<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2461 to 2475.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-may-6-2014-laxmi-ajai-prasanna-civil-society-pushes-for-privacy-panel"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hivos-october-31-2013-civil-society-and-internet-governance-practices-southeast-asia-and-beyond"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-nov-23-2012-shalini-singh-civil-society-and-industry-oppose-indias-plans-to-modify-itrs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/intgovforum-cms-w2012-proposals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/jessica-corbett-common-dreams-february-5-2019-civil-liberties-groups-warn-proposed-eu-terrorist-content-rule-threat-democratic"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/information-technology-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-june-9-2018-draft-bill-seeks-to-revolutionise-data-collection-storage-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/citizens-forums-want-UID-scrapped"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/citizen-engagement-framework-for-e-governance-projects-and-framework-and-guidelines-for-use-of-social-media-by-government-agencies"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-at-igf-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/tanaya-rajwade-elonnai-hickok-and-raouf-kundil-peedikayil-october-31-2019-comments-to-christchurch-call"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ciss-comments-on-the-ccwg-accountability-draft-proposal"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-may-6-2014-laxmi-ajai-prasanna-civil-society-pushes-for-privacy-panel">
    <title>Civil Society Pushes for Privacy Panel</title>
    <link>https://cis-india.org/news/the-times-of-india-may-6-2014-laxmi-ajai-prasanna-civil-society-pushes-for-privacy-panel</link>
    <description>
        &lt;b&gt;The article was published in the Times of India on May 6, 2014. Sunil Abraham is quoted.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Civil society organizations are pushing for a 'privacy commission' to provide protection to individuals from illegal breach of their privacy, with guidelines imposing penal sanction against the violators. This assumes significance&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This assumes significance at a time when the Centre has decided to set up a judicial panel to probe the snoopgate scandal wherein the BJP government in Gujarat was allegedly involved in illegal surveillance of a woman architect and especially when the Right to Privacy Bill is pending in Parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, industry consortia, including CII and FICCI, prefer lesser regulation, though calling for a cautious approach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among civil society organizations pressing for a stringent privacy bill is the International Centre for Free and Open Source Software (ICFOSS), the only representative from Kerala to attend the NETmundial conference held recently in Brazil. The meet focused on privacy issues to ensure basic human rights, including freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NETmundial is the first step towards pushing for a privacy law against the snooping and spying on individuals by those in power, including agencies within and outside the country Privacy guidelines should be clear as to what data can be collected without infringing on the dignity of an individual as 'data' represents the duration of a call, while 'metadata' reveals the content of the caH," said ICFOSS director SatishBabu.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bangalore-based Centre for Internet and Society (CIS), another NETmundial participant, also stands for a strong privacy law. "The two-day conference that concluded on April 24 was a baby step towards a privacy law with a road map for global internet governance. It is the first step towards a multi-stakeholder model offering an equal footing for all civil society organizations, academia, government, private sector and the UN fora," said CIS executive director Sunil Abraham&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are pushing for a privacy law in the country aimed at national privacy regulation and constituting a privacy commission on the lines of the information commission," he added.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/civil-society-privacy-bill.pdf" class="internal-link"&gt;Click to read the full story&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-may-6-2014-laxmi-ajai-prasanna-civil-society-pushes-for-privacy-panel'&gt;https://cis-india.org/news/the-times-of-india-may-6-2014-laxmi-ajai-prasanna-civil-society-pushes-for-privacy-panel&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    

   <dc:date>2014-05-27T11:39:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hivos-october-31-2013-civil-society-and-internet-governance-practices-southeast-asia-and-beyond">
    <title>Civil society and Internet Governance: practices from Southeast Asia and beyond</title>
    <link>https://cis-india.org/news/hivos-october-31-2013-civil-society-and-internet-governance-practices-southeast-asia-and-beyond</link>
    <description>
        &lt;b&gt;On 21 October, the day before the opening of the 2013 Internet Governance Forum in Indonesia, Hivos’ Southeast Asia Regional Office co-organised a pre-event workshop with ID-CONFIG, “Civil Society and Internet Governance: Multi-Stakeholder Engagement Practices from Southeast Asia and Beyond,” at the Bali Nusa Dua Convention Centre.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to read the original &lt;a class="external-link" href="http://hivos.org/news/civil-society-and-internet-governance-practices-southeast-asia-and-beyond"&gt;published by Hivos&lt;/a&gt; on October 31.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Recognising that the IGF has been a global project for the past eight  years, the workshop provided a critical perspective to the forum’s  impact on local civil society organisations. In the past, the IGF has  been criticised for focusing on policy-level IG debates that lack  grassroots, on-the-ground applications. Additionally, it is has been  challenged to demonstrate the relevance of IG policies for civil society  organisations, which frequently have limited understanding of and  involvement in the issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By drawing empirical case studies from different regions of Asia, the  aim of the workshop was to help civil society organisations find a  relevant role in IG and explore how IG frameworks with a focus on the  role of civil society can be applied in developing regions to uphold the  right of citizens to express themselves through the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Five speakers discussed the intersections between Internet Freedom  and Internet Governance: Arthit Suriyawongkul (Thai Netizen Network,  Thailand), Shahzad Ahmad (Bytes 4 All, Pakistan), Donny Budhi Utoyo  (ICTWatch, Indonesia), Lobsang Gyatso Sither (Tibet Action Institute),  and Pranesh Prakash (Center for Internet and Society, India). Attended  by approximately 70 participants, the discussions revolved around the  varying feasibility of a multi-stakeholder platform in different  political contexts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The speakers represent civil society organisations in vastly  different political environments in South Asia, Southeast Asia and East  Asia. They all continuously pointed out how emerging democratic  movements are often counterbalanced by political power concentrated in  existing state institutions. In such state-centric Internet Governance  contexts, civil society organisations are often pitted against official  censorship and filtering attempts. While speakers from relatively more  democratic countries, namely India and Indonesia, showcased examples of  how civil society organisations have engaged the government in Internet  policy-making, those from Thailand and Pakistan illustrated the need for  a strong litigation capacity for public interests in order to defend  citizens from state infringement of their rights. At the other end of  the spectrum, Gyatso Sither emphasised the importance of safeguarding  Tibetan activists in the homeland and in the diaspora from surveillance  by the Chinese state, whose latest strategies have included  interceptions, targeted malware, and cyber attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nonetheless, civil society organisations are uniquely placed to  engage both government agencies, as providers of regulatory frameworks,  and the private sector, as the primary provider of ICT infrastructure,  to demand equitable access to the Internet and maintain the freedom to  expression online. Through an ideal multi-stakeholder framework, civil  society organisations can empower communities by strategically using ICT  to uphold transparency and accountability.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hivos-october-31-2013-civil-society-and-internet-governance-practices-southeast-asia-and-beyond'&gt;https://cis-india.org/news/hivos-october-31-2013-civil-society-and-internet-governance-practices-southeast-asia-and-beyond&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-11-19T09:29:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-nov-23-2012-shalini-singh-civil-society-and-industry-oppose-indias-plans-to-modify-itrs">
    <title>Civil society &amp; industry oppose India’s plans to modify ITRs</title>
    <link>https://cis-india.org/news/the-hindu-nov-23-2012-shalini-singh-civil-society-and-industry-oppose-indias-plans-to-modify-itrs</link>
    <description>
        &lt;b&gt;Industry fears ITU control over Internet; excessive content control and surveillance an issue for civil society.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Shalini Singh's article was &lt;a class="external-link" href="http://www.thehindu.com/news/national/civil-society-industry-oppose-indias-plans-to-modify-itrs/article4124046.ece"&gt;published in the Hindu&lt;/a&gt; on November 23, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India’s proposal on International Telecommunications Regulations (ITRs), submitted last month to the International Telecommunications Union (ITU), the U.N. agency responsible for information and communication technologies, has drawn opposition from, and fears of content control among, civil society and the industry alike.&lt;br /&gt;&lt;br /&gt;Sunil Abraham, Executive Director, Centre for Internet Society, told The Hindu: “The Indian government’s position on the ITRs can be improved, particularly with regard to the proposed definitions, approach to cyber security, scope of regulation.” However, he said, “we are confident that the Indian position will protect consumer and citizen interest once the government implements changes based on inputs from all… stakeholders.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The National Association of Software and Services Companies (NASSCOM), which represents the $100-billion IT and BPO industry, has strong views against the Internet governance model of the Internet Corporation for Assigned Numbers and Names (ICANN), but favours self-regulation. Its president Som Mittal says: “NASSCOM does not favour oversight by an existing U.N. organisation like ITU. Internet and infrastructure have to be in the hands of expert organisations with proven experience.” NASSCOM has also expressed discomfort with the inclusion of “ICTs along with processing” in Section 21E of India’s proposal, since this would subject IT and BPO industries to inter-governmental regulation through the ITRs.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Cellular Operators Association of India (COAI), which represents India’s largest mobile operators with nearly 700 million subscribers, has also opposed any role for ITU in the areas of international roaming and Internet governance, fearing a direct impact on domestic network architecture, costs and technology choices. COAI director-general Rajan Mathews said: “We are already regulated by the Department of Telecom (DoT) and the Telecom Regulatory Authority of India (TRAI). Placing the ITU’s jurisdiction over us — where we neither have voice nor recourse — is unacceptable.” The COAI’s position is consistent with the GSM Association (GSMA), the world’s largest association of mobile companies representing 800 operators spanning 220 countries. The COAI further alleges that most of its inputs “have been rejected without reasons assigned or even a meeting.” It has lodged a protest with the DoT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet Service Providers Association of India (ISPAI) has similarly protested against ITU’s jurisdiction over issues of Internet governance, architecture and cost.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subho Ray, president, Internet &amp;amp; Mobile Association of India (IAMAI), said: “We represent a vast majority of Internet companies but have not been consulted by the DoT. We are completely opposed to ITU’s jurisdiction in any area related to Internet policy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The FICCI has also given detailed inputs on the dangers of allowing ITU’s jurisdiction, especially in areas of Internet policy and governance. It supports a bottom-up consultative and consensus-led multi-stakeholder approach, similar to the one propounded by Telecom Minister Kapil Sibal at the Internet Governance Forum, the world’s largest multi-stakeholder conference, held in Baku.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several prominent civil society groups and members of academia involved in Internet governance also have apprehensions about expanding the ITU’s reach to Internet regulation through the ITRs. In a November 15, 2012 letter to Telecom Secretary R. Chandrashekhar, Society for Knowledge Commons, Internet Democracy Project, Free Software Movement of India, Delhi Science Forum, Media for Change and Software Freedom Law Center have complained about not having been consulted, while warning that India’s proposal “could have far reaching implications for the Internet.