<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2326 to 2340.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/privacy-in-social-networked-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/statement-of-civil-society-members-and-groups-at-best-bits-pre-igf-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/steady-steps-foss-and-mdgs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/live-mint-politics-surabhi-agarwal-nov-6-2012-information-security-policy-on-govt-agenda"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/who-is-following-me"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/solutions-for-cross-border-data-flows"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/best-bits"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/cloudy-jurisdiction-addressing-the-thirst-for-cloud-data-in-domestic-legeal-processes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindustan-times-india-news-new-delhi-nov-3-2012-power-to-youth"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/privatisation-of-censorship"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/privacy-in-social-networked-world">
    <title>Privacy in the Social Networked World</title>
    <link>https://cis-india.org/news/privacy-in-social-networked-world</link>
    <description>
        &lt;b&gt;The Asian Privacy Scholars Network 2nd International Conference was hosted by the Centre for Business Information Ethics, Meiji University, Tokyo, Japan, on behalf of the Asian Privacy Scholars Network, November 19 - 20, 2012. Elonnai Hickok is speaking at the event.&lt;/b&gt;
        &lt;h3&gt;Monday, November 19, 2012&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;09:00—09:30&lt;/td&gt;
&lt;td&gt;Registration and Welcome&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09:30—10:30&lt;/td&gt;
&lt;td&gt;Keynote Speaker: Pirongrong Ramasoota&lt;br /&gt;(Chulalongkorn University, Thailand)&lt;br /&gt;The Future of Privacy in the World's Largest Democracy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30—11:00&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00—12:30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Whon-Il Park (Kyung Hee University, Korea)&lt;br /&gt;How to Protect, or Utilize, Personal Visual Information in Korea&lt;/p&gt;
&lt;p&gt;Sinta Dewi Rosadi (University Padjadjaran, Indonesia)&lt;br /&gt;Constitutional Privacy Protection: The Indonesian Experience&lt;/p&gt;
&lt;p&gt;Takato Natsui (Meiji University, Japan) Censorship, Burying and Mental Health in Business Office&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:30—14:00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:00—15:00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lilian Edwards (Strathclyde University, UK)&lt;br /&gt;International Implications of the Proposed Revision of the EU Data Protection Directive&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Graham Greenleaf (UNSW, Australia and Meiji University, Japan)&lt;br /&gt;100 Data Privacy Laws: Their Significance and Origins&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:00—15:30&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30—16:30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Kiyoshi Murata/Yohko Orito (Meiji University/Ehime University, Japan)&lt;br /&gt;Japanese Youngsters' Social Attitude towards Privacy&lt;/p&gt;
&lt;p&gt;Ryoko Asai/Iordanis Kavathatzopoulos&lt;br /&gt;(Meiji University, Japan/Uppsala University, Sweden) The Paradoxical Nature of Privacy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:00—20:00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Conference Banquet (Salon San, 23rd Floor, Liberty Tower, Meiji University)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Tuesday, November 20, 2012&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;09:00—09:45&lt;/td&gt;
&lt;td&gt;Keynote Speaker: Roger Clarke&lt;br /&gt;(Xamax Consultancy, UNSW and ANU, Australia)&lt;br /&gt;Consumer-Oriented Social Media as Market Opportunity&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09:45—10:00&lt;/td&gt;
&lt;td&gt;Video Presentation from David Lyon (Queens University, Canada)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00—10:30&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30—12:00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Daniel Trottier (Uppsala University, Sweden) Social Networking Sites and Crowd-sourced Surveillance&lt;/p&gt;
&lt;p&gt;Colin Bennett (University of Victoria, Canada) Social Networking and Privacy Jurisdiction&lt;/p&gt;
&lt;p&gt;Andrew Adams (Meiji University, Japan) Facebook Code: SNS Platform Affordances and Privacy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:00—13:00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00—14:30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Elonnai Hickok (Centre for Internet and Society, India) Transparency and Privacy in India&lt;/p&gt;
&lt;p&gt;Fumio Shimpo (Keio University, Japan) Current Developments in Japanese Data Protection Policy&lt;/p&gt;
&lt;p&gt;Panel: Chen, Greenleaf, Hickok, Shimpo&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30—15:00&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:00—17:00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Ian Brown (University of Oxford, UK) Data Protection and Social Networking Services&lt;/p&gt;
&lt;p&gt;Shirley Williams (University of Reading, UK) Do Computer Science Scholars Consider Issues of Privacy when Studying Large Twitter Data Sets?&lt;/p&gt;
&lt;p&gt;Final Panel: Adams, Bennett, Brown, Clarke, Williams&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Organisers&lt;/h3&gt;
&lt;p&gt;Prof Andrew A. Adams, Meiji University, Tokyo, Japan&lt;br /&gt;Prof Kiyoshi Murata, Meiji University, Tokyo, Japan&lt;br /&gt;Prof Graham Greenleaf, UNSW, Sydney, Australia&lt;br /&gt;(JSPS Visiting Fellow, Meiji University Sep-Dec 2012)&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.kisc.meiji.ac.jp/~ethicj/APSN2/program.pdf"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/privacy-in-social-networked-world'&gt;https://cis-india.org/news/privacy-in-social-networked-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-04T16:19:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/statement-of-civil-society-members-and-groups-at-best-bits-pre-igf-meeting">
    <title>Statement of Civil Society Members and Groups Participating in the "Best Bits" pre-IGF meeting at Baku in 2012</title>
    <link>https://cis-india.org/internet-governance/blog/statement-of-civil-society-members-and-groups-at-best-bits-pre-igf-meeting</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society was one of the signatories for this submission made to the ITU on November 16, 2012.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bestbits.igf-online.net/statement/"&gt;Read the statement of civil society members and groups participating in the “Best Bits” pre-IGF meeting at Baku in 2012&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;We thank the Secretariat of the ITU for making the opportunity to submit our views.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nevertheless, the process of the revision of the International Telecommunication Regulations (ITRs) has not been sufficiently inclusive and transparent, despite some recent efforts to facilitate public participation.  Fundamental to the framing of public policy must be the pursuit of the public interest and fundamental human rights, and we urge Member States to uphold and protect these values.&lt;br /&gt; &lt;br /&gt; We as civil society organizations wish to engage with the World Conference on International Telecommunication (WCIT) process in this spirit. Member States, in most cases, have not held open, broad-based, public consultations in the lead up to the WCIT, nor have they indicated such a process for the WCIT itself.&lt;br /&gt; &lt;br /&gt; In order to address this deficiency, and at a minimum, we would urge:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; All Member States and regional groups to make their proposals available to the public in sufficient time to allow for meaningfulpublic participation;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;All delegates to support proposals to open sessions of the WCIT meeting to the public;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ITU Secretariat to increase transparency of the WCIT including live webcast with the video, audio, and text transcripts, as far as possible, to enable participation by all, including persons with disabilities;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ITU Secretariat, Member States, and regional groups to make as much documentation publicly available as possible on the ITU's website, so that civil society can provide substantive input on proposals as they are made available;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Member States to encourage and facilitate civil society participation in their national delegations;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ITU to create spaces during the WCIT for civil society to express their views, as was done during the WSIS process.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Given the uncertainty about the nature of final proposals that will be presented, we urge delegates that the following criteria be applied to any proposed revisions of the ITRs.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;That any proposed revisions are confined to the traditional scope of the ITRs, where international regulation is required around technical issues is limited to telecommunications networks and interoperability standards.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There should be no revisions to the ITRs that involve regulation of the Internet Protocol and the layers above.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There should be no revisions that could have a negative impact on affordable access to the Internet or the public's rights to privacy and freedom of expression.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;More generally we call upon the ITU to promote principles of net neutrality, open standards, affordable access and universal service, and effective competition.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Signatories:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Access (Global)&lt;/li&gt;
&lt;li&gt;Association for Progressive Communications (Global)&lt;/li&gt;
&lt;li&gt;Bangladesh NGOs Network for Radio and Communication (Bangladesh)&lt;/li&gt;
&lt;li&gt;Bytes for All (Pakistan)&lt;/li&gt;
&lt;li&gt;Center for Democracy and Technology (United States of America)&lt;/li&gt;
&lt;li&gt;Centre for Community Informatics Research (Canada)&lt;/li&gt;
&lt;li&gt;Centre for Internet and Society (India)&lt;/li&gt;
&lt;li&gt;Collaboration on International ICT Policy for East and Southern Africa (Eastern and Southern Africa)&lt;/li&gt;
&lt;li&gt;Consumer Council of Fiji (Fiji)&lt;/li&gt;
&lt;li&gt;Consumers International (Global)&lt;/li&gt;
&lt;li&gt;Dynamic Coalition on Internet Rights and Principles (IRP) (Global)&lt;/li&gt;
&lt;li&gt;Electronic Frontier Finland (Finland)&lt;/li&gt;
&lt;li&gt;Imagining the Internet Center (United States of America)&lt;/li&gt;
&lt;li&gt;Instituto Nupef (Brazil)&lt;/li&gt;
&lt;li&gt;Internet Democracy Project (India)&lt;/li&gt;
&lt;li&gt;Internet Research Project (Pakistan)&lt;/li&gt;
&lt;li&gt;Global Partners and Associates (United Kingdom)&lt;/li&gt;
&lt;li&gt;GobernanzadeInternet.co (Colombia)&lt;/li&gt;
&lt;li&gt;ICT Watch Indonesia (Indonesia)&lt;/li&gt;
&lt;li&gt;Instituto Brasileiro de Defesa do Consumidor / Brazilian Institute for&lt;/li&gt;
&lt;li&gt;Consumer Defense (Brazil)&lt;/li&gt;
&lt;li&gt;InternetNZ (New Zealand)&lt;/li&gt;
&lt;li&gt;IT for Change (India)&lt;/li&gt;
&lt;li&gt;Media Education Center (Armenia)&lt;/li&gt;
&lt;li&gt;ONG Derechos Digitales (Chile)&lt;/li&gt;
&lt;li&gt;OpenMedia (Canada)&lt;/li&gt;
&lt;li&gt;Public Knowledge (United States of America)&lt;/li&gt;
&lt;li&gt;Thai Netizen Network (Thailand)&lt;/li&gt;
&lt;li&gt;Ginger Paque (Venezuala)&lt;/li&gt;
&lt;li&gt;Nnenna Nwakanma (Côte d'Ivoire)&lt;/li&gt;
&lt;li&gt;Sonigitu Ekpe (Nigeria)&lt;/li&gt;
&lt;li&gt;Wolfgang Kleinwächter (Denmark)&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/statement-of-civil-society-members-and-groups-at-best-bits-pre-igf-meeting'&gt;https://cis-india.org/internet-governance/blog/statement-of-civil-society-members-and-groups-at-best-bits-pre-igf-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-07T08:06:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google">
    <title> India second in requesting user info: Google</title>
    <link>https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google</link>
    <description>
        &lt;b&gt;India is at second place after the US in terms of the government requests for user data from Google&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Karthik Subramanian's article was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/internet/india-second-in-requesting-user-info-google/article4095170.ece"&gt;published in the Hindu on November 14, 2012&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The  Indian government made the second largest demand for Web user  information — next only to the United States government — to Google in  the six-month period from January to June this year, according to the  ‘Transparency Report’ published by the Web services major on Tuesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During  the six-month period, the Indian government — both by way of court  orders and by way of requests from police— requested Google to disclose  user information 2,319 times over 3,467 users/accounts. Google fully or  partially complied with the request to the tune of 64 per cent. Only the  U.S. government requested more data during the period — 7,969 requests  over 16,281 accounts, compliance rate: 90 per cent.&lt;br /&gt;&lt;br /&gt;It is the  sixth time Google has brought out the bi-annual report detailing its  interactions with the world government agencies. It details two  categories of interactions : requests to divulge user data; and requests  to pull down content. India ranked seventh in the list of requests to  pull down data; experts say that the possible reason could be the  government not having such powers under the Constitution.&lt;br /&gt;&lt;br /&gt;Pranesh  Prakash, policy director with Bangalore-based Centre for Internet and  Society, said that the Google report was a damning indictment of the  country’s government exceeding its constitutional bounds by demanding  removal of material for defamation, government criticism, etc., without a  valid court order. "There are no laws in our country that allows the  executive or the police to remove such material without a court order."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Substantial spike&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In  all, 33 countries figure in the report. There was a substantial spike  when compared to previous reports with respect to the number of requests  from various governments to pull down content.&lt;br /&gt;&lt;br /&gt;"In the first  half of 2012, there were 20,938 inquiries from government entities  around the world. Those requests were for information about 36,614  accounts,” wrote Dorothy Chou, Google’s senior policy analyst, on the  Official Google Blog while presenting the report. “The number of  government requests to remove content from our services was largely flat  from 2009 to 2011. But it’s spiked in this reporting period. In the  first half of 2012, there were 1,791 requests from government officials  around the world to remove 17,746 pieces of content."&lt;br /&gt;&lt;br /&gt;Google is  leading the cause for voluntary disclosure of the interactions it has  with the governments. Other web services that put out similar  transparency reports include micro-blogging site Twitter; cloud storage  service Dropbox; and social networking site Linkedin.&lt;br /&gt;&lt;br /&gt;Mr. Prakash  said it was not enough if just the web services put out such reports.  "The telecom service providers must voluntarily come out with such  information," he added.&lt;br /&gt;&lt;br /&gt;"There is a dearth of public information  about the amount of legal interception and surveillance. This does not  bode well in a democratic polity."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google'&gt;https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-15T09:40:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens">
    <title> India second in keeping tabs on netizens</title>
    <link>https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens</link>
    <description>
        &lt;b&gt;India ranks second globally in accessing private details of its citizens, next only to the US, if the latest data from Google is to be believed.
