;br /&gt;The first South Asian Meeting on the Internet and Freedom of Expression took place in March 2011 in Delhi, and mapped the many challenges for free speech online in our region, as an input into the report on the Internet and freedom of expression of UN Special Rapporteur on Freedom of Expression, Mr. Frank La Rue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second South Asian Meeting, in Kathmandu in November 2011, assessed the extent to which policy and regulation in the South Asian countries complied with the recommendations Mr. La Rue made in his report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This third meeting will now build on these earlier efforts by bringing together experts from civil society, business, the research community and other stakeholder groups from across the region to discuss two of the biggest shared challenges for freedom of expression online in South Asia today in detail: the rising visibility of hate speech on the one hand, and the impact of discourses regarding cyber security and surveillance on the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Why focus on hate speech and security/surveillance now?&lt;/b&gt;&lt;br /&gt;Since UN Special Rapporteur on Freedom of Expression, Mr. Frank La Rue, presented his report on the Internet and freedom of expression to the UN Human Rights Council in June 2011, the complexity of this topic has received growing recognition. However, not all trends that La Rue had pointed out as directly affecting freedom of expression online – from access to the Internet to cyber attacks – are equally important in the South Asian region. Detailed analysis in several South Asian countries has shown that, though Internet penetration rates remain fairly low, most countries do possess, for example, the political will crucial to improve these figures. The two trends that seem to be of greatest concern in our region are that of the fight against hate speech, and the impact on freedom of expression of cyber security and surveillance measures. The latter is foregrounded for a variety of reasons ranging from the safety of individual users to national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Incidentally, across the region, as in many parts of the world, hate speech and cyber security have also been among the most important reasons governments have quoted to justify greater government control over the Internet. At the national level, this has at times manifested itself through the approval and implementation of legislation that has far-reaching consequences for freedom of speech online, without consulting many of the stakeholders who are affected at any point in time. At the global level, we see a growing number of proposals by governments that would effectively expand their collective powers to regulate the Internet, though with varying levels of involvement of other stakeholders envisioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet while governments' intentions when imposing censorship or approving surveillance measures may at times be in doubt, it is difficult to deny that the Internet has facilitated a new proliferation of hate speech, as well as that it has thrown up new security challenges that couldn't even be imagined before.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is therefore our contention that the challenges of hate speech online and of ensuring cyber security in our region are real, and need to be addressed head-on if we are to strengthen and protect the right to freedom of expression online. For this reason, the meeting seeks to investigate both the precise nature of these challenges and what Internet governance mechanisms we need to evolve to ensure that they can be addressed most effectively whilst upholding and strengthening the right to freedom of expression. If we are to take the challenges the threats of hate speech and cyber security policy embody seriously yet also aim to uphold and strengthen the right to freedom of expression online, then what are the solutions we require? And who will need to be responsible for implementing them?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participants&lt;/b&gt;&lt;br /&gt;Taking into account the many parallels in the shape problems of hate speech and cyber security and surveillance take across the South Asian region as a result of shared cultures and historical legacies alike, participants will be invited from Bangladesh, India, Nepal, Pakistan, Afghanistan, Sri Lanka and the Maldives. Moreover, as solutions to these problems will invariably require collaboration among various stakeholders in the Internet governance field in order to be effective, participants will be drawn from a wide variety of stakeholder groups, including civil society, business, government, academia and the media from across the region. In this way, the meeting hopes tofacilitate a South Asia wide, multistakeholder dialogue, to learn, discuss and evolve more detailed thinking on these topics for one and a half days. The meeting will come to an end with a public event at the end of the second day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting will use a variety of formats, including key note presentations, panel discussions, case studies and small group conversations.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Agenda&lt;/h2&gt;
&lt;h3&gt;January 14, 2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.00-09.45&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Welcome and introductions to participants&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;09.45-10.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Introduction to the meeting: the challenge that hate speech online and cyber security/surveillance pose to freedom of expression on the Internet – Dixie Hawtin&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Intro: Internet governance and human rights issues in general&lt;/li&gt;