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the issue of cyber security, industry associations and several civil society groups are unanimously against any role for ITU, pointing out that including ill-defined terms such as ‘spam’ and ‘network fraud’ in a binding treaty is a terrible idea. Further, cyber security commitments can force India to cooperate with countries whose military and strategic interests are against it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kamlesh Bajaj, CEO, Data Security Council of India, and head of NASSCOM’s security initiatives, said: “Cyber security is sought to be taken over by ITU — an area in which it has little experience. Cyber security includes areas of application security, identity and access management, web security, content filtering, cyber forensics, data security, including issues such as cyber espionage and cyber warfare. The ITU has had no involvement in these matters over the last two decades, and should therefore stay out of them.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similar views have been expressed in varying degrees by the COAI, the IAMAI, the ISPAI and the FICCI. Dr. Ray of the IAMAI says: “cyber security is essentially a state prerogative and should not be part of an external treaty obligation. Any attempt to channel it through the ITU may be counter productive.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Mr. Sibal, who has already been challenged by opposition to the domestic IT rules, is aware that if left unaddressed, opposition to India’s stance on ITRs will only escalate at a national and global level, and that if corrections have to be made in India’s position, those will have to be done consensually within the governance structure. Mr. Sibal confirmed that while cyber security was an area of discussion with the ITU, “the ITU does not have any role in Internet governance.”&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to him, either he or the Department will hold meetings on these issues with the industry to further evolve India’s position.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chandrashekhar further confirmed that similar to several global national delegations, the government would include media and industry experts as part of its delegation to Dubai, the World Conference on International Telecommunications (WCIT-12) will be held from December 3 to 14. The final decisions on the ITRs and the composition of the delegation would be announced the coming week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A deeply divided house in Dubai is a strong possibility, with countries which favour democracy and free speech taking a stance against those who, due to political compulsions, have proposed inter-governmental control through the ITRs by the ITU, not just on Internet policy, but also its traffic and content, most of which automatically fall under the definitions of the ICTs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 193-countries at THE WCIT may well spend 11 days discussing national proposals to separate issues that can be addressed nationally from those which require inter-governmental cooperation, while further debating which platforms may be best to address global cooperation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is equally clear that the existing Internet governance system is unacceptable to most countries, and therefore a more evolved democratic and internationally equitable system, which is managed through a multi-stakeholder process and yet with a definite role for countries like India, appears the only way forward.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Sibal, at meetings with global Internet governance bodies in Baku, is learnt to have bargained hard for India’s explicit role in the existing Internet governance processes.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-nov-23-2012-shalini-singh-civil-society-and-industry-oppose-indias-plans-to-modify-itrs'&gt;https://cis-india.org/news/the-hindu-nov-23-2012-shalini-singh-civil-society-and-industry-oppose-indias-plans-to-modify-itrs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2012-11-30T09:42:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/intgovforum-cms-w2012-proposals">
    <title>Civil rights in the digital age, about the impact the Internet has on civil rights</title>
    <link>https://cis-india.org/news/intgovforum-cms-w2012-proposals</link>
    <description>
        &lt;b&gt;Malavika Jayaram, fellow of CIS is a panelist at this workshop to be held at the IGF 2012 in Azerbaijan.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The freedom of internet is increasingly causing heated debate . On the one hand the internet is the embodiment of freedom literally crossing all borders, on the other hand governments more and more think of curtailing e.g. social media when these are used to organize criminal activities. Governments in some countries restrict access to the internet or censor information even before their citizens go online. As a matter of fact the internet in Iran and China has already become an ‘intranet’. But also in the UK there is a growing body of public opinion that is in favor of more supervision of social media. When will the influence of this medium have become so strong that it, in certain situations, could be considered a danger to society? Will supervision then be a solution? Unique is the research carried out by D66-member of the European Parliament Marietje Schaake into internet freedom all over the world. The research should lead to a resolution on civil rights in our digital era. The report is expected to be finished sometime around the IGF in November. Subjects treated are trade, human rights, development, safety and the like. The report will contain a number of concrete suggestions both for businesses and for governments, so as on the one hand to expand opportunities with the help of technology, but also to limit possible risks.&lt;/p&gt;
&lt;p&gt;Short program:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Introduction:&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Each panelist has 2 minutes to introduce him/herself and make one statement on the topic.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Open discussion:&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;This is followed by an open discussion between panelist and the audience, fed and led by moderator Robert Guerra.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Recommendations:&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;15 minutes before the end of the workshop, recommendations, emerged from the open discussion, will be put to word.&lt;/p&gt;
&lt;p&gt;Organiser(s) Name:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ECP on behalf of the IGF-NL (ECP | Platform for the Information Society wants to take barriers for the implementation and acceptance of ICT away to the benefit of our economy and society, and in order to strengthen our international competitive position. In addition, ECP (also at a political-governmental level) draws attention to a number of specific themes such as growth of productivity, strengthening of competitiveness and the European Digital Agenda. One of it programs is the public-private partnership NL IGF. NL IGF prepairs for the IGF and provides good embedding of the results of the IGF in national policy) Dutch Ministry of Economic Affairs, Agriculture &amp;amp; innovation Dutch Ministry of Foreign Affairs Hivos, the Humanist Institute for Development Cooperation&lt;/p&gt;
&lt;p&gt;Previous Workshop(s):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NL IGF organized : 2010: Public-private cooperation on Internet safety/cybercrime &lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposalsReports2010View&amp;amp;wspid=172" title="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposalsReports2010View&amp;amp;wspid=172"&gt;http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=W...&lt;/a&gt; 2011: Parliamentarian Challenge: a Round Table between Parliamentarians and other Stakeholders &lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=125" title="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=125"&gt;http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=W...&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Submitted Workshop Panelists:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Marietje Schaake&lt;/b&gt; (Euro parliamentarian D66)&lt;br /&gt; &lt;b&gt;Lionel Veer &lt;/b&gt;(Dutch Human Rights Ambassador)&lt;br /&gt; &lt;b&gt;Hanane Boujemi&lt;/b&gt; (Diplo Foundation and upward of this autumn she will work for Hivos on it’s  program 'Internet Govenance for the Mena region'.)&lt;br /&gt; &lt;b&gt;Malavika Jayaram&lt;/b&gt; (Fellow of the Centre for Internet and Society, Bangalore (India), assisting on projects and matters relating to IT law, data protection and privacy. She is also working on a Ph.D. on data protection and privacy laws, with a special focus on the new identity project launched in India. Malavika has over 15 years experience as a lawyer with a focus on technology and intellectual property.)&lt;br /&gt; &lt;b&gt;Emin Milli&lt;/b&gt; (an Azerbaijani writer)&lt;br /&gt; &lt;b&gt;Moderator: Robert Guerra &lt;/b&gt;(a Canadian independent consultant specializing in issues of Internet Freedom, Internet Governance and Human Rights)&lt;br /&gt; Front row: two Dutch students (both male and female)&lt;/p&gt;
&lt;p&gt;All speakers mentioned above have confirmed their participation.&lt;/p&gt;
&lt;p&gt;Name of Remote Moderator(s):&lt;/p&gt;
&lt;p&gt;Sophie Veraart, NL IGF – ECP&lt;/p&gt;
&lt;p&gt;Assigned Panellists:&lt;/p&gt;
&lt;p&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/veer-lionel"&gt;Schaake - Marietje&lt;/a&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/boujemi-hanane"&gt;&lt;br /&gt;Veer - Lionel&lt;br /&gt;&lt;/a&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/jayaram-malavika"&gt;Boujemi - Hanane&lt;/a&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/milli-emin"&gt;&lt;br /&gt;Jayaram - Malavika&lt;/a&gt;&lt;a href="http://wsms1.intgovforum.org/2012/panellist/guerra-robert"&gt;&lt;br /&gt;Milli - Emin&lt;br /&gt;Guerra - Robert&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Read the original published on the &lt;a class="external-link" href="http://www.intgovforum.org/cms/w2012/proposals"&gt;IGF website&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/intgovforum-cms-w2012-proposals'&gt;https://cis-india.org/news/intgovforum-cms-w2012-proposals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-10-04T08:50:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/jessica-corbett-common-dreams-february-5-2019-civil-liberties-groups-warn-proposed-eu-terrorist-content-rule-threat-democratic">
    <title>Civil Liberties Groups Warn Proposed EU 'Terrorist Content' Rule a Threat to Democratic Values</title>
    <link>https://cis-india.org/internet-governance/news/jessica-corbett-common-dreams-february-5-2019-civil-liberties-groups-warn-proposed-eu-terrorist-content-rule-threat-democratic</link>
    <description>
        &lt;b&gt;Requiring filtering tools would be "a gamble with European Internet users' rights to privacy and data protection, freedom of expression and information, and non-discrimination and equality before the law."&lt;/b&gt;
        &lt;p&gt;The blog post by Jessica Corbett was published by &lt;a class="external-link" href="https://www.commondreams.org/news/2019/02/05/civil-liberties-groups-warn-proposed-eu-terrorist-content-rule-threat-democratic"&gt;Common Dreams&lt;/a&gt; on February 5, 2019. Centre for Internet &amp;amp; Society was a signatory.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Dozens of human rights groups and academics have signed on to an &lt;a href="https://cdt.org/files/2019/02/Civil-Society-Letter-to-European-Parliament-on-Terrorism-Database.pdf"&gt;open letter&lt;/a&gt; (pdf) raising alarm about the European Union's proposed &lt;a href="https://edri.org/terrorist-content-regulation-document-pool/"&gt;Regulation on Preventing the Dissemination of Terrorist Content Online&lt;/a&gt;,  warning that its call for Internet hosts to employ "proactive measures"  to censor such content "will almost certainly lead platforms to adopt  poorly understood tools" at the expense of democratic values across the  globe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of those tools is the Hash Database developed by Facebook,  YouTube, Microsoft, and Twitter. The 13 companies that use the  database—which supposedly contains 80,000 images and videos—can  automatically filter out material deemed "extreme" terrorist content.  However, as the letter explains, "almost nothing is publicly known about  the specific content that platforms block using the database, or about  companies' internal processes or error rates, and there is insufficient  clarity around the participating companies' definitions of 'terrorist  content.'"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Countering terrorist violence is a shared priority, and our point is  not to question the good intentions of the database operators. But  lawmakers and the public have no meaningful information about how well  the database or any other existing filtering tool serves this goal, and  at what cost to democratic values and individual human rights," notes  the letter, whose signatories include the American Civil Liberties Union  (ACLU), the Brennan Center for Justice, the Electronic Frontier  Foundation (EFF), and the European Digital Rights (EDRi).&lt;/p&gt;
&lt;p&gt;As an EDRi &lt;a href="https://edri.org/open-letter-on-the-terrorism-database/"&gt;statement&lt;/a&gt; outlines, among the groups' main concerns are the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Lack of transparency of how the database works, and its  effectiveness, proportionality, and appropriateness to achieve the goals  the Terrorist Content Regulation aims to achieve;&lt;/li&gt;