&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Ishan Srivastava was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/internet/India-second-in-keeping-tabs-on-netizens/articleshow/17222023.cms"&gt;published in the Times of India on November 15, 2012&lt;/a&gt;, Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The transparency report by the internet search giant lists out requests it received from governments across the world to access information on the users of its various services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the first six months of 2012, India made 2,319 requests involving 3,467 users. In comparison, the US made 7,969 requests in the same period and Brazil, which comes third, sent 1,566 requests. Globally, there were 20,938 requests for user data during the January-June period. The data can include your complete &lt;a href="http://timesofindia.indiatimes.com/topic/Gmail-account"&gt;Gmail account&lt;/a&gt;, chat logs, Orkut profile and search terms among others. These reports are prepared by Google every six months, and were started in July-December 2009.&lt;/p&gt;
&lt;p&gt;The requests for user data from India doubled from 1,061 in July-December 2009 to 2,207 in July-December 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Though India is a large country with a significant number of internet users, this data is nonetheless an indicator of growing surveillance," said Pranesh Prakash, policy director at &lt;a href="http://timesofindia.indiatimes.com/topic/Centre-for-Internet-and-Society"&gt;Centre for Internet and Society&lt;/a&gt; (CIS), a Bangalore-based organization looking at issues of public accountability, internet freedom and openness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"India lacks a general privacy law that helps set guidelines for such user requests, despite privacy being a constitutional right as part of the right to life," said Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India also actively sends requests to take down content which it deems defamatory and against national security. While the number of court orders for taking down web content has remained almost stagnant over the years, there has been a rise in the number of requests by the executive and police. Between January and June this year, there were 20 court orders and 64 requests from executive/police that resulted in 596 items being taken down from the web. In comparison, there were only eight court orders and 22 executive/police requests in January-June 2010, resulting in 125 items being taken down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The government does not always specify the reason for which they want access. They just want access, what they do with the information is not known to us," said a legal adviser to an MNC. "These requests come with a threat to our continued operation in India."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Falsified court orders are also being employed to seek removal of content. Three such court orders were sent to Google "that demanded the removal of blog posts and entire blogs for alleged defamation." One order was said have been issued by a local court in Andheri, Mumbai while the other two by the Delhi high court. But all the three were found to be fake.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google says a single court order was responsible for removal of 360 items this year as they "contained adult videos that allegedly violated an individual's personal privacy." While such orders have a positive impact like curbing pornography and violent content, governments at every level have also tried to use these requests to take down unfavourable content or criticism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In January-June 2011 period, Google received "requests from state and local law enforcement agencies to remove &lt;a href="http://timesofindia.indiatimes.com/topic/YouTube"&gt;YouTube&lt;/a&gt; videos that displayed protests against social leaders or used offensive language in reference to religious leaders". Google rejected a majority of these requests. It also received a request from a law enforcement agency to remove 236 communities and profiles from Orkut that were critical of a local politician. Google did not remove them either.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Prior to 2009, government had limited powers of interception. However, after 26/11 they gave themselves huge powers to block and monitor content," said Supreme Court lawyer Pavan Duggal. "Data privacy is non-existent in India." He said that the A P Shah Committee, which was formed to recommend principles for a privacy law, has submitted its report to the Planning Commission and now it is up to the government to take it to the next stage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both Prakash and Duggal said that technology companies in India, including telecom players, should come out with similar transparency reports as Google. A report by international watchdog Privacy International says that &lt;a href="http://economictimes.indiatimes.com/bharti-airtel-ltd/stocks/companyid-2718.cms" target="_blank"&gt;Bharti Airtel&lt;/a&gt;, in its 2010-2011 annual report, said it had received 422 appreciation letters from law enforcement agencies for assistance in lawful interceptions. "The Indian IT Act requires electronic audit by firms but the law is silent on how this audit is filed," said Duggal.&lt;/p&gt;
&lt;p&gt;Globally, &lt;a href="http://timesofindia.indiatimes.com/topic/Dropbox"&gt;Dropbox&lt;/a&gt;, LinkedIn, Sonic.net and Twitter release transparency reports apart from Google.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens'&gt;https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-15T09:04:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/steady-steps-foss-and-mdgs">
    <title>Steady Steps.....FOSS and the MDG's</title>
    <link>https://cis-india.org/news/steady-steps-foss-and-mdgs</link>
    <description>
        &lt;b&gt;Pranesh Prakash was a panelist at this IGF workshop held on November 9, 2012. It was organised by International Center For Free and Open Source Software and Free Software and OpenSource Foundation For Africa.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;IG4D Thematic Cluster 2 "Enabling Environment" Question 1: What does it take to attract investment in infrastructure and enc&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concise Description of Workshop:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This workshop will address some key areas, where  Free and open source software has made a milestone, in the last few  years to fulfill the Millennium development goal, across the globe. Many  a times whenever FOSS is mentioned, , thoughts quickly run to ‘techies’  . In this session , the Panelists will give practical  presentations/projects on Free and Open Source Software, outside the  technical arena and show how it has changed the face of  : 1)  Governments:- We will look at, Policy in the area of Open Data, 2)  In  Academia:- We will look at, Open Education Resources (OER) , FOSS in  schools etc, both in Africa and India. 3)  In Private Sector- we will  look at , Wealth creation, innovation and job creation, just to mention  but a few. 1)  Secondly we will look at how FOSS is bridging the digital  divide, existing between the different age groups more especially the  Youth, Women, between the different social circles/media , inclusion of  person's with disabilities.etc, through partnerships and rural  deployment of FOSS. We will have the privilege to look at initiative(s),  in Brazil.   1) Last but not least, It will address, the key policies,  that governments should embrace, that would continue to enhance FOSS in  the Internet development goal at national level , regional level and at  the global level.  A rich discussion will be encouraged, from the  participants to ensure that the FOSS community understands its strength  and role in the internet governance realm, in policy making process  and in the privacy, security and openness arena.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;Workshop Agenda&lt;/b&gt;:&lt;br /&gt; 1. What Milestone has FOSS made in:&lt;br /&gt; i) Academia&lt;br /&gt; ii) Government&lt;br /&gt; iii) Private Sector&lt;br /&gt; 2. Is FOSS factor to consider in bridging the digital divide?&lt;br /&gt; 3. Regarding the Milestone that FOSS has achieved, should there be  national, regional, global.etc  policies to ensure a fair palying field  it?&lt;br /&gt; - Closing remarks, What actions to be taken,  conclusion.&lt;/p&gt;
&lt;div class="field-field-ws-panel field-type-text field"&gt;
&lt;div class="field-label"&gt;Submitted Workshop Panelists:&lt;/div&gt;
&lt;div class="field-items"&gt;
&lt;div class="odd field-item"&gt;
&lt;p&gt;1. Mr. Satish Babu - ICFOSS, India  (Government)- Moderator- Confirmed &lt;br /&gt; 2. Mr. Fernando Botelho- F123.org, Brazil (Remote Participation)- Confirmed&lt;br /&gt; 3. Ms. Anne Rachel Inne, ICANN- Confirmed&lt;br /&gt; 4. Mr. Pranesh Prakash, CIS Bangalore, India- Confirmed &lt;br /&gt; 5. Ms. Mishi Choudhary,  Executive Director of International programs at Software Freedom Law Center (SFLC), India- Confirmed&lt;br /&gt; 6. Mr. Yves Miezan Ezo, FOSSFA , CHALA, France- Confirmed&lt;br /&gt; 7.Ms. Nnenna Nwakanma, CEO, Nnenna.org, Cote d' Ivoire- Confirmed&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="field-field-ws-rm field-type-text field"&gt;
&lt;div class="field-label"&gt;Name of Remote Moderator(s):&lt;/div&gt;
&lt;div class="field-items"&gt;
&lt;div class="odd field-item"&gt;Ms. Judy Okite, FOSSFA&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="field-field-assigned-panellists field-type-nodereference field"&gt;
&lt;div class="field-label"&gt;Assigned Panellists:&lt;/div&gt;
&lt;div class="field-items"&gt;
&lt;div class="odd field-item"&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/babu-satish"&gt;Babu - Satish&lt;/a&gt;&lt;/div&gt;
&lt;div class="even field-item"&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/botelho-fernando"&gt;Botelho - Fernando&lt;/a&gt;&lt;/div&gt;
&lt;div class="odd field-item"&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/inne-anne-rachel"&gt;INNE - Anne-Rachel&lt;/a&gt;&lt;/div&gt;
&lt;div class="even field-item"&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/abraham-sunil"&gt;Abraham - Sunil&lt;/a&gt;&lt;/div&gt;
&lt;div class="odd field-item"&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/choudhary-mishi"&gt;Choudhary  - Mishi&lt;/a&gt;&lt;/div&gt;
&lt;div class="even field-item"&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/miezan-ezo-yves"&gt;Miezan Ezo - Yves&lt;/a&gt;&lt;/div&gt;
&lt;div class="odd field-item"&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/nwakanma-nnenna"&gt;Nwakanma - Nnenna&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/steady-steps-foss-and-mdgs'&gt;https://cis-india.org/news/steady-steps-foss-and-mdgs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-09T01:11:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy">
    <title>Q&amp;A to the Report of the Group of Experts on Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy</link>
    <description>
        &lt;b&gt;In January 2012 Justice A.P. Shah formed a committee consisting of a group of experts to contribute to and create a report of recommendations for a privacy legislation in India. The committee met a total of seven times from January to September 2012.  The Centre for Internet and Society (CIS) was a member of the committee creating the report. This blog post is CIS’s attempt to answer questions that have arisen from media coverage on the report, based on our understanding. &lt;/b&gt;
        &lt;h2&gt;Executive Summary&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The executive summary explains how the need for a horizontal privacy legislation that recognizes the right to privacy has come about in India in light of projects and practices such as the UID, NATGRID, and the changing nature of business and technology. The executive summary highlights the committee’s recommendations of what should be considered by legislatures while enacting a privacy legislation in India.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the salient features of the committee’s recommendations? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; In its report the committee recommended that any privacy legislation passed should:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; Be technologically neutral and interoperable with international standards to ensure that the regulation can adapt to changing technology, and that business will be promoted. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Recognize the multiple dimensions of privacy including physical and informational privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Apply to all data controllers both in the private sector and the public sector to ensure that businesses and governments are held accountable to protecting privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Establish a set of privacy principles that can be applicable to different practices, policies, projects, departments, and businesses to create a uniform level of privacy protection across all sectors. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Create an enforcement regime of co-regulation, where industry has the choice of developing privacy principles and ensuring compliance at the sectoral level with regular oversight by the Privacy Commissioners. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 1: Constitutional Basis for Privacy&lt;/h2&gt;
&lt;p&gt;This chapter summarizes a number of decisions from the Indian Judiciary that demonstrate how the right to privacy in India has been defined on a case to case basis and has been defined as either a fundamental right or a common law right.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the contexts of the cases covered? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; This chapter covers cases that speak to the:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Right to privacy in the context of surveillance by the State &lt;/li&gt;
&lt;li&gt;Balancing the ‘right to privacy’ against the ‘right to free speech’ &lt;/li&gt;
&lt;li&gt;The ‘right to privacy’ of HIV patients &lt;/li&gt;
&lt;li&gt;Prior judicial sanctions for tapping telephones &lt;/li&gt;
&lt;li&gt;The ‘search and seizure’ powers of revenue authorities &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 2: International Privacy Principles&lt;/h2&gt;
&lt;p&gt;This chapter summarizes recent developments in privacy laws, international privacy principles, and privacy principles developed by specific countries. This review aided the Committee in forming its recommendations for the report.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Privacy principles from which countries were reviewed by the Committee?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; The Committee reviewed privacy principles from the following countries and international organizations.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;EU Regulations of January 2012 &lt;/li&gt;
&lt;li&gt;US Consumer Privacy Bill of Rights &lt;/li&gt;
&lt;li&gt;OECD Privacy Principles &lt;/li&gt;
&lt;li&gt;APEC Privacy Framework &lt;/li&gt;
&lt;li&gt;Australia &lt;/li&gt;
&lt;li&gt;Canada &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 3: National Privacy Principles, Rationales, and Emerging Issues&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter lays out the nine national privacy principles and describes the rationale for each principle along with emerging issues around each principle.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What could the principles apply to? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The principles apply to the collection, processing, storage, retention, access, disclosure, destruction, sharing, transfer, and anonymization of sensitive personal information, personal identifiable information, and identifiable information by data controllers. The national privacy principles can also be applied to legislation, projects, practices, and policies to ensure that provisions and requirements are in compliance with the national privacy principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Who could be brought under the scope of the principles?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The principles are applicable to every data controller in the private sector and the public sector. For example organizations and government departments that determine the purposes and means of processing personal information will be brought under the scope of the principles and will be responsible for carrying out the processing of data in accordance with sectoral privacy standards or the national privacy principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: How could the National Privacy Principles impact individuals? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The principles provide individuals with the right to 1. Receive notice before giving consent stating what personal information is being collected, the purposes for which personal information is being collected, the uses of collected personal information, whether or not personal information will be disclosed to third persons, security safeguards established by the data controller, processes available to data subjects to access and correct personal information, and contact details of privacy officers. 2. Opt in and out of providing personal information 3. Withdraw given consent at any point of time. 4. Access and correct any personal information held by data controllers 5. Allow individuals to issue a complaint with the respective ombudsman, privacy commissioner, or court.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Would the National Privacy Principles be binding for every data controller? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; Yes, but Self Regulating Organizations at the industry level have the option of developing principles for that specific sector. These principles must be approved by the privacy commissioner and be in compliance with the National Privacy Principles.&lt;/p&gt;