&lt;li&gt;Why is this event focussed on hate speech and surveillance?&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.15-10.45&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea/coffee break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.45-12.15&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;The challenge of hate speech on the Internet in South Asia Strengthening the right to freedom of expression to curtail hate speech (Anja Kovacs)&lt;/p&gt;
&lt;p&gt;Three country perspectives, from the Maldives (Mariyath Mohamed), Pakistan (tbc), and Bangladesh (Salim Khan)&lt;br /&gt;Moderator: Bishakha Datta&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.15-13:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13.30-14.00&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Keynote: Thinking about a rights-based approach to cyber security and surveillance as it relates to speech – KS Park&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14.00-15.30&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Understanding cyber security and surveillance in South Asia today With Three country perspectives from Bangladesh (Mohammad Rahman), Nepal (Kailash Prasad Neupane) and India (Chinmayi Arun).&lt;br /&gt;Moderator: Pranesh Prakash&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;15.30-16:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Tea/coffee break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16.00-17.30&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Legal and ethical questions and challenges when addressing cyber security and surveillance: two case studies – Rohan Samarajiva&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;January 15, 2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.00-9.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Introduction to day 2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.15-9.45&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Cybersecurity, surveillance and hate speech online – key issues that need to be addressed in governance in order to protect Internet freedom of expession. This session will discuss particular issues that have relevance for both cyber security debates and hate speech issues in greater depth. Four topics that will be addressed are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The question of anonimity (KS Park)&lt;/li&gt;
&lt;li&gt;Cross-border cooperation and other jurisdictional issues in context of cloud computing and crossborder data flows and storage (Aditya Rao)&lt;/li&gt;
&lt;li&gt;Domain Names and registration (Babu Ram Aryal)&lt;/li&gt;
&lt;li&gt;Intermediaries as law enforcers (Suman Pradhan)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Moderator: Shahzad Ahmed&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.45-11.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea/coffee break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.00-13.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;What kind of solutions could a rights-based approach throw up to the challenges raised so far in the meeting?&lt;/p&gt;
&lt;p&gt;Open discussion in groups and plenary, following key note speaker, Bulbul Monjurul Ahsan&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13.00-13.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Summing up and thank you&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13.30-15.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;15:00 – 16:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Meeting participants move to venue for public meeting, tea/coffee break and arrival of wider public&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16.00-18.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PUBLIC EVENT: The Internet and freedom of expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Confirmed speakers include: Abu Taher, Info Commissioner; Iftekharuzzaman, Executive Director, Transparency International Bangladesh; Sarah Hossain, Lawyer and Honorary Executive Director, BLAST; Shaheen Anam, Executive Director, Manusher Jonno Foundation; Monjurul Ahsan Bulbul, eminent journalist and CEO, Boishakhi Television; and Rohan Samarajiva, Chair and CEO, LIRNEasia.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;List of Participants&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Aditya Rao, Senior Associate, Amarchand Mangaldas, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ahmed Swapan, Executive Director, VOICE, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Amrit Pant, General Secretary, Computer Association of Nepal &amp;amp; President, Information Technology Development Society, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Anja Kovacs, Project Director, Internet Democracy Project, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Babu Ram Aryal, President, Internet Society, Nepal Chapter, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Binaya Guragain, Coordinator of Programs, Equal Access, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Bishakha Datta, Wikimedia Foundation Board Member &amp;amp; Co-founder, Point of View, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Chinmayi Arun, Assistant Professor, National Law University Delhi &amp;amp; Fellow, Centre for Internet and Society, India. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Dixie Hawtin, Project Manager for Digital Communications and Freedom of Expression, Global Partners and Associates, UK&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Farhana Rumki, Associate Programme Coordinator, VOICE, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kailash Prasad Neupane, Chief of Legal Section, Spokesperson, Secretary and Registrar, Nepal Telecommunications Authority, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Khairuzzaman Kamal, Founder Secretary General of Bangladesh Manobadhikar Sangbadik Forum &amp;amp; Senior Reporter at Bangladesh Sangbad Sangstha, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Khawaza Mainuddin, Executive Editor, ICE Business Times Magazine, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;K S Park, Executive Director, the PSPD Public Interest Law Center &amp;amp; Professor, Korea University Law School, South Korea&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mariyath Mohamed, Journalist, Minivan News, Maldives&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mohammad Nazmuzzaman Bhuian Emon, Associate Professor, Department of Law, University of Dhaka, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mohammad Shahriar Rahman, Assistant Professor, Department of Computer Science and Engineering, University of Asia Pacific &amp;amp; Head, Center for IT Security and Privacy, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Moiyen Zalal Chowdhury, Community Manager, Somewhere.In &amp;amp; Norad Fellow,Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Monjurul Ahsan Bulbul, Chair, International Press Institute &amp;amp; Editor-in-chief and CEO,Boiskakhi TV, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Pranesh Prakash, Policy Director, Centre for Internet and Society, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Prasanth Sunganathan, Counsel, Software Freedom Law Centre, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rezaur Rahman Lenin, Research Fellow, VOICE, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Richa Kaul Padte, Writer, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rohan Samarajiva, Chair and CEO, LIRNEasia, Sri Lanka&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Saleem Samad, Columnist &amp;amp; Correspondent at Reporters without Borders, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Salimullah Khan, Writer and Professor, Stamford University, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sana Saleem, Director, Bolo Bhi, Pakistan&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Santosh Sigdel, Advocate and Vice President, Internet Society, Nepal Chapter, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shahzad Ahmed, Country Director, Bytes for All, Pakistan&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shehla Rashid Shora, Project Officer, Internet Democracy Project, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shehnaz Banu, Media and Communication Officer, Alliance for Social Dialogue, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Soheil Zafar, Editor, Unmochan Blog &amp;amp; TV Producer and Researcher, 71 Television, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Suman Lal Pradhan, CEO, Websurfer, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sushma Luthra, Event Coordinator, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Syeda Fedous Jana, Managing Director and Co-Founder of Somewhere.In, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Tahmina Rahman, Director Bangladesh and South Asia Region, Article 19, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Vasana Wickremasena, Executive Director, Centre for Integrated Communication Research and Advocacy, Sri Lanka&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/third-south-asian-meeting-on-internet-and-freedom-of-expression'&gt;https://cis-india.org/news/third-south-asian-meeting-on-internet-and-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-17T07:16:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cyber-regulations-advisory-committee-no-civil-society">
    <title>No Civil Society Members in the Cyber Regulations Advisory Committee</title>
    <link>https://cis-india.org/internet-governance/blog/cyber-regulations-advisory-committee-no-civil-society</link>
    <description>
        &lt;b&gt;The Government of India has taken our advice and reconstituted the Cyber Regulations Advisory Commitee. But there is no representation of Internet users, citizens, and consumers — only government and industry interests.&lt;/b&gt;
        &lt;p&gt;In multiple op-eds (&lt;a href="http://cis-india.org/internet-governance/blog/india-broken-internet-law-multistakeholderism"&gt;Indian Express&lt;/a&gt; and &lt;a href="http://cis-india.org/internet-governance/blog/livemint-opinion-november-28-2012-pranesh-prakash-fixing-indias-anarchic-it-act"&gt;Mint&lt;/a&gt;), I have pointed out the need for the government to reconstitute the &amp;quot;Cyber Regulations Advisory Committee&amp;quot; (CRAC) under section 88 of the Information Technology Act. That it be reconstituted along the model of the Brazilian Internet Steering Committee was also &lt;a href="http://docs.google.com/viewer?url=www.iigc.in%2Fhtm%2F2.pdf"&gt;part of the suggestions that CIS sent to the government&lt;/a&gt; after a &lt;a href="http://www.thehindu.com/todays-paper/tp-national/tp-newdelhi/government-to-hold-talks-with-stakeholders-on-internet-censorship/article3860393.ece"&gt;meeting FICCI had convened along with the government on September 4, 2012&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Section 88 requires that people &amp;quot;representing the interests principally affected&amp;quot; by Internet policy or &amp;quot;having special knowledge of the subject matter&amp;quot; be present in this advisory body. The main function of the CRAC is to advise the the Central Government &amp;quot;either generally as regards any rules or for any other purpose connected with this Act&amp;quot;.&lt;/p&gt;