&lt;li&gt;How filters are unable to understand the context and therefore they are error-prone; and&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Regardless of the possibility of filters to be accurate in the  future, the pervasive online monitoring on disadvantaged and  marginalized individuals.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Given the uncertainties over the effectiveness and societal  costs of such tools, the letter charges that "requiring all platforms to  use black-box tools like the database would be a gamble with European  Internet users' rights to privacy and data protection, freedom of  expression and information, and non-discrimination and equality before  the law."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With those fundamental rights under threat, the groups are calling on  members of the European Parliament "to reject proactive filtering  obligations; provide sound, peer-reviewed research data supporting  policy recommendations and legal mandates around counter-terrorism; and  refrain from enacting laws that will drive Internet platforms to adopt  untested and poorly understood technologies to restrict online  expression."&lt;/p&gt;
&lt;p&gt;Read the full letter:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;i&gt;Dear Members of the European Parliament,&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The undersigned organizations write to share our concerns about  the EU’s proposed Regulation on Preventing the Dissemination of  Terrorist Content Online, and in particular the Regulation’s call for  Internet hosts to use “proactive measures” to detect terrorist content.  We are concerned that if this Regulation is adopted, it will almost  certainly lead platforms to adopt poorly understood tools, such as the  Hash Database referenced in the Explanatory Memorandum to the Regulation  and currently overseen by the Global Internet Forum to Counter  Terrorism. Countering terrorist violence is a shared priority, and our  point is not to question the good intentions of the Database operators.  But lawmakers and the public have no meaningful information about how  well the Database or any other existing filtering tool serves this goal,  and at what cost to democratic values and individual human rights. We  urge you to reject proactive filtering obligations; provide sound,  peer-reviewed research data supporting policy recommendations and legal  mandates around counter-terrorism; and refrain from enacting laws that  will drive Internet platforms to adopt untested and poorly understood  technologies to restrict online expression.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Database was initially developed by Facebook, YouTube,  Microsoft, and Twitter as a voluntary measure, and announced to the  public in 2016. It contains digital hash “fingerprints” of images  and4videos that platforms have identified as “extreme” terrorist  material, based not on the law but on their own Community Guidelines or  Terms of Service. The platforms can use automated filtering tools to  identify and remove duplicates of the hashed images or videos. As of  2018, the Database was said to contain hashes representing over 80,000  images or videos. At least thirteen companies now use the Database, and  some seventy companies have reportedly discussed adopting it.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Almost nothing is publicly known about the specific content that  platforms block using the Database, or about companies’ internal  processes or error rates, and there is insufficient clarity around the  participating companies’ definitions of “terrorist content.”  Furthermore, there are no reports about how many legal processes or  investigations were opened after the content was blocked. This data  would be crucial to understand to what extent the measures are effective  and necessary in a democratic society, which are some of the sine qua  non requisites for restrictions of fundamental rights. We do know,  however, of conspicuous problems that seemingly result from content  filtering gone awry. The Syrian Archive, a civil society organization  preserving evidence of human rights abuses in Syria, for example,  reports that YouTube deleted over 100,000 of its videos. Videos and  other content which may be used in one context to advocate terrorist  violence may be essential elsewhere for news reporting, combating  terrorist recruitment online, or scholarship. Technical filters are  blind to these contextual differences. As three United Nations special  rapporteurs noted in a December 2018 letter, this problem raises serious  concerns about free expression rights under the proposed Regulation. It  is far from clear whether major platforms like YouTube or Facebook  adequately correct for this through employees’ review of filtering  decisions—and it seems highly unlikely that smaller platforms could even  attempt to do so, if required to use the Database or other filtering  tools.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Failures of this sort seriously threaten Internet users’ rights  to seek and impart information. The pervasive monitoring that platforms  carry out in order to filter users’ communications also threatens  privacy and data protection rights. Moreover, these harms do not appear  to be equally distributed, but instead disproportionately disadvantage  individual Internet users based on their ethnic background, religion,  language, or location—in other words, harms fall on users who might  already be marginalized. More extensive use of the Database and other  automated filtering tools will amplify the risk of harms to users whose  messages and communications about matters of urgent public concern may  be wrongly removed by platforms. The United Nations Special Rapporteur  on the promotion and protection of human rights and fundamental freedoms  while countering terrorism has expressed concern about this lack of  clarity, and said that Facebook’s rules for classifying organizations as  terrorist are “at odds with international humanitarian law”.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Due to the opacity of the Database’s operations, it is impossible  to assess the consequences of its nearly two years of operation. The  European public is being asked to rely on claims by platforms or vendors  about the efficacy of the Database and similar tools—or else to assume  that any current problems will be solved by hypothetical future  technologies or untested, post-removal appeal mechanisms. Such  optimistic assumptions cannot be justified given the serious problems  researchers have found with the few filtering tools available for  independent review. Requiring all platforms to use black-box tools like  the Database would be a gamble with European Internet users’ rights to  privacy and data protection, freedom of expression and information, and  non-discrimination and equality before the law. That gamble is neither  necessary nor proportionate as an exercise of state power.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;EU institutions’ embrace of the database and other filtering  tools will also have serious consequences for Internet users all over  the world, including in countries where various of the undersigned  organizations work to protect human rights. For one thing, when  platforms filter a video or image in response to a European authority’s  request, it will likely disappear for users everywhere—even if it is  part of critical news reporting or political discourse in other parts of  the world. For another, encoding proactive measures to filter and  remove content in an EU regulation gives authoritarian and  authoritarian-leaning regimes the cover they need to justify their own  vaguely worded and arbitrarily applied anti-terrorism legislation.  Platforms that have already developed content filtering capabilities in  order to comply with EU laws will find it difficult to resist demands to  use them in other regions and under other laws, to the detriment of  vulnerable Internet users around the globe. Your decisions in this area  will have global consequences.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Signatories:&lt;/i&gt;&lt;br /&gt;&lt;i&gt; Access Now; Africa Freedom of  Information Centre; Agustina Del Campo, in an individual capacity  (Center for Studies on Freedom of Expression CELE); American Civil  Liberties Union (ACLU); ApTI Romania; Article 19; Bits of Freedom;  Brennan Center for Justice; Catalina Botero Marino, in an individual  capacity (Former Special Rapporteur of Freedom of Expression of the  Organization of American States; Center for Democracy &amp;amp; Technology  (CDT); Centre for Internet and Society; Chinmayi Arun, in an individual  capacity; Damian Loreti, in an individual capacity; Daphne Keller, in an  individual capacity (Stanford CIS); Derechos Digitales · América  Latina; Digital Rights Watch; Electronic Frontier Finland; Electronic  Frontier Foundation (EFF); Electronic Frontier Norway; Elena  Sherstoboeva, in an individual capacity (Higher School of Economics);  European Digital Rights (EDRi); Hermes Center; Hiperderecho; Homo  Digitalis; IT-Pol; Joan Barata, in an individual capacity (Stanford  CIS); Krisztina Rozgonyi, in an individual capacity (University of  Vienna); Open Rights Group; Open Technology Institute at New America;  Ossigeno; Pacific Islands News Association (PINA); People Over Politics;  Prostasia Foundation; R3D: Red en Defensa de los Derechos Digitales;  Sarah T. Roberts, Ph.D., in an individual capacity; Southeast Asian  Press Alliance; Social Media Exchange (SMEX), Lebanon; WITNESS; and  Xnet.&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/jessica-corbett-common-dreams-february-5-2019-civil-liberties-groups-warn-proposed-eu-terrorist-content-rule-threat-democratic'&gt;https://cis-india.org/internet-governance/news/jessica-corbett-common-dreams-february-5-2019-civil-liberties-groups-warn-proposed-eu-terrorist-content-rule-threat-democratic&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-19T00:49:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/information-technology-act">
    <title>Civil Liberties and the amended Information Technology Act, 2000</title>
    <link>https://cis-india.org/internet-governance/blog/information-technology-act</link>
    <description>
        &lt;b&gt;This post examines certain limitations of the Information Technology Act, 2000 (as amended in 2008). Malavika Jayaram points out the fact that when most countries of the world are adopting plain English instead of the conventional legal terminology for better understanding, India seems to be stuck in the old-fashioned method thereby, struggling to maintain a balance between clarity and flexibility in drafting its laws. The present Act, she says, is although an improvement over the old Act and seeks to address and improve on certain areas in the right direction but still comes up short in making necessary changes when it comes to fundamental rights and personal liberties. The new Act retains elements from the previous one making it an abnormal document and this could have been averted if there had been some attention to detail. &lt;/b&gt;
        
&lt;p&gt;After close to a decade of dealing with English statutes, European directives and pan-European regulations, I was struck anew by the antique style of Indian draftsmanship on my return. Much of the world is moving away from stiff legal speech and&amp;nbsp;&amp;nbsp; towards plain English. Even England has converted to a simpler, more concise legal rhetoric. India, however, has a peculiar genius for imprecision and euphemism that makes the purpose and implications of the law hard to understand and apply. While it may seem quaint, to pepper a law with terms like ‘inconvenience’, ‘nuisance’ or ‘annoyance’, the language fails to convey&amp;nbsp; the&amp;nbsp; seriousness of the offences being defined. A reading of the Information Technology Act, 2008, in its new incarnation incorporating the latest amendments and rules (ITA), is a case in point.&lt;/p&gt;
&lt;p&gt;Legal draftsmen inevitably wrestle with the age-old dilemma of the generic versus the specific, the potential dangers of a broad definition versus the built-in obsolescence of a narrow spotlight. The crafters of the ITA, in their admittedly admirable attempts to redress some of the gaps and ambiguity in the original law, appear to have struggled in their efforts to strike a balance between clarity and flexibility. While the new avatar is certainly an improvement in some areas, one can’t help but regret the missed opportunity to make necessary changes. Most importantly is the negative impact of the occasionally sloppy and sometimes overly wide drafting on deeply cherished fundamental rights and personal liberties.&lt;/p&gt;
&lt;p&gt;Among other things, the ITA has sought to address and improve aspects such as technology neutrality, data protection, phishing and spam, child pornography, the liability of intermediaries and cyber terrorism. While many of these amendments are a step in the right direction, the actual drafting that implements the high level objectives suffers in many respects. For example, the previous emphasis on ‘digital signatures’ has shifted to the technologically neutral ‘electronic signatures’ but the changes have not been carried out thoroughly enough to expunge the old concept entirely. The current law is a bit of an abnormal document in that it contains elements of both concepts, which some attention to detail could easily have averted. Another example is that the provisions meant to combat spam and phishing end up using the dreaded ‘annoyance’ and ‘inconvenience’ terminology with the effect of casting the net of criminality over far more than is appropriate. For example, mail sent with the purpose of causing ‘annoyance’ or ‘inconvenience’ (not exactly the worst offence in the offline world) could put someone behind bars.&lt;/p&gt;
&lt;p&gt;An important set of well intentioned but woefully inadequate provisions are those relating to the protection of data. The absence of a specific law on data protection had, in itself, garnered much criticism both within the country as well as in the context of international transactions and outsourcing. The old Act offered the feeble protection of a single provision (section 43) that dealt with unauthorised access and damage to data. In an attempt to meet industry demands and international market standards, the ITA introduced two sections that address civil and criminal sanctions. While this exercise understandably falls far short of a comprehensive law relating to data (being squeezed into an omnibus piece of technology related legislation, rather than one geared up only to deal with data), there was considerable anticipation of its role in papering over the existing cracks and provide a workable, if temporary, data protection regime.&lt;/p&gt;