&lt;h2&gt;Chapter 4: Analysis of Relevant Legislation, Bills, and Interests from a Privacy Perspective&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter examines relevant legislation, bills, and interests from a privacy perspective. In doing so the chapter clarifies how the right to privacy should intersect with the right to information and the freedom of expression, and anaylzes current and upcoming legislation to demonstrate what existing provisions in the legislation uphold the privacy principles, what existing provisions are in conflict with the principles, and what provisions are missing to ensure that the legislation is compliant to the extent possible with the principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: How does the report understand the relationship between the Right to Information and the Right to Privacy?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; When applied the Privacy Act should not circumscribe the Right to Information Act. Furthermore, RTI recipients should not be considered data controllers and thus should not be brought under the ambit of the privacy principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: How does the report understand the relationship between the freedom of expression and privacy? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; Questions about how to balance the right to privacy with the freedom of expression can arise in many circumstances including: the right to be forgotten and data portability, journalistic expression, state secrecy and whistle blowers, and national security. Most often, public interest is the test used to determine if the right to privacy should supersede the freedom of expression or vice versa.&lt;/p&gt;
&lt;h2&gt;Chapter 5: The Regulatory Framework&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter outlines the committee’s recommendations for a regulatory framework for the Privacy Act.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Who are the main actors in the regulatory framework?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The report recommends that a regulatory framework be comprised of one privacy commissioner at the central level and four commissioners at the regional level, self regulating organizations (SRO’s) at the industry level, data controllers and privacy officers at the organization level, and courts.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the salient features of the regulatory framework? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The salient features of the regulatory framework include 1. A framework of co-regulation 2. Complaints 3. Exceptions to the Privacy Act 4. Offenses under the Act&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are exceptions to the right to privacy? Are these blanket exceptions?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; National security; public order; disclosure of information in public interest; prevention, detection, investigation and prosecution of criminal offences; and protection of the individual or of the rights and freedoms of others are suggested exceptions to the right to privacy. The committee has qualified these exceptions with the statement that before an exception can be made for the following circumstances, the proportionality, legality, and necessity in a democratic state should be used to measure if the exception applies and the extent of the exception. Thus, they are not blanket exceptions to the right to privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Historical and scientific research and journalistic purposes were also recommended as additional exceptions to the right to privacy that may be considered. These exceptions will not be subjected to the principles of proportionality, legality, and necessary in a democratic state.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the powers and responsibilities of the privacy commissioners? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; The powers and responsibilities of the Privacy Commissioners are the following:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Responsibilities:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Enforcement of the Act &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Broadly oversee interception/access, audio &amp;amp; video recordings, the use of personal identifiers, and the use of bodily or genetic material. &lt;/li&gt;
&lt;li&gt;Evaluate and approve privacy principles developed by SRO’s &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Collaborate with stakeholders to endure effective regulation, promote awareness of the Act, and sensitize citizens to privacy considerations &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Powers: &lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Order privacy impact assessments on organisations &lt;/li&gt;
&lt;li&gt;Investigate complaints suomotu or based off of complaints from data subjects (summon documents, call and examine witnesses, and take a case to court if necessary ) &lt;/li&gt;
&lt;li&gt;Fine non-compliant data controllers &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Q: How does Co-regulation work? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The purpose of establishing a regulatory framework of co-regulation is to ensure that appropriate policies and principles are articulated and enforced for all sectors. If a sector wishes to develop its own privacy standards, the industry level self regulating organization will submit to the privacy commissioner a sub set of self regulatory norms. If these norms are approved by the privacy commissioner the SRO will be responsible for enforcing those norms, but the privacy commissioner will have the power to sanction member data controllers for violating the norms. If a sector does not have an SRO or does not wish to develop its own set of standards, the National Privacy Principles will be binding.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are data controllers? What are privacy officers? What are ombudsmen? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; A data controller is any entity that handles or process data. Privacy officers receive and handle complaints at the organizational level and may be appointed as part of a SRO’s privacy requirements for a sector.  Ombudsmen are appointed at the SRO level and are also responsible for receiving and handling complaints. The objective of having ombudsman and privacy officers is to reduce the burden of handling complaints on the commissioner and the courts.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: When can an individual issue a complaint? Which body should individuals issue complaints to? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; An individual can issue a complaint at any point of time when they feel that their personal information has not been handled by a data controller according to the principles, or that a data controller is not in compliance with the Act. When applicable complaints are encouraged to be issued first to the organization. If the complaint is not resolved, the individual can take the complaint to the SRO or privacy commissioner. The individual also has the option of taking a complaint straight to the courts. When a complaint is received by the commissioner, the commissioner may fine the data controller if it is found to be non-compliant. Data controllers cannot appeal fines issued by the commissioner, but they can appeal the initial decision of non-compliance.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Can an individual receive compensation for a violation of privacy: &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; Yes. Individuals who suffer damages caused by non-compliance with the principles or any obligation under the Act can receive compensation, but the compensation must be issued by the courts and cannot be issued by a privacy commissioner. Actors that can be held liable by individuals include data controllers, organization directors, agency directors, and heads of Governmental departments.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What offences does the report reccomend?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; The following constitutes as an offence under the Act:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Non-compliance with the  privacy principles &lt;/li&gt;
&lt;li&gt;Unlawful  collection,  processing,  sharing/disclosure,  access,  and  use  of personal data &lt;/li&gt;
&lt;li&gt;Obstruction of commissioner &lt;/li&gt;
&lt;li&gt;Failure to comply with notification issued by commissioner        
&lt;ul&gt;
&lt;li&gt; Processing data after receiving a notification &lt;/li&gt;
&lt;li&gt; Failure to appear before commissioner &lt;/li&gt;
&lt;li&gt;Failure to produce documents requested by commissioner &lt;/li&gt;
&lt;li&gt; Sending report to commissioner with false or misleading information&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 6: The Multiple Dimensions of Privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter gives examples of practices that impact privacy in India which the national privacy principles could be applied to. These include interception/access, the use of electronic recording devices, the use of personal identifiers, and the use of bodily and genetic material. The current state of each practice in India is described, and the inconsistencies and gaps in the regimes are highlighted. Each section also provides recommendations of which privacy principles need to be addressed and strengthened in each practice, and how the privacy principles would be affected by each practice.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Does the report give specific recommendations as to how each practice should be amended to incorporate the National Privacy Principles?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; No. Each section explains the current state of the practice in India, gaps and inconsistencies with the current practice,  and recommends broadly what principles need to be addressed and strengthened in the regime, and how the National Privacy Principles may be affected by the practice.&lt;/p&gt;
&lt;h3&gt;Summary of Recommendations&lt;/h3&gt;
&lt;p&gt;This chapter consolidates and clarifies all of the Committee’s recommendations for a Privacy Act in India.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Are the recommendations in this chapter different from chapters above?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; No.  The recommendations in this chapter reflect the recommendations made earlier. This chapter does clarify the recommended scope and objectives of the Privacy Act  including:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The Act should define and harmonize with existing laws in force. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Act should extend the right of privacy to all individuals in India and all data processed by any company or equipment locating in India, and all data that originated in India. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Act should clarify that the publication of personal data for artistic and journalistic purposes in public interest, the use of personal information for household purposes, and the disclosure of information as required by the Right to Information Act should not constitute an infringement of privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Act should not require a ‘reasonable expectation’ of privacy to be present for the right to be evoked. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If any other legislation provides more extensive protections than those set out by the Privacy Act, than the more extensive protections should apply. &lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy.pdf" class="internal-link"&gt;Report of the Group of Experts on Privacy&lt;/a&gt; [PDF, 1270 Kb]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy'&gt;https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-09T10:20:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms">
    <title>Law yet to catch up with tech-enabled peeping toms</title>
    <link>https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms</link>
    <description>
        &lt;b&gt;Devices that give sharp images are the order of the day. But this clarity is lacking when it comes to regulating use of cameras and camera phones in public places, say policy makers.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Sandhya Soman &amp;amp; Pratiksha Ramkumar was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2012-11-07/chennai/34972633_1_privacy-law-phones-in-public-places-camera-phones"&gt;published&lt;/a&gt; in the Times of India on November 7, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If there is one thing that sends more clients harried by blackmailers to detectives like A M Malathy of Malathy Detective Agency, it is the pervasive presence of the camera, most often inside modest cell phones. "One girl had to leave a town as her ex-boyfriend uploaded her photo on the internet and referred to her as a call girl. We got the web page removed," says Malathy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But tracing culprits is difficult if they are strangers on the road. Absence of a privacy law makes it difficult for police to book culprits. "If someone photographs a woman on a bus, we can ask the person to delete it. But we can't book the person s there is no law," says Jegabar Sali, assistant commissioner, cyber crime cell.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology (IT) Act, 2000 talks of punishment only in cases where a person's private areas have been photographed. However, things are looking up with the government trying to draw up the Right to Privacy Bill.&lt;br /&gt;&lt;br /&gt;"The problems posed by digital technology are complex and we need to define what these new crimes are," says Rajeev Chandrasekhar, independent Member of Parliament, who introduced the Right to Privacy Bill,2010 in Parliament. "I did it because I got representations from parents and women about how MMS clips were being used to blackmail them," says Chandrasekhar.&lt;br /&gt;&lt;br /&gt;There have been attempts at legislation earlier. The Mobile Camera Phone Users (Code of Conduct) Bill, 2006 attempted to regulate the use of camera phones in public places. It proposed that manufactures build camera phones that flash a light or emit a 'click' sound, and that users should get consent of the person being photographed.&lt;br /&gt;&lt;br /&gt;"The sound and light are for informing people that they are being filmed," says Sunil Abraham, executive director, Centre for Internet and Society, a Bangalore-based organisation that was part of the committee. These provisions are part of South Korea's privacy law, which sought to bring down cases of technology-enabled 'upskirt' photography, where photos of women were taken without their permission, he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms'&gt;https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-08T08:06:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/live-mint-politics-surabhi-agarwal-nov-6-2012-information-security-policy-on-govt-agenda">
    <title>Information security policy on govt agenda</title>
    <link>https://cis-india.org/news/live-mint-politics-surabhi-agarwal-nov-6-2012-information-security-policy-on-govt-agenda</link>
    <description>
        &lt;b&gt;As an increasing quantity of sensitive information is transmitted through electronic channels, the government is considering putting in place an internal information security policy to reduce the risk of leaks and counter possible cyber attacks, said three government officials involved in discussions on the proposal.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Surabhi Agarwal's article was &lt;a class="external-link" href="http://www.livemint.com/Politics/TyFgDxthlTap5XwzA84gdO/Information-security-policy-on-govt-agenda.html"&gt;published&lt;/a&gt; in LiveMint on November 6, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The policy will include new guidelines on top of the standards set out by the Official Secrets Act, 1923, and mandate safeguards for each category of information on how it should be transmitted, stored and preserved. The categories are “top secret”, “secret”, “confidential”, “restricted” and “official use only”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts argue that given the easy portability of such information and its vulnerability to hackers, the policy should have been in place much sooner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Official Secrets Act seeks to protect sensitive information including official communications, sketch plans, documents and other information pertaining to government functioning. Gaining wrongful access to information deemed to be an official secret or unauthorized use of such information are regarded as offences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that the law was enacted almost a quarter century before independence, it had no provisions to deal with electronic transmission of such information made possible by technological advances in subsequent decades, said cyber expert &lt;a href="http://www.livemint.com/Search/Link/Keyword/Pawan%20Duggal"&gt;Pawan Duggal&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the three government officials cited above said the aim of the proposed internal information security policy is to protect classified information that’s transmitted electronically much as it is done currently in the paper format.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"As more information is getting transmitted in the electronic format, we have to put in place procedures, guidelines, policies and standards for protecting that information in the electronic format," the official said.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/mbEt4qd0fnA" width="320"&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;br /&gt;From the newsroom: Securing government information&lt;/p&gt;