&lt;p&gt;Despite this important function, the CRAC had &amp;mdash; till November 2012 &amp;mdash; only ever met twice, &lt;a href="http://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac"&gt;both times in 2001&lt;/a&gt;. The response to an RTI informed us that the body had never provided any advice to the government.&lt;/p&gt;
&lt;h2 id="government-not-serious"&gt;Government Not Serious&lt;/h2&gt;
&lt;p&gt;The increasing pressure on the government for botching up Internet regulations has led it to reconstitute the CRAC. However, the list of members of the committee shows that the government is not serious about this committee representing &amp;quot;the interests primarily affected&amp;quot; by Internet policy.&lt;/p&gt;
&lt;p&gt;Importantly, this goes against the express wish of the Shri Kapil Sibal, the Union Minister for Communications and IT, who has repeatedly stated that he believes that Internet-related policymaking should be an inclusive process. Most recently, at the 2012 Internet Governance Forum he stated that we need systems that are:&lt;/p&gt;
&lt;blockquote&gt;
&amp;quot;collaborative, consultative, inclusive and consensual, for dealing with all public policies involving the Internet&amp;quot;
&lt;/blockquote&gt;

&lt;p&gt;Interestingly, despite the Hon'ble Minster verbally inviting civil society organizations (on November 23, 2012) for a meeting of the CRAC that happened on November 25, 2012, the Department of Electronics and Information Technology refused to send us invitations for the meeting.  This hints at a disconnect between the political and bureaucratic wings of the government, at least at some levels.&lt;/p&gt;
&lt;p&gt;Interestingly, this isn't the first time this has been pointed out. Na. Vijayashankar was levelling similar criticisms against the CRAC &lt;a href="http://www.naavi.org/cl_editorial/edit_18aug00_1.html"&gt;way back in August 2000&lt;/a&gt; when the original CRAC was constituted.&lt;/p&gt;
&lt;h2 id="breakdown-by-stakeholder-groupings"&gt;Breakdown by Stakeholder Groupings&lt;/h2&gt;
&lt;p&gt;While there is no one universal division of stakeholders in Internet governance, but four goups are widely recognized: governments (national and intergovernmental), industry, technical community, and civil society. Using that division, we get:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Government - 15 out of 22 members&lt;/li&gt;
&lt;li&gt;Industry bodies - 6 out of 22 members&lt;/li&gt;
&lt;li&gt;Technical community / Academia - 1 out of 22 members&lt;/li&gt;
&lt;li&gt;Civil society - 0 out of 22 members.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="list-of-members-of-cyber-regulatory-advisory-committee"&gt;List of Members of Cyber Regulatory Advisory Committee&lt;/h2&gt;
&lt;p&gt;The official notification &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/gazzate(1).pdf"&gt;(G.S.R. 827(E)) is available on the DEIT website&lt;/a&gt; and came into force on November 16, 2012.&lt;/p&gt;
&lt;p&gt;(Note: Names with &lt;del&gt;strikethroughs&lt;/del&gt; have been removed from the CRAC since 2000, and those with &lt;i&gt;emphasis&lt;/i&gt; have been added.)&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Minister, Ministry of Communication and Information Technology - Chairman&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Minister of State, Ministry of Communications and Information Technology - Member&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Secretary, Ministry of Communication and Information Technology, Department of Electronics and Information Technology - Member&lt;/li&gt;
&lt;li&gt;Secretary, Department of Telecommunications - Member &lt;br /&gt;&lt;del&gt;Finance Secretary - Member&lt;/del&gt;&lt;/li&gt;
&lt;li&gt;Secretary, Legislative Department - Member&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Secretary, Department of Legal Affairs - Member&lt;/i&gt; &lt;br /&gt;&lt;del&gt;Shri T.K. Vishwanathan, Presently Member Secretary, Law Commission - Member&lt;/del&gt;&lt;/li&gt;
&lt;li&gt;Secretary, Ministry of Commerce - Member&lt;/li&gt;
&lt;li&gt;Secretary, Ministry of Home Affairs - Member&lt;/li&gt;
&lt;li&gt;Secretary, Ministry of Defence - Member&lt;/li&gt;
&lt;li&gt;Deputy Governor, Reserve Bank of India - Member&lt;/li&gt;
&lt;li&gt;Information Technology Secretary from the states by rotation - Member&lt;/li&gt;
&lt;li&gt;Director, IIT by rotation from the IITs - Member&lt;/li&gt;
&lt;li&gt;Director General of Police from the States by rotation - Member&lt;/li&gt;
&lt;li&gt;President, NASSCOM - Member&lt;/li&gt;
&lt;li&gt;President, Internet Service Provider Association - Member&lt;/li&gt;
&lt;li&gt;Director, Central Bureau of Investigation - Member&lt;/li&gt;
&lt;li&gt;Controller of Certifying Authority - Member&lt;/li&gt;
&lt;li&gt;Representative of CII - Member&lt;/li&gt;
&lt;li&gt;Representative of FICCI - Member&lt;/li&gt;
&lt;li&gt;Representative of ASSOCHAM - Member&lt;/li&gt;
&lt;li&gt;&lt;i&gt;President, Computer Society of India - Member&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Group Coordinator, Department of Electronic and Information Technology - Member Secretary&lt;/li&gt;
&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cyber-regulations-advisory-committee-no-civil-society'&gt;https://cis-india.org/internet-governance/blog/cyber-regulations-advisory-committee-no-civil-society&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    

   <dc:date>2013-01-09T17:56:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