&lt;p&gt;However, the attempt is such a limited one, and so replete with shortcomings that the need for a ‘proper’ data protection law still stands. Given the proposed initiation of the UID scheme, in particular, there is a compelling need for a robust and intelligent law in this regard. Most other countries’ regimes clearly do at least the following:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;define and classify types of data (for example, in most European countries, ‘personal data’ is any data that identifies an individual, ‘sensitive personal data’ is data that reveals details of ethnicity, religion, health, sexuality, political opinion, etc.),&lt;/li&gt;&lt;li&gt;fine-tune the nature of protection to the categories of data (i.e., greater standards of care around sensitive personal data),&amp;nbsp;&lt;/li&gt;&lt;li&gt;apply equally to data stored offline and manually as to data stored on computer systems,&amp;nbsp;&lt;/li&gt;&lt;li&gt;distinguish between a data controller (i.e., one who takes decisions as to data) and a data processor (i.e., one who processes data on the instructions of the data controller),&amp;nbsp;&lt;/li&gt;&lt;li&gt;impose clear restrictions on the manner of data collection (for example, must be obtained fairly and lawfully),&lt;/li&gt;&lt;li&gt;give clear guidelines on the purposes for which that data can be put to and by whom (often involving a consent requirement that gives the individual a great degree of control over their data),&lt;/li&gt;&lt;li&gt;require certain standards and technical measures around the collection, storage, access to, protection, retention and destruction of data,&amp;nbsp;&lt;/li&gt;&lt;li&gt;ensure that the use of data is adequate, relevant and not excessive given the purpose for which it was gathered,&lt;/li&gt;&lt;li&gt;cater for opt-in and opt-out type regimes, again to provide individuals with a measure of control over the use of their data even after the stage of initial collection (which has a huge impact on invasive telemarketing or unsolicited written communication)&lt;/li&gt;&lt;li&gt;impose a knowledge requirement and procedures for allowing individuals to seek information on what data is held on them, and&lt;/li&gt;&lt;li&gt;create safeguards and penalties that are well tailored to breaches of any of the above.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Unfortunately, and perhaps understandably, the ITA barely begins to scratch the surface of what a good data protection regime entails. The provisions that it does introduce (sections 43-A and 72-A) have glaring inadequacies. Briefly:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;the term ‘sensitive personal data or information’ is used indiscriminately without any definition,&lt;/li&gt;&lt;li&gt;the provisions only cover electronic data and records, not data stored in non-electronic systems or media,&lt;/li&gt;&lt;li&gt;they offer no guidance on most of the principles set out above such as in relation to accuracy, adequacy, consent, purpose, etc.,&lt;/li&gt;&lt;li&gt;in the absence of the controller-processor distinction, liability is imposed on persons, who are not necessarily in a position to control data, even if it is in their possession,&lt;/li&gt;&lt;li&gt;civil liability for data breaches only arises where ‘negligence’ is involved (i.e., failure to have security procedures or failure to implement them correctly will not automatically result in damages unless negligence is proven),&lt;/li&gt;&lt;li&gt;similarly, criminal liability only applies to cases of information obtained in the context of a service contract, and requires an element of ‘wilfulness’, or a disclosure without consent or in breach of a lawful contract – this is a very limited remit aimed largely at preventing disgruntled or unscrupulous employees from dealing in company/customer data.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;For these broad reasons, we can see that even the amended ITA disappoints those who expected a greatly improved regime in relation to data. It is widely anticipated that the UID scheme, which poses so many potential data protection issues, will serve as a catalyst for a standalone law that is on par with the more sophisticated regimes that function very well in other countries. One great feature common to most of those regimes is that they are consumer/individual focused. The freedom and privacy of the individual is the central concern of protection. Our ITA seems far more concerned with providing corporates with a stick to beat errant employees with, and with catering to the needs of the outsourcing and IT industries.&amp;nbsp; It remains to be seen whether the UID scheme will merely galvanise some targeted legal action covering UIDs rather than generating a broad based piece of legislation.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In addition to the criticisms levelled at the data protection provisions, the other large subset of concerns has been in relation to the civil liberties implications of the ITA. There has been some horror expressed in various forums and media about the ITA contributing to the growth of a police state, to severe curtailment of the freedom of speech and expression, to the invasion of privacy, and to the disproportionate severity of penalisation for offences that are placed on crimes committed in cyberspace compared to crimes committed in the hear and now. Sadly, this is true to a large extent given the clunky treatment of ‘cyber terrorism’, the intolerable pre-censorship that is enabled by the blocking of websites, the broad approach to the monitoring and collection of data, and the demanding obligations of intermediaries to cooperate with interception, monitoring and decryption of data for poorly defined reasons.&lt;/p&gt;
&lt;p&gt;While our Constitution’s fundamental rights chapter, which enshrines certain basic, democratic, and profound rights, might not have the same vocabulary of due process as we see in the US, it nevertheless requires restrictions to be reasonable. Precedents and the wider jurisprudence in the field have further developed the concepts of checks and balances, procedural safeguards and legitimacy of restraints that a functioning democracy like India must accord to its people. It can be argued that several provisions of the ITA cause significant tension with the right to freedom of speech and expression, the right against self-incrimination, the right to equality before the law, and&amp;nbsp; the right to practice a trade or profession. To briefly deal with the worst offenders in the IT Act, I have divided them into some broader topics:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Pre-censorship&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Some of the most excessive provisions relate to the free hand with which public access to websites can be blocked. Previously, there was some hope that the rules yet to be formulated in connection with section 69-A would offer some procedural safeguards. The recently notified rules do contain details – in the bureaucratese that we have come to expect – of the process to be followed by the designated functionaries. They also permit the concerned person or intermediary to submit a reply and clarifications to the committee before the decision to block access is taken.&lt;/p&gt;
&lt;p&gt;These rules are to a large extent undermined by rule 9 (“Blocking of information in cases of emergency”), which provides that, “…&lt;em&gt;in any case of an emergency nature, for which no delay is acceptable&lt;/em&gt;…”, the process will turn into an internal escalation within the department of IT and interim directions relating to blocking access may be issued &lt;em&gt;without giving (him) an opportunity of hearing&lt;/em&gt;. There are those who think that, given the events of 26/11, this is wholly justified but the prospect of abuse fills others with dread. The rules may offer detailed time-frames within which orders are made and approved, require reasons to be recorded in writing, provide that emergency orders may be revoked and information unblocked, etc. Regardless, the nature of the process (executive rather than judicial), the ease with which it can be abused, and the fact that the review committee will only meet once in two months to check for compliance, set aside incorrect orders and unblock information, does not offer much comfort. If a site is incorrectly blocked, it could take up to two months for this to be rectified, which could cause a great damage to the owner of the site, and indeed to the wider public that has an interest in uncensored, free speech.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Given that any person can submit a request, it is not unreasonable to anticipate a certain level of frivolous and malicious requests for blocking sites, especially given that the grounds for blocking are very wide (the often repeated set that we are familiar with, namely, in the interest of sovereignty and integrity of India; relating to defence of India/ security of State/ friendly relations with foreign states/ public order and for preventing incitement to commission of any cognizable offences). Without a review committee constantly monitoring and policing the unbridled use of the provisions, the backlog of blocking decisions that may need to be reversed can become a mountain very quickly. The dangers of pre-censorship and the curtailment of dialogue, debate and free speech are even greater in a country with an increasingly thin-skinned populace. Faced with a volatile backdrop of great diversity of religion, political opinions, views on sexuality, morality, obscenity and other highly subjective values and beliefs, there is immense extra-legal pressure on free speech. Thus, there is now a need for greater vigilance so that the thought police do not wield the stick of harsh penalties under the ITA without reason and due process.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Privacy and surveillance&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This topic pulls together concerns around the blanket monitoring and collecting of traffic data or information,&amp;nbsp; the interception and decryption (under duress) by intermediaries (now a large superset of ISPs, search engines, cyber cafes, online auction sites, online market places, etc.) and the wide definition of ‘cyber terrorism’ (which ludicrously even casts defamation as a terrorist activity).&lt;/p&gt;
&lt;p&gt;Some of the broad concerns in relation to interception, monitoring and decryption in (section 69) are that:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;there is no provision for a clear nexus between an intermediary and the information or resource sought to be monitored or intercepted,&lt;/li&gt;&lt;li&gt;the usual internationally recognised exception to liability where an intermediary operates purely as a conduit and has no control over data flowing through its network is not clearly spelt out,&lt;/li&gt;&lt;li&gt;the penalties for non-cooperation are extremely harsh, especially given the absence of a) and b) above,&lt;/li&gt;&lt;li&gt;these onerous penalties can be said to be in violation of Article 14 as they seem entirely disproportionate. Similar offences and remedies in the Code of Criminal Procedure or the Indian Penal Code prescribe less severe penalties, by an order of magnitude in fact. When the only difference between the offences is the medium in which information is contained, it seems arbitrary to impose a much harsher punishment on an online intermediary than on a member of the public who, for example, furnishes false information to the police in connection with a trial or enquiry.&lt;/li&gt;&lt;li&gt;the rules made in relation to monitoring, interception and decryption, offer some procedural safeguards, in that they impose a time limit on how long a directive for interception or monitoring can remain in force, a ceiling on how long data can be kept before it is required to be destroyed, etc. However, the effect of these is greatly diluted by exceptions “for functional requirements”, etc. The astonishing irony is that rule 20 requires the intermediary to maintain “…&lt;em&gt;extreme secrecy&lt;/em&gt;…” and “…&lt;em&gt;utmost care and precaution&lt;/em&gt;…” in the matter of interception, monitoring or decryption of information “…&lt;em&gt;as it affects the privacy of citizens&lt;/em&gt;…”!!!!&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;In a similar vein, there are concerns around the monitoring and collection of traffic data (section 69B) as the section contains an unreasonably long list of grounds for monitoring. These include such extreme excesses as “forecasting of imminent cyber incidents”, “monitoring network application with traffic data or information on computer resource”, “identification and determination of viruses/computer contaminant”, and the catch-all “any other matter relating to cyber security”.&lt;/p&gt;
&lt;p&gt;Finally, the main criticism of the ITA approach to ‘cyber terrorism’ is the very wide net that it seeks to cast, looking for a game that has little or nothing to do with the named offence. Amongst the cast of creatures unwittingly caught during this fishing expedition, we find some unlikely victims. In addition to the usual grounds of offence against sovereignty, national security, defence of India, etc., which we have seen in relation to other sections, the ITA considers the following as acts of cyber terrorism – broadly speaking, unauthorised access to information that is likely to cause:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;injury to decency,&lt;/li&gt;&lt;li&gt;injury to morality,&lt;/li&gt;&lt;li&gt;injury in relation to contempt of court, and&lt;/li&gt;&lt;li&gt;injury in relation to defamation.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;This would almost be laughable if these grounds were not enacted unto law, posing a threat to civil liberties by their very existence. Other countries have some notion of political ideology, religious case, etc. in their view of terrorism. That (a) to (d) above have been shoehorned into a clause that imposes the stiffest penalty within the entire ITA (life imprisonment) gives even more cause for concern.&lt;/p&gt;