&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The discussions, being anchored by the home ministry, have been under way for some time and the policy should be finalized in the “next few months”, the official said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A second official said the policy will lay down the dos and don’ts for government officers on how information has to be transmitted, stored and preserved in the electronic format. “In case of a breach, the investigation agencies can then look into whether the requisite safeguards were followed or not,” the official said. The proposal follows a rash of attacks on government computer systems that exposed their vulnerability to hackers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Former minister of state for communications and information technology &lt;a href="http://www.livemint.com/Search/Link/Keyword/Sachin%20Pilot"&gt;Sachin Pilot&lt;/a&gt; told Parliament recently that between December 2011 and February 2012, a total of 112 government websites had been hacked.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;A third government official, who also didn’t want to be identified, said that every government official would have to follow standard procedures in electronic transmission of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The moment one’s computer is connected to the Internet, it is part of a global network, so attackers in the cyber space know which information can be stolen from where if the necessary deterrents are not in place,” the official said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sensitive information such as tax matters and intellectual property issues are part of the information that’s transmitted electronically by government offices, which if leaked can have market implications as well as an impact on governance, experts said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The government leaks like a sieve,” said &lt;a href="http://www.livemint.com/Search/Link/Keyword/B.G.%20Verghese"&gt;B.G. Verghese&lt;/a&gt;, a visiting professor at New Delhi-based Centre for Policy Research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is a step and they are trying to lay some ground rules to regulate a process that fits in with concepts of law, good governance, Constitution, privacy and prevents any wrongdoing,” Verghese said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposed policy, when put in place, will be a step forward so long as it does not dilute the powers available to citizens under the Right to Information Act, said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;, executive director of Bangalore-based research organization Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently there are several concerns centred on electronic transmission, including questions about who is responsible for information, especially its unauthorized use. “This could help establish an audit trail,” Abraham said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first government official quoted above stressed that although cyber security and information security cut across each other, the two concepts are different.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Cyber (security) is basically about devices and networks, whereas information security is very particularly about the information which travels on the net,” this official said. Reinforced cyber security will be an additional benefit once the information security policy comes into force, he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/live-mint-politics-surabhi-agarwal-nov-6-2012-information-security-policy-on-govt-agenda'&gt;https://cis-india.org/news/live-mint-politics-surabhi-agarwal-nov-6-2012-information-security-policy-on-govt-agenda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-11-08T06:18:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/who-is-following-me">
    <title>Who is Following Me: Tracking the Trackers (IGF2012)</title>
    <link>https://cis-india.org/news/who-is-following-me</link>
    <description>
        &lt;b&gt;The Internet Society and the Council of Europe are co-organising a workshop at the IGF (Baku - 8 November 2012 - 09:00 - 10:30) regarding online tracking. Malavika Jayaram is a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Interest in online tracking as a policy issue spiked with the release  of the Preliminary Federal Trade Commission Staff Report in December  2010 entitled &lt;i&gt;Protecting Consumer Privacy in an Era of Rapid Change – A Proposed Framework for Businesses and Policymakers&lt;/i&gt; calling for a “do not track” mechanism, the launch of the W3C Tracking  Protection Workng Group and the recent entry into force of the so-called  European “Cookie Directive” provisions. However, the actual and  potential observation of individuals’ interactions online has long been a  concern for privacy advocates and others.&lt;/p&gt;
&lt;p&gt;Much of the policy attention is currently focused on cookies used to  track users to build profiles for more targeted advertising, but some of  the more difficult issues are:&lt;/p&gt;
&lt;ul class="rteindent1"&gt;
&lt;li style="text-align: justify; "&gt; How to deal with less-observable tracking (e.g. browser and/or device  fingerprinting, monitoring of publicly disclosed information)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; How to develop laws that accommodate different tracking scenarios – for example:  
&lt;ul&gt;
&lt;li&gt; different entities (law enforcement, companies, etc.); &lt;/li&gt;
&lt;li&gt; different and sometimes multiple purposes (security, personalising  user experience, targeting advertising, malicious activity; etc.); &lt;/li&gt;
&lt;li&gt; first-party and third-party tracking o single site and multiple site tracking&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Transparency (particularly on small mobile devices)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Whether a traditional consent model is sufficient and effective&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The panel:&lt;/p&gt;
&lt;ul class="rteindent1"&gt;
&lt;li&gt; Wendy Seltzer, Policy Council, World Wide Web Consortium (W3C)&lt;/li&gt;
&lt;li&gt; Kimon Zorbas, Vice President, Interactive Advertising Bureau (IAB) Europe&lt;/li&gt;
&lt;li&gt; Cornelia Kutterer, Director of Regulatory Policy, Corporate Affairs, LCA, Microsoft EMEA&lt;/li&gt;
&lt;li&gt; Malavika Jayaram, partner at Jayaram &amp;amp; Jayaram, Bangalore&lt;/li&gt;
&lt;li&gt; Shaundra Watson, Counsel for international consumer protection, USA Federal Trade Commission&lt;/li&gt;
&lt;li&gt; Rob van Eijk, Council of Europe expert, Leiden University (PhD student)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The moderators:&lt;/p&gt;
&lt;ul class="rteindent1"&gt;
&lt;li&gt; Christine Runnegar, Internet Society&lt;/li&gt;
&lt;li&gt; Sophie Kwasny, Council of Europe&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The remote moderator:&lt;/p&gt;
&lt;ul class="rteindent1"&gt;
&lt;li&gt; James Lawson, Council of Europe&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This workshop will explore:&lt;/p&gt;
&lt;ul class="rteindent1"&gt;
&lt;li&gt; Current and emerging trends in online tracking (and their related purposes)&lt;/li&gt;
&lt;li&gt; How to give individuals full knowledge of the tracking that occurs when they go online&lt;/li&gt;
&lt;li&gt; Mechanisms to give individuals greater control over tracking and data use&lt;/li&gt;
&lt;li&gt; The respective roles of all actors (government, law enforcement,  Internet intermediaries, businesses, browser vendors, application  developers, advertisers, data brokers, users, Internet technical  community, etc.) &lt;/li&gt;
&lt;li&gt; Whether effective data protection online can be ensured solely by law.&lt;/li&gt;
&lt;li&gt; Whether self-regulation and voluntary consensus standards offer better  options for tuning privacy choice to the rapidly advancing technology  environment.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Please read our &lt;b&gt;&lt;a href="http://www.internetsociety.org/sites/default/files/Tracking%20-%20Background%20paper%2020120711_0.pdf"&gt;background paper&lt;/a&gt;&lt;/b&gt; and &lt;a href="http://www.internetsociety.org/doc/who-following-me-tracking-trackers-part-2"&gt;&lt;b&gt;update&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/who-is-following-me'&gt;https://cis-india.org/news/who-is-following-me&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-07T17:17:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/solutions-for-cross-border-data-flows">
    <title>Solutions for Enabling Cross-border Data Flows</title>
    <link>https://cis-india.org/news/solutions-for-cross-border-data-flows</link>
    <description>
        &lt;b&gt;ICC BASIS and the Internet Society are co-organising a workshop at the IGF (Baku - 7 November 2012 - 14:30 to 16:00) to explore solutions for enabling cross-border data flows. Malavika Jayaram is a panelist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by&lt;a class="external-link" href="http://www.internetsociety.org/solutions-enabling-cross-border-data-flows-igf2012"&gt; Internet Society&lt;/a&gt;. For details published on the IGF website, see &lt;a class="external-link" href="http://http//wsms1.intgovforum.org/content/no86-solutions-enabling-cross-border-data-flows"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;BRIEF OVERVIEW&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet has revolutionised our ability to communicate and share  data beyond national boundaries, thereby facilitating cross-border  social and commercial interactions. Enabling cross-border data flows,  however, raises a number of important Internet governance policy  considerations for a broad range of stakeholders, such as business,  intermediaries, users, law enforcement agencies, governments,  policymakers and the wider Internet technical community. In this  context, the workshop will explore policy issues, from various  stakeholder perspectives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dynamic panel of experts will provide a wide range of  perspectives for this discussion and explore concrete solutions and  options for enabling cross-border data flows. This is an important  opportunity to raise awareness about the practical and the policy  realities raised by these issues. It will also be an opportunity to  share concrete issues, experiences, possible approaches and solutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;MODERATOR&lt;/b&gt;&lt;br /&gt; Jeff Brueggeman, Vice President-Public Policy &amp;amp; Deputy Chief Privacy Officer, AT&amp;amp;T&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;PANELLISTS&lt;/b&gt;&lt;br /&gt; Joseph Alhadeff, Chief Privacy Strategist, Vice President, Global Public Policy, Oracle&lt;br /&gt; Maria Häll, Ministry of Enterprise, Energy and Communications, Sweden&lt;br /&gt; Malavika Jayaram, Partner, Jayaram &amp;amp; Jayaram, Bangalore&lt;br /&gt; Christine Runnegar, Senior Policy Advisor, Internet Society&lt;br /&gt; Ivan Sanchez Medina, Member of the Columbian National Telecommunications Commission, CRC&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;LEAD DISCUSSANTS&lt;/b&gt;&lt;br /&gt; Olga Cavalli, Advisor to the Ministry of Foreign Affairs, Argentina&lt;br /&gt; Christoph Steck, Chief Regulatory Officer, Telefonica (TBC)&lt;br /&gt; Kevin Bankston, Senior Counsel and Free Expression Director, Center for Democracy &amp;amp; Technology&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;REMOTE MODERATOR&lt;/b&gt;&lt;br /&gt; Constance Weise, ICC BASIS&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;SUBSTANTIVE RAPPORTEUR &lt;/b&gt;&lt;br /&gt; Karen Mulberry, Policy Advisor, Internet Society&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/solutions-for-cross-border-data-flows'&gt;https://cis-india.org/news/solutions-for-cross-border-data-flows&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-07T22:42:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/best-bits">
    <title>Best Bits 2012</title>
    <link>https://cis-india.org/news/best-bits</link>
    <description>
        &lt;b&gt;Best Bits organized a workshop at the IGF. It was held on November 3 and 4, 2012. Pranesh Prakash and Elonnai Hickok participated in the event.&lt;/b&gt;
        &lt;h2&gt;Agenda&lt;/h2&gt;
&lt;h3&gt;Day 1, Saturday, November 3, 2012&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9.00 - 10.45&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Internet governance history and review&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Mapping Internet governance – institutions and actors&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Last 20 years of Internet governance: ITU, ISOC, WSIS and IGF&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Last 2 years – ACTA, SOPA/PIPA and online activism eg. StopTheMeter.ca, government assertions of sovereignty over IG&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Southern perspectives on global Internet governance&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00 - 12.45&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;The ITU and the International Telecommunications Regulations&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What are the real dangers of the proposed ITR revisions?&lt;/li&gt;
&lt;li&gt;Remaining opportunities for input into the WCIT process&lt;/li&gt;
&lt;li&gt;How to engage with your national delegation to the ITU&lt;/li&gt;
&lt;li&gt;Beyond WCIT – WTPF, WTSA, IMPACT, and the Dedicated Group&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.45 - 14.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Lunch and networking break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.00 - 17.30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Drafting a civil society statement to WCIT&lt;/b&gt;&lt;/p&gt;
&lt;div id="magicdomid51"&gt;
&lt;ul&gt;
&lt;li&gt;Draws together points of consensus&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid52"&gt;
&lt;ul&gt;
&lt;li&gt;Defines the legitimate role of the ITU&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid53"&gt;
&lt;ul&gt;
&lt;li&gt;Judges it against the WSIS criteria&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid54"&gt;
&lt;ul&gt;
&lt;li&gt;Refers to statement on IG principles&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Day 2, Sunday, November 4, 2012&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9.00 - 10.30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Declarations of Internet rights and Internet governance principles&lt;/b&gt;&lt;/p&gt;
&lt;div id="magicdomid59"&gt;
&lt;ul&gt;
&lt;li&gt;Background to Internet principles declarations 1999 to 2012&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid60"&gt;
&lt;ul&gt;
&lt;li&gt;Declaration of Internet Freedom – first and second iterations&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid61"&gt;
&lt;ul&gt;
&lt;li&gt;Other current initiatives – “rival” Declaration, Marco Civil, etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid62"&gt;
&lt;ul&gt;
&lt;li&gt;Respective advantages of consolidation and maintaining diversity&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.45 - 12.15&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Process towards enhanced cooperation on Internet public policy issues&lt;/b&gt;&lt;/p&gt;
&lt;div id="magicdomid66"&gt;
&lt;ul&gt;
&lt;li&gt;If not the ITU, then what?&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid67"&gt;
&lt;ul&gt;
&lt;li&gt;The global vacuum on Internet-related public policy issues&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid68"&gt;
&lt;ul&gt;
&lt;li&gt;Likely scenarios (favourable or not) if the vacuum is not filled&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid69"&gt;
&lt;ul&gt;
&lt;li&gt;Discussion of reform proposals – Committee on Internet Related Policies, Enhanced Cooperation Task Force&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.15 - 13.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Lunch and networking break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00 - 16.00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Drafting civil society IG principles for the IGF&lt;/b&gt;&lt;/p&gt;
&lt;div id="magicdomid75"&gt;
&lt;ul&gt;
&lt;li&gt;Development of existing statements&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid76"&gt;
&lt;ul&gt;
&lt;li&gt;Reinforces multi-stakeholder approach&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid77"&gt;
&lt;ul&gt;
&lt;li&gt;Suggests roadmap for improved implementation of enhanced cooperation&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.15 - 17.45&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Next steps&lt;/b&gt;&lt;/p&gt;
&lt;div id="magicdomid81"&gt;
&lt;ul&gt;
&lt;li&gt;Making an inclusive civil society network on IG issues sustainable&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid82"&gt;
&lt;ul&gt;
&lt;li&gt;Other existing civil society+ networks – Internet Defence League,  Internet Governance Caucus, Global Network Initiative, CSISAC, OpenMedia  network, Internet Progress Administration&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid83"&gt;
&lt;ul&gt;
&lt;li&gt;Recap of upcoming events and campaigns for possible joint action&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Participants&lt;/p&gt;
&lt;ul&gt;
&lt;li class="author-profile" id="user-11"&gt;Alejandro Pisanty                      &lt;a href="http://pisanty.blogspot.com"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;span class="add-tooltip with-icon" title="Professor at UNAM, Mexico. Chair of ISOC Mexico. Former member of WGIG, IGF MAG, ISOC Board of Trustees, ICANN Board of Directors."&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-32"&gt;Andrew Puddephatt                               &lt;span class="add-tooltip with-icon" title="Global Partners"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-51"&gt;Anja Kovacs                               &lt;span class="add-tooltip with-icon" title="Internet Democracy Project"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-47"&gt;Anna Orlova                               &lt;span class="add-tooltip with-icon" title="Humboldt Universität zu Berlin"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-40"&gt;Anriette Esterhuysen                               &lt;span class="add-tooltip with-icon" title="Association for Progressive Communications"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-37"&gt;Antonio Medina Gomez                               &lt;span class="add-tooltip with-icon" title="Gobernanza de Internet Colombia"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-38"&gt;Arthit Suriyawongkul                               &lt;span class="add-tooltip with-icon" title="Thai Netizen Network"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-44"&gt;Ashnah Kalemera                               &lt;span class="add-tooltip with-icon" title="Collaboration on International ICT Policy for East and Southern Africa (CIPESA)"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-16"&gt;Avri Doria                               &lt;span class="add-tooltip with-icon" title="dotgay"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-74"&gt;bdelachapelle &lt;/li&gt;
&lt;li class="author-profile" id="user-18"&gt;Brett Solomon                               &lt;span class="add-tooltip with-icon" title="Access (accessnow.org)"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-55"&gt;Carlos Alberto Afonso                      &lt;a href="http://www.nupef.org.br"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-2"&gt;Claudio Ruiz                      &lt;a href="http://www.derechosdigitales.org/"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-31"&gt;Deborah Brown                               &lt;span class="add-tooltip with-icon" title="Access (www.Accessnow.org)"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-25"&gt;Dixie Hawtin                               &lt;span class="add-tooltip with-icon" title="Global Partners &amp;amp; Associates"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-78"&gt;Donny B U &lt;/li&gt;
&lt;li class="author-profile" id="user-35"&gt;Elonnai Hickok                               &lt;span class="add-tooltip with-icon" title="Centre for Internet and Society"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-7"&gt;Emma Llanso                               &lt;span class="add-tooltip with-icon" title="Policy Counsel, Center for Democracy &amp;amp; Technology"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-61"&gt;Fouad Bajwa                      &lt;a href="http://internetsgovernance.blogspot.com"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;span class="add-tooltip with-icon" title="Public Policy Analysis, Research and Advocacy."&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-22"&gt;Gene Kimmelman                               &lt;span class="add-tooltip with-icon" title="Global Partners &amp;amp; Associates"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-27"&gt;Iarla Flynn                               &lt;span class="add-tooltip with-icon" title="Google"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-36"&gt;Imran Ahmed Shah                               &lt;span class="add-tooltip with-icon" title="Internet Governance Forum of Pakistan"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-1"&gt;Jeremy Malcolm                      &lt;a href="http://A2Knetwork.org/"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;span class="add-tooltip with-icon" title="Senior Policy Officer, Consumers International"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-43"&gt;Joana Varon Ferraz                               &lt;span class="add-tooltip with-icon" title="Center for Technology and Society (CTS/FGV)"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-29"&gt;Jochai Ben-Avie                               &lt;span class="add-tooltip with-icon" title="Access (AccessNow.org)"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-28"&gt;Joonas Mikael Mäkinen                               &lt;span class="add-tooltip with-icon" title="Electronic Frontier Finland"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-6"&gt;Joy Liddicoat                      &lt;a href="http://rights.apc.org"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-30"&gt;Katitza Rodriguez                               &lt;span class="add-tooltip with-icon" title="EFF"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-20"&gt;Kevin Bankston                               &lt;span class="add-tooltip with-icon" title="Center for Democracy &amp;amp; Technology"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-65"&gt;LAURA ABBA &lt;/li&gt;
&lt;li class="author-profile" id="user-23"&gt;matthew shears                               &lt;span class="add-tooltip with-icon" title="CDT - Center for Democracy and Technology"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-48"&gt;Mawaki Chango                               &lt;span class="add-tooltip with-icon" title="Association for Progressive Communications"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-39"&gt;Michael Gurstein                               &lt;span class="add-tooltip with-icon" title="Centre for Community Informatics Research, Development and Training"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-15"&gt;Nnenna Nwakanla &lt;/li&gt;
&lt;li class="author-profile" id="user-8"&gt;Norbert Bollow                               &lt;span class="add-tooltip with-icon" title="Swiss Open Systems User Group /ch/open"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-24"&gt;Parminder Jeet Singh                               &lt;span class="add-tooltip with-icon" title="IT for Change, India"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-34"&gt;Pranesh Prakash                               &lt;span class="add-tooltip with-icon" title="Centre for Internet and Society"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-21"&gt;Premila Kumar                               &lt;span class="add-tooltip with-icon" title="Consumer Council of Fiji"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-26"&gt;Raquel Gatto                               &lt;span class="add-tooltip with-icon" title="NIC.br"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-17"&gt;Rashmi Rangnath                               &lt;span class="add-tooltip with-icon" title="Public Knowledge"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-62"&gt;Sanja_Kelly &lt;/li&gt;
&lt;li class="author-profile" id="user-53"&gt;Shahzad Ahmad                               &lt;span class="add-tooltip with-icon" title="Bytes for All, Pakistan"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-52"&gt;Shita Laksmi                               &lt;span class="add-tooltip with-icon" title="Hivos"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-66"&gt;STEFANO TRUMPY &lt;/li&gt;
&lt;li class="author-profile" id="user-49"&gt;Stephanie Borg Psaila                               &lt;span class="add-tooltip with-icon" title="DiploFoundation"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-77"&gt;Sylwia Rudnik                               &lt;span class="add-tooltip with-icon" title="ISOC Poland Chapter Ambassador"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-33"&gt;Tapani Tarvainen                               &lt;span class="add-tooltip with-icon" title="Electronic Frointier Finland"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-41"&gt;Theresa Züger                               &lt;span class="add-tooltip with-icon" title="Humboldt Inistute for Internet and Society"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-19"&gt;Valeria Betancourt                               &lt;span class="add-tooltip with-icon" title="Association for Progressive Communications"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-9"&gt;William Drake                      &lt;a href="http://williamdrake.org"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;span class="add-tooltip with-icon" title="William J. Drake is an International Fellow and Lecturer in the Institute of Mass Communication and Media Research at the University of Zurich, as well as a consultant, based in Geneva.  Current activities include serving as co-editor of the MIT Press book series, The Information Revolution and Global Politics; an elected representative of noncommercial users on the Council of the Generic Names Supporting Organization, and on the Board of Directors of the European At Large Organization, in the Internet Corporation for Names and Numbers; a member of the Multistakeholder Advisory Group of the Internet Governance Forum; a member of the Civil Society Information Society Advisory Council of the Organization for Economic Cooperation and Development;  a member of the Group of High-Level Advisors of the UN Global Alliance for ICT and Development; a core faculty member in the European and South Schools on Internet Governance; a founding member of Global Internet Governance Academic Network and the civil society Internet Governance Caucus; and an Affiliated Researcher of the Institute for Tele-Information at Columbia University.  In December 2012, he will serve on the US delegation to ITU’s World Conference on International Telecommunications treaty negotiation.  Some previous positions held include, Senior Associate of the Centre for International Governance at the Graduate Institute of International and Development Studies in Geneva; President of Computer Professionals for Social Responsibility; Senior Associate and Director of the Project on the Information Revolution and World Politics at the Carnegie Endowment for International Peace; founding Associate Director of the Communication, Culture and Technology Program at Georgetown University; and Assistant Professor of Communication at the University of California, San Diego.  Some previous activities have included serving as a member of the UN Working Group on Internet Governance; Working Group 1 of the UN Information and Communication Technologies Task Force; and the World Economic Forum Task Force on the Global Digital Divide.   Drake received his Ph.D. in Political Science from Columbia University.  Some of his publications include: Editor, Internet Governance: Creating Opportunities for All---The Fourth Internet Governance Forum (United Nations, 2010); Co-Editor, Governing Global Electronic Networks: International Perspectives on Policy and Power (MIT Press, 2008); Editor, Reforming Internet Governance: Perspectives from the UN Working Group on Internet Governance (United Nations, 2005); and Editor, The New Information Infrastructure: Strategies for US Policy (Century Foundation, 1995)."&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-46"&gt;Wolfgang Kleinwächter &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Attending Remotely&lt;/h3&gt;
&lt;ul&gt;
&lt;li class="author-profile" id="user-50"&gt;AHM Bazlur Rahman                               &lt;span class="add-tooltip with-icon" title="Bangladesh NGOs Network for Radio and Communication"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-81"&gt;Alex Comninos                      &lt;a href="http://comninos.org"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;span class="add-tooltip with-icon" title="Doctoral Candidate, Department of Geography, Justus-Liebig University Giessen"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-68"&gt;Baudouin SCHOMBE                      &lt;a href="http://akimambo.unblog.fr"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-56"&gt;chaitanyabd &lt;/li&gt;
&lt;li class="author-profile" id="user-59"&gt;cveraq &lt;/li&gt;
&lt;li class="author-profile" id="user-80"&gt;De &lt;/li&gt;
&lt;li class="author-profile" id="user-70"&gt;encels &lt;/li&gt;
&lt;li class="author-profile" id="user-75"&gt;Fatima Cambronero &lt;/li&gt;
&lt;li class="author-profile" id="user-63"&gt;ganda                      &lt;a href="https://me.yahoo.com/a/NT_ueU1w18ryXb5juaCg6wfMhQ--#cbcd9"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-72"&gt;Hanane &lt;/li&gt;
&lt;li class="author-profile" id="user-13"&gt;Hindenburgo Francisco Pires                      &lt;a href="http://www.cibergeo.org"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-71"&gt;Jorge Gonzalez &lt;/li&gt;
&lt;li class="author-profile" id="user-60"&gt;Julian Casasbuenas G.                      &lt;a href="http://www.colnodo.apc.org"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-67"&gt;Lorna Tingu Makuma &lt;/li&gt;
&lt;li class="author-profile" id="user-54"&gt;Narine Khachatryan                               &lt;span class="add-tooltip with-icon" title="Media Education Center, Armenia"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-76"&gt;natienciso &lt;/li&gt;
&lt;li class="author-profile" id="user-42"&gt;Pitshou Bulembi Ndongala                               &lt;span class="add-tooltip with-icon" title="Groupe de Recherche-Action pour le Développement Intégral"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-58"&gt;richaraix &lt;/li&gt;
&lt;li class="author-profile" id="user-73"&gt;rohanjay                      &lt;a href="http://www.indexoncensorship.org"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-64"&gt;Siranush Vardanyan &lt;/li&gt;
&lt;li class="author-profile" id="user-14"&gt;Sonigitu Asibong Ekpe                      &lt;a href="http://www.crossriverstate.gov.ng"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;span class="add-tooltip with-icon" title="I am from Nigeria, currently working with the Cross River State Ministry of Agriculture and Natural Resources as a Senior Fisheries Officer with an ad-hoc duty as a Project Support Officer [Agriculturist] in the Cross River Farm Credit Scheme. I hold an M.Sc degree in Forestry and Environmental Management    A great advocate for Global Governance, with the Internet serving as a basis to supporting the move from MANIPULATED / GROUPTHINK POWER to COLLECTIVE INTELLIGENCE POWER and ultimately to PUBLIC WISDOM POWER, from the "&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-79"&gt;Susan Coughtrie &lt;/li&gt;
&lt;li class="author-profile" id="user-57"&gt;thierrys &lt;/li&gt;
&lt;li class="author-profile" id="user-69"&gt;vinsolo &lt;/li&gt;
&lt;li class="author-profile" id="user-45"&gt;Virginia Paque                               &lt;span class="add-tooltip with-icon" title="DiplpFoundation"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/best-bits'&gt;https://cis-india.org/news/best-bits&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-06T06:46:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/cloudy-jurisdiction-addressing-the-thirst-for-cloud-data-in-domestic-legeal-processes">
    <title>Cloudy Jurisdiction: Addressing the thirst for Cloud Data in Domestic Legeal Processes</title>
    <link>https://cis-india.org/news/cloudy-jurisdiction-addressing-the-thirst-for-cloud-data-in-domestic-legeal-processes</link>
    <description>
        &lt;b&gt;Elonnai Hickok was a panelist at this workshop held at the IGF in Baku, Azerbaijan on November 7, 2012. The workshop was co-organised by Electronic Frontier Foundation (Peru) and University of Ottawa.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The use of cloud services is rising globally. Cloud computing and  storage are uniquely tailored to take full advantage of our increasingly  networked environment. However, a move to the cloud also entails  tangible challenges as vast repositories of information once kept within  the sacrosanct safety of the home computer are placed on a remote  server in the control of a third party. While the protections of home  storage and processing can be replicated in the cloud, legal norms have  been slow to adopt. Jurisdiction, the classic internet governance  question, is raised in particularly stark contrast in the move to the  cloud, as placing user data can subject that data to the legal access  laws of any (or even many) jurisdictions in the world.&lt;/p&gt;
&lt;p&gt;While  there are indicators that such data is being accessed at increasing and  alarming rates, globally, yet even the dimensions of the problem remain  obscure. What is needed is a set of shared international norms relating  to transparency, data sovereignty and lawful access to private  information. In recent years, however, International forums have  appeared much more eager to adopt international standards for data  access (be it to combat cybercrime, secure critical infrastructure, or  help intellectual property holders uncover alleged infringers of their  rights) than for data sovereignty. Standards need to be developed that  will provide a basis for the special challenges to cross-jurisdictional  privacy that the move to the cloud highlights. This panel will examine  the need for such a cross-jurisdictional framework, what one might look  like, and, importantly, how one might bring such a framework about where  the issue appears to be a low priority for many national governments.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Agenda&lt;/b&gt;&lt;br /&gt; The objective of this panel is to attempt to resolve some of the  trans-border threats to civil liberties that are posed by the move to  the cloud. If a baseline of privacy protection can be assured at the  international level, concerns over limiting data flows on the basis of  jurisdiction will be alleviated. This panel will be divided into two  parts. The first part will discuss some of the challenges raised by the  cloud environment for traditional civil liberties paradigms. The  discussion in part two will be solution-driven—what rules can be put in  place at the international level to alleviate the heightened risk to  privacy and other civil liberties raised by a cloud-centric model.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Part 1: Cloud-based threats to cross-border civil liberties&lt;/b&gt; (45 mins)&lt;br /&gt; This part will discuss some of the challenges to civil liberties arising  from a cross-border cloud-based environment. The panel will be further  sub-divided into 25-30 minutes of panelist input, followed by 15-20  minutes of general discussion. Panelists will be asked to spend 3-5  minutes highlighting what they view as the most pressing of these  challenges may be.&lt;/p&gt;
&lt;p&gt;This might include specific recurring problems that have arisen in  many comparable online contexts, as they relate to the cloud such as,  for example:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; legal obligations to build in intercept capacity into Internet  services (compare CALEA 2.0 efforts in US, Lawful Access in Canada, and  domestic server obligations such as those imposed on RIM by India and  others in order to facilitate access to data that is encrypted in  transit). &lt;/li&gt;
&lt;li&gt; Concerns that many legal regimes permit voluntary conduct without  adequate safeguards for political pressure on companies, particularly  smaller businesses, to comply with requests. &lt;/li&gt;
&lt;li&gt; Inability to challenge surveillance laws because the programs are  shrouded in secrecy, because individuals are never made aware they have  been surveilled, because of standing issues, etc. &lt;/li&gt;
&lt;li&gt; Ability for ‘one-stop access’: cloud centralizes mass amounts of data  in one place. This concentration as well as a general erosion of  traditional criteria designed to ensure surveillance is targeted in a  way that impacts minimally on the general populace. &lt;/li&gt;
&lt;li&gt; Nascent suggestions of informal information sharing arrangements  through MLATs and less transparent more informal arrangements. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Part 2: Adopting protections at the International level&lt;/b&gt; (45 mins.)&lt;br /&gt; The discussion in Part 2 will focus on how some of these problems can be  addressed at the international level by adoption of a set of principled  protections designed to meet the realities of online and specifically  cloud services. The focus is on problem resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Format for Part 2 will mirror that of Part 1. Panelists will be  provided with 3-5 minutes each and asked to present their views on one  or two solutions that can be adopted at the international level to the  problems presented in part 1. The remainder (20-25 minutes) will be  dedicated to general discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is hoped that the discussion will explore specific protections  that might be adopted at the international level, how to advance those  solutions, and what strategies can generally advance these objectives,  on the advocacy front, by use of transparency tools to increase  awareness of some of the issues.&lt;/p&gt;