&lt;p&gt;In closing, I should reiterate that the ITA includes other deficiencies and worthwhile improvements alike, but an article focusing largely on the data protection and civil liberties aspects cannot reference them all.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/information-technology-act'&gt;https://cis-india.org/internet-governance/blog/information-technology-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Malavika Jayaram</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:13:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru">
    <title>Civic activism over WhatsApp and stories of and from cab drivers are part of a new narrative in Bengaluru</title>
    <link>https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru</link>
    <description>
        &lt;b&gt;Does a city have a pulse? And can that pulse be felt in its technological interactions?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sowmya Rajaram was published in &lt;a class="external-link" href="https://bangaloremirror.indiatimes.com/bangalore/others/civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru/articleshow/67506513.cms"&gt;Bangalore Mirror&lt;/a&gt; on January 13, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In Silicon Plateau Vol 2, Bengaluru comes alive through the ways its inhabitants interact with, and are impacted by, mobile apps and cloud services. Published by the Institute of Network Cultures, Amsterdam, in collaboration with the Centre for Internet and Society in December 2018, this art project and publishing series explores the intersection of technology, culture and society in Bengaluru. Perusing the 16 contributions, you wonder when and how Garden City become Silicon City, and how that has changed us fundamentally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The city has hurtled into an uncertain space – one that “offers a fertile terrain for research, having become the Silicon Valley of India and a demographically diverse metropolis in less than three decades,” as co-editors Marialaura Ghidini (art curator and researcher) and Tara Kelton (artist and designer) put it.&lt;/p&gt;
&lt;p&gt;Unique structure&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ghidini links to Yashas Shetty’s contribution, ‘Aadhaar Cards of Great Leaders’. “One of the formal narratives behind [Aadhaar] (you can look at the latest proceedings of the Asian Development Bank conference, Financial Inclusion in the Digital Economy) is that it has facilitated access to services to whom they define as ‘a broad range of people, especially in rural areas and illiterate’, facilitating government-to-person transfer to low-income people for example. Now, many countries in the West don’t have such a stark separation between rural and urban environment,” she explains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In her piece ‘Environmental Apptivism: WhatsApp and Digital Public Spheres in Bangalore’, Nicole Rigillo, a Canadian anthropologist who did her research as a Postdoctoral Fellow with IIMB and the University of Edinburgh, investigates how WhatsApp amplifies the civic activism of Bengaluru’s activists. While the app enables easy and fast communication and resolution, it is not always accessible to a lower socio-economic bracket. Yet, Rigillo believes that many city activists do not focus only on middle class concerns. “Many groups are concerned with the preservation of common resource goods – lakes, trees. Others advocate on behalf of the poor – Citizens for Bengaluru and others have pressuring government officials to ensure pourakarmika salaries are paid. One activist offered vegetable cart sellers bags made of stapled newspapers, and offered to provide paper and staplers to them so they could make their own. The focus was not only on protecting the environment, but also on ensuring that the cart seller was able to maintain his livelihood,” she says. Citizens use WhatsApp groups – often with government functionaries added to them – over official government apps, because it gets the job done better and faster. “And we can all recognise how this is a useful way of organising politically in Bengaluru, where the average traffic speed (17 km/hr) is the slowest of all Indian cities.” And unlike urban improvement apps across the world that “rely on one-way, black-boxed forms&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;of communication, placing citizens in the position of making demands of government officials”, Rigillo says Bengaluru’s proactive citizen groups are instead, actively involved in day-to-day municipal governance. “HSR Layout is a shining example here, with their citizen-led waste management protocols, community gardens, and lake revitalisation efforts, and even participating in the on-the-ground enforcement of government directives, such as Karnataka’s 2016 Plastic Ban.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still, questions must be asked of our involvement with apps and technology. In her piece ‘Terms of Service’, Sruthi Krishnan, writer and co-founder of Fields of View, a not-for-profit research organisation, points out how the “sanitised vocabulary of the platform economy masks and deliberately obfuscates complex, often harsh realities”. For instance, the term ‘service partner’ actually means little when the partnership is nonexistent and decisions are taken arbitrarily by the management. Ghidini agrees, because calling someone a ‘partner’ creates, as she says, “a distorted narrative around the condition of the ‘freelance’ worker, which is quite precarious, especially if your work is dictated by an algorithm that does not care if you have been driving 16 hours a day to make your daily target”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then, in his interview, Vir Kashyap, co-founder of Babjob.com (job platform for blue- and grey-collar job seekers, acquired by Quikr in 2017) discusses not-so-fantastic possibility of seeing the city of Bengaluru outsource public transport services to private companies such as Uber and Ola in the future. His explanation is that unlike abroad, where ride-sharing apps fit into an existing city infrastructure, in Bengaluru, for instance, “ride-sharing apps are actually filling a gap that exists in the public transport infrastructure, which is still very patchy in the city, making it difficult to travel using a public transport system”. She adds: “So the problem you have here is that of having a private company in the position of being able to replace what the city is supposed to offer to its tax payers as a default.” In addition, being a contractor or freelancer in a city such as Bengaluru is very different than a city in Europe. “For many, being a contractor with a service such as Ola or UrbanClap means freedom from having to work seven days a week for a fixed, and very small, amount of money. In a way the sharing economy is offering a better pay, so the wave of app-based companies has allowed many to emancipate themselves in a way,” Ghidini says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In ‘The Weight of Cloud Kitchens’ by Aasavri Rai and social entrepreneur Sunil Abraham, the full force of the environmental footprint our rampant food takeaway habits generate, is felt. An analysis of just 15 such platforms tell the story – an average of 67.072 grams of waste is generated for each order of a meal for one person in the price range of `200 to `300. Typically, 46.89 grams of non-biodegradable waste and 33.62 grams of biodegradable waste were generated across all orders. The writers write: ‘What is terrifying is that this investigation forms only a microcosm … With a reduction in dine-in customers and corresponding increase in home delivery across the city, the growth of waste production by this new generation of companies in the food and beverage industry gets magnified.’&lt;/p&gt;
&lt;p&gt;Looking ahead&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, there is “a high degree of trust that people in India generally have with each other. Interestingly, it’s higher than most other countries of similar income levels,” Kashyap says in his interview. Which is why Krishnan believes the time has come for us to have more meaningful conversations about technology. She cites Time magazine’s 2006 declaration of how the individual controls the information age. “Technology operates in the social context it stems from and speaks to, and existing social iniquities are often exacerbated by technology. And so, instead of looking at technology as a way to solve problems, if the starting point is the issue stemming from the socio-political context, there can be more meaningful conversations on how technology can help.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru'&gt;https://cis-india.org/internet-governance/news/bangalore-mirror-january-13-2019-sowmya-rajaram-civic-activism-over-whatsapp-and-stories-of-and-from-cab-drivers-are-part-of-a-new-narrative-in-bengaluru&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-02T14:48:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-june-9-2018-draft-bill-seeks-to-revolutionise-data-collection-storage-in-india">
    <title>Citizens’ Draft Privacy Bill Seeks To Revolutionise Data Collection, Storage In India</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-june-9-2018-draft-bill-seeks-to-revolutionise-data-collection-storage-in-india</link>
    <description>
        &lt;b&gt;A draft privacy bill proposes sweeping reforms to the way personal data is collected, processed and stored in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Arpan Chaturvedi was published in &lt;a class="external-link" href="https://www.bloombergquint.com/law-and-policy/2018/06/08/draft-bill-seeks-to-revolutionise-data-collection-storage-in-india"&gt;Bloomberg Quint&lt;/a&gt; on June 9, 2018. CIS research was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Titled Indian Privacy Code, 2018, the draft proposes that “all data collected, processed and stored by data controllers and data processors prior to the date on which this Act comes into force shall be destroyed within a period of two years from the date on which this Act comes into force”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft has been put together by a group of lawyers and policy analysts and uploaded on the website of ‘Save our Privacy’ — a public initiative to put forth a model law on data protection. The initiative is backed by the India Privacy Foundation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No person, including a data controller and data processor, shall collect any personal data without obtaining the consent of the data subject to whom it pertains, the draft bill says. Collection of personal data without consent can happen only when:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;It’s necessary for the provision of an emergency medical service.&lt;/li&gt;
&lt;li&gt;Prevent, investigate or prosecute a cognizable offence.&lt;/li&gt;
&lt;li&gt;Exempted by a privacy commission that the draft seeks to institute&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Also, the draft bill proposes that no person shall store any personal data for a period longer than is necessary to achieve the purpose for which it was collected or received. The same applies to the processing of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft bill has been submitted to the Justice Sri Krishna Committee — which will deliberate on a data-protection framework for the country. The committee’s first draft is likely to be submitted this month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bill prescribes punishment for offenses related to interception of communication, surveillance, abetment, repeat offenders and offenses by companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bill, according to information on the website, is based on seven principles, foremost of which is the importance of individual rights. The others are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A data protection law must be based on privacy principles and guidelines discussed in the report of Justice AP Shah Committee of Experts; the Supreme Court judgement on Right to Privacy and European Union’s General Data Protection Regulation.&lt;/li&gt;
&lt;li&gt;A strong privacy commission must be created to enforce privacy principles. The commission should be granted wide powers of investigation, adjudication, rule-making and enforcement. The privacy commission must have jurisdiction over the government as well as private bodies.&lt;/li&gt;
&lt;li&gt;The government must respect user privacy. The government cannot deny essential services to citizens if they choose not to share data with it. The draft says government withholding services on pretext of collection of information effectively amounts to “extortion of consent”.&lt;/li&gt;
&lt;li&gt;A complete privacy code must come with surveillance reform. Even when individual interception and surveillance is carried out this should be severely limited in substance and practiced through procedural safeguards.&lt;/li&gt;
&lt;li&gt;Strengthen the Right To Information Act and exempt information commissioners from interference or control by the privacy commissioner&lt;/li&gt;
&lt;li&gt;International protection and harmonisation is a must to protect the open internet. The group suggests the law must have extraterritorial effect and apply to web services and platforms which are accessible in India and gather personal data of Indians.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The bill takes inspiration from the Privacy (Protection) Bill, 2013 which was drafted over a series of roundtable discussions and inputs conducted by the Centre for Internet and Society, Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The individuals who were involved in the drafting of the model law are Raman Jit Singh Cheema, Apar Gupta, Gautam Bhatia, Kritika Bhardwaj, Maansi Verma, Naman N Aggarwal, Praavita Kashyap, Prasanna S, Ujjwala Uppaluri, Vrinda Bhandari.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-june-9-2018-draft-bill-seeks-to-revolutionise-data-collection-storage-in-india'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-june-9-2018-draft-bill-seeks-to-revolutionise-data-collection-storage-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-06-11T02:47:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/citizens-forums-want-UID-scrapped">
    <title>Citizens' forums want UID project scrapped</title>
    <link>https://cis-india.org/news/citizens-forums-want-UID-scrapped</link>
    <description>
        &lt;b&gt;Citizens’ forums and groups have stepped up their attack on the Unique Identification Project calling for the complete scrapping of the project.&lt;/b&gt;
        
&lt;p&gt;Addressing the media persons on Wednesday, Thomas Matthew of Citizens’ Action Forum said all the transactions undertaken by the UID project should be scrutinised under an accountable public body policy.&lt;/p&gt;
&lt;p&gt;“The State government should make the financial and technological implications and costs incurred so far, including details of contracts awarded with respect to the UID project,” he said.&lt;/p&gt;
&lt;p&gt;One of the main concerns of the groups has been the lack of public discussion on the feasibility or desirability of the project.&lt;/p&gt;
&lt;p&gt;“It was launched as an ID card for citizens, but was later changed to a number for all citizens. UID claims that there are several benefits of possessing a number, but passes on the responsibility to Registrars,” Matthew said.&lt;/p&gt;
&lt;p&gt;While UIDAI Chairperson Nandan Nilekani announced that the number was voluntary, the need to have such a number for obtaining any other form of service including bank accounts, would force a person to get an ID number, he added.&lt;/p&gt;
&lt;p&gt;Executive Director of The Centre for Internet and Society, Sunil Abraham said even though the scheme is supposed to only provide verification of identity, there was no guarantee of safeguard against its misuse by potential third party users like telecom companies, banks and government departments.&lt;/p&gt;
&lt;p&gt;“Though claims have been made of huge savings as the UID will stem leakages from welfare schemes, such as employment guarantee scheme, PDS and the LPG subsidy, but no feasibility studies have been conducted to assess the veracity of such a claim,” Sunil said.&lt;/p&gt;
&lt;p&gt;Read the original article in the &lt;a class="external-link" href="http://www.deccanherald.com/content/66568/citizens-forums-want-uid-project.html"&gt;Deccan Herald&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/citizens-forums-want-UID-scrapped'&gt;https://cis-india.org/news/citizens-forums-want-UID-scrapped&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T12:26:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/citizen-engagement-framework-for-e-governance-projects-and-framework-and-guidelines-for-use-of-social-media-by-government-agencies">
    <title>Citizen Engagement Framework for e-Governance Projects and Framework and Guidelines for Use of Social Media by Government Agencies</title>
    <link>https://cis-india.org/internet-governance/resources/citizen-engagement-framework-for-e-governance-projects-and-framework-and-guidelines-for-use-of-social-media-by-government-agencies</link>
    <description>
        &lt;b&gt;Notification dated August 17, 2012 by Department of Electronics &amp; Information Technology. &lt;/b&gt;
        &lt;p class="Bodytext1" style="text-align: center; "&gt;TO BE PUBLISHED IN PART I SECTION OF THE GAZETTE OF INDIA&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: center; "&gt;Government of India&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: center; "&gt;Ministry of Communications and Information Technology&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: center; "&gt;Department of Electronics &amp;amp; Information Technology&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: center; "&gt;Electronics Niketan&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: center; "&gt;6, CGO Complex&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: center; "&gt;*****&lt;/p&gt;
&lt;p align="right" class="Bodytext1"&gt;New Delhi-110 003&lt;br /&gt;August 17, 2012&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: center; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Notification&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: center; "&gt;&lt;b&gt;Citizen Engagement Framework for e-Governance Projects and Framework and Guidelines for Use of Social Media by Government Agencies&lt;/b&gt;&lt;/p&gt;
&lt;p class="Bodytext1"&gt;No. 3(77)/2010-EG II Whereas the Department of Electronics and Information Technology (DeitY), Ministry of Communications and Information Technology, Government of India (GoI) is driving the National e-Governance Plan (NeGP) which seeks to create the demand driven atmosphere for uptake of and sustainability of e-Services as well ensure effective citizen engagement and communication with all stakeholders using various offline as well online channels including Social Media.&lt;/p&gt;
&lt;p class="Bodytext1"&gt;AND Whereas Awareness and Communication in e-Governance are a high priority in order to ensure wide spread dissemination of e-Services and service access channels and DeitY, GOI has been mandated to enhance visibility of e-Services enabled under NeGP&lt;/p&gt;
&lt;p class="Bodytext1"&gt;AND WHEREAS an immediate need has been felt to create frameworks for citizen engagement and use of social media which would enable government agencies to undertake meaningful engagement with citizens as well leverage social media platforms more effectively for such engagements&lt;/p&gt;
&lt;p class="Bodytext1"&gt;AND Whereas the Competent Authority has approved the Framework for Citizen Engagement for e-Governance Projects and Framework and Guidelines for Use of Social Media by Government Agencies&lt;/p&gt;
&lt;p class="Bodytext1"&gt;NOW, this Department hereby notifies the Framework for Citizen Engagement for Governance Project and Framework and Guidelines for Use of Social Media by Government Agencies w.e.f the date of notification. The Frameworks can be downloaded from &lt;a class="external-link" href="http://www.mit.gov.in"&gt;www.mit.gov.in&lt;/a&gt; and &lt;a href="http://www.negp.gov.in/"&gt;www.negp.gov.in&lt;/a&gt;&lt;/p&gt;
&lt;p align="right" class="Bodytext1"&gt;(Krishna Bidani)&lt;/p&gt;
&lt;p align="right" class="Bodytext1"&gt;Deputy Director&lt;/p&gt;
&lt;p class="Bodytext1"&gt;To&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;The Manager&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;Government of India Press&lt;/p&gt;
&lt;p class="Bodytext1"&gt;Faridahad (Haryana)                ;  Alongwith  Hindi  Version&lt;/p&gt;
&lt;p class="Bodytext1"&gt;Copy for information to:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;All Secretaries, Government of India&lt;/li&gt;
&lt;li&gt;Chief Secretaries of all the State Governments and UT Governments&lt;/li&gt;
&lt;li&gt;Secretary (IT) of all the States and UT Governments &lt;/li&gt;
&lt;/ol&gt;
&lt;p class="Bodytext1" style="text-align: right; "&gt;(Krishna Bidani)&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: right; "&gt;Deputy Director&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/citizen-engagement-framework-for-e-governance-projects-and-framework-and-guidelines-for-use-of-social-media-by-government-agencies'&gt;https://cis-india.org/internet-governance/resources/citizen-engagement-framework-for-e-governance-projects-and-framework-and-guidelines-for-use-of-social-media-by-government-agencies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-09-10T14:40:10Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-at-igf-2014">
    <title>CIS@IGF 2014</title>
    <link>https://cis-india.org/internet-governance/blog/cis-at-igf-2014</link>
    <description>
        &lt;b&gt;The ninth Internet Governance Forum (“IGF2014”) was hosted by Turkey in Istanbul from September 2 to 5, 2014.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;A BestBits pre-event, which saw robust discussions on renewal of the IGF mandate, the NETmundial Initiative and other live Internet governance processes, flagged off a week of many meetings and sessions. At IGF2014, the ICANN-led processes of IANA transition and ICANN accountability found strong presence. Human rights online, access and net neutrality were also widely discussed. Centre for Internet and Society, India participated in multiple workshops and panels.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Workshops and Panel Discussions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WS206: An evidence-based framework for intermediary liability&lt;/b&gt;&lt;br /&gt;CIS organized a workshop on developing an evidence-based framework for intermediary liability in collaboration with the Stanford Center for Internet and Society.  By connecting information producers and consumers, intermediaries serve as valuable tool for growth and innovation, and also a medium for realisation of human rights. The workshop looked to a concerted approach to understanding intermediaries’ impact on human rights demands our urgent attention. Jyoti Panday of CIS was contributed to the workshop’s background paper and organisation. Elonnai Hickok of CIS was a speaker.  At this workshop, a zero-draft of international principles for intermediary liability was released. The zero-draft is the interim outcome of an ongoing, global intermediary liability project, undertaken by CIS in collaboration with Article 19 and Electronic Frontier Foundation. See the &lt;a href="http://www.youtube.com/watch?v=TpBYbwBBHBQ"&gt;video&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WS112: Implications of post-Snowden Internet localization proposals&lt;/b&gt;&lt;br /&gt;Organised by ISOC and Center for Democracy and Technology, this panel questioned the distinctions between Internet-harmful and Internet-beneficial Internet and data localization. As a speaker at this workshop, Sunil Abraham of CIS identified state imperatives for Internet localization, such as taxation, network efficiency and security. See &lt;a href="http://www.youtube.com/watch?v=Nu3GycFBLoo"&gt;video&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WS63: Preserving a universal Internet: Costs of fragmentation&lt;br /&gt;&lt;/b&gt;Internet and Jurisdiction Project organized this workshop to explore potential harms to Internet architecture, universality and openness as a result of Internet balkanisation. Sunil Abraham was one of the speakers.&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WS2: Mobile, trust and privacy&lt;/b&gt;&lt;br /&gt;Organised by GSMA, this panel discussed methods, benefits and harms of use of mobile transaction generated information and data. Sunil Abraham was a speaker. See &lt;a href="http://www.youtube.com/watch?v=uwtQ18KzeiY"&gt;video&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WS188: Transparency reporting as a tool for Internet governance&lt;/b&gt;&lt;br /&gt;This GNI workshop examined transparency reporting by Internet intermediaries and companies, and sought to identify its strengths and shortcomings as a tool for Internet governance. Pranesh Prakash of CIS was a speaker. See &lt;a href="http://www.youtube.com/watch?v=Us4BW1Sw4Vo"&gt;video&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WS149: Aligning ICANN policy with the privacy rights of users&lt;br /&gt;&lt;/b&gt;This Yale ISP panel examined ICANN’s obligations for data protection, in light of international standards and best practices. This discussion is particularly relevant as ICANN’s WHOIS policy, Registrar Accreditation Agreement, and other policies have attained the status of a global standard for the handling of personal data. Pranesh Prakash moderated this panel.&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Other Participation&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Launch of the GISWatch Report&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Association for Progressive Communications (APC) and the Humanist Institute for Cooperation with Developing Countries (Hivos) released the Global Information Society Watch Report (&lt;i&gt;GISWatch&lt;/i&gt;) on national and global mass surveillance. The report “&lt;i&gt;explores the surveillance of citizens in today's digital age by governments with the complicity of institutions and corporations&lt;/i&gt;”. Elonnai Hickok of CIS contributed a thematic chapter on Intermediary Liability and Surveillance to this report.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-at-igf-2014'&gt;https://cis-india.org/internet-governance/blog/cis-at-igf-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-10-08T10:31:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann">
    <title>CIS’ Efforts Towards Greater Financial Disclosure by ICANN</title>
    <link>https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann</link>
    <description>