&lt;p&gt;Questions to think about:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt; Historically, interception of communications received the strongest  protection at law, but it relied to a great extent on the act of  interception coinciding with the communication itself. Should we be  expanding this to other means of communications?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Do we have effective mechanisms to immunize private organizations from  political pressure to voluntarily share information? Particularly, a  lot of small companies can now have a lot of information. Are they well  equipped to resist political pressure&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Does the content/traffic data distinction still hold? Do we need a new  framework for analysing the types of data produced as a natural  byproduct of our online activities?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Can the MLAT regime form the basis for ensuring fundamental rights are  respected in legitimate cross-border surveillance activities? If so,  what would it take to have it reflect a baseline of protections?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Is it feasible to develop and formally adopt detailed limitations on state access at the international or regional level?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Is cloud-based info susceptible to unauthorized state access in new  ways? Is this something the law can fix (mandate encryption in storage  or other safeguards)? Social engineering concerns?&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Background Reading:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; The Draft International Principles on Surveillance &amp;amp; Human Rights: &lt;a href="http://necessaryandproportionate.org/"&gt;http://necessaryandproportionate.org/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Global Network Initiative, "Principles on Freedom of Expression and Privacy", &lt;a href="http://www.globalnetworkinitiative.org/sites/default/files/GNI_-_Principles_1_.pdf"&gt;http://www.globalnetworkinitiative.org/sites/default/files/GNI_-_Principles_1_.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; I. Brown &amp;amp; D. Korff, “Digital Freedoms in International Law”, GNI 2012, &lt;a href="http://wsms1.intgovforum.org/sites/default/files/Digital%20Freedoms%20in%20International%20Law.pdf"&gt;http://wsms1.intgovforum.org/sites/default/files/Digital%20Freedoms%20in%20International%20Law.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; J. McNamee, “Internet Intermediaries: The New Cyberpolice?”, GIS Watch, &lt;a href="http://www.giswatch.org/sites/default/files/gisw_-_internet_intermediaries_-_the_new_cyber_police_.pdf"&gt;http://www.giswatch.org/sites/default/files/gisw_-_internet_intermediaries_-_the_new_cyber_police_.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; A. Escudero-Pascal &amp;amp; G. Hosein, "The Hazards of Technology-Neutral  Policy: Questioning Lawful Access to Traffic Data", (2004) 47(3) ACM  77, &lt;a href="http://web.it.kth.se/%7Eaep/PhD/docs/paper6-acm-1905-reviewed_20021022.pdf"&gt;http://web.it.kth.se/~aep/PhD/docs/paper6-acm-1905-reviewed_20021022.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; HRC, “Protect, Respect and Remedy: A Framework for Business and Human Rights”, April 2008, A/HRC/8/5, &lt;a href="http://198.170.85.29/Ruggie-report-7-Apr-2008.pdf"&gt;http://198.170.85.29/Ruggie-report-7-Apr-2008.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; HRC, “Guiding Principles on Business and Human Rights: Implementing  the United Nations ‘Protect, Respect and Remedy” Framework”, March 2011,  A/HRC/7/31, &lt;a href="http://www.ohchr.org/Documents/Issues/Business/A-HRC-17-31_AEV.pdf"&gt;http://www.ohchr.org/Documents/Issues/Business/A-HRC-17-31_AEV.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; ACLU, “New Justice Department Documents Show Huge Increase in Warrantless Electronic Surveillance”, Sept 2012, &lt;a href="http://www.aclu.org/blog/national-security-technology-and-liberty/new-justice-department-documents-show-huge-increase"&gt;http://www.aclu.org/blog/national-security-technology-and-liberty/new-justice-department-documents-show-huge-increase&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Organiser(s) Name:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Katitza Rodriguez, International Rights Director, Electronic Frontier Foundation (Peru)&lt;/li&gt;
&lt;li&gt; Tamir Israel, Staff Lawyer, Samuelson-Glushko Canadian Internet Policy  and Public Interest Clinic (CIPPIC), University of Ottawa (Canada)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Previous Workshop(s):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposalsReports2010View&amp;amp;wspid=66" title="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposalsReports2010View&amp;amp;wspid=66"&gt;http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=W...&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; &lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=160" title="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=160"&gt;http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=W...&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Submitted Workshop Panelists:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Chair:&lt;/b&gt; Katitza Rodriguez, International Rights Director, Electronic Frontier Foundation; (US/Peru) (Civil Society) / Confirmed&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Ian Brown, Senior Research Fellow, Oxford Internet Institute (EU) (Academic) / Confirmed&lt;/li&gt;
&lt;li&gt; Bertrand de la Chapelle, Program Director at International Diplomatic Academy (EU) (Civil Society) / Confirmed&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Marc Crandall, Global Compliance, Google (US) (Private Sector)&lt;/li&gt;
&lt;li&gt; Elonnai Hickok, Policy Associate, Centre for Internet &amp;amp; Society (India) (Civil Society) /Confirmed&lt;/li&gt;
&lt;li&gt; Sophie Kwasny, Head of Data Protection Unit, Data Protection &amp;amp; Cybercrime Division, Council of Europe (IGO) / Confirmed&lt;/li&gt;
&lt;li&gt; Bruce Schneier, Chief Security Technology Officer of BT (US) (Private Sector) / Confirmed&lt;/li&gt;
&lt;li&gt; Wendy Seltzer, Policy Counsel, W3C (US) (Technical Community) / Confirmed&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Name of Remote Moderator(s):                                        Paul Muchene, iHub Nairobi (Kenya) (Private Sector)                               Assigned Panellists:                                        &lt;a href="http://wsms1.intgovforum.org/2012/panellist/de-la-chapelle-bertrand"&gt;de La Chapelle - Bertrand&lt;/a&gt; &lt;a href="http://wsms1.intgovforum.org/2012/panellist/rodriguez-katitza"&gt;Rodriguez - Katitza&lt;/a&gt; &lt;a href="http://wsms1.intgovforum.org/2012/panellist/brown-ian"&gt;Brown - Ian&lt;/a&gt; &lt;a href="http://wsms1.intgovforum.org/2012/panellist/schneier-bruce"&gt;Schneier - Bruce&lt;/a&gt; &lt;a href="http://wsms1.intgovforum.org/2012/panellist/kwasny-sophie"&gt;KWASNY - Sophie&lt;/a&gt; &lt;a href="http://wsms1.intgovforum.org/2012/panellist/seltzer-wendy"&gt;Seltzer - Wendy&lt;/a&gt; &lt;a href="http://wsms1.intgovforum.org/2012/panellist/crandall-marc"&gt;Crandall - Marc&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/cloudy-jurisdiction-addressing-the-thirst-for-cloud-data-in-domestic-legeal-processes'&gt;https://cis-india.org/news/cloudy-jurisdiction-addressing-the-thirst-for-cloud-data-in-domestic-legeal-processes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-09T01:00:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindustan-times-india-news-new-delhi-nov-3-2012-power-to-youth">
    <title>Power to youth</title>
    <link>https://cis-india.org/news/hindustan-times-india-news-new-delhi-nov-3-2012-power-to-youth</link>
    <description>
        &lt;b&gt;The inclusion of young politicians in the recent reshuffle saw the average age of the Union Cabinet come down. But this is just the tip of the iceberg. Across sectors, a new order is emerging as the next generation takes over the reigns. It has been one of our biggest paradoxes - a country which has one of the youngest populations in the world has not been harnessing the energy, verve and change-making abilities of its young.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article &lt;a class="external-link" href="http://www.hindustantimes.com/India-news/NewDelhi/Power-to-youth/Article1-954476.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on November 3, 2012 names Sunil Abraham and Lawrence Liang as some of the young people who are shaping the future...&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Cabinet reshuffle saw the elevation of younger politicians to the higher echelons of power, but these new appointments symbolise the coming of age of an entire generation. Across other sectors too - business, entertainment, activism, publishing - the young are slowly but surely assuming power and extending their influence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These people are in positions to change the way we live, think, work and play. The future is here. Here's a look at some of those who are shaping it...&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1) Sachin Pilot, 35, corporate affairs minister&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;He is the youngest minister in UPA-II and a two-term MP. He recently became an officer in the Territorial Army. In the cabinet reshuffle, he was elevated to minister of state with independent charge of corporate affairs. He promised to look into corporate irregularities and wants corporate affairs to be an enabling ministry that reduces red tape.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2) Jyotiraditya Scindia, 41, power minister&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;He is a three-time MP. He has done much for his state, Madhya Pradesh, including computerising state post offices, strengthening BSNL services, setting up industries, and constructing roads. He recently took over the power ministry (independent charge) and said that rural electrification and fuel generation are his priorities.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/strip.png" alt="leaders" class="image-inline" title="leaders" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3) Arvind Kejriwal, 44, activist-turned-politician&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;An IIT-Kharagpur graduate, he worked for the revenue service before becoming an activist. He joined the RTI movement. In 2006, set up his own NGO and was awarded the Ramon Magsaysay award for his contribution to RTI. In 2011, he successfully planned Anna Hazare's Lokpal movement. He recently launched his own political party.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4) Siddharth Roy Kapur, 38, MD, UTV Studios&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;One of the most powerful people in Indian entertainment, he was responsible for many hit films under the UTV banner including Jodhaa Akbar, Fashion, Dev D, Kaminey, Raajneeti, Udaan, Peepli [Live], Delhi Belly and in 2012, Paan Singh Tomar and India's entry to the Oscars, Barfi. He has also been instrumental in the strategic tie-up with Disney.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5) Manish Tewari, 47, Union I&amp;amp;B minister&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;Tewari is a first-time MP. He joined the Youth Congress in 1981 and became its president in 1998. After 2008, he became a popular choice to publicly articulate the party's views. In the reshuffle, he was given the information &amp;amp; broadcasting ministry with independent charge. He has set cable digitisation and the problem of paid news high on his agenda.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6) Cyrus Mistry, 43, deputy chairman, Tata Sons &lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;Mistry will be 44 in December when he takes over Ratan Tata's mantle at Bombay House. He joined Shapoorji Pallonji &amp;amp; Co as director in 1991. He is considered more of an 'insider' in the Tata Group. A graduate of Imperial College, UK and London Business School, he has stayed away from the limelight for much of his career, not unlike Tata.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7) JBS Sangha, 44, agricultural entrepreneur&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;From a mere seven acres, his business has grown to 5500 acres, producing 55,000 tonnes of potatoes annually. A poster boy of Indian agriculture and a student of plant breeding, he took his father's business to a new heights using cutting-edge biotechnology. He uses newer cold storage techniques and opted for eco-friendly pest control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8) Deepinder Goyal, 29, founder-CEO, Zomato.com&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;An IIT Delhi graduate, Goyal launched Foodiebay.com in 2008 as an online database of restaurant menus from the NCR. The site, now famous as Zomato.com, is India's largest online restaurant guide covering over 40,000 restaurants in 12 cities. The site even has smartphone applications for Apple, Windows, Android and Blackberry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9) Anurag Kashyap, 40, film director&lt;br /&gt;&lt;/b&gt;One of  the most revered new-age directors of Indian cinema, Kashyap has  transformed the way Bollywood movies are perceived. He has been  instrumental in merging genres of realistic art-house cinema and  mainstream commercial song-drama films. With powerful films such as  Black Friday, Dev D, Gulaal and Gangs of Wasseypur, Kashyap is now  recognised as a bankable film maker.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10) Ajay Dubey, 37, RTI and environmental activist&lt;br /&gt;&lt;/b&gt;A  Chhatisgarh resident, Dubey took the case of tiger conservation to its  logical conclusion - a ban on tiger tourism in core areas. After his  management degree, he took up activism and set up his own NGO, Prayatna,  which started its first campaign for a ban on polythene. Of late, he  has taken to legal advocacy fighting diverse cases such as environmental  laws in mining, police reforms and other issues.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;11) Shantanu Prakash, 47, founder, Educomp&lt;br /&gt;&lt;/b&gt;He  founded Educomp Solutions Ltd in 1994 after graduating from IIM-A. He  began by setting up computer labs in schools on borrowed money. Educomp  is a first-of-its-kind teacher-led educational content-based solution  designed to improve learning. Featured in the Forbes 'Best Under a  Billion' list, Prakash runs 27 offices worldwide working with over  26,000 schools and 15 million students.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12) Sachin Bansal, 31, CEO and co-founder of Flipkart&lt;br /&gt;&lt;/b&gt;In 2007, Sachin and Binny Bansal (29) - pooled together  Rs. 4  lakh to start an online bookstore, Flipkart.com. The venture was a high  risk. But the Bansals (not related), IIT Delhi graduates, realised that  quality of service was key - a lesson they learnt as engineers at  Amazon.com. Four years down the line, Flipkart has roped in millions of  dollars in investment becoming a successful e-retail store.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13) Hibi Eden, 29, green activist-MLA&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;Eden is the youngest of Kerala's green brigade of six young legislators who cried foul when the Planning Commission's Montek Singh Ahluwalia said Kerala should utilise its paddy fields for non-agricultural purposes. They started healthy debates on the environment, deforestation and criminalisation of politics. Their persistent campaign has forced the establishment to dump many environmentally hazardous programmes.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/influential.png" alt="influential" class="image-inline" title="influential" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14) Akhilesh Yadav, 39, UP chief minister&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;He is the youngest ever CM of UP and the son of Samajwadi Party chief, Mulayam Singh Yadav. He has been widely credited with the party's thumping victory in the state assembly elections this year increasing their seats from 97 in 2007 to 224. He has attempted to move away from the image of 'goonda raj' (thug rule) which critics thought characterised Samajwadi's earlier regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;15) Jeh Wadia, 37, managing director, GoAir&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;Wadia inherited an empire from his parents, Nusli and Maureen, and became one of the youngest chiefs in the aviation sector when he started GoAir, a low-cost airline, in 2005. He is currently the managing director of the 132-year-old textiles and retail business, Bombay Dyeing. He also sits on the boards of Brittania and Bombay Burmah. In 2008, the World Economic Forum elected him as a Young Global Leader.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;16) Rakesh Senger, 38, child rights activist&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;Senger has saved a generation of children from exploitation - child labour, trafficking, organ trade and begging. A decade and a half into his calling, he helps the police raid places involved in child labour, disguises himself as a beggar to crack the children beggar mafia, and lobbies for children-friendly policies. His vision, with his organisation Bachpan Bachao Andolan, is to see every child in school.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;17) VK Karthika, 44, chief editor-publisher, Harper Collins India&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;Karthika began her career as an editorial assistant at Penguin India after dropping out of JNU 15 years ago. She steered Harper Collins to its current position as a leading English-language publisher in India. Under her lead, Harper Collins has published successful writers like Rana Dasgupta (Solo), Manu Joseph (Serious Men) and Hussain Naqvi (Homeboy) and has nurtured a great deal of fresh writing talent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;18) Anurag Thakur, 38, MP and president, Bharatiya Janata Yuva Morcha &lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;As a cricket administrator, he has put Himachal Pradesh on the world 'cricket map' by aiding the construction of a cricket stadium in Dharamsala, which has hosted three editions of the IPL. He is also promoting other games actively. "I see India as young nation with a billion dreams, ready to lead and inspire the world," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;19) Sunil Abraham, 39, executive director, Centre for Internet and Society&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;He started CIS in 2008 to deal with digital pluralism, public accountability and pedagogic practices. In 1998, he founded Mahiti, an IT and communication solutions firm. He was elected an Ashoka fellow to explore the internet's democratic potential. His activism focuses on limitations of the intellectual property rights regime, emerging alternatives and piracy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;20) Raj Thackeray, 44, founder, Maharashtra Navnirman Sena&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;He started his political career with his uncle and Shiv Sena-head Bal Thackeray, but left in 2006 to form the MNS. His politics is defined by protests against migrants, particularly from UP and Bihar. Thackeray and his party have been criticised for using violence and he faces several charges for incitement. His popularity rose after he won substantial votes in the recently held municipal elections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;21) Riyaaz Amlani, 37, CEO &amp;amp; MD, Impresario Entertainment &amp;amp; Hospitality &lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;He runs more than 27 establishments including the likes of Salt Water Cafe, Mocha and Smoke House Grill across eight cities. An entertainment management graduate from UCLA, Amlani returned to develop Mumbai's first go-karting track. He worked with Pritish Nandy Communications before starting Impresario Entertainment &amp;amp; Hospitality, the company that owns the Mocha Cafè chain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;22) Lawrence Liang, 37, co-founder, Alternative Law Forum&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;Liang emerged as a voice against politics of "intellectual property". He is an Indian-Chinese legal researcher based in Bangalore and is known for his legal campaigns on public issues. Started in 2000, his forum provides legal support to people without access to legal services. It also conducts research on globalisation, urban studies, gender and intellectual property.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;23) Francisco D'Souza, 43, CEO, Cognizant&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;D'Souza helped found the Nasdaq-100 company in 1994 and took over as CEO in 2007. During his tenure as Cognizant's CEO, revenues have grown from $1.4 billion to over $6 billion and the company has emerged as one of India's fastest growing tech companies. A son of an Indian diplomat, Francisco has lived in nine different countries and obtained his MBA degree from Carnegie-Mellon University.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;24) Rohini Iyer, 32, MD, Raindrop Media&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;Her company is one of India's largest publicity firms. Most Bollywood A-listers are her clients and she is the publicist for three leading ladies - Katrina Kaif, Kareena Kapoor and Vidya Balan. Her other clients include Ranbir Kapoor, Abhishek Bachchan and John Abraham. Iyer has been featured in the Verve Power List, as well as Femina's list of 25 most powerful women in India, from the field of entertainment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;25) Milind Deora, 35, MoS telecom &amp;amp; IT&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;One of the youngest members of Lok Sabha, Deora was given additional charge of shipping in the recent Cabinet reshuffle. He says, "I think young people alone can't solve India's problems. There should be a good mix of experienced and young minds to bring about reforms and improve administration." He says he will work for making India a hub for ship maintenance and is also going to push for reforms in the telecom sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;26) Lakshmi Venu, 29, executive-director, Sundaram Clayton&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;The daughter of TVS chairman Venu Srinivasan, Lakshmi is a topper from the Sishya School, Chennai, a Yale graduate and a PhD from the University of Warwick. She started as a management trainee in Sundaram Auto Components, a subsidiary of Sundaram Clayton, in 2003. She won her current position the hard way. She also had a stint with TVS Motor, another sub-division of the company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27) SK Mahto, 38, deputy CM, Jharkhand&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;Head of the All Jharkhand Students Union Party, an ally in the BJP-led ruling coalition, he has been a minister in each government since Jharkhand's creation in 2000. His biggest achievements have been smooth conduct of the panchayat polls held in the state in 2009 after a gap of 29 long years and the 34th National Games held there last year. He is the undisputed leader of his party, which has six members in the state assembly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;28) Dhruv Ghanekar, 38, co-founder, Blue Frog &lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;A composer by profession, he has co-created 3000 projects for ad films and alternative movies. His 2009 solo album Distance was a huge success. He has performed with famous musicians like Karl Peters, Louis Banks, Adrian D'Souza, Ustaad Zakir Hussain, AR Rahman, Etienne M'Bappe and Louis Banks. He now awaits the release of Broken Thread, an international film for which he has recorded music.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;29) Chiki Sarkar, 35, Publisher, Penguin India&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;An Oxford graduate, Sarkar worked at Bloomsbury Publishing in London for seven years. In 2006, she became Editor-in-Chief of Random House India. Her picks that became award-winners include Shehan Karunatilaka's Chinaman, Mohammed Hanif's A Case of Exploding Mangoes and Aman Sethi's A Free Man. Last year, she took over as head of Penguin Books, India's largest English-language publishing house.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;30) Glenn Saldanha, 41, CMD, Glenmark Pharmaceuticals&lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;Saldanha joined the company after his father's demise in 1998 and became MD and CEO in 2001. Within a few years, he has transformed the company from just a local generics business to a research and innovation driven organisation. He has personally strategised the company's emergence as a leader in the discovery of new molecules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;31) Anirban Das Blah, 34, MD, CAA KWAN &lt;/b&gt;&lt;b&gt;&lt;br /&gt; &lt;/b&gt;KWAN is one of India's largest celebrity management firms. Under Blah's leadership, it tied up with Creative Artists Agency, the world's largest entertainment and sports agency. He specialises in motion films, television, music, commercial endorsements, sports consulting, licensing and merchandising. He represents many rising stars including Frieda Pinto, Dev Patel and other Indian celebrities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Compiled by: Aurangzeb Naqshbandi, B Vijay Murty, Gaurav Choudhury,  KV Lakshmana, Manjula Narayan, Nagendar Sharma, Naveen Ammembala, Neha  Sharma, Neyaz Farooquee, Panna Saroopa, Rahul Noronha, Rajeev Bhaskar,  Ranjan Srivastava, Samar Khurshid and Swati Chitnis.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;b&gt;This list is not in order of any ranking. The people chosen  for this list are below 50 in age (except entertainment, where the  cut-off age has been kept at 40 years).&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindustan-times-india-news-new-delhi-nov-3-2012-power-to-youth'&gt;https://cis-india.org/news/hindustan-times-india-news-new-delhi-nov-3-2012-power-to-youth&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-11-06T06:10:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu">
    <title>Indian Government's Submission to ITU</title>
    <link>https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu</link>
    <description>
        &lt;b&gt;The following is the text of the submission made by the Government of India to the World Conference of International Telecommunications, Dubai on November 3, 2012. This is the final version of a draft that was circulated earlier.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Read the &lt;a class="external-link" href="http://http//cis-india.org/internet-governance/blog/reaction-to-draft-proposal-from-india-on-final-draft-itr-document-of-itu"&gt;detailed comments&lt;/a&gt; on India's draft proposal on the Proposed Amendments to the ITU’s ITR’s – November 3, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p align="LEFT"&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt; &lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;
World Conference on International&lt;br /&gt;Telecommunications (WCIT-12)&lt;br /&gt;Dubai, 3-14 December 2012&lt;/th&gt; &lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;img class="image-inline" src="../resources/resolveuid/2b2aa8d8eaa543589c198514e272696f" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p align="LEFT"&gt;&lt;span&gt;&lt;span&gt;PLENARY MEETING&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;th&gt;Document 21-E&lt;br /&gt;3 November 2012&lt;br /&gt;Original: English&lt;br /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="CENTER"&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;India (Republic of)&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: center; "&gt;PROPOSALS FOR THE WORK OF THE CONFERENCE&lt;/p&gt;
&lt;p align="LEFT"&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt; &lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;We recognise and appreciate the efforts of  International Telecommunication Union in preparing the Draft on proposed  ITRs for WCIT 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  attached proposal is developed through a consultation process involving  various stakeholder groups, both, in Indian Public and Private sectors.   Due consideration has been given to the existing legislations and  government policies in the preparation of this proposal. We acknowledge  that since 1988, there have been significant changes and challenges in  Telecommunications / ICTs in terms of Technological breakthroughs, New  Services and Market Structure. Acknowledging this fact, India’s proposal  is offered in the form of addition (ADD) or modification (MOD) only on  some of the relevant proposals, by giving reference to the appropriate  CWG/4/XXX number mentioned in the Annex 2 of the ITU Document  4(Add.2)-E. Considering the magnitude of issues in International  Telecommunications, India may take appropriate stand on other provisions  of the draft ITR document during the WCIT discussions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further,  the proposals from different regions to the conference as well as its  preparatory process were carefully studied. In order to help the  conference achieve a consensus on the various issues being discussed,  the content of this proposal has been largely drawn from the output of  the Council Working Group on WCIT (WCIT/4 Add.2 ” Draft of the future  ITRs”).&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;A new proposal on &lt;i&gt;5A: Confidence and Security of Telecommunications/ICTs&lt;/i&gt; is also included as India believes that an international framework on Security is of importance in today’s connected world.&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;b&gt; INTERNATIONAL TELECOMMUNICATION&lt;br /&gt;REGULATIONS&lt;/b&gt;&lt;br /&gt;&lt;b&gt;PREAMBLE&lt;/b&gt;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;MOD&lt;/p&gt;
&lt;/th&gt;
&lt;td&gt;IND/21/1&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1&lt;/b&gt; While the sovereign right of each Member State to regulate its  telecommunications is fully recognized, the provisions of the present  International Telecommunication Regulations (hereinafter “Regulations”)  complement the Constitution and Convention of the International  Telecommunication Union, with a view to attaining the purposes of the  International Telecommunication Union in promoting the development of  telecommunication services and their most efficient operation while  harmonizing the development of facilities for world-wide  telecommunications.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/3&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 1&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;Purpose and Scope of the Regulations&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3A&lt;/b&gt; &lt;i&gt;c)&lt;/i&gt; These Regulations recognize that Member States should endeavour to take  the necessary measures to prevent interruptions of services and ensure  that no harm is caused by their operating agencies to the operating  agencies of other Member States which are operating in accordance with  the provisions of these Regulations.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/12&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/3&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3B&lt;/b&gt; &lt;i&gt;d)&lt;/i&gt; These Regulations recognize the absolute priority for safety of life  telecommunications, including distress telecommunications, emergency  telecommunications services and telecommunications for disaster relief  as provided in Article.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/14&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 2&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;Definitions&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/4&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14A&lt;/b&gt; 2.1A	&lt;i&gt;Telecommunication/ICT: &lt;/i&gt;Any  transmission, emission or reception, including processing, of signs,  signals, writing, images and sounds or intelligence of any nature by  wire, radio, optical or other electromagnetic systems, having a bearing  on Telecommunication Technologies and Services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/48&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/5&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27A &lt;/b&gt;2.11	&lt;i&gt;Transit rate&lt;/i&gt;: a rate set by the point of transit in a third country (indirect relation).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/74&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27C &lt;/b&gt;2.13	&lt;i&gt;Spam&lt;/i&gt;:  information transmitted over telecommunication networks as text, sound,  image, tangible data used in a man-machine interface bearing  advertizing nature or having no meaningful message, simultaneously or  during a short period of time, to a large number of particular  addressees without prior consent of the addressee (recipient) to receive  this information or information of this nature.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/78&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27D &lt;/b&gt;2.14	&lt;i&gt;Hub&lt;/i&gt;:  a transit center (or network operator) that offers to other operators a  telecommunication traffic termination service to nominated destinations  contained in the offer.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/80&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27E &lt;/b&gt;2.15	&lt;i&gt;Hubbing&lt;/i&gt;:  the routing of telecommunication traffic in hubbing mode consists in  the use of hub facilities to terminate telecommunication traffic to  other destinations.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/82&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/9&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27F &lt;/b&gt;2.16	&lt;i&gt;Network fraud&lt;/i&gt;:  (fraud on international telecommunication networks): The causing of  harm to operating agencies or to the public, the wrongful obtaining of  gain in the provision of international telecommunication services  through abuse of trust or deception, including through inappropriate use  of numbering resources.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/87&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/10&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27G &lt;/b&gt;2.17	&lt;i&gt;Global telecommunication service (GTS)&lt;/i&gt;:  A service which enables communication to be established through a  global number between subscribers whose physical location and national  jurisdiction have no bearing on the tariff to be set for the service’s  use; which satisfies and complies with recognized and accepted  international standards; and which is provided over the public  telecommunication network by operating agencies having obtained the  relevant numbering resources from ITU-T.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/89&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/11&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27H &lt;/b&gt;2.21	&lt;i&gt;Originating Identification&lt;/i&gt;:  The Originating Identification is the service by which the terminating  party shall receive the identity information in order to identify the  origin of the communication.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/81&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/12&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27L &lt;/b&gt;2.25	&lt;i&gt;Stability of the international telecommunication network&lt;/i&gt;:  The capability of the international telecommunication network to carry  international traffic in the event of failure of telecommunication nodes  or links and also in the face of internal and external destructive  actions and to return to its original state.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/99&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/13&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27M &lt;/b&gt;2.26	&lt;i&gt;Security of the international telecommunication network&lt;/i&gt;:  The capability of the international telecommunication network to  withstand internal and external destabilizing actions liable to  compromise its functioning.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/101&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/14&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27N &lt;/b&gt;2.27	&lt;i&gt;International&lt;/i&gt; &lt;i&gt;Roaming&lt;/i&gt;:  Provision to the subscriber of the opportunity to use telecommunication  services offered by other operating agencies of other member states,  with which the subscriber has not concluded an agreement.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/103&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/15&lt;/p&gt;