        &lt;b&gt;CIS has been working towards enhancing transparency and accountability at ICANN since 2014. While initial efforts have resulted in ICANN revealing its sources of income in a granular fashion in 2015, we are yet to see this level of transparency become a default approach within ICANN. Here, Padma Venkataraman chronologically maps CIS’ efforts at enhancing financial transparency and accountability at ICANN, while providing an outline of what remains to be done. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;With the $135 million sale of .web,&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; the much protested renewal of the .net agreement&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; and the continued annual increase in domain name registrations,&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; among other things, it is no surprise that there are still transparency and accountability concerns within the ICANN Community. CIS, as part of its efforts to examine the functioning of ICANN’s accountability mechanisms, has filed many DIDP requests till date, in a bid for greater transparency of the organisation’s sources of revenues.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;1.Efforts towards disclosure of revenue break-up by ICANN&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;- 2014&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;- 2015&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;- 2017&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;2.The need for granularity regarding historical revenues&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;-----&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;1.Efforts towards disclosure of revenue break-up by ICANN&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;- 2014&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In 2014, CIS’ Sunil Abraham demanded greater financial transparency of ICANN at both the Asia Pacific IGF and the ICANN Open Forum at the IGF. Later that year, CIS was provided with a list of ICANN’s sources of revenue for the financial year 2014, including payments from registries, registrars, sponsors, among others, by ICANN India Head Mr. Samiran Gupta.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; This was a big step for CIS and the Internet community, as before this, no details on granular income had ever been publicly divulged by ICANN on request.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However, as no details of historical revenue had been provided, CIS filed a DIDP request in December 2014, seeking financial disclosure of revenues for the years 1999 to 2014, in a detailed manner - similar to the 2014 report that had been provided.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; It sought a list of individuals and entities who had contributed to ICANN’s revenues over the mentioned time period.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In its response, ICANN stated that it possessed no documents in the format that CIS had requested, that is, it had no reports that broke down domain name income and revenue received by each legal entity and individual.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; It stated that as the data for years preceding 2012 were on a different system, compiling reports of the raw data for these years would be time-consuming and overly burdensome. ICANN denied the request citing this specific provision for non-disclosure of information under the DIDP.&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;- 2015&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In July 2015, CIS filed a request for disclosure of raw data regarding granular income for the years 1999 to 2014.&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; ICANN again said that it would be a huge burden ‘to access and review all the raw data for the years 1999 to 2014 in order to identify the raw data applicable to the request’.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; However, it mentioned its commitment to preparing detailed reports on a go-forward basis - all of which would be uploaded on its Financials page.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;- 2017&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;To follow up on ICANN’s commitment to granularity, CIS sought a detailed report on historical data for income and revenue contributions from domain names for FY 2015 and FY 2016 in June 2017.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; In its reply, ICANN stated that the Revenue Detail by Source reports for the last two years would be out by end July and that the report for FY 2012 would be out by end September.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;2.The need for granularity regarding historical revenues&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In 2014, CIS asked for disclosure of a list of ICANN’s sources of revenue and detailed granular income for the years 1999 to 2014. ICANN published the first but cited difficulty in preparing reports of the second. In 2015, CIS again sought detailed reports of historical granular revenue for the same period, and ICANN again denied disclosure claiming that it was burdensome to handle the raw data for those years. However, as ICANN agreed to publish detailed reports for future years, CIS recently asked for publication of reports for the FYs 2012, 2015 and 2016. Reports for these three years were uploaded according to the timeline provided by ICANN.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;CIS appreciates ICANN’s cooperation with its requests and is grateful for their efforts to make the reports for FYs 2012 to 2016 available (and on a continued basis). However, it is important that detailed information of historical revenue and income from domain names for the years 1999 to 2014 be made publicly available. It is also crucial that consistent accounting and disclosure practices are adopted and made known to the Community, in order to avoid omissions of statements such as Detail Revenue by Source and Lobbying Disclosures, among many others, in the annual reports - as has evidently happened for the years preceding 2012. This is necessary to maintain financial transparency and accountability, as an organisation’s sources of revenues can inform the dependant Community about why it functions the way it does. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;It will also allow more informed discussions about problems that the Community has faced in the past and continues to struggle with. For example, while examining problems such as ineffective market competition or biased screening processes for TLD applicants, among others, this data can be useful in assessing the long-term interests, motives and influences of different parties involved.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.icann.org/news/announcement-2-2016-07-28-en"&gt;&lt;span&gt;https://www.icann.org/news/announcement-2-2016-07-28-en&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Report of Public Comment Proceeding on the .net Renewal. &lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/report-comments-net-renewal-13jun17-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/report-comments-net-renewal-13jun17-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.icann.org/resources/pages/cct-metrics-domain-name-registration-2016-06-27-en"&gt;&lt;span&gt;https://www.icann.org/resources/pages/cct-metrics-domain-name-registration-2016-06-27-en&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://cis-india.org/internet-governance/blog/cis-receives-information-on-icanns-revenues-from-domain-names-fy-2014"&gt;&lt;span&gt;https://cis-india.org/internet-governance/blog/cis-receives-information-on-icanns-revenues-from-domain-names-fy-2014&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; DIDP &lt;span&gt;Request no - 20141222-1, &lt;/span&gt;22 December 2014. &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/didp-request-2"&gt;&lt;span&gt;https://cis-india.org/internet-governance/blog/didp-request-2&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.icann.org/en/system/files/files/cis-response-21jan15-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/cis-response-21jan15-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Defined Conditions for Non-Disclosure - &lt;span&gt;Information requests: (i) which are not reasonable; (ii) which are excessive or overly burdensome; (iii) complying with which is not feasible; or (iv) are made with an abusive or vexatious purpose or by a vexatious or querulous individual.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;&lt;span&gt;https://www.icann.org/resources/pages/didp-2012-02-25-en&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; DIDP &lt;span&gt;Request no - 20150722-2, 22 July 2015. &lt;/span&gt;&lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/didp-request-12-revenues"&gt;&lt;span&gt;https://cis-india.org/internet-governance/blog/didp-request-12-revenues&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.icann.org/en/system/files/files/didp-response-20150722-2-21aug15-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/didp-response-20150722-2-21aug15-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.icann.org/en/system/files/files/didp-response-20150722-2-21aug15-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/didp-response-20150722-2-21aug15-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;; &lt;/span&gt;&lt;a href="https://www.icann.org/resources/pages/governance/financials-en"&gt;&lt;span&gt;https://www.icann.org/resources/pages/governance/financials-en&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; DIDP Request No. 20170613-1, 14 June 2017. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.icann.org/en/system/files/files/didp-20170613-1-marda-obo-cis-response-13jul17-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/didp-20170613-1-marda-obo-cis-response-13jul17-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann'&gt;https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padma Venkataraman</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Transparency</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    

   <dc:date>2017-10-31T02:10:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/tanaya-rajwade-elonnai-hickok-and-raouf-kundil-peedikayil-october-31-2019-comments-to-christchurch-call">
    <title> CIS’ Comments to the Christchurch Call</title>
    <link>https://cis-india.org/internet-governance/blog/tanaya-rajwade-elonnai-hickok-and-raouf-kundil-peedikayil-october-31-2019-comments-to-christchurch-call</link>
    <description>
        &lt;b&gt;In the wake of the Christchurch terror attacks, the Prime Minister of New Zealand, Jacinda Ardern, and the President of France, Emmanuel Macron co-chaired the Christchurch Call to Action in May 2018 to “bring together countries and tech companies in an attempt to bring to an end the ability to use social media to organise and promote terrorism and violent extremism.”&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Fifty one supporters, including India, and eight tech companies have jointly agreed to a set of non-binding commitments and ongoing collaboration to eliminate violent and extremist content online. Facebook, Microsoft, Twitter, Google, and Amazon are all among the online service provider signatories that released a joint statement welcoming the call and committing to a nine-point action plan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Call has been hailed by many as a step in the right direction, as it represents the first collaboration between governments and the private sector companies to combat the problem of extremist content online at this scale. However, the vagueness of the commitments outlined in the Call and some of the proposed mechanisms have raised concerns about the potential abuse of human rights by both governments and tech companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This response is divided into two parts - Part One examines the call through the lens of human rights, and Part Two thinks through the ways in which India can adhere to the commitments in the Call, and compares the current legal framework in India with the commitments outlined in the Call.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to read the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cis2019-comments-to-the-christchurch-call"&gt;comments here&lt;/a&gt;. The comments were prepared by Tanaya Rajwade, Elonnai Hickok, and Raouf Kundil Peedikayil and edited by Gurshabad Grover and Amber Sinha.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/tanaya-rajwade-elonnai-hickok-and-raouf-kundil-peedikayil-october-31-2019-comments-to-christchurch-call'&gt;https://cis-india.org/internet-governance/blog/tanaya-rajwade-elonnai-hickok-and-raouf-kundil-peedikayil-october-31-2019-comments-to-christchurch-call&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Tanaya Rajwade, Elonnai Hickok, and Raouf Kundil Peedikayil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-11-04T14:13:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality">
    <title>CIS's Position on Net Neutrality</title>
    <link>https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality</link>
    <description>
        &lt;b&gt;As researchers committed to the principle of pluralism we rarely produce institutional positions. This is also because we tend to update our positions based on research outputs. But the lack of clarity around our position on network neutrality has led some stakeholders to believe that we are advocating for forbearance. Nothing can be farther from the truth. Please see below for the current articulation of our common institutional position.&lt;/b&gt;
        &lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;Net Neutrality violations can potentially have multiple categories of harms —&lt;strong&gt; competition harms, free speech harms, privacy harms, innovation and ‘generativity’ harms, harms to consumer choice and user freedoms, and diversity harms&lt;/strong&gt; thanks to unjust discrimination and gatekeeping by Internet service providers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Net Neutrality violations (including some those forms of zero-rating that violate net neutrality) can also have different kinds benefits — enabling the &lt;strong&gt;right to freedom of expression&lt;/strong&gt;, and the &lt;strong&gt;freedom of association&lt;/strong&gt;, especially when access to communication and publishing technologies is increased; &lt;strong&gt;increased competition&lt;/strong&gt; [by enabling product differentiation, can potentially allow small ISPs compete against market incumbents]; &lt;strong&gt;increased access&lt;/strong&gt; [usually to a subset of the Internet] by those without any access because they cannot afford it, increased access [usually to a subset of the Internet] by those who don't see any value in the Internet, &lt;strong&gt;reduced payments&lt;/strong&gt; by those who already have access to the Internet especially if their usage is dominated by certain services and destinations.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Given the magnitude and variety of potential harms, &lt;strong&gt;complete forbearance from all regulation is not an option&lt;/strong&gt; for regulators nor is self-regulation sufficient to address all the harms emerging from Net Neutrality violations, since incumbent telecom companies cannot be trusted to effectively self-regulate. Therefore, &lt;strong&gt;CIS calls for the immediate formulation of Net Neutrality regulation&lt;/strong&gt; by the telecom regulator [TRAI] and the notification thereof by the government [Department of Telecom of the Ministry of Information and Communication Technology]. CIS also calls for the eventual enactment of statutory law on Net Neutrality.&amp;nbsp; All such policy must be developed in a transparent fashion after proper consultation with all relevant stakeholders, and after giving citizens an opportunity to comment on draft regulations.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Even though some of these harms may be large, CIS believes that a government cannot apply the precautionary principle in the case of Net Neutrality violations. &lt;strong&gt;Banning technical innovations and business model innovations is not an appropriate policy option. &lt;/strong&gt;The regulation must toe a careful line &lt;strong&gt;to solve the optimization problem: &lt;/strong&gt;refraining from over-regulation of ISPs and harming innovation at the carrier level (and benefits of net neutrality violations mentioned above) while preventing ISPs from harming innovation and user choice.&amp;nbsp; ISPs must be regulated to limit harms from unjust discrimination towards consumers as well as to limit harms from unjust discrimination towards the services they carry on their networks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Based on regulatory theory, we believe that a regulatory framework that is technologically neutral, that factors in differences in technological context, as well as market realities and existing regulation, and which is able to respond to new evidence is what is ideal.&lt;br /&gt;&lt;br /&gt;This means that we need a framework that has some bright-line rules based, but which allows for flexibility in determining the scope of exceptions and in the application of the rules.&amp;nbsp; Candidate principles to be embodied in the regulation include: &lt;strong&gt;transparency, non-exclusivity, limiting unjust discrimination&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;harms emerging from walled gardens can be mitigated in a number of ways&lt;/strong&gt;.&amp;nbsp; &lt;strong&gt;On zero-rating the form of regulation must depend on the specific model and the potential harms that result from that model. &lt;/strong&gt;Zero-rating can be: paid for by the end consumer or subsidized by ISPs or subsidized by content providers or subsidized by government or a combination of these; deal-based or criteria-based or government-imposed; ISP-imposed or offered by the ISP and chosen by consumers; Transparent and understood by consumers vs. non-transparent; based on content-type or agnostic to content-type; service-specific or service-class/protocol-specific or service-agnostic; available on one ISP or on all ISPs.&amp;nbsp; Zero-rating by a small ISP with 2% penetration will not have the same harms as zero-rating by the largest incumbent ISP.&amp;nbsp; For service-agnostic / content-type agnostic zero-rating, which Mozilla terms ‘&lt;strong&gt;equal rating&lt;/strong&gt;’, CIS advocates for&lt;strong&gt; no regulation.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;CIS believes that &lt;strong&gt;Net Neutrality regulation for mobile and fixed-line access must be different&lt;/strong&gt; recognizing the fundamental differences in technologies.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;On specialized services CIS believes that there should be logical separation&lt;/strong&gt; and that all details of such specialized services and their impact on the Internet must be made transparent to consumers both individual and institutional, the general public and to the regulator.&amp;nbsp; Further, such services should be available to the user only upon request, and not without their active choice, with the requirement that the service cannot be reasonably provided with ‘best efforts’ delivery guarantee that is available over the Internet, and hence requires discriminatory treatment, or that the discriminatory treatment does not unduly harm the provision of the rest of the Internet to other customers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On incentives for telecom operators, CIS believes that the government should consider different models such as waiving contribution to the Universal Service Obligation Fund for prepaid consumers, and freeing up additional spectrum for telecom use without royalty using a shared spectrum paradigm, as well as freeing up more spectrum for use without a licence.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On reasonable network management CIS still does not have a common institutional position.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality'&gt;https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-09T13:06:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ciss-comments-on-the-ccwg-accountability-draft-proposal">
    <title>CIS's Comments on the CCWG-Accountability Draft Proposal </title>
    <link>https://cis-india.org/internet-governance/blog/ciss-comments-on-the-ccwg-accountability-draft-proposal</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) gave its comments on the failures of the CCWG-Accountability draft proposal as well as the processes that it has followed. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We from the Centre for Internet and Society wishes to express our dismay at the consistent way in which CCWG-Accountability has completely failed to take critical inputs from organizations like ours (and others, some instances of which have been highlighted in Richard Hill’s submission) into account, and has failed to even capture our concerns and misgivings about the process — as expressed in our submission to the CCWG-Accountability’s 2nd Draft Proposal on Work Stream 1 Recommendations — in any document prepared by the CCWG.  We cannot support the proposal in its current form.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Time for Comments&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We believe firstly that the 21 day comment period itself was too short and is going to result effectively in many groups or categories of people from not being able to meaningfully participate in the process, which flies in the face of the values that ICANN claims to uphold. This extremely short period amounts to procedural unsoundness, and restrains educated discussion on the way forward, especially given that the draft has altered quite drastically in the aftermath to ICANN55.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Capture of ICANN and CCWG Process&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The participation in the accountability-cross-community mailing list clearly shows that the process is dominated by developed countries (of the top 30 non-staff posters to the list, 26 were from the ‘WEOG’ UN grouping, with 14 being from the USA, with only 1 from Asia Pacific, 2 from Africa, and 1 from Latin America), by males (27 of the 30 non-staff posters), and by industry/commercial interests (17 of the top 30 non-staff posters).  If this isn’t “capture”, what is?  There is no stress test that overcomes this reality of capture of ICANN by Western industry interests.  The global community is only nominally multistakeholder, while actually being grossly under-representative of the developing nations, women and minority genders, and communities that are not business communities or technical communities.  For instance, of the 1010 ICANN-accredited registrars, 624 are from the United States, and 7 from the 54 countries of Africa.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Culling statistics from the accountability-cross-community mailing list, we find that of the top 30 posters (excluding ICANN staff):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;57% were, as far as one could ascertain from public records, from a single country: the United States of America. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;87% were, as far as one could ascertain from public records, participants from countries which are part of the WEOG UN grouping (which includes Western Europe, US, Canada, Israel, Australia, and New Zealand), which only has developed countries. None of those who participated substantively were from the EEC (Eastern European) group and only 1 was from Asia-Pacific and only 1 was from GRULAC (Latin American and Caribbean Group).&lt;/li&gt;
&lt;li&gt;90% were male and 3 were female, as far as one could ascertain from public records. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;57% were identifiable as primarily being from industry or the technical community, as far as one could ascertain from public records, with only 2 (7%) being readily identifiable as representing governments.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;This lack of global multistakeholder representation greatly damages the credibility of the entire process, since it gains its legitimacy by claiming to represent the global multistakeholder Internet community.&lt;/p&gt;
&lt;h3&gt;Bogey of Governmental Capture&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;With respect to Stress Test 18, dealing with the GAC, the report proposes that the ICANN Bylaws, specifically Article XI, Section 2, be amended to create a provision where if two-thirds of the Board so votes, they can reject a full GAC consensus advice. This amendment is not connected to the fear of government capture or the fear that ICANN will become a government-led body; given that the advice given by the GAC is non-binding that is not a possibility. Given the state of affairs described in the submission made above, it is clear that for much of the world, their governments are the only way in which they can effectively engage within the ICANN ecosystem. Therefore, nullifying the effectiveness of GAC advice is harmful to the interests of fostering a multistakeholder ecosystem, and contributes to the strengthening of the kind of industry capture described above.&lt;/p&gt;
&lt;h3&gt;Jurisdiction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;All discussions on the Sole Designator Model seem predicated on the unflinching certainty of ICANN’s jurisdiction continuing to remain in California, as the legal basis of that model is drawn from Californian corporate law.  To quote the draft report itself, in Annexe 12, it is stated that:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"Jurisdiction directly influences the way ICANN’s accountability processes are structured and operationalized. The fact that ICANN today operates under the legislation of the U.S. state of California grants the corporation certain rights and implies the existence of certain accountability mechanisms. It also imposes some limits with respect to the accountability mechanisms it can adopt. The topic of jurisdiction is, as a consequence, very relevant for the CCWG-Accountability. ICANN is a public benefit corporation incorporated in California and subject to California state laws, applicable U.S. federal laws and both state and federal court jurisdiction."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jurisdiction has been placed within the mandate of WS2, to be dealt with post the transition.  However, there is no analysis in the 3rd Draft on how the Sole Designator Model would continue to be upheld if future Work Stream 2 discussions led to a consensus that there needed to be a shift in the jurisdiction of ICANN. In the event that ICANN shifts to, say, Delaware or Geneva, would there be a basis to the Sole Designator Model in the law?  Therefore this is an issue that needs to be addressed before this model is adopted, else there is a risk of either this model being rendered infructuous in the future, or this model foreclosing open debate and discussion in Work Stream 2.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Right of Inspection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We strongly support the incorporation of the rights of Inspection under this model as per Section 6333 of the California Corporations Code as a fundamental bylaw. As there is a severe gap between the claims that ICANN raises about its own transparency and the actual amount of transparency that it upholds, we opine that the right of inspection needs to be provided to each member of the ICANN community.&lt;/p&gt;
&lt;h3&gt;Timeline for WS2 Reforms&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We support the CCWG’s commitment to the review of the DIDP Process, which they have committed to enhancing in WS2. Our research on this matter indicates that ICANN has in practice been able to deflect most requests for information. It regularly utilised its internal processes and discussions with stakeholders clauses, as well as clauses on protecting financial interests of third parties (over 50% of the total non-disclosure clauses ever invoked - see chart below) to do away with having to provide information on pertinent matters such as its compliance audits and reports of abuse to registrars. We believe that even if ICANN is a private entity legally, and not at the same level as a state, it nonetheless plays the role of regulating an enormous public good, namely the Internet. Therefore, there is a great onus on ICANN to be far more open about the information that they provide. Finally, it is extremely disturbing that they have extended full disclosure to only 12% of the requests that they receive. An astonishing 88% of the requests have been denied, partly or otherwise. See "&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icanns-didp-ii"&gt;Peering behind the veil of ICANN's DIDP (II)&lt;/a&gt;".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the present format, there has been little analysis on the timeline of WS2; the report itself merely states that:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"The CCWG-Accountability expects to begin refining the scope of Work Stream 2 during the upcoming ICANN 55 Meeting in March 2016. It is intended that Work Stream 2 will be completed by the end of 2016."&lt;/p&gt;
&lt;p&gt;Without further clarity and specification of the WS2 timeline, meaningful reform cannot be initiated. Therefore we urge the CCWG to come up with a clear timeline for transparency processes.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ciss-comments-on-the-ccwg-accountability-draft-proposal'&gt;https://cis-india.org/internet-governance/blog/ciss-comments-on-the-ccwg-accountability-draft-proposal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-29T15:17:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