&lt;p&gt;&lt;b&gt;27O &lt;/b&gt;2.28	&lt;i&gt;IP interconnection: &lt;/i&gt;IP interconnection refers to means and rules employed to ensure the delivery of IP traffic through different networks.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/105&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/16&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27P &lt;/b&gt;2.29	&lt;i&gt;End to end quality of service delivery and best effort delivery: &lt;/i&gt;End  to End quality of service delivery refers to the delivery of PDU  (Packet Data Unit) with predefined end-to-end performance objectives;  Best-effort delivery refers delivery to of a PDU without predefined  performance targets.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/107&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 3&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;International Network&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/17&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;31A &lt;/b&gt;3.5 	Member States shall ensure that international naming, numbering,  addressing and identification resources are used only by the assignees  and only for the purposes for which they were assigned; and that  unassigned resources are not used.  The provisions of the relevant ITU-T  Recommendations shall be applied.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/134&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/18&lt;/p&gt;
&lt;p&gt;&lt;b&gt;31B &lt;/b&gt;3.6	International calling party number delivery shall be provided in accordance with relevant ITU-T Recommendations.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/142&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 4&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;International Telecommunication Services&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/19&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;34&lt;/b&gt; 4.3	Subject to national law, Member States shall endeavour to ensure  that operating agencies provide and maintain, to the greatest extent  practicable, a satisfactory quality of service corresponding to the  relevant ITU-T Recommendations with respect to:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/168&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/20&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;35&lt;/b&gt; &lt;i&gt;a)&lt;/i&gt; access to the international network by users using terminals which are  permitted to be connected to the network and which do not cause harm or  diminish the level of safety and security of technical facilities and  personnel;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/174&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/21&lt;/p&gt;
&lt;p&gt;&lt;b&gt;36&lt;/b&gt; &lt;i&gt;b)&lt;/i&gt; international telecommunication facilities and services available to customers for their use;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/176&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/22&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;37&lt;/b&gt; &lt;i&gt;c)&lt;/i&gt; at least a form of telecommunication service which is reasonably  accessible to the public, including those who may not be subscribers to a  specific telecommunication service; and&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/179&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/23&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38&lt;/b&gt; &lt;i&gt;d)&lt;/i&gt; a capability for interworking between different services, as  appropriate, to facilitate international telecommunication services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/181&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/24&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38A &lt;/b&gt;4.4 	Member States shall ensure that operating agencies providing  international telecommunication services, including roaming, make  available to subscribers information on tariffs and taxes. Each  subscriber should be able to have access to such information and receive  it in a timely manner and free of charge when roaming (entering into  roaming), except where the subscriber has previously declined to receive  such information.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/188&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/25&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38B &lt;/b&gt;4.5 	Given the particular characteristics of GTS, which allows subscribers  to have a worldwide number, implement GTSs in accordance with the  National regulations.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/195&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/26&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38E &lt;/b&gt;4.8 	Member States, subject to national security requirements, may foster  the establishment of mutual agreements on mobile services accessed  within a predetermined border zone in order to prevent or mitigate  inadvertent roaming charges.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/201&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 5&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;Safety of Life and Priority of Telecommunications&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/27&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;39&lt;/b&gt; 5.1	Safety of life telecommunications, including distress  telecommunications, emergency telecommunication services and  telecommunications for disaster relief, shall be entitled to  transmission as of right and shall, where technically practicable, have  absolute priority over all other telecommunications, in accordance with  the relevant Articles of the Constitution, Convention and relevant ITU-T  Resolutions and Recommendations.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/204&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/28&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;41B &lt;/b&gt;5.5 	Member States should cooperate to introduce in addition to their  existing national emergency numbers, a global number for calls to the  emergency services globally.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/217&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/29&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;41C &lt;/b&gt;5.6 	Member States shall ensure that operating agencies inform every roaming  subscriber of the number to be used for calls to the emergency  services, while entering into roaming, free of charge.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/219&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/30&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 5A&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;Confidence and security of telecommunications/ICTs&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/221&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/31&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;41D&lt;/b&gt; 5A1.	Member‐States shall have the right to take appropriate measures to  protect and Secure the  ICT Network infrastructure and data contained   in or flowing through the Network and also to  prevent the misuse of ICT  network and services within their state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5A2.	 The Member States should endeavour to take appropriate measures,  individually or in cooperation with other Member states, to ensure  Security of the ICT Network and information, including user information,   contained in or flowing through the ICT network within their  jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5A3.	 Member‐States  should endeavour to oversee that Operating Agencies  in  their territory do not engage in activities which impinge on the  security and integrity of ICT  network such as denial of service attack,  unsolicited electronic communication (spam), unsolicited access to  network elements and devices etc., to enable  effective functioning of  ICTs in secure and trustworthy conditions.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;a name="id.tyjcwt"&gt;&lt;/a&gt; 5A4.	 Member States  should endeavour to cooperate to harmonize national laws,  jurisdictions, and practices in the relevant areas.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; Combined proposal on clauses proposed from &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/222 &lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;to&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt; 232&lt;/a&gt;&lt;/span&gt; in 5A and 5B.&lt;/p&gt;
&lt;p align="CENTER"&gt;Article 6&lt;/p&gt;
&lt;p align="CENTER"&gt;&lt;b&gt;Charging and Accounting&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/32&lt;/p&gt;
&lt;p&gt;&lt;b&gt;43A&lt;/b&gt; 6.1.1A	Cost of International Roaming Services&lt;/p&gt;
&lt;p&gt;a)	Member States shall encourage competition in the international roaming market;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b)	Member States are encouraged to cooperate to develop policies for reducing charges on international roaming services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/243&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MOD&lt;/b&gt; IND/21/33&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;45&lt;/b&gt; 6.1.3	Member States are free to levy fiscal taxes on international  telecommunication services in accordance with their national laws;  however, the Member States should endeavour to avoid international  double taxation on such services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/249&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/34&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54E&lt;/b&gt; 6.10	Subject to national law, Member States shall ensure that Operating  Agencies collaborate in preventing and controlling fraud in  international telecommunications by:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;–	 Identifying and transmitting to the transit and destination Operating  Agencies the pertinent information required for the purposes of payment  for the routing of international traffic, in particular the originating  Country Code, National Destination Code and the Calling Party Number.&lt;/p&gt;
&lt;p&gt;–	Following up requests of other Member States or their Operating  Agencies to investigate calls that cannot be billed, and helping to  resolve outstanding accounts.&lt;/p&gt;
&lt;p&gt;–	Following up requests of other Member States or their Operating  Agencies to identify the source of calls originated from their  territories exerting potential fraudulent activity.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/287&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/35&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54F&lt;/b&gt; 6.11	The ITU Standardization Sector shall be responsible for  disseminating the regulatory frameworks in place in administrations  having an impact on matters related to fraud.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/289&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/36&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54H&lt;/b&gt; 6.12A	Member States shall foster the establishment of international  roaming mobile services prices based on principles of reasonability,  competitiveness and non-discrimination relative to prices applied to  local users of the visited country.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/293&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/37&lt;/p&gt;
&lt;p&gt;&lt;b&gt;54K&lt;/b&gt; 6.14	Member States should foster continued investment in high-bandwidth infrastructures.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/299&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/38&lt;/p&gt;
&lt;p&gt;&lt;b&gt;54L&lt;/b&gt; 6.15	Member States shall promote cost-oriented pricing.   Regulatory measures may be imposed to the extent that this cannot be  achieved through market mechanisms and to the extent that such measures  do not hinder competition.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/301&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/39&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54N&lt;/b&gt; 6.17	Member States shall promote transparency of end-user prices, in  particular to avoid surprising bills for international services (e.g  mobile roaming and data roaming).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/305&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/40&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54S&lt;/b&gt; 6.D	Member States should endeavour to take measures to ensure that an  adequate return is provided on investments in network infrastructures in  identified areas.  If this cannot be achieved through market  mechanisms, then other mechanisms may be used.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/315&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/41&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54O&lt;/b&gt; 6.18	Member States should consider measures to favour special interconnection rates for landlocked countries.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/307&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/42&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;54P&lt;/b&gt; 6.18A	Member States should endeavour that Recognized Operating Agencies  establish charging units and parameters that bill telecommunication  service consumers according to what is effectively consumed.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/309&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/43&lt;/p&gt;
&lt;p&gt;&lt;b&gt;54R&lt;/b&gt; 6.20	Rendering and Settlement of Accounts&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6.20.1 	The settlement of international accounts shall be regarded as current  transactions and shall be effected in accordance with the current  international obligations of the Member States and Sector Members  concerned in those cases where their governments have concluded  arrangements on this subject. Where no such arrangements have been  concluded, and in the absence of special agreements made under Article  42 of the Constitution, these settlements shall be effected in  accordance with the Administrative Regulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6.20.2 	Administrations of Member States and Sector Members which operate  international telecommunication services shall come to an agreement with  regard to the amount of their debits and credits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6.20.3 	The statement of accounts with respect to debits and credits referred  to in No. 498 above shall be drawn up in accordance with the provisions  of the Administrative Regulations, unless special arrangements have been  concluded between the parties concerned.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; The text is taken from CV 497, 498 and 499. This proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;CWG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;/4&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;A&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0004/en"&gt;2/313&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;ADD&lt;/b&gt; IND/21/44&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;57B&lt;/b&gt; Member States shall encourage the provision of global services based on  international standards that ensure accessible telecommunications and  ICT services to persons with disabilities.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reasons:&lt;/b&gt; This Proposal is based on &lt;span&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0005/en"&gt;HNG&lt;/a&gt;&lt;a href="http://www.itu.int/md/S12-WCIT12-C-0005/en"&gt;/5/2&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu'&gt;https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-09T00:48:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/privatisation-of-censorship">
    <title>The Privatisation of Censorship: The Online Responsibility to Protect Free Expression</title>
    <link>https://cis-india.org/news/privatisation-of-censorship</link>
    <description>
        &lt;b&gt;Pranesh Prakash was a panelist at this workshop organised on November 5, 2012. It was organized by Index on Censorship.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Much is known about state censorship,  but increasingly private corporations are implementing censorship either  at the behest of governments, or as part of a ‘walled garden’ approach.  This censorship takes many guises: whether the proactive take-down of  entirely legal material, the blocking of websites by overly zealous  ISPs, mobile filters that cut access to websites such as Index on  Censorship and the use of surveillance technology on behalf of  autocratic states. The combination of state-led censorship with the  privatisation of censorship requires a debate on the responsibilities of  corporations and the framework needed to protect free expression  online.&lt;br /&gt;&lt;br /&gt;This side session will focus on two key areas:&lt;br /&gt;1. Take-down, blocking and filtering of content&lt;br /&gt;2. The export of surveillance technology, privacy&lt;br /&gt;&lt;br /&gt;The  panel will explore the ways in which the above can affect free  expression online, and how civil society, governments and corporations  can and should approach these issues, addressing the following  questions:&lt;br /&gt;&lt;br /&gt;1. Whether, why and in what ways censorship and  surveillance is either as or more pervasive, intrusive and chilling than  offline, and the impact on free speech and press freedom?&lt;br /&gt;2. The  inappropriate, intrusive or excessive use of filters and firewalls  including how these impact directly and indirectly on access to media  and the nature of news provision&lt;br /&gt;3. Criminalisation of free speech  and free expression – chilling use of takedown requests (impacting on  public online debates, on media freedom including investigative  journalism), and constraints on comment and debate (twitter, trolls,  comment threads etc);&lt;br /&gt;4. Excessive and blanket surveillance and data-gathering&lt;br /&gt;5. Regulations and laws including intermediary responsibility that curtail digital free speech&lt;br /&gt;&lt;br /&gt;Chair:&lt;br /&gt;Michael Harris, Head of Advocacy, Index on Censorship&lt;br /&gt;&lt;br /&gt;Panelists:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Dr Hosein Badran, Regional Chief Technology Officer, Cisco Systems International, covering MENA&lt;/li&gt;
&lt;li&gt;Pranesh Prakash, Policy Director at the Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Abhilash Nair, Northumbria University, UK&lt;/li&gt;
&lt;li&gt;Camino  Manjon Sierra, International Relations Policy Officer, Directorate  General for Communications Networks, Content and Technology, European  Commission&lt;/li&gt;
&lt;li&gt;Andrew Puddephatt, Global Partners and Associates&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/privatisation-of-censorship'&gt;https://cis-india.org/news/privatisation-of-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-09T01:48:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
